Skip to content
April 13, 2026
  • WebinarTV Secretly Scraped Zoom Meetings of Anonymous Recovery Programs
  • The Oldest Octopus Fossil Ever Isn’t An Octopus At All, Scientists Discover
  • The vulnerability flood is here. Here’s what it means – and how to prepare
  • Adobe Reader zero-day vulnerability in active exploitation

itcnu.com

Newsletter
Random News
  • Cisco
  • Cyber Security
  • RSS APP cyber security
  • RSS APP cybersecurity
  • Uncategorized

Chief Editor

Saroj Mhr

Lorem ipsum is simply dummy text
  • Home
  • Single PostFeatured
  • Contact Us
  • Cyber Security
  • Cloud Security
  • Network Security
  • Application Security
  • News
Youtube Live
Headlines
  • How Sugar and Sedentary Lifestyle Affects Men

    3 years ago
  • Simple lifestyle changes that will help reduce stress

    3 years ago
  • WebinarTV Secretly Scraped Zoom Meetings of Anonymous Recovery Programs

    23 minutes ago
  • The Oldest Octopus Fossil Ever Isn’t An Octopus At All, Scientists Discover

    2 days ago
  • The vulnerability flood is here. Here’s what it means – and how to prepare

    3 days ago
  • Adobe Reader zero-day vulnerability in active exploitation

    3 days ago
  • Behind the Blog: Smoking the Whole Carton

    3 days ago
  • World’s Largest Group of Chimps Waging Deadly ‘Civil War,’ Scientists Discover

    4 days ago

Highlight News

  • Cyber Security

Podcast: The Company Secretly Turning Your Zoom Meetings into Podcasts

storshop.dk@gmail.com3 weeks ago01 mins

This week we start with Emanuel’s crazy story about WebinarTV, a company that is secretly recording Zoom meetings and turning them into AI-powered podcasts. It’s nuts. After the break, Joseph tells us about the eccentric billionaire who tried to become a cocaine kingpin. In the subscribers-only section, we lament the lose of the metaverse.  Listen…

Read More
  • Uncategorized

Sophos Firewall ranked the #1 overall firewall solution in G2’s Spring 2026 reports

storshop.dk@gmail.com3 weeks ago01 mins

Why organizations are choosing Sophos Firewall to reduce exposure and strengthen resilience Categories: Products & Services, Products Tags: Firewall, G2, Awards

Read More
  • Cyber Security

Delivery Robot Drives Through Bus Stop Shelter, Shattering Glass Everywhere

storshop.dk@gmail.com3 weeks ago03 mins

A Serve Robotics food delivery robot crashed through the glass wall of a bus stop shelter in Chicago earlier this week, shattering the glass all over the sidewalk. The crash comes amid a protest against delivery robots in Chicago and a few weeks after a politician who represents part of Chicago said he would not…

Read More
  • Uncategorized

High-Five: Sophos Ranked Number 1 Overall in Endpoint, EDR, XDR, MDR, and Firewall in the G2 Spring 2026 Reports

storshop.dk@gmail.com3 weeks ago01 mins

#1 ranked in 78 global reports Categories: Products & Services Tags: MDR, network, Endpoint, Firewall

Read More
  • Uncategorized

Cybersecurity for Education – Sophos Protected Classroom

storshop.dk@gmail.com3 weeks ago01 mins

Categories: Products & Services Tags: Education, Endpoint, NDR, MDR

Read More
  • Cyber Security

This Company Is Secretly Turning Your Zoom Meetings into AI Podcasts

storshop.dk@gmail.com3 weeks ago07 mins

WebinarTV, a company that bills itself as “a search engine for the best webinars,” is secretly scanning the internet for Zoom meeting links, recording the calls, and turning them into AI-generated podcasts for profit. In some cases, people only found out that their Zoom calls were recorded once WebinarTV reached out to them directly to…

Read More
  • Cyber Security

A Top Google Search Result for Claude Plugins Was Planted by Hackers

storshop.dk@gmail.com3 weeks ago03 mins

A top result on Google for people searching for Claude plugins sent users to a site that recently contained malicious code in an apparent attempt to steal their credentials.  The news shows how the explosion of interest in generative AI tools is giving hackers new ways to attack users. The malicious site was flagged to…

Read More
  • Uncategorized

The global CISO landscape: A leadership gap too large to ignore

storshop.dk@gmail.com3 weeks ago01 mins

Why the world needs scalable security leadership — and MSPs and MSSPs are key to delivery Categories: Products & Services Tags: Featured, CISO, Survey

Read More
  • Uncategorized

Oracle vulnerability (CVE-2026-21992) impacts core products

storshop.dk@gmail.com3 weeks ago01 mins

Categories: Threat Research Tags: advisory, vulnerability, Oracle

Read More
  • Cyber Security

Judge Allows DOGE Deposition Videos Back Online

storshop.dk@gmail.com3 weeks ago04 mins

On Monday a judge said videos of recent depositions from DOGE members can be published online once again. The ruling is something of an about face for Judge Colleen McMahon, who originally ordered plaintiffs in the DOGE-related lawsuit “claw back” the videos they had published to YouTube. The videos were already massively viral at the…

Read More
  • 1
  • …
  • 4
  • 5
  • 6
  • 7
  • 8
  • …
  • 172
  • WebinarTV Secretly Scraped Zoom Meetings of Anonymous Recovery ProgramsApril 13, 2026
    WebinarTV, a site that scrapes Zoom webinars without permission, has downloaded and posted Zoom Webinars for anonymous addiction recovery meetings, support groups for caregivers and people who suffer from chronic illness, and a meeting of nudists. WebinarTV’s Michael Robertson told me that the company asks every single person for permission to “promote” their webinars, but...
  • The Oldest Octopus Fossil Ever Isn’t An Octopus At All, Scientists DiscoverApril 11, 2026
    Welcome back to the Abstract! Here are the studies this week that were ritually sacrificed, kicked out of the galaxy, taxonomically revised, and wore many hats. First, scientists shed light on human sacrifice and cousin sex using ancient DNA from the bones of people who lived in fifth-century Korea. Then: the yeeting of a star,...
  • The vulnerability flood is here. Here’s what it means – and how to prepareApril 10, 2026
    We can’t control the pace of AI-driven vulnerability discovery, but we can control how fast we respond. Categories: Sophos Insights Tags: LLM, AI, Exploit, vulnerability, Active Adversary, Pacific Rim
  • Adobe Reader zero-day vulnerability in active exploitationApril 10, 2026
    Categories: Threat Research Tags: advisory, vulnerability, Adobe Reader
  • Behind the Blog: Smoking the Whole CartonApril 10, 2026
    This is Behind the Blog, where we share our behind-the-scenes thoughts about how a few of our top stories of the week came together. This week, we discuss gun violence and chatbots and acceptance of depravity. EMANUEL: It takes a lot for a post to shock me these days, especially if it’s from a known...

Recent Posts

  • WebinarTV Secretly Scraped Zoom Meetings of Anonymous Recovery Programs
  • The Oldest Octopus Fossil Ever Isn’t An Octopus At All, Scientists Discover
  • The vulnerability flood is here. Here’s what it means – and how to prepare
  • Adobe Reader zero-day vulnerability in active exploitation
  • Behind the Blog: Smoking the Whole Carton
  • World’s Largest Group of Chimps Waging Deadly ‘Civil War,’ Scientists Discover
  • Farmer Arrested for Speaking Too Long at Datacenter Town Hall Vows to Fight
  • We let OpenClaw loose on an internal network. Here’s what it found
  • FBI Extracts Suspect’s Deleted Signal Messages Saved in iPhone Notification Database
  • Microsoft Abruptly Terminates VeraCrypt Account, Halting Windows Updates

Categories

  • Cisco
  • Cyber Security
  • RSS APP cyber security
  • RSS APP cybersecurity
  • Uncategorized

Popular News

1

WebinarTV Secretly Scraped Zoom Meetings of Anonymous Recovery Programs

  • Cyber Security
2

The Oldest Octopus Fossil Ever Isn’t An Octopus At All, Scientists Discover

  • Cyber Security
3

The vulnerability flood is here. Here’s what it means – and how to prepare

  • Uncategorized
4

Adobe Reader zero-day vulnerability in active exploitation

  • Uncategorized
5

Behind the Blog: Smoking the Whole Carton

  • Cyber Security
6

World’s Largest Group of Chimps Waging Deadly ‘Civil War,’ Scientists Discover

  • Cyber Security
7

Farmer Arrested for Speaking Too Long at Datacenter Town Hall Vows to Fight

  • Cyber Security
8

We let OpenClaw loose on an internal network. Here’s what it found

  • Uncategorized

Trending News

Cyber Security
WebinarTV Secretly Scraped Zoom Meetings of Anonymous Recovery Programs 01
23 minutes ago
02
Cyber Security
The Oldest Octopus Fossil Ever Isn’t An Octopus At All, Scientists Discover
03
Uncategorized
The vulnerability flood is here. Here’s what it means – and how to prepare

Recent News

1

WebinarTV Secretly Scraped Zoom Meetings of Anonymous Recovery Programs

  • Cyber Security
2

The Oldest Octopus Fossil Ever Isn’t An Octopus At All, Scientists Discover

  • Cyber Security
3

The vulnerability flood is here. Here’s what it means – and how to prepare

  • Uncategorized
4

Adobe Reader zero-day vulnerability in active exploitation

  • Uncategorized
5

Behind the Blog: Smoking the Whole Carton

  • Cyber Security
6

World’s Largest Group of Chimps Waging Deadly ‘Civil War,’ Scientists Discover

  • Cyber Security
7

Farmer Arrested for Speaking Too Long at Datacenter Town Hall Vows to Fight

  • Cyber Security
8

We let OpenClaw loose on an internal network. Here’s what it found

  • Uncategorized
Newsmatic - News WordPress Theme 2026. Powered By BlazeThemes.
  • Blog
  • Privacy
  • Contact