Category: hourly summary

IT Security News Hourly Summary 2024-12-06 03h : 5 posts

5 posts were published in the last hour 2:4 : ISC Stormcast For Friday, December 6th, 2024 https://isc.sans.edu/podcastdetail/9244, (Fri, Dec 6th) 2:4 : Check Point XDR/XPR Reaches New Heights: Climbing Even Higher as a Frost Radar™ XDR Growth and Innovation…

IT Security News Hourly Summary 2024-12-05 17h : 12 posts

12 posts were published in the last hour 16:2 : Wordfence Intelligence Weekly WordPress Vulnerability Report (November 25, 2024 to December 1, 2024) 16:2 : How Holiday Season Traditions Affect Internet Traffic Trends 16:2 : Ransomware attack on Deloitte and…

IT Security News Hourly Summary 2024-12-05 15h : 4 posts

4 posts were published in the last hour 13:34 : Empowering MSSPs with CloudGuard CSPM: Secure Multi-Cloud Environments with Confidence 13:34 : ‘DroidBot’ Android Trojan Targets Banking, Cryptocurrency Applications 13:34 : What is PHI? (Protected Health Information) 13:34 : Middesk…

IT Security News Hourly Summary 2024-12-04 20h : 12 posts

12 posts were published in the last hour 19:2 : Senators say US military is failing to secure its phones from foreign spies 19:2 : Fortinet’s Secure-by-Design Commitments: Making Measurable Progress in Cybersecurity 19:2 : Veeam Warns of Critical Vulnerability…

IT Security News Hourly Summary 2024-12-04 16h : 73 posts

73 posts were published in the last hour 14:56 : Data Analysis: The Unsung Hero of Cybersecurity Expertise [Guest Diary], (Wed, Dec 4th) 14:56 : ISC Stormcast For Wednesday, December 4th, 2024 https://isc.sans.edu/podcastdetail/9240, (Wed, Dec 4th) 14:56 : Implementing blocklists…

IT Security News Hourly Summary 2024-12-03 22h : 30 posts

30 posts were published in the last hour 20:17 : CISA, NSA, FBI and International Partners Publish Guide for Protecting Communications Infrastructure 20:16 : Apple espionage on its employees iPhones and iCloud accounts 20:16 : Microsoft Faces £1 Billion Lawsuit…

IT Security News Hourly Summary 2024-12-03 11h : 12 posts

12 posts were published in the last hour 10:5 : US government contractor ENGlobal says operations are ‘limited’ following cyberattack 10:4 : US agency proposes new rule blocking data brokers from selling Americans’ sensitive personal data 10:4 : 🍿 Today’s…

IT Security News Hourly Summary 2024-12-02 19h : 6 posts

6 posts were published in the last hour 18:4 : AWS Launches Incident Response Service 18:4 : France Accuses Azerbaijan of Online Manipulation Campaigns 17:6 : Prototype UEFI Bootkit is South Korean University Project; LogoFAIL Exploit Discovered 17:6 : Signs…

IT Security News Hourly Summary 2024-12-02 03h : 3 posts

3 posts were published in the last hour 2:4 : ISC Stormcast For Monday, December 2nd, 2024 https://isc.sans.edu/podcastdetail/9236, (Mon, Dec 2nd) 2:4 : The Curious Case of an Egg-Cellent Resume 1:36 : How threat actors can use generative artificial intelligence?

IT Security News Hourly Summary 2024-12-01 18h : 3 posts

3 posts were published in the last hour 17:4 : Proposed US Bill Mandates MFA and Cybersecurity Standards for Healthcare 17:4 : Smokedham: Malicious Backdoor for Surveillance and Ransomware Campaigns 16:33 : Why Simulating Phishing Attacks Is the Best Way…

IT Security News Hourly Summary 2024-11-30 09h : 6 posts

6 posts were published in the last hour 8:5 : Future proofing business with resilient network solutions 8:4 : International Computer Security Day 8:4 : Notorious ransomware programmer Mikhail Pavlovich Matveev arrested in Russia 8:4 : Wanted Russian Cybercriminal Linked…

IT Security News Hourly Summary 2024-11-29 17h : 8 posts

8 posts were published in the last hour 16:2 : Mastercard to say goodbye to passwords 16:2 : Canada Sues Google For Alleged Anti-Competitive Conduct In Advertising 16:2 : Phishing-as-a-Service Rockstar 2FA continues to be prevalent 15:36 : Helping Payments…

IT Security News Hourly Summary 2024-11-29 08h : 4 posts

4 posts were published in the last hour 6:35 : HawkEye Malware: Technical Analysis 6:35 : Zyxel Firewall Vulnerability Actively Exploited in Attacks 6:35 : Godot Gaming Engine Exploited to Spread Undetectable Malware 6:35 : Shop Smart, Stay Safe: Black…