34 posts were published in the last hour
- 22:5 : IT Security News Hourly Summary
- 21:5 : IT Security News Hourly Summary
- 20:35 : Google’s Gemini AI Chatbot Keeps Telling Users to Die
- 19:9 : Reboot Revolution Protecting iPhone Users
- 18:4 : T-Mobile hack linked to Chinese breaches of telecom networks
- 18:4 : Palo Alto Networks confirmed active exploitation of recently disclosed zero-day
- 17:34 : DEF CON 32 – Sudos And Sudon’ts: Peering Inside Sudo For Windows
- 17:9 : Cybersecurity Flaws in US Drinking Water Systems Put 26 Million at Risk
- 17:9 : Cyber Crisis Management Plan: Shield for Brand Reputation
- 16:34 : T-Mobile says it was hacked, linked to Chinese breaches of telecom networks
- 16:34 : Data Aggregator Breach Exposes Data of 122 Million Users
- 16:34 : Set Forth Data Breach: 1.5 Million Impacted and Next Steps
- 15:32 : What a second Trump term means for the future of ransomware
- 13:9 : High Performance Software Defined Receivers
- 12:31 : Bitfinex Hacker Gets 5 Years for $10 Billion Bitcoin Heist
- 12:31 : NSO Group used WhatsApp exploits even after Meta-owned company sued it
- 11:36 : Accelerating feature delivery in software development
- 11:4 : The SEC Cybersecurity Rule: Awareness Rises, Compliance Lags
- 10:31 : Rust haters, unite! Fil-C aims to Make C Great Again
- 9:11 : PAN-OS Firewall Vulnerability Under Active Exploitation – IoCs Released
- 8:6 : AI in Action: Project Synapse With Marcel Gagne and John Pinard. Cyber Security Today Weekend Edition for November 16, 2024
- 7:34 : Swiss cheesed off as postal service used to spread malware
- 7:34 : The Value of Database Subsetting
- 7:34 : How to Create Realistic Test Data for Amazon Redshift
- 7:34 : What is Data Subsetting? The Art and Science of Only Using the Data You Need
- 7:34 : Build vs. Buy? Test Data Doesn’t Have to be Another In-House Project
- 7:34 : How To Create Realistic Test Data For MySQL
- 7:34 : Warning: DEEPDATA Malware Exploiting Unpatched Fortinet Flaw to Steal VPN Credentials
- 7:8 : DEF CON 32 – Manipulating Shim And Office For Code Injection
- 5:34 : Join Group Calls Easily on Signal with New Custom Link Feature
- 1:9 : Bloke behind Helix Bitcoin launderette jailed for three years, hands over $400M
- 1:9 : Glove Stealer bypasses Chrome’s App-Bound Encryption to steal cookies
- 1:9 : Letting chatbots run robots ends as badly as you’d expect
- 23:11 : What Okta’s failures say about the future of identity security in 2025