137 posts were published in the last hour
- 22:13 : What CISOs need to know to build an OT cybersecurity program
- 22:5 : IT Security News Hourly Summary
- 21:11 : CISA Adds Three Known Exploited Vulnerabilities to Catalog
- 21:11 : Recently disclosed VMware vCenter Server bugs are actively exploited in attacks
- 21:11 : T-Mobile US ‘monitoring’ China’s ‘industry-wide attack’ amid fresh security breach fears
- 21:5 : IT Security News Hourly Summary
- 20:38 : Guess Who’s Back? LodaRAT, A Global Cybersecurity Threat
- 20:13 : Facebook Malvertising Campaign Spreads Malware via Fake Bitwarden
- 20:13 : How to clear your Google search cache on Android (and why you should)
- 20:13 : Randall Munroe’s XKCD ‘Europa Clipper’
- 20:5 : IT Security News Hourly Summary
- 19:7 : CISA Launches New Learning Platform to Enhance Training and Education U.S. Veterans and Other Stakeholders
- 19:7 : What is data egress? How it works and how to manage costs
- 19:7 : CISA Director Jen Easterly to depart agency on January 20
- 19:5 : IT Security News Hourly Summary
- 18:34 : VMware Discloses Exploitation of Hard-to-Fix vCenter Server Flaw
- 18:11 : US Government Agencies Impersonated in Aggressive DocuSign Phishing Scams
- 18:11 : DEF CON 32 – Secrets & Shadows: Leveraging Big Data For Vulnerability Discovery
- 18:11 : New Stealthy BabbleLoader Malware Spotted Delivering WhiteSnake and Meduza Stealers
- 18:5 : IT Security News Hourly Summary
- 17:34 : On Alaa Abd El Fattah’s 43rd Birthday, the Fight For His Release Continues
- 17:6 : An air fryer, a ring, and a vacuum get brought into a home. What they take out is your data (Lock and Code S05E24)
- 17:5 : IT Security News Hourly Summary
- 16:33 : QuickBooks popup scam still being delivered via Google ads
- 16:33 : CISA director Jen Easterly to depart agency on January 20
- 16:33 : Sweden’s ‘Doomsday Prep for Dummies’ guide hits mailboxes today
- 16:32 : ‘ClickFix’ Cyber-Attacks for Malware Deployment on the Rise
- 16:32 : Swiss Cyber Agency Warns of QR Code Malware in Mail Scam
- 16:6 : Phishing Campaign Exploits Fake Trump Assassination Story to Harvest Corporate Data
- 16:6 : AI training software firm iLearningEngines says it lost $250,000 in recent cyberattack
- 16:6 : Most of 2023’s Top Exploited Vulnerabilities Were Zero-Days
- 16:5 : IT Security News Hourly Summary
- 15:32 : Why Custom IOCs Are Necessary for Advanced Threat Hunting and Detection
- 15:32 : Security Alert: Fake Accounts Threaten Black Friday Gaming Sales
- 15:32 : Hackers Are Sending Fake Police Data Requests To Tech Giants To Steal People’s Private Data
- 15:32 : Major security audit of critical FreeBSD components now available
- 15:32 : Attackers are exploiting 2 zero-days in Palo Alto Networks firewalls (CVE-2024-0012, CVE-2024-9474)
- 15:13 : Threat Brief: Operation Lunar Peek, Activity Related to CVE-2024-0012
- 15:13 : 5 Best VPNs for Streaming in 2024
- 15:13 : What is a spam trap?
- 15:13 : Foreign adversary hacked email communications of the Library of Congress says
- 15:13 : Deepen your knowledge of Linux security
- 15:13 : Fake Donald Trump Assassination Story Used in Phishing Scam
- 15:5 : IT Security News Hourly Summary
- 14:36 : Five Ways to Prevent and Protect Against Ransomware Attacks
- 14:36 : Chinese Salt Typhoon Hacked T-Mobile in US Telecom Breach Spree
- 14:36 : Discontinued GeoVision Products Targeted in Botnet Attacks via Zero-Day
- 14:36 : How Veriti Evolves Vulnerability Management Into Exposure Management which we believe aligns with the Gartner® approach
- 14:36 : Threat modeling your generative AI workload to evaluate security risk
- 14:9 : Space tech giant Maxar confirms hacker accessed employees’ personal data
- 14:9 : Ransomware Attack on Oklahoma Medical Center Impacts 133,000
- 14:8 : The Problem of Permissions and Non-Human Identities – Why Remediating Credentials Takes Longer Than You Think
- 14:8 : Surge in DocuSign Phishing Attacks Target US State Contractors
- 14:5 : IT Security News Hourly Summary
- 13:34 : SpaceX Prepares Tender Offer At $250bn Valuation
- 13:34 : US Finalises $6.6bn Award For TSMC Arizona Plants
- 13:34 : Beyond Trust: Revolutionizing MSSP Security with a Zero Trust Framework
- 13:34 : 300 Drinking Water Systems in US Exposed to Disruptive, Damaging Hacker Attacks
- 13:34 : Cloud Pentesting 101: What to Expect from a Cloud Penetration Test
- 13:34 : Bluesky’s Growth Spurs Scaling Challenges Amid Decentralization Goals
- 13:9 : Gen AI could speed up coding, but businesses should still consider risks
- 13:9 : The best password manager for Mac in 2024: Expert tested
- 13:9 : What is acceptable use policy (AUP)?
- 13:9 : Illegal Crypto Mining: How Businesses Can Prevent Themselves From Being ‘Cryptojacked’
- 13:9 : Scytale Launches New Partnership Program with Managed Service Providers (MSPs), Helping Transform Compliance into a Competitive Advantage
- 13:5 : IT Security News Hourly Summary
- 12:34 : Fortinet VPN Zero-Day Exploited in Malware Attacks Remains Unpatched: Report
- 12:5 : IT Security News Hourly Summary
- 12:4 : Mozilla 0Din Warns of ChatGPT Sandbox Flaws Enabling Python Execution
- 12:4 : Proton VPN review: A very solid free VPN with robust leak protection
- 12:4 : Gmail’s New Shielded Email Feature Lets Users Create Aliases for Email Privacy
- 12:4 : THN Recap: Top Cybersecurity Threats, Tools, and Practices (Nov 11 – Nov 17)
- 12:4 : AnnieMac Data Breach Impacts 171,000 People
- 11:34 : Beyond Compliance: The Advantage of Year-Round Network Pen Testing
- 11:34 : Fake Discount Sites Exploit Black Friday to Hijack Shopper Information
- 11:34 : North Korean IT Worker Network Tied to BeaverTail Phishing Campaign
- 11:30 : IT Security News Hourly Summary – 10 posts
- 11:11 : Learn Cybersecurity Essentials for Just $40 from Home
- 11:11 : T-Mobile is one of the victims of the massive Chinese breach of telecom firms
- 11:11 : The Stealthy Success of Passkeys
- 11:5 : IT Security News Hourly Summary
- 10:36 : How to spot a deepfake love scam?
- 10:36 : Lenovo Beats Estimates, Raises Projections As PC Sales Recover
- 10:36 : US Releases Security Advice For AI In Critical Infrastructure
- 10:36 : Zohocorp ManageEngine ADAudit Plus SQL Injection Vulnerability
- 10:36 : Library of Congress Says an Adversary Hacked Some Emails
- 10:36 : FTC Records 50% Drop in Nuisance Calls Since 2021
- 10:11 : T Mobile Hacked and info such as call records and police request data breached
- 10:11 : The Critical Role of a CEO in Bolstering Corporate Cybersecurity
- 10:11 : Ready – Preventing refactoring or how to make legacy code something to be proud of
- 10:11 : Citrix Virtual Apps & Desktops Zero-Day Vulnerability Exploited in the Wild
- 10:11 : NIST Publishes Draft Strategy for Post-Quantum Cryptography Transition
- 10:11 : Industry Moves for the week of November 18, 2024 – SecurityWeek
- 10:11 : T-Mobile Also Targeted in Chinese Telecom Hacking Campaign
- 10:11 : UK Shoppers Lost £11.5m Last Christmas, NCSC Warns
- 10:5 : IT Security News Hourly Summary
- 9:35 : Inside Water Barghest’s Rapid Exploit-to-Market Strategy for IoT Devices
- 9:35 : Which? Seeks £3bn In Apple iCloud Competition Claim
- 9:35 : China Chip Production Slows Ahead Of New US Sanctions
- 9:35 : Cyberbiosecurity: Where Digital Threats Meet Biological Systems
- 9:35 : Identity Fraud and the Cost of Living Crisis: New Challenges for 2024
- 9:35 : Why It’s Time to Leave Twitter
- 9:35 : What Is The Content Delivery & Security Association (CDSA)?
- 9:35 : NCSC Warns UK Shoppers Lost £11.5m Last Christmas
- 9:8 : Increased GDPR Enforcement Highlights the Need for Data Security
- 9:5 : IT Security News Hourly Summary
- 8:34 : Amazon Haul Offers ‘Crazy Low Prices’ To Counter Temu, Shein
- 8:34 : A week in security (November 11 – November 17)
- 8:34 : T-Mobile confirms breach, AnnieMac data stolen, NewGlove malware threat
- 8:11 : Critical Really Simple Security plugin flaw impacts 4M+ WordPress sites
- 8:11 : Analyzing JtR’s Tokenizer Attack (Round 1)
- 8:5 : IT Security News Hourly Summary
- 7:38 : Sonatype Nexus Repository Manager Hit by RCE & XSS Vulnerability
- 7:38 : Unknown Attacker Tries To Frame Security Researcher: Cyber Security Today for Monday, November 18th, 2024
- 7:5 : IT Security News Hourly Summary
- 7:2 : Data Leak Reported Due to Power Pages Misconfiguration
- 7:2 : NSO Group Exploited WhatsApp to Install Pegasus Spyware Even After Meta’s Lawsuit
- 6:11 : Exploit attempts for unpatched Citrix vulnerability, (Mon, Nov 18th)
- 6:11 : GeoVision 0-Day Vulnerability Exploited in the Wild
- 6:11 : Fortra Reports Alarming Increase in Abuse of Cloudflare Services
- 6:11 : Transforming code scanning and threat detection with GenAI
- 6:11 : Navigating the compliance labyrinth: A CSO’s guide to scaling security
- 6:5 : IT Security News Hourly Summary
- 5:32 : Tools and Techniques to master the management of APIs in Production
- 5:6 : ScubaGear: Open-source tool to assess Microsoft 365 configurations for security gaps
- 5:6 : Evaluating GRC tools
- 5:6 : Urgent: Critical WordPress Plugin Vulnerability Exposes Over 4 Million Sites
- 4:5 : IT Security News Hourly Summary
- 4:2 : How and where to report cybercrime: What you need to know
- 3:5 : IT Security News Hourly Summary
- 2:9 : ISC Stormcast For Monday, November 18th, 2024 https://isc.sans.edu/podcastdetail/9222, (Mon, Nov 18th)
- 2:5 : IT Security News Hourly Summary
- 1:5 : IT Security News Hourly Summary
- 0:36 : Teen serial swatter-for-hire busted, pleads guilty, could face 20 years
- 0:5 : IT Security News Hourly Summary
- 23:5 : IT Security News Hourly Summary
- 22:58 : IT Security News Weekly Summary – Week 46