120 posts were published in the last hour
- 22:5 : IT Security News Hourly Summary 2024-12-02 23h : 3 posts
- 22:2 : Sweet Security Introduces Evolutionary Leap in Cloud Detection and Response, Releasing First Unified Detection & Response Platform
- 21:8 : Elon Musk Seeks To Block OpenAI’s For-Profit Bid
- 21:8 : New Rockstar 2FA Phishing-as-a-Service Kit Targets Microsoft 365 Accounts
- 21:5 : IT Security News Hourly Summary 2024-12-02 22h : 4 posts
- 20:36 : Intel CEO Pat Gelsinger Forced Out By Board
- 20:36 : OpenAI Sued By Canadian News Publishers For Alleged Copyright Infringement
- 20:11 : Vulnerability Summary for the Week of November 25, 2024
- 20:5 : IT Security News Hourly Summary 2024-12-02 21h : 4 posts
- 19:53 : Cohere’s Rerank 3.5 is here, and it’s about to change enterprise search forever
- 19:50 : I recommend the Blink Mini 2 security camera over the Wyze Cam (and it’s only $30 right now)
- 19:46 : An Apple employee is suing the company over monitoring employee personal devices
- 19:41 : The shocking speed of AWS key exploitation
- 19:5 : IT Security News Hourly Summary 2024-12-02 20h : 6 posts
- 19:3 : SmokeLoader Malware Exploits MS Office Flaws to Steal Browser Credentials
- 19:3 : Poland arrests former spy chief in Pegasus spyware probe
- 18:5 : OP HAECHI V: Interpol Arrests 5,500 Cybercriminals, Recovers $400 Million
- 18:5 : Russian government confirms rare criminal charges against ransomware hacker
- 18:5 : Indian online ID verification firm Signzy confirms security incident
- 18:5 : IT Security News Hourly Summary 2024-12-02 19h : 6 posts
- 18:4 : AWS Launches Incident Response Service
- 18:4 : France Accuses Azerbaijan of Online Manipulation Campaigns
- 17:6 : Prototype UEFI Bootkit is South Korean University Project; LogoFAIL Exploit Discovered
- 17:6 : Signs Point to Foreign Syndicate Fueling BEC Surge From Within U.S. ISPs
- 17:6 : Reposition Cybersecurity From a Cost Center to a Business Driver
- 17:5 : Exploring the Highest Paying Cybersecurity Jobs in 2024
- 17:5 : IT Security News Hourly Summary 2024-12-02 18h : 8 posts
- 16:36 : Op HAECHI V: Interpol Arrests 5,500 Cybercriminals, Recovers $400 Million
- 16:36 : New CleverSoar Malware Attacking Windows Users Bypassing Security Mechanisms
- 16:36 : Cybersecurity M&A Roundup: 49 Deals Announced in November 2024
- 16:36 : Rise in Cyberattacks, Healthcare Industry Top Victim
- 16:36 : How India is Gearing Up to Tackle Cyber Threats Together
- 16:36 : Corrupted Word Files Fuel Sophisticated Phishing Campaign
- 15:41 : AWS offers Information Security Incident Response to curtail cyber attacks
- 15:41 : Updated TIC 3.0 Security Capabilities Catalog (SCC) to v3.2
- 15:41 : SpyLoan Malware Infects 8 Million Android Users
- 15:40 : Tor Project needs 200 WebTunnel bridges more to bypass Russia’ censorship
- 15:39 : Crypto.com Launches Massive $2m Bug Bounty Program
- 15:5 : IT Security News Hourly Summary 2024-12-02 16h : 31 posts
- 15:4 : ESET Flags UEFI Bootkit Targeting Linux Systems
- 15:4 : SmokeLoader Attack Targets Companies in Taiwan
- 15:4 : Discover the future of Linux security
- 14:34 : Live Stream: AWS Partners LIVE!
- 14:34 : Are You Being Tracked by an AirTag? Here’s How to Check
- 14:34 : Datadog Cloud SIEM accelerates security investigations
- 14:9 : RomCom Exploits Zero Days In Recent Backdoor Campaigns
- 14:9 : Anti-Spam WordPress Plugin Vulnerabilities Risked 200K+ Websites
- 14:9 : Hackers Drain $1.48 Billion from Crypto in 2024, Led by DeFi Exploits
- 14:9 : HPE IceWall Flaw Let Attackers cause Unauthorized Data Modification
- 14:9 : Top 5 Cyber Security Trends for 2025
- 14:9 : Bitwarden Review (2024): Is It a Secure Password Manager?
- 14:9 : Malicious Ads in Search Results Are Driving New Generations of Scams
- 14:9 : Retail outages drag into second week after Blue Yonder ransomware attack
- 14:9 : Ex-NBA athlete Omri Casspi launches $60M fund targeting cybersecurity, cloud infra and AI
- 14:9 : Cloud security specialist Upwind confirms it raised $100M at a $900M valuation
- 14:9 : Interpol: Operation HAECHI-V led to more than 5,500 suspects arrested
- 14:9 : Horns&Hooves campaign delivers NetSupport RAT and BurnsRAT
- 14:9 : Russia arrests one of its own – a cybercrime suspect on FBI’s most wanted list
- 14:9 : Critical Vulnerability Found in Zabbix Network Monitoring Tool
- 14:9 : Zello Urges Password Resets Amid Potential Security Incident
- 14:9 : Bologna FC Acknowledges Data Breach After RansomHub Ransomware Assault
- 14:8 : Godot Game Engine Targeted in Widespread Malware Attack
- 14:8 : AWS offers incident response service
- 14:8 : Veracode unveils innovations for secure software development
- 14:8 : Radiant Logic provides continuous identity hygiene assessments via real-time streaming data
- 14:8 : Skyflow protects sensitive data flowing in and out of AI agents
- 14:8 : THN Recap: Top Cybersecurity Threats, Tools and Tips (Nov 25 – Dec 1)
- 14:8 : A Guide to Securing AI App Development: Join This Cybersecurity Webinar
- 14:8 : Russia Arrests Prominent Ransomware Operator
- 14:8 : SmokeLoader Malware Campaign Targets Companies in Taiwan
- 11:16 : Zero Trust Architecture
- 11:14 : Beware Of Malicious PyPI Packages That Inject infostealer Malware
- 11:11 : Cyber-Safe Shopping: Protect Yourself from Holiday Scams and Cyber Threats
- 11:4 : Security Threats Facing LLM Applications and 5 Ways to Mitigate Them
- 11:3 : Diversity Can Be a Powerful Tool in Combating Increasing Cybersecurity Threats
- 11:3 : 8 Million Android Users Hit by SpyLoan Malware in Loan Apps on Google Play
- 10:39 : Amazon GuardDuty Enhanced With AI/ML Threat Detection Capabilities for Cloud Security
- 10:39 : These cars want to know about your sex life (re-air) (Lock and Code S05E25)
- 10:39 : No company too small for Phobos ransomware gang, indictment reveals
- 10:39 : Industry Moves for the week of December 2, 2024 – SecurityWeek
- 10:39 : Russian Hacker With $10 Million Bounty on His Head Reportedly Arrested
- 10:38 : $400M seized, 5,500 arrested in global operation targeting cyber fraud
- 10:38 : Global Police Arrest 5500 in $400m Cyber-Fraud Crackdown
- 10:38 : Bologna FC Hit By 200GB Data Theft and Ransom Demand
- 9:37 : Telco security is a dumpster fire and everyone’s getting burned
- 9:6 : Credential Guard and Kerberos delegation, (Mon, Dec 2nd)
- 9:6 : The Pressure Is on for Big Tech to Regulate the Broken Digital Advertising Industry
- 9:5 : IT Security News Hourly Summary 2024-12-02 10h : 5 posts
- 8:39 : Linux 6.13-rc1 Released: What’s New!
- 8:39 : TechRepublic Premium Editorial Calendar: Policies, Hiring Kits, and Glossaries for Download
- 8:39 : A week in security (November 25 – December 1)
- 8:39 : INTERPOL Arrests 5,500 in Global Cybercrime Crackdown, Seizes Over $400 Million
- 8:39 : Ransomware affiliate arrested, UK hospital hacked, Cloudflare’s lost logs
- 8:5 : IT Security News Hourly Summary 2024-12-02 09h : 3 posts
- 8:2 : What Is a Security Operations Center (SOC)?
- 8:2 : Windows Server 2012 0-day Vulnerability Exposes Critical Security Flaw
- 8:2 : AI ChatBot Exposes 300,000 Records: Cyber Security Today for Monday, December 1, 2024
- 7:5 : IT Security News Hourly Summary 2024-12-02 08h : 6 posts
- 7:4 : Apple Safari JavaScriptCore Remote Code Execution Flaw Exploited in the Wild
- 7:4 : US Court Rules Against Tornado Cash Sanctions
- 6:34 : Shopping Season sparks new Cyber Threats
- 6:34 : Can AI help in curbing efficiency of cyber attacks
- 6:34 : Poison Ivy APT Launches Continuous Cyber Attack on Defense, Gov, Tech & Edu Sectors
- 6:34 : MediaTek Processor Vulnerabilities Let Attackers Escalate Privileges
- 6:5 : IT Security News Hourly Summary 2024-12-02 07h : 5 posts
- 6:2 : The Future of Secure Messaging: Kee Jefferys on Protecting Privacy in a Digital Age
- 5:36 : 5 reasons to double down on network security
- 5:6 : As Device Dependency Grows, So Do the Risks
- 5:6 : How AI is transforming human risk management
- 5:6 : Inside the 2024 CWE Top 25: Trends, surprises, and persistent challenges
- 5:5 : IT Security News Hourly Summary 2024-12-02 06h : 4 posts
- 4:32 : ImmuniWeb Debuts Global Internet Security Statistics Center for Research and Analysis
- 4:31 : SpyLoan Apps: The New Face of Financial Exploitation
- 4:6 : AWS launches an incident response service to combat cybersecurity threats
- 4:6 : Data scientists create tool to spot fake images
- 2:5 : IT Security News Hourly Summary 2024-12-02 03h : 3 posts
- 2:4 : ISC Stormcast For Monday, December 2nd, 2024 https://isc.sans.edu/podcastdetail/9236, (Mon, Dec 2nd)
- 2:4 : The Curious Case of an Egg-Cellent Resume
- 1:36 : How threat actors can use generative artificial intelligence?
- 22:58 : IT Security News Weekly Summary 48