160 posts were published in the last hour
- 22:36 : Chinese Hackers Breach US Firm, Maintain Network Access for Months
- 22:36 : Check Point XDR/XPR Reaches New Heights: Climbing Even Higher as a Frost Radar™ XDR Growth and Innovation Leader in 2024
- 22:36 : Cisco and Rittal Asset Discovery Enhancement
- 22:5 : IT Security News Hourly Summary 2024-12-05 23h : 2 posts
- 22:2 : Check Point XDR/XPR Reaches New Heights: Climbing Even Higher as a Frost Radar™ XDR Growth and Innovation Leader in 2024
- 22:2 : DEF CON 32 – Bug Hunting In VMware Device Virtualization
- 21:5 : IT Security News Hourly Summary 2024-12-05 22h : 1 posts
- 20:34 : Meta To Spend $10 Billion On Largest Data Centre To Date
- 20:5 : IT Security News Hourly Summary 2024-12-05 21h : 6 posts
- 20:4 : Need a Wyze Cam alternative? The waterproof Blink Mini 2 security camera is my pick
- 20:4 : Solana Library Supply Chain Attack Exposes Cryptocurrency Wallets
- 19:32 : The best security keys of 2024: Expert tested
- 19:32 : UK Cyber Risks Are ‘Widely Underestimated,’ Warns Country’s Security Chief
- 19:32 : Announcing the launch of Vanir: Open-source Security Patch Validation
- 19:32 : Business Advisory Committees Elections Are Now Open – Vote for Your Community Representative
- 19:5 : IT Security News Hourly Summary 2024-12-05 20h : 8 posts
- 19:2 : The adventures of an extroverted cyber nerd and the people Talos helps to fight the good fight
- 19:2 : Amazon Q, Bedrock updates make case for cloud in agentic AI
- 19:2 : This Bill Could Put A Stop To Censorship By Lawsuit
- 19:2 : Explore strategies for effective endpoint control
- 18:34 : One Identity Named Winner of the Coveted Top InfoSec Innovator Awards for 2024
- 18:34 : The Future of eCommerce: How Custom Apps Help You Get Ahead of the Competition
- 18:34 : Video: Protect Your Identity After the NPD Data Breach
- 18:34 : Splunk SOAR – Sorting Containers to Improve SOAR On-Poll Functionality (Free Custom Function Provided)
- 18:5 : IT Security News Hourly Summary 2024-12-05 19h : 7 posts
- 18:4 : Musk’s Neuralink Animal Lab Cited For ‘Objectionable Conditions’
- 18:4 : Police Dismantle Manson Market, Seize 50 Servers and 200TB Evidence
- 18:4 : Why Retailers Must Secure Their Payment Data This Golden Quarter
- 18:4 : AWS post-quantum cryptography migration plan
- 17:34 : Money-Laundering Network Linked To Drugs and Ransomware Disrupted
- 17:34 : Let’s Answer the Question: “Why is Printer Ink So Expensive?”
- 17:34 : CISA Warns of Critical Exploits in ProjectSend, Zyxel, and Proself Systems
- 17:5 : IT Security News Hourly Summary 2024-12-05 18h : 7 posts
- 17:2 : Telecom Giant BT Group Hit by Black Basta Ransomware
- 17:2 : I-O Data Confirms Zero-Day Attacks on Routers, Full Patches Pending
- 16:34 : Operation Destabilise dismantled Russian money laundering networks
- 16:34 : Burnout in SOCs: How AI Can Help Analysts Focus on High-Value Tasks
- 16:34 : The NIS 2 Deadline: What’s Next?
- 16:34 : This $3,000 Android Trojan Targeting Banks and Cryptocurrency Exchanges
- 16:34 : Veeam Urges Immediate Update to Patch Severe Vulnerabilities
- 16:5 : IT Security News Hourly Summary 2024-12-05 17h : 12 posts
- 16:2 : Wordfence Intelligence Weekly WordPress Vulnerability Report (November 25, 2024 to December 1, 2024)
- 16:2 : How Holiday Season Traditions Affect Internet Traffic Trends
- 16:2 : Ransomware attack on Deloitte and British Telecom
- 16:2 : The Hidden Threat of Legacy Systems: Lessons from a Massive Recent Data Breach
- 16:2 : Beyond Compliance: CMMC 2.0 and the New Era of Cybersecurity for the Defense Industry
- 16:2 : Trump Nominates Cryptocurrency Advocate Paul Atkins As SEC Chair
- 16:2 : Law enforcement shuts down Manson Market cybercrime marketplace
- 15:32 : Americans urged to use encrypted messaging after large, ongoing cyberattack
- 15:32 : The Role of Confidential Computing in AI and Web3
- 15:32 : Europol Shuts Down Manson Market Fraud Marketplace, Seizes 50 Servers
- 15:31 : Critical Mitel MiCollab Flaw Exposes Systems to Unauthorized File and Admin Access
- 15:5 : Bridging the Gap: Elevating Red Team Assessments with Application Security Testing
- 15:5 : IT Security News Hourly Summary 2024-12-05 16h : 17 posts
- 15:4 : CMA Clears Vodafone, Three Merger After Price Promise
- 15:4 : AWS Adds Mutiple Tools and Services to Strengthen Cloud Security
- 15:4 : French Telecom Companies Band Together to Combat Rising Fraud
- 15:4 : Hidden Dangers in Third-Party Supply Chain
- 15:4 : Mitek Digital Fraud Defender combats AI generated fraud
- 14:36 : ASD’s ACSC, CISA, and US and International Partners Release Guidance on Choosing Secure and Verifiable Technologies
- 14:36 : Bitdefender GravityZone XDR enhancements protect business data stored in the cloud
- 14:36 : Mitel MiCollab zero-day and PoC exploit unveiled
- 14:9 : “aiocpa” Python Package Exposed as Cryptocurrency Infostealer
- 14:9 : She Escaped an Abusive Marriage—Now She Helps Women Battle Cyber Harassment
- 14:9 : Forecasting the 2025 Cloudscape
- 14:9 : Watch Now: Cyber AI & Automation Summit- All Sessions Available On Demand
- 14:9 : Why HNWIs are Seeking Personal Cybersecurity Consultants
- 14:9 : Metadata of Americans Stolen in Chinese Hack: U.S. Official
- 14:9 : Netography introduces AI-powered ransomware detection capabilities
- 14:8 : Hackers Target Uyghurs and Tibetans with MOONSHINE Exploit and DarkNimbus Backdoor
- 14:8 : FBI Warns GenAI is Boosting Financial Fraud
- 14:5 : IT Security News Hourly Summary 2024-12-05 15h : 4 posts
- 13:34 : Empowering MSSPs with CloudGuard CSPM: Secure Multi-Cloud Environments with Confidence
- 13:34 : ‘DroidBot’ Android Trojan Targets Banking, Cryptocurrency Applications
- 13:34 : What is PHI? (Protected Health Information)
- 13:34 : Middesk Address Risk Insights strengthens onboarding processes
- 13:5 : IT Security News Hourly Summary 2024-12-05 14h : 10 posts
- 13:4 : How laws strain to keep pace with AI advances and data theft
- 13:4 : This Secure Software Could Help Business Owners Go Remote Full Time
- 13:4 : Short Staffed in Cybersecurity? It’s Time for MXDR
- 13:4 : 8 US telcos compromised, FBI advises Americans to use encrypted communications
- 12:36 : Amazon Sued For Halting Deliveries To Two Black Neighbourhoods
- 12:36 : HCL DevOps Deploy / Launch Vulnerability Let Embed arbitrary HTML tags
- 12:36 : British hospitals hit by cyberattacks still battling to get systems back online
- 12:36 : Bootloader Vulnerability Impacts Over 100 Cisco Switches
- 12:36 : 8+ US telcos compromised, FBI advises Americans to use encrypted communications
- 12:36 : Want to Grow Vulnerability Management into Exposure Management? Start Here!
- 12:5 : IT Security News Hourly Summary 2024-12-05 13h : 11 posts
- 12:4 : Bitcoin Surges Past $100,000 For First Time, Amid Trump Optimism
- 12:4 : Chemonics International Data Breach Impacts 260,000 Individuals
- 12:4 : SurePath AI Discover classifies AI use by intent and detects sensitive data violations
- 12:4 : Russian Hackers Exploit Rival Attackers’ Infrastructure for Espionage
- 11:34 : CISA Warns of Zyxel Firewalls, CyberPanel, North Grid, & ProjectSend Flaws Exploited in Wild
- 11:34 : She Escaped An Abusive Marriage—Now She Helps Women Battle Cyber Harassment
- 11:34 : Russian programmer says FSB agents planted spyware on his Android phone
- 11:34 : BT Group confirms attackers tried to break into Conferencing division
- 11:34 : System Two Security Emerges From Stealth With Detection Engineering Solution
- 11:34 : How to Tackle the Unique Challenges Posed by Non-Human Identities
- 11:34 : Researchers Uncover 4-Month Cyberattack on U.S. Firm Linked to Chinese Hackers
- 11:5 : IT Security News Hourly Summary 2024-12-05 12h : 9 posts
- 11:4 : 1-15 September 2024 Cyber Attacks Timeline
- 11:4 : White House Says at Least 8 US Telecom Firms, Dozens of Nations Impacted by China Hacking Campaign
- 11:4 : Identity Phishing: Using Legitimate Cloud Services to Steal User Access
- 11:4 : The Ultimate Guide to the CCSP
- 10:36 : FTC bans data brokers from selling sensitive information of Americans
- 10:36 : Russia-linked APT Secret Blizzard spotted using infrastructure of other threat actors
- 10:36 : Our secret ingredient for reverse engineering
- 10:36 : G20 Leaders Fear Economic Over Cyber Risks
- 10:5 : IT Security News Hourly Summary 2024-12-05 11h : 8 posts
- 10:2 : Welcome to the Silicon UK In Focus Podcast: Women in Tech: Still Work to be Done?
- 10:2 : HackSynth : Autonomous Pentesting Framework For Simulating Cyberattacks
- 10:2 : Keeper Introduces Risk Management Dashboard for Enhanced Risk Visibility and Proactive Threat Mitigation
- 10:2 : Planning for the Unexpected: Building Robust Disaster Recovery and Continuity Plans
- 10:2 : UK’s NCA Disrupts Multibillion-Dollar Russian Money Launderers
- 9:34 : Shape the future of UK cyber security
- 9:6 : Fuji Electric Indonesia Hit by Ransomware Attack
- 9:6 : The CISO: Guardian of Data while Navigating Risk Strategic Insights for the Boardroom and Shaping Future Business
- 9:5 : IT Security News Hourly Summary 2024-12-05 10h : 10 posts
- 8:36 : Silicon UK AI For Your Business Podcast: How AI is Transforming Business and Society
- 8:36 : Thinkware Cloud APK Vulnerability Allows Code Execution With Elevated Privileges
- 8:36 : Ransomware hangover, Putin grudge blamed for vodka maker’s bankruptcy
- 8:36 : China-linked APT Salt Typhoon has breached telcos in dozens of countries
- 8:36 : LogicGate helps organizations quantify the value of GRC programs
- 8:36 : Tenable Patch Management prevents problematic updates
- 8:36 : ANEL and NOOPDOOR Backdoors Weaponized in New MirrorFace Campaign Against Japan
- 8:36 : Pro-Russian Hacktivist Group Claims 6600 Attacks Targeting Europe
- 8:36 : Phone encryption urged, Pegasus spyware discoveries, Japan I-O Data 0-day
- 8:7 : MOONSHINE Exploit Kit and DarkNimbus Backdoor Enabling Earth Minotaur’s Multi-Platform Attacks
- 7:5 : IT Security News Hourly Summary 2024-12-05 08h : 7 posts
- 7:4 : ChatGPT Next Web Vulnerability Let Attackers Exploit Endpoint to Perform SSRF
- 7:4 : I-O DATA Routers Command Injection Vulnerabilities Actively Exploited in Attacks
- 6:34 : CISA Warns of Active Exploitation of Flaws in Zyxel, ProjectSend, and CyberPanel
- 6:34 : NCA Busts Russian Crypto Networks Laundering Funds and Evading Sanctions
- 6:6 : FBI asks users to stop exchanging texts between Android and iPhones
- 6:6 : Avoiding cyber complacency as a small business
- 6:6 : Preparing for Q-day: The essential role of cloud migration in securing enterprise data
- 6:5 : IT Security News Hourly Summary 2024-12-05 07h : 1 posts
- 5:36 : Critical Vulnerabilities Found in Veeam Service Provider Console
- 5:5 : IT Security News Hourly Summary 2024-12-05 06h : 5 posts
- 5:4 : SmokeLoader Malware Targets Companies in Taiwan
- 5:4 : Building trust in tokenized economies
- 5:4 : How the Shadowserver Foundation helps network defenders with free intelligence feeds
- 4:31 : Cisco NX-OS Vulnerability Allows Attackers to Bypass Image Signature Verification
- 4:31 : Analyzing Tokenizer Part 2: Omen + Tokenizer
- 4:5 : IT Security News Hourly Summary 2024-12-05 05h : 1 posts
- 3:45 : Radiant Logic Unveils Real-Time Identity Data Lake for Enhanced Identity Security Posture Management
- 2:5 : IT Security News Hourly Summary 2024-12-05 03h : 7 posts
- 2:4 : ISC Stormcast For Thursday, December 5th, 2024 https://isc.sans.edu/podcastdetail/9242, (Thu, Dec 5th)
- 2:4 : Why Robust API Security is a Must for Your Business
- 2:4 : Preventing Data Breaches with Advanced IAM Strategies
- 1:9 : [Guest Diary] Business Email Compromise, (Thu, Dec 5th)
- 1:8 : 2024-12-04 – AgentTesla variant using FTP
- 1:8 : How Microsoft defends against 7000 password attackers per second
- 1:8 : T-Mobile US CSO: Spies jumped from one telco to another in a way ‘I’ve not seen in my career’
- 1:5 : IT Security News Hourly Summary 2024-12-05 02h : 2 posts
- 0:6 : Explore new Microsoft Entra capabilities at Gartner Identity & Access Management Summit 2024
- 0:6 : Frequent freeloader part I: Secret Blizzard compromising Storm-0156 infrastructure for espionage
- 0:5 : IT Security News Hourly Summary 2024-12-05 01h : 1 posts
- 23:34 : FBI: Criminals using AI to commit fraud ‘on a larger scale’
- 23:5 : IT Security News Hourly Summary 2024-12-05 00h : 4 posts