157 posts were published in the last hour
- 22:34 : DEF CON 32 – Compromising Electronic Logger & Creating Truck2Truck Worm
- 21:38 : Critical Windows Zero-Day Alert: No Patch Available Yet for Users
- 21:38 : Shared Intel Q&A: A thriving ecosystem now supports AWS ‘shared responsibility’ security model
- 21:38 : 31 of the Top MSSPs Use D3 for SOC Automation: Here’s Why
- 21:4 : Police Arrest UHC CEO Shooting Suspect, App Developer Luigi Mangione
- 20:36 : What is a session key?
- 20:36 : Deloitte denied its systems were hacked by Brain Cipher ransomware group
- 20:9 : Defending SOCs Under Siege: Battling Adversarial AI Attacks
- 20:9 : DEF CON 32 – Prime Cuts from Hacker History: 40 Years of 31337 – Cult Of The Dead Cow And Friends
- 20:9 : Randall Munroe’s XKCD ‘Infinite Armada Chess’
- 20:9 : Mitigating NTLM Relay Attacks by Default
- 20:5 : IT Security News Hourly Summary 2024-12-09 21h : 5 posts
- 19:34 : MC LR Router and GoCast unpatched vulnerabilities
- 19:34 : Phishers Impersonating Police Arrested in Multi-Million Euro Scam
- 19:34 : China’s Salt Typhoon recorded top American officials’ calls, says White House
- 19:7 : Salt Typhoon recorded top US officials’ calls, says White House
- 19:6 : Update your OpenWrt router! Security issue made supply chain attack possible
- 18:38 : Critical OpenWrt Flaw Exposes Firmware Update Server to Exploitation
- 18:38 : ⚡ THN Recap: Top Cybersecurity Threats, Tools and Tips (Dec 2 – 8)
- 18:38 : Black Basta Ransomware Evolves with Email Bombing, QR Codes, and Social Engineering
- 18:4 : Ukraine says Russian hackers are targeting country’s defense contractors
- 18:4 : Auto Creating Reminders from Email Messages
- 18:4 : ⚡ THN Recap: Top Cybersecurity Threats, Tools and Tips (Dec 2 – 8)
- 17:34 : The best travel VPNs of 2024: Expert tested and reviewed
- 17:34 : Sacumen Advances to the Front Line of Thought Leadership: Accelerates Cybersecurity Integration with Innovative Program
- 17:34 : ⚡ THN Recap: Top Cybersecurity Threats, Tools and Tips (Dec 2 – 8)
- 17:34 : Federal Appeals Court Upholds Law Threatening US TikTok Ban
- 17:5 : IT Security News Hourly Summary 2024-12-09 18h : 14 posts
- 17:2 : 6,000,000 WordPress Sites Protected Against Payment Refund and Subscription Cancellation Vulnerability in WPForms WordPress Plugin
- 17:2 : Digital Assets Cybersecurity Essentials
- 17:2 : Top 5 reasons MSPs choose OpenText MDR
- 17:2 : Certificate Management Best Practices to Stay Cyber-Secure This Holiday Season
- 17:2 : Vulnerability Summary for the Week of December 2, 2024
- 17:2 : ⚡ THN Recap: Top Cybersecurity Threats, Tools and Tips (Dec 2 – 8)
- 16:34 : Resolve to be Resilient in 2025: Region 8 Ready for New Year
- 16:34 : Adobe brings generative AI and real-time personalization to AWS: Here’s what’s next
- 16:34 : Winner’s Spotlight: Security Serious Unsung Heroes Awards 2024 – Godmother of Security
- 16:34 : Crooks stole AWS credentials from misconfigured sites then kept them in open S3 bucket
- 16:34 : Employee Cybersecurity Habits Are Increasing Organizational Risk: Survey
- 16:34 : Hackers Exploit Cloudflare Tunnels and DNS Fast-Flux to Conceal GammaDrop Malware
- 16:34 : ⚡ THN Recap: Top Cybersecurity Threats, Tools and Tips (Dec 2 – 8)
- 16:34 : Compromised AI Library Delivers Cryptocurrency Miner via PyPI
- 16:5 : TikTok influencers being targeted by cyber attacks for Election results manipulation
- 16:4 : US medical device giant Artivion says hackers stole files during cybersecurity incident
- 16:4 : Encrypted messaging service intercepted, 2.3 million messages read by law enforcement
- 16:4 : U.S. Officials Sound Alarm Over Salt Typhoon Hack as Cybersecurity Becomes Political Flashpoint
- 16:4 : Microsoft: “Hack” this LLM-powered service and get paid
- 16:4 : ⚡ THN Recap: Top Cybersecurity Threats, Tools and Tips (Dec 2 – 8)
- 15:34 : Why Manufacturing IT Leaders are Turning to AI-Powered Cybersecurity Training
- 15:34 : BYTE BY BYTE
- 15:34 : Steps To Protect Against Cybersecurity Threats During Mergers and Acquisitions
- 15:34 : ⚡ THN Recap: Top Cybersecurity Threats, Tools and Tips (Dec 2 – 8)
- 15:2 : Prepare for 2025 with This CompTIA Training Bundle for $50
- 15:2 : Ladies.com – 118,809 breached accounts
- 15:2 : Senior Dating – 765,517 breached accounts
- 15:2 : Skyhigh Security strengthens data protection for Microsoft Copilot
- 15:2 : ⚡ THN Recap: Top Cybersecurity Threats, Tools and Tips (Dec 2 – 8)
- 15:2 : Public Reprimands, an Effective Deterrent Against Data Breaches
- 14:36 : The Economic Impact of Akamai Guardicore Segmentation
- 14:36 : WhatsApp fixes bug that let users bypass ‘View Once’ privacy feature
- 14:36 : OpenWrt orders router firmware updates after supply chain attack scare
- 14:36 : Medical Device Maker Artivion Scrambling to Restore Systems After Ransomware Attack
- 14:36 : Vodka Maker Stoli Files for Bankruptcy in US Following Ransomware Assault
- 14:36 : ⚡ THN Recap: Top Cybersecurity Threats, Tools and Tips (Dec 2 – 8)
- 14:7 : Adobe partners with Amazon Web Services to supercharge AI-driven customer experiences
- 14:7 : Behind Vectra AI’s deliberate approach to building AI agents for cybersecurity
- 14:7 : Telecom Networks on Alert Amid Cyberespionage Concerns
- 14:7 : Meeten Malware Targets Web3 Workers with Crypto-Stealing Tactics
- 14:6 : Hornetsecurity boosts 365 Total Backup with self-service recovery for end users
- 14:6 : RSA expands phishing-resistant, passwordless capabilities
- 14:6 : ⚡ THN Recap: Top Cybersecurity Threats, Tools and Tips (Dec 2 – 8)
- 14:5 : IT Security News Hourly Summary 2024-12-09 15h : 8 posts
- 13:32 : The Invisible Eyes and Ears in Our Homes: How Smart Devices are Eroding Privacy and Security
- 13:32 : Perimeter 81 Review: Can It Still Keep Up in 2024?
- 13:32 : Securing the Mobile Workforce. How UEM Empowers IT Teams in the Modern Era
- 13:32 : QNAP Patches Vulnerabilities Exploited at Pwn2Own
- 13:32 : AWS Makes Significant Progress on Driving MFA Adoption
- 13:32 : FTC Stops Data Brokers from Unlawful User Location Tracking
- 13:32 : Extreme Platform ONE integrates networking and security with AI
- 13:32 : ⚡ THN Recap: Top Cybersecurity Threats, Tools and Tips (Dec 2 – 8)
- 13:2 : Ultralytics AI Library with 60M Downloads Compromised for Cryptomining
- 13:2 : Google Announces Vanir, A Open-Source Security Patch Validation Tool
- 13:2 : 8Base hacked port operating company Luka Rijeka
- 13:2 : Unmasking Termite, the Ransomware Gang Claiming the Blue Yonder Attack
- 13:2 : iVerify: Pegasus spyware infections may be much higher than previously thought
- 12:34 : Trust Issues in AI
- 12:34 : Deloitte Responds After Ransomware Group Claims Data Theft
- 12:34 : Socks5Systemz Botnet Powers Illegal Proxy Service with 85,000+ Hacked Devices
- 12:34 : Seven Bolt-Ons to Make Your Entra ID More Secure for Critical Sessions
- 12:34 : Researchers Uncover Prompt Injection Vulnerabilities in DeepSeek and Claude AI
- 12:7 : We Need to Encrypt Clinical Trial Data
- 11:36 : Raspberry Pi 500 & Monitor, Complete Desktop Setup at $190
- 11:36 : New Transaction-Relay Jamming Vulnerability Let Attackers Exploits Bitcoin Nodes
- 11:36 : Understanding the EU Cyber Resilience Act: A New Era for Digital Product Security
- 11:36 : 8 Emerging Cybersecurity Scams And Their Implications For The Future
- 11:36 : Steps for Successful Vulnerability Management: Lessons from the Pitch
- 11:36 : Mandiant devised a technique to bypass browser isolation using QR codes
- 11:36 : Microsoft dangles $10K for hackers to hijack LLM email service
- 11:36 : Eight Suspected Phishers Arrested in Belgium, Netherlands
- 11:36 : Maximizing SAP Security: How AI and Human Intervention Work
- 11:36 : Phishing Scam Targets Ukrainian Defense Companies
- 11:36 : Anna Jacques Hospital Ransomware Breach Hits 316K Patients
- 11:5 : IT Security News Hourly Summary 2024-12-09 12h : 12 posts
- 11:2 : EU Probes Nvidia AI Chip Business Practices
- 11:2 : OpenAI Seeks To Remove Commercial ‘AGI’ Constraint
- 11:2 : The EU Makes an Urgent TikTok Inquiry on Russia’s Role in Romanian Election Turmoil
- 11:2 : Industry Moves for the week of December 9, 2024 – SecurityWeek
- 11:2 : Anna Jaques Hospital Data Breach Impacts 316,000 People
- 11:2 : The Role of USB Security in Combating Insider Threats
- 10:32 : EU Probes TikTok Influence On Romania Elections
- 10:32 : Apple To Begin Using In-House 5G Modems Next Year
- 10:32 : Blue Yonder investigating data theft claims after ransomware gang takes credit for cyberattack
- 10:32 : Story of the Year: global IT outages and supply chain attacks
- 10:32 : How to Make the Case for Network Security Audits
- 10:32 : Quantum Computing: An Impending Threat to the Current PKI Systems
- 10:2 : 5 Tips to Translate High-Level Risk Into Daily Operations
- 10:2 : European Police Disrupt Phone Phishing Gang with Arrests
- 9:34 : Huawei Gains On Apple In China Premium Smartphones
- 9:34 : US Exempted China DRAM Makers From Controls ‘Under Pressure From Japan’
- 9:34 : Qlik Sense for Windows Vulnerability Allows Remote Code Execution
- 8:32 : Salt Typhoon cyber espionage affects at least eight telecom giants in the USA – FBI advises Americans use encrypted messaging apps
- 8:32 : TikTok Loses Bid To Overturn US Divestiture Law
- 8:32 : A week in security (December 2 – December 8)
- 8:31 : Massachusetts hospital breach, Recall’s next deployment, Blue Yonder restoration
- 8:5 : IT Security News Hourly Summary 2024-12-09 09h : 7 posts
- 8:2 : Security Service Edge Adoption Report 2024
- 8:2 : TPM 2.0: The new standard for secure firmware
- 7:33 : QNAP High Severity Vulnerabilities Let Remote attackers to Compromise System
- 7:33 : 2023 Anna Jaques Hospital data breach impacted over 310,000 people
- 7:33 : Data Governance and the Mandate for Tougher Security in 2025
- 7:33 : Email and Other Fraud – It Gets Personal: Cyber Security Today for Monday, December 9, 2024
- 7:5 : The Rising Threat of Pegasus Spyware: New Findings and Growing Concerns
- 7:5 : IT Security News Hourly Summary 2024-12-09 08h : 5 posts
- 7:4 : Privacy Concerns Amid Growing Mobile Security Threats: A Digital Dilemma
- 7:4 : Healthcare Security Strategies for 2025
- 7:4 : Tanya Janca on Secure Coding, AI in Cybersecurity, and Her New Book
- 6:34 : Hackers Use Artificial Intelligence to Create Sophisticated Social Engineering Attacks
- 6:34 : The EU Cyber Resilience Act: Enhancing Digital Security in the AI Era
- 6:5 : IT Security News Hourly Summary 2024-12-09 07h : 1 posts
- 5:36 : Who handles what? Common misconceptions about SaaS security responsibilities
- 5:5 : IT Security News Hourly Summary 2024-12-09 06h : 3 posts
- 5:4 : Top cybersecurity books for your holiday gift list
- 5:4 : What makes for a fulfilled cybersecurity career
- 4:34 : Businesses plagued by constant stream of malicious emails
- 4:5 : IT Security News Hourly Summary 2024-12-09 05h : 1 posts
- 4:2 : Blue Yonder ransomware termites claim credit
- 3:5 : IT Security News Hourly Summary 2024-12-09 04h : 3 posts
- 2:34 : Why Compliance in Cloud Security Can’t Be Ignored
- 2:34 : Compliance in Cloud Security
- 2:34 : Ensuring Calm with Effective Secrets Scanning Techniques
- 2:5 : IT Security News Hourly Summary 2024-12-09 03h : 2 posts
- 2:2 : ISC Stormcast For Monday, December 9th, 2024 https://isc.sans.edu/podcastdetail/9246, (Mon, Dec 9th)
- 1:6 : CURLing for Crypto on Honeypots, (Mon, Dec 9th)
- 1:5 : IT Security News Hourly Summary 2024-12-09 02h : 1 posts
- 0:6 : Transform IAM From Technology Burden To Business Advantage
- 23:5 : IT Security News Hourly Summary 2024-12-09 00h : 2 posts
- 22:58 : IT Security News Weekly Summary 49