134 posts were published in the last hour
- 22:35 : The Growing Importance of Secure Crypto Payment Gateways
- 22:35 : EFF Speaks Out in Court for Citizen Journalists
- 21:5 : Cleo patches file transfer zero-day flaw under attack
- 21:5 : Yahoo cybersecurity team sees layoffs, outsourcing of ‘red team,’ under new CTO
- 20:34 : Google Launches Gemini 2.0 with Autonomous Tool Linking
- 20:5 : What’s the difference between jailbreaking and rooting?
- 20:5 : X’s Last-Minute Update to the Kids Online Safety Act Still Fails to Protect Kids—or Adults—Online
- 20:5 : Fake IT Workers Funneled Millions to North Korea, DOJ Says
- 20:5 : IT Security News Hourly Summary 2024-12-12 21h : 6 posts
- 19:36 : Something to Read When You Are On Call and Everyone Else is at the Office Party
- 19:36 : UN Body To Protect Subsea Cables Holds First Meeting
- 19:36 : US Sanctions Chinese Cybersecurity Firm for Firewall Exploit, Ransomware Attacks
- 19:36 : Phishing: The Silent Precursor to Data Breaches
- 19:36 : Charges Against CISOs Create Worries, Hope in Security Industry: Survey
- 19:36 : Introducing the AWS Network Firewall CloudWatch Dashboard
- 18:33 : 7 must-know IAM standards in 2025
- 18:33 : AI Slop is Hurting Security — LLMs are Dumb and People are Dim
- 18:2 : Proactive Threat Detection: The Role of Network Security
- 18:2 : Meta Donates $1 Million To Donald Trump Inauguration Fund
- 18:2 : Authorities Shut Down 27 DDoS-for-Hire Platforms, Arrest 3 Admins
- 18:2 : MITRE ATT&CK Evaluation Results 2024 – Cynet Became a Leader With 100% Detection & Protection
- 18:2 : CISA and FCC Issue Urgent Call for Cyber Hardening for Communications Infrastructure
- 17:37 : Security Flaws in WordPress Woffice Theme Prompts Urgent Update
- 17:5 : US To Raise Tariffs On Chinese Solar Wafers, Polysilicon, Tungsten
- 17:5 : Mastering Seamless Single Sign-On: Design, Challenges, and Implementation
- 17:5 : ExpressVPN review: One of the fastest VPNs we’ve tested
- 17:5 : The best VPN services for iPad: Expert tested and reviewed
- 17:5 : IT Security News Hourly Summary 2024-12-12 18h : 8 posts
- 17:4 : Forensic Analysis in the eXp Realty Case: Privacy and Evidence Integrity
- 17:4 : Critical Apple Security Vulnerability CVE-2024-44131 Patched: What You Need to Know
- 16:32 : Siemens Solid Edge SE2024
- 16:32 : Siemens COMOS
- 16:32 : Cleo patches zero-day exploited by ransomware gang
- 16:32 : Remcos RAT Malware Evolves with New Techniques
- 16:7 : Australia To ‘Charge’ Tech Firms For News Content, After Meta Ends Licensing Deal
- 16:6 : Silent Push Raises $10 Million for Preemptive Threat Intelligence Platform
- 15:39 : Wordfence Intelligence Weekly WordPress Vulnerability Report (December 2, 2024 to December 8, 2024)
- 15:39 : Cyber Threat from Chinese software powering critical infrastructure in USA
- 15:39 : Siemens CPCI85 Central Processing/Communication
- 15:39 : Experts discovered surveillance tool EagleMsgSpy used by Chinese law enforcement
- 15:39 : Data brokers should stop trading health and location data, new bill proposes
- 15:39 : Update now! Apple releases new security patches for vulnerabilities in iPhones, Macs, and more
- 15:39 : Sublime Snags $60M Series B for Email Security Tech
- 15:39 : Shielded on All Sides: How Company Executives Can Mitigate Virtual Kidnapping Schemes
- 15:6 : The Ghost of Christmas Past – AI’s Past, Present and Future
- 15:6 : Gamaredon Deploys Android Spyware “BoneSpy” and “PlainGnome” in Former Soviet States
- 15:6 : Over 300K Prometheus Instances Exposed: Credentials and API Keys Leaking Online
- 14:38 : What To Do When You?re Under a DDoS Attack: A Guide to Action
- 14:38 : Is your phone infected with Pegasus spyware? This $1 app can check
- 14:38 : Can Data Embassies Make AI Safer Across Borders?
- 14:38 : VPN Server Switching: Benefits and Best Practices for Privacy and Speed
- 14:38 : What’s Happening with 23andMe? Data Privacy and Uncertain Future
- 14:5 : Which AI Skills Does Your Business Need?
- 14:5 : Antidot Malware Attacking Employees Android Devices To Inject Malicious Payloads
- 14:5 : IP Copilot wants to use AI to turn your Slack messages into patents
- 14:5 : Security Operations in 2025 and Beyond
- 14:5 : Apache issues patches for critical Struts 2 RCE bug
- 14:5 : Mobile Surveillance Tool EagleMsgSpy Used by Chinese Law Enforcement
- 14:5 : The state of AppSec tooling: 4 ways to step up to modern software security
- 14:5 : IT Security News Hourly Summary 2024-12-12 15h : 14 posts
- 13:32 : Scammers Exploit Fake Domains in Dubai Police Phishing Scams
- 13:32 : New Chinese Surveillance Tool Attack Android Users Since 2017
- 13:32 : Malicious ESLint Package Let Attackers Steal Data And Inject Remote Code
- 13:32 : Triad Nexus, Chinese Hackers Using 200,000 Domains For Widespread Cyber Attack
- 13:32 : Keeping Explore St. Louis Safe: How Check Point’s Technology Secures a Dynamic Public Network
- 13:32 : Operation PowerOFF took down 27 DDoS platforms across 15 countries
- 13:32 : Microsoft MFA Bypassed via AuthQuake Attack
- 13:32 : How to Choose the Right Test Data Management Tools
- 13:32 : Top 10 dmarcian Alternatives: Features, Pricing, Pros, and Cons
- 13:8 : 27 DDoS-For-Hire Services Disrupted In Run-Up To Holiday Season
- 13:8 : Mike Morse Law Firm Chooses Keeper Security to Safeguard its Sensitive Legal Data
- 13:8 : The Unsolvable Problem: XZ and Modern Infrastructure
- 13:8 : SaaS Budget Planning Guide for IT Professionals
- 13:8 : Researchers Uncover Symlink Exploit Allowing TCC Bypass in iOS and macOS
- 12:34 : Apple Touts Ongoing UK Investment, As Tim Cook Meets Prime Minister
- 12:34 : 27 DDoS Attack Services Taken Down by Law Enforcement
- 12:5 : ConvoC2 – A Red Teamers Tool To Execute Commands on Hacked Hosts Via Microsoft Teams
- 12:5 : Lights out for 18 more DDoS booters in pre-Christmas Operation PowerOFF push
- 12:5 : Researchers find security flaws in Skoda cars that may let hackers remotely track them
- 11:32 : Google Unveils Next Gen AI Gemini 2.0
- 11:32 : Cleo 0-day Vulnerability Exploited to Deploy Malichus Malware
- 11:32 : Krispy Kreme cybersecurity incident disrupts online ordering
- 11:32 : Lookout Discovers New Spyware Deployed by Russia and China
- 11:2 : The evolution and abuse of proxy networks
- 11:2 : Cleo Patches Exploited Flaw as Security Firms Detail Malware Pushed in Attacks
- 10:35 : Apple iOS devices are more vulnerable to phishing than Android
- 10:35 : Careto is back: what’s new after 10 years of silence?
- 10:35 : British Army zaps drones out of the sky with laser trucks
- 10:35 : Hunk Companion, WP Query Console Vulnerabilities Chained to Hack WordPress Sites
- 10:35 : 27 DDoS-for hire platforms seized by law enforcement
- 10:34 : WordPress Hunk Companion Plugin Flaw Exploited to Silently Install Vulnerable Plugins
- 10:34 : Insurance Worker Sentenced After Illegally Accessing Claimants’ Data
- 10:2 : We must adjust expectations for the CISO role
- 10:2 : Three-Quarters of Security Leaders Admit Gaps in Hardware Knowledge
- 9:36 : GitLab Security Update, Patch for Critical Vulnerabilities
- 9:36 : Russia’s Secret Blizzard APT targets Ukraine with Kazuar backdoor
- 9:36 : 8 Trends Reshaping Network Security in 2025
- 9:36 : Citrix acquires deviceTRUST and Strong Network
- 9:36 : Jetico Search locates and manages sensitive data
- 9:11 : The story behind Sekoia.io Custom Integrations
- 9:11 : Bitcoin ATM giant Byte Federal says 58,000 users’ personal data compromised in breach
- 9:11 : Firefox ditches Do Not Track because nobody was listening anyway
- 8:36 : BadRAM Attack Breaches AMD Secure VMs with $10 Device
- 8:36 : Operation PowerOFF, FCC telco rules, ZLoader returns
- 8:5 : IT Security News Hourly Summary 2024-12-12 09h : 2 posts
- 8:2 : Only Cynet delivers 100% protection and detection visibility in the 2024 MITRE ATT&CK Evaluation
- 7:31 : Europol Dismantles 27 DDoS Attack Platforms Across 15 Nations; Admins Arrested
- 7:4 : Splunk RCE Vulnerability Let Attackers Execute Remote Code
- 7:4 : AI vs. (secure) software developers
- 7:4 : How to Defend Against High Cyberthreat Activity During the Holidays
- 6:32 : Europol Shutsdown 27 DDoS Service Provider Platforms
- 6:32 : SpartanWarriorz Phish Kits: Uncovered
- 6:32 : Cybercrime Network Busted: Turning Airbnbs Into Fraud Centers
- 6:6 : No User Interaction, no Alerts: Azure MFA Cracked in an Hour
- 6:6 : Glazed and Confused: Krispy Kreme Battles Cyberattack
- 5:36 : Citrix goes shopping in Europe and returns with gifts for security-conscious customers
- 5:36 : Shaping effective AI governance is about balancing innovation with humanity
- 5:5 : IT Security News Hourly Summary 2024-12-12 06h : 3 posts
- 5:2 : Exposed APIs and issues in the world’s largest organizations
- 4:34 : Keycloak: Open-source identity and access management
- 4:6 : How cyber-secure is your business? | Unlocked 403 cybersecurity podcast (ep. 8)
- 3:6 : AI: Overhyped or Essential for the Workforce?
- 2:5 : IT Security News Hourly Summary 2024-12-12 03h : 3 posts
- 2:3 : ISC Stormcast For Thursday, December 12th, 2024 https://isc.sans.edu/podcastdetail/9252, (Thu, Dec 12th)
- 1:34 : Building Confidence with Strategic Secrets Management
- 1:34 : Safe Handling of Data: Why Secrets Sprawl is a Risk
- 1:4 : INTERPOL & Trend’s Fight Against Cybercrime
- 1:4 : Sora and ChatGPT Currently Down Worldwide: OpenAI Working on a Fix
- 0:36 : Cyberbullying and the Law: When Does Online Harassment Become a Criminal Offense?
- 0:8 : How Should OT Companies Measure Cyber Risk? | ARIA Cybersecurity
- 23:34 : Blocking Chinese spies from intercepting calls? There ought to be a law
- 23:5 : IT Security News Hourly Summary 2024-12-12 00h : 4 posts
- 23:4 : Test page title
- 22:55 : IT Security News Daily Summary 2024-12-11