118 posts were published in the last hour
- 22:7 : Canadian Eyecare Firm Care1 Exposes 2.2TB of Patient Records
- 22:6 : Risk & Repeat: Attacks ramp up on Cleo MFT software
- 22:6 : Week in Review: Salt Typhoon saga, Microsoft MFA bypass, Yahoo cuts Paranoids
- 21:34 : UnitedHealth’s Optum left an AI chatbot, used by employees to ask questions about claims, exposed to the internet
- 21:34 : German agency BSI sinkholed a botnet of 30,000 devices infected with BadBox
- 21:34 : Google Timeline location purge causes collateral damage
- 20:38 : Starbucks, Supermarkets Targeted in Ransomware Attack
- 20:38 : How AI is shaping the future of the cybersecurity workforce
- 20:38 : Migrate to passwordless to enhance security and UX
- 20:38 : UnitedHealthcare’s Optum left an AI chatbot, used by employees to ask questions about claims, exposed to the internet
- 20:38 : Hacker Uses Info-Stealer Against Security Pros, Other Bad Actors
- 20:38 : 390,000+ WordPress Credentials Stolen via Malicious GitHub Repository Hosting PoC Exploits
- 20:5 : IT Security News Hourly Summary 2024-12-13 21h : 2 posts
- 20:4 : The New Jersey Drone Mystery May Not Actually Be That Mysterious
- 20:4 : Speaking Freely: Prasanth Sugathan
- 18:38 : Serhiy Tokarev Explains Why Health Tech Startups Are Worth Investing In
- 18:38 : CISA and EPA Release Joint Fact Sheet Detailing Risks Internet-Exposed HMIs Pose to WWS Sector
- 18:38 : Do(ug)h! Krispy Kreme Suffers Cyberattack
- 18:4 : Video: How Two Crypto Scammers Stole $230 Million in Bitcoin
- 18:4 : Cyberint’s 2024 Report Highlights Surge in Credential Theft and Rise of AI-Powered Phishing
- 18:4 : Critical OpenWrt Vulnerability Exposes Devices to Malicious Firmware Injection
- 18:4 : Generative AI adoption and compliance: Simplifying the path forward with AWS Audit Manager
- 17:36 : Keeper review: An easy-to-use password manager with top-notch security features
- 17:36 : Mandiant Uncovers QR Code Exploit to Bypass Browser Isolation
- 17:5 : The best VPN routers of 2024
- 17:5 : Why the US Military Can’t Just Shoot Down the Mystery Drones
- 17:5 : 4.8 million healthcare records left freely accessible
- 17:5 : IT Security News Hourly Summary 2024-12-13 18h : 7 posts
- 17:5 : Ultralytics Supply-Chain Attack
- 17:4 : Beware of Malicious USB-C Cables: Hidden Cyber Threats
- 17:4 : DoJ Indicts 14 North Koreans for $88M IT Worker Fraud Scheme Over Six Years
- 16:34 : Akamai Technical Academy and Coursera: A Year of STEM Education Success
- 16:34 : Akamai?s Perspective on December?s Patch Tuesday 2024
- 16:34 : The Role of Blockchain and Smart Contracts in Securing Digital Transactions
- 16:34 : Embracing Cybersecurity Regulations
- 16:2 : Krispy Kreme Doughnut Cyber Attack might affect Christmas sales
- 16:2 : SEC Probe Reopens Probe Into Musk’s Neuralink – Report
- 16:2 : Critical Vulnerabilities Found in Ruijie Reyee Cloud Management Platform
- 16:2 : Artivion Discloses Ransomware Attack, Disrupting Operations
- 15:38 : XRefer: The Gemini-Assisted Binary Navigator
- 15:38 : Deep Packet Inspection (DPI): Balancing Security and Privacy in the Digital Age
- 15:38 : Cyber Threat Alert for South Korea from North Korean Hackers
- 15:38 : US Uncovers North Korean IT Worker Fraud, Offers $5M Bounty
- 15:6 : Cyber protection made intuitive and affordable
- 15:6 : Ransomware in the Global Healthcare Industry
- 14:36 : Human Misuse Will Make Artificial Intelligence More Dangerous
- 14:35 : Digital Finance: How Do Banks Protect Their Customers’ Money and Data from Cybercriminals?
- 14:35 : US Offers $5M for Info on North Korean IT Worker Fraud
- 14:8 : In Other News: Gen Digital Makes $1B Buy, Recall Captures Sensitive Data, MITRE ATT&CK Evaluations
- 14:8 : 2024 Sees Sharp Increase in Microsoft Tool Exploits
- 14:5 : IT Security News Hourly Summary 2024-12-13 15h : 5 posts
- 13:35 : Intel Interim CEOs Hints At Selling Foundry Business,
- 13:35 : Bitcoin ATM Giant Byte Federal Hit by Hackers, 58,000 Users Impacted
- 13:35 : Unlocking the Power of In-Context Emulation in Malware Sandboxing
- 13:35 : Hackers Possibly Stole Personal Data From Bitcoin ATM Operator Byte Federal
- 13:34 : Akira and RansomHub Surge as Ransomware Claims Reach All-Time High
- 13:3 : Autonomous, Deterministic Security for Mission-Critical IOT Systems
- 13:2 : Drowning in Visibility? Why Cybersecurity Needs to Shift from Visibility to Actionable Insight
- 12:36 : U.S. authorities seized cybercrime marketplace Rydox
- 12:36 : How to Generate a CrowdStrike RFM Report With AI in Tines
- 12:36 : Iran-Linked IOCONTROL Malware Targets SCADA and Linux-Based IoT Platforms
- 12:5 : Ways to Mitigate Risk in Cybersecurity: Cybersecurity Risk Management
- 12:5 : Mozilla Drops ‘Do Not Track’ For Upcoming Firefox Browser
- 12:4 : Rydox Cybercrime Marketplace Disrupted, Administrators Arrested
- 11:34 : Germany Sinkholes Botnet of 30,000 BadBox-Infected Devices
- 11:34 : Thales and Imperva Win Big in 2024
- 11:34 : Researchers Discover Malware Used by Nation-Sates to Attack Industrial Systems
- 11:5 : IT Security News Hourly Summary 2024-12-13 12h : 6 posts
- 11:2 : What is typosquatting (and how can I protect myself)?
- 11:2 : Iranian Hackers Use IOCONTROL Malware to Target OT, IoT Devices in US, Israel
- 10:35 : As the Mastermind of Far-Right ‘Active Clubs’ Goes to Prison, His Violent Movement Goes Global
- 10:35 : What is gRPC and How Does it Enhance API Security?
- 10:6 : Black Hat Europe Recap: Auguria Debuts Newly Enhanced Platform
- 10:6 : ISC2 Survey Reveals Critical Gaps in Cybersecurity Leadership Skills
- 9:47 : 2025 Outlook: Turning Threats into Opportunities in a New Era of Innovation
- 9:47 : Nigerian National Extradited to Nebraska for Wire Fraud Charges
- 9:47 : New Linux Rootkit PUMAKIT Uses Advanced Stealth Techniques to Evade Detection
- 9:47 : Building a Stronger Data Loss Prevention Strategy Through Risk Assessment
- 9:47 : Taming the multi-vault beast
- 9:5 : How the Cyber Grinch Stole Christmas: Safeguard Your Festive Season
- 9:5 : Dell Security Update, Patch for Multiple Critical Vulnerabilities
- 9:5 : UK Shoppers Frustrated as Bots Snap Up Popular Christmas Gifts
- 8:36 : The three top cybersecurity predictions for 2025
- 8:36 : Experts discovered the first mobile malware families linked to Russia’s Gamaredon
- 8:36 : Celigo Private Cloud enhances security and connectivity
- 8:35 : Rubrik Turbo Threat Hunting accelerates cyber recovery
- 8:35 : Microsoft MFA bypass, cybercrime marketplace takedown, Sophos hacker charged
- 8:6 : Vishing via Microsoft Teams Facilitates DarkGate Malware Intrusion
- 8:6 : Convincing a billion users to love passkeys: UX design insights from Microsoft to boost adoption and security
- 8:5 : IT Security News Hourly Summary 2024-12-13 09h : 7 posts
- 7:49 : CISA Issues 10 New Advisories on Industrial Control System Vulnerabilities
- 7:49 : FBI Busts Rydox Marketplace with 7,600 PII Sales, Cryptocurrency Worth $225K Seized
- 7:48 : Top Phishing Exploits fo 2024: Cyber Security Today for Friday, December 13, 2024
- 7:10 : Operation Power Off: International Effort Targets DDoS-for-Hire Networks
- 7:10 : How AI will both threaten and protect data in 2025
- 7:10 : Hackers Target Global Sporting Events with Fake Domains to Steal Logins
- 7:9 : It’s Beginning to look a lot like Grinch bots
- 6:36 : FBI Seizes Rydox Marketplace, Arrests Key Administrators
- 6:7 : Not Every Gift Comes from Santa Claus: Avoiding Cyber Scams This Holiday Season
- 5:38 : FuzzyAI: Open-source tool for automated LLM fuzzing
- 5:7 : CISOs need to consider the personal risks associated with their role
- 5:6 : Tackling software vulnerabilities with smarter developer strategies
- 5:5 : IT Security News Hourly Summary 2024-12-13 06h : 1 posts
- 4:33 : Snowflake Will Make MFA Mandatory Next Year
- 4:3 : New infosec products of the week: December 13, 2024
- 2:7 : ISC Stormcast For Friday, December 13th, 2024 https://isc.sans.edu/podcastdetail/9254, (Fri, Dec 13th)
- 2:5 : IT Security News Hourly Summary 2024-12-13 03h : 6 posts
- 1:7 : North Korea’s fake IT worker scam hauled in at least $88 million over six years
- 1:7 : What’s a Zero-Day Vulnerability? Prevent Exploits and Attacks
- 1:7 : 10 Container Security Best Practices: A Guide
- 1:7 : Understanding the Role of AI in Cybersecurity
- 1:7 : What Is an Application Vulnerability? 8 Common Types
- 1:7 : Achieving CyberSecure Canada Certification
- 0:34 : 7 Must-Have Salesforce Security Practices
- 23:37 : Professions That Are the Most Exposed to Cybersecurity Threats
- 23:37 : US Bitcoin ATM operator Byte Federal suffered a data breach
- 23:5 : Holding Back Salt Typhoon + Other Chinese APT CVEs
- 23:5 : IT Security News Hourly Summary 2024-12-13 00h : 3 posts