49 posts were published in the last hour
- 22:32 : IOCONTROL cyberweapon used to target infrastructure in the US and Isreael
- 21:38 : Black Hat Europe 2024: Why a CVSS score of 7.5 may be a ‘perfect’ 10 in your organization
- 21:38 : Black Hat Europe 2024: Hacking a car – or rather, its infotainment system
- 20:5 : IT Security News Hourly Summary 2024-12-14 21h : 2 posts
- 19:32 : 2024 Year in Review: Features and Improvements in Pure Signal™ Scout
- 19:32 : DEF CON 32 – MobileMesh RF Network Exploitation Getting the Tea from goTenna
- 19:2 : 2024 Year in Review: Features and Improvements in Pure Signal™ Scout
- 18:31 : 2024 Year in Review: Features and Improvements in Pure Signal™ Scout
- 18:4 : 2024 Year in Review: Features and Improvements in Pure Signal™ Scout
- 17:32 : U.S. CISA adds Cleo Harmony, VLTrader, and LexiCom flaw to its Known Exploited Vulnerabilities catalog
- 17:32 : Upcoming Speaking Events
- 17:31 : 2024 Year in Review: Features and Improvements in Pure Signal™ Scout
- 17:5 : IT Security News Hourly Summary 2024-12-14 18h : 1 posts
- 17:2 : 2024 Year in Review: Features and Improvements in Pure Signal™ Scout
- 16:2 : “Password Era is Ending,” Microsoft to Delete 1 Billion Passwords
- 16:2 : 2024 Year in Review: Features and Improvements in Pure Signal™ Scout
- 16:2 : Blue Yonder Cyberattack: A Wake-Up Call for Supply Chain Security
- 15:32 : 2024 Year in Review: Features and Improvements in Pure Signal™ Scout
- 15:2 : 2024 Year in Review: Features and Improvements in Pure Signal™ Scout
- 15:2 : Misconfigured AWS Cloud Instances Lead to Sensitive Data Breaches
- 15:2 : The Intersection of Travel and Data Privacy: A Growing Concern
- 14:36 : Password Era is Ending Microsoft to Delete 1 Billion Passwords
- 14:36 : Google’s Quantum Computing Leap: Introducing the “Willow” Chip
- 14:36 : Lynx Ransomware Breach Targets Romania’s Electrica Group
- 14:5 : IT Security News Hourly Summary 2024-12-14 15h : 1 posts
- 13:34 : Over 300,000 Prometheus Servers Vulnerable to DoS Attacks Due to RepoJacking Exploit
- 13:4 : Benefits of Network Monitoring Systems
- 12:34 : Germany Disrupts BADBOX Malware on 30,000 Devices Using Sinkhole Action
- 12:4 : Bitdefender Total Security review: One of the top antivirus options you can buy
- 12:4 : Microsoft’s AI Recall Tool Is Still Sucking Up Credit Card and Social Security Numbers
- 11:36 : CSC 2025 Predictions: From Surges in AI-Generated Malware to Machine Learning in SOCs
- 11:6 : Addressing the Disconnect in External Attack Surface Awareness
- 11:5 : IT Security News Hourly Summary 2024-12-14 12h : 1 posts
- 10:34 : Thai Officials Targeted in Yokai Backdoor Campaign Using DLL Side-Loading Techniques
- 9:36 : Legacy VPNs: A Ticking Time Bomb for Modern Organizations
- 8:7 : Tibber – 50,002 breached accounts
- 8:6 : Yonéma – 35,962 breached accounts
- 8:5 : IT Security News Hourly Summary 2024-12-14 09h : 1 posts
- 7:36 : AI and Quantum Computing – Waves of innovation and Cyber Security Concerns: Cyber Security Today Weekend for December 14, 2024
- 2:5 : IT Security News Hourly Summary 2024-12-14 03h : 2 posts
- 1:6 : Building a Future-Ready Cybersecurity Workforce: The OffSec Approach to Talent Development
- 1:6 : Red Team vs Blue Team in Cybersecurity
- 0:4 : Iran-linked crew used custom ‘cyberweapon’ in US critical infrastructure attacks
- 23:34 : Crypted Hearts: Exposing the HeartCrypt Packer-as-a-Service Operation
- 23:9 : Black Hat Europe 2024: Can AI systems be socially engineered?
- 23:9 : Australian IT Pros Urged to Guard Against Chinese Cybersecurity Threats
- 23:9 : Scumbag gets 30 years in the clink for running CSAM dark-web chatrooms, abusing kids
- 23:9 : Unauthenticated Webpages: Hidden HIPAA Risks on Public-Facing Websites
- 23:5 : IT Security News Hourly Summary 2024-12-14 00h : 4 posts