140 posts were published in the last hour
- 22:31 : What is PKI (public key infrastructure)?
- 22:31 : Texas Tech University data breach impacted 1.4 million individuals
- 22:5 : Critical security hole in Apache Struts under exploit
- 21:9 : How to Assess Virtual Machines Prior to Deployment with Spectra Assure
- 20:32 : CrowdStrike Survey Highlights Security Challenges in AI Adoption
- 20:5 : IT Security News Hourly Summary 2024-12-17 21h : 4 posts
- 20:4 : Deploying LLMs Securely With OWASP Top 10
- 19:31 : Hackers Leak Partial Cisco Data from 4.5TB of Exposed Records
- 19:6 : 10 Resources for Protecting Your Digital Security | EFFector 36.15
- 19:6 : Innovator Spotlight: Fortra
- 18:32 : CISA Directs Federal Agencies to Secure Cloud Environments
- 18:9 : Classroom Manager: Online Classroom Management, Instruction, and Learning Made Easy
- 18:9 : U.S. Justice Department Shuts Down Rydox Cybercrime Marketplace
- 18:9 : OTP Scams Decline in Bengaluru as Sophisticated Cybercrimes Surge in 2024
- 18:9 : Attackers Exploit Microsoft Teams and AnyDesk to Deploy DarkGate Malware
- 17:31 : Hacking Digital License Plates
- 17:31 : Sophisticated TA397 Malware Targets Turkish Defense Sector
- 17:7 : Implementing OneLake With Medallion Architecture in Microsoft Fabric
- 17:7 : Intel Officials Warned Police That US Cities Aren’t Ready for Hostile Drones
- 17:7 : 5 Modern Computer Safety Tips You Should Know About
- 17:7 : DEF CON 32 – Leveraging Private APNs For Mobile Network Traffic Analysis
- 17:5 : IT Security News Hourly Summary 2024-12-17 18h : 16 posts
- 16:33 : CISA and ONCD Publish Guide to Strengthen Cybersecurity of Grant-Funded Infrastructure Projects
- 16:33 : The 10 best cloud security certifications for IT pros in 2025
- 16:33 : Are password managers safe for enterprise use?
- 16:33 : The FBI warns of HiatusRAT scanning campaigns against Chinese-branded web cameras and DVRs
- 16:33 : Protect SAP Supply Chains by Preventing Cyber Attacks
- 16:33 : 5 million payment card details stolen in painful reminder to monitor Christmas spending
- 16:33 : Texas Tech University Data Breach Impacts 1.4 Million
- 16:32 : Announcing the Results of the Business Advisory Committee Elections
- 16:5 : Hackers Demand Ransom in Rhode Island Health System Data Breach
- 16:5 : Nvidia and DataStax just made generative AI smarter and leaner — here’s how
- 16:5 : Drug Dealers Have Moved on to Social Media
- 16:5 : ThreatQuotient ThreatQ Platform
- 16:5 : BD Diagnostic Solutions Products
- 16:5 : Hitachi Energy TropOS Devices Series 1400/2400/6400
- 16:5 : Schneider Electric Modicon
- 16:5 : CISA Releases Five Industrial Control Systems Advisories
- 16:5 : Ireland fines Meta for 2018 ‘View As’ breach that exposed 30M accounts
- 16:4 : Cybercriminals Exploit Google Calendar to Spread Malicious Links
- 15:32 : Clop Ransomware circumvents Cleo file transfer software for data steal
- 15:32 : Kali Linux 2024.4: A Powerful Upgrade for Penetration Testers
- 15:32 : How to Stop DDoS Attacks in Three Stages
- 15:4 : Empowering Women in Cybersecurity: Lessons from the FS-ISAC Women?s Networking Event
- 15:4 : RPC Management Has Come A Long Way In Two Short Years. Here’s Why.
- 15:4 : CISA Seeking Public Comment on Updated National Cyber Incident Response Plan
- 15:4 : Attackers Can Find New APIs in 29 Seconds: Wallarm
- 15:4 : Hackers Use Microsoft MSC Files to Deploy Obfuscated Backdoor in Pakistan Attacks
- 14:32 : Hackers Use Fake PoCs on GitHub to Steal WordPress Credentials, AWS Keys
- 14:32 : Exploring and Mitigating AI-Driven Cybercrime
- 14:32 : Webinar Today: Navigating Your OT Cybersecurity Journey: From Assessment to Implementation
- 14:32 : LW ROUNDTABLE — How 2024’s cyber threats will transform the security landscape in 2025
- 14:32 : Top 5 Cryptographic Key Protection Best Practices
- 14:32 : Seamless API Threat Detection and Response: Integrating Salt Security and CrowdStrike NG-SIEM
- 14:32 : Review of Blackhat EMEA 2024
- 14:32 : Massive Data Breach Puts Millions at Risk During Christmas Season
- 14:32 : Researchers reveal OT-specific malware in use and in development
- 14:5 : IT Security News Hourly Summary 2024-12-17 15h : 13 posts
- 14:4 : Writer’s new AI model aims to fix the ‘sameness problem’ in generative content
- 14:4 : ESET Threat Report H2 2024: Key findings
- 14:4 : 5 UC and collaboration trends reshaping the market in 2025
- 14:4 : Man Accused of SQL Injection Hacking Gets 69-Month Prison Sentence
- 13:32 : Astrill VPN Review: Features, Performance, and Insights
- 13:32 : Texas medical school says hackers stole sensitive health data of 1.4 million individuals
- 13:32 : Data Security Predictions for 2025: Putting Protection and Resilience at Center Stage
- 13:7 : What We Saw in Web Security in 2024 and What We Can Do About It
- 13:7 : Google Calendar Notifications Bypassing Email Security Policies
- 13:7 : Breaking Up with Your Password: Why It’s Time to Move On
- 13:7 : Organizations Warned of Rise in Okta Support Phishing Attacks
- 13:7 : GenAI: Security Teams Demand Expertise-Driven Solutions
- 13:6 : EU Sanctions Russian Cyber Actors for “Destabilizing Actions”
- 12:32 : Cyber Criminals Exploit Windows Management Console to Deliver Backdoor Payloads
- 12:32 : Drug Dealers Have Moved Onto Social Media
- 12:32 : Stop Calling Online Scams ‘Pig Butchering,’ Interpol Warns
- 12:32 : Malvertising on steroids serves Lumma infostealer
- 12:32 : Even Great Companies Get Breached — Find Out Why and How to Stop It
- 12:7 : Texas Tech Systems Breach, Hackers Accessed System Folders & Files
- 12:7 : FBI Warns of HiatusRAT Attacks on Cameras, DVR Systems
- 12:7 : RunSafe Security Platform enhances risk management with automation
- 11:32 : US Senate Criticises Amazon Over Warehouse Safety
- 11:32 : Meta Adds ‘Live AI’ To Ray-Ban Smart Glasses
- 11:32 : Russia FSB relies on Ukrainian minors for criminal activities disguised as “quest games”
- 11:32 : Texas Tech University Data Breach Impacts 1.4 Million People
- 11:32 : 5 Practical Techniques for Effective Cyber Threat Hunting
- 11:32 : Bitter APT Targets Turkish Defense Sector with WmRAT and MiyaRAT Malware
- 11:5 : London’s CNI is Under Threat
- 11:5 : How the Cyber Essentials Certification Can Help Your Business
- 11:5 : SandboxAQ Advances Global Cybersecurity Through Series of Milestones
- 11:5 : IT Security News Hourly Summary 2024-12-17 12h : 9 posts
- 11:5 : CISA Warns of Exploited Adobe ColdFusion, Windows Vulnerabilities
- 11:4 : New APIs Discovered by Attackers in Just 29 Seconds
- 10:32 : TikTok Shop US Sales Surpass Shein, Sephora
- 10:32 : US Lawmaker Calls For Drone Detection Tech After Runway Closure
- 10:32 : 16-30 September 2024 Cyber Attacks Timeline
- 10:32 : Hackers Exploit Webview2 to Deploy CoinLurker Malware and Evade Security Detection
- 10:32 : US Unveils New National Cyber Incident Response Plan
- 10:5 : Beware of Malicious Ads on Captcha Pages that Deliver Password Stealers
- 10:5 : Pumakit Rootkit Challenges Linux Security Systems
- 10:4 : All Major European Financial Firms Suffer Supplier Breaches
- 9:32 : Bitcoin Hits New High Over $107,000 On Trump Comments
- 9:32 : China Chip Investment Plummets Amidst US Restrictions
- 9:32 : U.S. CISA adds Microsoft Windows Kernel-Mode Driver and Adobe ColdFusion flaws to its Known Exploited Vulnerabilities catalog
- 9:32 : Kali Linux 2024.4 released! 14 new shiny tools added
- 9:32 : Arctic Wolf acquires BlackBerry’s Cylance endpoint security assets
- 8:32 : Ofcom Gives Tech Firms Three Months To Implement Content Controls
- 8:32 : Download a banker to track your parcel
- 8:32 : Serbian authorities use spyware, Ransomware impacts Rhode Island, ConnectOnCall breach
- 8:5 : IT Security News Hourly Summary 2024-12-17 09h : 7 posts
- 8:4 : Python Delivering AnyDesk Client as RAT, (Tue, Dec 17th)
- 7:32 : ConnectOnCall Data Breach, 900,000 Customers Data Exposed
- 7:32 : Hitachi Authentication Bypass Vulnerability Allows Attackers to Hack the System Remotely
- 7:32 : CISA and FBI Raise Alerts on Exploited Flaws and Expanding HiatusRAT Campaign
- 7:32 : The Mask APT Resurfaces with Sophisticated Multi-Platform Malware Arsenal
- 7:7 : CISA Warns of Adobe & Windows Kernel Driver Exploited in Attacks
- 7:7 : Kali Linux 2024.4 Released – What’s New!
- 6:32 : The Domino Effect of Cyber Incidents: Understanding the Ripple Impact of Cybersecurity Breaches
- 6:32 : Nine Updated Security Measures for the Modern Smart Home
- 6:32 : The Hidden Risks of Virtual Desktop Infrastructure (VDI) and How to Mitigate Them
- 6:32 : BlackBerry offloads Cylance’s endpoint security products to Arctic Wolf
- 6:4 : USA Incoming Cybersecurity Advisor to release a playbook on Cyber Attacks
- 6:4 : The shifting security landscape: 2025 predictions and challenges
- 5:32 : 9 Updated Security Measures for the Modern Smart Home
- 5:7 : 2024-12-17 – SmartApeSG injected script leads to NetSupport RAT
- 5:7 : Agile Business, agile security: How AI and Zero Trust work together
- 5:7 : Balancing security and user experience to improve fraud prevention strategies
- 5:5 : IT Security News Hourly Summary 2024-12-17 06h : 1 posts
- 4:32 : Cybersecurity jobs available right now: December 17, 2024
- 4:2 : Australia moves to drop some cryptography by 2030 – before quantum carves it up
- 3:32 : Still Flawed and Lacking Safeguards, UN Cybercrime Treaty Goes Before the UN General Assembly, then States for Adoption
- 3:9 : FakeCaptcha scams—When the “I’m not a robot” button is a trap
- 3:9 : IOCONTROL Malware: A Threat to Critical Infrastructure in Israel and the United States
- 2:5 : IT Security News Hourly Summary 2024-12-17 03h : 2 posts
- 2:4 : ISC Stormcast For Tuesday, December 17th, 2024 https://isc.sans.edu/podcastdetail/9258, (Tue, Dec 17th)
- 1:32 : Link Trap: GenAI Prompt Injection Attack
- 0:2 : Ransomware scum blow holes in Cleo software patches, Cl0p (sort of) claims responsibility
- 23:32 : Dirty DAG: New Vulnerabilities in Azure Data Factory’s Apache Airflow Integration
- 23:32 : 10 telltale signs of a fake giveaway on social media
- 23:32 : Slack’s AI agents promise to reshape productivity with contextual power
- 23:31 : ConnectOnCall data breach impacted over 900,000 individuals
- 23:5 : IT Security News Hourly Summary 2024-12-17 00h : 5 posts