138 posts were published in the last hour
- 22:31 : Sophos fixed critical vulnerabilities in its Firewall product
- 20:31 : Third member of LockBit ransomware gang has been arrested
- 20:7 : Identity and access management tools and features for 2025
- 20:5 : IT Security News Hourly Summary 2024-12-20 21h : 1 posts
- 19:32 : Ninth Circuit Gets It: Interoperability Isn’t an Automatic First Step to Liability
- 19:2 : What Payroll Documents Do You Need to Pay Employees?
- 19:2 : Customs & Border Protection Fails Baseline Privacy Requirements for Surveillance Technology
- 18:32 : LockBit Developer Rostislav Panev, a Dual Russian-Israeli Citizen, Arrested
- 18:32 : How to Test PATCH Requests for API Testing With Playwright Java
- 18:2 : Our Santa wishlist: Stronger identity security for kids
- 17:5 : IT Security News Hourly Summary 2024-12-20 18h : 6 posts
- 16:32 : Tibbo AggreGate Network Manager
- 16:32 : Fortinet Releases Security Updates for FortiManager
- 16:32 : DEF CON 32 – Measuring the Tor Network
- 16:5 : How to delete your X/Twitter account for good (and protect your data)
- 16:5 : How to Prevent DDoS Attacks: 5 Steps for DDoS Prevention
- 16:5 : Video: Brain Cipher Ransomware Hacks Deloitte
- 16:4 : Is There a DDoS Attack Ceiling?
- 16:4 : Ditch The Cloud Security Labels to Nail Detection and Response
- 16:4 : North Korean Hackers Stole $1.34 Billion in Crypto in 2024
- 16:4 : Italy’s Data Protection Watchdog Issues €15m Fine to OpenAI Over ChatGPT Probe
- 15:33 : Russia targets Ukraine sensitive data servers with Cyber Attacks
- 15:33 : Builder.ai Database Misconfiguration Exposes 1.29 TB of Unsecured Records
- 15:32 : Ransomware attack on health giant Ascension hits 5.6 million patients
- 15:32 : Security Serious Unsung Heroes 2024 – Winner’s Spotlight: Best Security Awareness Campaign
- 15:32 : Cybersecurity Snapshot: CISA Hands Down Cloud Security Directive, While Threat from North Korean IT Workers Gets the Spotlight
- 15:32 : How to Handle Secrets in Configuration Management Tools
- 15:32 : Rising Tactics of Winnti Hackers Include Deploying Glutton PHP Backdoors
- 15:32 : CISA Issues Mobile Security Guidelines Amid Cyber Espionage Threats
- 15:32 : Colorado Faces Growing Financial Losses from AI-Powered Scams in 2024
- 15:32 : Bitcoin Security Concerns Amid Quantum Computing Advancements
- 15:3 : Protecting Unmanaged Devices with Armis and Akamai
- 15:2 : Major Enhancements to Akamai API Security, Q4 2024
- 15:2 : TP-Link routers may be banned in the US next year – what that means for you
- 15:2 : New Microsoft guidance for the CISA Zero Trust Maturity Model
- 14:32 : Top AI Trends Every Software Development Company to Follow in 2025
- 14:32 : Why Apple sends spyware victims to this nonprofit security lab
- 14:32 : How Public-Private Collaborations Contribute to Cybercrime Disruption
- 14:5 : IT Security News Hourly Summary 2024-12-20 15h : 3 posts
- 13:32 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 13:32 : Config Chaos | How IoT and Cloud misconfigurations undermine security
- 13:31 : Getting to Know Katya Pikkarainen
- 13:2 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 13:2 : In Other News: McDonald’s API Hacking, Netflix Fine, Malware Kills ICS Process
- 12:32 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 12:32 : OPSWAT Acquires Fend to Extend Cybersecurity Reach Into OT Platforms
- 12:32 : CISA: Use Signal or other secure communications app
- 12:32 : LockBit Admins Tease a New Ransomware Version
- 12:31 : Ukraine’s Security Service Probes GRU-Linked Cyber-Attack on State Registers
- 12:2 : Threat Actors Selling Nunu Stealer On Hacker Forums
- 12:2 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 12:2 : Black Duck Expands Leadership Team
- 12:2 : Botnet of 190,000 BadBox-Infected Android Devices Discovered
- 11:32 : Christmas “Gift” Delivered Through SSH, (Fri, Dec 20th)
- 11:32 : Now You See Me, Now You Don’t: Using LLMs to Obfuscate Malicious JavaScript
- 11:32 : UK’s ICO Labels Google ‘Irresponsible’ For Tracking Change
- 11:32 : El Salvador To Sell Or Discontinue Bitcoin Wallet, After IMF Deal
- 11:32 : Craig Wright Sentenced For Contempt Of Court
- 11:32 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 11:32 : U.S. CISA adds BeyondTrust software flaw to its Known Exploited Vulnerabilities catalog
- 11:32 : BellaCPP: Discovering a new BellaCiao variant written in C++
- 11:32 : CISA Urges Immediate Patching of Exploited BeyondTrust Vulnerability
- 11:32 : Lazarus Group Spotted Targeting Nuclear Engineers with CookiePlus Malware
- 11:32 : Webcams and DVRs Vulnerable to HiatusRAT, FBI Warns
- 11:5 : IT Security News Hourly Summary 2024-12-20 12h : 7 posts
- 11:4 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 11:4 : French Citizens – 28,445,106 breached accounts
- 11:4 : Rockwell PowerMonitor Vulnerabilities Allow Remote Hacking of Industrial Systems
- 11:4 : Another NetWalker affiliate sentenced to 20 years in prison
- 11:4 : CISA Urges Encrypted Messaging After Salt Typhoon Hack
- 10:32 : Siemens UMC Vulnerability Allows Arbitrary Remote Code Execution
- 10:32 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 10:4 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 9:32 : Task scams cost Americans almost quarter of a billion dollars
- 9:32 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 9:32 : Unwrapping Christmas scams | Unlocked 403 cybersecurity podcast (ep. 9)
- 9:32 : Raccoon Infostealer operator sentenced to 60 months in prison
- 9:32 : Insider Threat Indicators
- 9:32 : Sophos Issues Hotfixes for Critical Firewall Flaws: Update to Prevent Exploitation
- 9:32 : Rspack npm Packages Compromised with Crypto Mining Malware in Supply Chain Attack
- 9:32 : Ransomware Attackers Target Industries with Low Downtime Tolerance
- 9:4 : Foxit PDF Editor Vulnerabilities Allows Remote Code Execution
- 9:4 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 8:32 : Windows 11 Privilege Escalation Vulnerability Lets Attackers Execute Code to Gain Access
- 8:32 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 8:32 : Ransomware Attacks Expose Gaps in Backup Practices: The Case for Modern Solutions
- 8:32 : Amazon health malware, BeyondTrust suffers cyberattack, FortiNet wireless vulnerability
- 8:5 : IT Security News Hourly Summary 2024-12-20 09h : 9 posts
- 8:3 : NetWalker Ransomware Operator Sentenced to 20 Years in Prison
- 8:2 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 8:2 : Human Risk Management: The “Weakest Link” Emerges as Key to Cybersecurity
- 8:2 : How Data Classification Reduces Insider Threats
- 8:2 : Last Pass Hack Impact Continues: Cyber Security Today for Friday, December 20, 2024
- 7:32 : Silicon In Focus Podcast: Tech in 2025
- 7:32 : CISA Warns of BeyondTrust Privileged Remote Access Exploited in Wild
- 7:32 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 7:32 : Zero-Trust in Web3: Redefining Security for Decentralized Systems
- 7:5 : Rising wave of cyber-attacks targeting YouTube content creators
- 7:4 : The Avast Phishing Awards: Trickiest email headlines of 2024
- 7:4 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 7:4 : Hackers Exploiting Critical Fortinet EMS Vulnerability to Deploy Remote Access Tools
- 6:32 : CISA Releases Eight New ICS Advisories to Defend Cyber Attacks
- 6:32 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 6:32 : CISA and EPA Warn Water Facilities to Secure Exposed HMIs
- 6:4 : NotLockBit – Previously Unknown Ransomware Attack Windows & macOS
- 6:4 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 6:4 : CISA Adds Critical Flaw in BeyondTrust Software to Exploited Vulnerabilities List
- 5:32 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 5:32 : AI is becoming the weapon of choice for cybercriminals
- 5:32 : Why cybersecurity is critical to energy modernization
- 5:5 : IT Security News Hourly Summary 2024-12-20 06h : 5 posts
- 5:4 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 4:32 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 4:32 : India’s Rapido exposed user and driver data through leaky website feedback form
- 4:32 : New infosec products of the week: December 20, 2024
- 4:32 : 46% of financial institutions had a data breach in the past 24 months
- 4:2 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 3:32 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 3:32 : Infosec experts divided on AI’s potential to assist red teams
- 3:32 : CISO Challenges for 2025: Overcoming Cybersecurity Complexities
- 3:4 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 2:31 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 2:6 : ISC Stormcast For Friday, December 20th, 2024 https://isc.sans.edu/podcastdetail/9264, (Fri, Dec 20th)
- 2:6 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 2:5 : IT Security News Hourly Summary 2024-12-20 03h : 1 posts
- 1:31 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 1:4 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 1:4 : Navigating the New Era of AI Traffic: How to Identify and Block AI Scrapers
- 1:4 : DEF CON 32 – Exploiting Cloud Provider Vulnerabilities for Initial Access
- 0:32 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 0:32 : BeyondTrust SaaS instances breached in cyberattack
- 0:7 : Play Ransomware Claims Krispy Kreme Breach, Threatens Data Leak
- 0:7 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 23:31 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 23:5 : IT Security News Hourly Summary 2024-12-20 00h : 6 posts
- 23:2 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 23:2 : The Breachies 2024: The Worst, Weirdest, Most Impactful Data Breaches of the Year
- 23:2 : ‘Fix It’ social-engineering scheme impersonates several brands