120 posts were published in the last hour
- 22:4 : ‘That’s not a bug, it’s a feature’ takes on a darker tone when malware’s involved
- 21:4 : What is a public key and how does it work?
- 21:4 : DEF CON 32 – Disenshittify Or Die! How Hackers Can Seize The Means Of Computation
- 20:32 : IT Glitch Disrupts Morrisons Christmas Shopping
- 20:32 : Lazarus Group Targets Nuclear Industry with CookiePlus Malware
- 20:32 : TunnelBear VPN review: An affordable, easy-to-use VPN with a few notable pitfalls
- 20:5 : IT Security News Hourly Summary 2024-12-23 21h : 5 posts
- 20:2 : DEF CON 32 – Hacker Jeopardy – Night 2
- 20:2 : Randall Munroe’s XKCD ‘Exclusion Principle’
- 20:2 : The Hidden Cost of Web Pixels – A Privacy and Security Nightmare
- 19:32 : OffSec Yearly Recap 2024
- 19:32 : The Top 5 Kubernetes CVEs of 2024: Have You Patched Them Yet?
- 19:4 : TunnelBear VPN review: An affordable, easy-to-use VPN with few a few notable pitfalls
- 18:32 : Analyzing Malicious Intent in Python Code: A Case Study
- 18:32 : The Future of Artificial Intelligence: Progress and Challenges
- 18:32 : Juniper Networks Warns of Mirai Malware Threat to Routers with Default Passwords
- 18:4 : What is a proxy firewall?
- 17:32 : Criminal Complaint against LockBit Ransomware Writer
- 17:32 : Critical Vulnerabilities Found in WordPress Plugins WPLMS and VibeBP
- 17:32 : Ransomware Attack Exposes Data of 5.6 Million Ascension Patients
- 17:5 : IT Security News Hourly Summary 2024-12-23 18h : 5 posts
- 17:4 : How to detect this infamous NSO spyware on your phone for just $1
- 17:4 : CISA Adds One Known Exploited Vulnerability to Catalog
- 16:32 : Defending Encryption in the U.S. and Abroad: 2024 in Review
- 16:32 : EFF in the Press: 2024 in Review
- 16:32 : Cryptomining Malware Found in Popular Open Source Packages
- 16:2 : Data Privacy and Security: A Developer’s Guide to Handling Sensitive Data With DuckDB
- 16:2 : 2024 Year in Review
- 16:2 : Peter Shor Broke PKI with Ancient Math, and Futuristic Quantum Computing
- 15:32 : Lazarus launches malware on Nuclear power org and Kaspersky Telegram Phishing scams
- 15:32 : The best AirTag wallets of 2024: Expert tested
- 15:32 : Protect 3 Devices With This Maximum Security Software
- 15:32 : U.S. Court rules against NSO Group in WhatsApp spyware Lawsuit
- 15:2 : The code whisperer: How Anthropic’s Claude is changing the game for software developers
- 15:2 : Ledger Users Targeted by Sophisticated Phishing Attacks
- 15:2 : Here’s How to Safeguard Your Data From Data Brokers
- 15:2 : Massive Credit Card Breach Puts Millions at Risk
- 15:2 : US charges suspected LockBit ransomware developer
- 14:32 : 10 of the biggest cybersecurity stories of 2024
- 14:32 : Beware Of Shadow AI – Shadow IT’s Less Well-Known Brother
- 14:32 : Health Care Data of Almost 1 Million ConnectOnCall User Exposed
- 14:31 : Vulnerability Summary for the Week of December 16, 2024
- 14:5 : IT Security News Hourly Summary 2024-12-23 15h : 11 posts
- 14:2 : The Art of Prompt Engineering in Incident Response
- 14:2 : The TechCrunch Cyber Glossary
- 14:2 : Suspected LockBit dev, facing US extradition, ‘did it for the money’
- 14:2 : Reflections on a Tumultuous 2024: How Cybersecurity and DevSecOps Took Center Stage
- 14:2 : Best of 2024: Massive Online Shopping Scam Racks Up 850,000 Victims
- 14:2 : Best of 2024: National Public Data Sued for Hack that Exposed Data of 2.9 Billion People
- 14:2 : ⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips
- 14:2 : AI Could Generate 10,000 Malware Variants, Evading Detection in 88% of Case
- 13:32 : New Opportunities for Communication Service Providers
- 13:32 : Best Patch Management Software (2024): Compare Features & Pricing
- 13:32 : Navigating the Cyber Threat Landscape: Lessons Learned & What’s Ahead
- 13:2 : Why Ethereum Will Be a Key Platform for Businesses in the Future
- 13:2 : Securing the OT Stage: NIS2, CRA, and IEC62443 Take Center Spotlight
- 13:2 : NFT scammers charged for stealing $22 million through “rug pulls”
- 12:32 : OpenAI Starts Testing New ‘Reasoning’ AI Model
- 12:32 : US Finalises Billions In Awards To Samsung, Texas Instruments
- 12:31 : 5.6 Million Impacted by Ransomware Attack on Healthcare Giant Ascension
- 12:7 : Supply Chain Attack Hits Rspack, Vant npm Packages with Monero Miner
- 12:7 : WhatsApp scores historic victory against NSO Group in long-running spyware hacking case
- 12:6 : Rockstar2FA Collapse Fuels Expansion of FlowerStorm Phishing-as-a-Service
- 11:32 : BellaCiao, A new .NET Malware With Advanced Sophisticated Techniques
- 11:32 : Skuld Malware Using Weaponized Windows Utilities Packages To Deliver Malware
- 11:32 : The State of Security in 2024: The Fortra Experts Take a Look
- 11:32 : 4 Security Controls Keeping Up with the Evolution of IT Environments
- 11:32 : Sophos Patches Critical Firewall Vulnerabilities
- 11:7 : Hackers Exploiting PLC Controllers In US Water Management System To Gain Remote Access
- 11:7 : DigiEver IoT Devices Exploited To Deliver Mirai-based Malware
- 11:7 : New Python NodeStealer Attacking Facebook Business To Steal Login Credentials
- 11:7 : Lazarus Hackers Using New VNC Based Malware To Attack Organizations Worldwide
- 11:7 : Malicious Apps On Amazon Appstore Records Screen And Interecpt OTP Verifications
- 11:7 : 792 Syndicate Suspects Arrested in Massive Crypto and Romance Scam: The Rise of Cybercrime as a Corporate Enterprise
- 11:6 : Q3 2024 Cyber Attacks Statistics
- 11:6 : LockBit Ransomware Developer Arrested in Israel at Request of US
- 11:5 : IT Security News Hourly Summary 2024-12-23 12h : 9 posts
- 10:32 : Amazon Workers Go On Strike Across US
- 10:32 : US ‘Adding Sophgo’ To Blacklist Over Link To Huawei AI Chip
- 10:32 : The Invisible Russia-Ukraine Battlefield
- 10:32 : Cloud Atlas seen using a new tool in its attacks
- 10:32 : Italy’s Privacy Watchdog Fines OpenAI for ChatGPT’s Violations in Collecting Users Personal Data
- 10:32 : Top 10 Cybersecurity Trends to Expect in 2025
- 10:32 : Interpol Identifies Over 140 Human Traffickers in New Initiative
- 10:5 : Security Serious Unsung Heroes Awards Winner’s Spotlight: Mollie Chard
- 10:5 : UK ICO not happy with Google’s plans to allow device fingerprinting
- 10:5 : Industry Moves for the week of December 23, 2024 – SecurityWeek
- 10:4 : Apple Complains Meta Requests Risk Privacy in Spat Over EU Efforts to Widen Access to iPhone Tech
- 10:4 : AppViewX 2025 Predictions: Machine Identity Security, Certificate Lifecycle Management and PKI
- 10:4 : U.S. Judge Rules Against NSO Group in WhatsApp Pegasus Spyware Case
- 9:32 : Journalism Group Calls On Apple To Remove AI Feature
- 9:32 : Senators Ask Biden To Extend TikTok Ban Deadline
- 9:32 : Phishing Report Findings Call for a Fundamental Shift in Organizational Approaches to Defense
- 9:32 : ICO Warns of Mobile Phone Festive Privacy Snafu
- 8:32 : North Koreans Stole $1.34bn In Crypto This Year
- 8:32 : Lazarus APT targeted employees at an unnamed nuclear-related organization
- 8:32 : FlowerStorm attacks Microsoft 365, BeyondTrust on KEV, Ascension Health fallout
- 8:5 : How Hackers Are Using Physical Mail for Phishing Scams
- 8:5 : North Korean Hackers Stolen $2.2 Billion from Crypto Platforms in 2024
- 8:5 : Innovations in Handling Cloud-Based Secret Sprawl
- 8:5 : IT Security News Hourly Summary 2024-12-23 09h : 5 posts
- 8:4 : Capable Compliance through Rigorous Secrets Rotation
- 8:4 : Protected Access: Enhancing Cloud IAM Strategies
- 8:4 : Building Trust with Efficient Privileged Access Management
- 8:4 : Harnessing Innovation in Machine Identity Management
- 7:33 : Italy Fines OpenAI €15 Million for ChatGPT GDPR Data Privacy Violations
- 7:4 : 17M Patient Records Stolen in Ransomware Attack on Three California Hospitals
- 6:32 : Modiloader From Obfuscated Batch File, (Mon, Dec 23rd)
- 6:32 : Top 5 Ransomware Attacks and Data Breaches of 2024
- 6:32 : WhatsApp Wins NSO in Pegasus Spyware Hacking Lawsuit After 5 Years
- 6:3 : Germany Investigates BadBox Malware Infections, Targeting Over 192,000 Devices
- 6:3 : Evilginx: Open-source man-in-the-middle attack framework
- 5:31 : Maximizing the impact of cybercrime intelligence on business resilience
- 5:9 : How companies can fight ransomware impersonations
- 5:5 : IT Security News Hourly Summary 2024-12-23 06h : 2 posts
- 4:32 : PentestGPT – A ChatGPT Powered Automated Penetration Testing Tool
- 4:32 : What open source means for cybersecurity
- 23:31 : Understanding Cyber Threats During the Holiday Season
- 23:5 : IT Security News Hourly Summary 2024-12-23 00h : 2 posts
- 22:58 : IT Security News Weekly Summary 51