66 posts were published in the last hour
- 22:2 : Chris Hadfield: The sky is falling – what to do about space junk? | Starmus Highlights
- 21:2 : Best of 2024: Gmail Error: Email Blocked Because Sender is Unauthenticated
- 20:5 : IT Security News Hourly Summary 2024-12-24 21h : 6 posts
- 20:4 : DEF CON 32 – Your Smartcard Is Dumb: A Brief History Of Hacking Access Control Systems
- 20:4 : Randall Munroe’s XKCD ‘D Roll’
- 19:32 : The Atlas of Surveillance Expands Its Data on Police Surveillance Technology: 2024 Year in Review
- 19:9 : Postman Workspaces Leak 30000 API Keys and Sensitive Tokens
- 19:9 : EFF Continued to Champion Users’ Online Speech and Fought Efforts to Curtail It: 2024 in Review
- 19:8 : The U.S. Supreme Court Continues its Foray into Free Speech and Tech: 2024 Year in Review
- 18:32 : Understanding TPM: The Key Security Feature Powering Windows 11 Compatibility
- 17:5 : IT Security News Hourly Summary 2024-12-24 18h : 4 posts
- 16:32 : Python Malware in Zebo-0.1.0 and Cometlogger-0.1 Found Stealing User Data
- 16:32 : Adobe is aware that ColdFusion bug CVE-2024-53961 has a known PoC exploit code
- 16:32 : How Androxgh0st rose from Mozi’s ashes to become ‘most prevalent malware’
- 16:32 : Hackers are Employing Amazon Appstore to Propagate Malware
- 16:4 : American Airlines shutdown not because of Cyber Attack
- 16:4 : UEPOTB, LNK edition
- 16:4 : FBI Blames North Korea for $308M Cryptocurrency Hack as Losses Surge in 2024
- 15:32 : Clop ransomware gang takes credit for latest mass hack that breached dozens of companies
- 15:4 : Security Serious Unsung Heroes 2024: Winner’s Spotlight on Diversity Champion
- 15:4 : Best of 2024: An Accidental Discovery of a Backdoor Likely Prevented Thousands of Infections
- 15:4 : Proton Docs vs Google Docs in the Productivity Space
- 15:4 : Executives Targeted by Advanced Mobile Phishing Attacks
- 15:4 : Ledger Phishing Scam Targets Cryptocurrency Wallets
- 14:5 : IT Security News Hourly Summary 2024-12-24 15h : 4 posts
- 14:4 : These are the cybersecurity stories we were jealous of in 2024
- 14:4 : Harnessing AI to Strengthen OT Security Against Modern Cyber Threats
- 14:4 : Researchers Uncover PyPI Packages Stealing Keystrokes and Hijacking Social Accounts
- 13:32 : Impact of Unpatched Vulnerabilities in 2025
- 12:32 : Spyware Maker NSO Group Found Liable for Hacking WhatsApp
- 12:32 : US and Japan Blame North Korea for $308m Crypto Heist
- 12:7 : What do ransomware and Jesus have in common? A birth month and an unwillingness to die
- 12:6 : American Addiction Centers Data Breach Impacts 422,000 People
- 11:32 : Albania Bans TikTok For One Year After Stabbing
- 11:32 : Microsoft Diversifying 365 Copilot Away From OpenAI
- 11:32 : Spyware Maker NSO Group Found Liable In US Court
- 11:31 : 2025 NDAA Provides $3 Billion Funding for FCC’s Rip-and-Replace Program
- 11:7 : Adobe Patches ColdFusion Flaw at High Risk of Exploitation
- 11:6 : CISA Adds Acclaim USAHERDS Vulnerability to KEV Catalog Amid Active Exploitation
- 11:6 : North Korean Hackers Pull Off $308M Bitcoin Heist from Crypto Firm DMM Bitcoin
- 11:5 : IT Security News Hourly Summary 2024-12-24 12h : 2 posts
- 10:32 : Spyware Maker NSO Group Liable for WhatsApp User Hacks
- 10:6 : One third of adults can’t delete device data
- 9:32 : Sega Considers Starting Own Game Subscription Service
- 9:32 : Google Proposes Remedies After Antitrust Defeat
- 9:32 : Foldable Shipments Slow In China Amidst Global Growth Pains
- 9:32 : Apache Foundation fixed a severe Tomcat vulnerability
- 9:32 : Major Biometric Data Farming Operation Uncovered
- 8:32 : Node.js systeminformation Package Vulnerability Exposes Millions of Systems to RCE Attacks
- 8:32 : Government to name witness in encrypted chat sting
- 8:5 : IT Security News Hourly Summary 2024-12-24 09h : 1 posts
- 7:32 : Italy’s data protection watchdog fined OpenAI €15 million over ChatGPT’s data management violations
- 7:4 : More SSH Fun!, (Tue, Dec 24th)
- 6:32 : Can Ransom Payments Be Recovered or reimbursed? A Closer Look at Cybercrime and Law Enforcement Efforts
- 6:32 : What is Ransomware Impersonation and Its Impact on Data Networks?
- 6:32 : 2025 is going to be a bumpy year for IoT
- 6:32 : Apache Tomcat Vulnerability CVE-2024-56337 Exposes Servers to RCE Attacks
- 5:32 : How SLED Organizations Can Enhance Cybersecurity Compliance Before Year-End
- 5:32 : Cybersecurity jobs available right now: December 24, 2024
- 5:32 : How CISOs can make smarter risk decisions
- 5:32 : AI-driven scams are about to get a lot more convincing
- 4:4 : API security blind spots put businesses at risk
- 1:4 : Neuro Nostalgia Hackathon 2024: A Retro Journey with Modern Twists
- 0:32 : 4 Benefits of Using an AI Text Humanizer
- 0:31 : Achieving Stability with Enhanced Secret Detection
- 23:31 : U.S. CISA adds Acclaim Systems USAHERDS flaw to its Known Exploited Vulnerabilities catalog