89 posts were published in the last hour
- 22:32 : 16 Chrome Extensions Hacked in Large-Scale Credential Theft Scheme
- 22:32 : US Treasury says China accessed government documents in ‘major’ cyberattack
- 22:2 : US Treasury says China stole documents in ‘major’ cyberattack
- 21:32 : Best of 2024: 30,000 Dealerships Down — ‘Ransomware’ Outage Outrage no. 2 at CDK Global
- 21:2 : Randall Munroe’s XKCD ‘Sun Avoidance’
- 20:32 : Volkswagen leak exposed precise location data on thousands of vehicles across Europe for months
- 20:7 : Is nowhere safe from AI slop? (Lock and Code S05E27)
- 20:5 : IT Security News Hourly Summary 2024-12-30 21h : 2 posts
- 19:34 : New Windows 11 24H2 bug could block future security updates – see who’s affected
- 19:34 : Windows 11 Media Update Bug Stops Security Updates
- 19:5 : The future of hybrid cloud: What to expect in 2025 and beyond
- 19:4 : Protect Yourself from Zelle Scams: Prevention Tips and Recovery Steps
- 18:4 : Forrester on cybersecurity budgeting: 2025 will be the year of CISO fiscal accountability
- 18:4 : VW Cars Leak Private Data of 800,000 — ‘Volksdaten’
- 18:4 : Rising Cyber Threats in Q3 2024: AI’s Dual Role in Attacks and Defense
- 17:32 : NFS Protocol Security Bypassed To Access Files From Remote Server
- 17:32 : Hackers Weaponize Websites With LNK File To Deliver Weaponized LZH File
- 17:32 : New Botnet Exploiting D-Link Routers To Gain Control Remotely
- 17:32 : Top public cloud service providers of 2025: How they compare
- 17:32 : Understanding VoIP DDoS Attacks: Prevention and Mitigation Strategies
- 17:5 : IT Security News Hourly Summary 2024-12-30 18h : 1 posts
- 16:32 : Catching “EC2 Grouper”- no indicators required!
- 16:3 : Italy faces DDOS attacks from Russia
- 16:3 : SquareX Researchers Uncover OAuth Vulnerability in Chrome Extensions Days Before Major Breach
- 16:2 : State Legislatures Are The Frontline for Tech Policy: 2024 in Review
- 16:2 : Fighting Automated Oppression: 2024 in Review
- 16:2 : Exposing Surveillance at the U.S.-Mexico Border: 2024 Year in Review in Pictures
- 15:32 : Cisco states that the second data leak is linked to the one from October
- 15:32 : Vulnerability Summary for the Week of December 23, 2024
- 15:4 : SquareX Researchers Expose OAuth Attack on Chrome Extensions Days Before Major Breach
- 15:4 : New 7-Zip 0-Day Exploit Leaked That Allow Attackers Control Victim Devices Remotely
- 15:4 : VyprVPN Review (2025): Can It Still Perform This Year and Beyond?
- 15:4 : How MXDR Services Solve Cyber Talent Shortages
- 14:31 : Critical Infrastructure Faces Rising Ransomware Risks
- 14:5 : IT Security News Hourly Summary 2024-12-30 15h : 8 posts
- 14:2 : VyprVPN Review: Can It Still Perform This Year and Beyond?
- 14:2 : NSFOCUS ISOP Listed in The Security Analytics Platform Landscape Report by Forrester
- 13:32 : Palo Alto Networks Patches Firewall Zero-Day Exploited for DoS Attacks
- 13:5 : Exposed Cloud Server Tracks 800,000 Volkswagen, Audi, and Skoda EVs
- 13:5 : Kubernetes Ephemeral Containers: Enhancing Security and Streamlining Troubleshooting in Production Clusters
- 13:5 : The Email Security Revolution – How the Market Landscape Has Changed
- 13:5 : The Traditional Advocates of the Security Perimeter Don’t Want You to Know about Data-Centric Security
- 13:5 : Four-Faith Industrial Router Vulnerability Exploited in Attacks
- 13:4 : ⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips
- 13:4 : New HIPAA Rules Mandate 72-Hour Data Restoration and Annual Compliance Audits
- 12:32 : Ninth Telecoms Firm Hacked By China
- 12:32 : Japan Airlines Flights Delayed By Cyber-Attack
- 12:32 : Former OpenAI Engineer, Whistleblower Passes Away At 26
- 12:32 : Italy Fines OpenAI 15m Euros Over Data Collection
- 12:32 : OpenAI Gives Details On For-Profit Shift
- 12:32 : AT&T and Verizon say networks are secure after being breached by China-linked Salt Typhoon hackers
- 12:32 : Salt Typhoon’s Reach Continues to Grow
- 12:32 : US Issues Final Rule for Protecting Personal Data Against Foreign Adversaries
- 12:2 : The Most Dangerous People on the Internet in 2024
- 12:2 : Several Chrome Extensions Compromised in Supply Chain Attack
- 12:2 : When Good Extensions Go Bad: Takeaways from the Campaign Targeting Browser Extensions
- 11:32 : Changes in SSL and TLS support in 2024, (Mon, Dec 30th)
- 11:32 : “Vishing,” “Quishing,” and AI Scams: The New Cybercrime Techniques You Need to Know About
- 11:32 : What’s Next for Cybersecurity in 2025 and Beyond? Fortra Experts Weigh In
- 11:32 : The Future of AI Regulation: Balancing Innovation and Safety in Silicon Valley
- 11:31 : Cisco Confirms Authenticity of Data After Second Leak
- 11:5 : IT Security News Hourly Summary 2024-12-30 12h : 1 posts
- 10:31 : Verizon says it has secured its network after breach by China-linked Salt Typhoon group
- 10:4 : PoC Exploited Released for Oracle Weblogic Server Vulnerability
- 10:4 : 2024 Year in Review: What We Got Right and Looking to 2025
- 9:31 : Threat actors attempt to exploit a flaw in Four-Faith routers
- 9:7 : Understanding Data Leaks: Causes, Consequences, and Prevention Strategies
- 9:7 : Majority of UK SMEs Lack Cybersecurity Policy
- 8:32 : Brazil Suspends BYD EV Plant Construction Over Worker Conditions
- 8:32 : Microsoft Warns of Windows 11 24H2 Issue that Blocks Windows Security Updates
- 8:31 : Cyberhaven extension hacked, ZAGG data breach, Volkswagen cloud leak
- 8:5 : IT Security News Hourly Summary 2024-12-30 09h : 1 posts
- 7:32 : Builder.ai Data Breach Exposes Sensitive Information of Over 3 Million Users
- 7:4 : Top Law Enforcement Operations in Cybersecurity in 2024: A Year of Major Strikes Against Cybercrime
- 6:32 : Google trending Cybersecurity headlines for the last weekend
- 6:32 : Critical Flaw Exposes Four-Faith Routers to Remote Exploitation
- 6:32 : Four-Faith Industrial Routers Vulnerability Exploited in the Wild to Gain Remote Access
- 6:4 : The sixth sense of cybersecurity: How AI spots threats before they strike
- 5:5 : IT Security News Hourly Summary 2024-12-30 06h : 3 posts
- 5:2 : reconFTW: Open-source reconnaissance automation
- 4:32 : Cybercriminals tighten their grip on organizations
- 4:32 : Machine identities are the next big target for attackers
- 2:7 : Achieve Satisfaction with Streamlined Secrets Rotation Processes
- 2:7 : Empowering Security: Mastering Least Privilege
- 0:31 : ZAGG disclosed a data breach that exposed its customers’ credit card data
- 0:2 : Happy 15th Anniversary, KrebsOnSecurity!
- 23:5 : IT Security News Hourly Summary 2024-12-30 00h : 2 posts
- 22:58 : IT Security News Weekly Summary 52
- 22:55 : IT Security News Daily Summary 2024-12-29