53 posts were published in the last hour
- 20:5 : IT Security News Hourly Summary 2025-01-01 21h : 1 posts
- 19:31 : Proposed updates to HIPAA Security Rule mandate to restore the loss of certain relevant electronic information systems and data within 72 hours
- 18:31 : Hackers Breach Cyberhaven’s Chrome Extension in Supply-Chain Attack, Exfiltrating Sensitive Data
- 17:32 : Russia Blocked Viber For Violating State Laws
- 17:32 : Recent US Court Ruling Comes As A Huge Setback To The NSO Group
- 17:32 : 7 Years Old RCE Vulnerability Addressed In Kerio Control
- 17:31 : New Phishing Campaign Exploits Google Calendar To Evade Filters
- 17:6 : FTX Executives See Prison Sentences Reduced – Report
- 16:32 : Beijing Denies Involvement In US Treasury Cyberattack
- 16:32 : American Addiction Centers Cyberattack Exposes Sensitive Data of 422,424 Individuals
- 16:4 : Air Fryer espionage raises data security concerns
- 16:4 : Deepening Government Use of AI and E-Government Transition in Latin America: 2024 in Review
- 16:4 : Decentralization Reaches a Turning Point: 2024 in review
- 15:32 : Logical Reasoning in Network Problems
- 15:32 : What Is Patch Tuesday? Microsoft’s Monthly Update Explained
- 15:31 : Kids Online Safety Act Continues to Threaten Our Rights Online: 2024 in Review
- 15:6 : New “DoubleClickjacking” Exploit Bypasses Clickjacking Protections on Major Websites
- 14:32 : U.S. Treasury sanctions Russian and Iranian entities for interfering in the presidential election
- 14:5 : IT Security News Hourly Summary 2025-01-01 15h : 3 posts
- 14:4 : New Stealthy Malware Leveraging SSH Over TOR Attacking Ukrainian Military
- 14:4 : DrayTek Devices Vulnerability Let Attackers Arbitrary Commands Remotely
- 14:4 : Eight things that should not have happened last year, but did
- 13:2 : Do Kwon Finally Extradited to United States
- 13:2 : How To Navigate Certification Authority Distrust: Preventing Critical Incidents by Switching To A New Vendor
- 13:2 : Combatting the Security Awareness Training Engagement Gap
- 13:2 : North Korean Hackers Set New Record with $1.8 Billion Crypto Heist
- 12:4 : Iranian and Russian Entities Sanctioned for Election Interference Using AI and Cyber Tactics
- 11:31 : SpaceX Agrees ‘Direct-To-Cell’ Starlink Service For Ukraine
- 11:31 : Hey, Maybe It’s Time to Delete Some Old Chat Histories
- 11:6 : FortiGuard Labs Links New EC2 Grouper Hackers to AWS Credential Exploits
- 11:6 : Critical Security Issue Hits Four-Faith Routers
- 11:5 : IT Security News Hourly Summary 2025-01-01 12h : 4 posts
- 10:32 : Happy New Year 2025
- 10:32 : Key Cyber Threats to Watch in 2025
- 10:32 : In Praise of Bureaucracy – A New Era of Cyber Threats
- 10:32 : Cybercriminals Leverage LLMs to Generate 10,000 Malicious Code Variants
- 9:9 : US Army soldier who allegedly stole Trump’s AT&T call logs arrested
- 8:32 : Stay Ahead: Integrating IAM with Your Cloud Strategy
- 8:32 : Be Certain Your Data is Guarded with Cloud Compliance
- 8:32 : Satisfied with Your Cybersecurity? Think Again
- 8:32 : Delivering Value: Secure Secrets Scanning Solutions
- 8:31 : Gain Control with Advanced Secrets Vaulting
- 7:2 : The Evolution of Ransomware: From the 1970s to 2024
- 6:31 : Cybersecurity news headlines trending on Happy New Year 2025
- 2:31 : Exposing the Rogue Cyberheaven Compromised Chrome VPN Extensions Ecosystem – An Analysis
- 0:32 : Freedom in Cybersecurity: Keys to Unlock Potential
- 0:32 : Scaling Your Security with Cloud-Native Practices
- 0:32 : Capable Defenses: Mastering Least Privilege Tactics
- 0:32 : Get Excited: Innovations in Privileged Access Mgmt
- 0:32 : Reassured Safety with Advanced Threat Detection
- 23:9 : Bad Likert Judge: A Novel Multi-Turn Technique to Jailbreak LLMs by Misusing Their Evaluation Capability
- 23:5 : IT Security News Hourly Summary 2025-01-01 00h : 2 posts
- 23:1 : IT Security News Weekly Summary January