140 posts were published in the last hour
- 22:32 : Holiday Shopping Meets Cyber Threats: How Source Defense Detected the ESA Store Attack
- 22:31 : How eBPF is changing appsec | Impart Security
- 22:4 : New PhishWP Plugin on Russian Forum Turns Sites into Phishing Pages
- 21:32 : Google maps the future of AI agents: Five lessons for businesses
- 21:31 : Washington sues T-Mobile over 2021 data breach that spilled 79 million customer records
- 21:2 : CISA Update on Treasury Breach
- 21:2 : Achieving Security and Trust in a Data Fabric: The Role of Zero Trust Architecture
- 21:2 : Charter, Consolidated, Windstream reportedly join China’s Salt Typhoon victim list
- 20:32 : CISA says ‘no indication’ of wider government hack beyond Treasury
- 20:5 : IT Security News Hourly Summary 2025-01-06 21h : 5 posts
- 20:4 : Hiring For Tech Positions: Balancing Experience And Potential
- 19:32 : Apple’s $95 million Siri settlement could mean a payout for you – here’s how much
- 19:32 : This iOS 18 feature shares your photos with Apple for analysis. Should you be worried?
- 19:32 : Carving
- 19:31 : Meet the Chinese ‘Typhoon’ hackers preparing for war
- 19:4 : Amit Yoran, Tenable CEO and cybersecurity advocate, dies at 54
- 19:4 : DEF CON 32 – Physical OSINT
- 19:4 : Randall Munroe’s XKCD ‘Skew-T Log-P’
- 18:32 : Dental group lied through teeth about data breach, fined $350,000
- 18:32 : Malicious Chrome Extension Mimics Popular Tool, Poses Threat to Users’ Data
- 18:4 : OpenAI’s red teaming innovations define new essentials for security leaders in the AI era
- 18:4 : McAfee’s new AI tool detects email and text scams before you fall for them
- 18:4 : Top 4 incident response certifications to consider in 2025
- 18:4 : Why security teams rely on Microsoft Defender Experts for XDR for managed detection and response
- 17:32 : EFF Goes to Court to Uncover Police Surveillance Tech in California
- 17:32 : Malware Targets Ukrainian Military via Fake App
- 17:31 : How to enhance Amazon Macie data discovery capabilities using Amazon Textract
- 17:5 : IT Security News Hourly Summary 2025-01-06 18h : 14 posts
- 17:2 : I found a malicious Chrome extension on my system – here’s how and what I did next
- 17:2 : 6 reasons why SMBs love OpenText MDR
- 17:2 : Affordable Video Editing Software for PC That Delivers Pro Results
- 17:2 : Online Behavioral Ads Fuel the Surveillance Industry—Here’s How
- 17:2 : FireScam infostealer poses as Telegram Premium app to surveil Android devices
- 17:2 : Anticipating the Cyber Frontier: Top Predictions for 2025
- 16:32 : England residents asked to reboot their devices for Cybersecurity reasons
- 16:32 : Ransomware attacks on Germany Fraunhofer and Japan Nikki Universal
- 16:32 : What exactly is Secure Access as a Service (SAaaS)?
- 16:31 : India Enacts New Digital Data Protection Rules
- 16:31 : Supply Chain Attack Targets Key Ethereum Development Tools
- 16:7 : Hackers Brute Force Your Passwords?
- 16:7 : Emerging Mobile Threats and Defensive Strategies for Developers
- 16:7 : Nessus scanner agents went offline due to a faulty plugin update
- 15:32 : Making an Impact: Beach Cleanup and Reforestation Event
- 15:32 : How a Chrome extension malware scare ruined my day – and what I did next
- 15:32 : WordPress Plugin Exploited to Turn Legitimate Sites Into Phishing Traps
- 15:32 : With Great Technology Comes Great Responsibility: Privacy in the Digital Age
- 15:32 : ⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [6 Jan]
- 15:32 : India Proposes Digital Data Rules with Tough Penalties and Cybersecurity Requirements
- 15:2 : New “Double-Clickjacking” Threat Revealed: Security Settings at Risk
- 15:2 : Rethinking Password Security: Why Length Matters More Than Complexity
- 15:2 : How to Declutter and Safeguard Your Digital Privacy
- 15:2 : Vulnerability Summary for the Week of December 30, 2024
- 15:2 : ⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [6 Jan]
- 14:32 : MediaTek rings in the new year with a parade of chipset vulns
- 14:32 : Wallet Drainer Malware Used to Steal $500 Million in Cryptocurrency in 2024
- 14:31 : ⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [6 Jan]
- 14:7 : The 5 Fastest VPNs for 2025
- 14:7 : Code Execution Flaw Found in Nuclei Vulnerability Scanner
- 14:6 : China’s Salt Typhoon Attacks Guam entity; US Sanctions Chinese Company
- 14:6 : ⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [6 Jan]
- 14:6 : New PhishWP Plugin Enables Sophisticated Payment Page Scams
- 14:5 : IT Security News Hourly Summary 2025-01-06 15h : 3 posts
- 13:34 : Tenable Disables Nessus Agents Over Faulty Updates
- 13:33 : Torq Adds Bevy of AI Agents to Automate Cybersecurity Workflows
- 13:33 : ⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [6 Jan]
- 13:4 : ⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [6 Jan]
- 12:32 : PoC Exploit Released for Critical OpenSSH Vulnerability (CVE-2024-6387)
- 12:32 : Privacy of Photos.app’s Enhanced Visual Search
- 12:32 : Is Your Car Spying on You? What It Means That Tesla Shared Data in the Las Vegas Explosion
- 12:32 : Cybercriminals Target Ethereum Developers with Fake Hardhat npm Packages
- 12:32 : FireScam Android Malware Poses as Telegram Premium to Steal Data and Control Devices
- 12:32 : From $22M in Ransom to +100M Stolen Records: 2025’s All-Star SaaS Threat Actors to Watch
- 12:31 : ⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [6 Jan]
- 12:31 : Chinese Hackers Double Cyber-Attacks on Taiwan
- 11:32 : US Sanctions Chinese Tech Company Over Infrastructure Hacks
- 11:32 : China’s BYD Regains Top EV Spot Amidst Tesla Decline
- 11:32 : Microsoft To Spend $80bn On AI Infrastructure This Year
- 11:32 : TikTok ‘Aware’ Livestream Feature Exploited Minors
- 11:32 : Nick Clegg To Leave Meta, Hand Over Post To Republican
- 11:32 : US Sanctions Chinese Firm Linked to Flax Typhoon Attacks on Critical Infrastructure
- 11:32 : DigiCert Open Sources Domain Control Validation Software
- 11:31 : New Infostealer Campaign Uses Discord Videogame Lure
- 11:5 : IT Security News Hourly Summary 2025-01-06 12h : 6 posts
- 11:2 : 6 Reasons Why You Should Integrate AI in Your Business in 2025
- 11:2 : Malicious EditThisCookie Extension Attacking Chrome Users to Steal Data
- 11:2 : China-linked Salt Typhoon APT compromised more US telecoms than previously known
- 11:2 : IT Giant Atos Responds to Ransomware Group’s Data Theft Claims
- 11:2 : Russian-Speaking Attackers Target Ethereum Devs with Fake Hardhat npm Packages
- 10:32 : WordPress Plugin Vulnerability Exposes 3 Million Websites to Injection Attacks
- 10:2 : Terraform Labs Founder Do Kwon Extradited to US, Faces 130-Year Sentence
- 10:2 : After China’s Salt Typhoon, the reconstruction starts now
- 10:2 : 4 Tips to Fortify the Human Element in Your Cybersecurity Posture
- 10:2 : Scammers Drain $500m from Crypto Wallets in a Year
- 9:32 : iPhone Sharing the Photos by Default to Apple
- 9:31 : Global Cybercrime Epidemic: Pig-Butchering Scams Exploit Vulnerable Victims and Flourish Amidst Enforcement Gaps
- 9:2 : Stealthy Steganography Backdoor Attacks Target Android Apps
- 9:2 : Some weeks in security (December 16 – January 5)
- 9:2 : Industry Moves for the week of January 6, 2025 – SecurityWeek
- 9:2 : Tenable CEO Amit Yoran Dead at 54
- 9:2 : Poor Cyber Hygiene can Cost Organizations up to an Average of $677 Million
- 8:32 : BLUECAT EDGE FOR COMPREHENSIVE PROTECTIVE DNS
- 8:32 : Apple’s AI Produces False Headline About Darts Championship
- 8:32 : EAGERBEE, with updated and novel components, targets the Middle East
- 8:32 : Drowning in Visibility? Why Cybersecurity Needs to Shift from Visibility to Actionable Insight
- 8:31 : Flax Typhoon sanctions, Atos dismisses ransomware, German airport outage
- 8:7 : Windows 11 BitLocker Bypassed to Extract Encryption Keys
- 8:6 : Weaponized Python Scripts Deliver New SwaetRAT Malware
- 8:6 : The Defender vs. The Attacker Game
- 8:5 : IT Security News Hourly Summary 2025-01-06 09h : 4 posts
- 7:32 : Make Malware Happy, (Mon, Jan 6th)
- 7:32 : Garak – An Open Source LLM Vulnerability Scanner for AI Red-Teaming
- 7:32 : Malicious npm Packages Stealing Developers’ Sensitive Data
- 7:32 : Online Marketplaces: Helping Small Businesses Grow and Stay Cyber Safe
- 7:2 : From Shadows to Spotlight: Addressing the Hidden Dangers of Dormant Service Accounts
- 7:2 : Cybersecurity Firm Tenable’s CEO “Amit Yoran” has Died at 54
- 6:32 : Windows Registry Privilege Escalation Vulnerability – PoC Released
- 6:32 : How Learning Experience Platforms Are Transforming Training
- 6:32 : Tenable CEO “Amit Yoran” Passed Away at the Age of 54
- 6:2 : Balancing proprietary and open-source tools in cyber threat research
- 5:32 : North Korean Hackers Wipe Cryptocurrency Wallets via Fake Job Interviews
- 5:7 : The Future of Cybersecurity: Leveraging AI SOC Analysts to Combat Evolving Threats
- 5:6 : Users receive at least one advanced phishing link every week
- 5:6 : Only 26% of Europe’s top companies earn a high rating for cybersecurity
- 5:5 : IT Security News Hourly Summary 2025-01-06 06h : 1 posts
- 4:31 : US Treasury Sanctions Chinese Tech Firm Over Links to State-Sponsored Attacks
- 4:4 : FireScam Malware Campaign Highlights Rising Threat to Mobile Users
- 4:4 : High-Severity Vulnerability Discovered in Nuclei: What You Need to Know
- 4:4 : Is healthcare cybersecurity in critical condition?
- 3:32 : Taiwan reportedly claims China-linked ship damaged one of its submarine cables
- 3:32 : Cybersecurity Today: Browser Exploits, U.S. Treasury Breach & CrowdStrike’s Comeback: Monday, January 6, 2024
- 3:4 : ISC Stormcast For Monday, January 6th, 2025 https://isc.sans.edu/podcastdetail/9266, (Mon, Jan 6th)
- 2:32 : Tenable Chairman and CEO Amit Yoran Has Died
- 1:32 : Telemetry data from 800K VW Group EVs exposed online
- 1:32 : Feel Supported by Advanced Machine Identity Management
- 1:32 : Unlocking the Potential of Machine Identity Management
- 1:32 : How Reliable Secret Storage Enhances Cloud Security
- 1:2 : PLAYFULGHOST backdoor supports multiple information stealing features
- 23:5 : IT Security News Hourly Summary 2025-01-06 00h : 2 posts
- 22:58 : IT Security News Weekly Summary 01
- 22:55 : IT Security News Daily Summary 2025-01-05