123 posts were published in the last hour
- 22:15 : EFF Statement on Meta’s Announcement of Revisions to Its Content Moderation Processes
- 20:20 : Malicious Android App On Amazon Appstore Distributed Spyware
- 20:20 : New DoubleClickjacking Attack Bypasses Existing Security Measures
- 20:19 : FireScam Android Malware Lures Victims By Posing As Telegram Premium App
- 20:19 : Fake Hardhat npm Packages Target Ethereum Developers
- 20:19 : Enhancing Cloud Cybersecurity for Critical Infrastructure Protection
- 20:5 : IT Security News Hourly Summary 2025-01-07 21h : 4 posts
- 19:32 : Mazda Connect Systems Vulnerable to Cyber Attacks
- 19:32 : Telegram reports spike in sharing user data with law enforcement
- 19:31 : Comic Agilé – Mikkel Noe-Nygaard, Luxshan Ratnaravi – #319 – Specialities
- 19:15 : License Plate Readers Are Leaking Real-Time Video Feeds and Vehicle Data
- 18:31 : Buying a smart home device? Look for this new cybersecurity seal – here’s why
- 18:13 : AI-supported spear phishing fools more than 50% of targets
- 18:13 : Turbulence at UN aviation agency as probe into potential data theft begins
- 18:13 : Trolley Problem, Safety Versus Security of Generative AI
- 17:32 : New WordPress Plugin That Weaponizes Legit Sites To Steal Customer Payment Data
- 17:31 : US government set to launch its Cyber Trust Mark cybersecurity labeling program for internet-connected devices in 2025
- 17:31 : Getting the Board on Board with Cybersecurity
- 17:31 : New Research Highlights Vulnerabilities in MLOps Platforms
- 17:18 : Key Cyber Initiatives from CISA: KEV Catalog, CPGs, and PRNI
- 17:18 : CISA in Focus Blog Series
- 17:18 : Threat actors breached the Argentina’s airport security police (PSA) payroll
- 17:18 : Last Call: The Combined Federal Campaign Pledge Period Closes on January 15!
- 17:17 : Former NSA Director Rob Joyce Joins DataTribe as Venture Partner
- 17:17 : DEF CON 32 – So You Wanna Know How To Make Badges
- 17:17 : Exabeam Extends Scope and Reach of SIEM Platform
- 17:5 : IT Security News Hourly Summary 2025-01-07 18h : 12 posts
- 16:32 : Chinese Tech Companies Tencent, CATL and Others Protest US Listings as Army-Linked Companies
- 16:31 : Agents, Robotics, and Auth – Oh My! | Impart Security
- 16:31 : Moxa Urges Immediate Updates for Security Vulnerabilities
- 16:11 : CISA Releases New Sector Specific Goals for IT and Product Design
- 16:11 : Security firm issues strong warning to Windows 10 users
- 16:11 : Trend Micro Contributes and Maps Container Security to MITRE ATT&CK: A Game-Changer for Cyber Defense
- 16:11 : McAfee launches scam detector to stop scams before they strike
- 16:10 : Enterprise cybersecurity hygiene checklist for 2025
- 16:10 : Nedap Librix Ecoreader
- 16:10 : ABB ASPECT-Enterprise, NEXUS, and MATRIX Series Products
- 16:10 : CISA Releases Two Industrial Control Systems Advisories
- 16:10 : Security Risk Advisors joins the Microsoft Intelligent Security Association
- 15:32 : Hackers Weaponize Security Testing By Weaponizing npm, PyPI, & Ruby Exploit Packages
- 15:31 : New FireScam Android Malware Abusing Firebase Services To Evade Detection
- 15:31 : Researchers Uncover Major Security Flaw in Illumina iSeq 100 DNA Sequencers
- 15:5 : EAGERBEE Malware Updated It’s Arsenal With Payloads & Command Shells
- 15:5 : Hackers Mimic Social Security Administration To Deliver ConnectWise RAT
- 15:5 : 1-15 October 2024 Cyber Attacks Timeline
- 15:4 : DEF CON’s hacker-in-chief faces fortune in medical bills after paralyzing neck injury
- 15:4 : T-Mobile Thwarts Cyberattack Amid Growing Telecom Threats
- 15:4 : Millions of Email Servers Found Vulnerable in Encryption Analysis
- 15:4 : Security Experts Warn of Brushing Scam Involving Unsolicited Packages
- 15:4 : UN aviation agency investigating possible data breach
- 14:31 : NETGEAR Armor, powered by Bitdefender, protects home networks against cyber threats
- 14:5 : IT Security News Hourly Summary 2025-01-07 15h : 8 posts
- 14:2 : CyTwist Launches Advanced Security Solution to identify AI-Driven Cyber Threats in minutes
- 14:2 : On SBOMs, BitBucket, and OWASP Dependency Track
- 14:2 : UN aviation agency ‘investigating’ security breach after hacker claims theft of personal data
- 13:32 : Brand Impersonation Scam Hijacks Travel Agency Accounts
- 13:32 : 5 browser extension rules to live by to keep your system safe in 2025
- 13:32 : IVPN Review: Pricing, Features, Pros, and Cons
- 13:32 : Dell, HPE, MediaTek Patch Vulnerabilities in Their Products
- 13:32 : Eliminate the Data Privacy Guesswork with a virtual Data Protection Officer (vDPO)
- 13:4 : Moxa router flaws pose serious risks to industrial environmets
- 13:4 : Washington Attorney General Sues T-Mobile Over 2021 Data Breach
- 13:4 : Why Traditional Fraud Scores Are No Longer Enough for Modern Threats
- 13:3 : How to use your Robots.txt to (even partially) block Bots from crawling your site
- 13:3 : Farewell to the Fallen: The Cybersecurity Stars We Lost Last Year
- 12:31 : CISA says Treasury was the only US agency breached via BeyondTrust
- 12:6 : Data Governance Challenges in the Age of Generative AI
- 12:6 : US Treasury Department Sanctions Chinese Company Over Cyberattacks
- 12:6 : Phishing Click Rates Triple in 2024
- 11:32 : Cybercrime in 2025: What to look out for
- 11:32 : New Orleans Attacker Wore Meta Smart Glasses
- 11:32 : Meta Appoints Trump Friend To Board
- 11:32 : Pentagon Adds Tencent, CATL To Military Blacklist
- 11:32 : CISA: No Federal Agency Beyond Treasury Impacted by BeyondTrust Incident
- 11:5 : IT Security News Hourly Summary 2025-01-07 12h : 4 posts
- 11:4 : University’s Critical Infrastructure Ransomware Attack Tracker Reaches 2,000 Incidents
- 10:32 : US Telecom Breaches Widen as 9 Firms Hit by Chinese Salt Typhoon Hackers
- 10:32 : McAfee Scam Detector spots scams across text, email, and video
- 10:31 : UK Government to Ban Creation of Explicit Deepfakes
- 10:2 : Silicon UK In Focus Podcast: Humanware in 2025
- 10:2 : 5 browser extension rules to keep your system safe in 2025
- 10:2 : AI moves to your PC with its own special hardware
- 10:2 : China Protests US Sanctions for Its Alleged Role in Hacking, Complains of Foreign Hacker Attacks
- 10:2 : CISA: No Wider Federal Impact from Treasury Cyber Attack, Investigation Ongoing
- 10:2 : New EAGERBEE Variant Targets ISPs and Governments with Advanced Backdoor Capabilities
- 10:2 : CISA Claims Treasury Breach Did Not Impact Other Agencies
- 9:32 : TikTok Preparing Mexico E-Commerce Launch As US Ban Looms
- 9:32 : Italy Negotiating 1.5bn Euro Government Comms Deal With Starlink
- 9:32 : Apple To Update AI After False Headlines Reported
- 9:32 : The Overlooked Risks of Open-Source Software in Industrial Security
- 9:31 : The 7 Stages NERC CIP Audit Preparation
- 9:6 : U.S. Sanctions Chinese Cybersecurity Firm Over Cyberattacks
- 9:6 : US adds Tencent to the list of companies supporting Chinese military
- 9:6 : Moxa Alerts Users to High-Severity Vulnerabilities in Cellular and Secure Routers
- 8:32 : China Aims To Deliver Open Source Chip This Year
- 8:32 : Brokers Key to Strengthening American Businesses’ Cyber Defenses
- 8:31 : Wallet drainer impact, U.S. telecom breach list grows, Moxa router vulnerabilities
- 8:5 : IT Security News Hourly Summary 2025-01-07 09h : 5 posts
- 8:2 : Dark Web Dangers Aren’t as Hidden as You Think
- 8:2 : Beware the Rise of the Autonomous Cyber Attacker
- 7:32 : Android Security Updates: Patch for Critical RCE Vulnerabilities
- 7:32 : US adds web and gaming giant Tencent to list of Chinese military companies
- 7:31 : Two Clicks to Chaos: How Double-clickjacking Hands Over Control of Apps without Users Knowing
- 7:4 : Eagerbee backdoor targets govt entities and ISPs in the Middle East
- 7:4 : Windows LDAP Denial of Service Vulnerability (CVE-2024-49113) Alert
- 6:32 : What to Do if a Healthcare Database Breach Occurs: A Step-by-Step Guide
- 6:32 : India’s Draft Digital Personal Data Protection Rules
- 6:32 : INDIA Enacts New Digital Data Protection Rules
- 6:4 : ICAO Investigates Data Breach as Hacker Claims to Sell Sensitive Data gained from Cyber Attack
- 6:4 : eBay CISO on managing long-term cybersecurity planning and ROI
- 6:4 : Making the most of cryptography, now and in the future
- 5:32 : Hackers Compromised Argentina’s Airport Security Payroll System
- 5:31 : Greece’s 2024 Cyber Threat Landscape: A Year of Increased and Varied Attacks
- 5:5 : IT Security News Hourly Summary 2025-01-07 06h : 6 posts
- 5:2 : Moxa Devices Vulnerable to Cyberattacks, Threatening Industrial Networks
- 5:2 : When is a RAT, not a RAT?
- 5:2 : Open source worldwide: Critical maintenance gaps exposed
- 5:2 : Cyberbro: Open-source tool extracts IoCs and checks their reputation
- 4:31 : PacketCrypt Classic Cryptocurrency Miner on PHP Servers, (Tue, Jan 7th)
- 4:31 : How AI and deepfakes are redefining social engineering threats
- 2:5 : IT Security News Hourly Summary 2025-01-07 03h : 1 posts
- 1:31 : ISC Stormcast For Tuesday, January 7th, 2025 https://isc.sans.edu/podcastdetail/9268, (Tue, Jan 7th)
- 23:5 : IT Security News Hourly Summary 2025-01-07 00h : 3 posts