149 posts were published in the last hour
- 22:11 : DEF CON 32 – Signature-Based Detection Using Network Timing
- 21:34 : Chinese Innovations Spawn Wave of Toll Phishing Via SMS
- 21:34 : Prominent US law firm Wolf Haldenstein disclosed a data breach
- 21:11 : Super bowl scams—How to avoid getting sacked by cybercriminals
- 21:11 : OSV-SCALIBR: A library for Software Composition Analysis
- 20:11 : Choosing the Right Third-Party Risk Management Company for Your Business
- 20:5 : IT Security News Hourly Summary 2025-01-16 21h : 6 posts
- 19:36 : Find the helpers
- 19:36 : Russia’s Star Blizzard phishing crew caught targeting WhatsApp accounts
- 19:36 : New Star Blizzard spear-phishing campaign targets WhatsApp accounts
- 19:36 : Russian Star Blizzard Shifts Tactics to Exploit WhatsApp QR Codes for Credential Harvesting
- 19:11 : Akamai Named a Major Player in IDC MarketScape: Worldwide Public Cloud IaaS 2025 Assessment
- 19:11 : TikTok Prepares To Shutdown App In US On Sunday – Report
- 18:36 : CISA Calls For Action to Close the Software Understanding Gap
- 18:36 : Randall Munroe’s XKCD ‘Radon’
- 18:11 : BT Abandons Plan To Turn Roadside Cabinets Into EV Chargers
- 18:11 : Systemic Risk Reporting: A System in Crisis?
- 18:11 : Enzo Biochem settles lawsuit over 2023 ransomware attack for $7.5M
- 18:11 : Middle Eastern Real Estate Fraud Grows with Online Listings
- 18:11 : Connect with us at FOSDEM
- 17:32 : Akamai API Security Release 3.41
- 17:32 : Siemens SIPROTEC 5 Products
- 17:32 : Siemens Siveillance Video Camera
- 17:32 : CISA Releases Twelve Industrial Control Systems Advisories
- 17:32 : Fuji Electric Alpha5 SMART
- 17:32 : Hitachi Energy FOX61x Products
- 17:32 : Cisco Unveils New AI Application Security Solution
- 17:11 : Biden Signs Executive Order To Bolster US Cyber Defences
- 17:11 : Borderless AI emerges from stealth with $32M in funding to disrupt HR tech
- 17:11 : Winning the war against adversarial AI needs to start with AI-native SOCs
- 17:11 : How a Large Healthcare Company Slashed Their Secrets Incidents by Half
- 17:11 : Trump’s Truth Social Users Targeted by Rampant Scams Online
- 17:5 : IT Security News Hourly Summary 2025-01-16 18h : 14 posts
- 16:38 : Wordfence Intelligence Weekly WordPress Vulnerability Report (January 6, 2025 to January 12, 2025)
- 16:38 : The mystery of the $75M ransom payment to Dark Angels
- 16:38 : Clop Ransomware exploits Cleo File Transfer flaw: dozens of claims, disputed breaches
- 16:38 : Cybersecurity rethink – from reaction to resilience
- 16:38 : Biden Tightens Software Supply Chain Security Requirements Ahead of Trump Takeover
- 16:11 : GoDaddy falls into FTC Data Breach radar
- 16:11 : Age Verification For Porn Websites Needed By July, Ofcom Warns
- 16:11 : ISO 27001 vs SOC 2: Understanding the Differences
- 16:11 : The best password manager for families in 2025: Expert tested and reviewed
- 16:11 : Avery had credit card skimmer stuck on its site for months
- 16:11 : Russian Cyberspies Caught Spear-Phishing with QR Codes, WhatsApp Groups
- 16:11 : HexaLocker V2: A More Sophisticated Threat in the Ransomware Landscape
- 16:11 : Rajasthan Police Arrest 30 in ₹30 Crore Cyber Fraud Under ‘Operation Cyber Shield’
- 16:11 : Researchers Hijack Hacker Backdoors Through Abandoned Infrastructure
- 15:32 : Forging National Resilience for an Era of Disruption
- 15:32 : Raspberry Pi hands out prizes to all in the RP2350 Hacking Challenge
- 15:32 : New Crypto Threat: Transaction Simulation Spoofing Leads to $460,000 Ethereum Theft
- 15:11 : Cybersecurity: How to Involve People in Risk Mitigation
- 15:11 : Critical SimpleHelp vulnerabilities fixed, update your server instances!
- 15:11 : DORA Compliance Costs Soar Past €1m for Many UK and EU Businesses
- 14:11 : German Defence, Foreign Ministries Depart X
- 14:11 : Clop ransomware gang names dozens of victims hit by Cleo mass-hack, but several firms dispute breaches
- 14:11 : Millions of Internet Hosts Vulnerable to Attacks Due to Tunneling Protocol Flaws
- 14:11 : Concentric AI helps organizations gain a complete understanding of their data
- 14:5 : IT Security News Hourly Summary 2025-01-16 15h : 10 posts
- 13:36 : An honest mistake – and a cautionary tale
- 13:36 : Network Detection and Response (NDR) Done Right from the Ground Up
- 13:36 : Ready to Simplify Trust Management? Join Free Webinar to See DigiCert ONE in Action
- 13:11 : Why Security Providers Choose Check Point
- 13:11 : FunkSec: The Rising Yet Controversial Ransomware Threat Actor Dominating December 2024
- 13:11 : SWARM: Pioneering The Future of Autonomous Drone Operations and Electronic Warfare
- 13:11 : Wultra Raises €3 Million for Post-Quantum Authentication
- 13:11 : 10 Essential GRC Policy Management Best Practices
- 13:11 : What is an Uncensored Model and Why Do I Need It
- 13:11 : New Hacking Group Leaks Configuration of 15,000 Fortinet Firewalls
- 12:34 : FBI Deletes PlugX Malware from Thousands of Computers
- 12:34 : North Korean Hackers Targeting Freelance Software Developers
- 12:34 : Hackers Hide Malware in Images to Deploy VIP Keylogger and 0bj3ctivity Stealer
- 12:34 : Researchers Find Exploit Allowing NTLMv1 Despite Active Directory Restrictions
- 12:34 : New UEFI Secure Boot Vulnerability Could Allow Attackers to Load Malicious Bootkits
- 12:34 : The $10 Cyber Threat Responsible for the Biggest Breaches of 2024
- 12:34 : Hackers Use Image-Based Malware and GenAI to Evade Email Security
- 12:34 : GoDaddy Accused of Serious Security Failings by FTC
- 12:11 : Blue Origin New Glenn Rocket Blasts Off In Challenge To SpaceX
- 12:11 : Hackers Exploiting California Wildfire Sparks to Launching Phishing Attacks
- 12:11 : Google Ads Under Attack: Cyber Criminals Exploit Accounts For Malvertising
- 12:11 : Biden’s Cyber Ambassador Urges Trump Not to Cede Ground to Russia and China in Global Tech Fight
- 12:11 : Cyber Insights 2025: Identities
- 11:37 : 6 Strategic Innovations Transforming the Fintech Industry
- 11:37 : GitHub’s Deepfake Porn Crackdown Still Isn’t Working
- 11:36 : MikroTik botnet relies on DNS misconfiguration to spread malware
- 11:36 : 16-31 October 2024 Cyber Attacks Timeline
- 11:36 : Data From 15,000 Fortinet Firewalls Leaked by Hackers
- 11:36 : Configuration files for 15,000 Fortinet firewalls leaked. Are yours among them?
- 11:36 : Contrast Security AVM identifies application and API vulnerabilities in production
- 11:36 : First Bitwarden password manager update of 2025 improves password auto-fill
- 11:11 : FTC Slams GoDaddy For Not Implement Standard Security Practices Following Major Breaches
- 11:11 : New Botnet Exploiting DNS Records Misconfiguration To Deliver Malware
- 11:11 : AIRASHI Botnet Exploiting 0DAY Vulnerabilities In Large Scale DDoS Attacks
- 11:11 : The Truth of the Matter: Scammers Targeting Truth Social Users
- 11:11 : Google Ads Under Attack: Criminals Exploit Accounts for Profit
- 11:11 : A New Jam-Packed Biden Executive Order Tackles Cybersecurity, AI, and More
- 11:11 : Infoseccer: Private security biz let guard down, exposed 120K+ files
- 11:11 : 2024 US Healthcare Data Breaches: 585 Incidents, 180 Million Compromised User Records
- 11:5 : IT Security News Hourly Summary 2025-01-16 12h : 5 posts
- 10:34 : Thousands of PHP-based Web Applications Exploited to Deploy Malware
- 10:34 : New UEFI Secure Boot bypass vulnerability discovered (CVE-2024-7344)
- 10:11 : Sneaky 2FA: exposing a new AiTM Phishing-as-a-Service
- 10:11 : 7 ways to get more out of your Bitwarden password manager
- 10:11 : PlugX malware deleted from thousands of systems by FBI
- 9:32 : Scammers Exploit California Wildfires, Posing as Fire Relief Services
- 9:32 : Cybersecurity and AI: What does 2025 have in store?
- 9:32 : Your Ultimate Guide to NIS2 Compliance: Key Steps and Insights
- 9:32 : HarvestIQ.ai provides actionable insights for cybersecurity professionals
- 9:31 : Cisco AI Defense safeguards against the misuse of AI tools
- 9:11 : Regula enhances Document Reader SDK with full support for Digital Travel Credentials
- 8:34 : Webinar: Amplifying SIEM with AI-driven NDR for IT/OT convergence
- 8:34 : Red Hat Connectivity Link enhances security across multiple layers of application infrastructure
- 8:34 : Entrust PKI Hub streamlines PKI, certificate lifecycle management, and automation
- 8:34 : EU To Launch New Support Centre by 2026 to Boost Healthcare Cybersecurity
- 8:34 : Get Meta out of your life, GoDaddy slapped, TikTok could stay alive
- 8:11 : W3 Total Cache Plugin Vulnerability Let Attackers Gain Unauthorized Access to Sensitive Data
- 8:11 : Infectious Prompt Injection Attacks on Multi-Agent AI Systems
- 8:11 : Researcher Uncovers Critical Flaws in Multiple Versions of Ivanti Endpoint Manager
- 8:11 : Python-Based Malware Powers RansomHub Ransomware to Exploit Network Flaws
- 8:5 : IT Security News Hourly Summary 2025-01-16 09h : 1 posts
- 7:38 : Veeam Azure Backup Vulnerability Allows Attackers to Utilize SSRF & Send Unauthorized Requests
- 6:34 : Microsoft Patches Outlook Zero-Click RCE Exploited Via Email – Patch Now!
- 6:11 : North Korea targeting software developers with Malware
- 6:11 : CISA Released Guide to Microsoft Expanded Cloud Playbook
- 6:11 : Apple Announces Information Security Internship For Students – Apply Now
- 6:11 : O’Reilly 2025 Tech Trends: AI Skills Surge as Security Takes Center Stage
- 5:11 : DOJ, FBI Dismantle Malware Used by China-Backed Hackers in Global Operation
- 5:11 : Critical Infrastructure Embraces CISA CyHy Service
- 5:11 : A humble proposal: The InfoSec CIA triad should be expanded
- 5:11 : How CISOs can elevate cybersecurity in boardroom discussions
- 5:5 : IT Security News Hourly Summary 2025-01-16 06h : 3 posts
- 4:32 : UK Government Seeking to ‘Turbocharge’ Growth Through AI
- 4:32 : RansomHub Affiliates Exploit AI-Generated Python Backdoor in Advanced Cyberattacks
- 4:31 : Critical vulnerabilities remain unresolved due to prioritization gaps
- 3:34 : Le Coq Sportif Columbia – 79,712 breached accounts
- 3:34 : News alert: Wultra secures €3M funding to help financial firms mitigate coming quantum threats
- 3:34 : News alert: Sweet Security’s LLM-powered detection engine reduces cloud noise to 0.04%
- 3:34 : News alert: Aembit announces speakers for NHIcon event, highlighting non-human identity security
- 3:34 : 7 Essential Security Operations Center Tools for 2025
- 3:11 : Extracting Practical Observations from Impractical Datasets, (Thu, Jan 16th)
- 3:11 : Preventing unintended encryption of Amazon S3 objects
- 2:38 : Head of US Cybersecurity Agency Says She Hopes It Keeps up Election Work Under Trump
- 2:5 : IT Security News Hourly Summary 2025-01-16 03h : 2 posts
- 1:36 : 2022 zero day was used to raid Fortigate firewall configs. Somebody just released them.
- 1:11 : GSocket Gambling Scavenger – How Hackers Use PHP Backdoors and GSocket to Facilitate Illegal Gambling in Indonesia
- 0:36 : Building resilience with AI threat modeling: Lessons from the Rate Companies
- 0:36 : Threat actor leaked config files and VPN passwords for over Fortinet Fortigate devices
- 0:11 : Cisco AI cybersecurity launch touts shadow AI defense
- 0:11 : GoDaddy slapped with wet lettuce for years of lax security and ‘several major breaches’
- 23:5 : IT Security News Hourly Summary 2025-01-16 00h : 6 posts