42 posts were published in the last hour
- 18:31 : Japanese telecom giant NTT suffered a data breach that impacted 18,000 companies
- 18:31 : Latest PyPi Malware Steals Ethereum Private Keys, Developers Targeted
- 18:6 : 7 Weaponized Go Packages Attacking Linux & macOS To Install Hidden Malware Loader
- 18:6 : BSides Exeter 2024 – Keynote: Flushing Away Preconceptions Of Risk
- 17:32 : Sophisticated BEC Attack Exploits Business Trust to Steal Funds
- 16:32 : Kernel saunters – How Apple rearranged its XNU kernel with exclaves
- 16:7 : YouTube at 20: How the Viral Video Site Forever Changed User’s Content Consumption Habit
- 16:6 : U.S. Pauses Offensive Cyberoperations Against Russia Amid Security Concerns
- 14:31 : Malware Attack on Android TV Devices Affects Over 1.6 Million Users
- 14:31 : Scammers Still Use the Same Tricks, Just in New Ways
- 14:5 : IT Security News Hourly Summary 2025-03-08 15h : 1 posts
- 13:31 : What Happens When Push Notifications Go Malicious?
- 12:31 : They’re Not Hacking Your Systems, They’re Hacking Your People: The AI-Powered Crisis We’re Ignoring
- 12:31 : Top 50 Best Penetration Testing Companies – 2025
- 12:4 : Cybercriminals Allegedly Used a StubHub Backdoor to Steal Taylor Swift Tickets
- 11:32 : PoC Exploit Released for Actively Exploited Linux Kernel Out-Of-Bounds Write Vulnerability
- 11:31 : Malware Alert as Desert Dexter Strikes Over 900 Victims Worldwide
- 11:31 : Polish Space Agency “POLSA” Suffers Breach; System Offline
- 11:5 : IT Security News Hourly Summary 2025-03-08 12h : 2 posts
- 10:31 : 10 Best Penetration Testing Companies in 2025
- 10:6 : 10 Best Penetration Testing Companies & Services in 2025
- 8:11 : Developer sabotaged ex-employer with kill switch activated when he was let go
- 8:5 : IT Security News Hourly Summary 2025-03-08 09h : 2 posts
- 7:31 : AI and Automation: Key Pillars for Building Cyber Resilience
- 7:31 : Understanding Insider Threats With Eran Barak, CEO of MIND: Cyber Security Today for March 8, 2025
- 6:31 : Securing the Cloud Frontier: How Organizations Can Prepare for 2025 Threats
- 6:31 : Hackers Registered 10K Domains With Same Name for Smishing Attack Via iMessage
- 5:31 : Lumma Stealer Using Fake Google Meet & Windows Update Sites to Launch “Click Fix” Style Attack
- 5:31 : Lumma Stealer Launch “Click Fix” Style Attack via Fake Google Meet & Windows Update Sites
- 5:8 : AI’s Edge in Cybersecurity: How It’s Detecting Threats Before They Happen
- 2:5 : IT Security News Hourly Summary 2025-03-08 03h : 5 posts
- 2:2 : What are the best governance practices for managing NHIs?
- 2:2 : How can NHIs affect our overall threat landscape?
- 2:2 : How do I prioritize NHI risks in boardroom discussions?
- 1:32 : Feds Link $150M Cyberheist to 2022 LastPass Hacks
- 1:31 : Developer sabotaged ex-employer with kill switch that activated when he was let go
- 0:21 : MSPs, IT Pros & Compliance Leaders Unite at Kaseya’s Landmark Compliance Summit
- 23:32 : Getting Access to Internal Networks Via Physical Pentest – Case Study
- 23:31 : Threat Actors Leverage YouTubers to Attack Windows Systems Via SilentCryptoMiner
- 23:6 : CrowdStrike Competitors: Top Alternatives Reviewed
- 23:6 : BSides Exeter 2024 – Keynote: Become A Better Security Engineer (By Not Doing Security)
- 23:5 : IT Security News Hourly Summary 2025-03-08 00h : 2 posts