36 posts were published in the last hour
- 21:11 : APIsec Secures Exposed Customer Data After Unprotected Database Found Online
- 21:10 : Turned Into a Ghibli Character? So Did Your Private Info
- 19:31 : A flaw in Verizon’s iOS Call Filter app exposed call records of millions
- 17:5 : IT Security News Hourly Summary 2025-04-05 18h : 2 posts
- 16:8 : Oracle Finally Acknowledges Cloud Hack
- 16:8 : Microsoft Credits EncryptHub, Hacker Behind 618+ Breaches, for Disclosing Windows Flaws
- 15:32 : BSidesLV24 – HireGround – Tracking And Hacking Your Career
- 15:8 : North Korean Hackers Deploy BeaverTail Malware via 11 Malicious npm Packages
- 14:6 : “Clipboard Hijacking” A Fake CAPTCHA Leverage Pastejacking Script Via Hacked Sites To Steal Clipboard Data
- 14:6 : Speaking the Board’s Language: A CISO’s Guide to Securing Cybersecurity Budget
- 14:5 : IT Security News Hourly Summary 2025-04-05 15h : 1 posts
- 13:36 : Phishing Scams Are Getting Smarter – And More Subtle : Here’s All You Need to Know
- 13:36 : Hackers Can Spy on Screens Using HDMI Radiation and AI Models
- 12:33 : Trump EO Presses States to Bear the Weight of CI Resilience
- 11:8 : NSA Chief Ousted Amid Trump Loyalty Firing Spree
- 11:5 : IT Security News Hourly Summary 2025-04-05 12h : 1 posts
- 10:36 : Port of Seattle ‘s August data breach impacted 90,000 people
- 10:6 : Malicious Python Packages on PyPI Downloaded 39,000+ Times, Steal Sensitive Data
- 9:33 : “IngressNightmare” Critical RCE Vulnerabilities in Kubernetes NGINX Clusters Let Attackers Gain Full Control
- 8:33 : Securely Deploying and Running Multiple Tenants on Kubernetes
- 8:5 : IT Security News Hourly Summary 2025-04-05 09h : 3 posts
- 7:34 : Massive Data Breach at Samsung Exposes 270000 Records
- 7:4 : Sec-Gemini v1 – Google Released a New AI Model for Cybersecurity
- 7:4 : Cybersecurity Month-End Review: Oracle Breach, Signal Group Chat Incident, and Global Cybersecurity Regulations
- 6:33 : Don’t Wait for The Next IT Audit To Address High-Risk Threats
- 5:34 : 20+ RSAC Things (and Places) You Should Know
- 5:34 : Revolution or Hype? Meet the AI Agent That’s Automating Invoicing for Thousands
- 2:32 : Are You Certain Your Secrets Are Safe?
- 2:31 : How NHIs Can Deliver Real Business Value
- 2:31 : Satisfied with Your NHI Lifecycle Management?
- 1:31 : DMARC Adoption in U.S. and Canada Higher Education Sector
- 23:13 : Microsoft Celebrates 50th Anniversary!
- 23:13 : CISA Adds Actively Exploits Ivanti Connect Secure Vulnerability in Known Exploited Catalog
- 23:5 : IT Security News Hourly Summary 2025-04-05 00h : 4 posts
- 22:55 : IT Security News Daily Summary 2025-04-04
- 22:31 : Cisco: Fine-tuned LLMs are now threat multipliers—22x more likely to go rogue