47 posts were published in the last hour
- 21:4 : Hacktivism is back – but don’t be fooled, it’s often state-backed goons in masks
- 19:34 : Malicious PyPi Package ‘disgrasya’ Exploits WooCommerce Stores for Card Fraud, Downloaded Over 34,000 Times
- 17:34 : Researchers Unearth a Massive Data Leak Within Apollo Hospitals
- 17:34 : Cybercriminal Group’s Website Taken Over by Unknown Hacker
- 17:5 : IT Security News Hourly Summary 2025-04-13 18h : 4 posts
- 16:32 : BSidesLV24 – Breaking Ground – 14 Years Later, Proving Ground Is Proving Out. A Panel Discussion With PG Alumni And Staff
- 15:39 : Hackers Mimic Google Chrome Install Page on Google Play to Deploy Android Malware
- 15:38 : Cybersecurity Weekly Recap: Key Updates on Attacks, Vulnerabilities, & Data Breaches
- 15:38 : Threat Actors Manipulate Search Results to Direct Users to Malicious Websites
- 15:6 : Threat Research is Broken – Security Teams Need Automation Now
- 14:5 : IT Security News Hourly Summary 2025-04-13 15h : 4 posts
- 14:2 : RansomHub Ransomware Group Compromised 84 Organization, New Groups Emerging
- 14:2 : HelloKitty Ransomware Resurafced Targeting Windows, Linux, & ESXi Environments
- 14:2 : Dangling DNS Attack Let Hackers Gain Control Over Organization’s Subdomain
- 13:4 : The Invisible Fingerprint in Code
- 13:4 : Europcar GitLab Breach Exposes Sensitive User Data and Configuration Files
- 13:4 : New Sec-Gemini v1 from Google Outperforms Cybersecurity Rivals
- 12:32 : SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 41
- 11:34 : Critical Patient Data Exposed: 1.6 Million Affected in Widespread Healthcare Cyber Attack
- 11:34 : Security Affairs newsletter Round 519 by Pierluigi Paganini – INTERNATIONAL EDITION
- 11:9 : Radiant Security Unveils Its Groundbreaking Adaptive AI SOC Platform
- 11:5 : IT Security News Hourly Summary 2025-04-13 12h : 3 posts
- 10:32 : Threat Actors Actively Attacking Semiconductor Companies With 0-Day Exploits
- 10:32 : Threat Actors Use Email Bombing Attacks to Bypass Security Tools & Hide Activity
- 9:32 : Threat Actors Hijack Legitimate Crypto Packages to Inject Malicious Code
- 9:32 : Tycoon 2FA Phishing Kit Employs New Evasion Techniques to Bypass Endpoint Detection Systems
- 9:31 : Hackers Actively Exploiting Router Vulnerabilities to Attack Enterprise Networks
- 8:42 : China admitted its role in Volt Typhoon cyberattacks on U.S. infrastructure
- 8:41 : Week in review: Microsoft patches exploited Windows CLFS 0-day, WinRAR MotW bypass flaw fixed
- 8:5 : IT Security News Hourly Summary 2025-04-13 09h : 2 posts
- 7:41 : Understanding Multifactor Authentication (MFA): A Simple Guide
- 7:41 : Chinese eCrime Hacker Group Attacking Users in 120+ Coutries to Steal Banking Credentials
- 7:41 : TROX Stealer Exfiltrate Sensitive Data Including Stored Credit Cards & Browser Credentials
- 7:4 : The Oracle Breach Is Bigger Than You Think—5 Urgent Steps to Take Now
- 6:36 : Why CISOs Are Betting Big on AI, Automation & Zero Trust
- 5:31 : STRIDE GPT – AI-powered Tool LLMs To Generate Threat Models
- 2:34 : Samsung Germany Customer Tickets – 216,333 breached accounts
- 2:5 : IT Security News Hourly Summary 2025-04-13 03h : 4 posts
- 2:4 : Homeland Security Email Tells a US Citizen to ‘Immediately’ Self-Deport
- 1:2 : ViperSoftX Malware Attacking Users via Cracked Software
- 1:2 : Shuckworm Group Uses PowerShell Based GammaSteel Malware in Targeted Attacks
- 0:34 : Exploit Attempts for Recent Langflow AI Vulnerability (CVE-2025-3248), (Sat, Apr 12th)
- 0:34 : 100,000 WordPress Sites Vulnerable to Rogue Creation Vulnerability
- 23:5 : IT Security News Hourly Summary 2025-04-13 00h : 1 posts
- 23:4 : Exploring Innovative NHIs Lifecycle Management Solutions
- 23:4 : Rest Assured with Top-tier Cloud-Native Security
- 22:55 : IT Security News Daily Summary 2025-04-12