210 posts were published in the last hour
- 22:55 : IT Security News Daily Summary 2025-01-05
- 20:5 : IT Security News Hourly Summary 2025-01-05 21h : 1 posts
- 20:2 : Nuclei flaw allows signature bypass and code execution
- 19:4 : What are passkeys? How going passwordless can simplify your life in 2025
- 18:32 : WhatsApp Emerges as the Most Exploited Platform in Cyber Frauds
- 18:31 : Watch Out: Fake Game Invites on Discord Are Stealing Your Personal Data
- 18:31 : FBI Warns Against Public USB Charging Stations Due to “Juice Jacking” Threat
- 17:5 : IT Security News Hourly Summary 2025-01-05 18h : 2 posts
- 17:4 : Cyberattack on Cyberhaven Chrome Extension Exposes Sensitive Data
- 17:4 : SysBumps: A Groundbreaking KASLR Break Attack Targeting Apple Silicon macOS Devices
- 15:2 : Making FedRAMP ATOs Great with OSCAL and Components
- 11:32 : SECURITY AFFAIRS MALWARE NEWSLETTER – ROUND 27
- 11:5 : IT Security News Hourly Summary 2025-01-05 12h : 1 posts
- 10:32 : Security Affairs newsletter Round 505 by Pierluigi Paganini – INTERNATIONAL EDITION
- 8:31 : Shine the AI Light on Bank Wire Transfer Fraud
- 8:6 : The Impact of Risk-Based Vulnerability Management on Security Debt
- 6:4 : 2025-01-04: Four days of scans and probes and web traffic hitting my web server
- 0:31 : Malicious npm packages target Ethereum developers
- 0:2 : Confidently Secure: Leveraging PAM for Enhanced Protections
- 0:2 : Stay Assured: Critical Insights into Secrets Rotation
- 23:5 : IT Security News Hourly Summary 2025-01-05 00h : 2 posts
- 22:55 : IT Security News Daily Summary 2025-01-04
- 22:32 : DEF CON 32 – The Interplay between Safety and Security in Aviation Systems3
- 20:5 : IT Security News Hourly Summary 2025-01-04 21h : 2 posts
- 20:4 : Tenable CEO Amit Yoran dies
- 19:31 : US Treasury Department sanctioned Chinese cybersecurity firm linked to Flax Typhoon APT
- 19:4 : Tech Ventures: Israel Advances in Crypto Ecosystem
- 18:32 : OpenAI’s O3 Achieves Breakthrough in Artificial General Intelligence
- 18:32 : Are Passkeys the Future of Authentication? Current Hurdles Say Otherwise
- 18:11 : Privacy Roundup: Week 1 of Year 2025
- 17:6 : Gary Marcus – Taming Silicon Valley | Starmus Highlights
- 15:31 : Researchers Uncover Nuclei Vulnerability Enabling Signature Bypass and Code Execution
- 15:5 : Encryption backdoor debate ‘done and dusted,’ former White House tech advisor says
- 15:5 : Milwaukee Residents Warned of Parking Ticket Scam
- 15:5 : No More Internet Cookies? Digital Targeted Ads to Find New Ways
- 15:5 : 3 Critical Apache Flaws Discovered: Users Should Update to Avoid Major Risks
- 15:4 : Volkswagen Cybersecurity Breach Exposes Sensitive Vehicle Data
- 13:4 : New FireScam Infostealer Spyware Hits Android via Fake Telegram Premium
- 12:4 : Apple May Owe You $20 in a Siri Privacy Lawsuit Settlement
- 10:4 : Dutch Authority Flags Concerns Over AI Standardization Delays
- 10:4 : Third-Party Data Breaches Expose Cybersecurity Risks in EU’s Largest Firms
- 9:32 : U.S. Sanctions Chinese Cybersecurity Firm for State-Backed Hacking Campaigns
- 9:32 : PLAYFULGHOST Delivered via Phishing and SEO Poisoning in Trojanized VPN Apps
- 9:7 : Atos denies Space Bears’ ransomware claims – with a ‘but’
- 8:5 : IT Security News Hourly Summary 2025-01-04 09h : 2 posts
- 8:4 : What We Know About CVE-2024-49112 and CVE-2024-49113
- 7:32 : U.S. Treasury Sanctions Beijing Cybersecurity Firm for State-Backed Hacking Campaigns
- 3:32 : Ensure Your Data’s Safety: Best Practices in Cloud Security
- 3:32 : Feel Relieved: Advanced Secrets Management Techniques
- 0:5 : Week in Review: China hacks Treasury, Chrome extension hijack, tanker sabotages cables
- 23:32 : FireScam Android info-stealing malware supports spyware capabilities
- 23:5 : IT Security News Hourly Summary 2025-01-04 00h : 3 posts
- 23:2 : Imperva’s Wildest 2025 AppSec Predictions
- 22:55 : IT Security News Daily Summary 2025-01-03
- 22:32 : Friday Squid Blogging: Anniversary Post
- 22:4 : DEF CON 32 – The Past, Present, and Future of Bioweapons
- 21:31 : Legacy App Migration: Transforming Outdated Systems
- 20:32 : Top Tips for Weather API Integration and Data Utilization
- 20:32 : Richmond University Medical Center data breach impacted 674,033 individuals
- 20:7 : AI Pulse: Top AI Trends from 2024 – A Look Back
- 20:6 : Best of 2024: If You are Reachable, You Are Breachable, and Firewalls & VPNs are the Front Door
- 17:32 : A New Dawn for Storytelling: The Intersection of AI and Cinema
- 17:32 : How To Use SCP (Secure Copy) With SSH Key Authentication
- 17:5 : IT Security News Hourly Summary 2025-01-03 18h : 10 posts
- 17:2 : US sanctions Chinese cyber firm linked to Flax Typhoon hacks
- 17:2 : “Can you try a game I made?” Fake game sites lead to information stealers
- 17:2 : Rising GPS Interference Threatens Global Aviation and Border Security
- 17:2 : US Sanctions Chinese Cybersecurity Firm for Global Botnet Attacks
- 16:32 : Why Configurations Are the Wrong Thing to Get Wrong
- 16:32 : Android Smartphones Revolutionize Ionosphere Mapping
- 16:32 : 2024 CrowdStrike Outage Reveals Critical IT Vulnerabilities
- 16:6 : Budget boost required to tackle AI generative cyber attacks
- 16:6 : US Appeals Court Blocks Biden Attempt To Restore Net Neutrality Rules
- 16:6 : Californians Say X Blocked Them From Viewing Amber Alert About Missing 14-Year-Old
- 15:32 : Cyber Security 2025: Navigating the Evolving Threat Landscape
- 15:5 : LegionLoader Abusing Chrome Extensions To Deliver Infostealer Malware
- 15:4 : Online gift card store exposed hundreds of thousands of people’s identity documents
- 15:4 : ShredOS
- 15:4 : Best of 2024: So-Phish-ticated Attacks
- 15:4 : Atos Group Denies Space Bears’ Ransomware Attack Claims
- 14:32 : US Mulls Restrictions On Chinese Drones
- 14:32 : Hackers Using AWS Tools To Exploit Compromised Credentials
- 14:5 : IT Security News Hourly Summary 2025-01-03 15h : 7 posts
- 14:4 : This Trusted App Helps Sluggish PCs Work Faster
- 13:32 : How to Fix a Water-Damaged Phone in 7 Steps
- 13:32 : Do Kwon Pleads Not Guilty In US Court
- 13:32 : Ensuring HIPAA Compliance with Secure Remote Access
- 13:32 : Siri’s secret recordings lead to a $95 million settlement. Could you get a share?
- 13:32 : CAPTCHAs now run Doom – on nightmare mode
- 13:5 : Boffins carve up C so code can be converted to Rust
- 13:4 : In Other News: Volkswagen Data Leak, DoubleClickjacking, China Denies Hacking US Treasury
- 13:4 : Consent Phishing: The New, Smarter Way to Phish
- 12:32 : Apple will pay $95 Million to settle lawsuit over Siri’s alleged eavesdropping
- 12:32 : FireScam Android Malware Packs Infostealer, Spyware Capabilities
- 12:32 : Crypto Boss Extradited to Face $40bn Fraud Charges
- 12:2 : Facebook and Instagram Ads Push Gun Silencers Disguised as Car Parts
- 12:2 : GMF Group (Led by Matt Forssman and Gabriel Monfried) Acquires Arcadia Estates in Arcadia, Florida
- 12:2 : Exploit Code Published for Potentially Dangerous Windows LDAP Vulnerability
- 11:32 : Data Scraping in 2025: Trends, Tools, and Best Practices
- 11:32 : Sophos Firewall Vulnerabilities Could Allow Remote Attacks
- 11:32 : NPM Package Disguised as an Ethereum Tool Deploys Quasar RAT
- 11:32 : US Imposes Sanctions on Russian and Iranian Groups Over Disinformation Targeting American Voters
- 11:32 : New AI Jailbreak Method ‘Bad Likert Judge’ Boosts Attack Success Rates by Over 60%
- 11:31 : DDoS Disrupts Japanese Mobile Giant Docomo
- 11:5 : IT Security News Hourly Summary 2025-01-03 12h : 5 posts
- 11:2 : ASUS Critical Vulnerabilities Let Attackers Execute Arbitrary Commands
- 11:2 : New York Hospital Says Ransomware Attack Data Breach Impacts 670,000
- 11:2 : Web3 Attacks Result in $2.3Bn in Cryptocurrency Losses
- 10:31 : LDAPNightmare, a PoC exploit targets Windows LDAP flaw CVE-2024-49113
- 10:31 : Apple Agrees $95M Settlement Over Siri Privacy Violations
- 9:33 : Around 3.3 million POP3 and IMAP mail servers lack TLS encryption
- 9:33 : US Confirms Russian GenAI Disinformation Op Targeted Election
- 9:6 : Configurations Mega Blog: Why Configurations Are the Wrong Thing to Get Wrong
- 9:6 : GLAMIRA – 999,999 breached accounts
- 9:6 : The Critical Risk of Using Dummy Email Domains in Payment Gateways
- 8:39 : LDAPNightmare PoC Exploit Crashes LSASS and Reboots Windows Domain Controllers
- 8:39 : China hacks Treasury, Russian tanker sabotage, Lumen ejects Typhoon
- 8:5 : IT Security News Hourly Summary 2025-01-03 09h : 6 posts
- 8:4 : TotalAV VPN vs Surfshark: Which VPN Should You Choose?
- 7:32 : Critical Deadline: Update Old .NET Domains Before January 7, 2025 to Avoid Service Disruption
- 7:11 : SwaetRAT Delivery Through Python, (Fri, Jan 3rd)
- 7:11 : Apple accused of collecting user data from Siri queries
- 7:11 : Apple Agrees to $95M Settlement Over Siri Privacy Lawsuit
- 7:10 : NTT Docomo Hit by DDoS Attack, Services Disrupted for 11 Hours
- 6:36 : Diving into Azure Lateral Movement with Pass-the-PRT
- 6:36 : Hackers Use Russian Domains for Phishing Attacks
- 6:11 : iTerm2 Emulator Vulnerability Let Attackers Access Sensitive User Data
- 6:10 : Apple to Pay Siri Users $20 Per Device in Settlement Over Accidental Siri Privacy Violations
- 6:10 : Cloudflare’s VPN app among half-dozen pulled from Indian app stores
- 6:10 : The modern CISO is a cornerstone of organizational success
- 5:32 : 2024 Year in Review (Part 2)
- 5:31 : Best practices for ensuring a secure browsing environment
- 5:13 : Every minute, 4,080 records are compromised in data breaches
- 5:5 : IT Security News Hourly Summary 2025-01-03 06h : 1 posts
- 4:6 : Deepfakes question our ability to discern reality
- 2:32 : Apple to Pay $95 Million to Settle Lawsuit Accusing Siri of Snoopy Eavesdropping
- 0:7 : Dozens of Chrome extensions hacked in threat campaign
- 23:5 : IT Security News Hourly Summary 2025-01-03 00h : 5 posts
- 23:4 : Chinese cyber-spies reportedly targeted sanctions intel in US Treasury raid
- 23:4 : PCI DSS 4.0.1: A Comprehensive Guide to Successfully Meeting Requirements 6.4.3 and 11.6.1
- 22:55 : IT Security News Daily Summary 2025-01-02
- 22:32 : ZDNET joins CNET Group to award the Best of CES, and you can submit your entry now
- 22:31 : A US soldier was arrested for leaking presidential call logs
- 22:4 : Apple offers to settle ‘snooping Siri’ lawsuit for an utterly incredible $95M
- 21:32 : Top 7 enterprise cybersecurity challenges in 2025
- 21:32 : Apple agrees to settle Siri-snooping lawsuit for $95M
- 21:32 : Best of 2024: National Public Data (NPD) Breach: Essential Guide to Protecting Your Identity
- 21:6 : DEF CON 32 – War Games Red Team for OT Based on Real World Case Studies
- 20:32 : Apple settles Siri lawsuit for $95 million – here’s how much you could get
- 20:32 : New details emerge in Cybertruck explosion outside Trump hotel in Vegas that left 1 dead, 7 injured
- 20:32 : Google Is Allowing Device Fingerprinting
- 20:9 : IBM, GlobalFoundries Settle Respective Lawsuits
- 20:9 : Optimizing GitHub Access Management for Enterprises: Enhancing Security, Scalability, and Continuity with Jenkins GitHub App Authentication and Load Balancing
- 20:9 : China-Linked Cyber Threat Group Hacks US Treasury Department
- 20:9 : Cybertruck explosion outside Trump hotel in Vegas leaves 1 dead, 7 injured
- 20:8 : Breaking Encryption: How To Prepare For Tomorrow’s Quantum Risk Today
- 20:5 : IT Security News Hourly Summary 2025-01-02 21h : 1 posts
- 19:6 : Fake 7-Zip Exploit Code Traced to AI-Generated Misinterpretation
- 18:32 : DoubleClickjacking allows clickjacking on major websites
- 18:32 : Randall Munroe’s XKCD ‘Lasering Incidents’
- 18:32 : AT&T Confirms Cyberattack Amid Salt Typhoon Hacking Incident
- 18:31 : RBI Report Highlights Rising Fraud Incidents and Financial Impact
- 18:4 : China Proposes Further Export Restrictions On Critical Mineral Tech, Batteries
- 18:4 : Software Development Trends to Follow in 2025
- 18:4 : 3 things to consider when buying a new VPN – and why ‘free’ isn’t always best
- 18:4 : Transforming Cybersecurity Protocols for US Healthcare Systems
- 17:32 : The Future of Mobile Security: Challenges and Solutions
- 17:31 : Apple Pays $95 Million To Settle Siri Lawsuit
- 17:31 : Global Campaign Targets PlugX Malware with Innovative Portal
- 17:6 : DEF CON 32 – V2GEvil: Ghost in the Wires
- 17:5 : IT Security News Hourly Summary 2025-01-02 18h : 3 posts
- 16:31 : US Solider Arrested After Allegedly Posting Trump, Harris Call Logs
- 16:31 : New DoubleClickjacking Attack Bypasses Protections
- 16:6 : Japan NTT Docomo Telecom hit by DDOS Attack
- 15:32 : Best of 2024: Cisco Vulnerability: CISA Alerts Of Smart Install Exploits
- 15:31 : Palo Alto Networks Alerts on Exploit Causing Firewall Vulnerabilities
- 15:5 : Treasury Department breached through BeyondTrust service
- 15:5 : US Arrests Army Soldier Over AT&T, Verizon Hacking
- 15:5 : Understanding Ransomware: A Persistent Cyber Threat
- 15:4 : General Dynamics Confirms Data Breach Via Phishing Campaign
- 14:32 : Russian media outlets Telegram channels blocked in European countries
- 14:32 : US Arrests, Charges Army Soldier Suspected of Extorting AT&T, Verizon
- 14:32 : HIPAA Rules Update Proposed to Combat Healthcare Data Breaches
- 14:6 : Severe Security Flaws Patched in Microsoft Dynamics 365 and Power Apps Web API
- 13:4 : Apple Offers iPhone Discounts In China – Report
- 13:4 : New PLAYFULGHOST Malware Hacking Devices To Remotely Capture Audio Recordings
- 13:4 : PoC Exploit Released For Critical Windows LDAP RCE Vulnerability
- 13:4 : Building Cyber Resilience with Trofi Security and Check Point
- 13:4 : EU Officially Announce USB-C as Global Charging Standard
- 12:32 : Explosion Outside Trump Hotel Kills Cybertruck Driver
- 12:32 : Windows 11 BitLocker Encryption Bypassed to Extract Full Volume Encryption Keys
- 12:32 : Researchers Uncover Phishing-As-A-Service Domains Associated With Tycoon 2FA
- 12:6 : Goodware Hash Sets, (Thu, Jan 2nd)
- 12:6 : Navigating the Cybersecurity Landscape: Insights on AI, FTC Safeguards, and Building Resilient Cyber Cultures
- 11:32 : Three Russian-German nationals charged with suspicion of secret service agent activity
- 11:32 : Cross-Domain Attacks: A Growing Threat to Modern Security and How to Combat Them
- 11:32 : Hackers Leak Rhode Island Citizens’ Data on Dark Web
- 11:7 : SmuggleShield – Browser Extension to Detect HTML Smuggling Attacks
- 11:5 : IT Security News Hourly Summary 2025-01-02 12h : 4 posts
- 10:32 : NHS intends to sell patient data to meet the expenses
- 10:31 : Dozens of Chrome Browser Extensions Hijacked by Data Thieves
- 10:5 : Understanding AI in Network Security
- 10:5 : Advice for Exponential Organizations: Intersecting Agile and Incident Response
- 10:5 : US Treasury Computers Accessed by China in Supply Chain Attack
- 9:32 : Chinese government hackers reportedly targeted US Treasury’s sanctions office during December cyberattack
- 9:31 : Lumen reports that it has locked out the Salt Typhoon group from its network
- 9:4 : EC2 Grouper Hackers Using AWS Tools To Exploit Compromised Credentials
- 9:4 : TechRepublic Premium Editorial Calendar: Policies, Hiring Kits, and Glossaries for Download
- 8:32 : Three Russian-German Nationals Charged with Espionage for Russian Secret Service
- 8:31 : Malicious Obfuscated NPM Package Disguised as an Ethereum Tool Deploys Quasar RAT