210 posts were published in the last hour
- 22:55 : IT Security News Daily Summary 2025-01-12
- 22:11 : The Metaverse Will Become More Popular Than the Real World: Will Reality Disappear?
- 21:11 : Pro-Russia hackers NoName057 targets Italy again after Zelensky’s visit to the country
- 20:5 : IT Security News Hourly Summary 2025-01-12 21h : 3 posts
- 19:12 : Security Affairs newsletter Round 506 by Pierluigi Paganini – INTERNATIONAL EDITION
- 19:12 : SECURITY AFFAIRS MALWARE NEWSLETTER – ROUND 28
- 19:12 : AI and Blockchain: Shaping the Future of Personalization and Security
- 18:39 : Passkeys: The Future of Secure and Seamless Online Authentication
- 18:39 : Sophisticated Credit Card Skimmer Malware Targets WordPress Checkout Pages
- 18:39 : Play Ransomware: A Rising Global Cybersecurity Threat
- 18:39 : Meta Removes Independent Fact Checkers, Replaces With “Community Notes”
- 18:11 : DEF CON 32 – Open Source Hacker V. Government Lawyer
- 18:11 : Gravy Analytics Data Breach Exposes Sensitive Location Data of U.S. Consumers
- 18:11 : Silent Crow Claims Hack of Russia’s Rosreestr, Leaks Citizens’ Personal Data
- 17:5 : IT Security News Hourly Summary 2025-01-12 18h : 2 posts
- 16:42 : From Alcatraz to Zero Trust: A Journey to RSA 2025 in San Francisco
- 16:42 : Predictions for 2025’s biggest attacks from a pentester perspective
- 15:11 : Phishing in 2024: Navigating the Persistent Threat and AI’s Double-Edged Sword
- 14:13 : What is PCI DSS 4.0: Is This Still Applicable For 2024?
- 14:13 : PCI DSS Requirements With v4.0.1 Updates For 2024
- 14:5 : IT Security News Hourly Summary 2025-01-12 15h : 1 posts
- 13:11 : Elevating Security: The Crucial Role of Effective API Management in Today’s Digital Landscape
- 12:16 : Multi-OLE, (Sun, Jan 12th)
- 11:20 : How a researcher earned $100,000 hacking a Facebook server
- 9:34 : Week in review: Exploited Ivanti Connect Secure zero-day, Patch Tuesday forecast
- 8:11 : Wireshark 4.4.3 Released, (Sat, Jan 11th)
- 8:5 : IT Security News Hourly Summary 2025-01-12 09h : 1 posts
- 7:13 : SuperDraft – 300,187 breached accounts
- 23:31 : Advancements in Machine Identity Protections
- 23:5 : IT Security News Hourly Summary 2025-01-12 00h : 1 posts
- 22:55 : IT Security News Daily Summary 2025-01-11
- 20:12 : DoJ charged three Russian citizens with operating crypto-mixing services
- 18:11 : DEF CON 32 – Porn & Privacy – ET
- 17:5 : IT Security News Hourly Summary 2025-01-11 18h : 3 posts
- 16:11 : Japan Attributes Ongoing Cyberattacks to China-Linked MirrorFace Group
- 16:11 : New Variant of Banshee Stealer Targets macOS with Enhanced Evasion Tactics
- 16:11 : India Proposes New Draft Rules Under Digital Personal Data Protection Act, 2023
- 15:20 : Fake CrowdStrike Recruiters Distribute Malware Via Phishing Emails
- 15:19 : Guardians Of the Grid
- 14:32 : Mapping Out Your Enterprise Digital Footprint to Avoid Cyber Risks
- 14:32 : California Man Sues Banks Over $986K Cryptocurrency Scam
- 14:13 : Fake PoC Exploit Targets Cybersecurity Researchers with Malware
- 14:5 : IT Security News Hourly Summary 2025-01-11 15h : 1 posts
- 13:17 : Exploring CVSS 4.0’s Impact on Vulnerability and Threat Management
- 12:31 : The Case of Email Spoofing: How to Identify And Avoid Email Attacks
- 12:19 : Threat Modeling Processes and Methods That Strengthen Cybersecurity
- 12:19 : U.S. cannabis dispensary STIIIZY disclosed a data breach
- 11:13 : Understanding User Behavior Monitoring for Stronger Cybersecurity
- 11:13 : Muddling Meerkat Linked to Domain Spoofing in Global Spam Scams
- 11:5 : IT Security News Hourly Summary 2025-01-11 12h : 1 posts
- 10:8 : A novel PayPal phishing campaign hijacks accounts
- 8:32 : Microsoft Sues Hacking Group Exploiting Azure AI for Harmful Content Creation
- 8:32 : 2025 – A Look Forward: Cyber Security Today, Weekend Edition for January 11, 2025
- 8:5 : IT Security News Hourly Summary 2025-01-11 09h : 2 posts
- 7:32 : 2025-01-09: CVE-2017-0199 XLS –> HTA –> VBS –> steganography –> DBatLoader/GuiLoader style malware
- 7:32 : DoJ Indicts Three Russians for Operating Crypto Mixers Used in Cybercrime Laundering
- 3:32 : IT and Cyber Planning in 2025 Budgets
- 3:31 : An introduction to using tcpdump at the Linux command line
- 3:13 : Will 2025 be the year of no more passwords?
- 0:15 : Crypto is soaring, but so are threats: Here’s how to keep your wallet safe
- 0:15 : Microsoft accuses group of developing tool to abuse its AI service in new lawsuit
- 0:15 : 2025 SaaS Security Word of the Year: Adaptability | Grip
- 23:32 : Week in Review: Flax Typhoon sanctioned, French military ransomware, ICAO breach claims
- 23:5 : IT Security News Hourly Summary 2025-01-11 00h : 4 posts
- 22:55 : IT Security News Daily Summary 2025-01-10
- 22:11 : 35 cybersecurity statistics to lose sleep over in 2025
- 22:11 : Banshee macOS stealer supports new evasion mechanisms
- 22:11 : Chinese cyber-spies peek over shoulder of officials probing real-estate deals near American military bases
- 21:32 : Ivanti Urges Patch for Flaws in Connect Secure, Policy Secure and ZTA Gateways
- 21:31 : The Cost of Complacency in Credential Hygiene
- 21:2 : The best VPN for streaming in 2025: Expert tested and reviewed
- 21:2 : Below the Surface Winter 2024 Edition – The Year in Review
- 20:32 : New Paper: “Future of SOC: Transform the ‘How’” (Paper 5)
- 20:19 : The best travel VPNs of 2025: Expert tested and reviewed
- 20:5 : IT Security News Hourly Summary 2025-01-10 21h : 1 posts
- 19:17 : Meet the Chinese ‘Typhoon’ hackers preparing for war
- 18:32 : The Digital Markets Act (DMA): A Game Changer for Tech Companies
- 18:32 : 1Password Acquires Trelica to Strengthen SaaS Management and Security
- 18:32 : Critical Command Injection Vulnerability Found in Aviatrix Network Controller (CVE-2024-50603)
- 18:32 : Android Malware ‘FireScam’ Poses As Telegram Premium to Steal User Data
- 18:31 : This New Malware Exploits VPN Apps to Hijack Devices
- 18:7 : The Future of Payment Authentication: How Biometrics Are Revolutionizing Transactions
- 17:32 : What Is Zero Trust: Security, Principles & Architecture
- 17:32 : Meloni Says Italy Is Exploring Deals on Telecoms Security, but Denies Private Talks With Musk
- 17:15 : Amazon Workers In North Carolina To Vote On Unionisation
- 17:15 : Schneider Electric Harmony HMI and Pro-face HMI Products
- 17:15 : Delta Electronics DRASimuCAD
- 17:14 : CISA Releases the Cybersecurity Performance Goals Adoption Report
- 17:14 : Schneider Electric PowerChute Serial Shutdown
- 17:14 : US government charges operators of crypto mixing service used by North Korea and ransomware gangs
- 17:14 : BayMark Health Services sends breach notifications after ransomware attack
- 17:14 : Hackers Attack PowerSchool, Expose K-12 Teacher and Student Data
- 17:5 : IT Security News Hourly Summary 2025-01-10 18h : 6 posts
- 16:32 : Apps That Are Spying on Your Location
- 16:20 : DarkTrace acquires Cado Security
- 16:20 : CISA Through the Years: Policy and Impact
- 16:20 : Australian IT Sector Maintains Strong Employment Outlook for 2025
- 16:20 : Researchers disclosed details of a now-patched Samsung zero-click flaw
- 16:19 : Drug addiction treatment service admits attackers stole sensitive patient data
- 15:32 : Navy Warship USS Manchester Installed Starlink for Illegal Wi-Fi Connection
- 15:32 : Secret Phone Surveillance Tech Was Likely Deployed at 2024 DNC
- 15:31 : SonarQube for IDE: Our journey this year, and sneak peek into 2025
- 15:31 : Cybercriminals Use Fake CrowdStrike Job Offers to Distribute Cryptominer
- 15:28 : Using a VPN is no longer enough. Protect your entire network with WireGuard – here’s how
- 15:28 : China hacked US Treasury’s CFIUS, which reviews foreign investments for national security risks
- 15:28 : Slovakia Hit by Historic Cyber-Attack on Land Registry
- 14:31 : NIS2 Compliance – How to Do It Sustainably by Continuous Compliance
- 14:11 : Supreme Court To Hear Arguments In TikTok Divest Or Ban Appeal
- 14:11 : Cannabis company Stiiizy says hackers accessed customers’ ID documents
- 14:5 : IT Security News Hourly Summary 2025-01-10 15h : 6 posts
- 13:32 : NIS 2 Compliance – How to Do It Sustainably by Continuous Compliance
- 13:32 : In Other News: Bank of America Warns of Data Breach, Trucking Cybersecurity, Treasury Hack Linked to Silk Typhoon
- 13:31 : Apple Faces Backlash Over Misinformation from Apple Intelligence Tool
- 13:15 : Four Steps Security Teams Can Take to Unlock Resources In Budget-Constrained Environments
- 13:15 : AI-Driven Ransomware FunkSec Targets 85 Victims Using Double Extortion Tactics
- 13:15 : Taking the Pain Out of Cybersecurity Reporting: A Practical Guide for MSPs
- 12:32 : Blue Origin Preps New Glenn Rocket For Sunday Launch
- 12:32 : Banshee macOS Malware Expands Targeting
- 12:32 : Job-seeking devs targeted with fake CrowdStrike offer via email
- 12:15 : Weaponized LDAP Exploit Deploys Information-Stealing Malware
- 12:15 : QSC: Multi-Plugin Malware Framework Installs Backdoor on Windows
- 12:15 : Phishers abuse CrowdStrike brand targeting job seekers with cryptominer
- 12:15 : PayPal Phishing Campaign Employs Genuine Links to Take Over Accounts
- 11:26 : Banshee Stealer Hits macOS Users via Fake GitHub Repositories
- 11:26 : Hackers Targeting Users Who Lodged Complaints On Government portal To Steal Credit Card Data
- 11:26 : New NonEuclid RAT Evades Antivirus and Encrypts Critical Files
- 11:26 : Meet FunkSec: A New, Surprising Ransomware Group, Powered by AI
- 11:26 : Tripwire Patch Priority Index for December 2024
- 11:5 : IT Security News Hourly Summary 2025-01-10 12h : 7 posts
- 10:32 : CrowdStrike Warns of Phishing Scam Targeting Job Seekers with XMRig Cryptominer
- 10:32 : RedDelta Deploys PlugX Malware to Target Mongolia and Taiwan in Espionage Campaigns
- 10:32 : Google Project Zero Researcher Uncovers Zero-Click Exploit Targeting Samsung Devices
- 10:32 : Hands-On Walkthrough: Microsegmentation For all Users, Workloads and Devices by Elisity
- 10:32 : Medusind Breach Exposes Sensitive Patient Data
- 10:9 : Juniper Networks Vulnerability Let Remote Attacker Execute Network Attacks
- 10:9 : How AI will transform cybersecurity in 2025 – and supercharge cybercrime
- 9:32 : Phishing Threats, GenAI Among Top Cybersecurity Risks in 2025
- 9:31 : Fake PoC Exploit Targets Security Researchers with Infostealer
- 9:15 : China-linked APT group MirrorFace targets Japan
- 9:15 : Devs sent into security panic by ‘feature that was helpful … until it wasn’t’
- 8:32 : Beware! Fake Crowdstrike Recruitment Emails Spread Cryptominer Malware
- 8:31 : Worldwide Proton outage, Baymark Health breach, Treasury breach update
- 8:15 : Why did China hack the US Treasury Department?
- 8:15 : From Cybersecurity Consolidation to GenAI and Innovation – What to Expect: 2025 Predictions
- 8:15 : January 2025 Patch Tuesday forecast: Changes coming in cybersecurity guidance
- 8:15 : 90 Percent of Free VPNs Have Security Weaknesses: Cyber Security Today for Friday, January 10, 2025
- 8:5 : IT Security News Hourly Summary 2025-01-10 09h : 4 posts
- 7:32 : How Cracks and Installers Bring Malware to Your Device
- 7:9 : Fake CAPTCHA Scams: Ruining Consumer Trust and Driving Website Abandonment
- 7:9 : Top 3 Mistakes PCI DSS SAQ-D Service Providers Are Making in 2025 That Will Knock Them Out of PCI DSS 4 Compliance
- 7:8 : Digital Wallets: From Consumer Convenience to Corporate Security
- 6:34 : Russian ISP Computer network and data gets exterminated in Cyber Attack
- 6:34 : Huge Changes Predicted for the Data Privacy Landscape
- 6:34 : New Banshee Malware Targeting macOS Users Remained Undetected for Months
- 6:34 : The Benefits of Implementing Least Privilege Access
- 6:9 : “Siri Data Stays Private, Not Used for Ads,” Apple Says
- 6:9 : PowerSchool Hacked – Attackers Accessed Personal Data of Students and Teachers
- 6:8 : NFL Giants Green Bay Have Their Online Defense Breached
- 5:32 : United Nations Aviation Agency Hacked Recruitment Data Exposed
- 5:32 : Important Preventative Strategies for Avoiding and Recovering from Ransomware Threats
- 5:32 : The SBI fake banking app shows that SMS authentication has had its day
- 5:9 : We have named the 12 winners for the official Best of CES 2025 awards
- 5:9 : Preventing the next ransomware attack with help from AI
- 5:5 : IT Security News Hourly Summary 2025-01-10 06h : 1 posts
- 4:31 : New infosec products of the week: January 10, 2025
- 2:5 : IT Security News Hourly Summary 2025-01-10 03h : 3 posts
- 1:32 : ISC Stormcast For Friday, January 10th, 2025 https://isc.sans.edu/podcastdetail/9274, (Fri, Jan 10th)
- 1:32 : Record cold quantum refrigerator paves way for reliable quantum computers
- 1:6 : Windows Defender Chrome Extension Detection, (Fri, Jan 10th)
- 23:17 : Fortifying The Links
- 23:17 : Mandiant links Ivanti zero-day exploitation to Chinese hackers
- 23:17 : U.S. Medical billing provider Medusind suffered a sata breach
- 23:5 : IT Security News Hourly Summary 2025-01-10 00h : 3 posts
- 22:55 : IT Security News Daily Summary 2025-01-09
- 22:26 : Meta’s New Content Policy Will Harm Vulnerable Users. If It Really Valued Free Speech, It Would Make These Changes
- 22:26 : Look for the label: White House rolls out ‘Cyber Trust Mark’ for smart devices
- 21:32 : Rumble Among 15 Targets of Texas Attorney General’s Child Privacy Probe
- 21:31 : Candy Crush, Tinder, MyFitnessPal: See the Thousands of Apps Hijacked to Spy on Your Location
- 21:19 : Chinese-linked Hackers May Be Exploiting Latest Ivanti Vulnerability
- 20:22 : What’s Next for Open Source Software Security in 2025?
- 20:22 : How the US TikTok Ban Would Actually Work
- 20:22 : Randall Munroe’s XKCD ‘Features of Adulthood’
- 20:5 : IT Security News Hourly Summary 2025-01-09 21h : 3 posts
- 19:32 : Do we still have to keep doing it like this?
- 19:11 : The Key to AI-Enabled Multi-Coalition Warfare
- 19:11 : US Billionaire Proposes Bid For TikTok’s US Assets
- 18:32 : Harnessing AI for Proactive Threat Intelligence and Advanced Cyber Defense
- 18:3 : The Best of CES 2025 awards are in, as selected by ZDNET and the rest of CNET Group
- 18:2 : How to encrypt any email – in Outlook, Gmail, and other popular services
- 18:2 : Facebook awards researcher $100,000 for finding bug that granted internal access
- 18:2 : Banking Fraud: Jumped Deposit Scam Targets UPI Users
- 18:2 : RIBridges Data Breach: Sensitive Information of Rhode Islanders Exposed
- 18:2 : Banshee Stealer variant targets Russian-speaking macOS users
- 18:2 : Major Vulnerabilities Patched in SonicWall, Palo Alto Expedition, and Aviatrix Controllers
- 17:32 : Zero-Day Vulnerability in Ivanti VPN
- 17:32 : Fancy Product Designer Plugin Flaws Expose WordPress Sites
- 17:32 : Securing a city-sized event: How Amazon integrates physical and logical security at re:Invent
- 17:16 : Google Donates $1 Million To Donald Trump Inauguration Fund
- 17:16 : Space Bears Ransomware: What You Need To Know
- 17:15 : How Do Hackers Exploit Your Vulnerabilities?
- 17:15 : Google Chrome AI extensions deliver info-stealing malware in broad attack
- 17:15 : ‘FireScam’ Malware Targets Android Users with Fake Telegram Premium App
- 17:15 : Practical Tips to Avoid Oversharing and Protect Your Online Privacy
- 17:5 : IT Security News Hourly Summary 2025-01-09 18h : 12 posts
- 16:32 : PowerSchool says hackers stole students’ sensitive data, including Social Security numbers, in data breach
- 16:32 : The Hidden Costs of Poor Access Management: Why Small Businesses Can’t Afford to Ignore It
- 16:32 : Open Interfaces Needed to Cut Security Operations Costs & Boost Efficiency
- 16:32 : Japan Faces Prolonged Cyber-Attacks Linked to China’s MirrorFace
- 16:18 : PowerSchool software cyber attack might impact 45m students in the United States
- 16:18 : Microsoft Confirms Job Cuts Based On Performance