210 posts were published in the last hour
- 22:55 : IT Security News Daily Summary 2024-11-24
- 22:5 : IT Security News Hourly Summary 2024-11-24 23h : 1 posts
- 22:2 : DEF CON 32 – The Pwnie Awards
- 19:5 : IT Security News Hourly Summary 2024-11-24 20h : 1 posts
- 18:32 : Perimeter Security Is at the Forefront of Industry 4.0 Revolution
- 16:5 : IT Security News Hourly Summary 2024-11-24 17h : 3 posts
- 16:2 : Security Affairs newsletter Round 499 by Pierluigi Paganini – INTERNATIONAL EDITION
- 16:2 : SECURITY AFFAIRS MALWARE NEWSLETTER – ROUND 21
- 15:32 : Volunteer DEF CON hackers dive into America’s leaky water infrastructure
- 15:5 : IT Security News Hourly Summary 2024-11-24 16h : 5 posts
- 15:2 : These alternatives to popular apps can help reclaim your online life from billionaires and surveillance
- 14:36 : Wi-Fi Exploit Enables Russian Hackers to Breach US Business
- 14:36 : Beware of Fake Microsoft Emails Exploiting Microsoft 365 Vulnerabilities
- 14:36 : Meta Introduces AI Features For Ray-Ban Glasses in Europe
- 14:5 : IT Security News Hourly Summary 2024-11-24 15h : 1 posts
- 13:32 : How ‘Scattered Spider’ hacked some of the world’s biggest tech giants, and got caught
- 11:5 : IT Security News Hourly Summary 2024-11-24 12h : 1 posts
- 11:3 : DoJ seized credit card marketplace PopeyeTools and charges its administrators
- 10:5 : IT Security News Hourly Summary 2024-11-24 11h : 2 posts
- 9:34 : Quick & Dirty Obfuscated JavaScript Analysis, (Sun, Nov 24th)
- 9:34 : Week in review: 0-days exploited in Palo Alto Networks firewalls, two unknown Linux backdoors identified
- 9:5 : IT Security News Hourly Summary 2024-11-24 10h : 1 posts
- 8:36 : IGT Cyberattack Suffers Disrupting Operations
- 23:5 : IT Security News Hourly Summary 2024-11-24 00h : 2 posts
- 23:2 : Beyond Agile: Why Sentient IAM Is the Strategic Edge for 2025
- 22:55 : IT Security News Daily Summary 2024-11-23
- 19:5 : IT Security News Hourly Summary 2024-11-23 20h : 6 posts
- 18:8 : Andrew Tate’s University Breach: 1 Million User Records and Chats Leaked
- 18:8 : A cyberattack on gambling giant IGT disrupted portions of its IT systems
- 18:7 : Trump taps border hawk to head DHS. Will Noem’s ‘enthusiasm’ extend to digital domain?
- 18:7 : Tamil Nadu Police, DoT Target SIM Card Fraud in SE Asia with AI Tools
- 18:7 : Chinese Hackers Exploit Unpatched Fortinet Zero-Day Vulnerability
- 18:5 : Travel Platforms Criticized Over Data Policy Transparency
- 18:5 : IT Security News Hourly Summary 2024-11-23 19h : 3 posts
- 18:4 : PyPI Attack: Hackers Use AI Models to Deliver JarkaStealer via Python Libraries
- 17:34 : Decrypting a PDF With a User Password, (Sat, Nov 23rd)
- 17:34 : Russia’s Ballistic Missile Attack on Ukraine Is an Alarming First
- 17:5 : IT Security News Hourly Summary 2024-11-23 18h : 2 posts
- 17:2 : DEF CON 32 – Troll Trapping Through TAS Tools Exposing Speedrunning Cheaters
- 16:5 : IT Security News Hourly Summary 2024-11-23 17h : 1 posts
- 15:31 : 9 Factors to Consider When Evaluating a New Cybersecurity Solution
- 15:5 : IT Security News Hourly Summary 2024-11-23 16h : 2 posts
- 15:2 : The rise and fall of the ‘Scattered Spider’ hackers
- 14:36 : The Silent Revolution in Cybersecurity: Going Passwordless
- 14:5 : IT Security News Hourly Summary 2024-11-23 15h : 1 posts
- 13:5 : IT Security News Hourly Summary 2024-11-23 14h : 6 posts
- 13:2 : Wireshark 4.4.2 Released, (Sat, Nov 23rd)
- 13:2 : New Levels, New Devils: The Multifaceted Extortion Tactics Keeping Ransomware Alive
- 13:2 : Meet three incoming EU lawmakers in charge of key tech policy areas
- 13:2 : China-linked APT Gelsemium uses a new Linux backdoor dubbed WolfsBane
- 13:2 : North Korean Hackers Steal $10M with AI-Driven Scams and Malware on LinkedIn
- 13:2 : Google Exposes GLASSBRIDGE: A Pro-China Influence Network of Fake News Sites
- 12:5 : IT Security News Hourly Summary 2024-11-23 13h : 1 posts
- 12:2 : Andrew Tate’s ‘Educational Platform’ Was Hacked
- 11:5 : IT Security News Hourly Summary 2024-11-23 12h : 1 posts
- 11:2 : Microsoft seized 240 sites used by the ONNX phishing service
- 9:5 : IT Security News Hourly Summary 2024-11-23 10h : 1 posts
- 8:34 : Phishmas Alert: Tackling Holiday Season Cyber Threats: Cyber Security Today Weekend November 23, 2024
- 8:5 : IT Security News Hourly Summary 2024-11-23 09h : 2 posts
- 8:2 : Nearest Neighbor Attacks: Russian APT Hack The Target By Exploiting Nearby Wi-Fi Networks
- 8:2 : APT-K-47 Uses Hajj-Themed Lures to Deliver Advanced Asyncshell Malware
- 1:5 : IT Security News Hourly Summary 2024-11-23 02h : 1 posts
- 1:2 : Is Cyber Threat Intelligence Worthless?
- 0:5 : IT Security News Hourly Summary 2024-11-23 01h : 2 posts
- 23:32 : Threat Brief: Operation Lunar Peek, Activity Related to CVE-2024-0012 and CVE-2024-9474 (Updated Nov. 22)
- 23:32 : Week in Review: Drinking water threat, CISO liability insurance, Microsoft zero-day event
- 23:5 : IT Security News Hourly Summary 2024-11-23 00h : 5 posts
- 23:2 : The Real World – 324,382 breached accounts
- 23:2 : Andrew Tate’s site ransacked, subscriber data stolen
- 22:55 : IT Security News Daily Summary 2024-11-22
- 22:31 : Friday Squid Blogging: Transcriptome Analysis of the Indian Squid
- 22:5 : IT Security News Hourly Summary 2024-11-22 23h : 2 posts
- 21:34 : 1000s of Palo Alto Networks firewalls hijacked as miscreants exploit critical hole
- 21:34 : Nile Releases Zero Trust-as-a-Service Aimed at Delivering Ransomware Protection Natively Without Operational Headaches
- 21:5 : IT Security News Hourly Summary 2024-11-22 22h : 4 posts
- 21:2 : The Secret to Reducing Compliance Risk in Financial Services: Visibility
- 21:2 : This new wireless carrier promises ultra-secure mobile phone service
- 21:2 : The US Is Calling Out Foreign Influence Campaigns Faster Than Ever
- 20:5 : IT Security News Hourly Summary 2024-11-22 21h : 1 posts
- 20:2 : Volexity details Russia’s novel ‘Nearest Neighbor Attack’
- 19:5 : IT Security News Hourly Summary 2024-11-22 20h : 6 posts
- 18:34 : Operation Lunar Peek: More Than 2,000 Palo Alto Network Firewalls Hacked
- 18:34 : Comic Agilé – Mikkel Noe-Nygaard, Luxshan Ratnaravi – #3131 – PO Communication Skills
- 18:34 : Malware Campaign Expands Its Use of Fraudulent CAPTCHAs
- 18:34 : Ransomware Gangs Target Weekends and Holidays for Maximum Impact
- 18:34 : Security Researcher Outsmarts Hackers with Fake Ransomware Tool
- 18:34 : Microsoft shares latest intelligence on North Korean and Chinese threat actors at CYBERWARCON
- 18:5 : IT Security News Hourly Summary 2024-11-22 19h : 8 posts
- 18:3 : One year later: 7 useful things the Flipper Zero can do that still blows my mind
- 18:2 : The best VPN services for iPhone: Expert tested and reviewed
- 18:2 : You can finally test Microsoft’s controversial Recall feature – here’s how
- 18:2 : FTSCon
- 17:34 : Fraud Prevention in Online Payments: A Practical Guide
- 17:34 : The best VPN routers of 2024
- 17:34 : Price Drop: Get a Lifetime Subscription of FastestVPN for just $25
- 17:34 : Meta takes down more than 2 million accounts in fight against pig butchering
- 17:5 : IT Security News Hourly Summary 2024-11-22 18h : 7 posts
- 17:2 : What is endpoint detection and response (EDR)?
- 16:36 : New Resilient Power Guidance Added to the CISA Resilient Toolkit Portal
- 16:36 : Price Drop: This Complete Ethical Hacking Bundle is Now $35
- 16:36 : The Evolution of Hashing Algorithms: From MD5 to Modern Day
- 16:36 : How Effective Network Management Enhances Collaboration Between IT and Security Teams
- 16:10 : How to test if your smart phone is spying on you
- 16:8 : US and Europe Account for 73% of Global Exposed ICS Systems
- 16:5 : IT Security News Hourly Summary 2024-11-22 17h : 3 posts
- 16:4 : Cyberattack Disrupts Systems of Gambling Giant IGT
- 15:32 : 240+ Domains Used By PhaaS Platform ONNX Seized by Microsoft
- 15:5 : IT Security News Hourly Summary 2024-11-22 16h : 13 posts
- 15:2 : Apple, Google Mobile Ecosystems Should Be Investigated, CMA Told
- 15:2 : Earth Kasha Upgraded Their Arsenal With New Tactics To Attack Organizations
- 15:2 : Russian TAG-110 Hacked 60+ Users With HTML Loaded & Python Backdoor
- 15:2 : Video: How to Protect Your Online Identity with a Password Manager
- 15:2 : U.S. Agencies Seize Four North Korean IT Worker Scam Websites
- 15:2 : 5 Common Pitfalls to Avoid With Zero-Trust
- 14:39 : Raspberry Robin Employs TOR Network For C2 Servers Communication
- 14:39 : I deleted my personal info from the internet with this service (and it’s on sale for Black Friday)
- 14:38 : Check Point Software Named A Leader in GigaOm Cloud Radar
- 14:38 : Mobilize Like Your Organization Depended On It
- 14:38 : The Race is on to Solve the Quantum Computing Security Challenge
- 14:38 : Microsoft Seizes 240 Websites to Disrupt Global Distribution of Phish Kits
- 14:38 : Secure root user access for member accounts in AWS Organizations
- 14:5 : IT Security News Hourly Summary 2024-11-22 15h : 5 posts
- 14:2 : Discover, Protect and Respond with AWS and Prisma Cloud
- 14:2 : In Other News: Nvidia Fixes Critical Flaw, Chinese Linux Backdoor, New Details in WhatsApp-NSO Lawsuit
- 13:32 : Getting to Know Kelvin Tse
- 13:32 : CISA: BianLian Ransomware Focus Switches to Data Theft
- 13:31 : D-Link Urges Replacement of End-of-Life VPN Routers Amid Critical Security Vulnerability
- 13:5 : IT Security News Hourly Summary 2024-11-22 14h : 15 posts
- 13:2 : Navigating the Complexities of AI in Content Creation and Cybersecurity
- 13:2 : US Takes Down Stolen Credit Card Marketplace PopeyeTools
- 13:2 : Russian Cyber Spies Target Organizations with HatVibe and CherrySpy Malware
- 12:37 : Lateral Movement on macOS: Unique and Popular Techniques and In-the-Wild Examples
- 12:37 : Australia Rejects Elon Musk Claim About Social Media Ban For Under-16s
- 12:37 : Malware Bypasses Microsoft Defender and 2FA to Steal $24K in Crypto
- 12:37 : Russian Spies Jumped From One Network to Another Via Wi-Fi in an Unprecedented Hack
- 12:36 : U.S. CISA adds Apple, Oracle Agile PLM bugs to its Known Exploited Vulnerabilities catalog
- 12:36 : The Scale of Geoblocking by Nation
- 12:36 : How to master endpoint security
- 12:36 : Russian Cyberespionage Group Hit 60 Victims in Asia, Europe
- 12:36 : Email Phishing and DMARC Statistics
- 12:36 : Unlocking Google Workspace Security: Are You Doing Enough to Protect Your Data?
- 12:36 : Russian Hackers Deploy HATVIBE and CHERRYSPY Malware Across Europe and Asia
- 12:36 : Three-Quarters of Black Friday Spam Emails Identified as Scams
- 11:5 : IT Security News Hourly Summary 2024-11-22 12h : 7 posts
- 11:3 : Seeing Through a GLASSBRIDGE: Understanding the Digital Marketing Ecosystem Spreading Pro-PRC Influence Operations
- 11:2 : Northvolt Files For Bankruptcy Protection In US
- 11:2 : Kathryn Thornton: Correcting Hubble’s vision | Starmus Highlights
- 11:2 : 400,000 Systems Potentially Exposed to 2023’s Most Exploited Flaws
- 11:2 : Microsoft, Meta, and DOJ Disrupt Global Cybercrime and Fraudulent Networks
- 11:2 : MITRE Unveils Top 25 Most Critical Software Flaws
- 11:2 : Five Ransomware Groups Responsible for 40% of Cyber-Attacks in 2024
- 9:32 : 145,000 ICS Systems, Thousands of HMIs Exposed to Cyber Attacks
- 9:32 : Amazon and Audible Face Scrutiny Amid Questionable Content Surge
- 9:32 : SentinelOne AI-SPM detects misconfigurations and vulnerabilities in AI applications
- 9:32 : Security for AI Copilots in SaaS apps identifies risky access permissions
- 9:32 : Manufacturing Sector in the Crosshairs of Advanced Email Attacks
- 9:5 : IT Security News Hourly Summary 2024-11-22 10h : 4 posts
- 9:2 : DOJ Asks Google to Sell $20 Billion Worth Chrome to End Monopoly
- 9:2 : SafePay ransomware gang claims Microlise attack that disrupted prison van tracking
- 9:2 : Prompt Security Raises $18 Million for Gen-AI Security Platform
- 9:2 : MITRE’s danger list, CISO liability insurance, BianLian changes tack
- 8:5 : IT Security News Hourly Summary 2024-11-22 09h : 2 posts
- 8:2 : Proxmox Virtual Environment 8.3: SDN-firewall integration, faster container backups, and more!
- 7:34 : Google’s AI Driven Fuzz Tool Finds Decades Old Vulnerability: Cyber Security Today, Friday November 22, 2024
- 7:5 : IT Security News Hourly Summary 2024-11-22 08h : 6 posts
- 7:2 : US urging Google to sell its Android and Chrome browser to banish Data Privacy and Market competition concerns
- 7:2 : US Seizes PopeyeTools Cybercrime Platform & Arrested Admins
- 7:2 : More than 2,000 Palo Alto Networks firewalls hacked exploiting recently patched zero-days
- 7:2 : PyPI Attack: ChatGPT, Claude Impersonators Deliver JarkaStealer via Python Libraries
- 6:35 : Why Relying on AI Providers Isn’t Enough to Protect Against Prompt Injection
- 6:34 : The limits of AI-based deepfake detection
- 6:5 : IT Security News Hourly Summary 2024-11-22 07h : 4 posts
- 6:2 : Australia Introduces Bill to Ban Kids from Social Media
- 6:2 : Why the NIS2 Directive causes growing pains for businesses
- 5:34 : Unmasking WolfsBane: Gelsemium’s New Linux Weapon
- 5:34 : Helpline for Yakuza victims fears it leaked their personal info
- 5:5 : IT Security News Hourly Summary 2024-11-22 06h : 5 posts
- 5:2 : Chinese Hackers Breached Deep Into US Telecom to Spy on Calls and Texts
- 5:2 : What is DSPT Compliance: From Toolkit to Audit (2024)
- 5:2 : Deepfake attacks occur every five minutes
- 5:2 : Cybercriminals turn to pen testers to test ransomware efficiency
- 4:34 : New infosec products of the week: November 22, 2024
- 4:5 : IT Security News Hourly Summary 2024-11-22 05h : 3 posts
- 4:2 : An Infostealer Searching for « BIP-0039 » Data, (Fri, Nov 22nd)
- 3:39 : FortiClient VPN Flaw Enables Undetected Brute-Force Attacks
- 3:39 : Thai Court Dismisses Activist’s Suit Against Israeli Spyware Producer Over Lack of Evidence
- 2:5 : IT Security News Hourly Summary 2024-11-22 03h : 2 posts
- 2:2 : ISC Stormcast For Friday, November 22nd, 2024 https://isc.sans.edu/podcastdetail/9230, (Fri, Nov 22nd)
- 1:34 : Here’s what happens if you don’t layer network security – or remove unused web shells
- 1:5 : IT Security News Hourly Summary 2024-11-22 02h : 3 posts
- 0:36 : Hackers break into Andrew Tate’s online ‘university,’ steal user data and flood chats with emojis
- 0:36 : Organizing for Digital Rights in the Pacific Northwest
- 0:15 : Threat Brief: Operation Lunar Peek, Activity Related to CVE-2024-0012 and CVE-2024-9474 (Updated Nov. 21)
- 23:5 : IT Security News Hourly Summary 2024-11-22 00h : 6 posts
- 22:55 : IT Security News Daily Summary 2024-11-21
- 22:32 : Do you actually need a VPN? Your guide to staying safe online!
- 22:32 : DEF CON 32 – Unlocking The Gates: Hacking A Secure Industrial Remote Access Solution
- 22:32 : 7 Best AI Cybersecurity Tools for Your Company
- 22:31 : What Is FedRAMP ATO? Designations, Terms, and Updates
- 22:5 : IT Security News Hourly Summary 2024-11-21 23h : 3 posts
- 22:3 : Ransomhub ransomware gang claims the hack of Mexican government Legal Affairs Office
- 22:3 : Navigating Certificate Lifecycle Management
- 21:36 : What is AI red teaming?
- 21:5 : IT Security News Hourly Summary 2024-11-21 22h : 6 posts
- 20:32 : Silicon In Focus Podcast: Your AI Enabled Workforce
- 20:32 : FTX Co-Founder Gary Wang Spared Prison
- 20:32 : Bitcoin Rises Above $96,000 Amid Trump Optimism
- 20:32 : Former Policy Boss At X Nick Pickles, Joins Sam Altman Venture
- 20:32 : UK’s CMA Readies Cloud Sector “Behavioural” Remedies – Report
- 20:32 : Feds Charge Five Men in ‘Scattered Spider’ Roundup