210 posts were published in the last hour
- 22:55 : IT Security News Daily Summary 2024-12-01
- 22:5 : IT Security News Hourly Summary 2024-12-01 23h : 1 posts
- 21:5 : IT Security News Hourly Summary 2024-12-01 22h : 1 posts
- 20:32 : Interpol nabs thousands, seizes millions in global cybercrime-busting op
- 20:5 : IT Security News Hourly Summary 2024-12-01 21h : 1 posts
- 19:36 : SECURITY AFFAIRS MALWARE NEWSLETTER – ROUND 22
- 17:5 : IT Security News Hourly Summary 2024-12-01 18h : 3 posts
- 17:4 : Proposed US Bill Mandates MFA and Cybersecurity Standards for Healthcare
- 17:4 : Smokedham: Malicious Backdoor for Surveillance and Ransomware Campaigns
- 16:33 : Why Simulating Phishing Attacks Is the Best Way to Train Employees
- 14:5 : IT Security News Hourly Summary 2024-12-01 15h : 4 posts
- 14:2 : Over 600,000 People Impacted In a Major Data Leak
- 14:2 : XorBot Evolves with Advanced Evasion Strategies, Targets IoT
- 13:34 : Security Affairs newsletter Round 500 by Pierluigi Paganini – INTERNATIONAL EDITION
- 13:9 : The Importance of Data Anonymization In Safeguarding Sensitive Legal Information
- 9:5 : IT Security News Hourly Summary 2024-12-01 10h : 1 posts
- 9:4 : Week in review: Exploitable flaws in corporate VPN clients, malware loader created with gaming engine
- 4:5 : IT Security News Hourly Summary 2024-12-01 05h : 1 posts
- 3:6 : Ransomware Developer Mikhail Matveev Arrested in Russia
- 2:5 : IT Security News Hourly Summary 2024-12-01 03h : 2 posts
- 1:36 : Top AI Trends of 2025 Businesses Should Be Ready For
- 1:36 : Hackers stole millions of dollars from Uganda Central Bank
- 23:5 : IT Security News Hourly Summary 2024-12-01 00h : 2 posts
- 23:1 : IT Security News Weekly Summary December
- 22:55 : IT Security News Daily Summary 2024-11-30
- 21:5 : IT Security News Hourly Summary 2024-11-30 22h : 1 posts
- 20:6 : 15 SpyLoan Android apps found on Google Play had over 8 million installs
- 19:6 : November 2024 Web Server Survey
- 19:5 : IT Security News Hourly Summary 2024-11-30 20h : 2 posts
- 18:34 : FBI-Wanted Hacker Behind Global Ransomware Attacks Arrested in Russia
- 18:34 : BianLian Ransomware Gang Shifts Tactics: A New Era of Cyber Threats
- 16:5 : IT Security News Hourly Summary 2024-11-30 17h : 3 posts
- 15:32 : Zero Trust Endpoint Security: The Future of Cyber Resilience
- 15:6 : Australia’s New Cyber Law Combats Emerging Threats
- 15:6 : Internal Threats Loom Large as Businesses Deal With External Threats
- 13:5 : IT Security News Hourly Summary 2024-11-30 14h : 4 posts
- 13:2 : This month in security with Tony Anscombe – November 2024 edition
- 13:2 : The Last Stop: Protecting an NHL Franchise Against Cyberattacks
- 12:34 : Hackers Can Secretly Access ThinkPad Webcams by Disabling LED Indicator Light
- 12:34 : Wanted Russian Hacker Linked to Hive and LockBit Ransomware Arrested
- 10:5 : IT Security News Hourly Summary 2024-11-30 11h : 1 posts
- 9:36 : RansomHub claims to net data hat-trick against Bologna FC
- 9:5 : IT Security News Hourly Summary 2024-11-30 10h : 1 posts
- 8:5 : The Top Automated Identity Threat Protection Solutions
- 8:5 : IT Security News Hourly Summary 2024-11-30 09h : 6 posts
- 8:5 : Future proofing business with resilient network solutions
- 8:4 : International Computer Security Day
- 8:4 : Notorious ransomware programmer Mikhail Pavlovich Matveev arrested in Russia
- 8:4 : Wanted Russian Cybercriminal Linked to Hive and LockBit Ransomware Has Been Arrested
- 7:34 : Risk resilience: Navigating the risks that board’s can’t ignore in 2025
- 7:5 : IT Security News Hourly Summary 2024-11-30 08h : 1 posts
- 6:34 : From a Regular Infostealer to its Obfuscated Version, (Sat, Nov 30th)
- 6:5 : IT Security News Hourly Summary 2024-11-30 07h : 1 posts
- 5:34 : Could Your Device Be Caught in the Matrix Cyber Attack?
- 5:5 : IT Security News Hourly Summary 2024-11-30 06h : 1 posts
- 4:34 : AI: What’s Holding You Back? Cyber Security Today Weekend Special
- 4:5 : IT Security News Hourly Summary 2024-11-30 05h : 1 posts
- 3:32 : AI that clicks for you: Microsoft’s research points to the future of GUI automation
- 3:5 : IT Security News Hourly Summary 2024-11-30 04h : 1 posts
- 2:36 : “Every millisecond matters:” Why a Formula E team picked CATO Networks to connect its pitlane
- 2:5 : IT Security News Hourly Summary 2024-11-30 03h : 1 posts
- 1:38 : “Every millisecond matters:” Why a Formula E team picked Cato Networks to connect its pitlane
- 0:5 : IT Security News Hourly Summary 2024-11-30 01h : 1 posts
- 23:5 : IT Security News Hourly Summary 2024-11-30 00h : 2 posts
- 23:2 : Printer problems? Beware the bogus help
- 22:55 : IT Security News Daily Summary 2024-11-29
- 18:5 : IT Security News Hourly Summary 2024-11-29 19h : 5 posts
- 18:2 : Shop Safely Online This Holiday Season with Tips from Secure Our World
- 18:2 : Zabbix urges upgrades after critical SQL injection bug disclosure
- 17:34 : Meta Plans Subsea Cable For Its Own Exclusive Use – Report
- 17:34 : Exploring the benefits of artificial intelligence while maintaining digital sovereignty
- 17:5 : IT Security News Hourly Summary 2024-11-29 18h : 6 posts
- 16:36 : What You and Your Business Need to Know About Doxxing – and How to Address It
- 16:36 : Election Integrity in the Age of Artificial Intelligence
- 16:36 : Building a Security “Loyalty Program” for Software Developers is a Winning Formula in 2025
- 16:36 : Godot Engine Exploited to Spread Malware on Windows, macOS, Linux
- 16:36 : F1 Williams Racing Chooses Keeper Security to Safeguard Data
- 16:36 : US Telecoms Warned of Chinese Cyber Espionage Threat
- 16:5 : IT Security News Hourly Summary 2024-11-29 17h : 8 posts
- 16:2 : Mastercard to say goodbye to passwords
- 16:2 : Canada Sues Google For Alleged Anti-Competitive Conduct In Advertising
- 16:2 : Phishing-as-a-Service Rockstar 2FA continues to be prevalent
- 15:36 : Helping Payments Companies Remain PCI-Compliant in the Cloud
- 15:36 : How Python Software Development Enhances Cyber Defense
- 15:36 : What It Costs to Hire a Hacker on the Dark Web
- 15:36 : Free & Downloadable HIPAA Compliance Policy Template
- 15:36 : Faulty Upgrade at Cloudflare Results in User Data Loss
- 15:5 : IT Security News Hourly Summary 2024-11-29 16h : 3 posts
- 15:2 : Fake Betting Apps Using AI-Generated Voices to Sensitive Data
- 14:36 : These alternatives to popular apps can help reclaim your online life from billionaires and surveillance
- 14:36 : Ransomware Roundup – Interlock
- 14:5 : IT Security News Hourly Summary 2024-11-29 15h : 7 posts
- 14:4 : Zscaler’s Top 10 Predictions for 2025
- 14:4 : How To Get Your Startup Off The Ground Amid Cybersecurity Threats
- 14:4 : AI-Powered Fake News Campaign Targets Western Support for Ukraine and U.S. Elections
- 13:32 : From Credentials to Identity: Understanding Digital Identity and Access
- 13:32 : Meta Concerned At Australia’s Social Media Ban For Under-16s
- 13:32 : Check Point to showcase practical cyber security applications for AI at AWS re:Invent
- 13:5 : IT Security News Hourly Summary 2024-11-29 14h : 25 posts
- 13:4 : XDR vs SIEM Security Information and Event Management
- 13:4 : Cloud Infrastructure Management: 10 Best Practices for Success
- 13:3 : Testing Gaming Monetization: Walking the Line Between Profit and Player Experience
- 13:2 : The Evolution of Cloud Strategy: Beyond “Cloud First”
- 13:2 : HDFC Life Responds to Data Leak, Engages Cybersecurity Experts
- 13:2 : Ransomware Attack on Blue Yonder Disrupts Global Supply Chains
- 12:38 : COOs Will Make Impact-Based Security a Mainstream Requirement
- 12:38 : Best Free EDR for Windows PC
- 12:38 : New Phishing Attack Targeting Corporate Internet Banking Users
- 12:38 : Uniswap Labs to Offer $15.5 Million Bounty for Bug Hunters
- 12:38 : 600,000+ Sensitive Records Exposed From Background Checks Service Provider
- 12:38 : The US Army’s Vision of Soldiers in Exoskeletons Lives On
- 12:38 : IT threat evolution Q3 2024
- 12:38 : IT threat evolution in Q3 2024. Mobile statistics
- 12:38 : IT threat evolution in Q3 2024. Non-mobile statistics
- 12:38 : Businesses and Consumers Warned To Be Wary This Black Friday
- 12:38 : Giving a Voice to Future Generations of Female Cybersecurity Leaders
- 12:38 : Ransom gang claims attack on NHS Alder Hey Children’s Hospital
- 12:38 : In Other News: OPPC Breach Impacts 1.7M, US Soldier Suspected in Snowflake Hack, Cloudflare Loses Logs
- 12:38 : Microsoft Fixes AI, Cloud, and ERP Security Flaws; One Exploited in Active Attacks
- 12:38 : Phishing-as-a-Service “Rockstar 2FA” Targets Microsoft 365 Users with AiTM Attacks
- 12:37 : Protecting Tomorrow’s World: Shaping the Cyber-Physical Future
- 12:37 : Cyber-Attacks Could Impact Romanian Presidential Race, Officials Claim
- 12:37 : INC Ransom Claims Cyber-Attack on UK Children’s Hospital
- 12:37 : US Thanksgiving Holiday: Cyber Security Today
- 10:5 : IT Security News Hourly Summary 2024-11-29 11h : 4 posts
- 9:34 : Stay Secure and Anonymous Online: Why You Need a VPN Today
- 9:34 : Fighting cybercrime with actionable knowledge
- 9:34 : UK Justice System Failing Cybercrime Victims, Cyber Helpline Finds
- 9:5 : IT Security News Hourly Summary 2024-11-29 10h : 2 posts
- 9:2 : UK Healthcare Provider Hit by Cyberattack, Services Affected
- 9:2 : Advantech WiFi flaws, T-Mobile block attack, UK hospital cyberattack
- 7:5 : IT Security News Hourly Summary 2024-11-29 08h : 4 posts
- 6:35 : HawkEye Malware: Technical Analysis
- 6:35 : Zyxel Firewall Vulnerability Actively Exploited in Attacks
- 6:35 : Godot Gaming Engine Exploited to Spread Undetectable Malware
- 6:35 : Shop Smart, Stay Safe: Black Friday Edition
- 6:5 : IT Security News Hourly Summary 2024-11-29 07h : 6 posts
- 6:2 : Quickie: Mass BASE64 Decoding, (Fri, Nov 29th)
- 6:2 : Ransomware spreading through Microsoft Teams
- 6:2 : Phishing Attacks Dominate Threat Landscape in Q3 2024
- 6:2 : The effect of compliance requirements on vulnerability management strategies
- 6:2 : U.S. Citizen Sentenced for Spying on Behalf of China’s Intelligence Agency
- 5:5 : IT Security News Hourly Summary 2024-11-29 06h : 1 posts
- 4:34 : Modernizing incident response in the AI era
- 4:5 : IT Security News Hourly Summary 2024-11-29 05h : 3 posts
- 4:2 : Protecting Against Inevitable Insider Threats
- 4:2 : AI-based tools designed for criminal activity are in high demand
- 4:2 : Infosec products of the month: November 2024
- 2:5 : IT Security News Hourly Summary 2024-11-29 03h : 1 posts
- 1:36 : Beyond Break-Fix: How Modern Outsourced IT Support Drives Business Growth
- 1:5 : IT Security News Hourly Summary 2024-11-29 02h : 1 posts
- 1:2 : Zello urges users to reset passwords following a cyber attack
- 23:5 : IT Security News Hourly Summary 2024-11-29 00h : 1 posts
- 22:55 : IT Security News Daily Summary 2024-11-28
- 21:5 : IT Security News Hourly Summary 2024-11-28 22h : 1 posts
- 20:5 : IT Security News Hourly Summary 2024-11-28 21h : 1 posts
- 20:2 : German Government Plots €2 Billion For Chip Subsidies – Report
- 18:5 : IT Security News Hourly Summary 2024-11-28 19h : 4 posts
- 18:2 : Google Asks Appeal Court To Throw Out Epic App Store Verdict
- 17:32 : Bootkitty marks a new chapter in the evolution of UEFI threats
- 17:32 : Over Two Dozen Flaws Identified in Advantech Industrial Wi-Fi Access Points – Patch ASAP
- 17:32 : Malicious PyPI Package Exposes Crypto Wallets to Infostealer Code
- 17:5 : IT Security News Hourly Summary 2024-11-28 18h : 8 posts
- 17:2 : Mimic Ransomware: What You Need To Know
- 17:2 : CISA Urges Immediate Fix for Critical Array Networks Flaw
- 16:38 : Microsoft denies using Office 365 data for training its AI Intelligence
- 16:38 : EU Closes Amazon State Aid Case Over Taxes
- 16:38 : Intel Says $7.86bn Grant From US Will Restrict Foundry Spin-off
- 16:37 : A cyberattack impacted operations at UK Wirral University Teaching Hospital
- 16:37 : Data broker exposes 600,000 sensitive files including background checks
- 16:35 : GodLoader Malware Infects Thousands via Game Development Tools
- 16:5 : IT Security News Hourly Summary 2024-11-28 17h : 1 posts
- 15:5 : IT Security News Hourly Summary 2024-11-28 16h : 8 posts
- 15:2 : NordPass password manager is now 56% off for Black Friday
- 15:2 : Flipper Zero goes retro with this cool limited-edition transparent version for Black Friday
- 15:2 : T-Mobile detected network intrusion attempts and blocked them
- 14:32 : APT-C-60 Attacking HR Department With Weaponized Resumes
- 14:32 : Helldown Ransomware Attacking Windows And Linux Servers Evading Detection
- 14:32 : SMOKEDHAM Backdoor Mimic As Legitimate Tools Leveraging Google Drive & Dropbox
- 14:32 : New Skimmer Malware Steals Credit Card Data From Checkout Pages
- 14:32 : Researchers Detailed New Exfiltration Techniques Used By Ransomware Groups
- 14:5 : IT Security News Hourly Summary 2024-11-28 15h : 6 posts
- 14:2 : Propertyrec Leak Exposes Over Half a Million Background Check Records
- 14:2 : Over 1,000 People Arrested by Interpol in Africa as it Cracks Down on Cybercrime
- 14:2 : Zyxel Networks SecuPilot simplifies threat analysis and reporting
- 13:32 : Australian Senate Passes Social Media Ban For Under-16s
- 13:32 : North Korean hackers have stolen billions in crypto by posing as VCs, recruiters and IT workers
- 13:5 : IT Security News Hourly Summary 2024-11-28 14h : 7 posts
- 13:2 : Fastest Supercomputer Advances Manhattan Project Simulations
- 13:2 : Critical Vulnerabilities in CleanTalk WordPress Plugin Put 200,000 Websites at Risk
- 13:2 : Malicious Actors Exploit ProjectSend Critical Vulnerability
- 12:35 : FTC Opens Antitrust Investigation Into Microsoft
- 12:35 : NHS major ‘cyber incident’ forces hospitals to use pen and paper
- 12:14 : How to Back Up Proxmox Data with NAKIVO Backup & Replication
- 12:13 : The Future of Serverless Security in 2025: From Logs to Runtime Protection
- 11:39 : Hiring Kit: Cryptography Engineer
- 11:38 : Antivirus Policy
- 11:38 : Reframing Cybersecurity Awareness Raising: Exploring the human factor in cybersecurity communication
- 11:38 : T-Mobile Shares More Information on China-Linked Cyberattack
- 11:38 : XMLRPC npm Library Turns Malicious, Steals Data, Deploys Crypto Miner
- 11:38 : Critical Vulnerabilities Discovered in Industrial Wireless Access Point
- 11:5 : IT Security News Hourly Summary 2024-11-28 12h : 5 posts
- 11:2 : Microsoft Patches Exploited Vulnerability in Partner Network Website
- 10:36 : Critical Jenkins Vulnerability Let Attackers Trigger DoS & Inject Scripts
- 10:36 : APT trends report Q3 2024
- 10:36 : Cybercriminals Exploit Popular Game Engine Godot to Distribute Cross-Platform Malware
- 10:35 : Albanian Drug Smugglers Busted After Cops Decrypt Comms
- 10:5 : IT Security News Hourly Summary 2024-11-28 11h : 5 posts
- 10:2 : Shut Down Phishing Attacks -Detection & Prevention Checklist
- 10:2 : T-Mobile Claims Salt Typhoon Did Not Access Customer Data