210 posts were published in the last hour
- 22:55 : IT Security News Daily Summary 2024-12-15
- 20:5 : IT Security News Hourly Summary 2024-12-15 21h : 1 posts
- 19:36 : MC2 Data – 2,122,280 breached accounts
- 18:34 : Exploit attempts inspired by recent Struts2 File Upload Vulnerability (CVE-2024-53677, CVE-2023-50164), (Sun, Dec 15th)
- 18:34 : Week in review: Microsoft fixes exploited 0-day, top cybersecurity books for your holiday gift list
- 17:32 : Group-IB Unveils Sophisticated Phishing Campaign Targeting Global Organizations
- 17:5 : IT Security News Hourly Summary 2024-12-15 18h : 1 posts
- 16:34 : PUMAKIT, a sophisticated rootkit that uses advanced stealth mechanisms
- 16:2 : Auguria Unveils Upgraded Security Knowledge Layer Platform at Black Hat Europe 2024
- 14:5 : IT Security News Hourly Summary 2024-12-15 15h : 3 posts
- 13:34 : How to Improve Your Cyber Resilience by Strengthening User Privileges
- 13:34 : Active Exploitation of Cleo Communications’ File Transfer Software Exposes Critical Vulnerabilities
- 13:6 : Beyond Encryption: Advancing Data-in-Use Protection
- 12:34 : The Simple Math Behind Public Key Cryptography
- 12:4 : Is Bitcoin Vulnerable to Google’s Quantum Breakthrough?
- 12:4 : Data Breach at Datavant Exposes Thousands of Minors to Cyber Threats
- 11:34 : SECURITY AFFAIRS MALWARE NEWSLETTER – ROUND 24
- 11:5 : IT Security News Hourly Summary 2024-12-15 12h : 1 posts
- 10:31 : Security Affairs newsletter Round 502 by Pierluigi Paganini – INTERNATIONAL EDITION
- 8:34 : Fortinet Acquires Perception Point to Enhance AI-Driven Cybersecurity
- 7:4 : Securing Against Shopping Scams: Cybersecurity Risks to Avoid During the Holidays
- 5:5 : IT Security News Hourly Summary 2024-12-15 06h : 4 posts
- 4:7 : Innovating with Secure Secrets Rotation Techniques
- 4:7 : Proactive Approaches to Identity and Access Management
- 4:7 : Navigating Cloud Security for Future Proofing Your Assets
- 4:6 : Gaining Confidence Through Effective Secrets Vaulting
- 23:38 : Rhode Island says personal data likely breached in social services cyberattack
- 23:5 : IT Security News Hourly Summary 2024-12-15 00h : 2 posts
- 22:55 : IT Security News Daily Summary 2024-12-14
- 22:32 : IOCONTROL cyberweapon used to target infrastructure in the US and Isreael
- 21:38 : Black Hat Europe 2024: Why a CVSS score of 7.5 may be a ‘perfect’ 10 in your organization
- 21:38 : Black Hat Europe 2024: Hacking a car – or rather, its infotainment system
- 20:5 : IT Security News Hourly Summary 2024-12-14 21h : 2 posts
- 19:32 : 2024 Year in Review: Features and Improvements in Pure Signal™ Scout
- 19:32 : DEF CON 32 – MobileMesh RF Network Exploitation Getting the Tea from goTenna
- 19:2 : 2024 Year in Review: Features and Improvements in Pure Signal™ Scout
- 18:31 : 2024 Year in Review: Features and Improvements in Pure Signal™ Scout
- 18:4 : 2024 Year in Review: Features and Improvements in Pure Signal™ Scout
- 17:32 : U.S. CISA adds Cleo Harmony, VLTrader, and LexiCom flaw to its Known Exploited Vulnerabilities catalog
- 17:32 : Upcoming Speaking Events
- 17:31 : 2024 Year in Review: Features and Improvements in Pure Signal™ Scout
- 17:5 : IT Security News Hourly Summary 2024-12-14 18h : 1 posts
- 17:2 : 2024 Year in Review: Features and Improvements in Pure Signal™ Scout
- 16:2 : “Password Era is Ending,” Microsoft to Delete 1 Billion Passwords
- 16:2 : 2024 Year in Review: Features and Improvements in Pure Signal™ Scout
- 16:2 : Blue Yonder Cyberattack: A Wake-Up Call for Supply Chain Security
- 15:32 : 2024 Year in Review: Features and Improvements in Pure Signal™ Scout
- 15:2 : 2024 Year in Review: Features and Improvements in Pure Signal™ Scout
- 15:2 : Misconfigured AWS Cloud Instances Lead to Sensitive Data Breaches
- 15:2 : The Intersection of Travel and Data Privacy: A Growing Concern
- 14:36 : Password Era is Ending Microsoft to Delete 1 Billion Passwords
- 14:36 : Google’s Quantum Computing Leap: Introducing the “Willow” Chip
- 14:36 : Lynx Ransomware Breach Targets Romania’s Electrica Group
- 14:5 : IT Security News Hourly Summary 2024-12-14 15h : 1 posts
- 13:34 : Over 300,000 Prometheus Servers Vulnerable to DoS Attacks Due to RepoJacking Exploit
- 13:4 : Benefits of Network Monitoring Systems
- 12:34 : Germany Disrupts BADBOX Malware on 30,000 Devices Using Sinkhole Action
- 12:4 : Bitdefender Total Security review: One of the top antivirus options you can buy
- 12:4 : Microsoft’s AI Recall Tool Is Still Sucking Up Credit Card and Social Security Numbers
- 11:36 : CSC 2025 Predictions: From Surges in AI-Generated Malware to Machine Learning in SOCs
- 11:6 : Addressing the Disconnect in External Attack Surface Awareness
- 11:5 : IT Security News Hourly Summary 2024-12-14 12h : 1 posts
- 10:34 : Thai Officials Targeted in Yokai Backdoor Campaign Using DLL Side-Loading Techniques
- 9:36 : Legacy VPNs: A Ticking Time Bomb for Modern Organizations
- 8:7 : Tibber – 50,002 breached accounts
- 8:6 : Yonéma – 35,962 breached accounts
- 8:5 : IT Security News Hourly Summary 2024-12-14 09h : 1 posts
- 7:36 : AI and Quantum Computing – Waves of innovation and Cyber Security Concerns: Cyber Security Today Weekend for December 14, 2024
- 2:5 : IT Security News Hourly Summary 2024-12-14 03h : 2 posts
- 1:6 : Building a Future-Ready Cybersecurity Workforce: The OffSec Approach to Talent Development
- 1:6 : Red Team vs Blue Team in Cybersecurity
- 0:4 : Iran-linked crew used custom ‘cyberweapon’ in US critical infrastructure attacks
- 23:34 : Crypted Hearts: Exposing the HeartCrypt Packer-as-a-Service Operation
- 23:9 : Black Hat Europe 2024: Can AI systems be socially engineered?
- 23:9 : Australian IT Pros Urged to Guard Against Chinese Cybersecurity Threats
- 23:9 : Scumbag gets 30 years in the clink for running CSAM dark-web chatrooms, abusing kids
- 23:9 : Unauthenticated Webpages: Hidden HIPAA Risks on Public-Facing Websites
- 23:5 : IT Security News Hourly Summary 2024-12-14 00h : 4 posts
- 22:55 : IT Security News Daily Summary 2024-12-13
- 22:7 : Canadian Eyecare Firm Care1 Exposes 2.2TB of Patient Records
- 22:6 : Risk & Repeat: Attacks ramp up on Cleo MFT software
- 22:6 : Week in Review: Salt Typhoon saga, Microsoft MFA bypass, Yahoo cuts Paranoids
- 21:34 : UnitedHealth’s Optum left an AI chatbot, used by employees to ask questions about claims, exposed to the internet
- 21:34 : German agency BSI sinkholed a botnet of 30,000 devices infected with BadBox
- 21:34 : Google Timeline location purge causes collateral damage
- 20:38 : Starbucks, Supermarkets Targeted in Ransomware Attack
- 20:38 : How AI is shaping the future of the cybersecurity workforce
- 20:38 : Migrate to passwordless to enhance security and UX
- 20:38 : UnitedHealthcare’s Optum left an AI chatbot, used by employees to ask questions about claims, exposed to the internet
- 20:38 : Hacker Uses Info-Stealer Against Security Pros, Other Bad Actors
- 20:38 : 390,000+ WordPress Credentials Stolen via Malicious GitHub Repository Hosting PoC Exploits
- 20:5 : IT Security News Hourly Summary 2024-12-13 21h : 2 posts
- 20:4 : The New Jersey Drone Mystery May Not Actually Be That Mysterious
- 20:4 : Speaking Freely: Prasanth Sugathan
- 18:38 : Serhiy Tokarev Explains Why Health Tech Startups Are Worth Investing In
- 18:38 : CISA and EPA Release Joint Fact Sheet Detailing Risks Internet-Exposed HMIs Pose to WWS Sector
- 18:38 : Do(ug)h! Krispy Kreme Suffers Cyberattack
- 18:4 : Video: How Two Crypto Scammers Stole $230 Million in Bitcoin
- 18:4 : Cyberint’s 2024 Report Highlights Surge in Credential Theft and Rise of AI-Powered Phishing
- 18:4 : Critical OpenWrt Vulnerability Exposes Devices to Malicious Firmware Injection
- 18:4 : Generative AI adoption and compliance: Simplifying the path forward with AWS Audit Manager
- 17:36 : Keeper review: An easy-to-use password manager with top-notch security features
- 17:36 : Mandiant Uncovers QR Code Exploit to Bypass Browser Isolation
- 17:5 : The best VPN routers of 2024
- 17:5 : Why the US Military Can’t Just Shoot Down the Mystery Drones
- 17:5 : 4.8 million healthcare records left freely accessible
- 17:5 : IT Security News Hourly Summary 2024-12-13 18h : 7 posts
- 17:5 : Ultralytics Supply-Chain Attack
- 17:4 : Beware of Malicious USB-C Cables: Hidden Cyber Threats
- 17:4 : DoJ Indicts 14 North Koreans for $88M IT Worker Fraud Scheme Over Six Years
- 16:34 : Akamai Technical Academy and Coursera: A Year of STEM Education Success
- 16:34 : Akamai?s Perspective on December?s Patch Tuesday 2024
- 16:34 : The Role of Blockchain and Smart Contracts in Securing Digital Transactions
- 16:34 : Embracing Cybersecurity Regulations
- 16:2 : Krispy Kreme Doughnut Cyber Attack might affect Christmas sales
- 16:2 : SEC Probe Reopens Probe Into Musk’s Neuralink – Report
- 16:2 : Critical Vulnerabilities Found in Ruijie Reyee Cloud Management Platform
- 16:2 : Artivion Discloses Ransomware Attack, Disrupting Operations
- 15:38 : XRefer: The Gemini-Assisted Binary Navigator
- 15:38 : Deep Packet Inspection (DPI): Balancing Security and Privacy in the Digital Age
- 15:38 : Cyber Threat Alert for South Korea from North Korean Hackers
- 15:38 : US Uncovers North Korean IT Worker Fraud, Offers $5M Bounty
- 15:6 : Cyber protection made intuitive and affordable
- 15:6 : Ransomware in the Global Healthcare Industry
- 14:36 : Human Misuse Will Make Artificial Intelligence More Dangerous
- 14:35 : Digital Finance: How Do Banks Protect Their Customers’ Money and Data from Cybercriminals?
- 14:35 : US Offers $5M for Info on North Korean IT Worker Fraud
- 14:8 : In Other News: Gen Digital Makes $1B Buy, Recall Captures Sensitive Data, MITRE ATT&CK Evaluations
- 14:8 : 2024 Sees Sharp Increase in Microsoft Tool Exploits
- 14:5 : IT Security News Hourly Summary 2024-12-13 15h : 5 posts
- 13:35 : Intel Interim CEOs Hints At Selling Foundry Business,
- 13:35 : Bitcoin ATM Giant Byte Federal Hit by Hackers, 58,000 Users Impacted
- 13:35 : Unlocking the Power of In-Context Emulation in Malware Sandboxing
- 13:35 : Hackers Possibly Stole Personal Data From Bitcoin ATM Operator Byte Federal
- 13:34 : Akira and RansomHub Surge as Ransomware Claims Reach All-Time High
- 13:3 : Autonomous, Deterministic Security for Mission-Critical IOT Systems
- 13:2 : Drowning in Visibility? Why Cybersecurity Needs to Shift from Visibility to Actionable Insight
- 12:36 : U.S. authorities seized cybercrime marketplace Rydox
- 12:36 : How to Generate a CrowdStrike RFM Report With AI in Tines
- 12:36 : Iran-Linked IOCONTROL Malware Targets SCADA and Linux-Based IoT Platforms
- 12:5 : Ways to Mitigate Risk in Cybersecurity: Cybersecurity Risk Management
- 12:5 : Mozilla Drops ‘Do Not Track’ For Upcoming Firefox Browser
- 12:4 : Rydox Cybercrime Marketplace Disrupted, Administrators Arrested
- 11:34 : Germany Sinkholes Botnet of 30,000 BadBox-Infected Devices
- 11:34 : Thales and Imperva Win Big in 2024
- 11:34 : Researchers Discover Malware Used by Nation-Sates to Attack Industrial Systems
- 11:5 : IT Security News Hourly Summary 2024-12-13 12h : 6 posts
- 11:2 : What is typosquatting (and how can I protect myself)?
- 11:2 : Iranian Hackers Use IOCONTROL Malware to Target OT, IoT Devices in US, Israel
- 10:35 : As the Mastermind of Far-Right ‘Active Clubs’ Goes to Prison, His Violent Movement Goes Global
- 10:35 : What is gRPC and How Does it Enhance API Security?
- 10:6 : Black Hat Europe Recap: Auguria Debuts Newly Enhanced Platform
- 10:6 : ISC2 Survey Reveals Critical Gaps in Cybersecurity Leadership Skills
- 9:47 : 2025 Outlook: Turning Threats into Opportunities in a New Era of Innovation
- 9:47 : Nigerian National Extradited to Nebraska for Wire Fraud Charges
- 9:47 : New Linux Rootkit PUMAKIT Uses Advanced Stealth Techniques to Evade Detection
- 9:47 : Building a Stronger Data Loss Prevention Strategy Through Risk Assessment
- 9:47 : Taming the multi-vault beast
- 9:5 : How the Cyber Grinch Stole Christmas: Safeguard Your Festive Season
- 9:5 : Dell Security Update, Patch for Multiple Critical Vulnerabilities
- 9:5 : UK Shoppers Frustrated as Bots Snap Up Popular Christmas Gifts
- 8:36 : The three top cybersecurity predictions for 2025
- 8:36 : Experts discovered the first mobile malware families linked to Russia’s Gamaredon
- 8:36 : Celigo Private Cloud enhances security and connectivity
- 8:35 : Rubrik Turbo Threat Hunting accelerates cyber recovery
- 8:35 : Microsoft MFA bypass, cybercrime marketplace takedown, Sophos hacker charged
- 8:6 : Vishing via Microsoft Teams Facilitates DarkGate Malware Intrusion
- 8:6 : Convincing a billion users to love passkeys: UX design insights from Microsoft to boost adoption and security
- 8:5 : IT Security News Hourly Summary 2024-12-13 09h : 7 posts
- 7:49 : CISA Issues 10 New Advisories on Industrial Control System Vulnerabilities
- 7:49 : FBI Busts Rydox Marketplace with 7,600 PII Sales, Cryptocurrency Worth $225K Seized
- 7:48 : Top Phishing Exploits fo 2024: Cyber Security Today for Friday, December 13, 2024
- 7:10 : Operation Power Off: International Effort Targets DDoS-for-Hire Networks
- 7:10 : How AI will both threaten and protect data in 2025
- 7:10 : Hackers Target Global Sporting Events with Fake Domains to Steal Logins
- 7:9 : It’s Beginning to look a lot like Grinch bots
- 6:36 : FBI Seizes Rydox Marketplace, Arrests Key Administrators
- 6:7 : Not Every Gift Comes from Santa Claus: Avoiding Cyber Scams This Holiday Season
- 5:38 : FuzzyAI: Open-source tool for automated LLM fuzzing
- 5:7 : CISOs need to consider the personal risks associated with their role
- 5:6 : Tackling software vulnerabilities with smarter developer strategies
- 5:5 : IT Security News Hourly Summary 2024-12-13 06h : 1 posts
- 4:33 : Snowflake Will Make MFA Mandatory Next Year
- 4:3 : New infosec products of the week: December 13, 2024
- 2:7 : ISC Stormcast For Friday, December 13th, 2024 https://isc.sans.edu/podcastdetail/9254, (Fri, Dec 13th)
- 2:5 : IT Security News Hourly Summary 2024-12-13 03h : 6 posts
- 1:7 : North Korea’s fake IT worker scam hauled in at least $88 million over six years
- 1:7 : What’s a Zero-Day Vulnerability? Prevent Exploits and Attacks
- 1:7 : 10 Container Security Best Practices: A Guide
- 1:7 : Understanding the Role of AI in Cybersecurity
- 1:7 : What Is an Application Vulnerability? 8 Common Types
- 1:7 : Achieving CyberSecure Canada Certification
- 0:34 : 7 Must-Have Salesforce Security Practices
- 23:37 : Professions That Are the Most Exposed to Cybersecurity Threats
- 23:37 : US Bitcoin ATM operator Byte Federal suffered a data breach
- 23:5 : Holding Back Salt Typhoon + Other Chinese APT CVEs
- 23:5 : IT Security News Hourly Summary 2024-12-13 00h : 3 posts
- 22:55 : IT Security News Daily Summary 2024-12-12
- 22:35 : The Growing Importance of Secure Crypto Payment Gateways
- 22:35 : EFF Speaks Out in Court for Citizen Journalists
- 21:5 : Cleo patches file transfer zero-day flaw under attack
- 21:5 : Yahoo cybersecurity team sees layoffs, outsourcing of ‘red team,’ under new CTO
- 20:34 : Google Launches Gemini 2.0 with Autonomous Tool Linking
- 20:5 : What’s the difference between jailbreaking and rooting?
- 20:5 : X’s Last-Minute Update to the Kids Online Safety Act Still Fails to Protect Kids—or Adults—Online
- 20:5 : Fake IT Workers Funneled Millions to North Korea, DOJ Says
- 20:5 : IT Security News Hourly Summary 2024-12-12 21h : 6 posts
- 19:36 : Something to Read When You Are On Call and Everyone Else is at the Office Party
- 19:36 : UN Body To Protect Subsea Cables Holds First Meeting
- 19:36 : US Sanctions Chinese Cybersecurity Firm for Firewall Exploit, Ransomware Attacks