210 posts were published in the last hour
- 22:55 : IT Security News Daily Summary 2024-12-31
- 21:31 : Best of 2024: FIDO: Consumers are Adopting Passkeys for Authentication
- 21:6 : What You Need to Know about the US Treasury Breach – and How to Protect Your Organization from a “Major Incident”
- 20:31 : Rhode Island ’s data from health benefits system leaked on the dark web
- 20:5 : IT Security News Hourly Summary 2024-12-31 21h : 1 posts
- 19:31 : CRITICAL ALERT: Sophisticated Google Domain Exploitation Chain Unleashed
- 18:5 : A Happy, Prosperous & Safe New Year Wish For All
- 18:4 : New Two-Step Phishing Attack Exploits Microsoft Visio and SharePoint
- 18:4 : Cybercriminals Exploit Identity Verification Systems
- 17:32 : Buying a new VPN? 3 things to consider when shopping around – and why ‘free’ isn’t always best
- 17:32 : Sanctions Imposed on North Korean Cyber Activities Supporting Nuclear Ambitions
- 17:5 : IT Security News Hourly Summary 2024-12-31 18h : 4 posts
- 17:2 : CISA Adds One Known Exploited Vulnerability to Catalog
- 16:32 : Hacking campaign compromised at least 16 Chrome browser extensions
- 16:32 : rth Korean Hackers Deploy OtterCookie Malware in Contagious Interview Campaign
- 16:32 : Cyberattack Compromises European Space Agency Online Store Security
- 16:4 : Here’s the little known iPhone data security secret, the Lockdown Mode
- 16:4 : US Treasury Department outs the blast radius of BeyondTrust’s key leak
- 15:32 : Federal Regulators Limit Location Brokers from Selling Your Whereabouts: 2024 in Review
- 15:32 : Fighting Online ID Mandates: 2024 In Review
- 15:31 : AI and Policing: 2024 in Review
- 14:32 : How to easily use Cloudflare’s secure DNS on your Mac and why it even matters
- 14:32 : US telco Lumen says its network is now clear of China’s Salt Typhoon hackers
- 14:32 : Data breaches in 2024: Could it get any worse?
- 14:32 : Connected contraptions cause conniption for 2024
- 14:32 : Rhode Islanders’ Data Was Leaked From a Cyberattack on State Health Benefits Website
- 14:32 : Why ISMS Policies Are Crucial for Compliance in Cybersecurity?
- 14:5 : IT Security News Hourly Summary 2024-12-31 15h : 7 posts
- 14:4 : Safeguarding Executives in the Digital World
- 13:32 : New Year’s cybersecurity resolutions that every startup should keep
- 13:32 : Cyberhaven Chrome Extension Hack Linked to Widening Supply Chain Campaign
- 13:7 : 2024 – The Year of Learning More and More
- 13:7 : CISA Warns of Palo Alto Networks PAN-OS Vulnerability Exploited in Wild
- 13:6 : DeepDLL– A New Approach to Detect Malicious DLLs
- 13:6 : Protect SAP Supply Chains by Preventing Cyber Attacks
- 12:32 : Trump Urges Supreme Court To Delay TikTok Deadline
- 12:32 : New York Agencies Must Publish AI Assessments Under New Law
- 12:32 : Run:ai To Open Source Software As Nvidia Completes $700m Buy
- 12:32 : US Treasury Workstations Hacked By China In ‘Major Incident’
- 12:32 : Gift Card Fraud
- 12:32 : China’s cyber intrusions took a sinister turn in 2024
- 12:9 : New U.S. DoJ Rule Halts Bulk Data Transfers to Adversarial Nations to Protect Privacy
- 11:5 : IT Security News Hourly Summary 2024-12-31 12h : 1 posts
- 11:2 : US Treasury Department Breach, Hackers Accessed Workstations
- 9:32 : ByteDance Capex Dwarfs Chinese Rivals In AI Spending Boom
- 9:32 : AI Could Manipulate Users For Profit In ‘Intention Economy’
- 9:31 : Southern China Districts Unite For Robotaxi Framework
- 8:32 : Top Data Breaches in December 2024
- 8:32 : Top CVEs & Vulnerabilities of December 2024
- 8:32 : Strobes Security 2024: Year in Review
- 8:32 : Cisco data leak, Microsoft domain transition, stories of the year
- 8:5 : IT Security News Hourly Summary 2024-12-31 09h : 1 posts
- 7:32 : China-linked actors hacked US Treasury Department
- 7:4 : No Holiday Season for Attackers, (Tue, Dec 31st)
- 7:4 : TrueNAS CORE Vulnerability Let Attackers Execute Remote Code
- 7:4 : Chinese APT Exploits BeyondTrust API Key to Access U.S. Treasury Systems and Documents
- 6:2 : Chinese APT Hackers behind US Treasury breach of data
- 6:2 : Cybersecurity Trends of 2024: Adapting to a Changing Threat Landscape
- 5:32 : Chinese Hackers Accessed US Treasury Workstations in ‘Major’ Cybersecurity Incident
- 5:32 : Why software is the key to FI risk management
- 5:32 : Misconfigured Kubernetes RBAC in Azure Airflow Could Expose Entire Cluster to Exploitation
- 5:5 : IT Security News Hourly Summary 2024-12-31 06h : 5 posts
- 5:2 : The state of cybersecurity and IT talent shortages
- 5:2 : Regulations, security, and remote work: Why network outsourcing is booming
- 4:32 : U.S. Army Soldier Arrested in AT&T, Verizon Extortions
- 4:31 : Hottest cybersecurity open-source tools of the month: December 2024
- 4:6 : US Treasury Department Admits It Got Hacked by China
- 0:31 : An X user claimed a 7-Zip zero-day vulnerability, but 7-Zip’s creator says is a fake
- 0:5 : More telcos confirm Salt Typhoon breaches as White House weighs in
- 23:5 : IT Security News Hourly Summary 2024-12-31 00h : 3 posts
- 22:55 : IT Security News Daily Summary 2024-12-30
- 22:32 : 16 Chrome Extensions Hacked in Large-Scale Credential Theft Scheme
- 22:32 : US Treasury says China accessed government documents in ‘major’ cyberattack
- 22:2 : US Treasury says China stole documents in ‘major’ cyberattack
- 21:32 : Best of 2024: 30,000 Dealerships Down — ‘Ransomware’ Outage Outrage no. 2 at CDK Global
- 21:2 : Randall Munroe’s XKCD ‘Sun Avoidance’
- 20:32 : Volkswagen leak exposed precise location data on thousands of vehicles across Europe for months
- 20:7 : Is nowhere safe from AI slop? (Lock and Code S05E27)
- 20:5 : IT Security News Hourly Summary 2024-12-30 21h : 2 posts
- 19:34 : New Windows 11 24H2 bug could block future security updates – see who’s affected
- 19:34 : Windows 11 Media Update Bug Stops Security Updates
- 19:5 : The future of hybrid cloud: What to expect in 2025 and beyond
- 19:4 : Protect Yourself from Zelle Scams: Prevention Tips and Recovery Steps
- 18:4 : Forrester on cybersecurity budgeting: 2025 will be the year of CISO fiscal accountability
- 18:4 : VW Cars Leak Private Data of 800,000 — ‘Volksdaten’
- 18:4 : Rising Cyber Threats in Q3 2024: AI’s Dual Role in Attacks and Defense
- 17:32 : NFS Protocol Security Bypassed To Access Files From Remote Server
- 17:32 : Hackers Weaponize Websites With LNK File To Deliver Weaponized LZH File
- 17:32 : New Botnet Exploiting D-Link Routers To Gain Control Remotely
- 17:32 : Top public cloud service providers of 2025: How they compare
- 17:32 : Understanding VoIP DDoS Attacks: Prevention and Mitigation Strategies
- 17:5 : IT Security News Hourly Summary 2024-12-30 18h : 1 posts
- 16:32 : Catching “EC2 Grouper”- no indicators required!
- 16:3 : Italy faces DDOS attacks from Russia
- 16:3 : SquareX Researchers Uncover OAuth Vulnerability in Chrome Extensions Days Before Major Breach
- 16:2 : State Legislatures Are The Frontline for Tech Policy: 2024 in Review
- 16:2 : Fighting Automated Oppression: 2024 in Review
- 16:2 : Exposing Surveillance at the U.S.-Mexico Border: 2024 Year in Review in Pictures
- 15:32 : Cisco states that the second data leak is linked to the one from October
- 15:32 : Vulnerability Summary for the Week of December 23, 2024
- 15:4 : SquareX Researchers Expose OAuth Attack on Chrome Extensions Days Before Major Breach
- 15:4 : New 7-Zip 0-Day Exploit Leaked That Allow Attackers Control Victim Devices Remotely
- 15:4 : VyprVPN Review (2025): Can It Still Perform This Year and Beyond?
- 15:4 : How MXDR Services Solve Cyber Talent Shortages
- 14:31 : Critical Infrastructure Faces Rising Ransomware Risks
- 14:5 : IT Security News Hourly Summary 2024-12-30 15h : 8 posts
- 14:2 : VyprVPN Review: Can It Still Perform This Year and Beyond?
- 14:2 : NSFOCUS ISOP Listed in The Security Analytics Platform Landscape Report by Forrester
- 13:32 : Palo Alto Networks Patches Firewall Zero-Day Exploited for DoS Attacks
- 13:5 : Exposed Cloud Server Tracks 800,000 Volkswagen, Audi, and Skoda EVs
- 13:5 : Kubernetes Ephemeral Containers: Enhancing Security and Streamlining Troubleshooting in Production Clusters
- 13:5 : The Email Security Revolution – How the Market Landscape Has Changed
- 13:5 : The Traditional Advocates of the Security Perimeter Don’t Want You to Know about Data-Centric Security
- 13:5 : Four-Faith Industrial Router Vulnerability Exploited in Attacks
- 13:4 : ⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips
- 13:4 : New HIPAA Rules Mandate 72-Hour Data Restoration and Annual Compliance Audits
- 12:32 : Ninth Telecoms Firm Hacked By China
- 12:32 : Japan Airlines Flights Delayed By Cyber-Attack
- 12:32 : Former OpenAI Engineer, Whistleblower Passes Away At 26
- 12:32 : Italy Fines OpenAI 15m Euros Over Data Collection
- 12:32 : OpenAI Gives Details On For-Profit Shift
- 12:32 : AT&T and Verizon say networks are secure after being breached by China-linked Salt Typhoon hackers
- 12:32 : Salt Typhoon’s Reach Continues to Grow
- 12:32 : US Issues Final Rule for Protecting Personal Data Against Foreign Adversaries
- 12:2 : The Most Dangerous People on the Internet in 2024
- 12:2 : Several Chrome Extensions Compromised in Supply Chain Attack
- 12:2 : When Good Extensions Go Bad: Takeaways from the Campaign Targeting Browser Extensions
- 11:32 : Changes in SSL and TLS support in 2024, (Mon, Dec 30th)
- 11:32 : “Vishing,” “Quishing,” and AI Scams: The New Cybercrime Techniques You Need to Know About
- 11:32 : What’s Next for Cybersecurity in 2025 and Beyond? Fortra Experts Weigh In
- 11:32 : The Future of AI Regulation: Balancing Innovation and Safety in Silicon Valley
- 11:31 : Cisco Confirms Authenticity of Data After Second Leak
- 11:5 : IT Security News Hourly Summary 2024-12-30 12h : 1 posts
- 10:31 : Verizon says it has secured its network after breach by China-linked Salt Typhoon group
- 10:4 : PoC Exploited Released for Oracle Weblogic Server Vulnerability
- 10:4 : 2024 Year in Review: What We Got Right and Looking to 2025
- 9:31 : Threat actors attempt to exploit a flaw in Four-Faith routers
- 9:7 : Understanding Data Leaks: Causes, Consequences, and Prevention Strategies
- 9:7 : Majority of UK SMEs Lack Cybersecurity Policy
- 8:32 : Brazil Suspends BYD EV Plant Construction Over Worker Conditions
- 8:32 : Microsoft Warns of Windows 11 24H2 Issue that Blocks Windows Security Updates
- 8:31 : Cyberhaven extension hacked, ZAGG data breach, Volkswagen cloud leak
- 8:5 : IT Security News Hourly Summary 2024-12-30 09h : 1 posts
- 7:32 : Builder.ai Data Breach Exposes Sensitive Information of Over 3 Million Users
- 7:4 : Top Law Enforcement Operations in Cybersecurity in 2024: A Year of Major Strikes Against Cybercrime
- 6:32 : Google trending Cybersecurity headlines for the last weekend
- 6:32 : Critical Flaw Exposes Four-Faith Routers to Remote Exploitation
- 6:32 : Four-Faith Industrial Routers Vulnerability Exploited in the Wild to Gain Remote Access
- 6:4 : The sixth sense of cybersecurity: How AI spots threats before they strike
- 5:5 : IT Security News Hourly Summary 2024-12-30 06h : 3 posts
- 5:2 : reconFTW: Open-source reconnaissance automation
- 4:32 : Cybercriminals tighten their grip on organizations
- 4:32 : Machine identities are the next big target for attackers
- 2:7 : Achieve Satisfaction with Streamlined Secrets Rotation Processes
- 2:7 : Empowering Security: Mastering Least Privilege
- 0:31 : ZAGG disclosed a data breach that exposed its customers’ credit card data
- 0:2 : Happy 15th Anniversary, KrebsOnSecurity!
- 23:5 : IT Security News Hourly Summary 2024-12-30 00h : 2 posts
- 22:58 : IT Security News Weekly Summary 52
- 22:55 : IT Security News Daily Summary 2024-12-29
- 21:32 : Is Platform Engineering a Step Towards Better Governed DevOps?
- 21:31 : Russia, Apple, And the New Front Line in The Fight for Internet Freedom
- 21:7 : Best Practices for Effective Privileged Access Management (PAM)
- 21:6 : Study Finds AI Can Guess Crypto Seed Phrases in 0.02 Seconds
- 19:4 : DEF CON 32 – How State Laws Meant to Protect Children Raise Other Risks
- 18:32 : Cyberhaven Hacked – Chrome Extension With 400,000 users Compromised
- 18:32 : It’s only a matter of time before LLMs jump start supply-chain attacks
- 18:32 : 16 Chrome Extensions Hacked, Exposing Over 600,000 Users to Data Theft
- 18:4 : Anomaly Detection for Cybersecurity
- 17:32 : AT&T and Verizon Hacked – Salt Typhoon Compromised The Network For High Profiles
- 17:5 : IT Security News Hourly Summary 2024-12-29 18h : 1 posts
- 16:32 : China-linked APT Salt Typhoon breached a ninth U.S. telecommunications firm
- 14:32 : SECURITY AFFAIRS MALWARE NEWSLETTER – ROUND 26
- 14:5 : IT Security News Hourly Summary 2024-12-29 15h : 5 posts
- 13:32 : Security Affairs newsletter Round 504 by Pierluigi Paganini – INTERNATIONAL EDITION
- 13:32 : A 9th Telecoms Firm Has Been Hit by a Massive Chinese Espionage Campaign, the White House Says
- 13:32 : Bitcoin Heist in Japan Attributed to North Korean Cybercriminals
- 13:32 : CISA’s Enhanced Mobile Security Recommendations Following U.S. Telecom Breach
- 13:32 : Here’s How Google Willow Chip Will Impact Startup Innovation in 2025
- 11:5 : IT Security News Hourly Summary 2024-12-29 12h : 3 posts
- 11:4 : Restrictions on Free Expression and Access to Information in Times of Change: 2024 in Review
- 11:4 : Aerial and Drone Surveillance: 2024 in Review
- 11:4 : EFF’s 2023 Annual Report Highlights a Year of Victories: 2024 in Review
- 10:4 : This month in security with Tony Anscombe – December 2024 edition
- 23:34 : Gain Relief with Strategic Secret Governance
- 23:34 : Innovation in API Security: What’s New
- 23:5 : IT Security News Hourly Summary 2024-12-29 00h : 1 posts
- 22:55 : IT Security News Daily Summary 2024-12-28
- 20:36 : Behind the Diner—Digital Rights Bytes: 2024 in Review
- 20:36 : Cars (and Drivers): 2024 in Review
- 20:11 : NSA Surveillance and Section 702 of FISA: 2024 in Review
- 18:9 : Tech’s Move Toward Simplified Data Handling
- 18:9 : New Finds from The June Ascension Hack
- 17:32 : Pro-Russia group NoName targeted the websites of Italian airports
- 17:32 : DEF CON 32 – XR for All: Accessibility and Privacy for Disabled Users
- 17:13 : Secure Gaming During the Holidays
- 16:2 : FICORA, CAPSAICIN Botnets Exploit Old D-Link Router Flaws for DDoS Attacks
- 14:34 : 75% of Ransomware Attacks Target Healthcare on Holidays: Expert Insights
- 14:34 : AI Impersonations: Revealing the New Frontier of Scamming
- 14:13 : Integrating Human Expertise and Technology for Robust Cybersecurity
- 14:5 : IT Security News Hourly Summary 2024-12-28 15h : 2 posts
- 13:34 : Budget-Friendly Security Solutions That Work
- 13:34 : Reassured Compliance in Multi-Cloud Environments
- 13:2 : Wiping your Android phone? Here’s the easiest way to erase all personal data
- 13:2 : How cops taking down LockBit, ALPHV led to RansomHub’s meteoric rise
- 8:5 : IT Security News Hourly Summary 2024-12-28 09h : 2 posts
- 7:32 : 2024 Attack Surface Threat Intelligence Report – Cogility – TacitRed
- 7:32 : North Korea actors use OtterCookie malware in Contagious Interview campaign
- 7:4 : 15,000+ Four-Faith Routers Exposed to New Exploit Due to Default Credentials
- 2:5 : IT Security News Hourly Summary 2024-12-28 03h : 1 posts