Tag: hourly summary

IT Security News Hourly Summary 2025-04-13 12h : 3 posts

3 posts were published in the last hour 9:32 : Threat Actors Hijack Legitimate Crypto Packages to Inject Malicious Code 9:32 : Tycoon 2FA Phishing Kit Employs New Evasion Techniques to Bypass Endpoint Detection Systems 9:31 : Hackers Actively Exploiting…

IT Security News Hourly Summary 2025-04-13 03h : 4 posts

4 posts were published in the last hour 1:2 : ViperSoftX Malware Attacking Users via Cracked Software 1:2 : Shuckworm Group Uses PowerShell Based GammaSteel Malware in Targeted Attacks 0:34 : Exploit Attempts for Recent Langflow AI Vulnerability (CVE-2025-3248), (Sat,…

IT Security News Hourly Summary 2025-04-11 12h : 13 posts

13 posts were published in the last hour 10:2 : ISC Stormcast For Friday, April 11th, 2025 https://isc.sans.edu/podcastdetail/9404, (Fri, Apr 11th) 9:32 : TROX Stealer Harvests Sensitive Data Including Stored Credit Cards and Browser Credentials 9:32 : Ransomware Reaches A…

IT Security News Hourly Summary 2025-04-10 18h : 24 posts

24 posts were published in the last hour 16:2 : Sensata Technologies hit by a ransomware attack 16:2 : Smokeloader Users Identified and Arrested in Operation Endgame 16:2 : ViperSoftX Malware Spreads Through Cracked Software, Targeting Unsuspecting Users 16:2 :…

IT Security News Hourly Summary 2025-04-10 15h : 15 posts

15 posts were published in the last hour 13:4 : HollowQuill Malware Attacking Government Agencies Worldwide Via Weaponized PDF Documents 13:3 : Researchers Uncovered Hacking Tools and Techniques Discussed on Russian-Speaking Hacking Forums 13:3 : Microsoft 365 Family Subscriptions Users…

IT Security News Hourly Summary 2025-04-09 21h : 9 posts

9 posts were published in the last hour 19:2 : Microsoft: Windows CLFS Vulnerability Could Lead to ‘Widespread Deployment and Detonation of Ransomware’ 18:34 : Russian APT Hackers Use Device Code Phishing Technique to Bypass MFA 18:34 : SideCopy APT…

IT Security News Hourly Summary 2025-04-08 21h : 14 posts

14 posts were published in the last hour 18:32 : WhatsApp for Windows Flaw Could Let Hackers Sneak In Malicious Files 18:32 : New GIFTEDCROOK Stealer Targets Government Organizations to Exfiltrate Sensitive Data 18:32 : Attackers Exploit SourceForge Platform to…

IT Security News Hourly Summary 2025-04-08 15h : 15 posts

15 posts were published in the last hour 12:34 : Researchers demonstrate the UK’s first long-distance ultra-secure communication over a quantum network 12:34 : ESET Vulnerability Exploited for Stealthy Malware Execution 12:34 : Netskope One DLP On Demand enhances data…

IT Security News Hourly Summary 2025-04-06 15h : 3 posts

3 posts were published in the last hour 12:35 : Sec-Gemini v1 – Google’s New AI Model for Cybersecurity Threat Intelligence 12:35 : Security Affairs newsletter Round 518 by Pierluigi Paganini – INTERNATIONAL EDITION 12:35 : SECURITY AFFAIRS MALWARE NEWSLETTER…

IT Security News Hourly Summary 2025-04-04 09h : 6 posts

6 posts were published in the last hour 6:32 : Cyber Attack Hits Multiple Major Superannuation Providers in Australia, Resulting in Fund Theft and Account Lockdowns 6:32 : 5 Reasons to Secure Firmware in Financial Services Organizations 6:32 : Critical…

IT Security News Hourly Summary 2025-03-31 18h : 6 posts

6 posts were published in the last hour 15:36 : AWS WAF Classic vs WAFV2: Features and Migration Considerations 15:36 : New Ubuntu Security Bypasses Allow Attackers to Exploit Kernel Vulnerabilities 15:36 : Multiple Dell Unity Vulnerabilities Let Attackers Compromise…

IT Security News Hourly Summary 2025-03-31 15h : 4 posts

4 posts were published in the last hour 12:32 : Apache Camel Exploit Attempt by Vulnerability Scan (CVE-2025-27636, CVE-2025-29891), (Mon, Mar 31st) 12:32 : The Role of DevSecOps in Securing Multi-Cloud Architectures 12:31 : The PIN is Mightier Than the…