60 posts were published in the last hour
- 20:5 : IT Security News Hourly Summary 2025-01-01 21h : 1 posts
- 19:32 : Proposed updates to HIPAA Security Rule mandate to restore the loss of certain relevant electronic information systems and data within 72 hours
- 18:32 : Hackers Breach Cyberhaven’s Chrome Extension in Supply-Chain Attack, Exfiltrating Sensitive Data
- 17:32 : Russia Blocked Viber For Violating State Laws
- 17:32 : Recent US Court Ruling Comes As A Huge Setback To The NSO Group
- 17:32 : 7 Years Old RCE Vulnerability Addressed In Kerio Control
- 17:32 : New Phishing Campaign Exploits Google Calendar To Evade Filters
- 17:7 : FTX Executives See Prison Sentences Reduced – Report
- 16:33 : Beijing Denies Involvement In US Treasury Cyberattack
- 16:32 : American Addiction Centers Cyberattack Exposes Sensitive Data of 422,424 Individuals
- 16:5 : Air Fryer espionage raises data security concerns
- 16:5 : Deepening Government Use of AI and E-Government Transition in Latin America: 2024 in Review
- 16:4 : Decentralization Reaches a Turning Point: 2024 in review
- 15:32 : Logical Reasoning in Network Problems
- 15:32 : What Is Patch Tuesday? Microsoft’s Monthly Update Explained
- 15:32 : Kids Online Safety Act Continues to Threaten Our Rights Online: 2024 in Review
- 15:7 : New “DoubleClickjacking” Exploit Bypasses Clickjacking Protections on Major Websites
- 14:33 : Microsofts größter Software-Flop: Nur 3 Kunden wollten es behalten
- 14:33 : U.S. Treasury sanctions Russian and Iranian entities for interfering in the presidential election
- 14:5 : New Stealthy Malware Leveraging SSH Over TOR Attacking Ukrainian Military
- 14:5 : IT Security News Hourly Summary 2025-01-01 15h : 2 posts
- 14:5 : DrayTek Devices Vulnerability Let Attackers Arbitrary Commands Remotely
- 14:4 : Eight things that should not have happened last year, but did
- 13:3 : Do Kwon Finally Extradited to United States
- 13:3 : How To Navigate Certification Authority Distrust: Preventing Critical Incidents by Switching To A New Vendor
- 13:3 : Combatting the Security Awareness Training Engagement Gap
- 13:3 : North Korean Hackers Set New Record with $1.8 Billion Crypto Heist
- 12:4 : Iranian and Russian Entities Sanctioned for Election Interference Using AI and Cyber Tactics
- 11:32 : SpaceX Agrees ‘Direct-To-Cell’ Starlink Service For Ukraine
- 11:32 : Hey, Maybe It’s Time to Delete Some Old Chat Histories
- 11:7 : FortiGuard Labs Links New EC2 Grouper Hackers to AWS Credential Exploits
- 11:7 : Critical Security Issue Hits Four-Faith Routers
- 11:5 : IT Security News Hourly Summary 2025-01-01 12h : 4 posts
- 10:32 : Happy New Year 2025
- 10:32 : Key Cyber Threats to Watch in 2025
- 10:32 : In Praise of Bureaucracy – A New Era of Cyber Threats
- 10:32 : Cybercriminals Leverage LLMs to Generate 10,000 Malicious Code Variants
- 9:10 : 38C3: CCC-Hacker fordern maschinenlesbare TÜV-Plakette für vernetzte Geräte
- 9:10 : heise-Angebot: iX-Workshop: Lokales Active Directory gegen Angriffe absichern
- 9:9 : US Army soldier who allegedly stole Trump’s AT&T call logs arrested
- 8:33 : Diese 11 kostenlosen Apps sind ein Muss für jeden Mac-Nutzer
- 8:32 : Stay Ahead: Integrating IAM with Your Cloud Strategy
- 8:32 : Be Certain Your Data is Guarded with Cloud Compliance
- 8:32 : Satisfied with Your Cybersecurity? Think Again
- 8:32 : Delivering Value: Secure Secrets Scanning Solutions
- 8:32 : Gain Control with Advanced Secrets Vaulting
- 8:7 : Sieben KI-Trends für ein sicheres 2025
- 8:7 : “Passwort” Folge 22: Der Podcast macht einen Ausflug zum 38C3
- 7:2 : The Evolution of Ransomware: From the 1970s to 2024
- 6:32 : Cybersecurity news headlines trending on Happy New Year 2025
- 2:32 : Exposing the Rogue Cyberheaven Compromised Chrome VPN Extensions Ecosystem – An Analysis
- 0:32 : Freedom in Cybersecurity: Keys to Unlock Potential
- 0:32 : Scaling Your Security with Cloud-Native Practices
- 0:32 : Capable Defenses: Mastering Least Privilege Tactics
- 0:32 : Get Excited: Innovations in Privileged Access Mgmt
- 0:32 : Reassured Safety with Advanced Threat Detection
- 23:9 : Bad Likert Judge: A Novel Multi-Turn Technique to Jailbreak LLMs by Misusing Their Evaluation Capability
- 23:5 : IT Security News Hourly Summary 2025-01-01 00h : 2 posts
- 23:1 : IT Security News Weekly Summary January
- 22:55 : IT Security News Daily Summary 2024-12-31