50 posts were published in the last hour
- 20:5 : IT Security News Hourly Summary 2025-05-10 21h : 2 posts
- 20:4 : Ascension reveals personal data of 437,329 patients exposed in cyberattack
- 18:31 : New AI System Lets Self-Driving Cars Share Road Experiences Like a Social Network
- 18:31 : Multiplatform Malware Campaign Uses PDF Invoices to Deploy Java-Based RAT
- 17:31 : Sophisticated PhaaS Phish Toolkits are Now Genetrating Realistic Fake Phishing Pages
- 17:5 : IT Security News Hourly Summary 2025-05-10 18h : 5 posts
- 17:4 : Critical Azure and Power Apps Vulnerabilities Allow Attackers to Exploit RCE
- 17:4 : Your Home Address Might be Available Online — Here’s How to Remove It
- 16:33 : How to Detecting Backdoors in Enterprise Networks
- 16:33 : BSidesLV24 – Proving Ground – Are You Content With Our Current Attacks On Content-Type?
- 16:7 : Bluetooth Core 6.1 Released – What’s New!
- 16:7 : Securing Windows Endpoints Using Group Policy Objects (GPOs): A Configuration Guide
- 16:6 : Google Secretly Tracked You — Pays $1.4 Billion Privacy Settlement To Texas
- 16:6 : EU Fines TikTok $600 Million for Data Transfers to China
- 16:6 : M&S Hackers Conned IT Help Desk Workers Into Accessing Firm Systems
- 15:32 : Chrome 137 Integrates Gemini Nano AI to Combat Tech Support Scams
- 15:32 : Co-op Hack Triggers Widespread Scam Risk for Consumers
- 15:31 : Magento Extension Supply Chain Attack Backdoors Hundreds of E-Commerce Sites
- 15:6 : DOGE Employee Computer Infected with Malware and Leaked Data Found Info-Stealer Logs
- 15:6 : Operation Moonlander dismantled the botnet behind Anyproxy and 5socks cybercriminals services
- 14:32 : Google Chrome Uses Advanced AI to Combat Sophisticated Online Scams
- 14:32 : Why CISOs Must Prioritize Cybersecurity Culture in Remote Work
- 14:31 : Feds disrupt proxy-for-hire botnet, indict four alleged net miscreants
- 14:5 : IT Security News Hourly Summary 2025-05-10 15h : 1 posts
- 13:31 : North Korea’s OtterCookie Malware Added a New Feature to Attack Windows, Linux, and macOS
- 12:31 : “PupkinStealer” A New .NET-Based Malware Steals Browser Credentials & Exfiltrate via Telegram
- 11:5 : IT Security News Hourly Summary 2025-05-10 12h : 1 posts
- 11:2 : Steganography Challenge: My Solution, (Sat, May 10th)
- 11:2 : ICE’s Deportation Airline Hack Reveals Man ‘Disappeared’ to El Salvador
- 11:2 : Five things we learned from WhatsApp vs. NSO Group spyware lawsuit
- 11:2 : UK Ministry of Defence is spending less with US biz, and more with Europeans
- 10:31 : Your Android phone is getting a new security secret weapon – and it’s a big deal
- 10:4 : Beware! Fake AI Video Generation Platforms Drop Stealer Malware on Your Computers
- 9:4 : 20 Years old Proxy Botnet Network Dismantled That Exploits 1000 Unique Unpatched Devices Weekly
- 8:5 : IT Security News Hourly Summary 2025-05-10 09h : 3 posts
- 7:31 : Germany Shuts Down eXch Over $1.9B Laundering, Seizes €34M in Crypto and 8TB of Data
- 7:31 : Google Pays $1.375 Billion to Texas Over Unauthorized Tracking and Biometric Data Collection
- 7:4 : Building IDP Resilience
- 7:4 : How to rationalize IDPs (without painful migrations)
- 7:4 : Exposing a Government Data Breach: Whistleblower Tells All – Cybersecurity Today Special Report
- 5:4 : Catching a phish with many faces
- 4:31 : Japanese Logistics Firm KWE Faces Ransomware Attack, Causing Service Delays
- 3:2 : Stay Confident with Robust Secrets Management
- 3:2 : Microsoft Listens to Security Concerns and Delays New OneDrive Sync
- 2:2 : Chinese Hackers Exploit SAP RCE Vulnerability to Upload Supershell Backdoors
- 2:2 : Threat Actors Attacking Job Seekers With Three New Unique Adversaries
- 23:5 : IT Security News Hourly Summary 2025-05-10 00h : 4 posts
- 22:55 : IT Security News Daily Summary 2025-05-09
- 22:9 : Threat Brief: CVE-2025-31324
- 22:8 : How Signal, WhatsApp, Apple, and Google Handle Encrypted Chat Backups