36 posts were published in the last hour
- 18:2 : BadAudio malware: how APT24 scaled its cyberespionage through supply chain attacks
- 18:2 : Salesforce: Some Customer Data Accessed via Gainsight Breach
- 17:5 : IT Security News Hourly Summary 2025-11-22 18h : 8 posts
- 17:2 : Quantum Computing Moves Closer to Real-World Use as Researchers Push Past Major Technical Limits
- 17:2 : China-Linked APT31 Launches Stealthy Cyberattacks on Russian IT Using Cloud Services
- 16:34 : CrowdStrike Fires Worker Over Insider Leak to Scattered Lapsus Hunters
- 16:34 : How to Block Ads Across Your Entire Home Network and Reduce Online Threats
- 16:9 : Metasploit Releases New Exploit for Fresh FortiWeb 0-Day Vulnerabilities
- 16:9 : CrowdStrike Fires Employee for Leaking Internal System Info to Hackers
- 16:9 : Hackers Use Salesforce Gainsight Breach to Access Data from More Than 200 Companies
- 16:9 : CISA Issues Warning as Hackers Target Oracle Identity Manager RCE Flaw
- 15:32 : GlobalLogic Moves to Protect Workforce After Oracle-related Data Theft
- 15:3 : DanaBot Malware Resurfaces With New Variant After Operation Endgame Disruption
- 15:3 : GlobalLogic Moves to Protect Workforce After Oracle-Related Data Theft
- 14:7 : 65% of Top AI Companies Leak Secrets on GitHub
- 13:4 : The Security Landscape of Mobile Apps in Africa
- 12:9 : US Border Patrol Is Spying on Millions of American Drivers
- 12:9 : U.S. CISA adds an Oracle Fusion Middleware flaw to its Known Exploited Vulnerabilities catalog
- 11:6 : ShinyHunters Claims Data Theft from 200+ Companies via Salesforce Gainsight Breach
- 8:5 : IT Security News Hourly Summary 2025-11-22 09h : 2 posts
- 8:2 : CISA Warns of Actively Exploited Critical Oracle Identity Manager Zero-Day Vulnerability
- 8:2 : Matrix Push C2 Uses Browser Notifications for Fileless, Cross-Platform Phishing Attacks
- 7:4 : Fired Techie Admits Hacking Employer’s Network in Retaliation for Termination
- 7:4 : Metasploit Adds Exploit Module for Recently Disclosed FortiWeb 0-Day Vulnerabilities
- 6:36 : MY TAKE: Carol Sturka declares ‘I have agency!’ — Big Tech’s AI models now testing that claim
- 6:4 : Understanding Cybersecurity Threats: Insights from Intelligence Experts
- 5:5 : IT Security News Hourly Summary 2025-11-22 06h : 5 posts
- 5:4 : CrowdStrike Fires Insider for Sharing Internal System Details with Hackers
- 5:4 : What makes NHIs support systems more secure
- 5:4 : How NHIs are tailored to handle specific enterprise needs
- 5:4 : How can I ensure secure interactions between Agentic AI systems?
- 5:4 : Are AI security measures getting better annually
- 4:2 : Critical Azure Bastion Vulnerability Lets Attackers Bypass Login and Escalate Privileges
- 0:2 : What is identity and access management? Guide to IAM
- 23:5 : IT Security News Hourly Summary 2025-11-22 00h : 1 posts
- 22:55 : IT Security News Daily Summary 2025-11-21