Category: hourly summary

IT Security News Hourly Summary 2025-07-11 18h : 6 posts

6 posts were published in the last hour 15:35 : Infostealers Targeting macOS Users in Active Campaigns to Steal Sensitive Data 15:35 : Mis-scoped AWS Organizations Policy Allowed Hackers to Seize Full Control of AWS Environment 15:35 : The Cybersecurity…

IT Security News Hourly Summary 2025-07-10 18h : 9 posts

9 posts were published in the last hour 16:3 : Fast Food, Weak Passwords: McDonald’s AI Hiring Tool Exposed Millions of Applicants’ Data 16:3 : CVE-2025-27636 – Remote Code Execution in Apache Camel via Case-Sensitive Header Filtering Bypass 16:3 :…

IT Security News Hourly Summary 2025-07-10 15h : 12 posts

12 posts were published in the last hour 13:3 : Strategies for Implementing End-To-End Security in Financial Services and Web3 Environments 13:3 : ServiceNow Platform Vulnerability Enables Attackers to Exfiltrate Sensitive Data 13:3 : Four Hackers Arrested by UK Police…

IT Security News Hourly Summary 2025-07-09 00h : 6 posts

6 posts were published in the last hour 22:55 : IT Security News Daily Summary 2025-07-08 22:4 : Chinese researchers unveil MemOS, the first ‘memory operating system’ that gives AI human-like recall 21:34 : 11 Google-Verified Chrome Extensions Infected Over…

IT Security News Hourly Summary 2025-07-07 12h : 6 posts

6 posts were published in the last hour 10:4 : Batavia spyware steals data from Russian organizations 10:4 : NightEagle APT Attacking Industrial Systems by Exploiting 0-Days and With Adaptive Malware 10:4 : ScriptCase Vulnerabilities Let Attackers Execute Remote Code…

IT Security News Hourly Summary 2025-07-05 18h : 3 posts

3 posts were published in the last hour 16:4 : Chinese Attackers Target France Infrastructure in Ivanti Zero-Day Exploit Campaign 15:34 : Denmark Empowers Public Against Deepfake Threats 15:34 : North Korea-Linked Hackers Behind $2.1 Billion in Crypto Theft in…

IT Security News Hourly Summary 2025-07-04 15h : 3 posts

3 posts were published in the last hour 13:4 : Malicious SEO Plugins on WordPress Can Lead to Site Takeover 12:32 : Instagram Now Rotating TLS Certificates Daily with 1-Week Validity 12:31 : Apache APISIX Vulnerability Enables Cross-Issuer Access Under…

IT Security News Hourly Summary 2025-07-03 18h : 6 posts

6 posts were published in the last hour 15:36 : Apache Tomcat and Camel Vulnerabilities Actively Targeted in Cyberattacks 15:35 : Citrix Alerts on Authentication Failures After NetScaler Update to Resolve Auth Vulnerability 15:35 : Threat Actors Exploit .COM TLD…

IT Security News Hourly Summary 2025-07-03 15h : 6 posts

6 posts were published in the last hour 12:33 : Beware of Chinese Fake e-Commerce Websites Mimic Apple, Wrangler Jeans and Abuses Payment Services Like MasterCard and PayPal 12:33 : Pro-Russian Hackers Making New Alliances to Launch High-Profile Attacks 12:33…

IT Security News Hourly Summary 2025-07-03 09h : 4 posts

4 posts were published in the last hour 6:33 : New macOS Malware Employs Process Injection and Remote Communications to Exfiltrate Keychain Credentials 6:32 : Esse Health Data Breach Exposes 263,000 Patients Personal and Health Information 6:32 : StealthMACsec strengthens…

IT Security News Hourly Summary 2025-07-02 15h : 12 posts

12 posts were published in the last hour 12:35 : Microsoft Ends Authenticator App’s Password Management Support From 2025 12:35 : Office 365 Introduces New Mail Bombing Detection to Shield Users 12:35 : Hackers Target Linux SSH Servers to Deploy TinyProxy…

IT Security News Hourly Summary 2025-07-01 18h : 5 posts

5 posts were published in the last hour 15:34 : Raising the Bar: Infinity Global Services’ Pen Testing Achieves CREST-Accreditation 15:34 : DCRAT Impersonating the Colombian Government 15:34 : Bluetooth vulnerability in audio devices can be exploited to spy on…

IT Security News Hourly Summary 2025-06-30 18h : 8 posts

8 posts were published in the last hour 15:9 : Top 6 Passwordless Authentication Solutions in 2025 15:9 : Quantum computers just beat classical ones — Exponentially and unconditionally 15:8 : Threat Actors Weaponizing Facebook Ads to Deliver Malware and…

IT Security News Hourly Summary 2025-06-27 12h : 3 posts

3 posts were published in the last hour 9:42 : APT-C-36 Hackers Launching Cyberattacks on Government Entities, Financial Sectors, and Critical Systems 9:42 : Evidence Suggests Exploitation of CitrixBleed 2 Vulnerability 9:41 : CitrixBleed 2 Vulnerability Exploited, Recalling Earlier CitrixBleed…

IT Security News Hourly Summary 2025-06-26 21h : 6 posts

6 posts were published in the last hour 18:32 : nOAuth Exploit Enables Full Account Takeover of Entra Cross-Tenant SaaS Applications 18:32 : Randall Munroe’s XKCD ‘Interoperability’ 18:32 : Who is Hero? 18:32 : Critical Open VSX Registry Flaw Exposes…