1 posts were published in the last hour 1:3 : Adpost – 3,339,512 breached accounts
Category: hourly summary
IT Security News Hourly Summary 2025-10-07 00h : 3 posts
3 posts were published in the last hour 22:55 : IT Security News Daily Summary 2025-10-06 22:2 : Cl0p Ransomware Group Exploited in a Zero-Day in Oracle EBS Attacks 21:32 : Discord discloses third-party breach affecting customer support data
IT Security News Hourly Summary 2025-10-06 21h : 4 posts
4 posts were published in the last hour 18:32 : Spyware Disguised as Signal and ToTok Apps Targets UAE Android Users 18:32 : 2025-10-01: Possible Rhadamanthys disguised as cracked version of popular software 18:32 : CISA Adds Seven Known Exploited…
IT Security News Hourly Summary 2025-10-06 18h : 6 posts
6 posts were published in the last hour 16:2 : Scattered Lapsus$ Hunters offering $10 in Bitcoin to ‘endlessly harass’ execs 16:2 : Mobile App Security: Why It’s Still the Weakest Link in Enterprise Defense 16:2 : Europol Calls for…
IT Security News Hourly Summary 2025-10-06 15h : 14 posts
14 posts were published in the last hour 13:3 : Hackers Allegedly Breach Huawei Technologies, Leak Source Code and Internal Tools 13:3 : Zero Trust Access Made Simple for Contractors 13:3 : Zabbix Agent and Agent 2 for Windows Vulnerability…
IT Security News Hourly Summary 2025-10-06 12h : 9 posts
9 posts were published in the last hour 10:2 : Yurei Ransomware leverages SMB shares and removable drives to Encrypt Files 10:2 : Clop crew hits Oracle E-Business Suite users with fresh zero-day 10:2 : $4.5 Million Offered in New…
IT Security News Hourly Summary 2025-10-06 09h : 6 posts
6 posts were published in the last hour 7:2 : JLR cyberattack: How one hack devastated Britain’s Biggest carmaker 7:2 : Redis Server Use-After-Free Vulnerability Allows Remote Code Execution 6:32 : Hackers Turn AWS X-Ray into Command-and-Control Platform 6:32 :…
IT Security News Hourly Summary 2025-10-06 06h : 3 posts
3 posts were published in the last hour 4:2 : Quick and Dirty Analysis of Possible Oracle E-Business Suite Exploit Script (CVE-2025-61882), (Mon, Oct 6th) 3:32 : A breach every month raises doubts about South Korea’s digital defenses 3:32 :…
IT Security News Hourly Summary 2025-10-06 00h : 6 posts
6 posts were published in the last hour 22:58 : IT Security News Weekly Summary 40 22:55 : IT Security News Daily Summary 2025-10-05 22:2 : iPhone Software Update Failed? Here’s How to Fix It Without Data Loss 22:2 :…
IT Security News Hourly Summary 2025-10-05 18h : 2 posts
2 posts were published in the last hour 16:2 : USENIX 2025: PEPR ’25 – Career Advice For Privacy Engineers: From Resume To Interview To Finding The Next Job 15:32 : Akira Ransomware Bypasses MFA in Ongoing Attacks on SonicWall…
IT Security News Hourly Summary 2025-10-05 15h : 2 posts
2 posts were published in the last hour 12:32 : Security Affairs newsletter Round 544 by Pierluigi Paganini – INTERNATIONAL EDITION 12:31 : SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 65
IT Security News Hourly Summary 2025-10-05 06h : 3 posts
3 posts were published in the last hour 3:32 : Microsoft to Disable Inline SVG Images Display to Outlook for Web and Windows Users 3:32 : Unity Real-Time Development Platform Vulnerability Let Attackers Execute Arbitrary Code 3:31 : New WireTap…
IT Security News Hourly Summary 2025-10-05 00h : 1 posts
1 posts were published in the last hour 22:55 : IT Security News Daily Summary 2025-10-04
IT Security News Hourly Summary 2025-10-04 21h : 1 posts
1 posts were published in the last hour 18:32 : Anker offered Eufy camera owners $2 per video for AI training
IT Security News Hourly Summary 2025-10-04 18h : 2 posts
2 posts were published in the last hour 16:2 : Event startup Partiful wasn’t stripping GPS locations from user-uploaded photos 15:32 : CometJacking: One Click Can Turn Perplexity’s Comet AI Browser Into a Data Thief
IT Security News Hourly Summary 2025-10-04 15h : 2 posts
2 posts were published in the last hour 13:2 : New Study Warns Several Free iOS and Android VPN Apps Leak Data 13:2 : The Role of Cybersecurity in Effective Business Continuity Planning
IT Security News Hourly Summary 2025-10-04 09h : 1 posts
1 posts were published in the last hour 6:31 : Discord Data Breach – Customers Personal Data and Scanned Photo IDs leaked
IT Security News Hourly Summary 2025-10-04 03h : 1 posts
1 posts were published in the last hour 0:31 : Hack The Box introduces Threat Range for cyber incident simulation
IT Security News Hourly Summary 2025-10-04 00h : 4 posts
4 posts were published in the last hour 22:55 : IT Security News Daily Summary 2025-10-03 22:2 : 14 Types of Cybercrime + How to Prevent Them 22:2 : Week in Review: Shutdown furloughs CISA, DoD risk framework, Oracle extortion…
IT Security News Hourly Summary 2025-10-03 21h : 2 posts
2 posts were published in the last hour 19:2 : Cybercriminals Impersonate FedEx, UPS, Other Brands in New Smishing Campaign 19:2 : Detour Dog Caught Running DNS-Powered Malware Factory for Strela Stealer