10 posts were published in the last hour 10:35 : Malwareverteiler: FBI warnt vor betrügerischen Online-Dateikonvertern 10:34 : New Intel Chief Lip-Bu Tan ‘Considers’ Job Cuts, Factory Revamp 10:34 : BYD Says Latest EVs Can Charge As Fast As Pumping…
Category: hourly summary
IT Security News Hourly Summary 2025-03-18 09h : 4 posts
4 posts were published in the last hour 7:32 : Extortion crew threatened to inform Edward Snowden (?!) if victim didn’t pay up 7:32 : GitHub repositories targeted, Apache Tomcat RCE exploit, BEC campaigns target Microsoft 365 7:14 : Nach…
IT Security News Hourly Summary 2025-03-18 06h : 1 posts
1 posts were published in the last hour 4:32 : Auch Google kann britischen Überwachungsbefehl nicht verleugnen
IT Security News Hourly Summary 2025-03-18 03h : 2 posts
2 posts were published in the last hour 2:5 : ISC Stormcast For Tuesday, March 18th, 2025 https://isc.sans.edu/podcastdetail/9368, (Tue, Mar 18th) 1:7 : ‘Dead simple’ hijacking hole in Apache Tomcat ‘now actively exploited in the wild’
IT Security News Hourly Summary 2025-03-18 00h : 4 posts
4 posts were published in the last hour 22:55 : IT Security News Daily Summary 2025-03-17 22:34 : Amazon to kill off local Alexa processing, all voice requests shipped to the cloud 22:7 : Randall Munroe’s XKCD ‘Omniroll’ 22:7 :…
IT Security News Hourly Summary 2025-03-17 21h : 2 posts
2 posts were published in the last hour 19:36 : 23,000 GitHub Repositories Targeted In Supply Chain Attack 19:11 : Creating an Inclusive Cybersecurity Culture
IT Security News Hourly Summary 2025-03-17 18h : 10 posts
10 posts were published in the last hour 16:32 : 5 clever ways to use Chromecast on your TV (including one for smart home enthusiasts) 16:32 : WMI 16:32 : Attackers use CSS to create evasive phishing messages 16:32 :…
IT Security News Hourly Summary 2025-03-17 15h : 12 posts
12 posts were published in the last hour 13:37 : Wazuh SIEM Vulnerability Enables Remote Malicious Code Execution 13:37 : Kentico Xperience CMS Vulnerability Enables Remote Code Execution 13:37 : Check Point Named Gold Winner for Cloud Security in 2025…
IT Security News Hourly Summary 2025-03-17 12h : 10 posts
10 posts were published in the last hour 10:34 : Fake-Sicherheitswarnung: Betrüger versuchen Github-Konten zu kapern 10:34 : [NEU] [UNGEPATCHT] [hoch] X.Org X11: Schwachstelle ermöglicht Denial of Service 10:33 : Corporate Investigation with Belkasoft X: A Digital Forensics Tool Revolutionizing…
IT Security News Hourly Summary 2025-03-17 09h : 5 posts
5 posts were published in the last hour 7:34 : Hackers Use CSS Tricks to Bypass Spam Filters and Monitor Users 7:34 : Adobe Acrobat Vulnerabilities Enable Remote Code Execution 7:34 : EFF Joins 7amleh Campaign to #ReconnectGaza 7:34 :…
IT Security News Hourly Summary 2025-03-17 00h : 3 posts
3 posts were published in the last hour 22:58 : IT Security News Weekly Summary 11 22:55 : IT Security News Daily Summary 2025-03-16 22:13 : Start-up Security 101: How to Protect Your Venture from Cybersecurity Risk
IT Security News Hourly Summary 2025-03-16 18h : 1 posts
1 posts were published in the last hour 16:32 : Why Only Phishing Simulations Are Not Enough
IT Security News Hourly Summary 2025-03-16 15h : 2 posts
2 posts were published in the last hour 13:34 : SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 37 13:9 : How Cybersecurity is Evolving in 2025 to Tackle New Threats
IT Security News Hourly Summary 2025-03-16 12h : 2 posts
2 posts were published in the last hour 10:36 : LockBit Developer Rostislav Panev Extradited from Israel to the US 10:36 : Security Affairs newsletter Round 515 by Pierluigi Paganini – INTERNATIONAL EDITION
IT Security News Hourly Summary 2025-03-16 03h : 3 posts
3 posts were published in the last hour 1:35 : What are the best practices for managing NHIs with dynamic cloud resources? 1:35 : How can cloud security architectures incorporate NHI protection? 1:35 : Which tools are available for cloud-based…
IT Security News Hourly Summary 2025-03-16 00h : 2 posts
2 posts were published in the last hour 22:55 : IT Security News Daily Summary 2025-03-15 22:8 : BSides Exeter 2024 – Blue Track – DFIR – Ctrl+Alt+Defeat: Using Threat Intelligence To Navigate The Cyber Battlefield
IT Security News Hourly Summary 2025-03-15 18h : 2 posts
2 posts were published in the last hour 16:35 : Hackers Attacking Exposed Jupyter Notebooks To Deliver Cryptominer 16:8 : Dramaturgie eines Milliardencoups: Erste Untersuchungsdetails zum Fall Bybit
IT Security News Hourly Summary 2025-03-15 15h : 2 posts
2 posts were published in the last hour 13:13 : Jugendschutz in Onlinespielen: Eltern sollen Roblox im Zweifel verbieten 13:12 : How Ghostgpt Is Empowering Cybercrime in The Age Of AI
IT Security News Hourly Summary 2025-03-15 12h : 3 posts
3 posts were published in the last hour 11:4 : End-to-End Encrypted Texts Between Android and iPhone Are Coming 11:4 : Top Cybersecurity Tools of 2025 To Managing Remote Device Threats 10:7 : Invisible C2 — thanks to AI-powered techniques
IT Security News Hourly Summary 2025-03-15 09h : 1 posts
1 posts were published in the last hour 7:11 : Unveiling Cyber Security Insights: Research Report with David Shipley