4 posts were published in the last hour 1:2 : FreePBX SQL Injection Vulnerability Exploited to Modify The Database 0:32 : Crimson Collective Leverages AWS Services to Exfiltrate Sensitive Data 0:32 : Exciting Developments in Cloud-Native Security 0:32 : Zero…
Category: hourly summary
IT Security News Hourly Summary 2025-10-09 00h : 5 posts
5 posts were published in the last hour 22:55 : IT Security News Daily Summary 2025-10-08 22:2 : Mustang Panda Using New DLL Side-Loading Technique to Deliver Malware 22:2 : Scattered Lapsus$ Hunters Launched a New Leak Site to Release…
IT Security News Hourly Summary 2025-10-08 21h : 4 posts
4 posts were published in the last hour 19:2 : Modernizing Federal DevSecOps for CMMC and Beyond 18:32 : Rethinking AI Data Security: A Buyer’s Guide for CISOs 18:32 : Chinese Hackers Weaponized Nezha Tool to Execute Commands on Web…
IT Security News Hourly Summary 2025-10-08 18h : 6 posts
6 posts were published in the last hour 16:2 : A Guide to International Post-Quantum Cryptography Standards 16:2 : Akamai Named a Gartner Peer Insights Customers’ Choice for WAAP Six Years in a Row 16:2 : Chinese Hackers Weaponize Open-Source…
IT Security News Hourly Summary 2025-10-08 15h : 16 posts
16 posts were published in the last hour 13:3 : OpenAI Blocks ChatGPT Accounts Linked to Chinese Hackers Developing Malware 13:3 : AI Chatbot Exploited as a Backdoor to Access Sensitive Data and Infrastructure 13:3 : ClamAV 1.5.0 Released with…
IT Security News Hourly Summary 2025-10-08 12h : 10 posts
10 posts were published in the last hour 10:2 : What to do when you click on a suspicious link 10:2 : APT35: Inside the Structure, Toolset, and Espionage Operations of an IRGC-Linked Group 10:2 : Hackers Weaponizing WordPress Websites…
IT Security News Hourly Summary 2025-10-08 09h : 7 posts
7 posts were published in the last hour 7:2 : Does Facebook have a Dating AI assistant? 7:2 : BYD’s EV Sales In UK Jump 880 Percent 7:2 : FreePBX SQL Injection Vulnerability Leads to Database Tampering 6:32 : CISA…
IT Security News Hourly Summary 2025-10-08 06h : 1 posts
1 posts were published in the last hour 3:32 : ISC Stormcast For Wednesday, October 8th, 2025 https://isc.sans.edu/podcastdetail/9646, (Wed, Oct 8th)
IT Security News Hourly Summary 2025-10-08 03h : 5 posts
5 posts were published in the last hour 1:2 : Reassuring Stakeholders with Solid Secrets Management 1:2 : Enhancing Data Protection with Advanced PAM Techniques 1:2 : Justifying Investments in NHI Security 1:2 : Fostering Innovation with Secure Machine Identities…
IT Security News Hourly Summary 2025-10-08 00h : 3 posts
3 posts were published in the last hour 22:55 : IT Security News Daily Summary 2025-10-07 22:2 : USENIX 2025: PEPR ’25 – Panel: How Privacy Engineers Can Shape The Coming Wave Of AI Governance 22:2 : Why SOCs Are…
IT Security News Hourly Summary 2025-10-07 21h : 7 posts
7 posts were published in the last hour 18:32 : CodeMender AI Agent Automated Code Security And Vulnerability Patching 18:32 : BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data 18:32 : Why Threat Prioritization Is the…
IT Security News Hourly Summary 2025-10-07 18h : 10 posts
10 posts were published in the last hour 16:3 : Medusa Ransomware Exploiting GoAnywhere MFT Flaw, Confirms Microsoft 16:3 : Police and military radio maker BK Technologies cops to cyber break-in 16:3 : OpenAI bans suspected Chinese accounts using ChatGPT…
IT Security News Hourly Summary 2025-10-07 15h : 12 posts
12 posts were published in the last hour 13:3 : Security in AI Era: Protecting AI Workloads with Google Cloud 13:3 : CISA Alerts on Oracle E-Business Suite 0-Day Actively Exploited for Ransomware Attacks 13:3 : Edge device security: The…
IT Security News Hourly Summary 2025-10-07 12h : 13 posts
13 posts were published in the last hour 10:3 : Too salty to handle: Exposing cases of CSS abuse for hidden text salting 10:3 : Supreme Court Rejects Google Bid To Halt App Store Changes 10:2 : Hackers Exploit Legitimate…
IT Security News Hourly Summary 2025-10-07 09h : 4 posts
4 posts were published in the last hour 7:2 : GoAnywhere 0-Day RCE Actively Exploited to Deliver Medusa Ransomware 7:2 : Hackers Launch Leak Portal to Publish Data Stolen from Salesforce Instances 6:32 : Mustang Panda Adopts New DLL Side-Loading…
IT Security News Hourly Summary 2025-10-07 06h : 2 posts
2 posts were published in the last hour 4:2 : 2025-10-06: Japanese phishing emails 3:32 : 13-year-old Critical Redis RCE Vulnerability Let Attackers Gain Full Access to Host System
IT Security News Hourly Summary 2025-10-07 03h : 1 posts
1 posts were published in the last hour 1:3 : Adpost – 3,339,512 breached accounts
IT Security News Hourly Summary 2025-10-07 00h : 3 posts
3 posts were published in the last hour 22:55 : IT Security News Daily Summary 2025-10-06 22:2 : Cl0p Ransomware Group Exploited in a Zero-Day in Oracle EBS Attacks 21:32 : Discord discloses third-party breach affecting customer support data
IT Security News Hourly Summary 2025-10-06 21h : 4 posts
4 posts were published in the last hour 18:32 : Spyware Disguised as Signal and ToTok Apps Targets UAE Android Users 18:32 : 2025-10-01: Possible Rhadamanthys disguised as cracked version of popular software 18:32 : CISA Adds Seven Known Exploited…
IT Security News Hourly Summary 2025-10-06 18h : 6 posts
6 posts were published in the last hour 16:2 : Scattered Lapsus$ Hunters offering $10 in Bitcoin to ‘endlessly harass’ execs 16:2 : Mobile App Security: Why It’s Still the Weakest Link in Enterprise Defense 16:2 : Europol Calls for…