Category: hourly summary

IT Security News Hourly Summary 2025-02-18 18h : 16 posts

16 posts were published in the last hour 16:32 : Snake Keylogger Variant Hits Windows, Steals Data via Telegram Bots 16:32 : Cybercriminals Embedded Credit Card Stealer Script Within Tag 16:32 : Weaponized PDFs Deliver Lumma InfoStealer Targeting Educational Institutions…

IT Security News Hourly Summary 2025-02-17 15h : 13 posts

13 posts were published in the last hour 13:32 : Beware! Fake Outlook Support Calls Leading to Ransomware Attacks 13:32 : New XCSSET Malware Targets macOS Users Through Infected Xcode Projects 13:32 : Xerox Printer Vulnerability Exposes Authentication Data Via…

IT Security News Hourly Summary 2025-02-14 15h : 20 posts

20 posts were published in the last hour 14:2 : Netwrix Privilege Secure Enhances Remote Access Security by Eliminating VPN Dependencies 14:2 : Apache Fineract SQL Injection Vulnerability Let Inject Malicious Data 14:2 : NVIDIA Container Toolkit Vulnerability Let Attackers…

IT Security News Hourly Summary 2025-02-14 12h : 4 posts

4 posts were published in the last hour 10:7 : Experts discovered PostgreSQL flaw chained with BeyondTrust zeroday in targeted attacks 10:7 : New Device Code Phishing Attack Exploit Device Code Authentication To Capture Authentication Tokens 10:6 : Watchdog ponders…

IT Security News Hourly Summary 2025-02-13 15h : 17 posts

17 posts were published in the last hour 14:4 : Arbitrary File Upload Vulnerability in WordPress Plugin Let Attackers Hack 30,000 Website 14:4 : Astaroth Phishing Kit Bypasses 2FA Using Reverse Proxy Techniques 13:32 : Cybercriminals Exploit Pyramid Pentesting Tool…

IT Security News Hourly Summary 2025-02-13 03h : 3 posts

3 posts were published in the last hour 1:32 : DShield SIEM Docker Updates, (Thu, Feb 13th) 1:32 : ISC Stormcast For Thursday, February 13th, 2025 https://isc.sans.edu/podcastdetail/9322, (Thu, Feb 13th) 1:11 : Sophos sheds 6% of staff after swallowing Secureworks

IT Security News Hourly Summary 2025-02-12 12h : 8 posts

8 posts were published in the last hour 10:31 : Hackers behind US ransomware attacks arrested in Thailand 10:11 : Fortinet’s FortiOS Vulnerabilities Allow Attackers Trigger RCE and Launch DoS Attack 10:11 : FortiOS & FortiProxy Vulnerability Allows Attackers Firewall…

IT Security News Hourly Summary 2025-02-10 12h : 14 posts

14 posts were published in the last hour 10:32 : US China Restrictions Creating ‘Incentive To Innovate’ 10:32 : US Proposes DeepSeek Ban For Federal Devices 10:32 : Penetration Testers Arrested During Approved Physical Penetration Testing 10:32 : Massive Brute…

IT Security News Hourly Summary 2025-02-07 18h : 18 posts

18 posts were published in the last hour 17:4 : 20 Million OpenAI accounts offered for sale 17:4 : Hackers Exploit US Government agency’s Cloud System for Cryptojacking 16:32 : Tata Technologies Report Suffering Ransomware Attack 16:32 : Securing GAI-Driven…

IT Security News Hourly Summary 2025-02-07 09h : 9 posts

9 posts were published in the last hour 8:3 : Dell Update Manager Plugin Flaw Exposes Sensitive Data 8:2 : Building a Culture of Security: Employee Awareness and Training Strategies 8:2 : Self-sovereign identity could transform fraud prevention, but… 8:2…

IT Security News Hourly Summary 2025-02-05 21h : 3 posts

3 posts were published in the last hour 19:32 : Google releases responsible AI report while removing its anti-weapons pledge 19:31 : Hackers Using AI Agents To Validate Stolen Credit Cards 19:31 : CISA Adds Actively Exploited Linux Kernel Vulnerability…

IT Security News Hourly Summary 2025-02-05 12h : 5 posts

5 posts were published in the last hour 10:32 : Critical Netgear Vulnerabilities Allow Hackers to Execute Remote Code 10:32 : Router maker Zyxel tells customers to replace vulnerable hardware exploited by hackers 10:32 : AsyncRAT Campaign Uses Python Payloads…

IT Security News Hourly Summary 2025-02-05 06h : 7 posts

7 posts were published in the last hour 5:4 : CISA Releases New Guidelines to Secure Firewalls, Routers, and Internet-Facing Servers 5:4 : Arctic Wolf and BlackBerry Announce Closing of Acquisition for Cylance 5:4 : AI-Powered Cyber Warfare, Ransomware Evolution,…

IT Security News Hourly Summary 2025-02-04 15h : 14 posts

14 posts were published in the last hour 14:4 : SpyCloud Leads the Way in Comprehensive Identity Threat Protection 14:4 : Ontinue ION for IoT Security secures critical operational environments 14:4 : Threefold Increase in Malware Targeting Credential Stores 14:4…

IT Security News Hourly Summary 2025-02-04 12h : 10 posts

10 posts were published in the last hour 11:4 : Apple Service Ticket Portal Vulnerability Leaks Sensitive Information 11:4 : Abandoned AWS S3 buckets can be reused in supply-chain attacks that would make SolarWinds look ‘insignificant’ 11:4 : Vulnerability Patched…

IT Security News Hourly Summary 2025-02-04 09h : 7 posts

7 posts were published in the last hour 8:2 : ValleyRAT Attacking Org’s Accounting Department with New Delivery Techniques 7:32 : Linux Kernel 6.14 Officially Released for Testers 7:32 : AI-Powered Security Management for the Hyperconnected World 7:31 : Check…

IT Security News Hourly Summary 2025-02-04 03h : 4 posts

4 posts were published in the last hour 2:4 : ISC Stormcast For Tuesday, February 4th, 2025 https://isc.sans.edu/podcastdetail/9308, (Tue, Feb 4th) 2:4 : What is Acceptable Risk? 1:7 : Google fixed actively exploited kernel zero-day flaw 1:7 : PoinCampus –…