87 posts were published in the last hour
- 22:32 : ZDNET joins CNET Group to award the Best of CES, and you can submit your entry now
- 22:31 : A US soldier was arrested for leaking presidential call logs
- 22:4 : Apple offers to settle ‘snooping Siri’ lawsuit for an utterly incredible $95M
- 21:32 : Top 7 enterprise cybersecurity challenges in 2025
- 21:32 : Apple agrees to settle Siri-snooping lawsuit for $95M
- 21:32 : Best of 2024: National Public Data (NPD) Breach: Essential Guide to Protecting Your Identity
- 21:6 : DEF CON 32 – War Games Red Team for OT Based on Real World Case Studies
- 20:32 : Apple settles Siri lawsuit for $95 million – here’s how much you could get
- 20:32 : New details emerge in Cybertruck explosion outside Trump hotel in Vegas that left 1 dead, 7 injured
- 20:32 : Google Is Allowing Device Fingerprinting
- 20:9 : IBM, GlobalFoundries Settle Respective Lawsuits
- 20:9 : Optimizing GitHub Access Management for Enterprises: Enhancing Security, Scalability, and Continuity with Jenkins GitHub App Authentication and Load Balancing
- 20:9 : China-Linked Cyber Threat Group Hacks US Treasury Department
- 20:9 : Cybertruck explosion outside Trump hotel in Vegas leaves 1 dead, 7 injured
- 20:8 : Breaking Encryption: How To Prepare For Tomorrow’s Quantum Risk Today
- 20:5 : IT Security News Hourly Summary 2025-01-02 21h : 1 posts
- 19:6 : Fake 7-Zip Exploit Code Traced to AI-Generated Misinterpretation
- 18:32 : DoubleClickjacking allows clickjacking on major websites
- 18:32 : Randall Munroe’s XKCD ‘Lasering Incidents’
- 18:32 : AT&T Confirms Cyberattack Amid Salt Typhoon Hacking Incident
- 18:31 : RBI Report Highlights Rising Fraud Incidents and Financial Impact
- 18:4 : China Proposes Further Export Restrictions On Critical Mineral Tech, Batteries
- 18:4 : Software Development Trends to Follow in 2025
- 18:4 : 3 things to consider when buying a new VPN – and why ‘free’ isn’t always best
- 18:4 : Transforming Cybersecurity Protocols for US Healthcare Systems
- 17:32 : The Future of Mobile Security: Challenges and Solutions
- 17:31 : Apple Pays $95 Million To Settle Siri Lawsuit
- 17:31 : Global Campaign Targets PlugX Malware with Innovative Portal
- 17:6 : DEF CON 32 – V2GEvil: Ghost in the Wires
- 17:5 : IT Security News Hourly Summary 2025-01-02 18h : 3 posts
- 16:31 : US Solider Arrested After Allegedly Posting Trump, Harris Call Logs
- 16:31 : New DoubleClickjacking Attack Bypasses Protections
- 16:6 : Japan NTT Docomo Telecom hit by DDOS Attack
- 15:32 : Best of 2024: Cisco Vulnerability: CISA Alerts Of Smart Install Exploits
- 15:31 : Palo Alto Networks Alerts on Exploit Causing Firewall Vulnerabilities
- 15:5 : Treasury Department breached through BeyondTrust service
- 15:5 : US Arrests Army Soldier Over AT&T, Verizon Hacking
- 15:5 : Understanding Ransomware: A Persistent Cyber Threat
- 15:4 : General Dynamics Confirms Data Breach Via Phishing Campaign
- 14:32 : Russian media outlets Telegram channels blocked in European countries
- 14:32 : US Arrests, Charges Army Soldier Suspected of Extorting AT&T, Verizon
- 14:32 : HIPAA Rules Update Proposed to Combat Healthcare Data Breaches
- 14:6 : Severe Security Flaws Patched in Microsoft Dynamics 365 and Power Apps Web API
- 13:4 : Apple Offers iPhone Discounts In China – Report
- 13:4 : New PLAYFULGHOST Malware Hacking Devices To Remotely Capture Audio Recordings
- 13:4 : PoC Exploit Released For Critical Windows LDAP RCE Vulnerability
- 13:4 : Building Cyber Resilience with Trofi Security and Check Point
- 13:4 : EU Officially Announce USB-C as Global Charging Standard
- 12:32 : Explosion Outside Trump Hotel Kills Cybertruck Driver
- 12:32 : Windows 11 BitLocker Encryption Bypassed to Extract Full Volume Encryption Keys
- 12:32 : Researchers Uncover Phishing-As-A-Service Domains Associated With Tycoon 2FA
- 12:6 : Goodware Hash Sets, (Thu, Jan 2nd)
- 12:6 : Navigating the Cybersecurity Landscape: Insights on AI, FTC Safeguards, and Building Resilient Cyber Cultures
- 11:32 : Three Russian-German nationals charged with suspicion of secret service agent activity
- 11:32 : Cross-Domain Attacks: A Growing Threat to Modern Security and How to Combat Them
- 11:32 : Hackers Leak Rhode Island Citizens’ Data on Dark Web
- 11:7 : SmuggleShield – Browser Extension to Detect HTML Smuggling Attacks
- 11:5 : IT Security News Hourly Summary 2025-01-02 12h : 4 posts
- 10:32 : NHS intends to sell patient data to meet the expenses
- 10:31 : Dozens of Chrome Browser Extensions Hijacked by Data Thieves
- 10:5 : Understanding AI in Network Security
- 10:5 : Advice for Exponential Organizations: Intersecting Agile and Incident Response
- 10:5 : US Treasury Computers Accessed by China in Supply Chain Attack
- 9:32 : Chinese government hackers reportedly targeted US Treasury’s sanctions office during December cyberattack
- 9:31 : Lumen reports that it has locked out the Salt Typhoon group from its network
- 9:4 : EC2 Grouper Hackers Using AWS Tools To Exploit Compromised Credentials
- 9:4 : TechRepublic Premium Editorial Calendar: Policies, Hiring Kits, and Glossaries for Download
- 8:32 : Three Russian-German Nationals Charged with Espionage for Russian Secret Service
- 8:31 : Malicious Obfuscated NPM Package Disguised as an Ethereum Tool Deploys Quasar RAT
- 8:31 : U.S. soldier arrested, Election interference sanctions, RI data leak
- 8:5 : IT Security News Hourly Summary 2025-01-02 09h : 2 posts
- 8:2 : Trend Micro Apex One Vulnerabilities Let Escalate Privilege
- 7:6 : US Army Soldier Arrested for Allegedly Selling Customer Call Records From AT&T & Verizon
- 6:32 : D-Link Warns of Botnets Exploiting End-of-Life Routers
- 6:3 : When risky cybersecurity behavior becomes a habit among employees
- 5:32 : Kata Containers: Open-source container runtime, building lightweight VMs
- 5:5 : IT Security News Hourly Summary 2025-01-02 06h : 5 posts
- 4:32 : Volkswagen Subsidiary Leak Exposes Personal, Location Data
- 4:32 : UK Investigates IBM’s Planned $6.4bn HashiCorp Acquisition
- 4:32 : 2024 Year in Review (Part 1)
- 4:32 : The real cost of data breaches for businesses
- 4:32 : CISOs don’t invest enough in code security
- 0:32 : Trustworthy Cloud Platforms: Ensuring Secure Access
- 0:32 : Take Control: Empowering Your Team with NHIDR Solutions
- 0:32 : Feel Reassured with Advanced Identity and Access Management
- 23:31 : LDAPNightmare: SafeBreach Labs Publishes First Proof-of-Concept Exploit for CVE-2024-49112
- 23:5 : IT Security News Hourly Summary 2025-01-02 00h : 1 posts