53 posts were published in the last hour
- 21:8 : OAuth 2.0 Overview
- 20:7 : AI Security Frameworks – Ensuring Trust in Machine Learning
- 20:5 : IT Security News Hourly Summary 2025-05-17 21h : 1 posts
- 19:4 : The Coinbase Data Breach: A Breakdown of What Went Wrong
- 17:31 : Preventing Phishing Attacks on Cryptocurrency Exchanges
- 17:6 : US Government officials targeted with texts and AI-generated deepfake voice messages impersonating senior U.S. officials
- 17:6 : Compromised npm Package ‘rand-user-agent’ Used to Spread Remote Access Trojan
- 17:5 : IT Security News Hourly Summary 2025-05-17 18h : 4 posts
- 16:2 : Boffins devise technique that lets users prove location without giving it away
- 16:2 : FBI Warns Consumers to Replace Outdated Routers Hijacked by TheMoon Malware
- 16:2 : LockBit Ransomware Platform Breached Again, Ops Data Leaked
- 15:31 : BSidesLV24 – GroundFloor – Adversaries Also Lift & Shift: Cloud Threats Through The Eyes Of An Adversary
- 15:4 : Adversarial Machine Learning – Securing AI Models
- 14:31 : Coinbase Data Breach: Customer Data Compromised Through Insider Threat
- 14:5 : IT Security News Hourly Summary 2025-05-17 15h : 3 posts
- 14:2 : Shields up US retailers. Scattered Spider threat actors can target them
- 14:2 : Critical WordPress Plugin Vulnerability Exposes 10K+ Sites to Cyber Attack
- 14:2 : 10 Best NGINX Monitoring Tools – 2025
- 12:31 : New Ransomware Attack Mocking Elon Musk Supporters Using PowerShell to Deploy Payloads
- 12:31 : Blockchain Security – Protecting Decentralized Systems
- 12:31 : Sophisticated NPM Attack Exploits Google Calendar C2 For Sophisticated Communication
- 12:2 : VMware ESXi, Firefox, Red Hat Linux & SharePoint Hacked – Pwn2Own Day 2
- 12:2 : Critical Intel CPU Vulnerabilities Uncovered: Memory Leaks and Spectre v2 Exploitation
- 11:32 : AI-Powered Cyber Threats – Building Resilient Defenses
- 11:31 : Guide to Cloud API Security – Preventing Token Abuse
- 11:31 : Printer Company Offered Malicious Drivers Infected With XRed Malware
- 11:5 : IT Security News Hourly Summary 2025-05-17 12h : 2 posts
- 11:2 : Coinbase Will Reimburse Customers Up to $400 Million After Data Breach
- 10:4 : New FrigidStealer Malware Attacking macOS Users to Steal Login Credentials
- 9:31 : xorsearch.py: Python Functions, (Sat, May 17th)
- 9:2 : U.S. CISA adds Google Chromium, DrayTek routers, and SAP NetWeaver flaws to its Known Exploited Vulnerabilities catalog
- 8:31 : Cloud Security Essentials – Protecting Multi-Cloud Environments
- 8:31 : Google Now Scans Screenshots to Identify Geographic Locations
- 8:2 : Beware! A threat actor could steal the titles of your private (and draft) WordPress posts!
- 7:6 : The Monthly Cybersecurity Review: Data Breaches, Ransomware, and Critical Infrastructure
- 6:4 : Securing Generative AI – Mitigating Data Leakage Risks
- 5:31 : Beyond the hype: The hidden security risks of AI agents and MCP
- 5:5 : IT Security News Hourly Summary 2025-05-17 06h : 2 posts
- 3:37 : APT Group 123 Actively Attacking Windows Systems to Deliver Malicious Payloads
- 3:37 : VMware ESXi, Firefox, Red Hat Linux & SharePoint 0-Day Vulnerabilities Exploited – Pwn2Own Day 2
- 2:31 : Why Microsoft Says DeepSeek Is Too Dangerous to Use
- 2:5 : IT Security News Hourly Summary 2025-05-17 03h : 1 posts
- 0:31 : Security Theater REALized and Flying without REAL ID
- 0:4 : Fired US govt workers, Uncle Xi wants you! – to apply for this fake consulting gig
- 23:31 : Standing Up for LGBTQ+ Digital Safety this International Day Against Homophobia
- 23:6 : HubSpot vs Salesforce: Which CRM Fits Your Business?
- 23:6 : America’s consumer watchdog drops leash on proposed data broker crackdown
- 23:6 : Coinbase Hacked and Turns the Tables on the Cybercriminals!
- 23:5 : IT Security News Hourly Summary 2025-05-17 00h : 6 posts
- 22:55 : IT Security News Daily Summary 2025-05-16
- 22:31 : UK Supermarket Avoided Ransomware Because ‘They Yanked Their Own Plug,’ Hackers Say
- 22:4 : Endpoint Security Controls: Designing a Secure Endpoint Architecture, Part 2
- 22:4 : News brief: Patch critical SAP, Samsung and chat app flaws now