72 posts were published in the last hour
- 21:36 : Friday Squid Blogging: How Squid Skin Distorts Light
- 20:34 : Critical Sudo bugs expose major Linux distros to local Root exploits
- 20:34 : Ransomware Attacks Spike Despite Gang Closure
- 17:7 : Personal AI Agents Could Become Digital Advocates in an AI-Dominated World
- 17:7 : 2.2 Million People Impacted by Ahold Delhaize Data Breach
- 17:7 : Cybercrime Gang Hunters International Shuts Down, Returns Stolen Data as Goodwill
- 17:7 : Cloudflare Thwarts Record-Breaking DDoS Attack as Global Threat Escalates
- 16:41 : Yet More Stalkerware Leaks Secret Data: ‘Catwatchful’ is Latest Nasty App
- 16:40 : The 47-Day SSL Certificate Era: What It Means for Site Owners and IT Teams
- 15:2 : AI and Cybersecurity: A Deep Dive into Enterprise Applications and Digital Sovereignty with Krish Banerjee
- 14:5 : IT Security News Hourly Summary 2025-07-04 15h : 3 posts
- 14:2 : Disrupting the Ransomware Attack Chain with Hybrid Mesh Security (Part 1)
- 13:32 : Google fined $314M for misusing idle Android users’ data
- 13:31 : NightEagle APT Exploits Microsoft Exchange Flaw to Target China’s Military and Tech Sectors
- 13:4 : Malicious SEO Plugins on WordPress Can Lead to Site Takeover
- 12:32 : Instagram Now Rotating TLS Certificates Daily with 1-Week Validity
- 12:31 : Apache APISIX Vulnerability Enables Cross-Issuer Access Under Misconfigurations
- 12:5 : SquareX Reveals That Employees Are No Longer The Weakest Link, Browser AI Agents Are
- 12:4 : Ransomware: Hunters International Is Not Shutting Down, It’s Rebranding
- 11:34 : Scattered Spider Enhances Tactics to Exploit Legitimate Tools for Evasion and Persistence
- 11:34 : Multiple PHP Vulnerabilities Allow SQL Injection & DoS Attacks – Update Now
- 11:34 : Critical HIKVISION applyCT Vulnerability Exposes Devices to Code Execution Attacks
- 11:34 : Validation is an Increasingly Critical Element of Cloud Security
- 11:5 : IT Security News Hourly Summary 2025-07-04 12h : 7 posts
- 11:2 : Hackers Abuse Legitimate Inno Setup Installer to Deliver Malware
- 11:2 : Next.js Vulnerability Allows Attackers to Trigger DoS via Cache Poisoning
- 11:2 : In Other News: Hacker Helps Kill Informants, Crylock Developer Sentenced, Ransomware Negotiator Probed
- 10:32 : Cisco Issues Emergency Fix for Critical Root Credential Flaw in Unified CM
- 10:32 : Critical HIKVISION applyCT Flaw Allows Remote Code Execution
- 10:32 : Researchers Discover New Method to Identify Azure Arc in Enterprise Environments and Maintain Persistence
- 10:32 : Writable File in Lenovo Path Lets Attackers Evade AppLocker Restrictions
- 10:31 : Mastering Real-Time Cloud Data Governance Amid Evolving Threats and Regulations
- 10:31 : WhatsApp Under Fire for AI Update Disrupting Group Communication
- 10:31 : Taiwan Flags Chinese Apps Over Data Security Violations
- 10:5 : Hunters International Ransomware Gang Rebrands as World Leaks
- 10:5 : Hackers Exploit Java Debug Wire Protocol Servers to Deploy Cryptomining Payloads
- 10:5 : Hackers use Fake Cloudflare Verification Screen to Trick Users into Executing Malware
- 10:5 : New “123 | Stealer” Advertised on Underground Hacking Forums for $120 Per Month
- 10:5 : Microsoft Investigating Forms Service Issue Not Accessible for Users
- 10:5 : New Sophisticated Attack ypasses Content Security Policy Using HTML-Injection Technique
- 10:5 : Massive Android Ad Fraud ‘IconAds’ Leverages Google Play to Attack Phone Users
- 10:4 : The Role Culture and Trust Play in Countering Deepfakes
- 10:4 : Critical Sudo Vulnerabilities Let Local Users Gain Root Access on Linux, Impacting Major Distros
- 10:4 : Your AI Agents Might Be Leaking Data — Watch this Webinar to Learn How to Stop It
- 9:32 : Massive Android Ad Fraud ‘IconAds’ Uses Google Play to Target and Exploit Users
- 9:8 : Cybercriminals Use Fake Cloudflare Verification Screens to Deceive Users into Running Malware
- 9:8 : EU Launches Plan to Implement Quantum-Secure Infrastructure
- 8:35 : A flaw in Catwatchful spyware exposed logins of +62,000 users
- 8:35 : Google Ordered to Pay $314M for Misusing Android Users’ Cellular Data Without Permission
- 8:5 : IT Security News Hourly Summary 2025-07-04 09h : 1 posts
- 7:34 : New “123 | Stealer” Malware Rented on Dark Web for $120/Month
- 7:34 : Researchers Defeat Content Security Policy Protections via HTML Injection
- 7:34 : Catwatchful Android Spyware Leaks Credentials of 62,000+ Users
- 7:34 : Multiple PHP Vulnerabilities Enables SQLi and DoS Attacks – Update Now
- 7:34 : Undetectable Android spyware is detectable, Hunters ransomware quits, Salt Typhoon dormant
- 7:4 : NTLM relay attacks are back from the dead
- 6:4 : New hires, new targets: Why attackers love your onboarding process
- 5:37 : A Simple Guide to Launching GenAI Successfully
- 5:36 : Exposed and unaware? Smart buildings need smarter risk controls
- 5:36 : Africa’s cybersecurity crisis and the push to mobilizing communities to safeguard a digital future
- 5:7 : Azure API Vulnerabilities Leak VPN Keys and Built-In Roles Allow Over-Privileged Access
- 5:7 : New Hpingbot Abusing Pastebin for Payload Delivery and Hping3 Tool to Launch DDoS Attacks
- 4:37 : AI Dilemma: Emerging Tech as Cyber Risk Escalates
- 4:37 : New infosec products of the week: July 4, 2025
- 4:36 : Internet outages are costing companies millions every month
- 3:3 : How government cyber cuts will affect you and your business
- 3:3 : Bridging the Security Knowledge Gap: Introducing AI ExplAIn for Imperva Cloud WAF
- 1:36 : Psychological Contract Breach and the Power of Security Culture – Research Insights
- 23:36 : Why Diverse Cloud Environments Require Flexible Security
- 23:36 : Catwatchful – 61,641 breached accounts
- 23:5 : IT Security News Hourly Summary 2025-07-04 00h : 5 posts
- 22:55 : IT Security News Daily Summary 2025-07-03