31 posts were published in the last hour
- 20:5 : IT Security News Hourly Summary 2025-07-05 21h : 1 posts
- 18:31 : FBI Warns Airlines and Insurers as Scattered Spider Ransomware Attacks Surge
- 17:34 : North Korea-linked threat actors spread macOS NimDoor malware via fake Zoom updates
- 17:5 : IT Security News Hourly Summary 2025-07-05 18h : 3 posts
- 17:2 : ByBit Crypto Heist: First Half of 2025 Records All-time High Crypto Theft
- 17:2 : FBI Warns of Scattered Spider Cyberattacks on Airline and Transport Sectors
- 16:4 : Chinese Attackers Target France Infrastructure in Ivanti Zero-Day Exploit Campaign
- 15:34 : Denmark Empowers Public Against Deepfake Threats
- 15:34 : North Korea-Linked Hackers Behind $2.1 Billion in Crypto Theft in Early 2025
- 14:32 : “CitrixBleed 2” Vulnerability PoC Released – Warns of Potential Widespread Exploitation
- 14:5 : IT Security News Hourly Summary 2025-07-05 15h : 1 posts
- 13:39 : New Phishing Attack Impersonates as DWP Attacking Users to Steal Credit Card Data
- 13:39 : Writable File in Lenovo’s Windows Directory Enables a Stealthy AppLocker Bypass
- 13:39 : Instagram Started Using 1-Week Validity TLS Certificates and Changes Them Daily
- 13:39 : Threat Actors Turning Job Offers Into Traps, Over $264 Million Lost in 2024 Alone
- 13:39 : Russia Jailed Hacker Who Worked for Ukrainian Intelligence to Launch Cyberattacks on Critical Infrastructure
- 13:2 : Massive spike in use of .es domains for phishing abuse
- 11:6 : How Digital Executive Protection Shields Top Leaders from Modern Threats
- 11:6 : Android May Soon Warn You About Fake Cell Towers
- 11:6 : Scattered Spider Upgraded Their Tactics to Abuse Legitimate Tools to Evade Detection and Maintain Persistence
- 11:5 : IT Security News Hourly Summary 2025-07-05 12h : 2 posts
- 9:34 : Researchers Uncover New Technique to Exploit Azure Arc for Hybrid Escalation in Enterprise Environment and Maintain Persistence
- 9:34 : Hackers Exploit Legitimate Inno Setup Installer to Use as a Malware Delivery Vehicle
- 8:5 : IT Security News Hourly Summary 2025-07-05 09h : 2 posts
- 7:34 : Hackers Exploiting Java Debug Wire Protocol Servers in Wild to Deploy Cryptomining Payload
- 6:35 : Alert: Exposed JDWP Interfaces Lead to Crypto Mining, Hpingbot Targets SSH for DDoS
- 6:34 : Taiwan NSB Alerts Public on Data Risks from TikTok, Weibo, and RedNote Over China Ties
- 5:4 : UK Man Accused in Major International Hacking Case, Faces US Charges
- 4:34 : Next.js Cache Poisoning Vulnerability Let Attackers Trigger DoS Condition
- 23:5 : IT Security News Hourly Summary 2025-07-05 00h : 2 posts
- 22:55 : IT Security News Daily Summary 2025-07-04