42 posts were published in the last hour
- 20:5 : IT Security News Hourly Summary 2025-12-13 21h : 6 posts
- 20:2 : ClickFix Attacks Still Using the Finger, (Sat, Dec 13th)
- 19:32 : Hackers Launch Rust-Based Luca Stealer Targeting Linux and Windows
- 19:32 : Kali Linux 2025.4 Released Featuring 3 New Hacking Tools and Wifipumpkin3
- 19:32 : Apple Confirms Zero-Day Exploitation in Targeted Attacks on iPhone Users
- 19:31 : Empire 6.3.0 Released as Updated Post-Exploitation Framework for Red Teams
- 19:31 : Researchers and Developers Targeted in AI-Driven GitHub Supply Chain Attack
- 19:2 : Germany calls in Russian Ambassador over air traffic control hack claims
- 18:31 : Home Renovation Choices That Often Do Not Deliver Real Value
- 17:5 : IT Security News Hourly Summary 2025-12-13 18h : 2 posts
- 17:2 : IDESaster Report: Severe AI Bugs Found in AI Agents Can Lead to Data Theft and Exploit
- 16:32 : NDSS 2025 – A Systematic Evaluation Of Novel And Existing Cache Side Channels
- 16:2 : UK’s ICO Fine LastPass £1.2 Million Over 2022 Security Breach
- 15:32 : Fake GitHub OSINT Tools Spread PyStoreRAT Malware
- 15:32 : AI Browsers Raise Privacy and Security Risks as Prompt Injection Attacks Grow
- 15:32 : Apple Addresses Two Actively Exploited Zero-Day Security Flaws
- 15:31 : 5 Critical Situations Where You Should Never Rely on ChatGPT
- 14:32 : CISA Warns of Google Chromium 0-Day Vulnerability Exploited in Attacks
- 14:32 : Empire 6.3.0 Launches With New Features for Red Teams and Penetration Testers
- 14:32 : Google Warns Multiple Hacker Groups Are Exploiting React2Shell to Spread Malware
- 13:2 : CISA Adds Actively Exploited Sierra Wireless Router Flaw Enabling RCE Attacks
- 12:4 : AI Toys for Kids Talk About Sex, Drugs, and Chinese Propaganda
- 12:4 : U.S. CISA adds Google Chromium and Sierra Wireless AirLink ALEOS flaws to its Known Exploited Vulnerabilities catalog
- 9:2 : Rust-Based Luca Stealer Spreads Across Linux and Windows Systems
- 8:5 : IT Security News Hourly Summary 2025-12-13 09h : 2 posts
- 7:31 : Hackers Target Windows Systems Using Phantom Stealer Hidden in ISO Files
- 7:31 : New Phantom Stealer Campaign Hits Windows Machines Through ISO Mounting
- 6:32 : Apple Issues Security Updates After Two WebKit Flaws Found Exploited in the Wild
- 6:2 : Black Hat Europe 2025: Was that device designed to be on the internet at all?
- 5:32 : The Hidden Danger of Storing Secrets Online | Interview with Jake Knott from Watchtower
- 4:2 : Apple 0-Day Vulnerabilities Exploited in Sophisticated Attacks Targeting iPhone Users
- 3:2 : Multiple Threat Actors Exploit React2Shell (CVE-2025-55182)
- 2:5 : IT Security News Hourly Summary 2025-12-13 03h : 1 posts
- 1:32 : The Autonomous MSSP: How to Turn XDR Volume into a Competitive Advantage
- 1:2 : Emergency fixes deployed by Google and Apple after targeted attacks
- 0:49 : Fake Microsoft Teams and Google Meet Downloads Spread Oyster Backdoor
- 0:34 : Fake Microsoft Teams and Google Meet Downloads Spread Oyster Backdoor
- 23:34 : Friday Squid Blogging: Giant Squid Eating a Diamondback Squid
- 23:5 : IT Security News Hourly Summary 2025-12-13 00h : 6 posts
- 23:4 : Development Team Augmentation: A Strategic Approach for High-Performance Teams
- 23:4 : Notepad++ fixed updater bugs that allowed malicious update hijacking
- 22:55 : IT Security News Daily Summary 2025-12-12