90 posts were published in the last hour
- 19:2 : Penetration Testing Strategy: How to Make Your Tests Practical, Repeatable, and Risk-Reducing
- 19:2 : FBI seized ‘web3adspanels.org’ hosting stolen logins
- 19:2 : NDSS 2025 – LAMP: Lightweight Approaches For Latency Minimization In Mixnets With Practical Deployment Considerations
- 19:2 : Randall Munroe’s XKCD ‘Satellite Imagery’
- 18:31 : Pen testers accused of ‘blackmail’ after reporting Eurostar chatbot flaws
- 18:31 : U.S. Authorities Shut Down Online Network Selling Fake Identity Templates
- 18:2 : M-Files Vulnerability Allows Attackers to Steal Active User Session Tokens
- 18:2 : Israeli Organizations Targeted by AV-Themed Malicious Word and PDF Files
- 18:2 : NVIDIA Isaac Vulnerabilities Enable Remote Code Execution Attacks
- 18:2 : Microsoft Enhances BitLocker with Hardware Acceleration Support
- 18:2 : Evasive Panda APT: Malware Delivery via AitM and DNS Poisoning
- 17:31 : New MacSync macOS Stealer Uses Signed App to Bypass Apple Gatekeeper
- 17:5 : IT Security News Hourly Summary 2025-12-24 18h : 2 posts
- 17:2 : U.S. Federal Communications Commission (FCC) bans foreign-made drones over national security concerns
- 16:31 : SEC Charges Crypto Firms in $14m Investment Scam
- 16:3 : FBI Discovers 630 Million Stolen Passwords in Major Cybercrime Investigation
- 16:3 : Security Flaw Exposes Personal Data on Somalia’s E-Visa System Weeks After Major Breach
- 15:32 : US shuts down phisherfolk’s $14.6M password-hoarding platform
- 15:32 : Coordinated Scams Target MENA Region With Fake Online Job Ads
- 15:32 : North Korean Hackers Steal 2B Crypto
- 15:32 : Android Malware Combines Droppers SMS RAT
- 15:32 : Iranian Infy APT Returns With New Malware
- 15:31 : Nigerian National Convicted Of Fraud
- 15:31 : Cyber Briefing: 2025.12.24
- 15:2 : Pro-Russian Hackers Claim Cyberattack on French Postal Service
- 14:32 : Best of 2025: LDAPNightmare: SafeBreach Labs Publishes First Proof-of-Concept Exploit for CVE-2024-49112
- 14:31 : Best of 2025: Ukraine Pwns Russian Drone Maker — Gaskar is ‘Paralyzed’
- 14:31 : Trend Micro Warns: ‘Vibe Crime’ Ushers in Agentic AI-Driven Cybercrime Era
- 14:5 : IT Security News Hourly Summary 2025-12-24 15h : 5 posts
- 14:2 : Italian regulator rules Apple’s ATT feature limits competition
- 14:2 : Evasive Panda APT Using AitM Attack and DNS Poisoning to Deliver Malware
- 14:2 : Nomani Investment Scam Surges 62% Using AI Deepfake Ads on Social Media
- 13:31 : Threat Actors Using Weaponized AV-themed Word and PDF Documents to Attack Israeli Organizations
- 13:31 : Russian Hackers Obtain Sensitive NHS Documents from UK Royal Properties
- 13:3 : Merry Christmas, Readers Of Silicon UK
- 12:31 : Urban VPN Proxy Surreptitiously Intercepts AI Chats
- 12:31 : Threat Actors Advertised NtKiller Malware on Dark Web Claiming Terminate Antivirus and EDR Bypass
- 12:2 : Why Mobile-First SaaS Needs Passwordless Authentication for Field Teams
- 12:2 : How to Detect Insider Threats Before They Damage Your Business
- 12:2 : Attacks are Evolving: 3 Ways to Protect Your Business in 2026
- 11:31 : Eurostar Accused Researchers of Blackmail for Reporting AI Chatbot Flaws
- 11:31 : The Age of the All-Access AI Agent Is Here
- 11:5 : IT Security News Hourly Summary 2025-12-24 12h : 4 posts
- 11:2 : La Poste outage after a cyber attack disrupts digital banking and online services
- 11:2 : Cyber Experts Warn of Increased Consumer Scams This Festive Season
- 11:2 : NIST, MITRE Partner on $20m AI Centers For Manufacturing and Cybersecurity
- 10:32 : ServiceNow to Pay $7.8bn For OT Security Specialist Armis
- 10:2 : One Year Of Zero-Click Exploits: What 2025 Taught Us About Modern Malware
- 10:2 : Critical MongoDB Vulnerability Exposes Sensitive Data via Zlib Compression
- 10:2 : SEC Files Charges Over $14 Million Crypto Scam Using Fake AI-Themed Investment Tips
- 10:2 : Consumer Cyber Risks in 2026 Focus on AI-Driven Scams, Not Hacks
- 9:31 : ServiceNow to acquire Armis for $7.75 billion
- 9:31 : La Poste Still Offline After Major DDoS Attack
- 9:2 : WebRAT Malware via GitHub Repositories Claim as Proof-of-concept Exploits to Attack Users
- 9:2 : Five identity-driven shifts reshaping enterprise security in 2026
- 8:32 : Cyberattack Knocks La Poste Offline, Disrupting Postal and Banking Services Across France
- 8:31 : ServiceNow to acquire cybersecurity startup Armis, MacSync Stealer adopts quieter installation, Nissan customer data stolen in Red Hat raid
- 8:5 : IT Security News Hourly Summary 2025-12-24 09h : 3 posts
- 8:2 : The End of AI Theatre: What Business-Ready Technology Looks Like in 2026
- 8:2 : Stockton Hospital Gets Robotic Operating Theatre
- 7:31 : Italy Fines Apple €98.6 Million Over ATT Rules Limiting App Store Competition
- 7:2 : Evasive Panda APT poisons DNS requests to deliver MgBot
- 7:2 : Operation PCPcat Hacked 59,000+ Next.js/React Servers Within 48 Hours
- 7:2 : Interpol Taken Down 6 Ransomware Variants and Arrested 500+ Suspects
- 7:2 : Ransomware Attack on Romanian Waters Authority – 1,000+ IT Systems Compromised
- 7:2 : Conjur: Open-source secrets management and application identity
- 7:2 : What if your face could say “don’t record me”? Researchers think it’s possible
- 6:31 : Governance maturity defines enterprise AI confidence
- 6:2 : Critical MongoDB Flaw Leaks Sensitive Data Through zlib Compression
- 6:2 : WebRAT Malware Campaign Leveraging GitHub-Hosted Proof-of-Concept Code
- 6:2 : Operation PCPcat Exploits Next.js and React, Impacting 59,000+ Servers
- 6:2 : “Purifying” photons: Scientists found a way to clean light itself
- 6:2 : Counterfeit defenses built on paper have blind spots
- 6:2 : Elementary OS 8.1 rolls out with a stronger focus on system security
- 5:31 : What happens to enterprise data when GenAI shows up everywhere
- 5:31 : Year End Repeat: Pig Butchering: Operation Shamrock Fights Back
- 5:5 : IT Security News Hourly Summary 2025-12-24 06h : 2 posts
- 5:2 : What are Access Tokens? Complete Guide to Access Token Structure, Usage & Security
- 4:31 : Медицинская лаборатория Гемотест (Gemotest) – 6,341,495 breached accounts
- 4:2 : A brush with online fraud: What are brushing scams and how do I stay safe?
- 4:2 : Microsoft wants to replace its entire C and C++ codebase, perhaps by 2030
- 2:31 : Formal Verification of MCP Security Properties against Post-Quantum Adversaries
- 1:2 : SAML Security: Complete Guide to SAML Request Signing & Response Encryption
- 0:31 : Who Does Cybersecurity Need? You!
- 23:5 : IT Security News Hourly Summary 2025-12-24 00h : 6 posts
- 23:2 : What makes an AI system adaptable to new security challenges
- 23:2 : What features ensure scalability in secret management
- 23:2 : Why staying ahead with Agentic AI is crucial for business
- 23:2 : How can proactive AI security prevent data breaches
- 22:55 : IT Security News Daily Summary 2025-12-23