210 posts were published in the last hour
- 22:55 : IT Security News Daily Summary 2024-12-22
- 21:4 : How to craft a comprehensive data cleanliness policy
- 20:5 : IT Security News Hourly Summary 2024-12-22 21h : 1 posts
- 19:31 : DEF CON 32 – NTLM: The Last Ride
- 19:4 : Cybersecurity Essentials : Key to Success for All Businesses to Navigate Security
- 17:7 : Apple might be working on a smart doorbell
- 15:32 : Security Affairs newsletter Round 503 by Pierluigi Paganini – INTERNATIONAL EDITION
- 15:32 : SECURITY AFFAIRS MALWARE NEWSLETTER – ROUND 25
- 15:9 : Beware of Fake Delivery Text Scams During Holiday Shopping
- 15:9 : Thousands of SonicWall Devices Vulnerable to Critical Security Threats
- 14:32 : Phishing Scams Target YouTubers: Malware Hidden in Fake Brand Deals
- 14:32 : AMD Systems Vulnerability Could Threaten Encrypted Data Protection
- 14:5 : IT Security News Hourly Summary 2024-12-22 15h : 1 posts
- 13:7 : The Urgent Need for Data Minimization Standards
- 9:33 : US charged Dual Russian and Israeli National as LockBit Ransomware developer
- 9:33 : Week in review: MUT-1244 targets both security workers and threat actors, Kali Linux 2024.4 released
- 8:5 : IT Security News Hourly Summary 2024-12-22 09h : 1 posts
- 7:9 : RIIG Announces Two New Board Members to Guide Strategy and Accelerate Growth
- 6:32 : The UK’s Cybersecurity Landscape: Key Trends and Challenges for 2025
- 23:5 : IT Security News Hourly Summary 2024-12-22 00h : 2 posts
- 22:55 : IT Security News Daily Summary 2024-12-21
- 22:32 : BadBox rapidly grows, 190,000 Android devices infected
- 20:32 : DEF CON 32 – Grand Theft Actions Abusing Self Hosted GitHub Runners
- 17:32 : EFF Tells Appeals Court To Keep Copyright’s Fair Use Rules Broad And Flexible
- 15:32 : Novel Android NoviSpy Spyware Linked to Qualcomm Zero-Day Flaws
- 15:32 : Hackers Infect Security Researchers with Malware to Steal WordPress Credentials
- 13:4 : Four Ways to Harden Your Code Against Security Vulnerabilities and Weaknesses
- 12:4 : PCI DSS 4.0: A Comprehensive Guide to Enhanced Payment Data Security
- 12:4 : The Rise of Agentic AI: How Hyper-Automation is Reshaping Cybersecurity and the Workforce
- 12:4 : Navigating the Future of Secure Code Signing and Cryptography
- 11:36 : Mystery Drone Sightings Lead to FAA Ban Despite No Detected Threats
- 11:36 : Romanian national was sentenced to 20 years in prison for his role in NetWalker ransomware attacks
- 11:5 : IT Security News Hourly Summary 2024-12-21 12h : 1 posts
- 10:32 : Salt Typhoon Hack: A Grave Threat to U.S. Telecommunications
- 10:2 : FBI Warns of Security Risks in RCS Messaging
- 10:2 : LockBit Developer Rostislav Panev Charged for Billions in Global Ransomware Damages
- 8:5 : IT Security News Hourly Summary 2024-12-21 09h : 2 posts
- 8:4 : How Fraudsters Are Adopting Cybersecurity Techniques to Bypass Detection
- 8:4 : Cyber Security Today: Year End Panel Discussion. Saturday, December 21, 2024
- 7:4 : New Report Shows That The U.S. Leads in Anonymous Open-Source Contributions
- 7:4 : Combatting phantom secrets: have you heard of historical secrets scanning?
- 7:4 : Maryland Association of Community Colleges and BCR Cyber Receive TEDCO Grant
- 6:4 : Navigating AI Risks: Best Practices for Compliance and Security
- 6:4 : HackerOne Cybersecurity Platform Joins AWS Marketplace
- 5:5 : IT Security News Hourly Summary 2024-12-21 06h : 1 posts
- 5:2 : How to Increase Your Cyber Resilience – and Customer Trust
- 4:4 : 2025 Cybersecurity Predictions
- 4:4 : Could better backups reduce cyber insurance premiums?
- 4:4 : How to Implement a Balanced Approach to Cybersecurity: Prioritizing Mission, Safety, and Compliance
- 3:31 : Fenix24 Debuts Argos99 to Fortify Cyber Resilience and Streamline Incident Recovery
- 0:4 : DEF CON 32 – Laundering Money
- 23:31 : Will AI Drive Efficiency and Budget Growth? Risks, Rewards & Reality
- 23:5 : IT Security News Hourly Summary 2024-12-21 00h : 3 posts
- 23:2 : Week in Review: Data breach impact study, US weighs TP-Link ban, BeyondTrust cyberattack
- 22:55 : IT Security News Daily Summary 2024-12-20
- 22:31 : Sophos fixed critical vulnerabilities in its Firewall product
- 20:31 : Third member of LockBit ransomware gang has been arrested
- 20:7 : Identity and access management tools and features for 2025
- 20:5 : IT Security News Hourly Summary 2024-12-20 21h : 1 posts
- 19:32 : Ninth Circuit Gets It: Interoperability Isn’t an Automatic First Step to Liability
- 19:2 : What Payroll Documents Do You Need to Pay Employees?
- 19:2 : Customs & Border Protection Fails Baseline Privacy Requirements for Surveillance Technology
- 18:32 : LockBit Developer Rostislav Panev, a Dual Russian-Israeli Citizen, Arrested
- 18:32 : How to Test PATCH Requests for API Testing With Playwright Java
- 18:2 : Our Santa wishlist: Stronger identity security for kids
- 17:5 : IT Security News Hourly Summary 2024-12-20 18h : 6 posts
- 16:32 : Tibbo AggreGate Network Manager
- 16:32 : Fortinet Releases Security Updates for FortiManager
- 16:32 : DEF CON 32 – Measuring the Tor Network
- 16:5 : How to delete your X/Twitter account for good (and protect your data)
- 16:5 : How to Prevent DDoS Attacks: 5 Steps for DDoS Prevention
- 16:5 : Video: Brain Cipher Ransomware Hacks Deloitte
- 16:4 : Is There a DDoS Attack Ceiling?
- 16:4 : Ditch The Cloud Security Labels to Nail Detection and Response
- 16:4 : North Korean Hackers Stole $1.34 Billion in Crypto in 2024
- 16:4 : Italy’s Data Protection Watchdog Issues €15m Fine to OpenAI Over ChatGPT Probe
- 15:33 : Russia targets Ukraine sensitive data servers with Cyber Attacks
- 15:33 : Builder.ai Database Misconfiguration Exposes 1.29 TB of Unsecured Records
- 15:32 : Ransomware attack on health giant Ascension hits 5.6 million patients
- 15:32 : Security Serious Unsung Heroes 2024 – Winner’s Spotlight: Best Security Awareness Campaign
- 15:32 : Cybersecurity Snapshot: CISA Hands Down Cloud Security Directive, While Threat from North Korean IT Workers Gets the Spotlight
- 15:32 : How to Handle Secrets in Configuration Management Tools
- 15:32 : Rising Tactics of Winnti Hackers Include Deploying Glutton PHP Backdoors
- 15:32 : CISA Issues Mobile Security Guidelines Amid Cyber Espionage Threats
- 15:32 : Colorado Faces Growing Financial Losses from AI-Powered Scams in 2024
- 15:32 : Bitcoin Security Concerns Amid Quantum Computing Advancements
- 15:3 : Protecting Unmanaged Devices with Armis and Akamai
- 15:2 : Major Enhancements to Akamai API Security, Q4 2024
- 15:2 : TP-Link routers may be banned in the US next year – what that means for you
- 15:2 : New Microsoft guidance for the CISA Zero Trust Maturity Model
- 14:32 : Top AI Trends Every Software Development Company to Follow in 2025
- 14:32 : Why Apple sends spyware victims to this nonprofit security lab
- 14:32 : How Public-Private Collaborations Contribute to Cybercrime Disruption
- 14:5 : IT Security News Hourly Summary 2024-12-20 15h : 3 posts
- 13:32 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 13:32 : Config Chaos | How IoT and Cloud misconfigurations undermine security
- 13:31 : Getting to Know Katya Pikkarainen
- 13:2 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 13:2 : In Other News: McDonald’s API Hacking, Netflix Fine, Malware Kills ICS Process
- 12:32 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 12:32 : OPSWAT Acquires Fend to Extend Cybersecurity Reach Into OT Platforms
- 12:32 : CISA: Use Signal or other secure communications app
- 12:32 : LockBit Admins Tease a New Ransomware Version
- 12:31 : Ukraine’s Security Service Probes GRU-Linked Cyber-Attack on State Registers
- 12:2 : Threat Actors Selling Nunu Stealer On Hacker Forums
- 12:2 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 12:2 : Black Duck Expands Leadership Team
- 12:2 : Botnet of 190,000 BadBox-Infected Android Devices Discovered
- 11:32 : Christmas “Gift” Delivered Through SSH, (Fri, Dec 20th)
- 11:32 : Now You See Me, Now You Don’t: Using LLMs to Obfuscate Malicious JavaScript
- 11:32 : UK’s ICO Labels Google ‘Irresponsible’ For Tracking Change
- 11:32 : El Salvador To Sell Or Discontinue Bitcoin Wallet, After IMF Deal
- 11:32 : Craig Wright Sentenced For Contempt Of Court
- 11:32 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 11:32 : U.S. CISA adds BeyondTrust software flaw to its Known Exploited Vulnerabilities catalog
- 11:32 : BellaCPP: Discovering a new BellaCiao variant written in C++
- 11:32 : CISA Urges Immediate Patching of Exploited BeyondTrust Vulnerability
- 11:32 : Lazarus Group Spotted Targeting Nuclear Engineers with CookiePlus Malware
- 11:32 : Webcams and DVRs Vulnerable to HiatusRAT, FBI Warns
- 11:5 : IT Security News Hourly Summary 2024-12-20 12h : 7 posts
- 11:4 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 11:4 : French Citizens – 28,445,106 breached accounts
- 11:4 : Rockwell PowerMonitor Vulnerabilities Allow Remote Hacking of Industrial Systems
- 11:4 : Another NetWalker affiliate sentenced to 20 years in prison
- 11:4 : CISA Urges Encrypted Messaging After Salt Typhoon Hack
- 10:32 : Siemens UMC Vulnerability Allows Arbitrary Remote Code Execution
- 10:32 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 10:4 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 9:32 : Task scams cost Americans almost quarter of a billion dollars
- 9:32 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 9:32 : Unwrapping Christmas scams | Unlocked 403 cybersecurity podcast (ep. 9)
- 9:32 : Raccoon Infostealer operator sentenced to 60 months in prison
- 9:32 : Insider Threat Indicators
- 9:32 : Sophos Issues Hotfixes for Critical Firewall Flaws: Update to Prevent Exploitation
- 9:32 : Rspack npm Packages Compromised with Crypto Mining Malware in Supply Chain Attack
- 9:32 : Ransomware Attackers Target Industries with Low Downtime Tolerance
- 9:4 : Foxit PDF Editor Vulnerabilities Allows Remote Code Execution
- 9:4 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 8:32 : Windows 11 Privilege Escalation Vulnerability Lets Attackers Execute Code to Gain Access
- 8:32 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 8:32 : Ransomware Attacks Expose Gaps in Backup Practices: The Case for Modern Solutions
- 8:32 : Amazon health malware, BeyondTrust suffers cyberattack, FortiNet wireless vulnerability
- 8:5 : IT Security News Hourly Summary 2024-12-20 09h : 9 posts
- 8:3 : NetWalker Ransomware Operator Sentenced to 20 Years in Prison
- 8:2 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 8:2 : Human Risk Management: The “Weakest Link” Emerges as Key to Cybersecurity
- 8:2 : How Data Classification Reduces Insider Threats
- 8:2 : Last Pass Hack Impact Continues: Cyber Security Today for Friday, December 20, 2024
- 7:32 : Silicon In Focus Podcast: Tech in 2025
- 7:32 : CISA Warns of BeyondTrust Privileged Remote Access Exploited in Wild
- 7:32 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 7:32 : Zero-Trust in Web3: Redefining Security for Decentralized Systems
- 7:5 : Rising wave of cyber-attacks targeting YouTube content creators
- 7:4 : The Avast Phishing Awards: Trickiest email headlines of 2024
- 7:4 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 7:4 : Hackers Exploiting Critical Fortinet EMS Vulnerability to Deploy Remote Access Tools
- 6:32 : CISA Releases Eight New ICS Advisories to Defend Cyber Attacks
- 6:32 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 6:32 : CISA and EPA Warn Water Facilities to Secure Exposed HMIs
- 6:4 : NotLockBit – Previously Unknown Ransomware Attack Windows & macOS
- 6:4 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 6:4 : CISA Adds Critical Flaw in BeyondTrust Software to Exploited Vulnerabilities List
- 5:32 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 5:32 : AI is becoming the weapon of choice for cybercriminals
- 5:32 : Why cybersecurity is critical to energy modernization
- 5:5 : IT Security News Hourly Summary 2024-12-20 06h : 5 posts
- 5:4 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 4:32 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 4:32 : India’s Rapido exposed user and driver data through leaky website feedback form
- 4:32 : New infosec products of the week: December 20, 2024
- 4:32 : 46% of financial institutions had a data breach in the past 24 months
- 4:2 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 3:32 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 3:32 : Infosec experts divided on AI’s potential to assist red teams
- 3:32 : CISO Challenges for 2025: Overcoming Cybersecurity Complexities
- 3:4 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 2:31 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 2:6 : ISC Stormcast For Friday, December 20th, 2024 https://isc.sans.edu/podcastdetail/9264, (Fri, Dec 20th)
- 2:6 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 2:5 : IT Security News Hourly Summary 2024-12-20 03h : 1 posts
- 1:31 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 1:4 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 1:4 : Navigating the New Era of AI Traffic: How to Identify and Block AI Scrapers
- 1:4 : DEF CON 32 – Exploiting Cloud Provider Vulnerabilities for Initial Access
- 0:32 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 0:32 : BeyondTrust SaaS instances breached in cyberattack
- 0:7 : Play Ransomware Claims Krispy Kreme Breach, Threatens Data Leak
- 0:7 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 23:31 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 23:5 : IT Security News Hourly Summary 2024-12-20 00h : 6 posts
- 23:2 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 23:2 : The Breachies 2024: The Worst, Weirdest, Most Impactful Data Breaches of the Year
- 23:2 : ‘Fix It’ social-engineering scheme impersonates several brands
- 22:55 : IT Security News Daily Summary 2024-12-19
- 22:31 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 22:9 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 21:32 : Docker Security Best Practices for Enterprise Applications: From Development to Production
- 21:32 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 21:32 : Small model, big impact: Patronus AI’s Glider outperforms GPT-4 in key AI evaluation tasks
- 21:31 : Protecting Your Heart and Wallet: A Guide to Safe Charitable Giving
- 21:2 : 2024-12-18 – One week of server scans and probes and web traffic
- 21:2 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 21:2 : Traveling soon? You can share your luggage’s location with these airlines now, thanks to Apple AirTags
- 20:32 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 20:5 : IT Security News Hourly Summary 2024-12-19 21h : 19 posts
- 20:2 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 20:2 : Ossur Mobile Logic Application
- 20:2 : Hitachi Energy SDM600
- 20:2 : Schneider Electric Modicon Controllers
- 20:2 : 2024 ISO and CSA STAR certificates now available with two additional services