149 posts were published in the last hour 22:11 : DEF CON 32 – Signature-Based Detection Using Network Timing 21:34 : Chinese Innovations Spawn Wave of Toll Phishing Via SMS 21:34 : Prominent US law firm Wolf Haldenstein disclosed a…
Tag: 2025-01-16
IT Security News Hourly Summary 2025-01-16 21h : 6 posts
6 posts were published in the last hour 19:36 : Find the helpers 19:36 : Russia’s Star Blizzard phishing crew caught targeting WhatsApp accounts 19:36 : New Star Blizzard spear-phishing campaign targets WhatsApp accounts 19:36 : Russian Star Blizzard Shifts…
IT Security News Hourly Summary 2025-01-16 18h : 14 posts
14 posts were published in the last hour 16:38 : Wordfence Intelligence Weekly WordPress Vulnerability Report (January 6, 2025 to January 12, 2025) 16:38 : The mystery of the $75M ransom payment to Dark Angels 16:38 : Clop Ransomware exploits…
IT Security News Hourly Summary 2025-01-16 15h : 10 posts
10 posts were published in the last hour 13:36 : An honest mistake – and a cautionary tale 13:36 : Network Detection and Response (NDR) Done Right from the Ground Up 13:36 : Ready to Simplify Trust Management? Join Free…
IT Security News Hourly Summary 2025-01-16 12h : 5 posts
5 posts were published in the last hour 10:34 : Thousands of PHP-based Web Applications Exploited to Deploy Malware 10:34 : New UEFI Secure Boot bypass vulnerability discovered (CVE-2024-7344) 10:11 : Sneaky 2FA: exposing a new AiTM Phishing-as-a-Service 10:11 :…
IT Security News Hourly Summary 2025-01-16 09h : 1 posts
1 posts were published in the last hour 7:38 : Veeam Azure Backup Vulnerability Allows Attackers to Utilize SSRF & Send Unauthorized Requests
IT Security News Hourly Summary 2025-01-16 06h : 3 posts
3 posts were published in the last hour 4:32 : UK Government Seeking to ‘Turbocharge’ Growth Through AI 4:32 : RansomHub Affiliates Exploit AI-Generated Python Backdoor in Advanced Cyberattacks 4:31 : Critical vulnerabilities remain unresolved due to prioritization gaps
IT Security News Hourly Summary 2025-01-16 03h : 2 posts
2 posts were published in the last hour 1:36 : 2022 zero day was used to raid Fortigate firewall configs. Somebody just released them. 1:11 : GSocket Gambling Scavenger – How Hackers Use PHP Backdoors and GSocket to Facilitate Illegal…
IT Security News Hourly Summary 2025-01-16 00h : 6 posts
6 posts were published in the last hour 22:55 : IT Security News Daily Summary 2025-01-15 22:37 : Investigating A Web Shell Intrusion With Trend Micro™ Managed XDR 22:37 : DJI loosens flight restrictions, decides to trust operators to follow…