Tag: 2025-05-02

IT Security News Daily Summary 2025-05-02

145 posts were published in the last hour 21:31 : Tsunami Malware Surge: Blending Miners and Credential Stealers in Active Attacks 21:31 : NVIDIA Riva AI Speech Flaw Let Hackers Gain Unauthorized Access to Abuse GPU Resources & API keys…

IT Security News Hourly Summary 2025-05-02 21h : 3 posts

3 posts were published in the last hour 19:3 : DragonForce Ransomware Cartel attacks on UK high street retailers: walking in the front door 19:3 : CISA Adds Two Known Exploited Vulnerabilities to Catalog 19:3 : Privacy for Agentic AI

IT Security News Hourly Summary 2025-05-02 18h : 4 posts

4 posts were published in the last hour 16:2 : Enhancing EHR Security: Best Practices for Protecting Patient Data 16:2 : Hacker Calls Pahalgam Incident “Inside Job” on Rajasthan Education Department Website 15:32 : Generative AI makes fraud fluent –…

IT Security News Hourly Summary 2025-05-02 15h : 8 posts

8 posts were published in the last hour 13:3 : Microsoft Exchange Online Flagging Gmail Emails as Spam – Fixes Issued 13:2 : Hackers Weaponizing Go Modules to Deliver Disk-Wiping Malware Leads to Data Loss 13:2 : ANY.RUN Unveils Q1…

IT Security News Hourly Summary 2025-05-02 12h : 8 posts

8 posts were published in the last hour 10:3 : Luxury department store Harrods suffered a cyberattack 10:2 : RSA Conference 2025 Announcement Summary (Day 3) 10:2 : MintsLoader Drops GhostWeaver via Phishing, ClickFix — Uses DGA, TLS for Stealth…

IT Security News Hourly Summary 2025-05-02 09h : 10 posts

10 posts were published in the last hour 7:2 : NVIDIA TensorRT-LLM Vulnerability Let Hackers Run Malicious Code 7:2 : Windows Security in 2025: Battling Sophisticated Threats with Advanced Defenses 7:2 : AiTM Phishing Kits Bypassing MFA By Intercepting Credentials…

IT Security News Hourly Summary 2025-05-02 00h : 4 posts

4 posts were published in the last hour 22:55 : IT Security News Daily Summary 2025-05-01 22:2 : npm Malware Targets Crypto Wallets, MongoDB; Code Points to Turkey 22:2 : Strengthening Cybersecurity Governance – CISO Best Practices 22:2 : BSidesLV24…