Tag: hourly summary

IT Security News Hourly Summary 2025-02-21 03h : 3 posts

3 posts were published in the last hour 1:31 : Life in the Swimlane with Gabriella Lopez, Senior Sales Development Representative 1:9 : ISC Stormcast For Friday, February 21st, 2025 https://isc.sans.edu/podcastdetail/9334, (Fri, Feb 21st) 1:8 : Linux royalty backs adoption…

IT Security News Hourly Summary 2025-02-20 09h : 5 posts

5 posts were published in the last hour 7:32 : CISA and FBI Issue Alert as Ghost Ransomware Targets 70+ Organizations 7:31 : Microsoft is named a Leader in the 2025 Gartner® Magic Quadrant™ for cyber-physical systems protection platforms​​ 7:31…

IT Security News Hourly Summary 2025-02-20 06h : 3 posts

3 posts were published in the last hour 4:31 : Windows Disk Cleanup Tool Vulnerability Exploited to Gain SYSTEM Privileges 4:31 : Microsoft is named a Leader in the 2025 Gartner® Magic Quadrant™ for cyber-physical systems protection platforms​​ 4:8 :…

IT Security News Hourly Summary 2025-02-20 00h : 5 posts

5 posts were published in the last hour 22:55 : IT Security News Daily Summary 2025-02-19 22:32 : Microsoft is named a Leader in the 2025 Gartner® Magic Quadrant™ for cyber-physical systems protection platforms​​ 22:6 : Trump’s DoD CISO pick…

IT Security News Hourly Summary 2025-02-19 09h : 4 posts

4 posts were published in the last hour 7:32 : Surge in IRS and Tax-Themed Cyber Attacks Driven by Fresh Domain Registrations 7:13 : Russian Government Proposes Stricter Penalties to Tackle Cybercrime 7:13 : Critical Flaw in Apache Ignite (CVE-2024-52577)…

IT Security News Hourly Summary 2025-02-19 03h : 4 posts

4 posts were published in the last hour 2:4 : Katharine Hayhoe: The most important climate equation | Starmus highlights 1:31 : Curb Healthcare Costs — Can Cybersecurity Platformization Help? 1:31 : Healthcare outfit that served military personnel settles allegations…

IT Security News Hourly Summary 2025-02-18 18h : 16 posts

16 posts were published in the last hour 16:32 : Snake Keylogger Variant Hits Windows, Steals Data via Telegram Bots 16:32 : Cybercriminals Embedded Credit Card Stealer Script Within Tag 16:32 : Weaponized PDFs Deliver Lumma InfoStealer Targeting Educational Institutions…

IT Security News Hourly Summary 2025-02-18 15h : 14 posts

14 posts were published in the last hour 14:2 : Intruder Enhances Free Vulnerability Intelligence Platform ‘Intel’ with AI-Generated CVE Descriptions 14:2 : Aomni just raised $4M to prove AI can boost sales without replacing humans 14:2 : How to…

IT Security News Hourly Summary 2025-02-17 15h : 13 posts

13 posts were published in the last hour 13:32 : Beware! Fake Outlook Support Calls Leading to Ransomware Attacks 13:32 : New XCSSET Malware Targets macOS Users Through Infected Xcode Projects 13:32 : Xerox Printer Vulnerability Exposes Authentication Data Via…

IT Security News Hourly Summary 2025-02-14 21h : 6 posts

6 posts were published in the last hour 19:31 : Chinese Cyber-Spies Use Espionage Tools for Ransomware Side Hustle 19:7 : N. Korean Hackers Suspected in DEEP#DRIVE Attacks Against S. Korea 19:7 : XELERA Ransomware Attacking Job Seekers With Weaponized…

IT Security News Hourly Summary 2025-02-14 15h : 20 posts

20 posts were published in the last hour 14:2 : Netwrix Privilege Secure Enhances Remote Access Security by Eliminating VPN Dependencies 14:2 : Apache Fineract SQL Injection Vulnerability Let Inject Malicious Data 14:2 : NVIDIA Container Toolkit Vulnerability Let Attackers…

IT Security News Hourly Summary 2025-02-14 12h : 4 posts

4 posts were published in the last hour 10:7 : Experts discovered PostgreSQL flaw chained with BeyondTrust zeroday in targeted attacks 10:7 : New Device Code Phishing Attack Exploit Device Code Authentication To Capture Authentication Tokens 10:6 : Watchdog ponders…

IT Security News Hourly Summary 2025-02-13 15h : 17 posts

17 posts were published in the last hour 14:4 : Arbitrary File Upload Vulnerability in WordPress Plugin Let Attackers Hack 30,000 Website 14:4 : Astaroth Phishing Kit Bypasses 2FA Using Reverse Proxy Techniques 13:32 : Cybercriminals Exploit Pyramid Pentesting Tool…

IT Security News Hourly Summary 2025-02-13 03h : 3 posts

3 posts were published in the last hour 1:32 : DShield SIEM Docker Updates, (Thu, Feb 13th) 1:32 : ISC Stormcast For Thursday, February 13th, 2025 https://isc.sans.edu/podcastdetail/9322, (Thu, Feb 13th) 1:11 : Sophos sheds 6% of staff after swallowing Secureworks

IT Security News Hourly Summary 2025-02-12 12h : 8 posts

8 posts were published in the last hour 10:31 : Hackers behind US ransomware attacks arrested in Thailand 10:11 : Fortinet’s FortiOS Vulnerabilities Allow Attackers Trigger RCE and Launch DoS Attack 10:11 : FortiOS & FortiProxy Vulnerability Allows Attackers Firewall…

IT Security News Hourly Summary 2025-02-11 15h : 10 posts

10 posts were published in the last hour 13:32 : iOS 18.3.1 patches an ‘extremely sophisticated attack’ – and more 13:32 : Industrial Defender 8.0 offers detailed view of OT environments 13:32 : 8Base ransomware group leaders arrested, leak site…

IT Security News Hourly Summary 2025-02-10 12h : 14 posts

14 posts were published in the last hour 10:32 : US China Restrictions Creating ‘Incentive To Innovate’ 10:32 : US Proposes DeepSeek Ban For Federal Devices 10:32 : Penetration Testers Arrested During Approved Physical Penetration Testing 10:32 : Massive Brute…