191 posts were published in the last hour 22:11 : DEF CON 32 – Signature-Based Detection Using Network Timing 21:34 : Chinese Innovations Spawn Wave of Toll Phishing Via SMS 21:34 : Prominent US law firm Wolf Haldenstein disclosed a…
Tag: 2025-01-16
IT Security News Hourly Summary 2025-01-16 21h : 6 posts
6 posts were published in the last hour 19:37 : Find the helpers 19:36 : Russia’s Star Blizzard phishing crew caught targeting WhatsApp accounts 19:36 : New Star Blizzard spear-phishing campaign targets WhatsApp accounts 19:36 : Russian Star Blizzard Shifts…
IT Security News Hourly Summary 2025-01-16 18h : 15 posts
15 posts were published in the last hour 16:39 : Wordfence Intelligence Weekly WordPress Vulnerability Report (January 6, 2025 to January 12, 2025) 16:39 : One Step Ahead in Cyber Hide-and-Seek: Automating Malicious Infrastructure Discovery With Graph Neural Networks 16:39…
IT Security News Hourly Summary 2025-01-16 15h : 13 posts
13 posts were published in the last hour 13:37 : [UPDATE] [mittel] GStreamer: Mehrere Schwachstellen ermöglichen Denial of Service 13:36 : An honest mistake – and a cautionary tale 13:36 : Network Detection and Response (NDR) Done Right from the…
IT Security News Hourly Summary 2025-01-16 12h : 10 posts
10 posts were published in the last hour 10:34 : Thousands of PHP-based Web Applications Exploited to Deploy Malware 10:34 : New UEFI Secure Boot bypass vulnerability discovered (CVE-2024-7344) 10:12 : Fehlerquelle OAuth: Daten von Mitarbeitern gescheiterter Start-ups gefährdet 10:12…
IT Security News Hourly Summary 2025-01-16 09h : 3 posts
3 posts were published in the last hour 7:38 : Veeam Azure Backup Vulnerability Allows Attackers to Utilize SSRF & Send Unauthorized Requests 7:12 : heise-Angebot: heise security Webinar: Praktische Security in Windows-Netzen – Tiering und PAWs 7:12 : Windows-Update-Probleme:…
IT Security News Hourly Summary 2025-01-16 06h : 3 posts
3 posts were published in the last hour 4:32 : UK Government Seeking to ‘Turbocharge’ Growth Through AI 4:32 : RansomHub Affiliates Exploit AI-Generated Python Backdoor in Advanced Cyberattacks 4:32 : Critical vulnerabilities remain unresolved due to prioritization gaps
IT Security News Hourly Summary 2025-01-16 03h : 2 posts
2 posts were published in the last hour 1:36 : 2022 zero day was used to raid Fortigate firewall configs. Somebody just released them. 1:11 : GSocket Gambling Scavenger – How Hackers Use PHP Backdoors and GSocket to Facilitate Illegal…
IT Security News Hourly Summary 2025-01-16 00h : 6 posts
6 posts were published in the last hour 22:55 : IT Security News Daily Summary 2025-01-15 22:37 : Investigating A Web Shell Intrusion With Trend Micro™ Managed XDR 22:37 : DJI loosens flight restrictions, decides to trust operators to follow…