12 posts were published in the last hour 18:33 : CVE-2025-32433: Vulnerability in Erlang/OTP SSH Implementation 18:33 : IngressNightmare: Understanding CVE‑2025‑1974 in Kubernetes Ingress-NGINX 18:33 : Threat Actors Registered 26k+ Domains Mimic Brands to Trick Users 18:33 : Oh, cool.…
Tag: hourly summary
IT Security News Hourly Summary 2025-04-25 18h : 13 posts
13 posts were published in the last hour 15:33 : Don’t Believe the Hype: Learn How Cybercriminals Are Actually Using AI 15:33 : Russian Hackers Attempting to Sabotage The Digital Control System of a Dutch Public Service 15:33 : How…
IT Security News Hourly Summary 2025-04-25 15h : 17 posts
17 posts were published in the last hour 13:3 : How CISOs Can Master Operational Control Assurance — And Why It Matters 13:3 : Johnson Controls Software House iSTAR Configuration Utility (ICU) Tool 13:3 : Data breach at Connecticut’s Yale…
IT Security News Hourly Summary 2025-04-25 12h : 10 posts
10 posts were published in the last hour 9:34 : Hackers Exploit MS-SQL Servers to Deploy Ammyy Admin for Remote Access 9:34 : ‘SessionShark’ – A New Toolkit Bypasses Microsoft Office 365 MFA Security 9:34 : Claims assistance firm fined…
IT Security News Hourly Summary 2025-04-25 09h : 10 posts
10 posts were published in the last hour 6:33 : Microsoft’s Patch for Symlink Vulnerability Introduces New Windows Denial-of-Service Flaw 6:33 : Verizon DBIR Report – Small Businesses Emerges as Prime Targets for Ransomware Attacks 6:33 : Threat Actors Attacking…
IT Security News Hourly Summary 2025-04-25 00h : 3 posts
3 posts were published in the last hour 22:55 : IT Security News Daily Summary 2025-04-24 22:4 : Protecting Your Phone—and Your Privacy—at the US Border 21:32 : 3 EUC security topics I’ll be looking for at RSAC 2025
IT Security News Hourly Summary 2025-04-24 21h : 5 posts
5 posts were published in the last hour 19:5 : Yale New Haven Health (YNHHS) data breach impacted 5.5 million patients 18:33 : Threat Actors Taking Advantage of Unsecured Kubernetes Clusters for Cryptocurrency Mining 18:6 : Lessons from Ted Lasso…
IT Security News Hourly Summary 2025-04-24 18h : 20 posts
20 posts were published in the last hour 15:32 : FBI confirms $16.6 billion losses to cyber-crime in 2024 15:32 : The danger of data breaches — what you really need to know 15:12 : Googles KI erfindet Erklärungen für…
IT Security News Hourly Summary 2025-04-24 15h : 22 posts
22 posts were published in the last hour 13:4 : WhatsApp: “Advanced Chat Privacy” liefert Schutz der Privatsphäre 13:3 : The Illusion of Truth: The Risks and Responses to Deepfake Technology 13:3 : New SessionShark Phishing Kit Bypasses MFA to…
IT Security News Hourly Summary 2025-04-24 12h : 20 posts
20 posts were published in the last hour 9:34 : Sicherheitslücken: Schwachstellenscanner Nessus ist angreifbar 9:34 : Github: Forscher macht aus gelöschten Dateien 64.000 US-Dollar 9:33 : [NEU] [mittel] IBM InfoSphere Information Server: Mehrere Schwachstellen 9:32 : Your vendor may…