32 posts were published in the last hour
- 20:2 : ForcedLeak flaw in Salesforce Agentforce exposes CRM data via Prompt Injection
- 18:2 : How Six Simple Habits Can Keep Your Computer Safe From Malware
- 17:43 : IT Security News Hourly Summary 2025-09-27 19h : 2 posts
- 17:2 : Mysterious “quantum echo” in superconductors could unlock new tech
- 15:2 : The Looming Authorization Crisis: Why Traditional IAM Fails Agentic AI
- 15:2 : Vendor Data Breaches and Their Business Impact
- 15:2 : Bengaluru Software Engineer Loses Rs 44 Lakh in Fake Stock Trading Scam
- 15:2 : ShadowLeak: Zero-Click ChatGPT Flaw Exposes Gmail Data to Silent Theft
- 14:32 : An App Used to Dox Charlie Kirk Critics Doxed Its Own Users Instead
- 13:32 : Embracing the AI Revolution: How to Incorporate Generative AI into Your SOC 2 Compliance Plan
- 12:32 : Inside the Nuclear Bunkers, Mines, and Mountains Being Retrofitted as Data Centers
- 12:32 : Researchers Expose Phishing Threats Distributing CountLoader and PureRAT
- 12:32 : China-Linked PlugX and Bookworm Malware Attacks Target Asian Telecom and ASEAN Networks
- 12:2 : Hackers use Weaponized Microsoft Teams Installer to Compromise Systems With Oyster Malware
- 11:32 : Hunt for RedNovember: Beijing hacked critical orgs in year-long snooping campaign
- 11:2 : Hackers Use Fake Invoices to Spread XWorm RAT via Office Files
- 11:2 : New Botnet Loader-as-a-Service Exploiting Routers and IoT Devices to Deploy Mirai Payloads
- 11:2 : Malware Operators Collaborate With Covert North Korean IT Workers to Attack Corporate Organizations
- 11:2 : Apache Airflow Vulnerability Exposes Sensitive Details to Read-Only Users
- 10:2 : Threat Actors Exploiting SonicWall Firewalls to Deploy Akira Ransomware Using Malicious Logins
- 9:32 : Complete Guide to Understanding Risk-Based Authentication
- 9:2 : LummaStealer Technical Details Uncovered Using ML-Based Detection Approach
- 9:2 : Researchers Uncovered Connections Between LAPSUS$, Scattered Spider, and ShinyHunters Hacker Groups
- 9:2 : Alibaba unveils $53B global AI plan – but it will need GPUs to back it up
- 7:32 : 17-year-old Hacker Responsible for Vegas Casinos Hack has Been Released
- 6:2 : The Complex Landscape of AI and Cybersecurity
- 5:2 : Are Your Secrets Management Practices Up to Par?
- 5:2 : Staying Ahead of Cyber Threats with Proactive NHIs
- 4:2 : Researcher Finds Entra ID Weakness That Could Have Granted Global Admin Access
- 0:32 : USENIX 2025: Using Privacy Infrastructure To Kickstart AI Governance: NIST AI Risk Management Case Studies
- 23:32 : Week in Review: Jaguar Land Rover attack, indirect prompt injections, card farms in NYC
- 22:32 : New tool: convert-ts-bash-history.py, (Fri, Sep 26th)