210 posts were published in the last hour
- 22:55 : IT Security News Daily Summary 2025-12-28
- 21:31 : NDSS 2025 – Automated Data Protection For Embedded Systems Via Data Flow Based Compartmentalization
- 20:5 : IT Security News Hourly Summary 2025-12-28 21h : 1 posts
- 20:2 : Condé Nast faces major data breach: 2.3M WIRED records leaked, 40M more at risk
- 18:32 : Amazon Says It Has Disrupted GRU-Linked Cyber Operations Targeting Cloud Customers
- 17:5 : IT Security News Hourly Summary 2025-12-28 18h : 1 posts
- 16:31 : MongoBleed (CVE-2025-14847) Now Exploited in the Wild: MongoDB Servers at Critical Risk
- 16:2 : Hypervisor Ransomware Attacks Surge as Threat Actors Shift Focus to Virtual Infrastructure
- 15:2 : Death, torture, and amputation: How cybercrime shook the world in 2025
- 14:31 : The Top 26 Security Predictions for 2026 (Part 2)
- 14:5 : IT Security News Hourly Summary 2025-12-28 15h : 3 posts
- 14:2 : UK Report Finds Rising Reliance on AI for Emotional Wellbeing
- 14:2 : Microsoft Users Warned as Hackers Use Typosquatting to Steal Login Credentials
- 14:2 : Cellik Android Spyware Exploits Play Store Trust to Steal Data
- 13:2 : Stolen LastPass backups enable crypto theft through 2025
- 12:2 : SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 77
- 11:5 : IT Security News Hourly Summary 2025-12-28 12h : 1 posts
- 11:2 : When Risk Is Fragmented, Strategy Suffers
- 10:2 : Security Affairs newsletter Round 556 by Pierluigi Paganini – INTERNATIONAL EDITION
- 10:2 : Ubisoft Rainbow Six Siege Servers Breach linked to MongoBleed Vulnerability
- 9:31 : Week in review: WatchGuard Firebox firewalls attacked, infosec enthusiasts targeted with fake PoCs
- 5:31 : A Hacker Tells His Story
- 5:5 : IT Security News Hourly Summary 2025-12-28 06h : 1 posts
- 4:31 : 87,000+ MongoDB Instances Vulnerable to MongoBleed Flaw Exposed Online – PoC Exploit Released
- 3:2 : WIRED – 2,364,431 breached accounts
- 2:5 : IT Security News Hourly Summary 2025-12-28 03h : 1 posts
- 2:2 : ISC Stormcast For Sunday, December 28th, 2025 https://isc.sans.edu/podcastdetail/9750, (Sun, Dec 28th)
- 23:32 : How impenetrable are secrets vaulting solutions
- 23:31 : Are current PAM solutions capable of handling NHIs
- 23:31 : What does a free to implement AI compliance strategy look like
- 23:5 : IT Security News Hourly Summary 2025-12-28 00h : 1 posts
- 22:55 : IT Security News Daily Summary 2025-12-27
- 20:5 : IT Security News Hourly Summary 2025-12-27 21h : 1 posts
- 19:31 : Meet the team that investigates when journalists and activists get hacked with government spyware
- 19:2 : LangChain core vulnerability allows prompt injection and data exposure
- 18:31 : Hacker Leaks 2.3M Wired.com Records, Claims 40M-User Condé Nast Breach
- 18:2 : Hackers Compromise Trust Wallet Chrome Extension, Users Claim Millions Stolen
- 18:2 : NDSS 2025 – CounterSEVeillance: Performance-Counter Attacks On AMD SEV-SNP
- 18:2 : FCC Tightens Rules on Foreign-Made Drones to Address U.S. Security Risks
- 15:2 : 700Credit Data Breach Exposes Personal Information of Over 5.6 Million Consumers
- 14:5 : IT Security News Hourly Summary 2025-12-27 15h : 4 posts
- 14:2 : What “Verified Identity Data” Means for APIs — and How to Evaluate a Data Partner
- 13:32 : GhostPairing Attack Puts Millions of WhatsApp Users at Risk
- 13:31 : Askul Confirms RansomHouse Ransomware Breach Exposed 740,000 Records
- 13:31 : Inside the Hidden Market Where Your ChatGPT and Gemini Chats Are Sold for Profit
- 13:2 : Mongobleed PoC Exploit Tool Released for MongoDB Flaw that Exposes Sensitive Data
- 10:2 : The US Must Stop Underestimating Drone Warfare
- 10:2 : NPM package with 56,000 downloads compromises WhatsApp accounts
- 8:31 : New MongoDB Flaw Lets Unauthenticated Attackers Read Uninitialized Memory
- 8:31 : Why Windows File Copy Struggles With Large Files, and What Works Better
- 5:32 : TeamViewer DEX Vulnerabilities Let Attackers Trigger DoS Attack and Expose Sensitive Data
- 3:31 : M-Files Vulnerability Let Attacker Capture Session Tokens of Other Active Users
- 2:31 : Friday Squid Blogging: Squid Camouflage
- 23:5 : IT Security News Hourly Summary 2025-12-27 00h : 2 posts
- 22:56 : IT Security News Daily Summary 2025-12-26
- 22:31 : Everest Ransomware Group Claims Theft of Over 1TB of Chrysler Data
- 21:31 : Romania’s Water Authority Targeted in Ransomware Attack
- 20:32 : NDSS 2025 – SCRUTINIZER: Towards Secure Forensics On Compromised TrustZone
- 20:31 : Randall Munroe’s XKCD ‘Bridge Clearance’
- 20:31 : NDSS 2025 – A Formal Approach To Multi-Layered Privileges For Enclaves
- 20:5 : IT Security News Hourly Summary 2025-12-26 21h : 2 posts
- 20:2 : Trust Wallet warns users to update Chrome extension after $7M security loss
- 19:31 : 500+ Cybercrime Arrests in INTERPOL’s Operation Sentinel
- 18:31 : Shift-Left Strategies for Cloud-Native and Serverless Architectures
- 18:2 : Google Introduces Option to Change @gmail.com Email Addresses
- 18:2 : 59K Servers Hacked in 48 Hours: Inside Operation PCPcat
- 18:2 : Pro-Russian group Noname057 claims cyberattack on La Poste services
- 18:2 : Webrat Malware Targets Students and Junior Security Researchers Through Fake Exploits
- 18:2 : Telegram-Based Crypto Scam Networks Are Now Larger Than Any Dark Web Market in History
- 18:2 : Google and Apple Deploy Rapid Security Fixes Following Zero-Day Attacks
- 18:2 : NIST and MITRE Launch $20 Million AI Research Centers to Protect U.S. Manufacturing and Critical Infrastructure
- 17:31 : From AI to analog, cybersecurity tabletop exercises look a little different this year
- 17:5 : IT Security News Hourly Summary 2025-12-26 18h : 1 posts
- 16:31 : Trust Wallet Chrome Extension Breach Caused $7 Million Crypto Loss via Malicious Code
- 16:2 : This strange magnetism could power tomorrow’s AI
- 16:2 : This tiny chip could change the future of quantum computing
- 15:32 : The State of SAP Security: How to Defend Your Organization from Surging ERP Application Attacks
- 15:32 : From video games to cyber defense: If you don’t think like a hacker, you won’t win
- 15:32 : Best of 2025: Survey: Nearly Half of Data Breaches Involved Third-Party Remote Access
- 15:32 : China-Linked Evasive Panda Ran DNS Poisoning Campaign to Deliver MgBot Malware
- 15:31 : Cyber Briefing: 2025.12.26
- 15:2 : Popular NPM Package lotusbail Exposed as Trojan Stealing WhatsApp Chats
- 15:2 : Aflac confirms June data breach affecting over 22 million customers
- 14:32 : The Architect’s Guide to Logging
- 14:31 : WordPress Vulnerability Scanner Reveals How Exposed Your Website Really Is
- 14:31 : Best of 2025: Oracle Hack: From ‘Deny-Deny-Deny’ to ‘Oops-Oops-Oops’
- 14:5 : IT Security News Hourly Summary 2025-12-26 15h : 7 posts
- 14:2 : These are the cybersecurity stories we were jealous of in 2025
- 14:2 : PayPal Subscriptions Exploited in Sophisticated Email Scam
- 13:32 : Malicious Npm Package Steals Whatsapp
- 13:32 : Romanian Water Agency Ransomware Hit
- 13:31 : Court Clears Former Vastaamo CEO
- 13:31 : Man Charged In Fraudulent Id Market
- 13:31 : Interpol Action Breaks Ransomware
- 13:2 : TrustWallet Chrome Extension Hacked – Users Reporting Millions in Losses
- 12:32 : IoT Hack
- 11:5 : IT Security News Hourly Summary 2025-12-26 12h : 1 posts
- 11:2 : Spotify cracks down on unlawful scraping of 86 million songs
- 10:2 : Critical LangChain Core Vulnerability Exposes Secrets via Serialization Injection
- 8:31 : Top Data Breaches in 2025 [Month-wise]
- 8:31 : Fortinet VPN exploit, Google gmail change, Aflac breach update
- 7:2 : Were the records of 200 million Pornhub users stolen by hackers?
- 7:2 : Post-Quantum Cryptographic Algorithm Integration with Model Context Protocol.
- 6:31 : Privacy-Preserving Biometric Verification with Handwritten Inputs
- 6:31 : LLMs can assist with vulnerability scoring, but context still matters
- 6:3 : Critical LangChain Vulnerability Allows Attackers to Steal Sensitive Secrets
- 6:3 : Parrot 7.0 Released with New Penetration Testing and AI Tools
- 6:3 : From AI to cyber risk, why IT leaders are anxious heading into 2026
- 5:31 : The next big IT security battle is all about privileged access
- 5:31 : The Ransomware Ecosystem: An Encore Holiday Episode
- 5:5 : IT Security News Hourly Summary 2025-12-26 06h : 1 posts
- 5:2 : Utair – 401,400 breached accounts
- 4:2 : Critical Langchain Vulnerability Let attackers Exfiltrate Sensitive Secrets from AI systems
- 2:5 : IT Security News Hourly Summary 2025-12-26 03h : 5 posts
- 2:2 : Are IT managers truly satisfied with current AI security measures
- 2:2 : What makes a business free to choose the best AI security
- 2:2 : How do secrets management tools deliver value to organizations
- 2:2 : Can Agentic AI operate independently within secure parameters
- 2:2 : What Makes a Successful GRC Team? Roles, Skills, & Structure
- 23:5 : IT Security News Hourly Summary 2025-12-26 00h : 1 posts
- 22:55 : IT Security News Daily Summary 2025-12-25
- 20:5 : IT Security News Hourly Summary 2025-12-25 21h : 1 posts
- 20:2 : Five-year-old Fortinet FortiOS SSL VPN vulnerability actively exploited
- 18:31 : Google Now Allows Users to Change Their @gmail.com Email Address
- 18:2 : Unpatched FortiGate Security Flaw Allows Attackers to Bypass 2FA Controls
- 17:5 : IT Security News Hourly Summary 2025-12-25 18h : 1 posts
- 17:2 : Shinhan Card Faces Regulatory Review Over Internal Data Sharing Incident
- 16:2 : US Justice Department Seizes Web Domain Linked to Large-Scale Bank Account Takeover Fraud
- 15:31 : Best of 2025: New Akira Ransomware Decryptor Leans on Nvidia GPU Power
- 15:31 : Cookies Explained: Accept or Reject for Online Privacy
- 15:2 : ThreatsDay Bulletin: Stealth Loaders, AI Chatbot Flaws AI Exploits, Docker Hack, and 15 More Stories
- 14:31 : Best of 2025: UNC6395 and the Salesloft Drift Attack: Why Salesforce OAuth Integrations are a Growing Risk
- 14:5 : IT Security News Hourly Summary 2025-12-25 15h : 2 posts
- 14:2 : 100+ Cybersecurity Predictions 2026 for Industry Experts as the AI Adapted in the Wild
- 14:2 : Jaguar Land Rover Confirms Employee Data Theft After August 2025 Cyberattack
- 13:2 : The Complete Developer’s Guide to Essential Hackathon Software: 10 Categories That Separate Winners from Participants
- 13:2 : LastPass 2022 Breach Led to Years-Long Cryptocurrency Thefts, TRM Labs Finds
- 12:2 : Net-SNMP Vulnerability Enables Buffer Overflow and the Daemon to Crash
- 11:5 : IT Security News Hourly Summary 2025-12-25 12h : 1 posts
- 11:2 : High-severity MongoDB flaw CVE-2025-14847 could lead to server takeover
- 10:2 : Threat landscape for industrial automation systems in Q3 2025
- 9:31 : TSA Cautions Travelers on Public Wi-Fi Security Threats
- 9:2 : CISA Flags Actively Exploited Digiever NVR Vulnerability Allowing Remote Code Execution
- 9:2 : Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability
- 8:31 : Scams target MENA region, pen testers accused of blackmail, DDoS protection faces fresh challenges
- 6:31 : Hackers Exploiting Three-Year-Old FortiGate Vulnerability to Bypass 2FA on Firewalls
- 5:31 : Quantum-resistant key management for AI model deployments.
- 5:5 : IT Security News Hourly Summary 2025-12-25 06h : 2 posts
- 5:2 : Product Security Advisory and Analysis: Observed Abuse of FG-IR-19-283
- 4:31 : Microsoft Unveils Hardware-Accelerated BitLocker to Enhance Performance and Security
- 4:2 : Are the high costs of AI security tools justified
- 4:2 : Can advanced IAM solutions reassure companies on NHI security
- 4:2 : How powerful are new age AI-driven cybersecurity tools
- 3:31 : Baker University Data Breach Hits 53,000
- 1:2 : 2025 – Excelling at the Edge of Burnout
- 23:5 : IT Security News Hourly Summary 2025-12-25 00h : 1 posts
- 22:55 : IT Security News Daily Summary 2025-12-24
- 19:2 : Penetration Testing Strategy: How to Make Your Tests Practical, Repeatable, and Risk-Reducing
- 19:2 : FBI seized ‘web3adspanels.org’ hosting stolen logins
- 19:2 : NDSS 2025 – LAMP: Lightweight Approaches For Latency Minimization In Mixnets With Practical Deployment Considerations
- 19:2 : Randall Munroe’s XKCD ‘Satellite Imagery’
- 18:31 : Pen testers accused of ‘blackmail’ after reporting Eurostar chatbot flaws
- 18:31 : U.S. Authorities Shut Down Online Network Selling Fake Identity Templates
- 18:2 : M-Files Vulnerability Allows Attackers to Steal Active User Session Tokens
- 18:2 : Israeli Organizations Targeted by AV-Themed Malicious Word and PDF Files
- 18:2 : NVIDIA Isaac Vulnerabilities Enable Remote Code Execution Attacks
- 18:2 : Microsoft Enhances BitLocker with Hardware Acceleration Support
- 18:2 : Evasive Panda APT: Malware Delivery via AitM and DNS Poisoning
- 17:31 : New MacSync macOS Stealer Uses Signed App to Bypass Apple Gatekeeper
- 17:5 : IT Security News Hourly Summary 2025-12-24 18h : 2 posts
- 17:2 : U.S. Federal Communications Commission (FCC) bans foreign-made drones over national security concerns
- 16:31 : SEC Charges Crypto Firms in $14m Investment Scam
- 16:3 : FBI Discovers 630 Million Stolen Passwords in Major Cybercrime Investigation
- 16:3 : Security Flaw Exposes Personal Data on Somalia’s E-Visa System Weeks After Major Breach
- 15:32 : US shuts down phisherfolk’s $14.6M password-hoarding platform
- 15:32 : Coordinated Scams Target MENA Region With Fake Online Job Ads
- 15:32 : North Korean Hackers Steal 2B Crypto
- 15:32 : Android Malware Combines Droppers SMS RAT
- 15:32 : Iranian Infy APT Returns With New Malware
- 15:31 : Nigerian National Convicted Of Fraud
- 15:31 : Cyber Briefing: 2025.12.24
- 15:2 : Pro-Russian Hackers Claim Cyberattack on French Postal Service
- 14:32 : Best of 2025: LDAPNightmare: SafeBreach Labs Publishes First Proof-of-Concept Exploit for CVE-2024-49112
- 14:31 : Best of 2025: Ukraine Pwns Russian Drone Maker — Gaskar is ‘Paralyzed’
- 14:31 : Trend Micro Warns: ‘Vibe Crime’ Ushers in Agentic AI-Driven Cybercrime Era
- 14:5 : IT Security News Hourly Summary 2025-12-24 15h : 5 posts
- 14:2 : Italian regulator rules Apple’s ATT feature limits competition
- 14:2 : Evasive Panda APT Using AitM Attack and DNS Poisoning to Deliver Malware
- 14:2 : Nomani Investment Scam Surges 62% Using AI Deepfake Ads on Social Media
- 13:31 : Threat Actors Using Weaponized AV-themed Word and PDF Documents to Attack Israeli Organizations
- 13:31 : Russian Hackers Obtain Sensitive NHS Documents from UK Royal Properties
- 13:3 : Merry Christmas, Readers Of Silicon UK
- 12:31 : Urban VPN Proxy Surreptitiously Intercepts AI Chats
- 12:31 : Threat Actors Advertised NtKiller Malware on Dark Web Claiming Terminate Antivirus and EDR Bypass
- 12:2 : Why Mobile-First SaaS Needs Passwordless Authentication for Field Teams
- 12:2 : How to Detect Insider Threats Before They Damage Your Business
- 12:2 : Attacks are Evolving: 3 Ways to Protect Your Business in 2026
- 11:31 : Eurostar Accused Researchers of Blackmail for Reporting AI Chatbot Flaws
- 11:31 : The Age of the All-Access AI Agent Is Here
- 11:5 : IT Security News Hourly Summary 2025-12-24 12h : 4 posts
- 11:2 : La Poste outage after a cyber attack disrupts digital banking and online services
- 11:2 : Cyber Experts Warn of Increased Consumer Scams This Festive Season
- 11:2 : NIST, MITRE Partner on $20m AI Centers For Manufacturing and Cybersecurity
- 10:32 : ServiceNow to Pay $7.8bn For OT Security Specialist Armis
- 10:2 : One Year Of Zero-Click Exploits: What 2025 Taught Us About Modern Malware
- 10:2 : Critical MongoDB Vulnerability Exposes Sensitive Data via Zlib Compression
- 10:2 : SEC Files Charges Over $14 Million Crypto Scam Using Fake AI-Themed Investment Tips
- 10:2 : Consumer Cyber Risks in 2026 Focus on AI-Driven Scams, Not Hacks
- 9:31 : ServiceNow to acquire Armis for $7.75 billion
- 9:31 : La Poste Still Offline After Major DDoS Attack