108 posts were published in the last hour
- 22:31 : 2025-12-29: ClickFix activity leads to NetSupport RAT
- 22:2 : Romania’s Oltenia Energy Complex suffers major ransomware attack
- 22:2 : The Department of Know: year in review and predictions
- 21:31 : Indian cops cuff ex-Coinbase rep over selling customer info to crims
- 21:2 : Aflac Data Breach Exposes 22M People in Major Cyber Breach
- 21:2 : CISA Adds One Known Exploited Vulnerability to Catalog
- 21:2 : NDSS 2025 – Rondo: Scalable And Reconfiguration-Friendly Randomness Beacon
- 20:32 : New Google-Themed Phishing Wave Hits Over 3,000 Global Organisations
- 20:32 : Top web app security vulnerabilities and how to mitigate them
- 20:32 : Happy 16th Birthday, KrebsOnSecurity.com!
- 20:31 : New Phishing Kit with AI-assisted Development Attacking Microsoft Users to Steal Logins
- 20:31 : Silver Fox Hackers Attacking Indian Entities with Income Tax Phishing Lures
- 20:5 : IT Security News Hourly Summary 2025-12-29 21h : 6 posts
- 20:2 : How to Spot the Most Common Crypto Phishing Scams
- 20:2 : Coupang to Pay $1.1 Billion in Compensation to Users After Data Breach
- 20:2 : OpenAI Hardens ChatGPT Atlas Against Prompt Injection Attacks
- 20:2 : Vulnerability Summary for the Week of December 22, 2025
- 19:31 : Ubisoft Shuts Down Rainbow Six Siege After MongoDB Exploit Hits Players
- 19:31 : Crims disconnect Wired subscribers from their privacy, publish deets online
- 19:2 : Google to Finally Let Users Change Their Gmail Address. Here’s How It Works
- 19:2 : TeamViewer DEX Bugs Enable DoS and Local Network Attacks
- 19:2 : Windows Event Logs Reveal the Messy Reality Behind ‘Sophisticated’ Cyberattacks
- 18:31 : Question on Open Source Tools
- 18:31 : Threat Actors Exploiting Critical ‘MongoBleed’ MongoDB Flaw
- 18:2 : NDSS 2025 – The Road To Trust: Building Enclaves Within Confidential VMs
- 17:32 : Silver Fox Hackers Target Indian Entities Using Income Tax Phishing Lures
- 17:32 : New Bluetooth Headphone Vulnerabilities Allow Hackers to Hijack Connected Smartphones
- 17:32 : Critical Zero-Day RCE Flaw in Networking Devices Exposes Over 70,000 Hosts
- 17:31 : Hackers Launch 2.5 Million+ Malicious Requests Targeting Adobe ColdFusion Servers
- 17:31 : Hacker Dumped MacBook in River in Attempt to Destroy Digital Evidence
- 17:31 : 87K MongoDB Instances Exposed by MongoBleed Vulnerability
- 17:5 : IT Security News Hourly Summary 2025-12-29 18h : 2 posts
- 16:31 : Why the Future Is Increasingly Pointing Toward Multi-Cloud Strategies
- 16:31 : 2.3M WIRED Subscriber Records Leaked in Condé Nast Data Breach
- 16:3 : Get a Lifetime of 1TB Cloud Storage for Only $50 with FolderFort
- 16:3 : Hacktivist Proxy Operations Emerge as a Repeatable Model of Geopolitical Cyber Pressure
- 16:3 : New Vulnerabilities in Bluetooth Headphones Let Hackers Hijack Connected Smartphone
- 16:3 : 2.5 Million+ Malicious Request From Hackers Attacking Adobe ColdFusion Servers
- 16:3 : Top US Accounting Firm Sax Discloses 2024 Data Breach Impacting 220,000
- 15:32 : 2026 Kubernetes Playbook: AI at Scale, Self‑Healing Clusters, & Growth
- 15:31 : Best of 2025: CVE-2025-1097, CVE-2025-1098, CVE-2025-1974, CVE-2025-24513, CVE-2025-24514: Frequently Asked Questions About IngressNightmare
- 15:31 : Cyber Briefing: 2025.12.29
- 15:3 : You’ve been targeted by government spyware. Now what?
- 15:2 : Korean Air discloses data breach after the hack of its catering and duty-free supplier
- 15:2 : Hacker Threw MacBook in River to Erase Evidence in Coupang Data Breach
- 15:2 : ⚡ Weekly Recap: MongoDB Attacks, Wallet Breaches, Android Spyware, Insider Crime & More
- 15:2 : Rainbow Six Siege Breach Gives Free Credits
- 15:2 : Pro Russian Hackers Claim French Post Attack
- 15:2 : LastPass 2022 Breach Tied To Crypto Thefts
- 15:2 : Italy Fines Apple Over App Store Rules
- 15:2 : Africa Cybercrime Operation Nets 574 Arrests
- 14:31 : Best of 2025: Indirect prompt injection attacks target common LLM data sources
- 14:31 : India Warns on ‘Silent Calls’ as Telecom Firms Roll Out Verified Caller Names to Curb Fraud
- 14:31 : Karnataka’s Cybercrime Losses Soar as Scam Recoveries Plunge
- 14:5 : IT Security News Hourly Summary 2025-12-29 15h : 3 posts
- 14:2 : Check Point Celebrates 2025 with Top Analyst and Research Lab Recognitions
- 14:2 : MongoBleed flaw actively exploited in attacks in the wild
- 14:2 : Swiss Startup Soverli Introduces a Sovereign OS Layer to Secure Smartphones Beyond Android and iOS
- 13:2 : Fortinet Warns of New Attacks Exploiting Old Vulnerability
- 13:2 : When One Vulnerability Breaks the Internet and Millions of Devices Join In
- 12:32 : Critical 0day flaw Exposes 70k XSpeeder Devices as Vendor Ignores Alert
- 12:32 : The Worst Hacks of 2025
- 12:32 : Coupang to Issue $1.17 Billion in Vouchers Over Data Breach
- 12:32 : Why Passwordless Authentication Matters for External Vendor and Partner Access
- 12:31 : Creating Hyperrealistic Deepfakes: The Challenges of Labeling
- 12:31 : Digital Intrusion at the Heart of UK Diplomacy Verified by Officials
- 12:2 : Malware in 2025 spread far beyond Windows PCs
- 12:2 : 22 Million Affected by Aflac Data Breach
- 11:31 : The New Surveillance State Is You
- 11:31 : Windows LPE Vulnerabilities via Kernel Drivers and Named Pipes Allows Privilege Escalation
- 11:31 : Infostealer Malware Delivered in EmEditor Supply Chain Attack
- 11:5 : IT Security News Hourly Summary 2025-12-29 12h : 1 posts
- 11:2 : The Most Dangerous People on the Internet in 2025
- 10:2 : The HoneyMyte APT evolves with a kernel-mode rootkit and a ToneShell backdoor
- 10:2 : Fresh MongoDB Vulnerability Exploited in Attacks
- 9:32 : Europe’s cloud challenge: Building an Airbus for the digital age
- 9:31 : Hacker Claims Theft of 40 Million Condé Nast Records After Wired Data Leak
- 9:31 : 2025 Predictions: Hits, Misses & What We Learned
- 9:2 : Evasive Panda cyberespionage campaign uses DNS poisoning to install MgBot backdoor
- 9:2 : MongoBleed Detector Tool Released to Detect MongoDB Vulnerability(CVE-2025-14847)
- 8:32 : OpenAI Hardened ChatGPT Atlas Against Prompt Injection Attacks
- 8:31 : A week in security (December 22 – December 28)
- 8:31 : Rainbow Six Siege breach, backup generators for AI, LastPass reverberations
- 8:5 : IT Security News Hourly Summary 2025-12-29 09h : 3 posts
- 8:2 : Thames Valley Police Begin Facial Recognition Deployment
- 8:2 : Traditional Security Frameworks Leave Organizations Exposed to AI-Specific Attack Vectors
- 8:2 : MongoDB Vulnerability CVE-2025-14847 Under Active Exploitation Worldwide
- 7:2 : LLMs are automating the human part of romance scams
- 6:31 : Security chaos engineering matters when nothing is broken
- 6:31 : Superagent: Open-source framework for guardrails around agentic AI
- 6:2 : Automation forces a reset in security strategy
- 5:32 : MongoBleed Detector Launched to Identify Critical MongoDB Flaw (CVE-2025-14847)
- 5:31 : Hacktivist Proxies and the Normalization of Cyber Pressure Campaigns
- 5:31 : MongoDB – MongoBleed Vulnerability Exploit Reported On Christmas Day
- 5:5 : IT Security News Hourly Summary 2025-12-29 06h : 2 posts
- 5:2 : CISOs are managing risk in survival mode
- 4:31 : Accused data thief threw MacBook into a river to destroy evidence
- 4:3 : Hackers Claim Breach of WIRED Database Containing 2.3 million Subscriber Records
- 2:31 : Sauron, the high-end home security startup for “super premium” customers, plucks a new CEO out of Sonos
- 2:5 : IT Security News Hourly Summary 2025-12-29 03h : 1 posts
- 2:2 : What are Auth Tokens? Complete Guide to Token-Based Authentication & Implementation
- 23:31 : How can businesses trust AI to handle sensitive data
- 23:31 : Can AI-driven cloud security assure full data protection
- 23:31 : What support is available for implementing Agentic AI systems
- 23:31 : Is the security for Non-Human Identities getting better
- 23:5 : IT Security News Hourly Summary 2025-12-29 00h : 2 posts
- 22:58 : IT Security News Weekly Summary 52
- 22:55 : IT Security News Daily Summary 2025-12-28