97 posts were published in the last hour
- 21:31 : New ‘GhostPairing’ Technique Enables Undetected WhatsApp Access
- 21:2 : EmEditor Website Breach Turns Trusted Installer Into Infostealer Malware
- 21:2 : Coupang announces $1.17B compensation plan for 33.7M data breach victims
- 21:2 : Palo Alto Networks Allies with Google to Secure AI
- 20:5 : IT Security News Hourly Summary 2025-12-30 21h : 4 posts
- 19:32 : An early end to the holidays: ‘Heartbleed of MongoDB’ is now under active exploit
- 19:31 : Bluetooth Headphones Can Be Weaponized to Hack Phones
- 19:31 : Hackers Advertised VOID ‘AV Killer’ with Kernel-level Termination Claims
- 19:31 : Massive Magecart with 50+ Malicious Scripts Hijacking Checkout and Account Creation Flows
- 19:2 : Widely Used Malicious Extensions Steal ChatGPT, DeepSeek Conversations
- 18:31 : ESET Warns AI-driven Malware Attack and Rapidly Growing Ransomware Economy
- 18:2 : Copilot Studio Feature Enables Silent AI Backdoors
- 18:2 : CISA Releases Two Industrial Control Systems Advisories
- 18:2 : Hackers Infiltrated Maven Central Masquerading as a Legitimate Jackson JSON Library
- 18:2 : European Space Agency Confirms Breach of Servers Outside the Corporate Network
- 18:2 : New Spear-Phishing Attack Targeting Security Individuals in Israel Region
- 17:32 : New Spear-Phishing Attack Targeting Security Individuals in the Israel Region
- 17:32 : Critical IBM API Connect Flaw Allows Attackers to Bypass Authentication
- 17:32 : ESET Flags Rising Threat of AI-Driven Malware and Ransomware
- 17:32 : Hackers Promote “VOID” AV Killer Claiming Kernel-Level Defense Evasion
- 17:32 : Magecart Campaign Deploys 50+ Malicious Scripts to Hijack E-Commerce Transactions
- 17:32 : WHILL Model C2 Electric Wheelchairs and Model F Power Chairs
- 17:32 : NDSS 2025 – Distributed Function Secret Sharing And Applications
- 17:31 : Korean Air Confirms Employee Data Leak Linked to Third-Party Breach
- 17:31 : CSA Issues Alert on Critical SmarterMail Bug Allowing Remote Code Execution
- 17:5 : IT Security News Hourly Summary 2025-12-30 18h : 2 posts
- 16:32 : 2.5M Malicious Requests Hit Adobe ColdFusion and Others in Holiday Attack
- 16:31 : Azure Fundamentals Study Notes: Your Ultimate Guide to AZ-900
- 16:2 : Mustang Panda deploys ToneShell via signed kernel-mode rootkit driver
- 16:2 : Chinese Hackers Use Rootkit to Hide ToneShell Malware Activity
- 16:2 : Interview QnA: Blockchain for Cybersecurity
- 15:32 : HoneyMyte (aka Mustang Panda) Deploys ToneShell Backdoor in New Attacks
- 15:32 : Best of 2025: How Secure Are Your Machine Identities in the Cloud?
- 15:32 : SQL Study Notes Part I: Foundations of Structured Query Language
- 15:32 : Cyber Briefing: 2025.12.30
- 15:2 : Trend Micro’s Pivotal Role in INTERPOL’s Operation Sentinel: Dismantling Digital Extortion Networks Across Africa
- 15:2 : Get Executives on board with managing Cyber Risk
- 15:2 : Zero-Day RCE Exposes 70,000+ XSpeeder Devices Worldwide
- 15:2 : A Year of Unprecedented Cybersecurity Incidents Redefined Global Risk in 2025
- 15:2 : SOC Analyst Study Notes Part IV: Malware Analysis and Reverse Engineering
- 14:32 : Edge Security Is Not Enough: Why Agentic AI Moves the Risk Inside Your APIs
- 14:32 : Best of 2025: Oracle Breach: The Impact is Bigger Than You Think | Grip
- 14:32 : Aflac Data Breach Impacts Millions
- 14:32 : Korean Air Data Hit In Oracle Hack
- 14:32 : Coupang To Issue Vouchers After Breach
- 14:31 : Hacker Arrested In KMSAuto Malware Case
- 14:31 : Fake Bank Sites Linked To 28 Million Fraud
- 14:5 : IT Security News Hourly Summary 2025-12-30 15h : 5 posts
- 14:2 : Cyber Resilience Starts with Training: Why Skills Define Security Success
- 14:2 : SOC Analyst Study Notes Part II: Insider Threats
- 13:32 : Tenant Isolation in Multi-Tenant Systems: Architecture, Identity, and Security
- 13:31 : Ex-Cybersecurity Pros Plead Guilty in $9.5M Ransomware Spree
- 13:31 : SOC Analyst Study Notes 2025: A Structured Guide to Security Operations
- 13:2 : CISA Warns of MongoDB Server Vulnerability(CVE-2025-14847) Exploited in Attacks
- 13:2 : Critical Vulnerability in SmarterMail Let Attackers Execute Remote Code
- 13:2 : Lessons Learned from Top 10 Ransomware Incidents in 2025
- 12:32 : This month in security with Tony Anscombe – December 2025 edition
- 12:32 : Using AI-Generated Images to Get Refunds
- 12:31 : 8 Cybersecurity Acquisitions Surpassed $1 Billion Mark in 2025
- 12:3 : EmEditor Homepage Download Button Served Malware for 4 Days
- 12:3 : Lithuanian suspect arrested over KMSAuto malware that infected 2.8M systems
- 11:31 : Silver Fox Targets Indian Users With Tax-Themed Emails Delivering ValleyRAT Malware
- 11:5 : IT Security News Hourly Summary 2025-12-30 12h : 8 posts
- 11:2 : 2025 exposed the risks we ignored while rushing AI
- 11:2 : How to Integrate AI into Modern SOC Workflows
- 10:32 : Hackers Exploit Copilot Studio’s New Connected Agents Feature to Gain Backdoor Access
- 10:32 : Critical 0-Day RCE Vulnerability in Networking Devices Exposes 70,000+ Hosts
- 10:32 : 70,000+ MongoDB Servers Vulnerable to MongoBleed Exploit – PoC Released
- 10:32 : Chinese APT Mustang Panda Caught Using Kernel-Mode Rootkit
- 10:31 : Evasive Panda Uses DNS Poisoning to Deploy MgBot Backdoor in Long-Running Espionage Campaign
- 10:31 : Grubhub Branding Misused to Promote Exponential Crypto Returns
- 9:2 : U.S. CISA adds a flaw in MongoDB Server to its Known Exploited Vulnerabilities catalog
- 9:2 : EmEditor Editor Website Hacked to Deliver Infostealer Malware in Supply Chain Attack
- 9:2 : Korean Air Data Compromised in Oracle EBS Hack
- 9:2 : Mustang Panda Uses Signed Kernel-Mode Rootkit to Load TONESHELL Backdoor
- 8:31 : Coupang recovers laptop in river, Trust Wallet reports 2k+ wallets drained, Sax discloses 2024 data breach
- 8:5 : IT Security News Hourly Summary 2025-12-30 09h : 5 posts
- 8:2 : Waymo Taxis Halt In Streets During San Francisco Power Outage
- 8:2 : Post-Quantum Secure Federated Learning for decentralized MCP training.
- 8:2 : Top Sectors Under Cyberattack in 2025
- 7:31 : Will hackers release all of Spotify’s most listened music files?
- 7:31 : Radio signals could give attackers a foothold inside air-gapped devices
- 7:2 : Product showcase: RoboForm password manager for iOS
- 6:31 : Executives say cybersecurity has outgrown the IT department
- 6:2 : Non-human identities push identity security into uncharted territory
- 5:31 : 70,000+ MongoDB Servers Exposed After MongoBleed PoC Released
- 5:31 : EmEditor Website Breach Used to Spread Infostealer Malware
- 5:31 : Security teams debate how much to trust AI
- 5:5 : IT Security News Hourly Summary 2025-12-30 06h : 5 posts
- 5:2 : How scalable is Secrets Management for large enterprises
- 5:2 : What measures protect NHIs in high risk environments
- 5:2 : How secure are Agentic AI systems in handling sensitive data
- 5:2 : Can I feel confident in the security of machine identities
- 5:2 : Facebook Tests Paid Access for Sharing Multiple Links
- 4:2 : Korean telco failed at femtocell security, exposed customers to snooping and fraud
- 23:5 : IT Security News Hourly Summary 2025-12-30 00h : 2 posts
- 22:55 : IT Security News Daily Summary 2025-12-29