80 posts were published in the last hour
- 21:2 : Security Professionals Plead Guilty in ALPHV Ransomware Case
- 20:31 : Bitfinex crypto thief who was serving five years thanks Trump for early release
- 20:5 : IT Security News Hourly Summary 2026-01-02 21h : 3 posts
- 20:2 : China’s New Cybersecurity Law Demands Faster Incident Reporting From Companies
- 19:31 : APT36 Uses Malicious Windows Shortcuts to Target Indian Government
- 19:31 : IBM Issues Critical Alert Over Authentication Bypass Flaw in API Connect Platform
- 19:2 : Tokyo FM Data Breach: Hacker Claims Over 3 Million Records Stolen
- 19:2 : Cybercrook claims to be selling infrastructure info about three major US utilities
- 18:31 : DarkSpectre Malware Hit 8.8M Browsers via Malicious Extensions
- 18:2 : 5 Challenges and Solutions in Mobile App Testing
- 17:5 : IT Security News Hourly Summary 2026-01-02 18h : 4 posts
- 17:2 : Critical Flaw Puts WHILL Electric Wheelchairs at Risk of Hijacking
- 16:32 : Hacker Claims 200GB Data Theft From European Space Agency — Here’s What We Know
- 16:31 : Brit lands invite-only Aussie visa after uncovering vuln in government systems
- 16:31 : Why Lightweight Browsers Are the Key to Faster, More Focused Web Productivity
- 16:2 : Debugging DNS response times with tshark, (Fri, Jan 2nd)
- 16:2 : Covenant Health data breach after ransomware attack impacted over 478,000 people
- 15:32 : Best of 2025: Huge Food Wholesaler Paralyzed by Hack — is it Scattered Spider Again?
- 15:32 : South Africa Warns of Cybercrime Surge Amid Festive Season
- 15:31 : Cyber Briefing: 2026.01.02
- 15:2 : TriZetto Data Breach Triggers Class-Action Lawsuits Against Cognizant
- 15:2 : Hackers Abusing Google Tasks Notification for Sophisticated Phishing Attack
- 15:2 : Handala Hackers Targeted Israeli Officials by Compromising Telegram Accounts
- 15:2 : 10,000+ Fortinet Firewalls Still Exposed to 5-year Old MFA Bypass Vulnerability
- 14:32 : 5 UC and collaboration trends reshaping the market in 2026
- 14:32 : The Kimwolf Botnet is Stalking Your Local Network
- 14:32 : Best of 2025: NIST Launches Updated Incident Response Guide
- 14:32 : Antivirus vs Identity Protection Software: What to Choose and How?
- 14:32 : Amazon Links Five-Year Cloud Cyber Campaign to Russia’s Sandworm Group
- 14:5 : IT Security News Hourly Summary 2026-01-02 15h : 8 posts
- 14:2 : RondoDoX Botnet Abuses React2Shell Vulnerability for Malware Deployment
- 14:2 : Cognizant Faces Multiple US Class-Action Lawsuits After TriZetto Data Breach
- 14:2 : Hacker Group Claims Responsibility for Alleged Tokyo FM Broadcasting Breach
- 14:2 : Google Tasks Feature Exploited in New Sophisticated Phishing Campaign
- 14:2 : Handala Hackers Breach Telegram Accounts Linked to Israeli Officials
- 14:2 : Transparent Tribe Launches New RAT Attacks Against Indian Government and Academia
- 13:31 : Potential Wallet Phishing Campaign Targets Cardano Users via ‘Eternl Desktop’ Announcement
- 13:31 : RondoDoX Botnet Weaponizing a Critical React2Shell Vulnerability to Deploy Malware
- 13:2 : Phishing campaign abuses Google Cloud Application to impersonate legitimate Google emails
- 12:31 : Flock Exposes Its AI-Enabled Surveillance Cameras
- 12:31 : LockBit takedown architect gets New Year award from King Charles
- 12:31 : Two US Cybersecurity Pros Plead Guilty Over Ransomware Attacks
- 12:31 : The ROI Problem in Attack Surface Management
- 12:2 : CISA Warns of WHILL Model C2 Wheelchairs Vulnerability Let Attackers Take Control of Product
- 12:2 : Cognizant Hit With Multiple US Class-Action Lawsuits Following TriZetto Data Breach
- 12:2 : Threat Actors Testing Modified and Highly Obfuscated Version of Shai Hulud Strain
- 12:2 : Goldman Sachs Clients Data May Be Exposed
- 12:2 : Thousands Of Medical Records Found
- 12:2 : ServiceNow To Buy Cyber Firm Armis
- 12:2 : Treasury Lifts Sanctions On Intellexa Execs
- 12:2 : Georgia Arrests Ex Spy Chief Over Scam Aid
- 11:32 : VVS Discord Stealer Using Pyarmor for Obfuscation and Detection Evasion
- 11:31 : How Protesters Became Content for the Cops
- 11:31 : RondoDox Botnet Exploiting React2Shell Vulnerability
- 11:31 : New ErrTraffic Service Enables ClickFix
- 11:5 : IT Security News Hourly Summary 2026-01-02 12h : 7 posts
- 11:2 : IBM warns of critical API Connect bug enabling remote access
- 11:2 : How AI made scams more convincing in 2025
- 10:32 : Adobe ColdFusion Servers Targeted in Coordinated Campaign
- 10:31 : Covenant Health Data Breach Impacts 478,000 Individuals
- 10:31 : Email-first cybersecurity predictions for 2026
- 10:31 : India’s Spyware Policy Could Reshape Tech Governance Norms
- 10:31 : Cybercriminals Abuse Google Cloud Email Feature in Multi-Stage Phishing Campaign
- 9:31 : Careto Hacker Group is Back After 10 Years of Silence with New Attack Tactics
- 9:31 : Lessons From Mongobleed Vulnerability (CVE-2025-14847) That Actively Exploited In The Wild
- 8:31 : Apache NuttX Vulnerability Let Attackers to Crash Systems
- 8:31 : Cisco XDR in 30: Turning Security Signals Into Confident Action
- 8:31 : NYC Inauguration bans Flipper Zero, UK taxes crypto, Finland seizes ship
- 6:31 : How AutoSecT Helps Security Teams Handle 1000+ Endpoints Effortlessly?
- 6:31 : What shadow AI means for SaaS security and integrations
- 5:31 : Careto Hacker Group Resurfaces After a Decade, Unleashing New Attack Techniques
- 5:31 : Apache NuttX Flaw Allows Attackers to Crash Embedded Systems
- 5:31 : Hospitals are drowning in threats they can’t triage
- 5:31 : From experiment to production, AI settles into embedded software development
- 4:2 : NYC Inauguration Security Policy Draws Attention for Targeting Specific Tech Tools
- 1:2 : Post-Quantum Identity and Access Management for AI Agents
- 0:31 : Grab Bag
- 0:31 : Windows Defender Support Logs
- 23:5 : IT Security News Hourly Summary 2026-01-02 00h : 1 posts
- 22:55 : IT Security News Daily Summary 2026-01-01