156 posts were published in the last hour
- 22:31 : Russian BlueDelta (Fancy Bear) Uses PDFs to Steal Logins in Just 2 Seconds
- 22:31 : Why the Start of the Year Is Prime Time for Insider Risk
- 22:31 : FBI Agent’s Sworn Testimony Contradicts Claims ICE’s Jonathan Ross Made Under Oath
- 22:2 : Why DNS Resiliency Is Critical as Outages Surge
- 22:2 : U.S. CISA adds a flaw in Gogs to its Known Exploited Vulnerabilities catalog
- 21:31 : Received an Instagram password reset email? Here’s what you need to know
- 20:31 : Cybersecurity conferences to attend in 2026
- 20:5 : IT Security News Hourly Summary 2026-01-12 21h : 4 posts
- 20:2 : CISA Adds One Known Exploited Vulnerability to Catalog
- 19:31 : Attackers Probing Popular LLMs Looking for Access to APIs: Report
- 19:5 : BreachForums Data Breach Exposes Nearly 324,000 Users
- 19:5 : GoFundMe Ignores Own Rules by Hosting a Legal-Defense Fund for the ICE Agent Who Killed Renee Good
- 19:4 : Meta fixes Instagram password reset flaw, denies data breach
- 19:4 : Businesses in 2026: Maybe we should finally look into that AI security stuff
- 19:4 : Randall Munroe’s XKCD ‘Jumping Frog Radius’
- 18:32 : 5 Best Secure Container Images for Modern Applications (2026)
- 18:32 : Fintech firm Betterment confirms data breach after hackers send fake crypto scam notification to users
- 18:32 : Telegram Exposes Real Users IP Addresses, Bypassing Proxies on Android and iOS in 1-click
- 18:32 : Hackers Infiltrated n8n’s Community Node Ecosystem With a Weaponized npm Package
- 18:32 : The Benefits and Risks of Transitioning to Passwordless Solutions
- 18:32 : Account Takeover (ATO) Attacks Explained: Detection, Prevention & Mitigation
- 18:32 : n8n Supply Chain Attack Abuses Community Nodes to Steal OAuth Tokens
- 18:4 : AuraInspector: Auditing Salesforce Aura for Data Exposure
- 17:32 : Fake Employee Reports Spread Guloader and Remcos RAT Malware
- 17:32 : GoBruteforcer Botnet Targets Linux Servers with Brute-Force Attacks
- 17:31 : California Privacy Regulator Fines Datamasters for Selling Sensitive Consumer Data Without Registration
- 17:31 : Palo Alto Networks Introduces New Vibe Coding Security Governance Framework
- 17:31 : Critical vulnerability found in n8n workflow automation platform
- 17:5 : IT Security News Hourly Summary 2026-01-12 18h : 23 posts
- 17:4 : Cybersecurity in the Public Sector: Challenges, Strategies and Best Practices
- 17:4 : Leveraging AI-Based Authentication Factors in Modern Identity and Access Management Solutions
- 17:4 : Block CISO: We red-teamed our own AI agent to run an infostealer on an employee laptop
- 17:4 : CISA Closes Ten Emergency Directives After Federal Cyber Reviews
- 16:32 : Google Chrome Pushes Critical Security Update for 3B Users
- 16:32 : 377,000 Affected in Texas Gas Station Operator Breach
- 16:32 : NDSS 2025 – Mens Sana In Corpore Sano: Sound Firmware Corpora For Vulnerability Research
- 16:32 : Zero-Trust Isn’t Optional Anymore—It’s Your AI Agent Fire Drill
- 16:31 : Vulnerability Summary for the Week of January 5, 2026
- 16:31 : Executives worry most about cyber-enabled fraud, geopolitics and AI
- 16:12 : How Do Managed IT Services Compare to Hiring an In-House IT Team?
- 16:12 : Everest Ransomware Claims Breach at Nissan, Says 900GB of Data Stolen
- 16:11 : Criminal Networks Get a Boost from New Pig-Butchering-as-a-Service Toolkits
- 16:11 : Google Integrates Gemini Into Gmail, Rolling Out New Capabilities
- 16:11 : India Remains Top Target for Mobile Attacks as Threats Surge 38%
- 16:11 : Instagram Confirms No System Breach After External Password Reset Problem
- 16:11 : Web3 Dev Environments Hit by Fake Interview Software Scam
- 16:11 : Google Integrating Gemini With Gmail With New features
- 16:11 : YARA-X 1.11.0 Released With a New Hash Function Warnings
- 16:11 : InvisibleJS Tool Hides Executable ES Modules in Empty Files Using Zero-Width Steganography
- 16:11 : What Enterprises Need in AI Governance Software | Kovrr
- 16:11 : Predict 2026: AI, Trust and the Security Reckoning Ahead
- 16:11 : California Shuts Down Health Data Resales By Unregistered Brokers
- 15:32 : Gmail Says Goodbye to Gmailify and POP3: What Users Need to Know
- 15:32 : Cyber Briefing: 2026.01.12
- 15:5 : Cyber Insights 2026: What CISOs Can Expect in 2026 and Beyond
- 15:5 : Booz Allen Hamilton and Andreessen Horowitz accelerate commercial tech for government
- 15:5 : Canopy Health Hit In Major Cyber Attack
- 15:5 : UH Engaged Hackers Over Cancer Data
- 15:5 : Spain Arrests 34 In Black Axe Crackdown
- 15:4 : Man Charged In Snapchat Hacking Case
- 15:4 : California Bans Health Data Resales
- 14:32 : The Year of Resilience: What Will 2026 Demand from CISOs?
- 14:32 : Regulators around the world are scrutinizing Grok over sexual deepfakes
- 14:32 : Instagram Fixes Password Reset Vulnerability Amid User Data Leak
- 14:32 : World Economic Forum: Cyber-fraud overtakes ransomware as business leaders’ top cyber-security concern
- 14:32 : Researchers Expose Pig Butchering Networks
- 14:32 : GoBruteforcer Botnet Hits Crypto Databases
- 14:5 : IT Security News Hourly Summary 2026-01-12 15h : 12 posts
- 14:2 : Instagram Denies Breach After Password Reset Emails Alarm Users
- 14:2 : Europol Cracks Down Gang Responsible for Cyber Crime Worth Billions
- 14:2 : BreachForums Database Breach Exposes Details of Over 324K User Accounts
- 14:2 : ⚡ Weekly Recap: AI Automation Exploits, Telecom Espionage, Prompt Poaching & More
- 13:32 : 10 Best Network Security Providers for Healthcare Industry in 2026
- 13:32 : India Continues to Be the Top Target for Mobile Attacks with 38% Increase in Threats
- 13:32 : Web3 Developer Environments Targeted by Social Engineering Campaign Leveraging Fake Interview Software
- 13:32 : Critical Apache Struts 2 Vulnerability Allow Attackers to Steal Sensitive Data
- 13:32 : Threat actors Allegedly Claim Discord Dataset Containing 78,541,207 Files
- 13:32 : Celebrating reviews and recognitions for Malwarebytes in 2025
- 13:31 : Infamous BreachForums forum breached, spilling data on 325K users
- 13:31 : Cybersecurity Events 2026
- 13:4 : Europol and Spanish Police arrest 34 in crackdown on Black Axe criminal network
- 13:4 : APT28 Intensifies Cyber Espionage Targeting Energy Infrastructure and Policy Groups
- 12:32 : Israeli Cybersecurity Startup Torq Gets $140M Funding to Hit $1.2B Valuation
- 12:32 : Corrupting LLMs Through Weird Generalizations
- 12:32 : Ofcom officially investigating X as Grok’s nudify button stays switched on
- 12:32 : Russia’s APT28 Targeting Energy Research, Defense Collaboration Entities
- 12:32 : Palo Alto Networks Defines SHIELD Framework to Secure Vibecoding
- 12:32 : GoBruteforcer Botnet Targets Crypto Project Databases by Exploiting Weak Credentials
- 12:4 : New OPCOPRO Scam Uses AI and Fake WhatsApp Groups to Defraud Victim
- 12:4 : LLMs in Attacker Crosshairs, Warns Threat Intel Firm
- 11:32 : Analyzing a Multi-Stage AsyncRAT Campaign via Managed Detection and Response
- 11:32 : Claude connects to more healthcare data under security oversight
- 11:31 : There was no data breach, Instagram says
- 11:7 : Critical React Router Vulnerability Let Attackers Access or Modify Server Files
- 11:7 : Cybercriminal Cryptocurrency Transactions Peaked in 2025 Following Nation‑State Sanctions Evasion Moves
- 11:6 : EU Sets February Deadline for Verdict on Google’s $32B Wiz Acquisition
- 11:5 : IT Security News Hourly Summary 2026-01-12 12h : 5 posts
- 10:32 : Meta Calls for Calm Amidst Instagram Password Reset Panic
- 10:32 : Tories vow to boot under-16s off social media and ban phones in schools
- 10:32 : Cyber fraud network behind €5,93 million in losses dismantled in Spain
- 10:32 : Illicit Crypto Activity Hits Record $158bn in 2025
- 10:32 : How to stop insider-driven data loss in browser sessions
- 10:3 : AI Is Changing Cyber Threats — Here’s How to Stay Protected
- 10:3 : Critical Apache Struts 2 Flaw Could Let Attackers Steal Sensitive Data
- 10:3 : Cybercriminal Crypto Transactions Surge to 2025 High
- 10:2 : Credential-harvesting attacks by APT28 hit Turkish, European, and Central Asian organizations
- 10:2 : Turkish Security Researcher Gets Nod From NASA Over Vulnerability Discoveries
- 10:2 : Debian 13.3 is now available with targeted corrections, updates
- 10:2 : Anthropic Launches Claude AI for Healthcare with Secure Health Record Access
- 9:32 : Operation Cronos Leader Gets Nod From King Charles
- 9:32 : We’re Hiring: Hacking Groups Recruit Teens While Feds Want to Ground Them
- 9:32 : Crypto crime hits record levels as state actors move billions
- 9:32 : BreachForums Database Leak Turns the Tables on Threat Actors
- 9:7 : DeepSeek To Launch Custom Italian Version
- 9:7 : Critical React Router Flaws Could Let Attackers Access or Modify Server Files
- 9:7 : ValleyRAT_S2: Stealth Intrusions Aimed at Financial Data Exfiltration
- 9:6 : Beware of Weaponized Employee Performance Reports that Deploys Guloader Malware
- 9:6 : ValleyRAT_S2 Attacking Organizations to Deploy Stealthy Malware and Extract Financial Details
- 8:32 : Kensington And Chelsea Council Warns Over Stolen Data
- 8:32 : A week in security (January 5 – January 11)
- 8:32 : Torq Raises $140 Million at $1.2 Billion Valuation
- 8:32 : Researchers Uncover Service Providers Fueling Industrial-Scale Pig Butchering Fraud
- 8:32 : BreachForums database leaked, Instagram breach worries, UK government exempts self
- 8:5 : IT Security News Hourly Summary 2026-01-12 09h : 10 posts
- 8:3 : Alleged Scam Boss Arrives In China After Cambodia Arrest
- 8:2 : Fake Employee Performance Reports Deliver Guloader Malware
- 7:32 : Hacking Group “Everest” Allegedly Claims Nissan Motor Breach
- 7:32 : X Suspended Twitter Account for Violation of Rules
- 7:32 : Critical Zlib Vulnerability Let Attackers Trigger Buffer Overflow by Invoking untgz
- 7:31 : Everest Hacking Group Allegedly Claims Breach of Nissan Motors
- 7:31 : Critical InputPlumber Vulnerabilities Allows UI Input Injection and Denial-of-Service
- 7:31 : Rethinking OT security for project heavy shipyards
- 7:7 : Critical InputPlumber Flaw Enables UI Input Injection and Denial-of-Service
- 7:7 : pfSense: Open-source firewall and routing platform
- 6:31 : New Research Uncovers 28 Unique IP Addresses and 85 Domains Hosting Carding Markets
- 6:2 : Researchers Uncover 28 Unique IPs and 85 Domains Hosting Carding Markets
- 6:2 : 17.5 Million Instagram Account “Leak” – What’s Really Happening?
- 6:2 : EU’s Chat Control could put government monitoring inside robots
- 6:2 : What security teams can learn from torrent metadata
- 5:32 : EDRStartupHinder: Blocks Antivirus & EDR at Windows 11 25H2 Startup (Defender Included)
- 5:32 : Critical zlib Flaw Let Attackers Can Trigger a Buffer Overflow via untgz
- 5:31 : New “Penguin” Platform Sells Pig-Butchering Kits, PII, and Stolen Accounts
- 5:31 : Enshittification is ruining everything online (Lock and Code S07E01)
- 5:31 : Downtime pushes resilience planning into security operations
- 5:31 : FBI Warns of QR Code Phishing & Europol’s Major Cybercrime Crackdown CST Monday Jan 12 2026
- 5:6 : New ‘Penguin’ Pig Butchering as a Service Selling PII, Stolen Accounts and Fraud Kits
- 5:6 : India’s government denies it plans to demand smartphone source code
- 5:5 : IT Security News Hourly Summary 2026-01-12 06h : 1 posts
- 4:6 : New EDRStartupHinder Tool blocks antivirus and EDR services at startup on Windows 11 25H2 Defender
- 2:31 : Hackers Accessed University of Hawaii Cancer Center Patient Data; They Weren’t Immediately Notified
- 2:6 : ISC Stormcast For Monday, January 12th, 2026 https://isc.sans.edu/podcastdetail/9762, (Mon, Jan 12th)
- 2:6 : Malaysia and Indonesia block X over failure to curb deepfake smut
- 0:4 : Meta admits to Instagram password reset mess, denies data leak
- 23:5 : IT Security News Hourly Summary 2026-01-12 00h : 8 posts
- 22:58 : IT Security News Weekly Summary 02
- 22:55 : IT Security News Daily Summary 2026-01-11