181 posts were published in the last hour
- 22:2 : Stealthy CastleLoader Malware Attacking US Government Agencies and Critical Infrastructure
- 22:2 : CVE-2025-64155: Exploit Code Released for Critical Fortinet FortiSIEM Command Injection Vulnerability
- 21:31 : Microsoft Copilot Reprompt Attack Enables Stealthy Data Exfiltration
- 21:4 : This WhatsApp Link Can Hand Over Your Account in Seconds
- 21:4 : New Linux malware targets the cloud, steals creds, and then vanishes
- 20:33 : CERT-UA reports PLUGGYAPE cyberattacks on defense forces
- 20:5 : IT Security News Hourly Summary 2026-01-14 21h : 6 posts
- 20:4 : The multibillion-dollar AI security problem enterprises can’t ignore
- 20:4 : Researchers Null-Route Over 550 Kimwolf and Aisuru Botnet Command Servers
- 19:32 : The multi-billion AI security problem enterprises can’t ignore
- 19:32 : Hacking Wheelchairs over Bluetooth
- 19:6 : New China Linked VoidLink Linux Malware Targets Major Cloud Providers
- 19:6 : Verizon Outage Knocks Out US Mobile Service, Including Some 911 Calls
- 18:32 : Infection repeatedly adds scheduled tasks and increases traffic to the same C2 domain, (Wed, Jan 14th)
- 18:32 : Structure and reliability in e-commerce platforms
- 18:32 : Aikido Security Raises $60 Million at $1 Billion Valuation
- 18:32 : Living Security Adds AI Engine to Surface Risky End User Behavior
- 18:32 : Microsoft named a Leader in IDC MarketScape for Unified AI Governance Platforms
- 18:2 : Vibe coding security risks and how to mitigate them
- 18:2 : New One-Click Microsoft Copilot Vulnerability Grants Attackers Undetected Access to Sensitive Data
- 18:2 : Researchers Breakdown DragonForce Ransomware Along with Decryptor for ESXi and Windows Systems
- 17:32 : AI security firm, depthfirst, announces $40 million Series A
- 17:32 : Investor Lawsuit Over CrowdStrike Outage Dismissed
- 17:5 : IT Security News Hourly Summary 2026-01-14 18h : 11 posts
- 17:2 : Upcoming Speaking Engagements
- 17:2 : North Korean Hackers use Code Abuse Tactics for ‘Contagious Interview’ Campaign
- 17:2 : CrowdStrike Acquires Browser Security Startup Seraphic in Latest Buying Spree
- 17:2 : Criminal Subscription Service Behind AI-Powered Cyber-Attacks Taken Out By Microsoft
- 17:2 : Trump resubmits Sean Plankey for CISA director
- 17:2 : AI surges among top business risk concerns, while cybersecurity holds firm
- 16:32 : Fortinet fixed two critical flaws in FortiFone and FortiSIEM
- 16:31 : Phishing scammers are posting fake “account restricted” comments on LinkedIn
- 16:31 : Inside RedVDS: How a single virtual desktop provider fueled worldwide cybercriminal operations
- 16:31 : AI Agents Are Becoming Privilege Escalation Paths
- 16:31 : Trump resubmits Sean Plankey’s CISA director nomination
- 16:3 : Why Browsers Are the Weakest Link in Zero Trust Architectures
- 16:3 : Trump Warned of a Tren de Aragua ‘Invasion.’ US Intel Told a Different Story
- 16:3 : Secure Connectivity Principles for Operational Technology (OT)
- 16:2 : US cargo tech company publicly exposed its shipping systems and customer data to the web
- 16:2 : AI security firm, depthfirst, announces $40 million series A
- 16:2 : PHALT#BLYX Malware Campaign Targets European Hotels With Fake Booking Emails
- 16:2 : EOCC Hit by Security Breach Due to Contractor’s Unauthorised Access
- 16:2 : Hackers Use Fake PayPal Notices to Steal Credentials, Deploy RMMs
- 15:32 : France fines telcos €42M for sub-par security prior to 24M customer breach
- 15:32 : Cyber Briefing: 2026.01.14
- 15:3 : Hacker Claims Full Breach of Russia’s Max Messenger, Threatens Public Leak
- 15:3 : Leaked Data Exposes Thousands of Border Patrol, ICE Agents After Renee Good Shooting
- 15:3 : Heimdal Achieves OPSWAT Gold Certification for Anti-Malware
- 15:2 : VVS Stealer Attacking Discord Users to Exfiltrate Credentials and Tokens
- 15:2 : RedVDS Cybercrime Service Disrupted by Microsoft and Law Enforcement
- 15:2 : AppOmni Surfaces BodySnatcher AI Agent Security Flaw Affecting ServiceNow Apps
- 15:2 : Windows Updates Replace Secure Boot Certs
- 15:2 : Cyber Fraud Overtakes Ransomware Risks
- 15:2 : McConaughey Trademarks Name To Fight AI
- 14:32 : Fortinet FortiSandbox SSRF Bug Proxies Internal Network Requests
- 14:32 : Thinking Like an Attacker: How Attackers Target AI Systems
- 14:32 : ‘Imagination the limit’: DeadLock ransomware gang using smart contracts to hide their work
- 14:32 : EasyDMARC Expands Executive Team with Armen Najarian as Chief Commercial Officer
- 14:32 : Threat Actor Teases Source Code for Sale After Hack of Target Systems
- 14:32 : VoidLink Malware Poses Growing Risk to Enterprise Linux Cloud Deployments
- 14:32 : Here’s How AI is Revolutionizing Indian Cinema
- 14:32 : This Built-In Android and iPhone Feature Lets You Share Your Phone Safely
- 14:32 : Webinar: Beyond the Quadrant: An Analyst’s Guide to Evaluating Email Security in 2026
- 14:32 : Hackers Exploit c-ares DLL Side-Loading to Bypass Security and Deploy Malware
- 14:32 : DeadLock Ransomware Uses Polygon Smart Contracts For Proxy Rotation
- 14:32 : Web Skimming Campaign Steals Credit Cards
- 14:32 : ServiceNow Patches AI Impersonation Flaw
- 14:31 : Pax8 Exposes Data Of 1800 MSP Partners
- 14:31 : Target Dev Server Offline After Hack
- 14:31 : Bad Actor Hijacks Apex Legends Matches
- 14:7 : LABScon25 Replay | Hacktivism and War: A Clarifying Discussion
- 14:7 : 2026 Study from Panorays: 85% of CISOs Can’t See Third-Party Threats Amid Increasing Supply Chain Attacks
- 14:7 : Survey: Rapid AI Adoption Causes Major Cyber Risk Visibility Gaps
- 14:7 : How to Secure a Spring AI MCP Server with an API Key via Spring Security
- 14:6 : Predator Spyware Turns Failed Attacks Into Intelligence for Future Exploits
- 14:6 : SpyCloud launches Supply Chain Threat Protection to expose vendor identity risk
- 14:5 : IT Security News Hourly Summary 2026-01-14 15h : 5 posts
- 13:32 : Microsoft January 2026 Patch Tuesday: 115 Vulnerabilities Fixed
- 13:32 : Microsoft Warns Secure Boot May Be Bypassed as Windows UEFI Certificates Expire
- 13:32 : Threat Actors Targeting Ukraine’s Defense Forces with Charity-Themed Malware Campaign
- 13:32 : Novee Emerges From Stealth With $51.5 Million in Funding
- 13:32 : Airia adds AI Governance for compliance, accountability, and control
- 13:2 : SpyCloud Launches Supply Chain Solution to Combat Rising Third-Party Identity Threats
- 13:2 : Betterment Confirms that Hackers Gained Access to Internal Systems
- 13:2 : Critical FortiSIEM Vulnerability Lets Attackers Run Arbitrary Commands via TCP Packets
- 13:2 : Researchers Proposed Game-Theoretic AI for Guiding Attack and Defense
- 13:2 : AuraAudit – Open-Source Tool for Salesforce Aura Framework Misconfiguration Analysis
- 13:2 : Online shoppers at risk as Magecart skimming hits major payment networks
- 13:2 : Eurail passengers taken for a ride as data breach spills passports, bank details
- 13:2 : Cyber-stricken Belgian hospitals refuse ambulances, transfer critical patients
- 13:2 : One Identity Manager 10.0 introduces risk-based governance and ITDR capabilities
- 12:31 : U.S. CISA adds a flaw in Microsoft Windows to its Known Exploited Vulnerabilities catalog
- 12:31 : UK backtracks on digital ID requirement for right to work
- 12:31 : DORA penetration testing and threat-led exercises explained
- 12:31 : Fortinet Fixes Critical FortiSIEM Flaw Allowing Unauthenticated Remote Code Execution
- 12:3 : When Does a Chatbot Make Sense in Freshdesk and When It Doesn’t
- 12:3 : GitGuardian Closes 2025 with Strong Enterprise Momentum, Protecting Millions of Developers Worldwide
- 12:3 : Keeper Security puts Atlassian Williams F1 Team in pole position on cybersecurity
- 12:3 : How real software downloads can hide remote backdoors
- 12:3 : WitnessAI Raises $58 Million for AI Security Platform
- 11:32 : The Skills That Matter in 2026: Head-to-Head
- 11:32 : Microsoft Fixes 114 Windows Flaws in January 2026 Patch, One Actively Exploited
- 11:31 : New Research: 64% of 3rd-Party Applications Access Sensitive Data Without Justification
- 11:31 : G7 Sets 2034 Deadline for Finance to Adopt Quantum-Safe Systems
- 11:5 : IT Security News Hourly Summary 2026-01-14 12h : 17 posts
- 11:3 : Brushstrokes and breaches with Terryn Valikodath
- 11:3 : US Teachers Union Leaves X Over Sexualised AI Images
- 11:3 : The Skills That Will Matter in 2026
- 11:3 : UK Government Promises ‘Reset’ For AI Copyright Rules
- 11:3 : Hackers Launch Over 91,000 Attacks on AI Systems Using Fake Ollama Servers
- 11:3 : UK Digital ID Scheme Faces Resistance Over Security Concerns
- 11:2 : Elastic Patches Multiple Vulnerabilities That Enables Arbitrary File Theft and DoS Attacks
- 11:2 : Spring CLI Tool Vulnerability Enables Command Execution on the Users Machine
- 11:2 : New Android Bug Impacts Volume Buttons Functionality with “Select to Speak” Enabled
- 11:2 : Robo-Advisor Betterment Discloses Data Breach
- 11:2 : Detecting browser extensions for bot detection, lessons from LinkedIn and Castle
- 11:2 : How AI Is Reshaping Software Development and How Tech Leaders Should Measure Its Impact
- 11:2 : Microsoft Fixes Three Zero-Days on Busy Patch Tuesday
- 10:32 : Convert Video to Text: A Comprehensive Guide
- 10:32 : Spanish power giant sparks breach probe amid claims of massive data grab
- 10:5 : Amazon Seeks Vendor Price Cuts Amid Tariff Uncertainty
- 10:5 : New Magecart Attack Steals Customers Credit Cards from Website Checkout Pages
- 10:4 : Chrome 144, Firefox 147 Patch High-Severity Vulnerabilities
- 10:4 : Fortinet Patches Critical Vulnerabilities in FortiFone, FortiSIEM
- 10:4 : Impersonation Fraud Drives Record $17bn in Crypto Losses
- 9:31 : US Senate Returns To Work On Crypto Bill
- 9:31 : LLMs Supercharge Ransomware Speed, Scale, and Global Reach
- 9:31 : Microsoft Patch Tuesday security updates for January 2026 fixed actively exploited zero-day
- 9:4 : Microsoft Shifts Data Centre Strategy After Backlash
- 9:4 : How Cybercrime Markets Launder Breach Proceeds and What Security Teams Miss
- 9:4 : CastleLoader Malware Targets U.S. Government Agencies
- 8:32 : Meta Cuts VR Jobs, Shifts Focus To AI Glasses
- 8:32 : Anthropic backs Python Software Foundation security work with $1.5 million
- 8:32 : Critical Node.js Vulnerability Can Cause Server Crashes via async_hooks Stack Overflow
- 8:31 : GoBruteforcer targets blockchain projects, Android bug causes volume key issues, Verizon to stop automatic phone unlocks
- 8:5 : IT Security News Hourly Summary 2026-01-14 09h : 14 posts
- 8:4 : Meta Discusses Doubling Ray-Ban Production
- 8:4 : Google Releases Chrome 144, Fixing 10 V8 Engine Vulnerabilities
- 8:4 : Your personal information is on the dark web. What happens next?
- 8:4 : How You Can Master AI Security Management
- 8:4 : AI in Manufacturing: The Growing Risk and Reward Dilemma Escalating Data Security
- 7:32 : Leveraging Landlock telemetry for Linux detection engineering
- 7:32 : Top 10 Best Android Games for 2026
- 7:32 : 10 Best Android Keyboard Apps for Android Users in 2026
- 7:32 : Top 5 Snapchat Track Apps for Android – 2026
- 7:32 : Top 5 Best Universities in United States to Enhance Your Career in Cyber Security
- 7:32 : 7 Best Ways to Turn Your Cyber Security Skills Into a $100,000 Career
- 7:32 : CISO Assistant: Open-source cybersecurity management and GRC
- 7:32 : Scamnetic delivers fraud protection across all payment types
- 7:31 : PLUGGYAPE Malware Uses Signal and WhatsApp to Target Ukrainian Defense Forces
- 7:2 : Patch Tuesday, January 2026 Edition
- 7:2 : 10 Dangerous DNS Attacks Types & Prevention Measures – 2026
- 7:2 : 5 Best Bug Bounty Platforms for White-Hat Hackers – 2026
- 7:2 : 10 Most Dangerous Injection Attacks in 2026
- 7:2 : Top 11 Best DNS Filtering Solutions – 2026
- 7:2 : Top 12 Best Open Source Intelligence Tools (OSINT Tools) for Penetration Testing 2026
- 6:32 : Node.js Security Release Fixes 7 Vulnerabilities Across All Supported Versions
- 6:32 : Microsoft Desktop Window Manager Zero-Day Exploited in Active Attacks
- 6:32 : Charity-Themed Malware Used by Threat Actors to Target Ukraine’s Defense Forces
- 6:32 : Node.js Releases Critical Updates to Fix Major Vulnerabilities
- 6:32 : Anthropic finds $1.5 million to help Python Foundation improve security
- 6:32 : Firmware scanning time, cost, and where teams run EMBA
- 6:2 : An AI-Driven Game-Theoretic Approach to Attack and Defense
- 6:2 : Product showcase: Orbot – Tor VPN for iOS
- 6:2 : How AI image tools can be tricked into making political propaganda
- 5:32 : FortiOS and FortiSwitchManager Flaw Allows Remote Code Execution
- 5:31 : Lumo expands its Lumo AI assistant with encrypted, project-based workspaces
- 5:31 : HPE Open View Vulnerability Hits CISA Known Exploited List
- 5:6 : Microsoft January 2026 Patch Tuesday Fixes 114 Flaws, Including 3 Zero-Days
- 5:6 : New Magecart Campaign Steals Credit Card Details During Online Checkouts
- 5:5 : IT Security News Hourly Summary 2026-01-14 06h : 1 posts
- 4:34 : Microsoft Desktop Window Manager 0-Day Vulnerability Exploited in the wild
- 3:31 : Instagram denies breach, Sweden detains spying suspect, n8n attack steals OAuth tokens
- 2:32 : ISC Stormcast For Wednesday, January 14th, 2026 https://isc.sans.edu/podcastdetail/9766, (Wed, Jan 14th)
- 2:5 : IT Security News Hourly Summary 2026-01-14 03h : 1 posts
- 2:4 : AI Scraping in Mobile Apps: How It Works and How to Stop It
- 1:2 : Windows info-disclosure 0-day bug gets a fix as CISA sounds alarm
- 0:31 : AZ Monica hospital in Belgium shuts down servers after cyberattack
- 23:31 : Wine 11 brings major architectural work, synchronization changes, 600+ bug fixes
- 23:5 : IT Security News Hourly Summary 2026-01-14 00h : 1 posts
- 22:55 : IT Security News Daily Summary 2026-01-13