166 posts were published in the last hour
- 22:31 : A ransomware attack disrupted operations at South Korean conglomerate Kyowon
- 22:31 : Chinese spies used Maduro’s capture as a lure to phish US govt agencies
- 22:2 : East-West Is the New North-South: Rethink Security for the AI-Driven Data Center
- 22:2 : CISA Issues New AI Security Guidance for Critical Infrastructure
- 22:2 : Kaiser to Pay $46M in Patient Data Lawsuit. Find Out If You’re Eligible
- 22:2 : 40K WordPress Installs at Risk From Modular DS Admin Bypass
- 21:31 : Securing AI-Generated Code: Preventing Phantom APIs and Invisible Vulnerabilities
- 21:31 : Flipping one bit leaves AMD CPUs open to VM vuln
- 21:2 : New PayPal Scam Sends Verified Invoices With Fake Support Numbers
- 21:2 : Palo Alto Networks Patches PAN-OS Bug That Can Disrupt GlobalProtect
- 21:2 : AWS CodeBuild Misconfiguration Exposed GitHub Repos to Potential Supply Chain Attacks
- 21:2 : Ask Me Anything Cyber – Inside Web Security Tools & Tactics
- 20:32 : DevSecOps for MLOps: Securing the Full Machine Learning Lifecycle
- 20:31 : Promptware Kill Chain – Five-Step Kill Chain Model for Analyzing Cyberthreats
- 20:31 : Hackers Abusing Legitimate Cloud and CDN Platforms to Host Phishing Kits
- 20:31 : NDSS 2025 – “Who Is Trying To Access My Account?”
- 20:5 : IT Security News Hourly Summary 2026-01-15 21h : 7 posts
- 20:3 : Check Point Research: VoidLink Shows Cloud-Native Linux Malware Evolving
- 20:2 : Elon Musk’s Grok ‘Undressing’ Problem Isn’t Fixed
- 19:31 : 10 important incident response metrics and how to use them
- 19:31 : Contagious Claude Code bug Anthropic ignored promptly spreads to Cowork
- 19:5 : Predicting 2026
- 19:5 : Why ICE Can Kill With Impunity
- 19:5 : Iran’s internet shutdown is now one of its longest ever, as protests continue
- 18:31 : Forget Predictions: True 2026 Cybersecurity Priorities From Leaders
- 18:31 : Researchers Disrupt Major Botnet Network After It Infects Millions of Android Devices
- 18:2 : Introducing ÆSIR: Finding Zero-Day Vulnerabilities at the Speed of AI
- 18:2 : Most Inspiring Women in Cyber 2026: Meet The Judges
- 18:2 : New StackWarp Attack Threatens Confidential VMs on AMD Processors
- 18:2 : 2025 Threat Landscape in Review: Lessons for Businesses Moving Into 2026
- 17:32 : AVEVA Process Optimization
- 17:32 : Empowering Latinas in Cybersecurity
- 17:31 : Fortinet FortiSIEM Vulnerability CVE-2025-64155 Actively Exploited in Attacks
- 17:31 : Vibe Coding Tested: AI Agents Nail SQLi but Fail Miserably on Security Controls
- 17:5 : GhostPoster Browser Malware Hid for 5 Years With 840,000 Installs
- 17:5 : AI Security: What Enterprises Are Getting Wrong
- 17:5 : AI Agent Integration Can Become a Problem in Workplace Operations
- 17:5 : IT Security News Hourly Summary 2026-01-15 18h : 7 posts
- 17:5 : Russia-Linked Lynx Gang Claims Ransomware Attack on CSA Tax & Advisory
- 17:4 : Google Appears to Be Preparing Gemini Integration for Chrome on Android
- 16:32 : Wordfence Intelligence Weekly WordPress Vulnerability Report (January 5, 2026 to January 11, 2026)
- 16:32 : Central Maine Healthcare data breach impacted over 145,000 patients
- 16:31 : The Next Security Battleground: Agentic Identity
- 16:31 : Global Agencies Release New Guidance to Secure Industrial Networks
- 16:31 : DHS prepares replacement for critical infrastructure collaboration framework
- 16:2 : Closing the Door on Net-NTLMv1: Releasing Rainbow Tables to Accelerate Protocol Deprecation
- 16:2 : BreachLock Expands Adversarial Exposure Validation (AEV) to Web Applications
- 16:2 : Researchers Reveal Reprompt Attack Allowing Single-Click Data Exfiltration From Microsoft Copilot
- 16:2 : Critical WordPress Modular DS Plugin Flaw Actively Exploited to Gain Admin Access
- 16:2 : Hackers Increasingly Shun Encryption in Favour of Pure Data Theft and Extortion
- 15:32 : A simple CodeBuild flaw put every AWS environment at risk – and pwned ‘the central nervous system of the cloud’
- 15:31 : We’re Moving Too Fast: Why AI’s Race to Market Is a Security Disaster
- 15:31 : Cyber Briefing: 2026.01.15
- 15:3 : Microsoft Patch Tuesday Fixes 112 Flaws, Includes SharePoint and Windows
- 15:3 : Zorin OS Hits 2 Million Downloads as Windows 10 Support Ends
- 15:3 : AppGuard Critiques AI Hyped Defenses; Expands its Insider Release for its Next-Generation Platform
- 15:3 : Sensitive data of Eurail, Interrail travelers compromised in data breach
- 15:3 : ThreatsDay Bulletin: AI Voice Cloning Exploit, Wi-Fi Kill Switch, PLC Vulns, and 14 More Stories
- 15:3 : Cyber Threat Actors Ramp Up Attacks on Industrial Environments
- 15:3 : CodeBuild Flaw Put AWS Console Supply Chain At Risk
- 15:3 : Microsoft Disrupts RedVDS Cybercrime
- 15:3 : Google Personal Intelligence Links Gemini
- 15:3 : France Fines Free Mobile Over Breach
- 14:33 : Palo Alto Networks Firewall Vulnerability Allows Attackers To Trigger Denial Of Service
- 14:33 : Microsoft and Authorities Dismatles BEC Attack Chain Powered By RedVDS Fraud Engine
- 14:33 : Windows Remote Assistance Vulnerability Allow attacker To bypass Security Features
- 14:32 : Critical Cal.com Vulnerability Let Attackers Bypass Authentication and Hijack Any User Account
- 14:32 : Promptware Kill Chain – Five-step Kill Chain Model For Analyzing Cyberthreats
- 14:32 : Microsoft Remains the Most Imitated Brand in Phishing Attacks in Q4 2025
- 14:32 : Former CISA Director Jen Easterly Will Lead RSAC Conference
- 14:32 : New Remcos Campaign Distributed Through Fake Shipping Document
- 14:32 : MonetaStealer Malware Powered with AI Code Attacking macOS Users in the Wild
- 14:32 : “Reprompt” attack lets attackers steal data from Microsoft Copilot
- 14:32 : US regulator tells GM to hit the brakes on customer tracking
- 14:32 : Depthfirst Raises $40 Million for Vulnerability Management
- 14:32 : Report: Massive Amounts of Sensitive Data Being Shared with GenAI Tools
- 14:32 : Korean Air Employee Data Exposed in Cl0p Ransomware Supply-Chain Attack
- 14:32 : Tines rolls out a governance layer for agents, copilots, and MCPs
- 14:32 : Delinea expands identity security platform through StrongDM acquisition
- 14:32 : CISO Role Reaches “Inflexion Point” With Executive-Level Titles
- 14:32 : Palo Alto Fixes GlobalProtect DoS Flaw
- 14:32 : Firefox 147 Fixes Code Execution Flaws
- 14:31 : Maine Healthcare Breach Exposes Data
- 14:31 : Monroe University Data Breach Affects Many
- 14:31 : Hackers Steal Student Data In Victoria
- 14:5 : IT Security News Hourly Summary 2026-01-15 15h : 13 posts
- 13:32 : Aembit Announces Agenda and Speaker Lineup for NHIcon 2026 on Agentic AI Security
- 13:32 : New CastleLoader Variant Linked to 469 Infections Across Critical Sectors
- 13:32 : Patch Now: Active Exploitation Underway for Critical HPE OneView Vulnerability
- 13:32 : Former CISA Director Jen Easterly Will Lead RSA Conference
- 13:32 : Bridging Cybersecurity and AI
- 13:32 : Turla’s Kazuar v3 Loader Leverages Event Tracing for Windows and Bypasses Antimalware Scan Interface
- 13:32 : New Sicarii RaaS Operation Attacks Exposed RDP Services and Attempts to Exploit Fortinet Devices
- 13:32 : Woman bailed as cops probe doctor’s surgery data breach
- 13:32 : isVerified Emerges From Stealth With Voice Deepfake Detection Apps
- 13:32 : Classroom Device Management: 8 Strategies for K-12 Success
- 13:32 : Delinea Acquries StrongDM to Secure Access to IT Infrastructure
- 13:32 : PoC exploit for critical FortiSIEM vulnerability released (CVE-2025-64155)
- 13:31 : Model Security Is the Wrong Frame – The Real Risk Is Workflow Security
- 12:32 : Palo Alto Networks addressed a GlobalProtect flaw, PoC exists
- 12:32 : New Vulnerability in n8n
- 12:32 : Critical WordPress Plugin Vulnerability Exploited in the Wild to Gain Instant Admin Access
- 12:32 : Firefox 147 Released With Fixes for 16 Vulnerabilities that Enable Arbitrary Code Execution
- 12:32 : Critical Cal.com Vulnerability Let Attackers Bypass Authentication and Hijack any User Account
- 12:31 : Microsoft and Authorities Dismatles BEC Attack Chain Powered by RedVDS Fraud Engine
- 12:31 : New ‘Reprompt’ Attack Silently Siphons Microsoft Copilot Data
- 12:31 : Data Privacy Teams Face Staffing Shortages and Budget Constraints, ISACA Warns
- 12:3 : Years-Old Vulnerable Apache Struts 2 Versions See 387K Weekly Downloads
- 12:3 : Hundreds of Millions of Audio Devices Need a Patch to Prevent Wireless Hacking and Tracking
- 12:3 : Microsoft taps UK courts to dismantle cybercrime host RedVDS
- 12:3 : 4 Outdated Habits Destroying Your SOC’s MTTR in 2026
- 11:32 : Battling Cryptojacking, Botnets, and IABs [Guest Diary], (Thu, Jan 15th)
- 11:32 : UAT-8837 targets critical infrastructure sectors in North America
- 11:32 : SK Hynix Brings Forward Memory Plans Amid Shortage
- 11:32 : Ofcom keeps X under the microscope despite Grok ‘nudify’ fix
- 11:32 : Central Maine Healthcare Data Breach Impacts 145,000 Individuals
- 11:32 : Ongoing Web Skimming Operation Quietly Harvests Payment Data From Online Stores
- 11:32 : ChatGPT Prepares Cross-Platform Expansion With Project Agora
- 11:32 : AWS European Sovereign Cloud puts data, operations, and oversight inside the EU
- 11:32 : ICE Agent Doxxing Site DDoS-ed Via Russian Servers
- 11:5 : IT Security News Hourly Summary 2026-01-15 12h : 3 posts
- 10:32 : X Restricts Sexualised AI Features
- 10:32 : Lumen disrupts AISURU and Kimwolf botnet by blocking over 550 C2 servers
- 10:32 : HPE Aruba Vulnerabilities Enables Unauthorized Access to Sensitive Information
- 10:3 : Google Links Gmail, YouTube To AI Queries
- 10:3 : AWS flips switch on Euro cloud as customers fret about digital sovereignty
- 10:3 : VoidLink Linux Malware Framework Targets Cloud Environments
- 10:3 : Palo Alto Fixes GlobalProtect DoS Flaw That Can Crash Firewalls Without Login
- 10:3 : Microsoft Legal Action Disrupts RedVDS Cybercrime Infrastructure Used for Online Fraud
- 9:32 : OpenAI Signs $10bn AI Chip Deal With Cerebras
- 9:32 : ICS Patch Tuesday: Vulnerabilities Fixed by Siemens, Schneider, Aveva, Phoenix Contact
- 9:32 : Arcjet Python SDK Sinks Teeth Into Application-Layer Security
- 9:32 : F5 targets AI runtime risk with new guardrails and adversarial testing tools
- 9:32 : Bitwarden advances passkeys and credential risk controls
- 9:5 : Zhipu Trains Multimodal AI Model With Huawei Chips
- 9:5 : Traveler Information Stolen in Eurail Data Breach
- 9:5 : Asimily extends Cisco ISE integration to turn device risk into segmentation policy
- 9:5 : JumpCloud introduces AI features to govern shadow AI and autonomous agents
- 8:32 : China Opens Probe Into Trip.com Travel Group
- 8:32 : China bans U.S. and Israeli cybersecurity software over security concerns
- 8:32 : Chinese Threat Actors Hosted 18,000 Active C2 Servers Across 48 Hosting Providers
- 8:32 : U.S. weighs cyberwarfare options, DeadLock uses smart contracts to hide work, China says stop using US and Israeli cybersecurity software
- 8:7 : Amazon Looks To Build Data Centre At Didcot Power Station Site
- 8:7 : Palo Alto Networks Firewall Vulnerability Allows Attacker to Trigger DoS Attacks
- 8:7 : Microsoft shuts down RedVDS cybercrime subscription service tied to millions in fraud losses
- 7:4 : LinkedIn wants to make verification a portable trust signal
- 6:31 : GoLogin vs MultiLogin vs VMLogin – What’s the Anti-Detect Browsers Difference?
- 6:31 : Is it time for internet services to adopt identity verification?
- 6:4 : QR codes are getting colorful, fancy, and dangerous
- 5:31 : Palo Alto Networks Firewall Vulnerability Allows Attackers to Trigger Denial of Service
- 5:31 : Cybersecurity spending keeps rising, so why is business impact still hard to explain?
- 5:31 : CISOs flag gaps in third-party risk management
- 5:6 : The NSA lays out the first steps for zero trust adoption
- 5:5 : IT Security News Hourly Summary 2026-01-15 06h : 3 posts
- 4:31 : Improving VirtOps: Manage, migrate or modernize with Red Hat and Cisco
- 4:31 : Microsoft SQL Server Vulnerability Allows Attackers to Elevate Privileges over a Network
- 4:31 : Palo Alto Networks Firewall Vulnerability Allows Unauthenticated Attackers to Trigger Denial of Service
- 3:5 : What innovations do NHIs bring to cloud security
- 3:5 : Can Agentic AI keep your data protection strategies ahead
- 3:4 : How do you trust a machine with secret management
- 3:4 : Are NHIs scalable for growing tech ecosystems
- 3:4 : Microsoft, Law Enforcement Disrupt RedVDS Global Cybercrime Service
- 2:5 : IT Security News Hourly Summary 2026-01-15 03h : 1 posts
- 2:2 : ISC Stormcast For Thursday, January 15th, 2026 https://isc.sans.edu/podcastdetail/9768, (Thu, Jan 15th)
- 23:5 : IT Security News Hourly Summary 2026-01-15 00h : 1 posts
- 22:55 : IT Security News Daily Summary 2026-01-14