161 posts were published in the last hour
- 22:2 : 18 enterprise email security best practices for 2026
- 22:2 : Microsoft 365 hit by outage, preventing access to emails and files
- 21:13 : Views on AI & the Anthropic Report
- 21:13 : NDSS 2025 – Rethinking Trust In Forge-Based Git Security
- 20:31 : Ring is adding a new content verification feature to videos
- 20:31 : Machine learning–powered Android Trojans bypass script-based Ad Click detection
- 20:31 : New Osiris Ransomware Using Wide Range of Living off the Land and Dual-use Tools in Attacks
- 20:5 : IT Security News Hourly Summary 2026-01-22 21h : 10 posts
- 20:2 : Analysis of Single Sign-On Abuse on FortiOS
- 20:2 : Why AI Is Making Attack Surface Management Mandatory
- 19:34 : Analysis of Single Sign On (SSO) abuse on FortiOS
- 19:34 : Crims compromised energy firms’ Microsoft accounts, sent 600 phishing emails
- 19:34 : New Osiris Ransomware Emerges as New Strain Using POORTRY Driver in BYOVD Attack
- 19:13 : I scan, you scan, we all scan for… knowledge?
- 19:13 : Google to Pay $8.25M Settlement Over Child Data Tracking in Play Store
- 19:13 : What the Alien Franchise Taught Me About Cybersecurity
- 19:13 : Proxyware Malware Disguised as Notepad++ Tool Leverages Windows Explorer Process to Hijack Systems
- 19:13 : Cybercriminals Target Cloud File-Sharing Services to Access Corporate Data
- 18:36 : Halo Security Achieves SOC 2 Type II Compliance, Demonstrating Sustained Security Excellence Over Time
- 18:36 : Ask Me Anything Cyber – Brooklyn TECH EXPO with Vlad Schifrin
- 18:36 : Ask Me Anything Cyber with Stephanie Zavala
- 18:5 : ICE Agents Are ‘Doxing’ Themselves
- 18:5 : Delta Electronics DIAView
- 18:5 : Weintek cMT X Series HMI EasyWeb Service
- 18:4 : EVMAPA
- 18:4 : Schneider Electric EcoStruxure Process Expert
- 18:4 : Rockwell Automation CompactLogix 5370
- 18:4 : Microsoft Security success stories: Why integrated security is the foundation of AI transformation
- 17:34 : Hackers Are Using LinkedIn DMs and PDF Tools to Deploy Trojans
- 17:34 : ESA Confirms Cyber Breach After Hacker Claims 200GB Data Theft
- 17:34 : Ledger Customer Data Exposed After Global-e Payment Processor Cloud Incident
- 17:12 : Ireland proposes new law allowing police to use spyware
- 17:12 : Attackers Reverse‑Engineer Patch to Exploit SmarterMail Admin Bypass in the Wild
- 17:12 : Hackers Earned $516,500 for 37 Unique 0-day Vulnerabilities – Pwn2Own Automotive 2026
- 17:12 : Researchers Detailed r1z Initial Access Broker OPSEC Failures
- 17:12 : Attackers Infrastructure Exposed Using JA3 Fingerprinting Tool
- 17:12 : Obsidian Security Extends Reach to SaaS Application Integrations
- 17:12 : Critical GNU InetUtils telnetd Flaw Lets Attackers Bypass Login and Gain Root Access
- 17:5 : IT Security News Hourly Summary 2026-01-22 18h : 8 posts
- 16:32 : Critical SmarterMail vulnerability under attack, no CVE yet
- 16:32 : FortiGate firewalls hit by silent SSO intrusions and config theft
- 16:32 : The Upside Down is Real: What Stranger Things Teaches Us About Modern Cybersecurity
- 16:32 : Web Bot Auth: Verifying User Identity & Ensuring Agent Trust Through the Customer Journey
- 16:32 : We’ve Reached the “Customers Want Security” Stage, and AI Is Listening
- 16:12 : Under Armour Ransomware Attack Exposes 72M Email Addresses
- 16:12 : Critical Appsmith Flaw Enables Account Takeovers
- 16:12 : IT teams aren’t equipped to stop rogue AI agents
- 15:37 : Under Armour says it’s ‘aware’ of data breach claims after 72M customer records were posted online
- 15:37 : Keeper Introduces Instant Account Switching and Passkey Improvements
- 15:37 : Old Attack, New Speed: Researchers Optimize Page Cache Exploits
- 15:37 : ThreatsDay Bulletin: Pixel Zero-Click, Redis RCE, China C2s, RAT Ads, Crypto Scams & 15+ Stories
- 15:37 : RealHomes CRM Plugin Flaw Affected 30,000 WordPress Sites
- 15:36 : Cyber Briefing: 2026.01.22
- 15:9 : Wordfence Intelligence Weekly WordPress Vulnerability Report (January 12, 2026 to January 18, 2026)
- 15:9 : PNB MetLife Phishing Attack: Multi-Stage Scheme Steals Data, Triggers UPI Payments
- 15:9 : BIND 9 Flaw Lets Attackers Crash Servers With Malicious DNS Records
- 15:9 : NVIDIA CUDA Toolkit Flaw Allows Command Injection, Arbitrary Code Execution
- 15:9 : Critical Vivotek Flaw Enables Remote Arbitrary Code Execution
- 15:9 : New Osiris Ransomware Leverages Living Off the Land and Dual-Use Tools in Attacks
- 15:9 : CISA Warns of Cisco Unified CM 0-Day RCE Vulnerability Exploited in Attacks
- 15:9 : FortiGate Firewalls Hacked in Automated Attacks to Steal Configuration Data
- 15:9 : Critical Vivotek Vulnerability Allows Remote Users to Inject Arbitrary Code
- 15:9 : New ClickFix Campaign Hijacks Facebook Sessions Using Fake Verification Pages
- 15:9 : Webinar Today: Rethinking Email Security for Mid-Sized Organizations
- 15:9 : Obsidian Security unveils end-to-end SaaS supply chain security to stop integration-led breaches
- 14:32 : Watering Hole Attack Targets EmEditor Users with Information-Stealing Malware
- 14:32 : Fake LastPass maintenance emails target users
- 14:32 : Minnesota DHS Data Breach Hits 300K
- 14:32 : Key Apple Nvidia Tesla Supplier Breached
- 14:32 : Tesla Hacked At Pwn2Own Automotive 2026
- 14:32 : Greek Police Arrest Fake Cell Tower Gang
- 14:31 : Snapchat Expands Parental Contact Insights
- 14:5 : Foxit, Epic Games Store, MedDreams vulnerabilities
- 14:5 : IT Security News Hourly Summary 2026-01-22 15h : 15 posts
- 14:5 : MCP Isn’t Just Convenience; It’s a Security Problem and a Governance Opportunity
- 14:4 : Attackers Continue to Target Trusted Collaboration Platforms: 12,000+ Emails Target Teams Users
- 14:4 : AI-Powered North Korean Konni Malware Targets Developers
- 14:4 : Europe’s GDPR cops dished out €1.2B in fines last year as data breaches piled up
- 14:4 : Targeted Cyberattack Foiled by Resecurity Honeypot
- 14:4 : Cybersecurity Education for Awareness and Compliance
- 14:4 : REMnux
- 13:34 : Global Collaboration Can Advance Systemic Cybercrime Deterrence: Reflections from Davos
- 13:34 : Bank of England: Financial sector failing to implement basic cybersecurity controls
- 13:34 : Energy sector orgs targeted with AiTM phishing campaign
- 13:11 : VoidLink Malware Puts Cloud Systems on High Alert With Custom Built Attacks
- 13:11 : Why AI Keeps Falling for Prompt Injection Attacks
- 13:11 : AiStrike Raises $7 Million in Seed Funding
- 13:11 : What Is Student-Centered Learning? A Practical Guide for New Teachers
- 13:11 : Zero-Day Exploits Surge, Nearly 30% of Flaws Attacked Before Disclosure
- 12:32 : Malicious PyPI Package Mimic as Popular Sympy-Dev to Attack Millions of Users
- 12:32 : Under Armour ransomware breach: data of 72 million customers appears on the dark web
- 12:32 : Ancient telnet bug happily hands out root to attackers
- 12:31 : New Wave of Attacks Targeting FortiGate Firewalls
- 12:31 : LastPass Warns of Phishing Campaign Attempting to Steal Master Passwords
- 12:5 : Zoom and GitLab Patch RCE, DoS, and 2FA Bypass Vulnerabilities
- 12:4 : Claroty Raises $150 Million in Series F Funding
- 12:4 : ZEST Security Adds AI Agents to Identify Vulnerabilities That Pose No Actual Risk
- 12:4 : Filling the Most Common Gaps in Google Workspace Security
- 11:34 : Arctic Wolf detects surge in automated Fortinet FortiGate firewall configuration attacks
- 11:34 : Furl Raises $10 Million for Autonomous Vulnerability Remediation
- 11:34 : Claroty raises $150 million to advance global CPS protection platform
- 11:34 : UK Executives Warn They May Not Survive a Major Cyber-Attack, Vodafone Survey Finds
- 11:13 : The Next Frontier of Runtime Assembly Attacks: Leveraging LLMs to Generate Phishing JavaScript in Real Time
- 11:13 : EU To Carry Out Parallel Reviews Of Battling Warner Bros Bids
- 11:13 : Another week, another emergency patch as Cisco plugs Unified Comms zero-day
- 11:13 : OpenWrt One gains support for running Debian
- 11:13 : Tesla, Sony, and Alpine systems compromised on day one of Pwn2Own Automotive 2026
- 11:13 : SmarterMail Auth Bypass Exploited in the Wild Two Days After Patch Release
- 11:13 : Malicious PyPI Package Impersonates SymPy, Deploys XMRig Miner on Linux Hosts
- 11:13 : Over 160,000 Companies Notify Regulators of GDPR Breaches
- 11:5 : IT Security News Hourly Summary 2026-01-22 12h : 11 posts
- 10:34 : Apple Plans Chatbot-Style Siri Release In September
- 10:34 : New Multi-Stage Windows Malware Disables Microsoft Defender, Deploys Malicious Payloads
- 10:34 : Malicious PyPI Package Impersonates sympy-dev, Targeting Millions of Users
- 10:34 : New ClickFix Campaign Exploits Fake Verification Pages to Hijack Facebook Sessions
- 10:34 : Cisco Unified Communications Zero-Day RCE Flaw Actively Exploited For Root Shell Access
- 10:34 : Active Exploitation Of Fortinet SSO Flaw Targets Firewalls For Admin Takeover
- 10:34 : New AI-Android Malware that Auto Clicks Ads from the Infected Devices
- 10:34 : Critical Chainlit AI Vulnerabilities Let Hackers Gain Control Over Cloud Environments
- 10:34 : Critical Vulnerability in Binary-Parser Library for Node.js Allows Malicious Code injection
- 10:34 : New Multi-Stage Windows Malware Disables Microsoft Defender Before Dropping Malicious Payloads
- 10:34 : BIND 9 Vulnerability Allow Attackers to Crash Server by Sending Malicious Records
- 10:2 : OpenAI Chief Visits Middle East Amid Funding Round
- 10:2 : LastPass Warns of Phishing Campaign Targeting Its Customers
- 10:2 : Atlassian, GitLab, Zoom Release Security Patches
- 10:2 : TeraWave space-based network aims for 6 Tbps connectivity worldwide
- 9:36 : House Of Lords Backs Social Media Ban For Under-16s
- 9:36 : 2025 Red Hat Ansible Automation Platform: A year in review
- 9:36 : 2025 was a year of transformative customer success with Red Hat Ansible Automation Platform
- 9:5 : Is AI-Generated Code Secure?, (Thu, Jan 22nd)
- 9:5 : Snap Settles Landmark Social Media Addiction Lawsuit
- 9:4 : Hackers Targeting Cisco Unified CM Zero-Day
- 9:4 : EaseUS Disk Copy 7.0.0 enables backup, restore, and migration without multiple drives connected
- 8:34 : Ryanair Says SpaceX Dispute Boosts Ticket Sales
- 8:34 : U.S. CISA adds a flaw in Cisco Unified Communications products to its Known Exploited Vulnerabilities catalog
- 8:34 : New ClearFake Campaign Leveraging Proxy Execution to Run PowerShell Commands via Trusted Window Feature
- 8:34 : Tesla hacked at Pwn2Own Automotive, Everest sitting on Under Armour data? PurpleBravo fake jobs campaign targets IP addresses
- 8:11 : Silicon In Focus Podcast: The Great MarTech Reset: Simplify, Integrate, and Grow
- 8:11 : Thousands Without Internet After Lincolnshire Cable Theft
- 8:11 : Securing the Future: Practical Approaches to Digital Sovereignty in Google Workspace
- 8:5 : IT Security News Hourly Summary 2026-01-22 09h : 2 posts
- 7:36 : Automated FortiGate Attacks Exploit FortiCloud SSO to Alter Firewall Configurations
- 7:6 : Exposed training apps are showing up in active cloud attacks
- 6:2 : Resurgence of a multi‑stage AiTM phishing and BEC campaign abusing SharePoint
- 6:2 : Unbounded AI use can break your systems
- 5:34 : The internet’s oldest trust mechanism is still one of its weakest links
- 5:15 : Cisco Fixes Actively Exploited Zero-Day CVE-2026-20045 in Unified CM and Webex
- 5:5 : IT Security News Hourly Summary 2026-01-22 06h : 3 posts
- 4:34 : NSFOCUS AI-Scan Gains Recognition from Authoritative Institution
- 4:15 : Fortinet SSO Vulnerability Actively Exploited to Hack Firewalls and Gain Admin Access
- 4:15 : Cisco Unified Communications 0-day RCE Vulnerability Exploited in the Wild to Gain Root Access
- 3:2 : A new framework helps banks sort urgent post-quantum crypto work from the rest
- 2:9 : ISC Stormcast For Thursday, January 22nd, 2026 https://isc.sans.edu/podcastdetail/9776, (Thu, Jan 22nd)
- 2:5 : IT Security News Hourly Summary 2026-01-22 03h : 1 posts
- 1:31 : macOS Tahoe improves privacy and communication safety
- 0:34 : Cisco fixed actively exploited Unified Communications zero day
- 0:7 : Top 8 cybersecurity predictions for 2026
- 23:36 : Davos discussion mulls how to keep AI agents from running wild
- 23:36 : Microsoft updates the security baseline for Microsoft 365 Apps for enterprise
- 23:5 : IT Security News Hourly Summary 2026-01-22 00h : 7 posts
- 22:55 : IT Security News Daily Summary 2026-01-21