46 posts were published in the last hour
- 22:31 : ICE Asks Companies About ‘Ad Tech and Big Data’ Tools It Could Use in Investigations
- 21:4 : NDSS 2025 – Secure Data Analytics
- 20:5 : IT Security News Hourly Summary 2026-01-24 21h : 1 posts
- 19:33 : Osiris ransomware emerges, leveraging BYOVD technique to kill security tools
- 19:4 : DAST vs Penetration Testing: Key Differences in 2026
- 19:4 : [Webinar] Doing More With Less: How Security Teams Escape Manual Work with Efficient Workflows
- 19:4 : How Generative AI Is Accelerating Password Attacks on Active Directory
- 18:35 : CISA Warns of Critical VMware vCenter RCE Vulnerability Now Exploited in Attacks
- 18:7 : FBI Accessed Windows Laptops After Microsoft Shared BitLocker Recovery Keys
- 17:31 : Suspicious Polymarket Bets Spark Insider Trading Fears After Maduro’s Capture
- 15:9 : Attackers Leveraging telnetd Exploit for Root Privileges After PoC Goes Public
- 15:9 : Researchers Uncover Multi-Stage AiTM Attack Using SharePoint to Bypass Security Controls
- 15:9 : Microsoft Shared BitLocker Recovery Keys with the FBI to Unlock Encrypted Laptop Data
- 15:9 : Microsoft Open-Sources winapp, a New CLI Tool for Streamlined Windows App Development
- 15:9 : Microsoft Teams to Begin Sharing Employee Location with Employers Based on Wi-Fi Networks
- 15:9 : Lego’s Move Into Smart Toys Faces Scrutiny From Play Professionals
- 15:9 : Chrome WebView Flaw Lets Hackers Bypass Security, Update Urgently Advised
- 12:7 : DOGE May Have Misused Social Security Data, DOJ Admits
- 12:7 : Microsoft Teams to Share your Location With Your Employer Soon Based on Wi-Fi Network
- 11:31 : U.S. CISA adds a flaw in Broadcom VMware vCenter Server to its Known Exploited Vulnerabilities catalog
- 11:31 : ISO 27001:2013 vs 2022 – A Quick Comparison Guide
- 11:31 : Multi-Stage Phishing Campaign Targets Russia with Amnesia RAT and Ransomware
- 11:5 : IT Security News Hourly Summary 2026-01-24 12h : 1 posts
- 10:9 : UK border tech budget swells by £100M as Home Office targets small boat crossings
- 9:5 : Microsoft Launches Open-Source WinApp CLI to Streamline Windows App Development
- 9:5 : Threat Actors Leverage SharePoint Services in Sophisticated AiTM Phishing Campaign
- 9:5 : Nike Probing Potential Security Incident as Hackers Threaten to Leak Data
- 9:5 : CISA Adds Actively Exploited VMware vCenter Flaw CVE-2024-37079 to KEV Catalog
- 9:5 : Who Approved This Agent? Rethinking Access, Accountability, and Risk in the Age of AI Agents
- 9:5 : New DynoWiper Malware Used in Attempted Sandworm Attack on Polish Power Sector
- 8:5 : IT Security News Hourly Summary 2026-01-24 09h : 2 posts
- 7:36 : Children and chatbots: What parents should know
- 7:36 : ESET Research: Sandworm behind cyberattack on Poland’s power grid in late 2025
- 5:36 : Hackers Exploiting telnetd Vulnerability for Root Access – Public PoC Released
- 5:36 : Microsoft Shares BitLocker Keys with FBI to Unlock Encrypted Laptops in Guam Fraud Investigation
- 5:36 : VoidLink: An In-Depth Look at the Nest Generation of AI Generated Malware
- 5:6 : Android Malware Uses Artificial Intelligence to Secretly Generate Ad Clicks
- 3:2 : Top 10 World’s Best Data Security Companies in 2026
- 2:5 : IT Security News Hourly Summary 2026-01-24 03h : 1 posts
- 1:31 : 11-Year-Old critical telnetd flaw found in GNU InetUtils (CVE-2026-24061)
- 0:58 : CISA won’t attend infosec industry’s biggest conference this year
- 0:18 : Happy 9th Anniversary, CTA: A Celebration of Collaboration in Cyber Defense
- 23:34 : Updated PCI PIN compliance package for AWS Payment Cryptography now available
- 23:15 : From runtime risk to real‑time defense: Securing AI agents
- 23:5 : IT Security News Hourly Summary 2026-01-24 00h : 8 posts
- 22:55 : IT Security News Daily Summary 2026-01-23