44 posts were published in the last hour
- 20:5 : IT Security News Hourly Summary 2026-01-31 21h : 2 posts
- 19:36 : DOJ releases details alleged talented hacker working for Jeffrey Epstein
- 19:14 : Windows Malware Uses Pulsar RAT for Live Chats While Stealing Data
- 17:35 : Ivanti Issues Emergency Fixes After Attackers Exploit Critical Flaws in Mobile Management Software
- 17:7 : NDSS 2025 – PropertyGPT
- 17:5 : IT Security News Hourly Summary 2026-01-31 18h : 1 posts
- 16:7 : CRIL Uncovers ShadowHS: Fileless Linux Post-Exploitation Framework Built for Stealthy Long-Term Access
- 15:9 : Metasploit Update Introduces 7 Exploit Modules Affecting Popular Enterprise Platforms
- 15:9 : SCADA Flaw Enables DoS Condition, Impacting Availability of Affected Systems
- 15:9 : eScan Antivirus Delivers Malware in Supply Chain Attack
- 14:36 : Malicious Chrome Extensions Hijack Affiliate Links and Steal ChatGPT Tokens
- 13:2 : US Seizes $400 Million Linked to Helix Dark Web Crypto Mixer
- 13:2 : Iran-Linked RedKitten Cyber Campaign Targets Human Rights NGOs and Activists
- 12:7 : Jeffrey Epstein Had a ‘Personal Hacker,’ Informant Claims
- 12:7 : BadIIS Malware Used in Coordinated Attacks on Asian Web Servers
- 11:32 : Cyberattacks Disrupt Communications at Wind, Solar, and Heat Facilities in Poland
- 11:11 : How to Film ICE
- 11:5 : IT Security News Hourly Summary 2026-01-31 12h : 1 posts
- 10:31 : AutoPentestX – Automated Penetration Testing Toolkit Designed for Linux systems
- 9:12 : Panera Bread – 5,112,502 breached accounts
- 9:12 : Metasploit Releases 7 New Exploit Modules covering FreePBX, Cacti and SmarterMail
- 9:11 : SCADA Vulnerability Triggers DoS, Potentially Disrupting Industrial Operations
- 9:11 : Mandiant Finds ShinyHunters-Style Vishing Attacks Stealing MFA to Breach SaaS Platforms
- 8:5 : IT Security News Hourly Summary 2026-01-31 09h : 2 posts
- 7:33 : CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms
- 7:7 : Quantifying cyber risk at Netflix, Highmark Health: Case studies
- 6:4 : 2026-01-31: Traffic analysis exercise: Lumma in the room-ah!
- 5:40 : In-Depth Look at Phishing and Cybersecurity Culture with David Shipley | Cybersecurity Today
- 3:34 : 2026-01-30: PhantomStealer infection
- 3:34 : We Keep Hearing the Same Question: Morpheus (AI SOC) vs. Traditional SOAR
- 2:5 : IT Security News Hourly Summary 2026-01-31 03h : 3 posts
- 1:34 : DynoWiper update: Technical analysis and attribution
- 1:34 : This month in security with Tony Anscombe – January 2026 edition
- 1:34 : Friday Squid Blogging: New Squid Species Discovered
- 0:36 : How is Agentic AI changing healthcare security
- 0:36 : What future trends will define Agentic AI governance
- 0:36 : Can Agentic AI ensure full IAM compliance
- 0:36 : How secure are secrets vaults in cloud environments
- 0:8 : Guidance from the Frontlines: Proactive Defense Against ShinyHunters-Branded Data Theft Targeting SaaS
- 0:7 : Vishing for Access: Tracking the Expansion of ShinyHunters-Branded SaaS Data Theft
- 23:7 : Privileged File System Vulnerability Present in a SCADA System
- 23:7 : News brief: Patch critical and high-severity vulnerabilities now
- 23:5 : IT Security News Hourly Summary 2026-01-31 00h : 4 posts
- 22:55 : IT Security News Daily Summary 2026-01-30