210 posts were published in the last hour
- 22:55 : IT Security News Daily Summary 2026-01-31
- 20:5 : IT Security News Hourly Summary 2026-01-31 21h : 2 posts
- 19:36 : DOJ releases details alleged talented hacker working for Jeffrey Epstein
- 19:14 : Windows Malware Uses Pulsar RAT for Live Chats While Stealing Data
- 17:35 : Ivanti Issues Emergency Fixes After Attackers Exploit Critical Flaws in Mobile Management Software
- 17:7 : NDSS 2025 – PropertyGPT
- 17:5 : IT Security News Hourly Summary 2026-01-31 18h : 1 posts
- 16:7 : CRIL Uncovers ShadowHS: Fileless Linux Post-Exploitation Framework Built for Stealthy Long-Term Access
- 15:9 : Metasploit Update Introduces 7 Exploit Modules Affecting Popular Enterprise Platforms
- 15:9 : SCADA Flaw Enables DoS Condition, Impacting Availability of Affected Systems
- 15:9 : eScan Antivirus Delivers Malware in Supply Chain Attack
- 14:36 : Malicious Chrome Extensions Hijack Affiliate Links and Steal ChatGPT Tokens
- 13:2 : US Seizes $400 Million Linked to Helix Dark Web Crypto Mixer
- 13:2 : Iran-Linked RedKitten Cyber Campaign Targets Human Rights NGOs and Activists
- 12:7 : Jeffrey Epstein Had a ‘Personal Hacker,’ Informant Claims
- 12:7 : BadIIS Malware Used in Coordinated Attacks on Asian Web Servers
- 11:32 : Cyberattacks Disrupt Communications at Wind, Solar, and Heat Facilities in Poland
- 11:11 : How to Film ICE
- 11:5 : IT Security News Hourly Summary 2026-01-31 12h : 1 posts
- 10:31 : AutoPentestX – Automated Penetration Testing Toolkit Designed for Linux systems
- 9:12 : Panera Bread – 5,112,502 breached accounts
- 9:12 : Metasploit Releases 7 New Exploit Modules covering FreePBX, Cacti and SmarterMail
- 9:11 : SCADA Vulnerability Triggers DoS, Potentially Disrupting Industrial Operations
- 9:11 : Mandiant Finds ShinyHunters-Style Vishing Attacks Stealing MFA to Breach SaaS Platforms
- 8:5 : IT Security News Hourly Summary 2026-01-31 09h : 2 posts
- 7:33 : CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms
- 7:7 : Quantifying cyber risk at Netflix, Highmark Health: Case studies
- 6:4 : 2026-01-31: Traffic analysis exercise: Lumma in the room-ah!
- 5:40 : In-Depth Look at Phishing and Cybersecurity Culture with David Shipley | Cybersecurity Today
- 3:34 : 2026-01-30: PhantomStealer infection
- 3:34 : We Keep Hearing the Same Question: Morpheus (AI SOC) vs. Traditional SOAR
- 2:5 : IT Security News Hourly Summary 2026-01-31 03h : 3 posts
- 1:34 : DynoWiper update: Technical analysis and attribution
- 1:34 : This month in security with Tony Anscombe – January 2026 edition
- 1:34 : Friday Squid Blogging: New Squid Species Discovered
- 0:36 : How is Agentic AI changing healthcare security
- 0:36 : What future trends will define Agentic AI governance
- 0:36 : Can Agentic AI ensure full IAM compliance
- 0:36 : How secure are secrets vaults in cloud environments
- 0:8 : Guidance from the Frontlines: Proactive Defense Against ShinyHunters-Branded Data Theft Targeting SaaS
- 0:7 : Vishing for Access: Tracking the Expansion of ShinyHunters-Branded SaaS Data Theft
- 23:7 : Privileged File System Vulnerability Present in a SCADA System
- 23:7 : News brief: Patch critical and high-severity vulnerabilities now
- 23:5 : IT Security News Hourly Summary 2026-01-31 00h : 4 posts
- 22:55 : IT Security News Daily Summary 2026-01-30
- 22:36 : Informant told FBI that Jeffrey Epstein had a ‘personal hacker’
- 22:13 : January blues return as Ivanti coughs up exploited EPMM zero-days
- 22:13 : NDSS 2025 – Silence False Alarms
- 21:34 : DevSecOps Aware in Healthcare: SBOM-Driven Supply-Chain Assurance with Policy-Based Cost Guardrails and Continuous Security Validation
- 21:34 : More AI security noise – chatbots going rogue
- 21:34 : Cybersecurity 2026: AI, CISA, manufacturing sector all in the hot seat
- 21:11 : 5 deepfake detection tools to protect enterprise users
- 20:9 : Case study: Securing AI application supply chains
- 20:9 : Explore scaling options for AWS Directory Service for Microsoft Active Directory
- 20:5 : IT Security News Hourly Summary 2026-01-30 21h : 4 posts
- 19:39 : Why Container Security Remains a Challenge for Developers
- 19:39 : CISA Issues New Guidance on Managing Insider Cybersecurity Risks
- 19:11 : Thousands more Oregon residents learn their health data was stolen in TriZetto breach
- 19:11 : AI Compliance Tools: What to Look For – FireTail Blog
- 18:10 : Google Presentations Abused for Phishing, (Fri, Jan 30th)
- 18:10 : Former Google Engineer Convicted of Stealing AI Secrets for China
- 18:9 : Ivanti Fixes Actively Exploited RCE Flaws in Endpoint Manager Mobile
- 18:9 : In Other News: Paid for Being Jailed, Google’s $68M Settlement, CISA Chief’s ChatGPT Leak
- 18:9 : The Complete Guide to Authentication Implementation for Modern Applications
- 18:9 : Ask Me Anything Cyber: Get Hired – Insider Secrets from a Recruiter
- 18:9 : Ask Me Anything Cyber : Inside the Mind of a Hacker
- 17:13 : Apple Adds New iPhone Privacy Setting to Blur Location Data Shared With Carriers
- 17:13 : SoundCloud Data Breach Exposes Nearly 30M User Accounts
- 17:13 : Former Google Engineer Convicted in AI Trade Secret Theft Case
- 17:13 : Russian hackers breached Polish power grid thanks to bad security, report says
- 17:5 : IT Security News Hourly Summary 2026-01-30 18h : 12 posts
- 16:34 : CVE-2026-24061 – GNU InetUtils telnetd Authentication Bypass Vulnerability
- 16:34 : Acumen Cyber Further Strengthens Board with Appointment of Derek Whigham
- 16:34 :
- 16:34 : UAT-8099 Targets Vulnerable IIS Servers Using Web Shells, PowerShell, and Region-Customized BadIIS
- 16:34 : Cisco sees vulnerability exploitation top phishing in Q4
- 16:5 : Microsoft Acknowledges Windows 11 Backlash, Plans Major Improvements in 2026
- 16:5 : Critical Exploits, Data Breaches, and AI Threats Define This Week in Cybersecurity
- 16:5 : AIs Are Getting Better at Finding and Exploiting Security Vulnerabilities
- 16:5 : Dragos Links Coordinated Polish Power Grid Cyberattack to Russia-Backed ELECTRUM Group
- 16:5 : GoTo Resolve Tool Mimics Ransomware Tactics in Stealth Attacks
- 16:5 : Labyrinth Chollima Evolves into Three North Korean Hacking Groups
- 16:5 : How Granite complied with new federal cyber regs before a critical deadline
- 15:34 : Arsink Spyware Posing as WhatsApp, YouTube, Instagram, TikTok Hits 143 Countries
- 15:34 : Nvidia GPU Driver Flaws Enable Privilege Escalation Across Platforms
- 15:34 : Cyber Briefing: 2026.01.30
- 15:34 : Manufacturers fortify cyber defenses in response to dramatic surge in cyberattacks
- 15:5 : Threat Actors Hide Behind School-Themed Domains In Newly Uncovered Bulletproof Infrastructure
- 15:5 : GhostChat Spyware Targets Android Users Through WhatsApp, Steals Sensitive Data
- 15:5 : Hugging Face Repositories Hijacked For Android RAT Delivery, Bypassing Traditional Defenses
- 15:5 : Over 200 Magento Stores Compromised In Rootkit Rampage via Zero-Day Exploit
- 15:5 : TAMECAT PowerShell Backdoor Targets Edge and Chrome: Login Credentials At Risk
- 15:5 : Ex-Google Engineer Convicted of Stealing Google’s AI Secrets For China
- 15:5 : TAMECAT PowerShell-Based Backdoor Exfiltrates Login Credentials from Microsoft Edge and Chrome
- 15:5 : 175,000 Exposed Ollama Hosts Could Enable LLM Abuse
- 15:5 : Aisy Launches Out of Stealth to Transform Vulnerability Management
- 15:5 : Hacking Network Targets Vulnerable Children
- 15:5 : Former Google Engineer Convicted
- 14:34 : Polish Grid Systems Targeted in Cyberattack Had Little Security, Per New Report
- 14:34 : Match, Hinge, OkCupid, and Panera Bread breached by ransomware group
- 14:34 : Researchers Uncover Chrome Extensions Abusing Affiliate Links and Stealing ChatGPT Access
- 14:34 : Two High Severity n8n Flaws Enable RCE
- 14:34 : Arc Raiders And The Finals Hit By DDoS
- 14:34 : Crypto Hackers Target Hinge And Match
- 14:34 : Canada Computers Data Breach Leaks Info
- 14:34 : FBI Seizes Site Catering To Online Crime
- 14:9 : Designing Irreversible Security Release at Hyper-Scale: Lessons Learned From Things You Can’t Undo
- 14:5 : IT Security News Hourly Summary 2026-01-30 15h : 9 posts
- 13:34 : Incentivizing Cybercrime Disruption: Inside Fortinet’s World Economic Forum Annual Meeting 2026 Panel
- 13:34 : Attackers Using Hugging Face Hosting to Deliver Android RAT Payload
- 13:34 : NVIDIA GPU Display Driver Vulnerabilities Allows Code Execution and Privilege Escalation
- 13:34 : Attackers Hijacked 200+ Websites Exploiting Magento Vulnerability to Gain Root-level Access
- 13:34 : 10 Best B2B Fintech SSO Solutions in 2026
- 13:34 : Why API Security Is No Longer an AppSec Problem – And What Security Leaders Must Do Instead
- 13:34 : China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware
- 13:9 : White House Scraps ‘Burdensome’ Software Security Rules
- 13:9 : Google Targets Residential Proxy Services Fueled by Malware Operations
- 12:36 : SmarterTools patches critical SmarterMail flaw allowing code execution
- 12:11 : From if to how: A year of post-quantum reality
- 12:11 : How Banco do Brasil uses hyperautomation and platform engineering to drive efficiency
- 12:11 : GhostChat Spyware Attacking Android Users Via WhatsApp to Exfiltrate Sensitive Details
- 12:11 : TikTok’s privacy update mentions immigration status. Here’s why.
- 12:11 : Microsoft sets new timeline for Sentinel transition to Defender portal
- 12:11 : Badges, Bytes and Blackmail
- 12:11 : New AI-Developed Malware Campaign Targets Iranian Protests
- 11:32 : U.S. CISA adds a flaw in Ivanti EPMM to its Known Exploited Vulnerabilities catalog
- 11:31 : National Crime Agency and NatWest Issue Joint Warning Over Invoice Fraud Threat
- 11:9 : Hugging Face Abused to Deploy Android RAT
- 11:9 : Top 10 B2B Healthcare SaaS SSO Solutions in 2026
- 11:5 : IT Security News Hourly Summary 2026-01-30 12h : 4 posts
- 10:34 : Ex-Google engineer found guilty of stealing AI secrets
- 10:5 : Comcast to Pay $117M in Security Breach Settlement
- 10:5 : Hackers Weaponized Open VSX Extension with Sophisticated Malware After Reaching 5060+ Downloads
- 10:5 : Microsoft Teams New Feature to Flag Suspicious One-to-One Calls
- 10:4 : Education-Themed Malicious Domains Linked to Bulletproof Hosting Infrastructure Exposed
- 10:4 : Critical Ivanti Endpoint Manager 0-day RCE Vulnerabilities Actively Exploited in Attacks
- 10:4 : ICS Devices Bricked Following Russia-Linked Intrusion Into Polish Power Grid
- 10:4 : Agentic AI for Test Workflows. Why Our QA Team Built It and How Testing Changed as a Result
- 9:34 : Apple Sees Sales Surge In China
- 9:34 : Empire Market co-founder faces 10 years to life after guilty plea
- 9:34 : Helpdesk Impersonation: A High-Risk Social Engineering Attack
- 9:5 : Perplexity In Microsoft Cloud Deal Amid Amazon Legal Row
- 9:5 : Ivanti Patches Exploited EPMM Zero-Days
- 9:5 : Arkose Titan Aims to make bot, scraping, and AI fraud economically unviable
- 8:34 : Amazon, Microsoft, Nvidia In OpenAI Investment Talks
- 8:34 : Apple’s new privacy feature limits how precisely carriers track your location
- 8:34 : EFF calls out major tech companies on encryption promises
- 8:34 : France fines unemployment agency, Teams flags calls, UK pushes deterrence
- 8:5 : Germany Plans Space-Based Missile Detection System
- 8:5 : SmarterMail Fixes Critical Unauthenticated RCE Flaw with CVSS 9.3 Score
- 8:5 : Ex-Google Engineer Convicted for Stealing 2,000 AI Trade Secrets for China Startup
- 8:5 : Wireshark 4.6.3 Released With Vulnerabilities Dissector and Parser Crash
- 8:5 : IT Security News Hourly Summary 2026-01-30 09h : 3 posts
- 8:5 : 3,280,081 Fortinet Devices Online With Exposed Web Properties Under Risk
- 8:4 : Hackers Weaponized Open VSX Extension with Sophisticated Malware After Reaching 5066 Downloads
- 7:13 : Why life changes increase digital risk: Are you ready for moving, new jobs, or university?
- 6:34 : Top 5 PCI Compliant Hosting Providers
- 6:34 : Security work keeps expanding, even with AI in the mix
- 6:9 : Security teams are carrying more tools with less confidence
- 5:31 : The Rise of Actionable AI Agents: Navigating the Security Landscape
- 5:14 : New infosec products of the month: January 2026
- 5:13 : Wearable tech adoption continues as privacy worries grow
- 5:13 : Two Ivanti EPMM Zero-Day RCE Flaws Actively Exploited, Security Updates Released
- 5:5 : IT Security News Hourly Summary 2026-01-30 06h : 1 posts
- 4:31 : Microsoft Releases Update for Windows 11, version 25H2 and 24H2 Systems
- 3:13 : Ivanti provides temporary patches for actively exploited EPMM zero-day (CVE-2026-1281)
- 2:13 : ISC Stormcast For Friday, January 30th, 2026 https://isc.sans.edu/podcastdetail/9788, (Fri, Jan 30th)
- 0:36 : Java developers want container security, just not the job that comes with it
- 23:36 : Maybe CISA should take its own advice about insider threats hmmm?
- 23:36 : MY TAKE: Transparent vs. opaque — edit Claude’s personalized memory, or trust ChatGPT’s blindly?
- 23:7 : Turning threat reports into detection insights with AI
- 23:5 : IT Security News Hourly Summary 2026-01-30 00h : 2 posts
- 22:55 : IT Security News Daily Summary 2026-01-29
- 22:34 : MongoDB Ransomware Is Still Actively Hitting Exposed Databases
- 21:38 : Understanding the Russian Cyber Threat to the 2026 Winter Olympics
- 21:38 : Meta confirms it’s working on premium subscription for its apps
- 21:5 : Fintech firm Marquis blames hack at firewall provider SonicWall for its data breach
- 21:5 : Report: Open Source Malware Instances Increased 73% in 2025
- 20:31 : SolarWinds addressed four critical Web Help Desk flaws
- 20:9 : How to get started with security response automation on AWS
- 20:5 : IT Security News Hourly Summary 2026-01-29 21h : 8 posts
- 19:32 : SoundCloud – 29,815,722 breached accounts
- 19:32 : Google Introduces AI-Powered Side Panel in Chrome to Automate Browsing
- 19:32 : Researchers Find 175,000 Publicly Exposed Ollama AI Servers Across 130 Countries
- 19:7 : I’m locked in!
- 19:7 : Python-based PyRAT with Cross-Platform Capabilities and Extensive Remote Access Features
- 19:7 : Beware of Weaponized VS Code Extension Named ClawdBot Agent that Deploys ScreenConnect RAT
- 19:7 : Threat Actors Leverage Google Search Ads for ‘Mac Cleaner’ to Direct Users to Malicious Websites
- 19:7 : Exposed Open Directory Leaks BYOB Framework Across Windows, Linux, and macOS
- 18:32 : Common Cloud Migration Security Mistakes (and How to Avoid Them)
- 18:32 : ICE Pretends It’s a Military Force. Its Tactics Would Get Real Soldiers Killed
- 18:32 : Salt Security Brings “Plain English” Clarity to API Security
- 18:32 : New Microsoft Data Security Index report explores secure AI adoption to protect sensitive data
- 18:9 : Op Bizarre Bazaar: New LLMjacking Campaign Targets Unprotected Models
- 18:9 : Rockwell Automation ControlLogix
- 18:9 : Rockwell Automation ArmorStart LT
- 18:9 : KiloView Encoder Series
- 18:9 : TA584 Actors Leveraging ClickFix Social Engineering to Deliver Tsundere Bot Malware
- 18:9 : 31.4 Tbps DDoS Attack Via Aisuru Botnet Breaks Internet With New World Record
- 18:9 : Essential E-Signature Solutions for Cybersecurity in 2026
- 18:9 : Matanbuchus Malware Downloader Evading AV Detections by Changing Components
- 17:34 : Wordfence Intelligence Weekly WordPress Vulnerability Report (January 19, 2026 to January 25, 2026)
- 17:34 : Google Disrupts Major Residential Proxy Network IPIDEA
- 17:34 : Davos Reflections on AI, Security, and Responsibility
- 17:34 : The Security Debt We Pretend Isn’t There
- 17:34 : Google Disrupts Extensive Residential Proxy Networks
- 17:5 : IT Security News Hourly Summary 2026-01-29 18h : 14 posts
- 17:3 : To stop crims, Google starts dismantling residential proxy network they use to hide
- 17:3 : An AI Toy Exposed 50,000 Logs of Its Chats With Kids to Anyone With a Gmail Account
- 17:3 : AV vendor goes to war with security shop over update server scare