167 posts were published in the last hour
- 22:7 : Empowering the RAF Association with Next-Generation Cyber Resilience
- 22:7 : NDSS 2025 – BinEnhance
- 21:34 : U.S. CISA adds SolarWinds Web Help Desk, Sangoma FreePBX, and GitLab flaws to its Known Exploited Vulnerabilities catalog
- 21:11 : PDFly Variant Uses Custom PyInstaller Tweaks to Obfuscate Payload, Thwarting Analysis
- 21:11 : Fake Compliance Emails Weaponize Word and PDF Attachments to Steal Sensitive Data
- 21:11 : Fake Dropbox Phishing Campaign Targets Users, Steals Login Credentials
- 21:11 : Infostealer Attacks Hit macOS, Abusing Python and Trusted Platforms
- 21:11 : GlassWorm Infiltrates VSX Extensions With 22,000+ Downloads to Target Developers
- 21:11 : Infostealer Campaigns Expand to macOS as Attackers Abuse Python and Trusted Platforms
- 21:11 : GlassWorm Infiltrated VSX Extensions with More than 22,000 Downloads to Attack Developers
- 21:11 : AI-ISAC inches forward under Trump administration
- 20:15 : The Paramilitary ICE and CBP Units at the Center of Minnesota’s Killings
- 20:5 : IT Security News Hourly Summary 2026-02-03 21h : 7 posts
- 19:34 : How to Verify Domain Ownership: A Technical Deep Dive
- 19:34 : Beware of Fake Dropbox Phishing Attack that Harvest Login Credentials
- 19:34 : National cyber director solicits industry help in fixing regulations, threat information-sharing
- 19:9 : Critical React Native Metro dev server bug under attack as researchers scream into the void
- 19:9 : Homeland Security is trying to force tech companies to hand over data about Trump critics
- 19:9 : Adversarial Exposure Validation for Modern Environments
- 19:9 : National cyber director solicits industry help in fixing regulations, threat informationsharing
- 18:34 : 2026-02-03: GuLoader for AgentTesla style malware with FTP data exfiltration
- 18:34 : Microsoft SDL: Evolving security practices for an AI-powered world
- 18:34 : Hundreds of Malicious Crypto Trading Add-Ons Found in Moltbot/OpenClaw
- 18:16 : Op Neusploit: Russian APT28 Uses Microsoft Office Flaw in Malware Attacks
- 18:15 : New Microsoft Update Improves Windows Sign-In Experience
- 18:15 : French police search X office in Paris, summon Elon Musk for questioning
- 18:15 : Chinese Money Laundering Jargon via Google’s Gemini
- 18:15 : The ‘Invisible Risk’: 1.5 Million Unmonitored AI Agents Threaten Corporate Security
- 18:15 : Docker Fixes Critical Ask Gordon AI Flaw Allowing Code Execution via Image Metadata
- 17:35 : Quarterly WordPress Threat Intelligence Report – Q4 2025
- 17:35 : Flare Report: Infostealers Are Fueling Enterprise Identity Attacks
- 17:35 : Mitsubishi Electric FREQSHIP-mini for Windows
- 17:34 : RISS SRL MOMA Seismic Station
- 17:34 : Avation Light Engine Pro
- 17:34 : Synectix LAN 232 TRIO
- 17:34 : Foxit PDF Editor Vulnerabilities Let Attackers Execute Arbitrary JavaScript
- 17:34 : Hackers Exploiting React Native’s Metro Server in the Wild to Attack Developers
- 17:34 : An AI plush toy exposed thousands of private chats with children
- 17:34 : CISA updated ransomware intel on 59 bugs last year without telling defenders
- 17:34 : French Police Raid X Paris Office, Summon Musk Over Grok Deepfakes
- 17:34 : Security Is Shifting From Prevention to Resilience
- 17:34 : Experts Find Malicious ClawHub Skills Stealing Data from OpenClaw
- 17:34 : CrossCurve Bridge Hit by $3 Million Exploit after Smart Contract Flaw
- 17:11 : French police search X office in Paris, summons Elon Musk for questioning
- 17:11 : Practical Fraud Prevention
- 17:11 : Critical flaws in Ivanti EPMM lead to fast-moving exploitation attempts
- 17:5 : IT Security News Hourly Summary 2026-02-03 18h : 11 posts
- 16:34 : How deepfake scams are fueling a new wave of fraud
- 16:34 : Hackers abused React Native CLI flaw to deploy Rust malware before public disclosure
- 16:34 : Using AI Agents to Separate Real Risk From Vulnerability Noise
- 16:34 : French Police Raid X Paris Office, Summons Musk Over Grok Deepfakes
- 16:34 : SQL Injection Flaw Affects 40,000 WordPress Sites
- 16:34 : Hundreds of Malicious Crypto Trading Addons Found in Moltbot/OpenClaw
- 16:13 : PDFly Variant Uses Custom PyInstaller Modification, Forcing Analysts to Reverse-Engineer Decryption
- 16:13 : Beware of New Compliance Emails Weaponizing Word/PDF Files to Steal Sensitive Data
- 16:13 : Stronger Incident Prevention Takes Just One CISO Decision
- 16:13 : RADICL Raises $31 Million for vSOC
- 16:13 : National cybersecurity strategies depend on public-private trust, report warns
- 15:33 : Hundreds of Malicious Skills Found in OpenClaw’s ClawHub
- 15:33 : Promptware Threats Turn LLM Attacks Into Multi-Stage Malware Campaigns
- 15:33 : Russian hackers are exploiting recently patched Microsoft Office vulnerability (CVE-2026-21509)
- 15:33 : DockerDash Exposes AI Supply Chain Weakness In Docker’s Ask Gordon
- 15:33 : Cyber Briefing: 2026.02.03
- 15:9 : RapidFort Raises $42M to Automate Software Supply Chain Security
- 15:9 : Rhysida Ransomware Hits California Tribal Clinics, Leaks SSNs and Medical Data
- 15:9 : Gremlin launches Disaster Recovery Testing for zone, region, and datacenter failovers
- 15:9 : Hackers Exploit Metro4Shell RCE Flaw in React Native CLI npm Package
- 15:9 : [Webinar] The Smarter SOC Blueprint: Learn What to Build, Buy, and Automate
- 15:9 : UK ICO Launches Investigation into X Over AI Generated Non-Consensual Sexual Imagery
- 14:39 : JFrog Researchers Surface Vulnerabilities in AI Automation Platform from n8n
- 14:39 : Security Analysts Warn of Shadow Directory Techniques Targeting WordPress
- 14:39 : Ransomware Group Claims Hack of Software Company
- 14:39 : Cl0p Targets Australian IT Providers
- 14:39 : DOJ Seizes Domains Linked To Bulgarian Piracy
- 14:39 : Canadian Hacker Steals $65M And Vanishes
- 14:39 : Nobel Hacking Likely Leaks Winner Name
- 14:7 : Meet Moltbook, the Social Platform Where AI Agents Talk and Humans Watch
- 14:7 : Mozilla Unveils Kill Switch to Disable All Firefox AI features
- 14:7 : Microsoft to Disable NTLM by Default as a Step Towards More Secure Authentication
- 14:7 : French Authorities Raid X Office Following Cybercrime Allegations
- 14:7 : Vulnerability Allows Hackers to Hijack OpenClaw AI Assistant
- 14:7 : Critical React Native Vulnerability Exploited in the Wild
- 14:7 : Download: Tines Voice of Security 2026 report
- 14:7 : Researchers Warn of New “Vect” RaaS Variant
- 14:7 : GRC Study Notes Part 5: Cybersecurity Compliance and Audit Fundamentals
- 14:5 : IT Security News Hourly Summary 2026-02-03 15h : 11 posts
- 13:36 : The Three Most Disruptive Cyber Trends Impacting the Financial Industry Today
- 13:36 : X marks the raid: French cops swoop on Musk’s Paris ops
- 13:36 : French cops raid X’s Paris office in algorithmic bias probe
- 13:36 : Notepad++ supply chain attack: Researchers reveal details, IoCs, targets
- 13:36 : GRC Study Notes Part 3: Risk Management Methods and Tools
- 13:36 : GRC Study Notes Part 4: Security Control Types, Lifecycle, and Defense-in-Depth
- 13:5 : Detecting and Monitoring OpenClaw (clawdbot, moltbot), (Tue, Feb 3rd)
- 13:5 : Microsoft finally sends TLS 1.0 and 1.1 to the cloud retirement home
- 13:5 : Chollima APT Hackers Weaponize LNK File to Deploy Sophisticated Malware
- 13:5 : Beware of Malicious Party Invitations that Tricks Users into Installing Remote Access Tools
- 13:5 : Polish cops bail 20-year-old bedroom botnet operator
- 13:4 : Managing a Security Token Service
- 13:4 : Enabling and Securing Basic Authentication: A Comprehensive Guide
- 13:4 : Cybercrime Unit of Paris Prosecutors Raid Elon Musk’s X Offices in France
- 13:4 : GRC Study Notes Part 2: Frameworks, Standards, and Regulations
- 12:36 : Everest Ransomware Claims 90GB Data Theft Involving Legacy Polycom Systems
- 12:36 : APT28 exploits Microsoft Office flaw in Operation Neusploit
- 12:36 : Microsoft is Giving the FBI BitLocker Keys
- 12:36 : Hackers Leak 5.1 Million Panera Bread Records
- 12:36 : Sandisk brings SPRandom to open source for large SSD testing
- 12:36 : When Cloud Outages Ripple Across the Internet
- 12:12 : Apple’s new iOS setting addresses a hidden layer of location tracking
- 12:12 : AT&T breach data resurfaces with new risks for customers
- 11:38 : Everest Ransomware Claims 90GB Data Theft From HP Inc’s Polycom Systems
- 11:38 : How Data Brokers Can Fuel Violence Against Public Servants
- 11:38 : 16-31 January 2026 Cyber Attacks Timeline
- 11:38 : Russia’s APT28 Rapidly Weaponizes Newly Patched Office Vulnerability
- 11:38 : 95% of AI Projects Are Unproductive and Not Breach Ready
- 11:38 : OpenAI releases Codex macOS app for agent-based software development
- 11:38 : Snowflake makes enterprise data AI-ready with native Postgres in its AI Data Cloud
- 11:38 : Firefox to let users manage and block AI features
- 11:7 : A fake cloud storage alert that ends at Freecash
- 11:7 : Kasada Raises $20 Million for Anti-Bot Expansion
- 11:6 : New Password-Stealing Phishing Campaign Targets Corporate Dropbox Credentials
- 11:5 : IT Security News Hourly Summary 2026-02-03 12h : 5 posts
- 10:34 : Notepad++ infrastructure hack likely tied to China-nexus APT Lotus Blossom
- 10:34 : APT28 Hackers Exploiting Microsoft Office 0-Day in the Wild to Deploy Malware
- 10:34 : Apache Syncope Vulnerability Let Attackers Hijack User Sessions
- 10:34 : DIY AI bot farm OpenClaw is a security ‘dumpster fire’
- 10:13 : Vibe-Coded Moltbook Exposes User Data, API Keys and More
- 9:34 : British military to get legal OK to swat drones near bases
- 9:34 : APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks
- 9:9 : OpenAI Launches Stand-Alone Codex Programming App
- 9:9 : Rocket Maker SpaceX Acquires AI Start-Up xAI
- 9:9 : Malicious Google Play App With 50K+ Downloads Spreads Anatsa Banking Trojan
- 9:9 : Abuse of OpenClaw AI Capabilities Enables Stealthy Malware Campaigns
- 9:9 : GhostChat Malware Locks Victims’ Devices, Demands Passcodes for Restoration
- 9:9 : Mozilla Introduces Global Kill Switch for Firefox AI Capabilities
- 9:9 : Chollima APT Hackers Weaponize LNK Files to Deploy Sophisticated Malware
- 9:9 : Self-Healing AI for Security as Code: A Deep Dive Into Autonomy and Reliability
- 9:9 : Jan Recap: New AWS Privileged Permissions and Services
- 8:36 : The Notepad++ supply chain attack — unnoticed execution chains and new IoCs
- 8:36 : User-Managed Access Overview
- 8:36 : The Future of Single Sign-on: Insights for 2025
- 8:36 : Single Sign-On with External Security Token Services
- 8:36 : The Ultimate Guide to Single Sign-On in 2025
- 8:36 : OpenClaw targets ClawHub users, Notepad++ update delivers malware, APT28 attackers abuse Microsoft Office zero-day
- 8:7 : Oracle Plans $50bn Fund Raise For AI Facilities
- 8:7 : OpenClaw AI Agent Skills Abused by Threat Actors to Deliver Malware
- 8:7 : Hikvision Wireless Access Points Vulnerability Enables Malicious Command Execution
- 8:7 : Malicious App on The Google Play with 50K+ Downloads Deploy Anatsa Banking Malware
- 7:4 : Mozilla Adds One-Click Option to Disable Generative AI Features in Firefox
- 6:32 : Open-source attacks move through normal development workflows
- 6:31 : Why boards must prioritize non-human identity governance
- 5:34 : Cybersecurity jobs available right now: February 3, 2026
- 5:34 : Product showcase: 2FAS Auth – Free, open-source 2FA for iOS
- 5:5 : IT Security News Hourly Summary 2026-02-03 06h : 2 posts
- 5:4 : Notepad++ Hosting Breach Attributed to China-Linked Lotus Blossom Hacking Group
- 4:32 : Italy Steps Up Cyber Defenses as Milano–Cortina Winter Olympics Approach
- 3:11 : WhatsApp Replaces C++ Code To RUST As Shield Billion Users
- 3:11 : Notepad++ Hack Detailed Along With the IoCs and Custom Malware Used
- 2:34 : Configuring WS-Federation Single Sign-on for Resources
- 2:34 : Is the Online Account Service Still Available?
- 2:5 : IT Security News Hourly Summary 2026-02-03 03h : 2 posts
- 2:4 : ISC Stormcast For Tuesday, February 3rd, 2026 https://isc.sans.edu/podcastdetail/9792, (Tue, Feb 3rd)
- 2:4 : A slippery slope: Beware of Winter Olympics scams and other cyberthreats
- 0:31 : Department of Know: CISA’s cryptography categories, Gottumukkala’s ChatGPT gotcha, NTLM says goodbye
- 23:34 : Notepad++ hijacking blamed on Chinese Lotus Blossom crew behind Chrysalis backdoor
- 23:7 : 10 must-have security technologies in 2026
- 23:5 : IT Security News Hourly Summary 2026-02-03 00h : 3 posts
- 22:55 : IT Security News Daily Summary 2026-02-02