144 posts were published in the last hour
- 22:36 : CVE-2025-22225 in VMware ESXi now used in active ransomware attacks
- 22:6 : OpenClaw or Open Door? Prompt Injection Creates AI Backdoors
- 21:32 : What’s new in post-quantum cryptography in RHEL 10.1
- 21:31 : AWS intruder achieved admin access in under 10 minutes thanks to AI assist, researchers say
- 21:31 : IT Gives, Security Takes Away, and Configuration Drift Is the Hidden Cost
- 20:36 : Ingress-Nginx Vulnerability Enables Code Execution in Kubernetes
- 20:36 : Taiwanese operator of Incognito Market sentenced to 30 years over $105M darknet drug ring
- 20:9 : Notepad++ Users, You May Have Been Hacked by China
- 20:9 : The ‘Absolute Nightmare’ in Your DMs: OpenClaw Marries Extreme Utility with ‘Unacceptable’ Risk
- 20:9 : Tribal Health Clinics in California Report Patient Data Exposure
- 20:5 : IT Security News Hourly Summary 2026-02-04 21h : 1 posts
- 19:32 : ACFW firewall test prologue – still failing at the basics
- 19:4 : Top open source and commercial threat intelligence feeds
- 19:4 : DEAD#VAX Malware Campaign Deploys AsyncRAT via IPFS-Hosted VHD Phishing Files
- 19:4 : Microsoft Develops Scanner to Detect Backdoors in Open-Weight Large Language Models
- 18:32 : Chrome Vulnerabilities Allow Code Execution and Browser Crashes
- 18:32 : False Negatives Are a New SOC Headache. Here’s the Fast Way to Fix It
- 18:32 : Interlock Ransomware Actors New Tool Exploiting Gaming Anti-Cheat Driver 0-Day to Disable EDR and AV
- 18:32 : PhantomVAI Custom Loader Uses RunPE Utility to Attack Users
- 18:32 : SystemBC Botnet Hijacked 10,000 Devices Worldwide to Use for DDoS Attacks
- 18:32 : Critical SolarWinds Web Help Desk bug under attack
- 18:32 : Managed SaaS Threat Detection | AppOmni Scout
- 18:32 : Detecting backdoored language models at scale
- 18:7 : Hackers publish personal information stolen during Harvard, UPenn data breaches
- 17:32 : AI-Driven Attack Gains AWS Admin Privileges in Under 10 Minutes
- 17:32 : Researchers Disclose Patched Flaw in Docker AI Assistant that Enabled Code Execution
- 17:32 : Federal Agencies Worldwide Hunt for Black Basta Ransomware Leader
- 17:31 : Why Cloud Outages Turn Identity Systems into a Critical Business Risk
- 17:12 : Why Hydrolix Partnered with Akamai to Solve Observability at Scale
- 17:12 : Exposed AWS Credentials Lead to AI-Assisted Cloud Breach in 8 Minutes
- 17:12 : Chinese Mustang Panda Used Fake Diplomatic Briefings to Spy on Officials
- 17:12 : Critical ASUSTOR NAS Security Flaw Enables Complete Device Takeover
- 17:12 : PhantomVAI Custom Loader Abuses RunPE Utility to Launch Stealthy Attacks on Users
- 17:12 : New AI-Powered Threat Allows Hackers to Gain AWS Admin Access in Minutes
- 17:12 : TP-Link Vulnerabilities Let Hackers Take Full Control of Devices
- 17:12 : Read All Jeffrey Epstein Files Here: The 2026 Public Disclosure
- 17:12 : Celebrating the 2025 Check Point Software EMEA Partner Award Winners — Recognizing Excellence Across the Region
- 17:12 : Amaranth-Dragon: Targeted Cyber Espionage Campaigns Across Southeast Asia
- 17:12 : Windows Shutdown Bug Spreads to Windows 10, Microsoft Confirms
- 17:12 : Microsoft: Info-Stealing malware expands from Windows to macOS
- 17:12 : GreyNoise tracks massive Citrix Gateway recon using 63K+ residential proxies and AWS
- 17:12 : Paris raid on X focuses on child abuse material allegations
- 17:12 : US Declassifies Information on JUMPSEAT Spy Satellites
- 17:12 : Defending Against AI-Powered Cyber Attacks: Why Your Blue Team Needs New Skills
- 17:11 : OT attacks surge as threat actors embrace cloud and AI, warns Forescout
- 17:11 : Five Predictions for Cyber Security Trends in 2026
- 17:11 : CISA Warns of GitLab Community and Enterprise Editions SSRF Vulnerability Exploited in Attacks
- 17:11 : Threat Actors Abuse Microsoft & Google Platforms to Attack Enterprise Users
- 17:11 : ValleyRAT Mimic as LINE Installer Attacking Users to Steal Login Details
- 17:11 : Supply Chain Attack Abused Notepad++ Update Infrastructure to Deliver Targeted Malware
- 17:11 : Firefox is giving users the AI off switch
- 17:11 : Grok continues producing sexualized images after promised fixes
- 17:11 : Universal £7,500 payout offered to PSNI staff over major data breach
- 17:11 : Nitrogen ransomware is so broken even the crooks can’t unlock your files
- 17:11 : Orion Raises $32 Million for Data Security
- 17:11 : Varonis Acquisition of AllTrue.ai Valued at $150 Million
- 17:11 : Cyber Insights 2026: Cyberwar and Rising Nation State Threats
- 17:11 : Vulnerabilities Allowed Full Compromise of Google Looker Instances
- 17:10 : Blockchain Intelligence Firm TRM Labs Raises $70 Million at $1 Billion Valuation
- 17:10 : DMARC Alerts in Slack
- 17:10 : Disclosure: SupportCandy Ticket Attachment IDOR (CVE-2026-1251)
- 17:10 : MomentProof Deploys Patented Digital Asset Protection
- 17:10 : Why Moltbook Changes the Enterprise Security Conversation
- 17:10 : Beyond the Chatbot: Why NIST is Rewriting the Rules for Autonomous AI
- 17:10 : Orchid Security Debuts Continuous Identity Observability Platform
- 17:10 : Iconics SCADA Flaw Enables Privileged File Abuse and Windows DoS
- 17:10 : PDFSider Malware Used in Fortune 100 Finance Ransomware Attack
- 17:10 : Major vulnerabilities found in Google Looker, putting self-hosted deployments at risk
- 17:10 : SECNAP CloudJacket MXDR integrates SOC, SIEM, and NDR
- 17:10 : ConnectSecure introduces Linux patching capability to simplify cross-distro updates
- 17:10 : Incognito dark web drug market operator gets 30 years in prison
- 17:10 : The First 90 Seconds: How Early Decisions Shape Incident Response Investigations
- 17:10 : Orchid Security Introduces Continuous Identity Observability for Enterprise Applications
- 17:10 : China-Linked Amaranth-Dragon Exploits WinRAR Flaw in Espionage Campaigns
- 17:9 : SolarWinds Web Help Desk Vulnerability Actively Exploited
- 17:9 : Two Critical Flaws in n8n AI Workflow Automation Platform Allow Complete Takeover
- 17:9 : AI Drives Doubling of Phishing Attacks in a Year
- 17:9 : New Technical Markers Reveal Expanding ShadowSyndicate Cybercriminal Infrastructure
- 17:9 : Global SystemBC Botnet Found Active Across 10,000 Infected Systems
- 17:9 : Custom method functions removed from the OpenSSL Library
- 17:9 : Spain To Ban Social Media For Kids
- 17:9 : Incognito Dark Web Market Owner Sentenced
- 17:9 : French Prosecutors Raid X Offices
- 17:9 : Fraud 101 (Third Edition)
- 17:9 : Cyber Briefing: 2026.02.04
- 10:7 : Malicious Script Delivering More Maliciousness, (Wed, Feb 4th)
- 10:7 : French Police Raid X Paris Offices
- 10:7 : China Bans Concealed EV Door Handles
- 10:7 : US Justice Dept, States Appeal Google Search Remedies
- 10:7 : Hackers Exfiltrate NTDS.dit File, Gain Full Control of Active Directory Environments
- 10:7 : CISA Warns of Exploited GitLab Community and Enterprise SSRF Vulnerability
- 10:7 : Fresh SolarWinds Vulnerability Exploited in Attacks
- 10:7 : Cryptominers, Reverse Shells Dropped in Recent React2Shell Attacks
- 10:7 : Avast brings deepfake scam detection to Windows PCs and mobile devices
- 9:32 : Apple Xcode 26.3 adds coding agent support from OpenAI and Anthropic
- 9:9 : Phishing Campaigns Abuse Trusted Cloud Platforms, Raising New Risks for Enterprises
- 9:9 : Threat Actors Conduct Widespread Scanning for Exposed Citrix NetScaler Login Pages
- 9:9 : Security Analysis of Moltbook Agent Network: Bot-to-Bot Prompt Injection and Data Leaks
- 9:9 : Alert Fatigue: Why SOCs Are Fighting the Wrong Battle
- 9:9 : Rebrand Cybersecurity from “Dr. No” to “Let’s Go”
- 9:9 : Fingerprint enables enterprises to tell trusted AI agents apart from bots and scrapers
- 9:9 : Socure unifies identity, fraud, and program integrity for government at scale
- 9:9 : Microsoft Warns Python Infostealers Target macOS via Fake Ads and Installers
- 8:37 : CISA Adds SolarWinds Web Help Desk RCE Flaw to Known Exploited Vulnerabilities List
- 8:37 : Chrome Vulnerabilities Let Attackers Execute Arbitrary Code and Crash System
- 8:36 : AI is Supercharging Work…and Your Attack Surface
- 8:36 : Building a Zero-Trust Framework for Cloud Banking
- 8:36 : Detectify Internal Scanning finds and fixes vulnerabilities behind the firewall
- 8:36 : Metro bug, more social bans, leaky Moltbook
- 8:7 : Chrome Flaws Enable Arbitrary Code Execution and System Crashes
- 8:7 : ValleyRAT Masquerades as LINE Installer to Target Users and Harvest Login Credentials
- 8:7 : Navigating the AI Revolution in Cybersecurity: Risks, Rewards, and Evolving Roles
- 8:5 : IT Security News Hourly Summary 2026-02-04 09h : 4 posts
- 7:38 : Microsoft and Google Platforms Abused in New Enterprise Cyberattacks
- 7:38 : Orion Security raises $32 million to build AI-powered data loss prevention solution
- 7:38 : CISA Adds Actively Exploited SolarWinds Web Help Desk RCE to KEV Catalog
- 7:38 : Eclipse Foundation Mandates Pre-Publish Security Checks for Open VSX Extensions
- 7:2 : Ingress-NGINX Flaw Enables Arbitrary Code Execution Attacks
- 6:31 : Shadow DNS Operation Abuses Compromised Routers to Manipulate Internet Traffic
- 6:31 : Global Threat Map: Open-source real-time situational awareness platform
- 6:11 : Critical Django Flaw Allows DoS and SQL Injection Attacks
- 6:11 : Chrome Add-On Caught Stealing Amazon Commissions
- 6:11 : Why incident response breaks down when it matters most
- 6:11 : How Secure by Design helps developers build secure software
- 5:38 : One Identity Appoints Gihan Munasinghe as Chief Technology Officer
- 5:38 : Hackers Actively Exploit React Native Metro Server to Target Software Developers
- 5:38 : Clouds rush to deliver OpenClaw-as-a-service offerings
- 5:38 : Critical Cybersecurity Updates: Fortinet, Docker, and Android Malware
- 5:7 : Microsoft Outlines Three-Stage Plan to Disable NTLM and Strengthen Windows Security
- 5:6 : Why Emails Pretending to Be from NGOs and Banks Are Becoming More Dangerous
- 5:6 : Auto finance fraud is costing dealers up to $20,000 per incident
- 5:5 : IT Security News Hourly Summary 2026-02-04 06h : 1 posts
- 4:5 : Visa Application Process: Costs and Requirements
- 3:6 : Hackers Exploiting React Server Components Vulnerability in the Wild to Deploy Malicious Payloads
- 2:13 : ISC Stormcast For Wednesday, February 4th, 2026 https://isc.sans.edu/podcastdetail/9794, (Wed, Feb 4th)
- 0:11 : Why Smart People Fall For Phishing Attacks
- 0:11 : AI agents can’t yet pull off fully autonomous cyberattacks – but they are already very helpful to crims
- 23:36 : How does innovation in agentic AI impact financial security
- 23:36 : What ensures NHI are protected in cloud platforms
- 23:36 : How advanced Agentic AI helps you stay ahead in compliance
- 23:36 : Are your secrets safe from cyber threats
- 23:9 : Security Researchers Breach Moltbook in Record Time
- 23:5 : IT Security News Hourly Summary 2026-02-04 00h : 3 posts
- 22:55 : IT Security News Daily Summary 2026-02-03