173 posts were published in the last hour
- 22:34 : AI vs AI: Agent hacked McKinsey’s chatbot and gained full read-write access in just two hours
- 22:34 : What is the Salesforce GraphQL Exploit and What You Should Do
- 22:2 : Malicious Chrome Extension Targets imToken Wallet Users
- 22:2 : FBI alert: scammers target zoning permit applicants
- 22:2 : BoryptGrab Stealer Spreads via Fake GitHub Repositories, Stealing Browser and Crypto Wallet Data
- 22:2 : Hackers Use Fake CleanMyMac Site to Deploy SHub Stealer and Hijack Crypto Wallets
- 22:2 : AEO vs GEO vs AIO: What These Terms Actually Mean and Why Your Business Needs to Care
- 22:2 : Trump administration will test infrastructure cybersecurity approaches in pilot program
- 21:34 : AVideo Zero-Click Flaw Lets Attackers Hijack Live Streams
- 20:34 : Survey: CISOs Continue to Struggle to Strike Right Risk Balance
- 20:11 : China-Nexus Activity Against Qatar Observed Amid Expanding Regional Tensions
- 20:11 : RSAC 2026 Conference: Key news and industry analysis
- 20:11 : MaaS VIP Keylogger Campaign Uses Steganography and In-Memory Execution to Steal Credentials at Scale
- 20:11 : Iran-Linked Hackers Target U.S. Critical Infrastructure Amid Rising Cyber Threat Activity
- 20:11 : Conflicting definitions and timelines causing cybersecurity regulation morass, industry reps say
- 20:5 : IT Security News Hourly Summary 2026-03-09 21h : 6 posts
- 19:32 : CleanMyMac Imposter Site Installs SHub Stealer on Macs
- 19:9 : AI in Patient Portals: From Digital Access to Intelligent Healthcare Experiences
- 19:9 : Veeam’s ‘Agent Commander’: Bringing Guardrails and Resilience to the Wild West of AI
- 19:9 : ShinyHunters claims more high-profile victims in latest Salesforce customers data heist
- 19:9 : Meta’s AI Safety Chief Couldn’t Stop Her Own Agent. What Makes You Think You Can Stop Yours?
- 19:9 : Malicious npm Package Posing as OpenClaw Installer Deploys RAT, Steals macOS Credentials
- 18:33 : Identity Crisis: Global Firms Face Mounting Risks Amid AI Surge and Lack of Recovery Testing
- 18:33 : Mental Health Apps With Million Downloads Filled With Security Vulnerabilities
- 18:32 : New Copilot Setting May Access Activity From Other Microsoft Services. Here’s How Users Can Disable It
- 18:32 : Cyberattacks Shift Tactics as Hackers Exploit User Behavior and AI, Experts Warn
- 18:32 : OpenAI to acquire AI security platform Promptfoo
- 18:32 : TEST 3
- 18:11 : OpenAI acquires Promptfoo to secure its AI agents
- 17:34 : 30,000 WordPress Sites Affected by Authentication Bypass Vulnerability in Tutor LMS Pro WordPress Plugin
- 17:34 : Fake CleanMyMac Site Uses ClickFix Trick to Install SHub Stealer on macOS
- 17:34 : CISA Adds Three Known Exploited Vulnerabilities to Catalog
- 17:34 : Vietnam-Based Cybercrime Network Enables Fraudulent Account Signups at Scale
- 17:34 : Signal Confirms Targeted Phishing Attacks Resulting in Account Takeovers
- 17:34 : Randall Munroe’s XKCD ‘Dinosaurs And Non-Dinosaurs’
- 17:34 : Pro-Iranian Hacktivists Join Nation-State Groups in Targeting U.S., Israel, Others
- 17:9 : How to Use AWS IAM Identity Center for Scalable, Compliant Cloud Access Control
- 17:9 : Report Surfaces Higher Correlation Between API and AI Security
- 17:5 : IT Security News Hourly Summary 2026-03-09 18h : 11 posts
- 16:14 : EV charger biz ELECQ zapped by ransomware crooks, customer contact data stolen
- 16:14 : Salt Typhoon is hacking the world’s phone and internet giants. Here’s everywhere that’s been hit.
- 16:14 : Russian government hackers targeting Signal and WhatsApp users, Dutch spies warn
- 16:14 : Russia-linked hackers target Signal, WhatsApp of officials globally
- 16:14 : Cybersecurity M&A Roundup: 42 Deals Announced in February 2026
- 16:14 : ConFoo 2026: Guardrails for Agentic AI, Prompts, and Supply Chains
- 16:13 : UNC4899 Breached Crypto Firm After Developer AirDropped Trojanized File to Work Device
- 16:13 : Trump Administration Unveils New Cyber Strategy for America
- 16:13 : Threat Actor Exploits Flaws and Uses Elastic Cloud SIEM to Manage Stolen Data
- 16:13 : TeST 2
- 16:13 : State-linked actors targeted US networks in lead-up to Iran war
- 15:32 : World Economic Forum Global Cybersecurity Outlook 2026: Key Takeaways for CISOs
- 15:32 : USENIX Security ’25 (Enigma Track) – Trusted Hardware For Al Workloads: Extending Confidential Computing To Enable Al Adoption
- 15:12 : Encrypted Client Hello: Ready for Prime Time?, (Mon, Mar 9th)
- 15:12 : Security Risk Advisors Releases “The Purple Perspective 2026” Report
- 15:12 : M365Pwned – Red Team GUI Toolkit for Microsoft 365 Exploitation via Graph API
- 15:12 : Microsoft Launches Copilot Cowork, a New AI Feature in Microsoft 365 to Automate Tasks
- 15:11 : ECB Tightens Oversight of Banks’ Growing AI Sector Risks
- 15:11 : Researchers Find Critical Zero-Day Vulnerabilities in Foxit and Apryse PDF Platforms
- 15:11 : AI-Powered Cybercrime Hits 600+ FortiGate Firewalls Across 55 Countries, AWS Warns
- 15:11 : Russian hackers crack into officials’ Signal and WhatsApp accounts
- 15:11 : ⚡ Weekly Recap: Qualcomm 0-Day, iOS Exploit Chains, AirSnitch Attack & Vibe-Coded Malware
- 15:11 : Trump Administration Unveils New Cyber Strategy For America
- 14:35 : Iran’s MuddyWater Hackers Target US Firms with New Dindoor Backdoor
- 14:35 : Celebrating International Women’s Day 2026
- 14:34 : SaaS Application Testing: From Traditional Methods to AI-Powered QA
- 14:34 : Cyber Briefing: 2026.03.09
- 14:5 : Critical Nginx UI Vulnerabilities Allow Attacker to Download a Full System Backup
- 14:5 : IT Security News Hourly Summary 2026-03-09 15h : 17 posts
- 14:5 : ClipXDaemon Emerges as C2-Less Linux Clipboard Hijacker, Targeting Crypto Wallets in X11 Sessions
- 14:5 : UK Launches New Crackdown Unit to Tackle Cyber-Fraud at the Source
- 13:34 : Fake CleanMyMac Site Spreads SHub Stealer, Targets Crypto Wallets
- 13:34 : Why AI Security Is Emerging as the Fourth Pillar of Cybersecurity
- 13:34 : Quiz sites trick users into enabling unwanted browser notifications
- 13:34 : Fake Claude Code install pages hit Windows and Mac users with infostealers
- 13:34 : Dutch cops warn 100 alleged scammers: Turn yourselves in or we tell Grandma
- 13:34 : Secure agentic AI for your Frontier Transformation
- 13:34 : AI Security Startups Dominate New Cyber Innovation Awards
- 13:5 : Russian cybercrims phish their way into officials’ Signal and WhatsApp accounts
- 13:5 : ClickFix Attack Uses Windows Terminal to Evade Detection
- 13:5 : An AI-Powered Poly-Crisis Is Here, and It Is Rewriting Cyber Postures. Are You Breach Ready Yet?
- 13:5 : iProov secures hiring, access, and recovery by verifying the human behind every login
- 13:5 : No more soft play, President Trump warns in new cyber strategy
- 13:5 : Children’s Council SF Breach Probe
- 13:5 : HungerRush Breach Exposes 28M Users
- 13:5 : Russian Hackers Target Dutch Messaging
- 13:5 : Claude AI Finds 22 Firefox Bugs
- 13:5 : Banks Must Refund Phishing Victims
- 12:32 : BoryptGrab Malware Abuses GitHub to Steal Browser and Crypto Wallet Data
- 12:32 : Internet Infrastructure TLD .arpa Abused in Phishing Attacks
- 12:32 : Chrome Extension Goes Rogue After Sale
- 12:10 : Vaultwarden Vulnerabilities Enable Privilege Escalation and Data Exposure
- 12:10 : Cyber Espionage Group CL-UNK-1068 Linked to China Targets Asian Infrastructure
- 12:9 : Iran-Linked Hackers Target U.S. Critical Infrastructure Amid Rising Cyber Threats
- 12:9 : Microsoft Azure CTO set Claude on his 1986 Apple II code, says it found vulns
- 12:9 : Cognizant’s TriZetto Provider Solutions data breach impacted over 3.4 million patients
- 12:9 : Cloned AI Tool Sites Distribute Malware in ‘InstallFix’ Campaign
- 12:9 : IT Governance as a Prerequisite for Zero-Trust Identity Architecture
- 12:9 : OpenWrt 25.12.0 ships with new package manager, built-in upgrade tool, support for 2200+ devices
- 12:9 : Can the Security Platform Finally Deliver for the Mid-Market?
- 12:9 : Keep Your Kids Safe on Roblox: A Parent’s Handbook
- 12:9 : Ask Me Anything about Autonomous Cyber
- 11:34 : AI Bot Hackerbot-Claw Targets Microsoft, DataDog and CNCF GitHub Repos
- 11:34 : MaaS VIP Keylogger Campaign Uses Steganography to Steal Credentials at Scale
- 11:34 : Apache ZooKeeper Flaw Exposes Sensitive Data to Attackers
- 11:34 : Transparent Tribe’s ‘Vibeware’ Shift Signals Rise of AI-Generated Malware at Industrial Scale
- 11:9 : Telco Strategies for Consumer Security 2026
- 11:9 : Fake Claude Code install pages highlight rise of “InstallFix” attacks
- 11:9 : TriZetto Provider Solutions Breach Hits 3.4 Million Patients
- 11:5 : IT Security News Hourly Summary 2026-03-09 12h : 5 posts
- 10:34 : ClipXDaemon Malware Targets Crypto Users in Linux X11 Sessions
- 10:34 : More AI tools, more burnout! New research explains why
- 10:34 : Chrome Extension Turns Malicious After Ownership Transfer, Enabling Code Injection and Data Theft
- 10:5 : From Narrative to Knowledge Graph | LLM-Driven Information Extraction in Cyber Threat Intelligence
- 10:5 : Cybercrime Group in Vietnam Enables Massive Fraudulent Signups
- 10:5 : Augur lands $15 million funding to strengthen critical infrastructure security
- 10:4 : Ghanaian Pleads Guilty to Role in $100m Romance Scam
- 9:34 : Royal Navy races to arm ships against drone threat
- 9:34 : Managing App Access on Frontline Devices in an Always-On World
- 9:34 : 112 or 22 to 2: Who Moved the Vulnerability Cheese?
- 9:34 : Optimizely Reports Data Breach Linked to Sophisticated Vishing Incident
- 9:34 : OpenAI joins the race in AI-assisted code security
- 9:34 : How AI will impact security careers and what leaders should do about it
- 9:34 : 4 best practices to get IAM implementation right the first time
- 9:12 : US Plans AI Chip Export Rules For All Countries
- 9:12 : 1-Click ZITADEL Vulnerability Could Allow Full System Takeover
- 9:11 : CISA Warns of macOS and iOS Vulnerabilities Exploited in Attacks
- 9:11 : Microsoft Warns Fake AI Browser Extensions Compromised Chat Histories Across 20,000+ Enterprise Tenants
- 9:11 : Hikvision Multiple Products Vulnerability Allows Malicious Users to Escalate Privileges
- 9:11 : Critical ExifTool Flaw Lets Malicious Images Trigger Code Execution on macOS
- 9:11 : A week in security (March 2 – March 8)
- 9:11 : 7 Most Influential Women in Cybersecurity You Should Follow in 2026
- 8:36 : Oracle To Cut Thousands Of Jobs Amid AI Cash Crunch
- 8:5 : IT Security News Hourly Summary 2026-03-09 09h : 11 posts
- 8:2 : London Officials Plan Data Centre Policy Amid Backlash
- 8:2 : Anthropic Claude Opus AI model discovers 22 Firefox bugs
- 8:2 : A week in security (March 2 – March 8)
- 8:2 : Web Server Exploits and Mimikatz Used in Attacks Targeting Asian Critical Infrastructure
- 7:34 : Nginx UI Vulnerabilities Let Attackers Download Full System Backups
- 7:34 : Decoding silence: How deaf and hard-of-hearing pros are breaking into cybersecurity
- 7:34 : FBI network breach, GitHub distributes stealer, Hackers abuse .arpa
- 7:11 : Infostealers: What They Are, How They Work, and How to Stop Them
- 7:11 : Hikvision Multiple Product Vulnerability Could Let Attackers Escalate Privileges
- 7:11 : ExifTool Vulnerability Lets Malicious Images Trigger macOS Code Execution
- 7:11 : DumpBrowserSecrets – Browser Credential Harvesting with App-Bound Encryption Bypass
- 6:34 : TrendAI™ at [un]prompted 2026: From KYC Exploits to Agentic Defense
- 6:34 : Open-source tool Sage puts a security layer between AI agents and the OS
- 6:34 : Turning expertise into opportunity for women in cybersecurity
- 6:7 : Transparent Tribe’s ‘Vibeware’ Move Points to AI-Made Malware at Scale
- 6:7 : Critical ExifTool Vulnerability Allows Malicious Images to Execute Code on macOS
- 6:7 : Product Showcase: Fing Desktop puts network visibility on your screen
- 5:38 : WiFi Signals Can Track Human Activity Through Walls by Mapping Body Keypoints
- 5:38 : Submarine cables move to the center of critical infrastructure security debate
- 5:9 : CISA Alerts Users to Actively Exploited Vulnerabilities Impacting macOS and iOS
- 5:9 : Microsoft: Fake AI Extensions Breached Chat Histories in 20,000+ Enterprise Tenants
- 5:9 : Ring’s Jamie Siminoff has been trying to calm privacy fears since the Super Bowl, but his answers may not help
- 5:9 : Zero Tolerance for Malicious Intrusions—NSFOCUS’s Full-Chain WEB Security Protection System
- 5:9 : Coruna iOS Exploit Kit Goes Mass-Market: Cybersecurity Today for March 9, 2026 with David Shipley
- 5:5 : IT Security News Hourly Summary 2026-03-09 06h : 2 posts
- 4:34 : WiFi Signals Reveal Human Activities Through Walls by Mapping Body Keypoints
- 4:34 : How Chinese Hackers Reached America’s Surveillance Infrastructure
- 2:9 : ISC Stormcast For Monday, March 9th, 2026 https://isc.sans.edu/podcastdetail/9840, (Mon, Mar 9th)
- 2:5 : IT Security News Hourly Summary 2026-03-09 03h : 1 posts
- 1:34 : Iran is the first out-loud cyberwar the US has fought
- 0:36 : Granular Policy Enforcement in Quantum Secure Discovery Services
- 0:11 : How AI Assistants are Moving the Security Goalposts
- 23:34 : Ring doorbells: Won’t you see my neighbor? (Lock and Code S07E05)
- 23:34 : FBI is investigating breach that may have hit its wiretapping tools
- 23:34 : Why proactive AI agents redefine enterprise security
- 23:34 : How are NHIs driving innovation in cybersecurity
- 23:34 : How does AI ethics influence trust in Autonomous Systems
- 23:5 : IT Security News Hourly Summary 2026-03-09 00h : 2 posts
- 22:58 : IT Security News Weekly Summary 10
- 22:55 : IT Security News Daily Summary 2026-03-08