177 posts were published in the last hour
- 22:2 : Insights: Increased Risk of Wiper Attacks
- 21:9 : When Proxies Become the Attack Vectors in Web Architectures
- 20:34 : Operation Lightning takes down SocksEscort proxy network blamed for tens of millions in fraud
- 20:34 : Concepts of a Cyberplan
- 20:9 : Security Flaw in WordPress Plugin Puts 400,000 Websites at Risk
- 20:9 : USENIX Security ’25 (Enigma Track) – • Inside Out: Security Designed With, Not For
- 20:9 : IO River Embraces Wasm to Enable Any WAF to Run on Any CDN
- 20:5 : IT Security News Hourly Summary 2026-03-12 21h : 3 posts
- 19:9 : Wordfence Intelligence Weekly WordPress Vulnerability Report (March 2, 2026 to March 8, 2026)
- 19:9 : Feds Takes Down SocksEscort Proxy Network Used in Global Fraud Schemes
- 19:9 : The Prompt Injection Peril and Why AI Agents Are Your Network’s Newest Vulnerability
- 18:34 : Active Directory Flaw Enables SYSTEM Privilege Escalation
- 18:34 : AI Agent Safety Checklist
- 18:34 : US Lawmakers Move to Kill the FBI’s Warrantless Wiretap Access
- 18:34 : Hive0163 Uses AI-Assisted Slopoly Malware for Persistent Access in Ransomware Attacks
- 18:34 : Rust-Based VENON Malware Targets 33 Brazilian Banks with Credential-Stealing Overlays
- 18:5 : This one’s for you, Mom
- 18:5 : Apple patches Coruna exploit kit flaws for older iOS versions
- 18:5 : The Threat Within: How Intelligent Detection Prevented a Potential Internal Malware Incident
- 18:5 : Reuse, Reward: How Banks Can Safely Unlock the Value of Their Data
- 18:5 : Enzoic Expands Protection Against Dark Web Credential Exposure
- 18:5 : Destructive Activity Targeting Stryker Highlights Emerging Supply Chain Risks
- 18:5 : Meta Targets 150K Accounts in Southeast Asia Scam Operation
- 18:5 : Storm-2561 uses SEO poisoning to distribute fake VPN clients for credential theft
- 17:31 : Attackers Hijack Microsoft 365 Accounts Through OAuth Device Code Abuse Without Stealing Passwords
- 17:31 : From transparency to action: What the latest Microsoft email security benchmark reveals
- 17:13 : Hackers Use Cloudflare Human Check to Hide Microsoft 365 Phishing Pages
- 17:13 : Law enforcement shuts down botnet made of tens of thousands of hacked routers
- 17:13 : Google API Keys Expose Gemini AI Data via Leaked Credentials
- 17:13 : How to manage the lifecycle of Amazon Machine Images using AMI Lineage for AWS
- 17:5 : IT Security News Hourly Summary 2026-03-12 18h : 12 posts
- 16:34 : 400K WordPress Sites Exposed by Elementor Ally Plugin SQL Flaw
- 16:34 : How ‘Handala’ Became the Face of Iran’s Hacker Counterattacks
- 16:34 : Operating Lightning takes down SocksEscort proxy network blamed for tens of millions in fraud
- 16:16 : Top 5 Security Operations Consulting Firms for Government Contractors
- 16:16 : Siemens Heliox EV Chargers
- 16:16 : Trane Tracer SC, Tracer SC+, and Tracer Concierge
- 16:16 : Siemens SIMATIC
- 16:16 : Siemens RUGGEDCOM APE1808 Devices
- 16:16 : Siemens SIDIS Prime
- 16:15 : Apple issues emergency fixes for Coruna flaws in older iOS versions
- 16:15 : Critical MediaTek Vulnerability Lets Attackers Steal Android Phone PINs in 45 Seconds
- 16:15 : PixRevolution Malware Hijacks Brazil’s PIX Transfers in Real Time
- 15:34 : Bell Ambulance Confirms Data Breach Affecting 237,830 Individuals
- 15:34 : DPoP: What It Is, How It Works, and Why Bearer Tokens Aren’t Enough
- 15:34 : Critical Zero-Click Flaw in n8n Allows Full Server Compromise
- 15:7 : Meta Rolls Out New Scam Alerts Across Facebook, WhatsApp, and Messenger
- 15:7 : Iran-Linked Hacktivists Hit Stryker, Knocking Employees Offline Across Multiple Countries
- 15:7 : Top AI SOC Analyst Platforms in 2026
- 15:7 : Microsoft Copilot Email and Teams Summarization Vulnerability Enables Phishing Attacks
- 15:7 : Apple Updates Legacy iOS Versions to Patch Coruna Exploits
- 15:7 : AI-Powered Threats Targeting High-Profile Individuals
- 15:7 : Post-Quantum Cryptography for Authentication: The Enterprise Migration Guide 2026
- 15:7 : Silent Scam Calls Used to Verify Active Phone Numbers, Cybersecurity Experts Warn
- 15:7 : Detecting and analyzing prompt abuse in AI tools
- 15:7 : €1 million online fraud scheme uncovered, three suspects arrested
- 15:7 : ThreatsDay Bulletin: OAuth Trap, EDR Killer, Signal Phishing, Zombie ZIP, AI Platform Hack & More
- 15:7 : How to Scale Phishing Detection in Your SOC: 3 Steps for CISOs
- 14:32 : Cyber Briefing: 2026.03.12
- 14:31 : 5 ways to protect manufacturing companies from cyberattacks
- 14:5 : Critical SQL Injection bug in Ally plugin threatens 400,000+ WordPress sites
- 14:5 : CISA warns max-severity n8n bug is being exploited in the wild
- 14:5 : 83% of Cloud Breaches Start with Identity, AI Agents Are About to Make it Worse
- 14:5 : How Cyber Risk Management Builds Resilience | Kovrr
- 14:5 : AI is Reshaping How Hackers Discover and Exploit Digital Weaknesses
- 14:5 : IT Security News Hourly Summary 2026-03-12 15h : 22 posts
- 14:5 : ShinyHunters Threatens Data Leak After Alleged Salesforce Breach
- 14:4 : Perplexity’s Comet AI Browser Tricked Into Phishing Scam Within Four Minutes
- 14:4 : Apple Patches Coruna WebKit Exploit
- 13:32 : Ericsson US Discloses Data Breach – Hackers Stolen Employees and Customers Data
- 13:32 : Paloalto Cortex XDR Broker Vulnerability Attackers to Obtain and Modify Sensitive Information
- 13:32 : This Android vulnerability can break your lock screen in under 60 seconds
- 13:32 : Meta Launches New Protection Tools as It Helps Disrupt Scam Centers
- 13:32 : Socure Launch enables startups to deploy identity verification and fraud controls
- 13:32 : WhatsApp is giving parents peace of mind over their kids’ privacy
- 13:32 : Mimecast adds AI investigation and adaptive controls to manage human risk
- 13:32 : ENISA advisory examines package manager security risks
- 13:32 : Meta Adds New Anti-Scam Tools
- 13:32 : 235K Affected In Wisconsin Ambulance Hack
- 13:32 : Hackers Hijack Bonk.fun Domain
- 13:32 : Iran-Linked Hackers Hit Albania Parliament
- 13:32 : WhatsApp Launches Parent-Managed Accounts
- 13:11 : AI-Driven Phishing Attacks Bypass Email Filters, Land in Inboxes
- 13:11 : Ally WordPress Plugin Flaw Exposes Over 200,000 Websites to Attacks
- 13:11 : SOC Prime’s DetectFlow Enterprise moves threat detection to the data ingestion layer
- 13:11 : Zscaler enhances data sovereignty controls with regional processing and logging
- 13:11 : CISA Issues Emergency Directive Over Exploited Cisco SD-WAN Flaws
- 13:11 : Ask Me Anything Cyber: Threat Hunters
- 12:39 : 4,000+ Routers Compromised by KadNap Malware Exploiting Vulnerabilities
- 12:39 : Iran-Linked Hacktivists Claim Wiper Attack on Stryker Systems
- 12:38 : Splunk, Zoom Patch Severe Vulnerabilities
- 12:38 : The Human IOC: Why Security Professionals Struggle with Social Vetting
- 12:38 : The CISO’s Dilemma: How To Scale AI Securely
- 12:38 : 83% of Cloud Breaches Start with Identity. AI Agents are About to Make it Worse.
- 12:38 : Binary Defense’s NightBeacon brings AI-driven analysis to SOCs
- 12:11 : Maintaining Security and Protecting Smart Home Devices from Hackers
- 12:11 : The White House Got the Cyber Strategy Right — By Knowing What Not to Do
- 12:11 : Attackers Don’t Just Send Phishing Emails. They Weaponize Your SOC’s Workload
- 11:34 : Hackers Exploit Remote Management Tools to Gain Initial Access to Corporate Networks
- 11:34 : New ClickFix Attacks Target macOS Users with MacSync Infostealer
- 11:10 : Ofcom, ICO Ask Social Platforms To Enforce Age Rules
- 11:10 : New PixRevolution Malware Steals Brazil’s PIX Transfers in Real Time
- 11:9 : SolarWinds Web Help Desk Deserialization Vulnerability Enables Command Execution
- 11:9 : Splunk RCE Vulnerability Allows Attackers to Execute Arbitrary Shell Commands
- 11:9 : Cisco IOS XR Software Vulnerability Allow Attacker to Execute Commands as Root
- 11:9 : Microsoft Authenticator could leak login codes—update your app now
- 11:9 : War spreads into cyberspace after Iran-linked hackers hit medtech giant Stryker
- 11:9 : Apple Issues Security Updates for Older iOS Devices Targeted by Coruna WebKit Exploit
- 11:5 : IT Security News Hourly Summary 2026-03-12 12h : 12 posts
- 10:34 : Amazon Engineers Discuss Recent Uptick In Outages
- 10:34 : Hackers Exploit CloudFlare Anti-Security to Steal Microsoft 365 Login Credentials
- 10:34 : Endgame Harvesting: Inside ACRStealer’s Modern Infrastructure
- 10:34 : Cisco Patches High-Severity IOS XR Vulnerabilities
- 10:34 : Meta rolls out anti-scam tools across WhatsApp, Facebook, and Messenger
- 10:34 : Police Scotland Fined After Sharing Victim’s Phone Data
- 10:14 : Zoox, Uber To Launch Robotaxis In Las Vegas
- 10:14 : U.S. CISA adds a flaw in n8n to its Known Exploited Vulnerabilities catalog
- 10:13 : ENISA Technical Advisory on Secure Package Managers: Essential DevSecOps Guidance
- 10:13 : Polyfill Supply Chain Attack Impacting 100k Sites Linked to North Korea
- 10:13 : Critical N8n Vulnerabilities Allowed Server Takeover
- 10:13 : DNSSEC Validation for SSL Certificates: CA/B Forum Ballot SC-085 Changes in March 2026
- 9:36 : Shares In AI Cloud Firm Nebius Soar On Nvidia Investment
- 9:36 : Apple’s Foldable iPhone To Sport Wide Screen
- 9:36 : Europe’s Sovereign Search Plan is Really a Security Strategy
- 9:36 : Iran Claim Massive Cyber-Attack on MedTech Firm Stryker
- 9:11 : Palo Alto Cortex XDR Broker Vulnerability Exposes Systems to Sensitive Information Theft and Modification
- 9:11 : From cos(x+y) to GenAI Hallucinations: Why Zero Trust Needs a “Progressive Refinement Loop”
- 9:11 : Six Android Malware Families Target Pix Payments, Banking Apps, and Crypto Wallets
- 8:34 : Meta Plans Four In-House AI Chips In Two Years
- 8:34 : Hackers Leveraging Cloudflare Anti-Bot Features to Steal Microsoft 365 Credentials
- 8:34 : GitLab Security Update – Patch for XSS and API DoS Vulnerabilities
- 8:34 : Critical Microsoft Office Vulnerability Enables Remote Code Execution Attacks
- 8:34 : Securing Multi-Location Networks with Centralized Identity Controls
- 8:34 : Codoxo’s Deepfake Detection identifies AI-generated medical records for health plans
- 8:7 : US Medical Equipment Maker Disabled In Hack Claimed By Iran
- 8:7 : CastleRAT Attack Leverages Deno JavaScript Runtime to Bypass Enterprise Defenses
- 8:7 : Ericsson US Hit by Cyber Attack, Hackers Steal Personal Data of Employees and Customers
- 8:7 : Iranian Hacktivists Claim Attack on US Medtech Firm Stryker
- 8:7 : SPIFFE vs. OAuth: Access Control for Nonhuman Identities
- 8:5 : IT Security News Hourly Summary 2026-03-12 09h : 3 posts
- 7:36 : Splunk RCE Vulnerability Exposes Systems to Arbitrary Shell Command Execution by Attackers
- 7:36 : Chrome Security Update – Patch for 29 Vulnerabilities that Allow Remote Code Execution
- 7:36 : Meta apps offer new scam protection, Google’s Wiz acquisition finalized, China curbs state-run OpenClaw use
- 7:4 : February 2026 Cyber Attacks Statistics
- 7:4 : Stop fixing OT security with IT thinking
- 6:36 : Iran‑Linked Hackers Tap Criminal Ecosystem to Bolster State Cyber Ops
- 6:36 : Cisco IOS XR Vulnerability Exposes Systems to Root Command Execution by Attackers
- 6:36 : Chrome Security Update – Patch for 29 Vulnerabilities that Allows Remote Code Execution
- 6:36 : Agentic attack chains advance as infostealers flood criminal markets
- 6:9 : Stryker Faces Cyber Attack as Hackers Report System Breach and Device Destruction
- 6:9 : SafeNet Trusted Access is Now Available on Google Cloud Marketplace
- 5:32 : Google Finalizes $32 Billion Deal to Acquire Wiz, Strengthening Cloud Security
- 5:32 : Meta Unveils New Anti-Scam Tools for WhatsApp, Facebook, and Messenger
- 5:32 : Chrome Update Addresses 29 Vulnerabilities, Mitigating Remote Code Execution Threats
- 5:32 : KadNap Malware Compromises Over 14,000 Edge Devices to Operate Hidden Proxy Botnet
- 5:32 : Wireless vulnerabilities are doubling every few years
- 5:32 : Does Anthropic deserve the trust of the cybersecurity community?
- 5:32 : CISA Flags Actively Exploited n8n RCE Bug as 24,700 Instances Remain Exposed
- 5:9 : Bell Ambulance data breach impacted over 238,000 people
- 5:5 : IT Security News Hourly Summary 2026-03-12 06h : 1 posts
- 4:34 : Iranian Hackers Attack U.S. Company Stryker in Escalation of Cyber War
- 3:31 : Google Completes Acquisition of Wiz in Historic $32 Billion Deal
- 2:5 : IT Security News Hourly Summary 2026-03-12 03h : 4 posts
- 2:4 : ISC Stormcast For Thursday, March 12th, 2026 https://isc.sans.edu/podcastdetail/9846, (Thu, Mar 12th)
- 2:4 : China’s CERT warns OpenClaw can inflict nasty wounds
- 1:34 : When your IoT Device Logs in as Admin, It?s too Late! [Guest Diary], (Wed, Mar 11th)
- 1:9 : Post-Quantum Decentralized Policy Enforcement Points in MCP Node Clusters
- 0:38 : The OpenSSL Library now supports Encrypted Client Hello (ECH)
- 0:38 : Cyber Security Today Special Report: Attack from Iran
- 0:14 : pac4j CVE-2026-29000: Sonatype Finds 18 Additional Packages
- 0:14 : Why should enterprises be certain about secrets vaulting
- 0:13 : Are DevOps teams supported by automated configurations
- 0:13 : How stable are AI-driven workflows in high-stress environments
- 0:13 : Passkeys at Scale: The Complete Enterprise Deployment Playbook 2026
- 23:13 : Iran-Linked Handala Hackers Claim Major Hacks on Stryker and Verifone
- 23:5 : IT Security News Hourly Summary 2026-03-12 00h : 4 posts
- 22:55 : IT Security News Daily Summary 2026-03-11