206 posts were published in the last hour
- 22:2 : Russian national convicted for running botnet used in attacks on U.S. firms
- 21:32 : Apple Patches (almost) everything again. March 2026 edition., (Wed, Mar 25th)
- 21:32 : Convicted spyware chief hints that Greece’s government was behind dozens of phone hacks
- 21:32 : An Evolving GlassWorm Malware is Making the Rounds of Code Repositories
- 21:11 : AI supply chain attacks don’t even require malware…just post poisoned documentation
- 20:35 : Mirai Malware Evolves into Hundreds of Variants Driving Botnet Growth
- 20:34 : Mirai-Based Botnets Evolve Into Massive DDoS and Proxy Abuse Threat
- 20:34 : Open Directory Malware Campaign Uses Obfuscated VBS, PNG Loaders and RAT Payloads
- 20:34 : China-Linked Hackers Breach Southeast Asian Military Systems in Long-Running Spy Campaign
- 20:34 : Scammers have virtual smartphones on speed dial for fraud
- 20:5 : IT Security News Hourly Summary 2026-03-25 21h : 7 posts
- 20:3 : Jen Easterly, cybersecurity’s ‘relentless optimist,’ hopes feds come back to RSAC next year
- 20:3 : BSidesSLC 2025 – LLM-Powered Network Intrusion Detection
- 20:2 : When Your Scanner Becomes the Weapon: From Trivy to LiteLLM
- 19:32 : ‘Do not shift budgets to AI’: How businesses should and shouldn’t respond to evolving threats
- 19:7 : Inside RSA 2026: Security Leaders Grapple With AI’s Growing Role and Risks
- 19:7 : RSAC 2026 Proved the Industry Agrees on the Problem — Now Comes the Hard Part
- 19:7 : Only Trump can decide when cyberwar turns into real war
- 18:36 : CISA Adds One Known Exploited Vulnerability to Catalog
- 18:36 : Linux Ransomware Pay2Key Attacking Organizations Ervers, Virtualization Hosts, and Cloud Workloads
- 18:36 : “Unhackable” No More: Researcher Demonstrates Hardware-Level Exploit on Xbox One
- 18:9 : 2025 Talos Year in Review: Speed, scale, and staying power
- 18:9 : Beers with Talos breaks down the 2025 Talos Year in Review
- 18:9 : US Bans New Foreign-Made Home Routers Over National Security Fears
- 18:9 : LeakBase Admin Arrested in Russia Over Massive Stolen Credential Marketplace
- 17:32 : SmartApeSG ClickFix Campaign Delivers Remcos, NetSupport RAT, StealC and Sectop RAT
- 17:32 : macOS Threats Are the Biggest Security Gap in 2026: How SOC Teams Close It
- 17:32 : Helping MSPs Take Control of Certificate Management: Introducing Sectigo Partner Platform
- 17:32 : The Dark Side of DDoS: Why DDoS Downtime is Harder to Prevent
- 17:32 : Identity security is the new pressure point for modern cyberattacks
- 17:18 : Russia arrests alleged owner of cybercrime forum LeakBase, report says
- 17:18 : AI-Driven Phishing Campaign Exploits Device Permissions to Steal Biometric and Personal Data
- 17:5 : IT Security News Hourly Summary 2026-03-25 18h : 15 posts
- 16:34 : Hackers claim to have accessed data tied to millions of crime tipsters
- 16:34 : Novee Brings Autonomous Red Teaming to LLM Applications, Built From Its Own Vulnerability Research
- 16:34 : Skyhawk Security Adds Threat Actor Context to Cloud Attack Scenarios, Mapping Simulations to Known Adversaries
- 16:34 : Miggo Security Expands Runtime Defense Platform With AI-BOM, Agentic Detection, and MCP Monitoring
- 16:34 : Entro Security Launches AGA to Govern AI Agents and Non-Human Identities Across the Enterprise
- 16:34 : Vicarius Launches vIntelligence, a Second Flagship Product for Continuous Agentic Validation
- 16:34 : Cloud Phones Linked to Rising Financial Fraud Threat
- 16:7 : Privacy-Conscious AI Development: How to Ship Faster Without Leaking Your Crown Jewels
- 16:7 : Patch now: TP-Link Archer NX routers vulnerable to firmware takeover
- 16:7 : Security for the Quantum Era: Implementing Post-Quantum Cryptography in Android
- 16:7 : Node.js Patches Multiple Vulnerabilities That Enable DoS Attacks and Process Crashes
- 16:7 : Firefox 149.0 Released With Free Built-in VPN With 50 GB Monthly Data Limit
- 16:7 : Onit Security Raises $11 Million for Exposure Management Platform
- 16:7 : AI Has Created a New Attack Surface and Encryption Is Not Enough
- 16:7 : State Department Launches New Bureau to Combat High-Tech Threats
- 15:35 : Best Klaviyo Alternatives for Revenue Growth and Advanced Analytics
- 15:35 : Hadrian Launches Nova, an Agentic Pentesting Solution for Continuous External Attack Validation
- 15:34 : Nudge Security Adds AI Agent Discovery to Surface Shadow Agents and Their Risks Across the Enterprise
- 15:34 : Tenable Launches Hexa AI, an Agentic Orchestration Engine Inside Tenable One
- 15:34 : PRE Security Ships Platform 3.3 With SignalGate Data Fabric and Agentic SOARGPT at RSAC 2026
- 15:34 : Seceon Wins Four InfoSec Awards at RSA 2026, Launches ADMP and SeraAI 2.0
- 15:34 : Botnet operator behind $14 million in ransomware extortion payments gets 24 months behind bars
- 15:34 : Hackers Exploit Compromised Enterprise Identities at Industrial Scale, Warns SentinelOne
- 15:34 : Congress wants details from White House on cyber strategy, Iran resilience measures
- 15:34 : Iran-linked ransomware operation targeted US healthcare provider
- 15:7 : How AI Translation Fixes Multilingual Content Chaos
- 15:7 : New FCC router ban could leave home networks less secure
- 15:7 : Grounded Intelligence Is Key to Safe AI Software Development at Scale
- 15:7 : Russian Troops Rage Over Telegram Crackdown
- 15:7 : GlassWorm Malware Uses Solana Dead Drops to Deliver RAT and Steal Browser, Crypto Data
- 15:7 : Congress wants details from White House on cyber strategy implementation, Iran resilience measures
- 14:32 : AI Speeds Attacks, But Identity Remains Cybersecurity’s Weakest Link
- 14:32 : Russian Cybercriminal Gets 2-Year Prison Sentence in US
- 14:32 : You Can’t Monetize What You Can’t See: AI Traffic Detection for Publishers
- 14:32 : Cyber Briefing: 2026.03.25
- 14:9 : China-Backed Hackers Target Southeast Asian Military Systems in Ongoing Spy Campaign
- 14:9 : Nearly 7M Email Addresses Exposed in Crunchyroll Third-Party Breach
- 14:9 : OpenAI to Shut Down Sora Video Platform, Pivots to Enterprise and Developer Tools
- 14:9 : Firefox 149 Released With Patch for 37 Vulnerabilities that Enables Remote Attacks
- 14:9 : F5 NGINX Plus and Open Source Vulnerability Allow Attackers to Execute Code Using MP4 file
- 14:9 : When Data Mining Conti Leaks Leads to Actual Binaries and to a Hardcoded C2 With an Encryption Key on Tripod.com – Part Five
- 14:9 : Halfway Through RSAC, The Writing on the Wall Says One Thing: Agents
- 14:9 : Vorlon adds forensics and response to secure AI agents
- 14:5 : IT Security News Hourly Summary 2026-03-25 15h : 16 posts
- 13:32 : Machine Learning Operations: Yesterday, Today, and Tomorrow
- 13:32 : Akamai Leads the Way: 2026 GigaOm Radar for Microsegmentation
- 13:32 : When Satellite Data Becomes a Weapon
- 13:32 : iOS, macOS 26.4 Roll Out With Fresh Security Patches
- 13:32 : DigiCert Document Trust Manager enhancements improve document security and compliance
- 13:32 : Ruler
- 13:7 : Obfuscated VBS and PNG Loaders Power New Open Directory Malware Campaign with RAT Payloads
- 13:7 : North America’s Cyber Security Threat Reality in 2026
- 13:7 : Recent Navia data breach impacts HackerOne employee data
- 13:7 : FCC Bans New Routers Made Outside the US Over National Security Risks
- 13:7 : Why AI Is Increasing Demand for Software Engineers (Not Replacing Them)
- 13:7 : Block Compromised Passwords Without Breaking User Experience
- 13:7 : Gemini picks up criminal activity buried in dark web noise
- 13:7 : Verdict Says Meta Harmed Children
- 13:7 : Wired for Risk
- 13:7 : Crypto Fugitive Seeks U.S. Pardon
- 12:35 : Fake OpenClaw Token Giveaway Targets GitHub Devs with Wallet-Draining Scam
- 12:35 : GoHarbor Issues Urgent Patch for Harbor Flaw Allowing Full Registry Compromise
- 12:35 : Mirai Botnets Evolve Into Major DDoS and Proxy Abuse Threats
- 12:35 : Five Malicious npm Packages Target Crypto Developers, Exfiltrate Wallet Keys via Telegram
- 12:35 : Russian Initial Access Broker Sentenced to Prison for Enabling Ransomware Attacks on U.S. Firms
- 12:34 : Multiple TP-Link Vulnerabilities Allow Attackers to Execute Arbitrary Commands on System
- 12:34 : Hackers Exploiting Magento to Execute Remote Code and Gain Complete Account Access
- 12:34 : RSAC 2026 Conference Announcements Summary (Day 2)
- 12:34 : Device Code Phishing Hits 340+ Microsoft 365 Orgs Across Five Countries via OAuth Abuse
- 12:34 : Russian Hacker Sentenced to 2 Years for TA551 Botnet-Driven Ransomware Attacks
- 12:34 : The Kill Chain Is Obsolete When Your AI Agent Is the Threat
- 12:34 : US: FCC Bans Foreign-Made Routers Over National Security Concerns
- 12:34 : TeamPCP Backdoors LiteLLM via Trivy
- 12:34 : Dutch Finance Ministry Probes Breach
- 12:34 : Lapsus$ Claims AstraZeneca Hack
- 12:34 : Kaplan Breach Exposes 230K Records
- 12:34 : FCC Bans Foreign Routers Over Risks
- 12:9 : 2026 Cybersecurity Excellence Awards Winners Announced during RSA Conference as AI Security Dominates
- 12:9 : Mozilla Releases Firefox 149.0 With Free Built‑In VPN Offering 50 GB Monthly Data
- 12:9 : FCC targets foreign router imports amid rising cybersecurity concerns
- 12:9 : What does “AI security” mean and why does it matter to your business?
- 12:9 : US targets foreign-made routers as security concerns rise, but experts warn risks go further
- 12:9 : Cybersecurity, AI, and Sovereignty: What’s Next for Global Digital Infrastructure
- 12:9 : From Trivy to Broad OSS Compromise: TeamPCP Hits Docker Hub, VS Code, PyPI
- 12:9 : LiteLLM PyPI packages compromised in expanding TeamPCP supply chain attacks
- 12:9 : TeamPCP Expands Supply Chain Campaign With LiteLLM PyPI Compromise
- 12:9 : Amnezia Releases AmneziaWG 2.0 To Bypass Advanced Internet Censorship Systems
- 11:34 : Linux Ransomware Pay2Key Targets Servers, Virtualization Hosts, and Cloud Workloads
- 11:34 : Sen. Wyden Warns of Another Section 702 Abuse
- 11:34 : Could AI Replace the CEO? Zuckerberg’s ‘CEO Agent’ Sparks Debate
- 11:34 : Njordium AI blocks fake invoices and fraudulent payments
- 11:34 : Akamai Brand Guardian detects and removes AI-driven brand impersonation
- 11:5 : OpenAI Shuts Down Sora Video-Generation Tool
- 11:5 : TeamPCP Hits Trivy, Checkmarx, and LiteLLM in Credential Theft Campaign
- 11:5 : SmartApeSG ClickFix Campaign Spreads Remcos, NetSupport RAT, StealC, Sectop RAT
- 11:5 : Hackers Exploiting Magento Flaw to Execute Remote Code and Seize Full Account Access
- 11:5 : F5 NGINX Plus & Open‑Source Flaw Lets Attackers Execute Code via MP4 File
- 11:5 : IT Security News Hourly Summary 2026-03-25 12h : 17 posts
- 11:5 : Cybercrime group Lapsus$ claims the hack of pharma giant AstraZeneca
- 11:5 : Anatomy of a Cyber World Global Report 2026
- 11:4 : Microsoft hands Entra ID users new option for MFA
- 11:4 : Experts Sound Alarm Over “Prompt Poaching” Browser Extensions
- 10:32 : Apple Tests Stand-Alone Siri App Amid Chatbot Shift
- 10:32 : ClawHub Vulnerability Lets Attackers Manipulate Rankings to Become Top Skill
- 10:32 : MIWIC26: Adenike Ajayi-lweka, Cybersecurity Consultant at Accenture
- 10:32 : LiteLLM PyPI Package With 95 Million Downloads Compromised by TeamPCP Hackers
- 10:32 : FCC Banned Foreign-made Consumer Routers Over Security Risks
- 10:32 : Google Authenticator’s Hidden Passkey Architecture Could Open New Passwordless Attack Paths
- 10:32 : ClawHub Vulnerability Let Attackers Manipulate Rankings to Become the #1 Skill
- 10:32 : Digital Footprint Exposure: What’s Public and Why It Matters
- 10:32 : Anthropic trims action approval loop, lets Claude Code make the call
- 10:7 : Epic Games Cuts More Than 1,000 Jobs
- 10:7 : Malicious LiteLLM versions linked to TeamPCP supply chain attack
- 10:7 : Meet Khaled Mohamed: the bug hunter who found a Microsoft flaw
- 10:7 : Operation Henhouse Nets Over 500 Arrests in UK Fraud Crackdown
- 9:34 : AWS Bahrain Facility Disrupted By Drone Strikes, Again
- 9:34 : New Study Reveals How Infostealer Infections Lead to Dark Web Exposure in Just 48 Hours
- 9:34 : Iranians Don’t Have a Missile Alert System, So Volunteers Built Their Own Warning Map
- 9:34 : MSSQLand – Lightweight MS-SQL Interaction Tool for Lateral Movement and Post-Exploitation
- 9:34 : US Prisons Russian Access Broker for Aiding Ransomware Attacks
- 9:34 : Anthropic cuts action approval loop, lets Claude Code make the call
- 9:11 : Zoox Plans Expansion In Las Vegas, San Francisco
- 8:34 : ARM Takes First Step Into Silicon With Data Centre Chip
- 8:34 : Microsoft Rents Texas Data Centre Abandoned By Oracle
- 8:34 : Stryker Attack Prompts Scrutiny of Enterprise Device Management Tools
- 8:34 : Spur Intelligence delivers deeper visibility into anonymized infrastructure
- 8:34 : Codenotary introduces AgentX for autonomous Linux infrastructure security
- 8:34 : FCC Bans New Foreign-Made Routers Over Supply Chain and Cyber Risk Concerns
- 8:7 : Kali Linux 2026.1 Launches With 8 New Hacking Tools for Penetration Testers
- 8:7 : AI-Driven ‘OpenClaw Trap’ Campaign Targets Developers and Gamers via Trojanized GitHub Repos
- 8:7 : 4 Best Free VPNs
- 8:7 : LiteLLM Python Package With 95 Million Downloads Compromised by TeamPCP Hackers
- 8:7 : HackerOne Employee Data Exposed in Massive Navia Breach
- 8:7 : Coding Agents Widen Your Supply Chain Attack Surface
- 8:7 : Barracuda strengthens cyber resilience with BarracudaONE platform updates
- 8:7 : Tenable Hexa AI automates exposure management and security workflows
- 8:5 : IT Security News Hourly Summary 2026-03-25 09h : 9 posts
- 7:34 : Enterprise PCs are unreliable, unpatched, and unloved compared to Macs
- 7:34 : HPE enhances security to support AI and distributed enterprise environments
- 7:34 : Google’s TurboQuant cuts AI memory use without losing accuracy
- 7:34 : FCC router ban, drone hit AWS, Crunchroll leak
- 7:9 : How to avoid FIFA World Cup 2026 ticket scams?
- 7:9 : Five Malicious npm Packages Target Crypto Developers, Steal Wallet Keys via Telegram
- 7:9 : FCC Blocks New Foreign Consumer Router Models Citing Serious Security Risks
- 7:9 : Training an AI agent to attack LLM applications like a real adversary
- 7:9 : TeamPCP Backdoors LiteLLM Versions 1.82.7–1.82.8 via Trivy CI/CD Compromise
- 6:36 : Compromised LiteLLM Package With 95M Downloads Tied to TeamPCP, After Trivy & KICS Hacks
- 6:7 : Google Authenticator’s Hidden Passkey Design May Expose New Passwordless Attack Vectors
- 6:7 : HackerOne Confirms Employee Data Stolen Following Linked Navia Hack
- 6:7 : Why your phishing simulations aren’t building a security culture
- 6:7 : You don’t have to choose between BAS or automated pentesting, you shouldn’t
- 5:32 : Aqua Security’s Trivy Scanner Hit by Supply Chain Attack, Threatening Software Integrity
- 5:32 : Aqua Security’s Trivy Scanner Compromised in Supply Chain Attack
- 5:32 : Kali Linux 2026.1 Released With 8 New Hacking Tools
- 5:32 : Which Came First: The System Prompt, or the RCE?
- 5:32 : Kali Linux 2026.1 ships BackTrack mode, eight new tools, and a kernel upgrade to 6.18
- 5:32 : Your security stack looks fine from the dashboard and that’s the problem
- 5:31 : RSAC Presenter Says “Time to Kill One of Cybersecurity’s Most Overworked Terms”
- 5:5 : IT Security News Hourly Summary 2026-03-25 06h : 2 posts
- 4:9 : Cloud workload security: Mind the gaps
- 4:9 : North Korean Hackers Turn VS Code Projects Into Silent Malware Triggers
- 3:36 : API Security for AI Agents: Why Protection Has Never Been More Important.
- 3:7 : Julius v0.2.0: From 33 to 63 Probes — Now Detecting Cloud AI, Enterprise Inference, and RAG Pipelines
- 2:13 : ISC Stormcast For Wednesday, March 25th, 2026 https://isc.sans.edu/podcastdetail/9864, (Wed, Mar 25th)
- 2:13 : Quantum-Hardened Granular Resource Authorization Policies
- 2:5 : IT Security News Hourly Summary 2026-03-25 03h : 2 posts
- 1:34 : SmartApeSG campaign pushes Remcos RAT, NetSupport RAT, StealC, and Sectop RAT (ArechClient2), (Wed, Mar 25th)
- 1:34 : Guidance for detecting, investigating, and defending against the Trivy supply chain compromise
- 1:4 : OpenSSL 4.0 Beta Release Announcement
- 0:5 : The Best AI SOC Platforms 2026: Comprehensive Comparison & Guide
- 23:11 : HackerOne, Mazda, Infinite Campus and Dutch Ministry Hit by Data Breaches
- 23:5 : IT Security News Hourly Summary 2026-03-25 00h : 5 posts
- 22:55 : IT Security News Daily Summary 2026-03-24