188 posts were published in the last hour
- 21:34 : ‘Uncanny Valley’: Iran’s Threats on US Tech, Trump’s Plans for Midterms, and Polymarket’s Pop-up Flop
- 21:34 : Telehealth giant Hims & Hers says its customer support system was hacked
- 21:34 : The $250K Single Point of Failure Hiding in Every SOC
- 21:11 : Claude Code Leak Exposes AI Supply Chain Threats
- 21:11 : Four security principles for agentic AI systems
- 20:36 : Google Workspace’s continuous approach to mitigating indirect prompt injections
- 20:36 : Hackers Exploit CVE-2025-55182 to Breach 766 Next.js Hosts, Steal Credentials
- 20:14 : ShinyHunters Hackers Claim Theft of 3M+ Cisco Records, Threaten Public Leak
- 20:14 : What Happens When a Nuclear Site Is Hit?
- 19:34 : Patch Now: Chrome Flaw Under Active Attack, Google Confirms
- 19:34 : ConductorOne Extends Reach of Identity Governance to AI
- 19:11 : 200,000 WordPress Sites Affected by Arbitrary File Deletion Vulnerability in Perfmatters WordPress Plugin
- 19:11 : Hasbro hit by cyberattack, investigates possible data breach
- 19:11 : Cybercriminals Exploit Telnyx Package in Latest Supply Chain Attack
- 19:5 : IT Security News Hourly Summary 2026-04-02 21h : 6 posts
- 18:32 : Here’s What Can Happen When the US Bombs Iran’s Nuclear Sites
- 18:32 : The Language of Emojis in Threat Intelligence: How Adversaries Signal, Obfuscate, and Coordinate Online
- 18:20 : The democratisation of business email compromise fraud
- 18:20 : Cisco fixed critical and high-severity flaws
- 18:20 : They thought they were downloading Claude Code source. They got a nasty dose of malware instead
- 18:20 : Critical Vulnerability in Claude Code Emerges Days After Source Leak
- 17:34 : Wordfence Intelligence Weekly WordPress Vulnerability Report (March 23, 2026 to March 29, 2026)
- 17:34 : Apple Issues Rare Patch: Up to 270M iPhones Could Be Vulnerable to ‘DarkSword’ Exploit
- 17:34 : Hasbro Cyberattack Knocks Systems Offline, Recovery Could Take Weeks
- 17:34 : US Bans All Foreign-Made Consumer Routers
- 17:3 : Siemens SICAM 8 Products
- 17:3 : Hitachi Energy Ellipse
- 17:3 : Yokogawa CENTUM VP
- 17:3 : OpenSSH 10.3 Fixes Shell Injection and Multiple SSH Security Issues
- 17:3 : Qilin Ransomware Uses Malicious DLL to Kill Almost Every Vendor’s EDR Solutions
- 17:2 : New Akira Lookalike Ransomware Campaign Targeting Windows Users in South America
- 17:2 : Hackers Clone CERT-UA Site to Trick Victims Into Installing Go-Based RAT
- 17:2 : How Elite SOCs Cut Escalation Rates by Arming Tier 1 With Better Threat Intelligence
- 17:2 : Why Email Aliases Are Important for Every User
- 16:34 : Securing Error Budgets: How Attackers Exploit Reliability Blind Spots in Cloud Systems
- 16:34 : Money transfer app Duc exposed thousands of driver’s licenses and passports to the open web
- 16:34 : Apple Rolls Out DarkSword Exploit Protection to More Devices
- 16:34 : AI Coding Assistants Expose New Cyber Risks, Undermining Endpoint Security Defenses
- 16:34 : Yanluowang Access Broker Gets 81 Months in Prison
- 16:34 : Cookie-controlled PHP webshells: A stealthy tradecraft in Linux hosting environments
- 16:34 : Threat actor abuse of AI accelerates from tool to cyberattack surface
- 16:34 : Cisco Patches 9.8 CVSS IMC and SSM Flaws Allowing Remote System Compromise
- 16:12 : Tax Season 2026: How Cyber Criminals Are Preparing Their Attacks Months in Advance
- 16:12 : Cloud security architecture: Enterprise cloud blueprint for CISOs
- 16:12 : 5 top SOC-as-a-service providers and how to evaluate them
- 16:12 : Alleged Starbucks Incident Exposes Code and Firmware
- 16:12 : CISA Adds One Known Exploited Vulnerability to Catalog
- 16:12 : ICE says it bought Paragon’s spyware to use in drug trafficking cases
- 16:12 : How Do I Make Kubernetes Self‑Service Without Losing Control?
- 16:12 : Critical flaw in F5 BIG-IP faces wide exploitation risk
- 16:5 : IT Security News Hourly Summary 2026-04-02 18h : 12 posts
- 15:36 : Microsoft Warns of WhatsApp Attachments Spreading Backdoor on Windows PCs
- 15:36 : Contact center compliance checklist for modern workforces
- 15:36 : Shadow AI: How Unsanctioned Tools Create Invisible Risk
- 15:36 : At RSAC 2026, AI Redefines the Future of Penetration Testing
- 15:36 : Software supply chain hacks trigger wave of intrusions, data theft
- 15:36 : Retail and hospitality CISOs expect budget growth, new AI headaches and opportunities
- 15:7 : Attempts to Exploit Exposed “Vite” Installs (CVE-2025-30208), (Thu, Apr 2nd)
- 15:7 : Threat actor UAC-0255 impersonate CERT-UA to spread AGEWHEEZE malware via phishing
- 15:7 : Residental Proxies ❤️ Amazon Fire TV Sticks
- 15:7 : Open-Source FIM: Freely Available. But What Makes Them Expensive?
- 15:7 : Security Flaw in Popular Python Library Threatens User Machines
- 15:7 : OpenSSH 10.3 patches five security bugs and drops legacy rekeying support
- 14:34 : Yurei Ransomware Uses Common Tools, Adds Stranger Things References
- 14:34 : Cisco IMC Flaw Grants Unauthenticated Admin Access
- 14:34 : Apple expands “DarkSword” patches to iOS 18.7.7
- 14:34 : Cybersecurity M&A Roundup: 38 Deals Announced in March 2026
- 14:34 : NCSC Issues Security Alert Over Hackers Targeting WhatsApp and Signal Accounts
- 14:34 : New ‘Storm’ Infostealer Remotely Decrypts Stolen Credentials
- 14:34 : Cyber Briefing: 2026.04.02
- 14:5 : vSphere and BRICKSTORM Malware: A Defender’s Guide
- 14:5 : ThreatsDay Bulletin: Pre-Auth Chains, Android Rootkits, CloudTrail Evasion & 10 More Stories
- 14:5 : MIWIC26: Nkiruka Joy Aimienoho, Chief Information Security Officer, Standard Chartered Bank NG
- 14:5 : WhatsApp Warns Users Targeted by Spyware Attack via Weaponized Version of the App
- 14:5 : New ZAP PTK Add-On Maps Browser Security Findings as Native Alert Into ZAP
- 14:5 : Apple Expands iOS 18.7.7 Update to More Devices to Shield Users from DarkSword Exploit
- 14:5 : Microsoft Details Steps to Mitigate the Axios npm Supply Chain Compromise
- 14:5 : Standardize or Suffer: The JCHK Blueprint for MSSPs Defending SMB and SME Clients
- 14:5 : GitHub Used as Covert Channel in Multi-Stage Malware Campaign
- 14:5 : Researchers Observe Sub-One-Hour Ransomware Attacks
- 14:5 : Apple Expands iOS 18 Security Updates Amid DarkSword Threat
- 13:32 : Akira-Style Ransomware Campaign Hits Windows Users Across South America
- 13:32 : Mastering Azure Kubernetes Service: The Ultimate Guide to Scaling, Security, and Cost Optimization
- 13:32 : DPRK-Related Campaigns with LNK and GitHub C2
- 13:32 : Malwarebytes Privacy VPN receives full third-party audit
- 13:32 : How to Improve Google Workspace Phishing Protection for Schools Without Adding IT Burden
- 13:31 : New Red Hat subscription simplifies long-term enterprise Linux support
- 13:9 : [Video] The TTP Ep 21: When Attackers Become Trusted Users
- 13:9 : Storm Infostealer Sold as Service, Targets Browsers, Wallets and Accounts
- 13:9 : Cisco Patches Critical and High-Severity Vulnerabilities
- 13:9 : Anthropic Responds To Claude Code Leak
- 13:9 : Proton Launches Privacy Meet Platform
- 13:9 : Apple Expands iOS Update To Block Exploit
- 13:5 : IT Security News Hourly Summary 2026-04-02 15h : 12 posts
- 12:34 : Casbaneiro Phishing Targets Europe
- 12:34 : Chrome Zero Day CVE Under Exploit
- 12:34 : Vertex AI Flaw Exposes Cloud Data
- 12:34 : Cyberattack Disrupts Phones In MA Towns
- 12:34 : Mercor Hit By Supply Chain Cyberattack
- 12:11 : Iranian Hacker Group Handal Claims Breach of Israeli Defense Firm
- 12:11 : 250,000 Affected by Data Breach at Nacogdoches Memorial Hospital
- 12:11 : Shut the Front Door on Email Attacks: How to Scale Security Services Without Increasing Workload
- 12:11 : IMO Health: 5 Reasons security culture starts with trust
- 12:11 : OT Cyber Resilience: Strategic Data Protection for IEC 62443 and NIS2 Compliance
- 12:11 : The State of Trusted Open Source Report
- 12:11 : Researchers Uncover Mining Operation Using ISO Lures to Spread RATs and Crypto Miners
- 11:34 : Fake CERT-UA Site Spreads Go-Based RAT in Phishing Campaign
- 11:34 : DarkSword exploit forces Apple to loosen its patching policy
- 11:5 : Why GitHub Developers Are Targeted by Token Giveaway Scams
- 11:5 : TA416 Expands Espionage Operations Across Europe With Web Bug Recon and Malware Delivery
- 11:5 : FBI Warns of Chinese Mobile Apps May Expose User Data to Cyberattacks
- 11:5 : Critical PX4 Autopilot Vulnerability Let Attackers Gain Control Over the Drones
- 11:5 : Oracle Lays Off 30,000 Employees to Ramp Up Investment in AI Technologies
- 11:5 : Cisco Smart Software Manager Vulnerability Let Attackers Execute Arbitrary Commands
- 11:5 : Mercor Hit by LiteLLM Supply Chain Attack
- 10:34 : RFQ Malware Campaign Uses DOCX, RTF, JS, and Python
- 10:34 : Unmasking the Paramilitary Agents Behind Trump’s Violent Immigration Crackdown
- 10:34 : Possible US Government iPhone Hacking Tool Leaked
- 10:34 : WhatsApp Alerts 200 Users After Fake iOS App Installed Spyware; Italian Firm Faces Action
- 10:9 : An overview of ransomware threats in Japan in 2025 and early detection insights from Qilin cases
- 10:9 : Inside the Talos 2025 Year in Review: A discussion on what the data means for defenders
- 10:9 : Qilin EDR killer infection chain
- 10:9 : UAT-10608: Inside a large-scale automated credential harvesting operation targeting web applications
- 10:9 : Sophisticated CrystalX RAT Emerges
- 10:5 : IT Security News Hourly Summary 2026-04-02 12h : 9 posts
- 9:36 : CISA Issues Alert on Chrome Zero-Day Under Active Exploitation
- 9:36 : NoVoice on Google Play Exploits 22 Flaws to Hit Millions of Android Users
- 9:36 : New WhatsApp Attack Chain Uses VBS Scripts, Cloud Downloads, and MSI Backdoors
- 9:36 : Microsoft Copilot Terms of Service Label Copilot is for Entertainment Purposes Only
- 9:36 : TrueConf zero-day vulnerability exploited to target government networks
- 9:9 : Axios npm Supply Chain Breach: Microsoft Shares Mitigation Steps
- 9:9 : Apple Releases iOS 18.7.7 Update to Defend Against DarkSword Exploit
- 9:9 : TrueConf zero-day vulnerability turns its own update process into malware delivery channel
- 9:9 : Most CNI Firms Face Up to £5m in Downtime from OT Attacks
- 8:34 : Variance Raises $21.5M for Compliance Investigation Platform Powered by AI Agents
- 8:9 : The company’s biggest security hole lived in the breakroom
- 8:9 : Italian spyware vendor creates Fake WhatsApp app, targeting 200 users
- 8:9 : Symantec DLP Agent Vulnerability Let Attackers Escalate Privileges
- 8:9 : Remcos RAT Infection Chain Hides Behind Obfuscated Scripts and Trusted Windows Binaries
- 8:9 : Critical Cisco IMC Vulnerability Let Attackers Bypass Authentication
- 8:9 : Apple Expands iOS 18.7.7 Update to More Devices to Block DarkSword Exploit
- 7:34 : New ZAP PTK Add-On Converts Browser Security Findings Into Native ZAP Alerts
- 7:34 : FBI Warns Chinese Mobile Apps Could Expose User Data to Cyberattacks
- 7:34 : The European Commission confirms attack on its Europa web platform
- 7:34 : Apple Releases iOS 18.7.7 Update to Extend DarkSword Exploit Protection to More iPhones and iPads
- 7:34 : New iOS patches over DarkSword, FBI: surveillance hack is major incident, Cisco code stolen in Trivy-linked breach
- 7:7 : North Korean Attackers Compromise Popular Web Tool
- 7:7 : TA416 Broadens Europe Spy Campaign With Web Bugs and Malware
- 7:7 : Critical PX4 Autopilot Vulnerability Let Attackers Gain Control of Drones
- 7:7 : Cisco Smart Software Manager Flaw Allowed Arbitrary Command Execution
- 7:7 : Enterprise AI security: weighing the benefits and risks in 2026
- 7:7 : Top 20 Best Digital Forensic Tools in 2026
- 7:7 : 10 Best VPN For Privacy In 2026
- 7:7 : Starbucks Breach – Attacks Allegedly Claim 10GB of Stolen Source Code
- 7:5 : IT Security News Hourly Summary 2026-04-02 09h : 1 posts
- 6:34 : Bank Negara Malaysia RMiT Update: New Authentication Rules for Fintech and Banks
- 6:3 : WhatsApp Attack Chain Delivers VBS, Cloud Payloads, MSI Backdoor
- 6:2 : Trust, friction, and ROI: A CISO’s take on making security work for the business
- 5:36 : Remcos RAT Attack Uses Obfuscated Scripts, Trusted Windows Tools
- 5:36 : Cisco Warns of Critical IMC Vulnerability Enabling Authentication Bypass
- 5:36 : NSFOCUS Monthly APT Insights – January 2026
- 5:5 : Symantec DLP Agent Flaw Exposed Systems to Privilege Escalation Attacks
- 5:5 : Microsoft adds high-volume email sending to Exchange Online
- 5:5 : Tracking drones with the 5G tower down the street
- 4:40 : Linx Security Raises $50 Million for Identity Security and Governance
- 4:40 : Your customer passed authentication. So why are they sending money to a scammer?
- 4:9 : Microsoft to Remove EXIF Data for Images Shared on Teams
- 4:9 : Public PoC Exploit Released for Nginx-UI Backup Restore Vulnerability
- 4:9 : Vim Modeline Bypass Vulnerability Let Attackers Execute Arbitrary OS Commands
- 4:5 : IT Security News Hourly Summary 2026-04-02 06h : 1 posts
- 3:13 : News Alert: TAC Security surpasses 10,000 customers, scaling global VM and AppSec platform
- 2:31 : Google Introduces Android Dev Verification Amid Openness Debate
- 2:18 : ISC Stormcast For Thursday, April 2nd, 2026 https://isc.sans.edu/podcastdetail/9876, (Thu, Apr 2nd)
- 2:18 : Digital assets after death: Managing risks to your loved one’s digital estate
- 1:5 : IT Security News Hourly Summary 2026-04-02 03h : 4 posts
- 1:3 : Cybersecurity Can Learn from the Artemis Launch
- 1:2 : Post-Quantum Key Encapsulation Mechanisms in AI Proxy Orchestration
- 0:9 : AI recruiting biz Mercor says it was ‘one of thousands’ hit in LiteLLM supply-chain attack
- 0:9 : U.S. CISA adds a flaw in Google Dawn to its Known Exploited Vulnerabilities catalog
- 23:5 : Chrome Vulnerability CVE-2026-5281 Exploited in the Wild
- 23:5 : De-fi platform Drift suspends deposits and withdrawals after millions in crypto stolen in hack
- 22:32 : Wikipedia’s AI agent row likely just the beginning of the bot-ocalypse
- 22:32 : 67% of SIEM Alerts Go Uninvestigated. AI Triage Fixes That Without Replacing Your SIEM
- 22:32 : The AI SOC’s L1 Automation Ceiling: Why Classification Is Not Investigation
- 22:31 : Mitigating the Axios npm supply chain compromise
- 22:5 : Anthropic Claude Code Leak
- 22:5 : IT Security News Hourly Summary 2026-04-02 00h : 6 posts
- 21:55 : IT Security News Daily Summary 2026-04-01