140 posts were published in the last hour
- 21:32 : RansomHouse says it breached Trellix and exposes internal systems
- 21:32 : Friday Squid Blogging: Giant Squid Live in the Waters of Western Australia
- 21:32 : The Department of Know: AI “transformation paradox,” Copy Fail chaos, hacked lawnmowers
- 21:7 : Fake macOS Troubleshooting Sites Used to Steal iCloud Data in ClickFix Scam
- 20:32 : Hackers Deploy Modular RAT With Credential Theft and Screenshot Capture Capabilities
- 20:32 : New PamDOORa Backdoor Attacking Linux Systems to Steal SSH Credentials
- 19:32 : Cyberattacks on Poland’s Water Plants: A Blueprint for Hybrid Warfare
- 19:32 : Cisco Warns of Network Management Flaw That Can Force Systems Offline Through Remote DoS Attacks
- 19:32 : Australia Demands Faster Cybersecurity Action to Address Mythos Activity
- 19:5 : IT Security News Hourly Summary 2026-05-08 21h : 6 posts
- 19:4 : Hackers Use Fake OpenClaw Installer to Steal Crypto Wallet and Password Manager Credentials
- 19:4 : Škoda Security Incident Exposes Customers Data From Online Shop
- 18:32 : Poland says hackers breached water treatment plants, and the US is facing the same threat
- 18:32 : Active attack: Dirty Frag Linux vulnerability expands post-compromise risk
- 18:32 : TCLBANKER Banking Trojan Targets Financial Platforms via WhatsApp and Outlook Worms
- 18:7 : Insider Betting on Polymarket
- 17:32 : Poland says hackers breached water treatment plants, and the U.S. is facing the same threat
- 17:32 : Worm rubs out competitor’s malware, then takes control
- 17:4 : News brief: Security worries and warnings as AI use expands
- 17:4 : US defense contractor who sold hacking tools to Russian broker ordered to pay $10M to former employers
- 16:32 : Fake Call History Apps Stole Payments From Users After 7.3 Million Play Store Downloads
- 16:5 : IT Security News Hourly Summary 2026-05-08 18h : 6 posts
- 16:2 : French Prosecutors Escalate Elon Musk X Probe to Criminal Investigation
- 16:2 : Anthropic’s Claude used in attempted compromise of Mexican water utility
- 16:2 : Instructure confirms cybersecurity incident
- 15:32 : Trenchant Exec Who Sold Zero Days to Russian Buyer Ordered to Pay $10 Million in Restitution to Former Employers
- 15:32 : CVE-2026-34354: Guardicore Local Privilege Escalation Vulnerability
- 15:32 : Zara Data Breach: 197,000 Customers Exposed in Third-Party Security Incident
- 15:2 : Hackers Abuse Signed Logitech Installer to Deploy TCLBANKER Banking Trojan
- 15:2 : New Infostealer Campaign Uses GitHub Releases for Payload Hosting and Evasion
- 15:2 : Fake Moustache Bypasses Age Verification System Raising Online Safety Act Concerns
- 15:2 : Hackers Leveraged Hugging Face and ClawHub With 575+ Malicious Skills to Deploy Malware
- 15:2 : New ZiChatBot Malware Uses Zulip REST APIs as Command and Control Server
- 15:2 : Hackers Attack School Login Pages After Another Instructure Breach
- 14:32 : Cisco Reveals Security Gaps in Vision Language Models
- 14:32 : In Other News: Train Hacker Arrested, PamDOORa Linux Backdoor, New CISA Director Frontrunner
- 14:32 : Financial Services Must Prepare for Attacks Originating Inside the Cloud
- 14:32 : Canvas Learning Platform Outage Disrupts Universities After ShinyHunters Cyberattack
- 14:32 : Dirty Frag: Unpatched Linux vulnerability delivers root access
- 14:6 : ClaudeBleed Vulnerability Lets Hackers Hijack Claude Chrome Extension to Steal Data
- 14:6 : ‘Dirty Frag’ Linux flaw one-ups CopyFail with no patches and public root exploit
- 13:32 : Pam Backdoor Targets Linux Systems to Steal SSH Credentials
- 13:7 : Microsoft says Edge’s plaintext password behavior is “by design”
- 13:7 : Trellix Breach – RansomHouse Claims Access to Parts of Source Code
- 13:7 : DarkMoon AI-Powered Autonomous Penetration Testing Platform With 50+ Tools
- 13:7 : Why Vulnerability Scanning Is Not Penetration Testing, And Why Cisos Should Care
- 13:7 : Meta U-turns on encryption push for Instagram as DMs go plaintext
- 13:7 : AWS EC2 outage in US-EAST-1 due to power loss
- 13:7 : Zara data breach exposes 197,000 customers
- 13:7 : 25M Alerts Reveal Enterprise Alert Fatigue
- 13:6 : Meta challenges Ofcom fine calculation methodology
- 13:6 : 2026 ChicagoCISO ORBIE Awards Honor Security Leaders
- 13:5 : IT Security News Hourly Summary 2026-05-08 15h : 1 posts
- 12:32 : Dirty Frag: A new Linux privilege escalation vulnerability is already in the wild
- 12:2 : Modular RAT Campaign Steals Credentials and Captures Screenshots
- 12:2 : ShinyHunters escalates Canvas attacks with school login defacements
- 12:2 : Polish Security Agency Reports ICS Breaches at Five Water Treatment Plants
- 12:2 : Quasar Linux RAT Steals Developer Credentials for Software Supply Chain Compromise
- 11:32 : AI Firm Braintrust Prompts API Key Rotation After Data Breach
- 11:5 : Cline Kanban WebSocket Vulnerability Enables Malicious Sites to Take Over AI Coding Agents
- 11:5 : Fake OpenClaw Installer Targets Crypto Wallets and Password Managers
- 11:5 : Mozilla Patches 423 Firefox Vulnerabilities with Claude Mythos and Other AI Models
- 11:5 : New NWHStealer Delivery Chain Uses Bun Loader, Anti-VM Checks, and Encrypted C2
- 11:5 : New PCPJack Worm Targets Docker, Kubernetes, Redis, and MongoDB for Credential Theft
- 11:5 : Meta fights Ofcom over how many billions count as billions
- 11:5 : Hackers ate my homework: Educational SaaS Canvas down after cyberattack
- 11:5 : Cyberattack Hits Canvas System Used by Thousands of Schools as Finals Loom
- 11:5 : Ivanti EPMM vulnerability exploited in zero-day attacks (CVE-2026-6973)
- 11:5 : New Linux PamDOORa Backdoor Uses PAM Modules to Steal SSH Credentials
- 11:4 : One Missed Threat Per Week: What 25M Alerts Reveal About Low-Severity Risk
- 11:4 : Australian Cyber Security Centre Issues Alert Over ClickFix Attacks
- 10:32 : Pentest-Tools.com Releases Free Scanner for CVE-2026-41940 as cPanel Authentication Bypass Enters Its Third Week of Active Exploitation
- 10:32 : 16-30 April 2026 Cyber Attacks Timeline
- 10:32 : Google is turning Android Studio into a policy watchdog
- 10:5 : IT Security News Hourly Summary 2026-05-08 12h : 11 posts
- 10:4 : ZiChatBot Malware Abuses Zulip APIs for Stealthy C2 Operations
- 10:4 : Helping North Korean IT remote workers is becoming a fast track to prison
- 9:32 : Fake Moustache Fools Age Checks, Sparks Online Safety Act Fears
- 9:7 : Hackers Use Morse Code to Trick Grok and Bankrbot, Steal $200K in Crypto Tokens
- 9:7 : Critical Vulnerability in Rancher Fleet Enables Full Cluster-Admin Privileges
- 9:7 : Trellix Investigates RansomHouse Breach Claims Involving Source Code Repository
- 9:7 : Meet Rassvet, Russia’s Answer to Starlink
- 9:7 : Critical Spring Vulnerabilities Expose Arbitrary Files and GCP Secrets
- 9:7 : Mozilla Patches 423 Firefox 0-Day Vulnerabilities with Claude Mythos and Other AI Models
- 9:7 : ‘PCPJack’ Worm Removes TeamPCP Infections, Steals Credentials
- 9:7 : PCPJack Campaign Boots TeamPCP Off Compromised Machines
- 8:33 : Signed Logitech Installer Abused to Drop TCLBANKER Banking Trojan
- 8:33 : Fixing the password problem is as easy as 123456
- 8:32 : Fake call logs, real payments: How CallPhantom tricks Android users
- 8:32 : AI, Cyberwarfare, and Autonomous Weapons: Inside America’s New Military Strategy
- 8:32 : CVE-2025-68670: discovering an RCE vulnerability in xrdp
- 8:32 : Zara – 197,376 breached accounts
- 8:32 : OpenAI tunes GPT-5.5-Cyber for more permissive security workflows
- 8:32 : Securonix launches AI threat research agent and ThreatWatch validation tool
- 8:32 : Avantra’s new AI can diagnose SAP failures in seconds
- 8:32 : Snyk integrates Claude to advance AI-native application security
- 8:5 : Another Universal Linux Local Privilege Escalation (LPE) Vulnerability: Dirty Frag, (Fri, May 8th)
- 8:4 : Windows updates and why pause forever is risky
- 8:4 : Coinbase Reports Sharp Crypto Trading Slowdown
- 8:4 : 423 Firefox Flaws Fixed as Browser Gains Support for Claude, Mythos, and More
- 8:4 : Ransomware Group Takes Credit for Trellix Hack
- 7:32 : CoreWeave Flags Rising AI Data Centre Costs
- 7:32 : Roblox chat moderation gets bypassed by leet speak and code words
- 7:32 : May 2026 Patch Tuesday forecast: AI starts driving security industry changes
- 7:32 : Object First Fleet Manager simplifies distributed backup storage
- 7:32 : Transilience AI unveils Security Operating System for cloud remediation
- 7:32 : Linux Kernel Dirty Frag LPE Exploit Enables Root Access Across Major Distributions
- 7:32 : PAN-OS RCE exploit , Poland water hacks, Ivanti EPMM flaw
- 7:5 : IT Security News Hourly Summary 2026-05-08 09h : 4 posts
- 7:3 : App Developer Rave Files Apple App Store Competition Suit
- 7:3 : New Infostealer Campaign Abuses GitHub Releases to Hide Malware Payloads
- 7:3 : Vulnerability in Claude Extension for Chrome Exposes AI Agent to Takeover
- 6:32 : PCPJack Worm Targets Docker, Kubernetes, Redis, and MongoDB Credentials
- 6:2 : Ivanti Patches EPMM Zero-Day Exploited in Targeted Attacks
- 5:32 : PoC Exploit Released for Dirty Frag Linux Kernel Vulnerability
- 5:32 : The Canvas Hack Is a New Kind of Ransomware Debacle
- 5:32 : Cybersecurity Industry Split Over Impact of Anthropic’s Mythos AI
- 5:32 : Product showcase: NetGuard open-source firewall for Android
- 5:32 : Mental health apps are collecting more than emotional conversations
- 5:5 : Multiple Critical Flaws Fixed in Next.js and React Server Components
- 5:5 : NWHStealer Campaign Deploys Bun Loader, Anti-VM Evasion, and Encrypted C2
- 5:5 : Your coworker might be selling company logins, and thinks it’s fine
- 4:32 : Multiple Critical Vulnerabilities Patched in Next.js and React Server Components
- 4:32 : Dirty Frag Linux Vulnerability Let Attackers Gain Root Privileges – PoC Released
- 4:32 : New infosec products of the week: May 8, 2026
- 4:32 : Meta allegedly made billions from scam advertising while online fraud explodes worldwide.
- 4:5 : IT Security News Hourly Summary 2026-05-08 06h : 1 posts
- 3:9 : Canvas Breach Disrupts Schools & Colleges Nationwide
- 2:2 : ISC Stormcast For Friday, May 8th, 2026 https://isc.sans.edu/podcastdetail/9924, (Fri, May 8th)
- 2:2 : ShinyHunters Extorts Universities in New Instructure Canvas Hack
- 1:32 : Accelerate innovation and govern integrity with Red Hat Satellite 6.19
- 1:32 : CVE-2026-31431: How Red Hat Advanced Cluster Security and Red Hat Advanced Cluster Management can help
- 1:5 : IT Security News Hourly Summary 2026-05-08 03h : 1 posts
- 1:3 : ShinyHunters Defaces Canvas LMS Portal, Hundreds of Universities Affected
- 0:3 : ShinyHunters Defaces Canvas LMS Portal, Thousands of Universities Affected
- 0:2 : Mozilla boasts Mythos boosted Firefox bug cull
- 23:2 : Fortinet at the World Economic Forum: Frontier AI models, AI-Driven Threats, Deepfakes, and the Future of Cyber Defense
- 22:5 : IT Security News Hourly Summary 2026-05-08 00h : 7 posts
- 22:3 : Hackers Use Fake Claude AI Site to Infect Users With New Beagle Malware
- 21:55 : IT Security News Daily Summary 2026-05-07