38 posts were published in the last hour
- 22:33 : California residents can use new tool to demand brokers delete their personal data
- 20:31 : Finnish Authorities Detain Crew After Undersea Internet Cable Severed
- 20:5 : IT Security News Hourly Summary 2026-01-03 21h : 6 posts
- 20:2 : Bitfinex hacker Ilya Lichtenstein credits Trump for early release from prison
- 20:2 : French authorities investigate AI ‘undressing’ deepfakes on X
- 19:32 : ShinyHunters Claim Breach of US Cybersecurity Firm Resecurity (Updated)
- 19:31 : Resecurity Says ShinyHunters Fell for Honeypot After Breach Claim
- 19:31 : NDSS 2025 – DLBox: New Model Training Framework For Protecting Training Data
- 19:31 : Data Privacy vs Cybersecurity Solutions: Key Differences
- 18:2 : Fake DHL Pickup Slips Used in QR Code Phishing Scam
- 18:2 : GlassWorm Malware Returns with MacOS-focused Attack via VS Code Extensions
- 18:2 : This Week in Cybersecurity: User Data Theft, AI-Driven Fraud, and System Vulnerabilities
- 17:5 : IT Security News Hourly Summary 2026-01-03 18h : 1 posts
- 17:2 : ShinyHunters Claim Breach of US Cybersecurity Firm Resecurity
- 15:31 : Apple Forces iOS 26 Upgrade Amid Active iPhone Security Threats
- 15:31 : 2FA Fail: Hackers Exploit Microsoft 365 to Launch Code Phishing Attacks
- 15:2 : RondoDox Botnet is Using React2Shell to Hijack Thousands of Unpatched Devices
- 14:32 : Finnish Authorities Arrest Two Sailors in Probe Into Undersea Cable Disruption
- 14:32 : India’s RBI Opens Doors to Lateral Hiring in 2026, Signalling a Tech-First Shift in Financial Regulation
- 14:32 : Taiwan Holds 210 BTC Seized from Criminals, Debates Bitcoin’s Strategic Value
- 12:2 : Thousands of ColdFusion exploit attempts spotted during Christmas holiday
- 11:5 : IT Security News Hourly Summary 2026-01-03 12h : 5 posts
- 11:2 : President Trump Orders Divestment in $2.9 Million Chips Deal to Protect US Security Interests
- 10:32 : How to Protect Your iPhone or Android Device From Spyware
- 10:32 : VVS Stealer Uses PyArmor Obfuscation to Evade Static Analysis and Signature Detection
- 10:31 : Finland Arrests Two Cargo Ship Crew Members Over Undersea Cable Damage
- 10:31 : Infostealers Enable Attackers to Hijack Legitimate Business Infrastructure for Malware Hosting
- 5:31 : Final Encore Episode – Research, Cybersecurity Awareness and Training
- 3:31 : What is Enterprise Identity — And Why Most Companies Get SSO & RBAC Catastrophically Wrong
- 2:5 : IT Security News Hourly Summary 2026-01-03 03h : 4 posts
- 2:2 : Why are IT leaders optimistic about future AI governance
- 2:2 : How do Agentic AI systems deliver value in real-time operations
- 2:2 : How capable are current secrets rotation systems in preventing breaches
- 2:2 : Are investments in Privileged Access Management justified by results
- 0:2 : Protecting Your Digital Wallet: What You Need to Know About Fintech Security
- 23:5 : IT Security News Hourly Summary 2026-01-03 00h : 2 posts
- 23:2 : Two U.S. cybersecurity professionals plead guilty in BlackCat/Alphv ransomware case
- 22:55 : IT Security News Daily Summary 2026-01-02