130 posts were published in the last hour
- 22:2 : How OSINT Strengthens Executive Threat Intelligence
- 20:31 : Congrats, cybercrims: You just fell into a honeypot
- 20:5 : IT Security News Hourly Summary 2026-01-05 21h : 5 posts
- 20:2 : Hacktivist deletes white supremacist websites live onstage during hacker conference
- 19:32 : Securing Verifiable Credentials With DPoP: A Spring Boot Implementation
- 19:32 : Trusted Google Notifications Used in Phishing Campaign Targeting 3,000+ Orgs
- 19:32 : Real-world AI voice cloning attack: A red teaming case study
- 19:32 : NordVPN Says Breach Claims Involve Dummy Test Data
- 19:4 : Hacktivist deletes white supremacist websites live on stage during hacker conference
- 19:4 : Malware Campaign Abuses Booking.com Against Hospitality Sector
- 18:32 : Researchers Warn of Data Exposure Risks in Claude Chrome Extension
- 18:31 : Playing Koi: Palo Alto isn’t saying if it will buy security start-up
- 18:31 : Russia-Aligned Hackers Abuse Viber to Target Ukrainian Military and Government
- 18:2 : Risks of OOB Access via IP KVM Devices, (Mon, Jan 5th)
- 18:2 : Critical SmarterMail Bug Enables Unauthenticated File Uploads
- 18:2 : Brightspeed Investigating Cyberattack
- 18:2 : Cyberattack Unlikely in Communications Failure That Grounded Flights in Greece
- 18:2 : What the CEO and C-Suite Must Ask Before Building an AI Enabled Enterprise
- 18:2 : NDSS 2025 – Probe-Me-Not: Protecting Pre-trained Encoders From Malicious Probing
- 17:32 : Questions I’ve Been Asked
- 17:32 : From noise to signal: Building a risk-first alert pipeline that analysts trust
- 17:32 : WhatsApp Vulnerabilities Leaks User’s Metadata Including Device’s Operating System
- 17:31 : Sedgwick Confirms Cyberattack on Government Subsidiary
- 17:31 : Kimwolf Android Botnet Infects Over 2 Million Devices via Exposed ADB and Proxy Networks
- 17:7 : 2M Devices at Risk as Kimwolf Botnet Abuses Proxy Networks
- 17:7 : Cyberattack on Higham Lane School Forced to Close its Doors to all Students and Staff
- 17:7 : Gmail to Discontinue POP3 Mail Fetching for External Email Accounts
- 17:6 : Ilya Lichtenstein Released Early After Bitfinex Hack Conviction
- 17:6 : Thousands of firewalls at risk as legacy flaw in Fortinet faces renewed threat
- 17:5 : IT Security News Hourly Summary 2026-01-05 18h : 8 posts
- 16:32 : Windows Users at Risk as Critical Zoom Vulnerability Exploited
- 16:32 : ALPRs are recording your daily drive (Lock and Code S06E26)
- 16:32 : Chinese Robotaxis May Launch UK Trials in 2026 as Uber and Lyft Partner With Baidu
- 16:32 : India Steps Up AI Adoption Across Governance and Public Services
- 16:32 : India’s Fintech Will Focus More on AI & Compliance in 2026
- 16:32 : Nissan Says Customer Data Exposed After Breach at Red Hat Systems
- 16:32 : Malicious NPM Package Masquerading as WhatsApp Web API Steals Messages and Account Access
- 16:32 : Thousands of firewalls at risk as legacy flaw in Fortinet under renewed threat
- 16:4 : NordVPN Denies Breach After Hacker Claims Access to Salesforce Dev Data
- 16:4 : Kimwolf botnet leverages residential proxies to hijack 2M+ Android devices
- 16:4 : VVS Stealer Uses Advanced Obfuscation to Target Discord Users
- 16:4 : Cyber risks grow as manufacturers turn to AI and cloud systems
- 15:32 : California Unveils DROP Tool for Personal Data Deletion
- 15:32 : Google Tasks Used to Deliver Stealth Phishing Attacks
- 15:32 : Handala Leak Shows Telegram Account Risk, Not iPhone Hacks
- 15:32 : CISA KEV Catalog Expanded 20% in 2025, Topping 1,480 Entries
- 15:32 : Vulnerability Summary for the Week of December 29, 2025
- 15:32 : New Zealand Orders Review of Manage My Health Breach Affecting 100,000+ Patients
- 15:32 : Cyber Briefing: 2026.01.05
- 15:9 : Ransomware Profits Shrink Forcing Criminal Gangs to Innovate
- 14:32 : Palo Alto Networks Eyes $400M Acquisition of Koi Security
- 14:32 : Gmail preparing to drop POP3 mail fetching
- 14:31 : ⚡ Weekly Recap: IoT Exploits, Wallet Breaches, Rogue Extensions, AI Abuse & More
- 14:5 : IT Security News Hourly Summary 2026-01-05 15h : 7 posts
- 14:4 : GHOSTCREW: AI-Powered Red Team Toolkit Integrating Metasploit, Nmap, and More
- 14:4 : ProfileHound: Post-Escalation Tool Designed to Achieve Red Team Objectives
- 14:4 : Kimwolf Botnet Exploits 2 Million Devices to Build a Global Proxy Infrastructure
- 14:4 : Attackers Leverage FortiWeb Vulnerabilities to Deploy Sliver C2 for Long-Term Access
- 14:4 : Hackers Steal $35M in Cryptocurrency Following LastPass Breach
- 13:31 : Master IT Fundamentals with This CompTIA Certification Prep Bundle
- 13:31 : Inside China’s Urban Navigation Blackout and the Lessons for India
- 13:4 : Kimwolf Botnet Hacked 2 Million Devices and Turned User’s Internet Connection as Proxy Node
- 13:4 : Threat Actor Exploited Multiple FortiWeb Appliances to Deploy Sliver C2 for Persistent Access
- 13:4 : Kimwolf Android Botnet Grows Through Residential Proxy Networks
- 13:4 : The State of Cybersecurity in 2025: Key Segments, Insights, and Innovations
- 12:32 : How To Build Ransomware-Resilient AI Data Pipelines: A Practical Guide for Modern Enterprises
- 12:32 : Grok apologizes for creating image of young girls in “sexualized attire”
- 12:32 : Researcher Spotlights WhatsApp Metadata Leak as Meta Begins Rolling Out Fixes
- 12:32 : AWS CISO: Need for Continuous Observability is Now Critical
- 12:31 : Cybersecurity Deals Exceed One Billion
- 12:31 : Finland Arrests Crew Over Cable Damage
- 12:31 : Cognizant Faces Lawsuits After Breach
- 12:5 : Sergey Petrossov’s Aero Ventures Addresses Aviation’s Younger, Tech-Focused Buyer Demographic
- 12:5 : New Zealand orders review into ManageMyHealth cyberattack
- 12:5 : RondoDox Botnet Hijacks IoT Systems
- 12:5 : Infostealers Hijack Business Infrastructure
- 12:5 : Hackers Claim Resecurity Breach
- 12:5 : Trust Wallet Chrome Hack Drains Funds
- 12:4 : Covenant Health Data Breach Impacts
- 11:31 : Threat Group ‘Crimson Collective’ Allegedly Claim Breach of Largest Fiber Broadband Brightspeed
- 11:31 : Critical GNU Wget2 Vulnerability Let Remote Attackers to Overwrite Sensitive Files
- 11:5 : IT Security News Hourly Summary 2026-01-05 12h : 8 posts
- 11:4 : Shares In Chinese AI Chipmaker Biren Soar On HK Debut
- 11:4 : Disney Fined $10M for Violating Children’s Privacy Laws on YouTube
- 11:4 : The cybercriminal behind the 2016 Bitfinex hack has been released from prison early thanks to Trump’s 2018 First Step Act
- 10:32 : France Aims For Youth Social Media Ban By September
- 10:32 : Inside 2025’s Top Threat Groups: Why Familiar Actors Still Have the Upper Hand
- 10:32 : Quantum Computing Stats, Trends & Future 2026: Crucial Year for Quantum Security
- 10:32 : European Space Agency Confirms Server Breach
- 10:32 : From tech sprawl to clarity with XDR
- 10:4 : ESA Confirms External Servers Affected By Hack
- 10:4 : Eaton Vulnerabilities Let Attackers Execute Arbitrary Code On the Host System
- 10:4 : Silent Authentication: Redefining Security, Flexibility and Customer Engagement
- 10:4 : Bitfinex Hack Convict Ilya Lichtenstein Released Early Under U.S. First Step Act
- 9:32 : Grok Chatbot Publishes Sexualised Images Of Minors
- 9:32 : Will Agentic AI Hurt or Help Your Security Posture?
- 9:32 : Experts Trace $35m in Stolen Crypto to LastPass Breach
- 9:5 : DeepSeek Proposes Tweak For AI Efficiency
- 9:4 : VVS Stealer, a new python malware steals Discord credentials
- 9:4 : New VVS Stealer Malware Targets Discord Accounts via Obfuscated Python Code
- 8:32 : London Council Says Hackers Took Sensitive Data
- 8:32 : GHOSTCREW – AI-based Red Team Toolkit for Penetration Testing Invoking Metasploit, Nmap and Other Tools
- 8:32 : Threat Actor Allegedly Claim Leak of NordVPN Salesforce Database with Source Codes
- 8:32 : A week in security (December 29 – January 4)
- 8:31 : Palo Alto AI warning, Resecurity hack fiasco, Christmas ColdFusion attack
- 8:5 : IT Security News Hourly Summary 2026-01-05 09h : 1 posts
- 8:4 : BYD Tops Tesla As World’s Biggest EV Maker
- 7:4 : Sedgwick discloses data breach after TridentLocker ransomware attack
- 7:4 : Multiple Vulnerabilities in QNAP Tools Let Attackers Obtain Secret Data
- 7:4 : California’s DROP Platform Launches: What Enterprise B2B SaaS Companies Need to Know About Data Deletion Compliance
- 7:4 : AI security risks are also cultural and developmental
- 7:4 : Pharma’s most underestimated cyber risk isn’t a breach
- 7:4 : Infrastructure Under Attack: Cybersecurity Today for Monday January 5, 2026
- 6:31 : AI and the End of the Traditional Entry-Level Tech Job
- 6:4 : Understanding AI insider risk before it becomes a problem
- 6:4 : OpenAEV: Open-source adversarial exposure validation platform
- 5:5 : IT Security News Hourly Summary 2026-01-05 06h : 1 posts
- 4:31 : Hackers Trapped in Resecurity’s Honeypot During Targeted Attack on Employee Network
- 3:4 : API Authentication Methods Explained: API Keys, OAuth, JWT & HMAC Compared
- 2:5 : IT Security News Hourly Summary 2026-01-05 03h : 3 posts
- 2:4 : ISC Stormcast For Monday, January 5th, 2026 https://isc.sans.edu/podcastdetail/9752, (Mon, Jan 5th)
- 2:4 : Researcher Wipes White Supremacist Dating Sites, Leaks Data on okstupid.lol
- 1:31 : Post-Quantum Decentralized Identifiers for Autonomous Tool Calling
- 1:4 : Are current NHI security measures truly impenetrable
- 1:4 : Are industry leaders satisfied with current AI security measures
- 1:4 : How much freedom do companies have in choosing NHIs
- 1:4 : How are cybersecurity teams supported by latest secrets management tools
- 23:5 : IT Security News Hourly Summary 2026-01-05 00h : 2 posts
- 22:58 : IT Security News Weekly Summary 01
- 22:55 : IT Security News Daily Summary 2026-01-04