166 posts were published in the last hour
- 22:36 : As agents run amok, CrowdStrike’s $740M SGNL deal aims to help get a grip on identity security
- 21:13 : Astaroth Banking Trojan Targets Brazilians via WhatsApp Messages
- 21:13 : CrowdStrike Acquires SGNL for $740 Million to Thwart AI-Powered Cyber Threats
- 20:31 : 2026-01-08: KongTuke ClickFix activity
- 20:11 : n8n Users Urged to Patch CVSS 10.0 Full System Takeover Vulnerability
- 20:11 : CISO reporting structure key to strong cybersecurity outcomes
- 20:11 : Astaroth banking Trojan spreads in Brazil via WhatsApp worm
- 20:5 : IT Security News Hourly Summary 2026-01-08 21h : 7 posts
- 19:32 : AI and the Future of Work: 5 Predictions for 2026
- 19:31 : GenDigital Research Exposes AuraStealer Infostealer Tactics
- 19:31 : Critics pan spyware maker NSO’s transparency claims amid its push to enter US market
- 19:13 : Resolutions, shmesolutions (and what’s actually worked for me)
- 19:13 : Internet collapses in Iran amid protests over economic crisis
- 19:13 : What tools help reduce fraud or friendly fraud for online businesses?
- 19:13 : Patch Cisco ISE bug now before attackers abuse proof-of-concept exploit
- 18:31 : Wordfence Intelligence Weekly WordPress Vulnerability Report (December 15, 2025 to January 4, 2026)
- 18:13 : US Man Jailed After FBI Traced 1,100 IP Addresses in Cyberstalking Case
- 18:13 : How to Protest Safely in the Age of Surveillance
- 18:13 : Shinhan Card Probes Internal Data Leak Affecting About 190,000 Merchants
- 18:13 : Personal and Health Information of 22.6 Million Aflac Clients Stolen in Cyberattack
- 18:13 : Microsoft Introduces Hardware-Accelerated BitLocker to Boost Windows 11 Security and Performance
- 18:13 : Google Testing ‘Contextual Suggestions’ Feature for Wider Android Rollout
- 17:33 : ChatGPT Health: A New Secure Space for Trusted Health and Medical Conversations
- 17:33 : Cisco ISE Vulnerability Enables Access to Sensitive Data
- 17:33 : Trump Signals Possible Cyber Involvement in Caracas Power Loss During Maduro Extraction
- 17:33 : New DocuSign-Themed Phishing Scam Delivers Stealth Malware to Windows Devices
- 17:33 : New OAuth Attack Lets Hackers Bypass Microsoft Entra Authentication and Steal Keys
- 17:33 : Cisco ISE Flaw Lets Admins Access Restricted System Files
- 17:32 : Hitachi Energy Asset Suite
- 17:32 : Illinois health department exposed over 700,000 residents’ personal data for years
- 17:32 : Become a CISSP with Fortinet’s ISC2-Approved NSE Training
- 17:32 : WhatsApp Worm Spreads Astaroth Banking Trojan Across Brazil via Contact Auto-Messaging
- 17:32 : GoBruteforcer Botnet Targets Linux Servers
- 17:13 : Microsoft Enforces Mandatory MFA for Microsoft 365 Admin Center Logins
- 17:13 : New Phishing Attack Impersonate as DocuSign Deploys Stealthy Malware on Windows Systems
- 17:13 : Hackers Launched 8.1 Million Attack Sessions to React2Shell Vulnerability
- 17:13 : ChatGPT Health – A Dedicated Space for Health Queries With Strong Privacy and Security
- 17:13 : UAT-7290 Hackers Attacking Critical Infrastructure Entities in South Asia
- 17:13 : UK Government Unveils New Cyber Action Plan
- 17:13 : New Zero-Click Attack Lets ChatGPT User Steal Data
- 17:5 : IT Security News Hourly Summary 2026-01-08 18h : 27 posts
- 16:36 : Discord Controlled NodeCordRAT Steals Chrome Data via NPM Packages
- 16:36 : BBC Bitesize Launches Media Literacy Series To Help Teens Separate Fact From Fiction Online
- 16:36 : Real-time malware defense: Leveraging AWS Network Firewall active threat defense
- 16:36 : Moody’s forecasts growing AI threats, regulatory friction for 2026
- 16:14 : Cisco Snort 3 Security Flaws Threaten Network Inspection
- 16:14 : Public PoC prompts Cisco patch for ISE, ISE-PIC vulnerability
- 16:14 : Microsoft Unveils a New Tool to Migrate from Slack to Microsoft Teams
- 16:14 : Trump Signals U.S. Cyber Role in Caracas Blackout During Maduro Capture
- 16:14 : New ChatGPT Flaws Allow Attackers to Exfiltrate Sensitive Data from Gmail, Outlook, and GitHub
- 16:14 : Ransomware attacks kept climbing in 2025 as gangs refused to stay dead
- 16:14 : Cyera Raises $400 Million at $9 Billion Valuation
- 16:14 : Blackbird.AI Raises $28 Million for Narrative Intelligence Platform
- 16:14 : CrowdStrike to Buy Identity Security Firm SGNL for $740 Million in Cash
- 16:14 : The Boardroom Case for Penetration Testing
- 16:14 : Zero-Knowledge Compliance: How Privacy-Preserving Verification Is Transforming Regulatory Technology
- 16:14 : Attackers Don’t Guess and Defenders Shouldn’t Either
- 16:13 : The Silent Scourge: A Call to Action Against Burnout in Cybersecurity
- 16:13 : The Myth of Linux Invincibility: Why Automated Patch Management is Key to Securing the Open Source Enterprise
- 16:13 : Upwind Choppy AI simplifies cloud security exploration and investigation
- 16:13 : China-Linked UAT-7290 Targets Telecoms with Linux Malware and ORB Nodes
- 16:13 : China-Linked UAT-7290 Targets Telecom Networks in South Asia
- 16:13 : Lone Hacker Used Infostealers At Firms
- 16:13 : Crypto Scam Suspect Accused Of Billions
- 16:13 : DDoSia Fuels Affiliate Hacktivist Attacks
- 16:13 : Stalkerware Operator Pleads Guilty
- 16:13 : Cyber Briefing: 2026.01.08
- 16:13 : How CIOs can brace for AI-fueled cyberthreats
- 14:36 : 50,000 Servers Exposed as GoBruteforcer Scales Brute-Force Attacks
- 14:36 : CISA warns of active attacks on HPE OneView and legacy PowerPoint
- 14:36 : Recently fixed HPE OneView flaw is being exploited (CVE-2025-37164)
- 14:36 : Phishing Attacks Exploit Misconfigured Email Routing Settings to Target Microsoft 365 Users
- 14:36 : Kimwolf Botnet Uses Proxies To Spread
- 14:36 : Cisco Patches ISE Flaw After PoC Leak
- 14:36 : NodeCordRAT Found in npm Bitcoin Tools
- 14:11 : Fake ChatGPT and DeepSeek Extensions Spied on Over 1 Million Chrome Users
- 14:11 : Secure Log Tokenization Using Aho–Corasick and Spring
- 14:11 : The Truman Show Scam: Trapped in an AI-Generated Reality
- 14:11 : Lego’s Smart Bricks explained: what they do, and what they don’t
- 14:11 : CISA flags actively exploited Office relic alongside fresh HPE flaw
- 14:11 : Rethinking Security for Agentic AI
- 14:11 : Critical n8n Vulnerabilty Enables Arbitrary Code Execution, Over 100,000 Instances at Risk
- 14:11 : Google Launches Emergency Location Services in India for Android Devices
- 14:11 : Darknet AI Tool DIG AI Fuels Automated Cybercrime, Researchers Warn
- 14:11 : Cyera secures $400M to scale AI-native data security platform and enterprise adoption
- 14:11 : Vannadium’s Leap combines on-chain performance and data integrity for explainable AI
- 14:5 : IT Security News Hourly Summary 2026-01-08 15h : 9 posts
- 13:36 : Cisco Snort 3 Detection Engine Vulnerability Leaks Sensitive Data
- 13:36 : CISA Adds HP Enterprise OneView Code Injection Vulnerability to KEV Following Active Exploitation
- 13:36 : New OAuth-Based Attack Let Hackers Bypass Microsoft Entra Authentication Flows to Steal Keys
- 13:36 : Critical Vulnerability Exposes n8n Instances to Takeover Attacks
- 13:36 : Critical Vulnerability Patched in jsPDF
- 13:36 : ThreatsDay Bulletin: RustFS Flaw, Iranian Ops, WebUI RCE, Cloud Leaks, and 12 More Stories
- 13:13 : pcTattletale Founder Bryan Fleming Pleads Guilty in Federal Stalkerware Case
- 13:13 : UK regulators swarm X after Grok generated nudes from photos
- 13:13 : Researchers Expose WHILL Wheelchair Safety Risks via Remote Hacking
- 12:36 : AI & Humans: Making the Relationship Work
- 12:36 : Phantom Shuttle Chrome Extensions Caught Stealing Credentials
- 12:36 : Fifth of Breaches Take Two Weeks to Recover From
- 12:13 : Hackers Can Leverage Kernel Patch Protection to Hide Process from Task Manager
- 12:13 : CISA Warns of Microsoft PowerPoint Code Injection Vulnerability Exploited in Attacks
- 12:13 : Researches Detailed AuraStealer Obfuscation, Anti-Analysis and Data Theft Capabilities
- 12:13 : Cisco ISE Vulnerability Let Remote attacker Access Sensitive Data – Public PoC Available
- 12:13 : Maximum-severity n8n flaw lets randos run your automation server
- 12:13 : PoC released for unauthenticated RCE in Trend Micro Apex Central (CVE-2025-69258)
- 12:13 : The State of Trusted Open Source
- 11:36 : Critical HPE OneView Vulnerability Exploited in Attacks
- 11:36 : Bridging the Gap Between SRE and Security: A Unified Framework for Modern Reliability
- 11:36 : Coolify Discloses 11 Critical Flaws Enabling Full Server Compromise on Self-Hosted Instances
- 11:36 : Researchers Uncover NodeCordRAT Hidden in npm Bitcoin-Themed Packages
- 11:36 : Cisco Patches ISE Security Vulnerability After Public PoC Exploit Release
- 11:36 : US To Leave Global Forum on Cyber Expertise
- 11:15 : UAT-7290 targets high value telecommunications infrastructure in South Asia
- 11:15 : Securing Vibe Coding Tools: Scaling Productivity Without Scaling Risk
- 11:15 : Are criminals vibe coding malware? All signs point to yes
- 11:15 : OpenAI putting bandaids on bandaids as prompt injection problems keep festering
- 11:15 : U.S. CISA adds HPE OneView and Microsoft Office PowerPoint flaws to its Known Exploited Vulnerabilities catalog
- 11:15 : Fake WinRAR downloads hide malware behind a real installer
- 11:5 : IT Security News Hourly Summary 2026-01-08 12h : 8 posts
- 10:36 : Google, Character.AI Settle Lawsuit Over Florida Youth’s Suicide
- 10:11 : ASML Says Breach Claim Was Faked
- 10:11 : 6 steps to take ASAP if you’re targeted by sextortion scams
- 10:11 : China Hacked Email Systems Used by US Congressional Staff, New Report
- 10:11 : Linux Battery Utility Flaw Lets Hackers Bypass Authentication and Tamper System Settings
- 10:11 : GitLab Patches Multiple Vulnerabilities that Enables Arbitrary Code Execution
- 10:11 : Logitech macOS mouse mayhem traced to expired dev certificate
- 10:11 : Maximum Severity “Ni8mare” Bug Lets Hackers Hijack n8n Servers
- 9:36 : CES: ARM Adds Robotics Division
- 9:36 : PayPal email scam: How it worked before the fix
- 9:13 : Anthropic Said To Raise $10bn At $350bn Valuation
- 9:13 : China-linked groups intensify attacks on Taiwan’s critical infrastructure, NSB warns
- 9:13 : Top 3 Cyber Attacks In March 2026
- 9:13 : 10 Best IT Asset Management Tools In 2026
- 9:13 : Top 10 Best Server Monitoring Tools in 2026
- 9:13 : 10 Best Web Scanners for Website Security In 2026
- 9:13 : Top 50 Best Penetration Testing Companies in 2026
- 9:13 : IPFire update brings new network and security features to firewall deployments
- 8:36 : Cyber-Attack School Extends Closure To At Least Monday
- 8:36 : Chinese Authorities Review Meta’s Manus Acquisition
- 8:36 : ESA confirms new data heist, Ni8mare lets hackers hijack n8n servers, Taiwan blames ‘cyber army’ for intrusion attempts
- 8:13 : ownCloud Warns Users to Enable MFA After Credential Theft Incident
- 8:13 : Linux Battery Utility Vulnerability Allows Authentication Bypass and System Tampering
- 8:13 : Three Malicious NPM Packages Target Developers’ Login Credentials
- 8:13 : BlueDelta Hackers Target Microsoft OWA, Google, and Sophos VPN to Steal Credentials
- 8:13 : GitLab Patches Multiple Flaws Allowing Arbitrary Code Execution
- 8:13 : OpenAI Launches ChatGPT Health with Isolated, Encrypted Health Data Controls
- 8:5 : IT Security News Hourly Summary 2026-01-08 09h : 4 posts
- 7:36 : Three Malicious NPM Packages Attacking Developers to Steal Login Credentials
- 7:36 : Ni8mare Vulnerability Let Attackers Hijack n8n Servers – Exploit Released With 26,512 Vulnerable Hosts
- 7:36 : Cybercriminals are scaling phishing attacks with ready-made kits
- 7:15 : StackRox: Open-source Kubernetes security platform
- 6:36 : Cloudflare pours cold water on ‘BGP weirdness preceded US attack on Venezuela’ theory
- 6:11 : Passwords are where PCI DSS compliance often breaks down
- 6:11 : What happens to insider risk when AI becomes a coworker
- 6:11 : CISA Flags Microsoft Office and HPE OneView Bugs as Actively Exploited
- 5:36 : Voice cloning defenses are easier to undo than expected
- 5:5 : IT Security News Hourly Summary 2026-01-08 06h : 2 posts
- 4:13 : Hackers Exploiting VMware ESXi Instances in the Wild Using zero-day Exploit Toolkit
- 4:13 : Quantum-Durable Integrity Verification for Machine-to-Machine Model Contexts
- 3:13 : Spotify Data Scraping Incident Raises Questions on Copyright, Security, and Digital Preservation
- 3:13 : Government Flags WhatsApp Account Bans as Indian Number Misuse Raises Cyber Fraud Concerns
- 2:15 : ISC Stormcast For Thursday, January 8th, 2026 https://isc.sans.edu/podcastdetail/9758, (Thu, Jan 8th)
- 2:15 : 2026-01-07: MassLogger infection from email attachment
- 0:36 : Analysis using Gephi with DShield Sensor Data, (Wed, Jan 7th)
- 23:5 : IT Security News Hourly Summary 2026-01-08 00h : 10 posts
- 22:55 : IT Security News Daily Summary 2026-01-07