166 posts were published in the last hour
- 22:13 : U.S. Public Sector Under Siege
- 21:36 : Architecting Immutable Data Integrity with Amazon QLDB and Blockchain
- 21:36 : 10,000+ Active Infections Traced to SystemBC Botnet
- 21:36 : Hacker claims theft of data from 700,000 Substack users; Company confirms breach
- 21:7 : Chrome Vulnerabilities Allow Code Execution, Browser Crashes
- 20:38 : ICE and CBP’s Face-Recognition App Can’t Actually Verify Who People Are
- 20:9 : Microsoft Overhauls Security Leadership as AI Expands Enterprise Attack Surface
- 20:9 : Substack says intruder lifted emails, phone numbers in months-old breach
- 20:9 : New Clickfix variant ‘CrashFix’ deploying Python Remote Access Trojan
- 20:5 : IT Security News Hourly Summary 2026-02-05 21h : 4 posts
- 19:34 : Asia-based government spies quietly broke into critical networks across 37 countries
- 19:9 : All gas, no brakes: Time to come to AI church
- 19:9 : Top 7 reasons incident response plans fail
- 19:9 : One of Europe’s largest universities knocked offline for days after cyberattack
- 18:36 : Top 19 contact center platforms of 2026
- 18:36 : Keeper Security Announces 2026 MSP Partner Program
- 18:36 : AISURU/Kimwolf Botnet Launches Record-Setting 31.4 Tbps DDoS Attack
- 17:36 : Hitachi Energy XMC20
- 17:36 : o6 Automation GmbH Open62541
- 17:36 : Hitachi Energy FOX61x
- 17:36 : Mitsubishi Electric MELSEC iQ-R Series
- 17:36 : TP-Link Systems Inc. VIGI Series IP Camera
- 17:36 : Salt Security warns autonomous AI agents are the next major security blind spot
- 17:36 : Threat Group Running Espionage Operations Against Dozens of Governments
- 17:36 : The security implementation gap: Why Microsoft is supporting Operation Winter SHIELD
- 17:14 : OpenClaw and the Growing Security Risks of Agentic AI
- 17:14 : AI and Regulation Redefine Application Security, New Global Study Finds
- 17:14 : Attackers Use Legitimate Forensic Driver to Disable Endpoint Security, Huntress Warns
- 17:14 : Proton Warns European Startups: No One Is Too Small to Be Targeted by Hackers
- 17:13 : Harlan Parrott Appointed as KnowBe4’s VP of AI Innovation
- 17:13 : Orchid Security Adds Ability to Audit Behaviors by Identity
- 17:13 : Experts Find Malicious Browser Extensions, Chrome, Safari, and Edge Affected
- 17:13 : China-Linked Hackers Step Up Quiet Spying Across South-East Asia
- 17:13 : Smart Homes Under Threat: How to Reduce the Risk of IoT Device Hacking
- 17:13 : Tactical Wireless Security
- 17:5 : IT Security News Hourly Summary 2026-02-05 18h : 7 posts
- 16:36 : Wordfence Intelligence Weekly WordPress Vulnerability Report (January 26, 2026 to February 1, 2026)
- 16:36 : Pro-Russian group Noname057(16) launched DDoS attacks on Milano Cortina 2026 Winter Olympics
- 16:35 : 170+ SolarWinds Help Desk Installations Vulnerable to RCE Attacks Exposed Online
- 16:35 : Attackers Mimic RTO Challan Notifications to Deliver Android Malware
- 16:35 : Betterment Data Breach Exposes 1.4 million Customers Personal Details
- 16:35 : Betterment breach may expose 1.4M users after social engineering attack
- 16:35 : CISA confirms exploitation of VMware ESXi flaw by ransomware attackers
- 15:34 : Data breach at govtech giant Conduent balloons, affecting millions more Americans
- 15:34 : Substack Discloses Security Incident After Hacker Leaks Data
- 15:34 : Microsoft Unveils Backdoor Scanner for Open-Weight AI Models
- 15:34 : Makina Finance Loses $4M in ETH After Flash Loan Price Manipulation Exploit
- 15:34 : OpenAI Frontier organizes AI agents under one system
- 15:34 : Cyber Briefing: 2026.02.05
- 15:10 : Common Crypto Scams and How to Protect Your Funds in 2026
- 15:10 : Godent Rolls Out Scanner-as-a-Service Model to Drive Digital Transformation in European Dentistry
- 15:10 : n8n Flaw Puts Hundreds of Thousands of Enterprise AI Systems at Risk
- 15:10 : Substack confirms data breach affects users’ email addresses and phone numbers
- 15:10 : Attackers allege 1.4TB data breach at Iron Mountain
- 15:10 : Notepad++ Update Hijacked in Six-Month, State-Linked Supply-Chain Attack
- 15:10 : Forescout’s 2025 Threat Roundup: 84% OT Surge Signals Expanding Cyber Chaos
- 15:10 : Microsoft: Python-Powered Infostealers Are Now Targeting macOS at Scale
- 15:10 : Rethinking the Security Estate: Why IT Spend Isn’t the Same as Cybersecurity Readiness
- 15:10 : Critical n8n Vulnerability Enables System Command Execution Via Weaponized Workflows
- 15:10 : WatchGuard VPN Client for Windows Vulnerability Enables Command Execution With SYSTEM Privileges
- 15:10 : ShadowSyndicate Using Server Transition Technique in Ransomware Attacks
- 14:35 : Operant AI’s Agent Protector Aims to Secure Rising Tide of Autonomous AI
- 14:35 : Malicious Commands in GitHub Codespaces Enable RCE
- 14:34 : Cyberattack At Trocaire College Exposes Data
- 14:34 : Senators Introduce Bill Targeting Scam Ads
- 14:34 : Man Faces More Charges In Geisinger Breach
- 14:34 : Hackers Recruit Insiders To Bypass Security
- 14:34 : GRC Glossary A–Z (2026 Edition)
- 14:14 : macOS Users Hit by Python Infostealers Posing as AI Installers
- 14:14 : Open the wrong “PDF” and attackers gain remote access to your PC
- 14:14 : SaaS Abuse at Scale: Phone-Based Scam Campaign Leveraging Trusted Platforms
- 14:14 : VS Code Configs Expose GitHub Codespaces to Attacks
- 14:13 : Researchers Expose Network of 150 Cloned Law Firm Websites in AI-Powered Scam Campaign
- 14:13 : Foxit Publishes Security Patches for PDF Editor Cloud XSS Bugs
- 14:13 : ThreatsDay Bulletin: Codespaces RCE, AsyncRAT C2, BYOVD Abuse, AI Cloud Intrusions & 15+ Stories
- 14:5 : IT Security News Hourly Summary 2026-02-05 15h : 7 posts
- 13:36 : Cyberattackers Use Fake RTO Challan Alerts to Spread Android Malware
- 13:36 : Nullify Secures $12.5 Million in Seed Funding for Cybersecurity AI Workforce
- 13:36 : Smartphones Now Involved in Nearly Every Police Investigation
- 13:9 : Sanctioned Bulletproof Host Linked to Hijacking of Old Home Routers
- 13:9 : Moxa Switches Vulnerability Enables Unauthorized Access through Authentication Bypass
- 13:9 : n8n Vulnerability Allows Remote Attackers to Hijack Systems via Malicious Workflow Execution
- 13:9 : ShadowSyndicate Leverages Server Transition Technique in Latest Ransomware Attacks
- 12:34 : Cybersecurity Alert: Fake Traffic Ticket Portals Target Personal, Credit Card Data
- 12:34 : Microsoft to Add Sysmon Threat Detection Feature Natively to Windows 11
- 12:34 : SystemBC Infects 10,000 Devices After Defying Law Enforcement Takedown
- 12:34 : Italy Averted Russian-Linked Cyberattacks Targeting Winter Olympics Websites, Foreign Minister Says
- 12:9 : European Officials Warn of Russian Satellites Intercepting Communications
- 12:9 : Varonis Acquires AllTrue to Strengthen AI Security Capabilities
- 12:9 : Backdoor in Notepad++
- 12:9 : Flock cameras shared license plate data without permission
- 12:9 : n8n security woes roll on as new critical flaws bypass December fix
- 12:9 : Italy claims cyberattacks ‘of Russian origin’ are pelting Winter Olympics
- 12:9 : International sting dismantles illegal streaming empire serving millions
- 12:9 : Why a decade-old EnCase driver still works as an EDR killer
- 12:9 : Infy Hackers Resume Operations with New C2 Servers After Iran Internet Blackout Ends
- 12:9 : The Buyer’s Guide to AI Usage Control
- 12:9 : New Hacking Campaign Exploits Microsoft Windows WinRAR Vulnerability
- 11:32 : LockBit 5.0 Unveils Cross-Platform Threats for Windows, Linux & ESXi Systems
- 11:32 : Critical N8n Sandbox Escape Could Lead to Server Compromise
- 11:31 : Asset Intelligence as Context Engineering for Cybersecurity Operations
- 11:11 : Knife Cutting the Edge: Disclosing a China-nexus gateway-monitoring AitM framework
- 11:11 : The Shadow Campaigns: Uncovering Global Espionage
- 11:11 : Cloud sovereignty is no longer just a public sector concern
- 11:11 : Cyberspy Group Hacked Governments and Critical Infrastructure in 37 Countries
- 11:11 : Securing Agents Isn’t the Customer’s Job, It’s the Platform’s
- 11:11 : The Compliance Convergence Challenge: Permission Sprawl and AI Regulations in Hybrid Environments
- 11:11 : Police shut down global DDoS operation, arrest 20-year-old
- 11:11 : GitHub enables multi-agent AI coding inside repository workflows
- 11:5 : IT Security News Hourly Summary 2026-02-05 12h : 8 posts
- 10:36 : DragonForce Ransomware Targets Critical Businesses to Exfiltrate Sensitive Data
- 10:36 : China-linked Amaranth-Dragon hackers target Southeast Asian governments in 2025
- 10:36 : Beware of Weaponized Voicemail Messages that Allows Hackers to Remote Access to Your System
- 10:36 : DragonForce Ransomware Attacking Critical Business to Exfiltrate Sensitive Information
- 10:36 : Hackers Exploit SonicWall SSLVPN Credentials to Deploy EDR Killer and Bypass Security
- 10:36 : Beware of Fake Traffic Ticket Portals that Harvest Your PII and Credit Card Data
- 10:36 : Cisco Meeting Management Vulnerability Let Remote Attacker Upload Arbitrary Files
- 10:36 : AI-Enabled Voice and Virtual Meeting Fraud Surges 1000%+
- 10:5 : Go 1.25.7 and Go 1.24.13 Released With Patches for Multiple Security Vulnerabilities
- 10:4 : Cisco, F5 Patch High-Severity Vulnerabilities
- 9:32 : Weaponized Voicemail Hack Allows Remote Access to Systems, Experts Warn
- 9:32 : Microsoft launches LiteBox, a security-focused open-source library OS
- 9:32 : Microsoft brings project-focused AI agents into OneDrive
- 9:9 : Broken Phishing URLs, (Thu, Feb 5th)
- 9:9 : Stan Ghouls targeting Russia and Uzbekistan with NetSupport RAT
- 9:9 : Varonis acquires AllTrue.ai to enable safe, compliant AI at scale
- 9:9 : AiStrike introduces AI-powered MDR to reduce costs and alert fatigue
- 8:34 : Ukraine tightens controls on Starlink terminals, VMware ESXi flaw now exploited, SolarWinds Web Help Desk bug under attack
- 8:5 : APT28 Hackers Exploit Microsoft Office Vulnerability to Target Government Agencies
- 8:5 : OfferUp scammers are out in force: Here’s what you should know
- 8:5 : Three clues that your LLM may be poisoned with a sleeper-agent back door
- 8:5 : IT Security News Hourly Summary 2026-02-05 09h : 5 posts
- 7:34 : Amaranth-Dragon Exploits WinRAR Vulnerability for Persistent Access to Victim Systems
- 7:34 : New 3 Step Malvertising Chain Abusing Facebook Paid Ads to Push Tech Support Scam Kit
- 7:34 : Threat Actors Hacking NGINX Servers to Redirect Web Traffic to Malicious Servers
- 7:34 : New DesckVB RAT with Multi-stage Infection Chain and Plugin-Based Architecture
- 7:33 : APT28 Hackers Exploiting Microsoft Office Vulnerability to Compromise Government Agencies
- 7:4 : Threat Actors Exploiting NGINX Servers to Redirect Web Traffic to Malicious Sites
- 7:4 : Smart glasses are back, privacy issues included
- 6:34 : New DesckVB RAT Unveiled with Multi-Stage Infection Chain and Plugin-Based Architecture
- 6:34 : Amaranth-Dragon Exploiting WinRAR Vulnerability to Gain Persistent to Victim Systems
- 6:34 : Attackers Using DNS TXT Records in ClickFix Script to Execute Powershell Commands
- 6:34 : New 3 Step Malvertising Chain Abusing Facebook Paid Ads to Push Tech Support #Scam Kit
- 6:34 : Malicious NGINX Configurations Enable Large-Scale Web Traffic Hijacking Campaign
- 6:34 : Critical n8n Flaw CVE-2026-25049 Enables System Command Execution via Malicious Workflows
- 6:7 : New 3-Step Malvertising Chain Exploits Facebook Ads to Promote Tech Support Scam Kit
- 6:7 : Satya Nadella decides Microsoft needs an engineering quality czar
- 6:7 : AI is driving a new kind of phishing at scale
- 6:7 : Hackers Exploit React2Shell to Hijack Web Traffic via Compromised NGINX Servers
- 5:36 : Measuring AI use becomes a business requirement
- 5:36 : Cybersecurity planning keeps moving toward whole-of-society models
- 5:7 : CISA Confirms VMware ESXi 0-Day Vulnerability Exploited in Ransomware Operations
- 5:7 : Microsoft to Integrate Sysmon Threat Detection Natively into Windows 11
- 5:7 : Cisco Warns of Meeting Management Flaw Enabling Arbitrary File Upload by Remote Attackers
- 5:7 : Cyberattackers Exploit DNS TXT Records in ClickFix Script to Execute Malicious PowerShell Commands
- 5:7 : WatchGuard VPN Client Flaw on Windows Enables SYSTEM‑Level Command Execution
- 5:5 : IT Security News Hourly Summary 2026-02-05 06h : 2 posts
- 4:7 : Multiple TP-Link OS Command Injection Vulnerabilities Let Attackers Gain Admin Control of the Device
- 4:7 : CISA Warns of VMware ESXi 0-day Vulnerability Exploited in Ransomware Attacks
- 2:36 : ISC Stormcast For Thursday, February 5th, 2026 https://isc.sans.edu/podcastdetail/9796, (Thu, Feb 5th)
- 2:5 : IT Security News Hourly Summary 2026-02-05 03h : 2 posts
- 2:2 : Betterment – 1,435,174 breached accounts
- 1:9 : Top AI Tools for Red Teaming in 2026
- 0:9 : From Automation to Infection (Part II): Reverse Shells, Semantic Worms, and Cognitive Rootkits in OpenClaw Skills
- 23:5 : IT Security News Hourly Summary 2026-02-05 00h : 3 posts
- 22:55 : IT Security News Daily Summary 2026-02-04