181 posts were published in the last hour
- 22:32 : Threat Brief: March 2026 Escalation of Cyber Risk Related to Iran
- 22:32 : Fooling AI Agents: Web-Based Indirect Prompt Injection Observed in the Wild
- 22:31 : The Hidden Cyber Risks of Remote Work Infrastructure
- 22:31 : FBI investigating hack on its wiretap and surveillance systems: Report
- 22:7 : FBI investigating hack on its wiretap and surveillance systems: report
- 22:7 : ShinyHunters Claims Woflow Breach: What It Means for SaaS Supply Chain Security
- 21:34 : AI Won’t Fix Cybersecurity Burnout
- 21:11 : Pakistan-Linked APT36 Floods Indian Govt Networks With AI-Made ‘Vibeware’
- 21:11 : Hackers Used New Exploit Kit to Compromise Thousands of iPhones
- 21:11 : Comparison of 5 top next-generation firewall vendors
- 21:11 : Italian prosecutors confirm journalist was hacked with Paragon spyware
- 20:34 : Cisco SD-WAN Manager Vulnerabilities Actively Exploited
- 20:34 : AI Adoption Is Forcing Security Teams to Rethink Browser Defense
- 20:11 : The Controversies Finally Caught Up to Kristi Noem
- 20:11 : Phobos Ransomware admin faces up to 20 years after guilty plea
- 20:5 : IT Security News Hourly Summary 2026-03-05 21h : 7 posts
- 19:34 : Wordfence Intelligence Weekly WordPress Vulnerability Report (February 23, 2026 to March 1, 2026)
- 19:34 : Suspected DPRK Threat Actors Compromise Crypto Firms, Steal Keys and Cloud Assets in Coordinated Attacks
- 19:34 : Threat Actors Use New RingH23 Arsenal to Compromise MacCMS and CDN Infrastructure at Scale
- 19:34 : Threat Actors Using Fake Claude Code Download to Deploy Infostealer
- 19:34 : Latest OpenClaw Security Risk: Fake GitHub Repositories Used to Deploy Infostealers
- 19:5 : Patch, track, repeat: The 2025 CVE retrospective
- 19:5 : 5 Best Next Gen Endpoint Protection Platforms in 2026
- 19:5 : FYI: Impersonators are (still) targeting companies with fake TechCrunch outreach
- 19:4 : Iran intelligence backdoored US bank, airport, software outfit networks
- 19:4 : Latest OpenClaw Security Risks are Fake GitHub Repositories Used to Deploy Infostealers
- 18:34 : Google says half of all zero-days it tracked in 2025 targeted buggy enterprise tech
- 18:34 : Provecho – 712,904 breached accounts
- 18:3 : Delta Electronics CNCSoft-G2
- 18:3 : Israel Hacked Traffic Cameras in Iran
- 18:3 : OpenClaw Incidents Show Why AI Adoption Pressure Puts Companies at Risk
- 18:3 : ClickFix Campaign Uses Fake VCs on LinkedIn to Deliver Malware to Crypto and Web3 Professionals
- 18:3 : Passwordless Authentication for WooCommerce with Adaptive MFA
- 18:3 : The Circus at CISA Continues
- 18:2 : Malicious AI Assistant Extensions Harvest LLM Chat Histories
- 18:2 : Women’s History Month: Encouraging women in cybersecurity at every career stage
- 18:2 : AWS completes the 2026 annual Dubai Electronic Security Centre (DESC) certification audit
- 17:34 : PleaseFix Flaw Lets Hackers Access 1Password Vault via Comet AI Browser
- 17:34 : Cisco Firewall Management Flaw Enables Remote Code Execution
- 17:34 : Check Point Unveils Secure AI Advisory Service to Help Enterprises Govern AI Adoption
- 17:34 : Zero Trust in the Age of AI: Why the Classic Model Isn’t Enough Anymore
- 17:34 : Chinese AI App Seedance Ignites Hollywood Copyright Panic
- 17:34 : Too Much Data Regulation Can Create Security Risks
- 17:34 : LexisNexis Confirms Data Breach After Hackers Exploit Unpatched React App
- 17:34 : China Tightens Control Over Official Data Available to the Outside World
- 17:34 : Coruna Exploit Kit Targets iPhones With 23 Vulnerabilities Across Multiple iOS Versions
- 17:5 : IT Security News Hourly Summary 2026-03-05 18h : 9 posts
- 17:2 : Anthropic CEO Calls OpenAI’s Military Messaging ‘Straight Up Lies’
- 17:2 : NDSS 2025 – Revisiting Physical-World Adversarial Attack On Traffic Sign Recognition
- 16:34 : 3 Data-Based Shifts Defining AI-Native Cybersecurity Stacks
- 16:34 : Invisible Lifelines: DCIM Empowers Healthcare Teams
- 16:34 : Cybersecurity’s Fundamental Flaw: It’s Still an Open-Loop System
- 16:34 : Plankey’s nomination as CISA director now in jeopardy
- 16:34 : Microsoft, Europol disrupt global phishing platform Tycoon 2FA
- 16:5 : Coruna iOS Exploit Kit Compromises Thousands of iPhones
- 16:5 : Russian APT targets Ukraine with BadPaw and MeowMeow malware
- 16:5 : Reach the Peak of Cybersecurity Expertise with the Fortinet NSE 8 Certification
- 16:4 : AI-Driven Insider Risk Now a “Critical Business Threat,” Report Warns
- 15:32 : New MongoDB Vulnerability Lets Hackers Crash Any MongoDB Server
- 15:32 : RedAlert Mobile Espionage Campaign Targets Civilians with Trojanized Rocket Alert App for Surveillance
- 15:32 : How to de-identify financial documents with Tonic Textual
- 15:32 : Codenotary Trust delivers autonomous AI security for Linux and Kubernetes
- 15:32 : Fideo Intelligence enhances dark web monitoring capabilities to reduce payment fraud
- 15:32 : Cyber Briefing: 2026.03.05
- 15:9 : How Harmonic Proved High-Performance AI Inference on Akamai GPUs
- 15:9 : Look What You Made Us Patch: 2025 Zero-Days in Review
- 15:9 : New BoryptGrab Stealer Targets Windows Users via Deceptive GitHub Pages
- 15:9 : Interview with Tom Howe of Hydrolix: AI Bots, the Friends, Foes, and Frenemies of Online Shopping
- 15:9 : Google: Half of 2025’s 90 Exploited Zero-Days Aimed at Enterprises
- 15:9 : IRONSCALES Adds Three AI Agents Trained to Automate Cybersecurity Tasks
- 15:9 : Push Security adds malicious browser extension detection to block threats in employee browsers
- 14:34 : DataDome and Botify Partner to Give Businesses Full Control Over Agentic Commerce, from Discovery to Transaction
- 14:10 : Apple Launches Budget-Friendly MacBook Neo
- 14:10 : Exposure Is the New Currency of Risk: Why Cybersecurity Speaks the Language of Business
- 14:10 : LeakBase Cybercrime and Hacker Forum Seized
- 14:10 : How to avoid the fake buyers flooding Facebook Marketplace
- 14:10 : Introducing CPR Act: A Unified Approach for a Full‑Lifecycle Security
- 14:9 : LastPass Review: Features, Pricing, Security, and Who It’s Best For
- 14:9 : Inside the Updated AI Governance Suite Dashboard | Kovrr
- 14:9 : Reclaim Security secures $26 million to automate cybersecurity remediation
- 14:9 : Cisco warns of SD-WAN Manager exploitation, fixes 48 firewall vulnerabilities
- 14:9 : Preparing for the Quantum Era: Post-Quantum Cryptography Webinar for Security Leaders
- 14:9 : ThreatsDay Bulletin: DDR5 Bot Scalping, Samsung TV Tracking, Reddit Privacy Fine & More
- 14:9 : ContextCrush Flaw Exposes AI Development Tools to Attacks
- 14:9 : Passaic County Hit By Malware Attack
- 14:9 : 149 Hacktivist DDoS Attacks Worldwide
- 14:9 : Europol Busts Tycoon 2FA Phishing Service
- 14:9 : FBI and Europol Seize LeakBase Forum
- 14:9 : Israel Says It Hit Iran Cyber Warfare HQ
- 14:5 : IT Security News Hourly Summary 2026-03-05 15h : 9 posts
- 13:34 : New MongoDB Vulnerability Allows Attackers to Crash Servers, Exposing Critical Data
- 13:9 : Authorities Shut Down Tycoon 2FA Phishing Platform Used to Bypass MFA
- 13:9 : PoC Exploit for Cisco SD-WAN 0-Day Vulnerability Now Released, Actively Exploited in the Wild
- 13:9 : Threat Actors Exploit Fake Claude Code Downloads to Deploy Infostealer Malware
- 13:9 : Threat Actors Intensify Targeting of IP Cameras Across Middle East Amid Ongoing Conflict
- 13:9 : Russian Ransomware Operator Pleads Guilty in US
- 13:9 : Shift Left Has Shifted Wrong: Why AppSec Teams – Not Developers – Must Lead Security in the Age of AI Coding
- 13:9 : That attractive online ad might be a malware trap
- 13:9 : Threat Hunting: Certifications and Career Paths
- 12:36 : ISC Stormcast For Thursday, March 5th, 2026 https://isc.sans.edu/podcastdetail/9836, (Thu, Mar 5th)
- 12:36 : RingH23 Threat Actors Target MacCMS and CDN Infrastructure with New Arsenal
- 12:36 : UK watchdog eyes Meta’s smart glasses after workers say they ‘see everything’
- 12:36 : Cisco Warns of More Catalyst SD-WAN Flaws Exploited in the Wild
- 12:36 : New in Classroom Manager: Greater Google Classroom Management, Built on What Customers Already Trust
- 12:36 : Dust Specter Targets Iraqi Officials with New SPLITDROP and GHOSTFORM Malware
- 12:36 : Coruna Exploit Kit Targets Older iPhones in Multi-Stage Campaigns
- 12:5 : AWS Middle East (UAE) Region Hit by Drone Strikes, 109 Services Disrupted
- 12:5 : Cisco Secure Firewall Management Vulnerability Enables Remote Code Execution
- 11:32 : DPRK Hackers Target Crypto Firms, Steal Keys and Cloud Assets in Coordinated Attacks
- 11:32 : Hacked App Part of US/Israeli Propaganda Campaign Against Iran
- 11:32 : Next Gen Spotlights: Preparing for a Post-Quantum World – Q&A with Cavero Quantum
- 11:32 : Supreme Court to decide whether geofence warrants are constitutional
- 11:32 : Windows File Shredder: When deleting a file isn’t enough
- 11:32 : Reclaim Security Raises $20 Million to Accelerate Remediation
- 11:32 : Is Outlook Email Encryption HIPAA Compliant? A Complete Guide for 2026
- 11:32 : Okta vs Microsoft Entra ID: Which Enterprise SSO Platform Is Better?
- 11:32 : Google changes Play Store policies after settling Epic Games dispute
- 11:32 : FreeScout vulnerability enables unauthenticated, zero-click RCE via email (CVE-2026-28289)
- 11:32 : Where Multi-Factor Authentication Stops and Credential Abuse Starts
- 11:32 : Threat Intelligence and Threat Hunting: Introduction to Threat Intelligence
- 11:7 : UAT-9244 targets South American telecommunication providers with three new malware implants
- 11:7 : Critical pac4j-jwt Authentication Bypass Vulnerability Allows Attackers to Impersonate Any User
- 11:7 : Operation Leak: FBI and Europol dismantle LeakBase Cybercrime forum
- 11:7 : LeakBase Cybercrime Forum Shut Down, Suspects Arrested
- 11:7 : APT28-Linked Campaign Deploys BadPaw Loader and MeowMeow Backdoor in Ukraine
- 11:7 : Zero-Click FreeScout Bug Enables Remote Code Execution
- 11:5 : IT Security News Hourly Summary 2026-03-05 12h : 7 posts
- 10:34 : Allstate Faces Class-Action Over Customer Tracking
- 10:34 : How a Music Streaming CEO Built an Open-Source Global Threat Map in His Spare Time
- 10:34 : Cisco Issues Patches for 48 Vulnerabilities in Enterprise Networking Products
- 10:34 : Security Architecture Part 3: Secure Application Architecture
- 10:34 : Security Architecture Part 4: Cloud Security Architecture
- 10:5 : FCA Says AI Does Not Fix Problematic Money Laundering Controls
- 10:5 : Amazon Cuts Jobs In Robotics Unit
- 10:4 : Top 10 Best Cybersecurity Marketing Agencies to Watch in 2026
- 10:4 : Europol Operation Seizes LeakBase Data Breach Site
- 9:32 : ClickFix Campaign Exploits Fake LinkedIn VCs to Spread Malware Among Crypto and Web3 Experts
- 9:32 : Hackers Mimic LastPass Support Email to Steal Vault Passwords
- 9:32 : Cisco Secure Firewall Management Vulnerability Allow Attackers to Bypass Authentication
- 9:32 : Beazley Exposure Management platform identifies external exposures and prioritizes cyber risk
- 9:7 : Nvidia Chief Says Will ‘Probably’ Not Invest $100bn In OpenAI
- 9:7 : Google Rolls Out Emergency Chrome Update to Patch 10 Critical Security Vulnerabilities
- 9:7 : Cisco Patches Critical Vulnerabilities in Enterprise Networking Products
- 9:7 : Authorities pull plug on Tycoon 2FA phishing-as-a-service platform
- 9:7 : LeakBase cybercrime forum with 142,000 users taken down in global operation
- 9:7 : Security Architecture Part 2: Network Security Design, DMZ Segmentation, and IDS Systems
- 8:32 : Google Announces Android Changes Amid Epic Settlement
- 8:32 : Cisco Secure Firewall Management Flaw Allows Remote Code Execution
- 8:32 : Possible iPhone-hacking toolkit used by spies, Hacker mass-mails HungerRush extortion emails, Tycoon 2FA phishing platform dismantled
- 8:10 : Meta Contractors Review Sensitive Videos From AI Glasses
- 8:10 : RedAlert Mobile Espionage Campaign Exploits Trojanized Rocket Alert App to Spy on Civilians
- 8:10 : AI Is Making Social Engineering Harder to Detect—But We’re Still Training People Like It’s 2015
- 8:5 : IT Security News Hourly Summary 2026-03-05 09h : 10 posts
- 7:32 : NIS-2: What the end of the registration period means for management teams
- 7:32 : Thales Data Threat Report: AI and Cloud Complexity Fuel New Data Security Risks
- 7:32 : 2,622 Valid Certificates Exposed: A Google-GitGuardian Study Maps Private Key Leaks to Real-World Risk
- 7:32 : FBI and Europol Seize LeakBase Forum Used to Trade Stolen Credentials
- 7:32 : Europol-Led Operation Takes Down Tycoon 2FA Phishing-as-a-Service Linked to 64,000 Attacks
- 7:11 : Threat Actors Intensify Targeting of IP Cameras Across the Middle East Amid Ongoing Conflict
- 7:11 : Cisco Secure Firewall Vulnerability Exposes Networks to Authentication Bypass Attacks
- 7:11 : Google uncovers Coruna iOS Exploit Kit targeting iOS 13–17.2.1
- 7:11 : Fake Tech Support Scams Deliver Advanced Command-and-Control Malware
- 7:11 : Google Releases Emergency Chrome Update to Fix 10 Security Vulnerabilities
- 6:34 : Cisco Catalyst SD-WAN Flaws Expose Devices to Root Access, Threatening Network Security
- 6:2 : Workers reviewing Meta Ray-Ban footage encounter users’ intimate moments
- 6:2 : As AI agents start making purchases, security teams must rethink risk
- 5:34 : Operation Leak: Authorities Dismantle LeakBase Forum, Secure User Data and IP Logs
- 5:16 : Tycoon 2FA Phishing Operation Dismantled in Joint Raid by Microsoft and Europol
- 5:15 : Cyberattack Alert: Hackers Impersonate LastPass Support to Steal Vault Passwords
- 5:15 : Protecting education: How MDR can tip the balance in favor of schools
- 5:15 : Fake FileZilla Website Distributes Malware-Infected Download
- 5:15 : Engineering trust: A security blueprint for autonomous AI agents
- 5:5 : IT Security News Hourly Summary 2026-03-05 06h : 1 posts
- 4:36 : Nation-State iOS Exploit Kit ‘Coruna’ Found Powering Global Attacks
- 3:31 : Post-Quantum Cryptographic Agility in MCP Resource Governance
- 2:38 : Differentiating Between a Targeted Intrusion and an Automated Opportunistic Scanning [Guest Diary], (Wed, Mar 4th)
- 0:31 : 2025 ISO and CSA STAR certificates are now available with one additional service and one new region
- 0:18 : ‘Hundreds’ of Iranian hacking attempts have hit surveillance cameras since the missile strikes
- 23:7 : Cisco fixes maximum-severity Secure FMC bugs threatening firewall security
- 23:5 : IT Security News Hourly Summary 2026-03-05 00h : 10 posts
- 22:55 : IT Security News Daily Summary 2026-03-04