178 posts were published in the last hour
- 22:34 : Patch Alert: Microsoft Fixes Nearly 80 Bugs, Including Critical Office Flaws
- 22:34 : Iran plots ‘infrastructure warfare’ against US tech giants
- 22:34 : Marshall County School District Reduces Google Security Risk with Cloud Monitor
- 22:4 : Stryker experiencing widespread outage due to cyberattack
- 21:36 : ‘Agents of Chaos’: New Study Shows AI Agents Can Leak Data, Be Easily Manipulated
- 21:36 : Slopsquatting: How Attackers Exploit AI-Generated Package Names
- 21:36 : News alert: Qevlar AI raises $30M to turn security alerts into actionable defense insights across SOCs
- 21:36 : Contagious Interview: Malware delivered through fake developer job interviews
- 21:2 : Pro-Palestinian hacktivist group Handala targets Stryker in global disruption
- 21:2 : Iran-linked cyber crew says they hit US med-tech firm
- 20:32 : DirectX, OpenFOAM, Libbiosig vulnerabilities
- 20:32 : Microsoft SQL Server Vulnerability Enables Privilege Escalation
- 20:31 : Report: Approximately 59K Additional Vulnerabilities Will Be Discovered in 2026
- 20:9 : Building the Future-Proofing Forensics Pipeline with Dilithium
- 20:9 : BeatBanker malware targets Android users with banking Trojan and crypto miner
- 20:5 : IT Security News Hourly Summary 2026-03-11 21h : 2 posts
- 19:36 : Senate Confirms Joshua Rudd to Lead NSA and US Cyber Command
- 19:36 : USENIX Security ’25 (Enigma Track) – Digital Product Safety: Rejecting Software As Magic
- 19:5 : Pro-Iran hacktivist group says it is behind attack on medical tech giant Stryker
- 19:4 : Phishers hide scam links with IPv6 trick in “free toothbrush” emails
- 18:34 : Microsoft .NET Vulnerability Enables Remote DoS Attacks
- 18:34 : CISA Adds One Known Exploited Vulnerability to Catalog
- 18:34 : ShinyHunters claims new campaign targeting Salesforce Experience Cloud sites
- 18:7 : 5 Best Companies Providing CVE-Free Container Images
- 18:7 : BlackSanta Malware Shuts Down Protections, Targets HR and Recruiting Operations
- 18:7 : Researchers Trick Perplexity’s Comet AI Browser Into Phishing Scam in Under Four Minutes
- 17:32 : Iranian Hacktivists Strike Medical Device Maker Stryker in “Severe” Attack that Wiped Systems
- 17:32 : Meta, international cops use handcuffs and AI to stop scammers
- 17:32 : Researchers uncover AI-powered vishing platform
- 17:7 : BeatBanker Android Trojan Uses Silent Audio Loop to Steal Crypto
- 17:7 : Hacker broke into FBI and compromised Epstein files, report says
- 17:7 : Bitsight for Financial Services
- 17:7 : How AI is Transforming Integrated Security
- 17:6 : France: National Cybersecurity Agency Reports Ransomware Attack Drop in 2025
- 17:5 : IT Security News Hourly Summary 2026-03-11 18h : 9 posts
- 16:40 : Iran-Backed Hackers Claim Wiper Attack on Medtech Firm Stryker
- 16:40 : Iran’s Internet Blackout Surpasses 10 Days as Traffic Flatlines Below 1% of Normal Levels
- 16:38 : Stryker Cyber Attack – Hackers Claim System Breach and Device Wipe
- 16:36 : MedTech Giant Stryker Crippled by Iran-Linked Hacker Attack
- 16:33 : Infosecurity Europe Announces 2026 Keynote Line Up
- 16:16 : USENIX Security ’25 (Enigma Track) – Everything Old Is New Again: Legal Restrictions On Vulnerability Disclosure On Bug Bounty Platforms
- 16:13 : Researchers Uncover ‘LeakyLooker’ Vulnerabilities in Google Looker Studio
- 16:10 : Industry to NIST: Keep agentic AI standards flexible and voluntary
- 16:7 : Google completes $32 billion acquisition of Wiz
- 15:36 : Microsoft Active Directory Domain Services Vulnerability Let Attackers Escalate Privileges
- 15:36 : Iran-Linked Handala Hackers Claim Breach of Israel’s Clalit Healthcare Network
- 15:36 : Hackers Exploit FortiGate Devices to Hack Networks and Credentials
- 15:36 : AI Agents Boost Productivity but Introduce New Cybersecurity Risks for Organizations
- 15:36 : Commercial Spy Trackers Breach U.S. Army Networks, Jeopardizing National Security
- 15:36 : Critical n8n Flaws Allow Remote Code Execution and Exposure of Stored Credentials
- 15:11 : Sextortion “I recorded you” emails reuse passwords found in disposable inboxes
- 15:11 : Fortanix helps enterprises build resilience with multi-sourced quantum entropy
- 15:11 : Compromised WordPress Sites Deliver ClickFix Attacks in Global Infostealer Campaign
- 14:32 : CISO Conversations: Aimee Cardwell
- 14:32 : Wiz Joins Google Cloud as Landmark Acquisition Closes
- 14:31 : Network Map 2.0 provides live network mapping and faster risk containment
- 14:31 : BlackSanta EDR-Killer Targets HR Teams in CV-Themed Campaign
- 14:31 : Cyber Briefing: 2026.03.11
- 14:9 : Inside Akamai: How Offload and Performance Drive Speed and Resiliency
- 14:9 : ICO fines Police Scotland over data-sharing debacle in gross misconduct case
- 14:9 : 238,000 Impacted by Bell Ambulance Data Breach
- 14:9 : Researchers Discover Major Security Gaps in LLM Guardrails
- 14:9 : FBI Warns Scammers Are Targeting Zoning Permit Applicants Across The U.S.
- 14:5 : IT Security News Hourly Summary 2026-03-11 15h : 6 posts
- 13:39 : UNC6426 Hackers Exploit NPM Package to Gain AWS Admin Access in 72 Hours
- 13:39 : Watch out for tax-season robocalls pushing fake “relief programs”
- 13:39 : Google wraps up $32B acquisition of cloud cybersecurity startup Wiz
- 13:39 : Scanner Raises $22 Million for AI-Powered Threat Hunting
- 13:38 : Vicarius vIntelligence brings continuous risk validation and AI-driven security automation
- 13:38 : Meta Disables 150K Accounts Linked to Southeast Asia Scam Centers in Global Crackdown
- 13:3 : Augmented Phishing: Social Engineering in the Age of AI
- 13:3 : Google completes $32B acquisition of Wiz
- 13:3 : How to Scale Early Threat Detection in Your SOC without Extra Staff
- 13:3 : Microsoft Releases Cumulative Updates for Windows 11 25H2/24H2 and 23H2
- 13:3 : Swiss e-voting pilot can’t count 2,048 ballots after USB keys fail to decrypt them
- 13:3 : Meta turns to AI to sniff out scams on Facebook, Messenger and WhatsApp
- 13:3 : ELECQ EV Charger Firm Hit By Ransomware
- 13:3 : Hebrew Language Academy Website Hacked
- 13:2 : HHS Settles MMG Fusion HIPAA Case
- 13:2 : Foreign Hacker Breached Epstein FBI Files
- 13:2 : Salt Typhoon Hits Global Telecom Giants
- 12:32 : BlackSanta Malware Targets HR Staff with Fake CV Downloads
- 12:32 : Critical Vulnerability in Microsoft Office Allows Malicious Code to Run Remotely
- 12:32 : Dutch cops bust teen suspected of posing as bank staff to steal cards
- 12:32 : How to 10x Your Vulnerability Management Program in the Agentic Era
- 12:32 : Fortinet, Ivanti, Intel Patch High-Severity Vulnerabilities
- 12:32 : OpenAI to Acquire AI Security Startup Promptfoo
- 12:32 : Agent-to-Agent Attacks Are Coming: What API Security Teaches Us About Securing AI Systems
- 12:32 : Anthropic forms institute to study long-term AI risks facing society
- 12:32 : What Boards Must Demand in the Age of AI-Automated Exploitation
- 12:32 : Dozens of Vendors Patch Security Flaws Across Enterprise Software and Network Devices
- 12:9 : Meta Ramps Up Efforts to Disrupt Industrialized Scamming
- 12:9 : Hewlett Packard Enterprise fixes critical authentication bypass in Aruba AOS-CX
- 12:9 : KnowBe4 launches AI agent to tailor security awareness assessments
- 12:9 : 65% of Organisations Still Detect Unauthorised Shadow AI Despite Visibility Optimism
- 12:9 : Canada Needs Nationalized, Public AI
- 12:9 : Monitoring Legitimate Bot Traffic is Now a Cybersecurity Requirement
- 11:34 : Why Old Cybersecurity Models Are Breaking
- 11:34 : Instagram Down: New Outage Causes Widespread Disruption in Posting and DM Functionality
- 11:34 : EU legal eagle says banks should refund cybercrime victims first, argue later
- 11:34 : Michelin Confirms Data Breach Linked to Oracle EBS Attack
- 11:34 : How EU Regulations Are Reshaping SOC Operations
- 11:20 : Nielsen’s Gracenote Sues OpenAI Over Copyright Infringement
- 11:20 : Instagram Down: Global Outage Prevents Users from Posting and Messaging
- 11:20 : March 2026 Patch Tuesday fixes two zero-day vulnerabilities
- 11:20 : Keeper Security launches global campaign highlighting identity-first cybersecurity with Atlassian Williams F1 Team
- 11:20 : Quantro Security Emerges From Stealth With $2.5 Million in Funding
- 11:20 : Microsoft patches 80+ vulnerabilities, six flagged as “more likely” to be exploited
- 11:20 : New Cyber Command chief, Russia targets Signal, Codex Security
- 11:5 : IT Security News Hourly Summary 2026-03-11 12h : 11 posts
- 10:38 : Amazon Expands Access To Healthcare Chatbot
- 10:38 : Cyber-Attacks on UK Firms Increase at Four Times Global Rate
- 10:9 : Analyzing “Zombie Zip” Files (CVE-2026-0866), (Wed, Mar 11th)
- 10:9 : Spinning complex ideas into clear docs with Kri Dontje
- 10:9 : Agentic AI security: Why you need to know about autonomous agents now
- 10:9 : Meta To Charge Advertisers For European Digital Taxes
- 10:9 : Microsoft Fixes 79 Flaws in March Patch Tuesday, Including Two 0-Days
- 10:9 : Google Warns of AI‑Driven Adaptive Malware Rewriting Its Own Code
- 10:9 : KadNap bot compromises 14,000+ devices to route malicious traffic
- 10:9 : ‘BlackSanta’ Malware Activates EDR and AV Killer Before Detonating Payload
- 10:9 : YouTube draws a line on deepfakes involving politicians and journalists
- 9:34 : Amazon Seeks Debt To Pay For AI Investments
- 9:34 : Your Data Lake Is Turning Into a Junk Drawer? Here’s How to Clean It Up
- 9:34 : ShinyHunters Claims Responsibility for Widespread Salesforce Data Theft
- 9:34 : How SSO Reduces Helpdesk Load in Mid-Sized Organizations
- 9:34 : Armis improves vulnerability accuracy and speed with unified real-time visibility
- 9:34 : Microsoft Patches 84 Flaws in March Patch Tuesday, Including Two Public Zero-Days
- 9:34 : Microsoft Fixes Two Publicly Disclosed Zero-Days
- 9:34 : Google: Cloud Attacks Now Exploit Software Flaws More Often Than Credentials
- 9:7 : Amazon Wins Order Barring Perplexity Bots
- 9:7 : Building the UK’s next generation of cyber talent
- 9:7 : Who Actually Owns This Service Account?
- 9:7 : Hackers Exploit Claude to Target Multiple Mexican Government Agencies
- 9:7 : Forescout replaces manual audits with automated, always-on compliance validation
- 9:7 : Virtana enables full-stack root cause analysis beyond legacy APM
- 9:7 : UNC6426 Exploits nx npm Supply-Chain Attack to Gain AWS Admin Access in 72 Hours
- 9:7 : The OpenSSL Library no longer registers an atexit function
- 8:32 : Chinese Agencies Issue Security Warnings Over OpenClaw
- 8:32 : What Is an Exposure Assessment Platform — And Why Your Website Is the Blind Spot
- 8:32 : Secureframe automates CMMC compliance with secure infrastructure and AI SSPs
- 8:32 : OPSWAT delivers AI-powered perimeter defense with unified zero-day verdicts
- 8:7 : MPs Reject Social Media Ban For Under-16s
- 8:7 : BeatBanker Trojan Spreads via Phishing, Deploys Crypto Miner and RAT on Targeted Devices
- 8:7 : ICS Patch Tuesday: Vulnerabilities Fixed by Siemens, Schneider, Moxa, Mitsubishi Electric
- 8:7 : Protecting OTP & Magic Link Endpoints from Abuse: IP Reputation, Rate Limiting, and Suspicious IP Throttling
- 8:5 : IT Security News Hourly Summary 2026-03-11 09h : 6 posts
- 7:31 : Microsoft Active Directory Flaw Allows Attackers to Escalate Privileges
- 7:9 : What is World Backup Day 2026?
- 7:9 : Trojanized Red Alert App Targets Israeli Users in SMS Scam to Steal Sensitive Data
- 7:9 : Microsoft .NET 0-Day Flaw Opens Doors for Denial of Service Attacks
- 7:9 : Microsoft .NET 0-Day Vulnerability Enables Denial-of-Service Attacks
- 7:9 : Gogs Vulnerability Enables Attackers to Silently Overwrite Large File Storage Objects
- 6:5 : Microsoft Fixes 79 Vulnerabilities in March 2026 Patch Tuesday, Mitigating Two Exploited 0-Days
- 6:5 : HR Departments Targeted by Multi-Layered BlackSanta EDR Killer Malware
- 6:5 : Cloud-audit: Fast, open-source AWS security scanner
- 6:5 : Five Malicious Rust Crates and AI Bot Exploit CI/CD Pipelines to Steal Developer Secrets
- 5:36 : Fortinet FortiManager fgtupdates Flaw Enables Attackers to Execute Malicious Commands Remotely
- 5:36 : Zero trust, zero buzzwords: Here’s what it means
- 5:36 : FortiGate Devices Exploited to Breach Networks and Steal Service Account Credentials
- 5:9 : Microsoft SQL Server Zero-Day Exposes Privilege Escalation Risk for Users
- 5:9 : PhantomRaven Malware Resurfaces, Targets npm Supply Chain to Steal Developer Secrets
- 5:9 : Software vulnerabilities push credential abuse aside in cloud intrusions
- 5:5 : IT Security News Hourly Summary 2026-03-11 06h : 2 posts
- 4:32 : Microsoft SQL Server Zero-Day Vulnerability Allows Attackers to Escalate Privileges
- 4:32 : Fake Claude Code Installs, Arpa Phishing, Iranian and Russian Teams Mount Cyber Retaliation
- 3:11 : When Proxies Become Attack Vectors Through Header Injection
- 2:11 : ISC Stormcast For Wednesday, March 11th, 2026 https://isc.sans.edu/podcastdetail/9844, (Wed, Mar 11th)
- 2:5 : IT Security News Hourly Summary 2026-03-11 03h : 4 posts
- 1:36 : Credential Stuffing in 2025 – How Combolists, Infostealers and Account Takeover Became an Industry
- 1:9 : Sednit reloaded: Back in the trenches
- 1:9 : Microsoft Patch Tuesday, March 2026 Edition
- 1:9 : Zero Trust Architecture for Decentralized MCP Tool Discovery
- 0:11 : Microsoft Patch Tuesday security updates for March 2026 fixed 84 bugs
- 23:11 : Can AI-driven cloud security fully protect data
- 23:11 : How does NHI management deliver value to businesses
- 23:11 : How can enterprises be reassured by advanced AI measures
- 23:5 : IT Security News Hourly Summary 2026-03-11 00h : 5 posts
- 22:55 : IT Security News Daily Summary 2026-03-10