170 posts were published in the last hour
- 21:31 : Announcing Red Hat Advanced Cluster Security for Kubernetes 4.10
- 21:2 : OpenAI Codex Vulnerability Allowed Attackers to Steal GitHub Tokens
- 20:32 : BSidesSLC 2025 – Risk Management Explained Through Star Wars
- 20:32 : While TSA Made Headlines, CISA Went Dark
- 20:14 : CISA Adds One Known Exploited Vulnerability to Catalog
- 20:14 : 12 Best AWS Monitoring Tools in 2026
- 20:13 : OpenAI patches ChatGPT flaw that smuggled data over DNS
- 19:34 : OpenAI Patches ChatGPT Data Exfiltration Flaw and Codex GitHub Token Vulnerability
- 19:7 : China-Linked groups target Southeast Asian government with advanced malware in 2025
- 19:7 : Europol Takes Down Large Dark Web Scam Network
- 19:5 : IT Security News Hourly Summary 2026-03-30 21h : 6 posts
- 18:34 : Breach Readiness in the Age of Mythos: When Your AI Thinks, Learns, and Defends
- 18:12 : Wave Browser Brings Gaming Tools and Ocean Cleanup into the Same Tab
- 18:11 : RSAC 2026: Fraud Becomes a CISO-Level Security Threat
- 18:11 : North Korean IT Worker Allegedly Used Stolen Identity and AI Resume in Job Application Scam
- 18:11 : Exposed Server Reveals TheGentlemen Ransomware Toolkit, Victim Credentials, and Ngrok Tokens
- 18:11 : Telnyx joins LiteLLM in latest PyPI package poisoning tied to Trivy breach
- 17:34 : 15-Year-Old strongSwan Flaw Lets Attackers Crash VPNs via Integer Underflow
- 17:5 : TA446 Hackers Deploying DarkSword Exploit Kit to Attack iOS Users
- 17:5 : New ClickFix Variant Uses Rundll32 and WebDAV to Evade PowerShell Detection
- 17:5 : CrySome RAT Emerges as Advanced .NET Malware With AV Killer and HVNC Capabilities
- 17:5 : What the FBI Director Breach Reveals About Executive Digital Exposure
- 17:5 : Trivy Scanner Hit by Major Supply Chain Attack
- 17:5 : Addressing the OWASP Top 10 Risks in Agentic AI with Microsoft Copilot Studio
- 17:5 : RSAC 2026 is back, and the certificate automation gap is impossible to ignore
- 17:5 : DeepLoad Malware Uses ClickFix and WMI Persistence to Steal Browser Credentials
- 16:31 : 24/7 Payments for 24/7 Agents: The Case for Crypto in the Machine Economy
- 16:5 : TeamPCP’s Telnyx Attack Marks a Shift in Tactics Beyond LiteLLM
- 16:5 : Beyond Static Checks: Designing CI/CD Pipelines That Respond to Live Security Signals
- 16:5 : Apple will hide your email address from apps and websites, but not cops
- 16:5 : Security for the Quantum Era: Implementing Post-Quantum Cryptography in Android
- 16:5 : TeamPCP’s attack spree slows, but threat escalates with ransomware pivot
- 16:5 : Citrix NetScaler products confirmed to be under exploitation
- 16:5 : IT Security News Hourly Summary 2026-03-30 18h : 8 posts
- 15:34 : New Homoglyph Attack Techniques Help Cybercriminals Spoof Trusted Domains
- 15:34 : Passkeys Hit Critical Mass: Microsoft Auto-Enables for Millions, 87% of Companies Deploy as Passwords Near End-of-Life
- 15:34 : Newly observed malware campaign likely combines AI and ClickFix
- 15:9 : TeamPCP Supply Chain Campaign: Update 004 – Databricks Investigating Alleged Compromise, TeamPCP Runs Dual Ransomware Operations, and AstraZeneca Data Released, (Mon, Mar 30th)
- 15:9 : It’s a mystery … alleged unpatched Telegram zero-day allows device takeover, but Telegram denies
- 15:9 : New macOS security feature will alert users about possible ClickFix attacks
- 15:9 : Security Alerts or Scams? How to Spot Fake Login Warnings and Protect Your Accounts
- 15:9 : AI-Driven Phishing Campaign Exploits Railway to Breach Microsoft Cloud Accounts at Scale
- 14:35 : Iran-Linked Hackers Breach FBI Director Kash Patel’s Email, Leak Messages Online
- 14:34 : BlankGrabber Stealer Uses Fake Certificate Loader to Hide Malware Delivery Chain
- 14:34 : Open VSX’s New Scanner Vulnerability Allows Malicious Extension Goes Live
- 14:34 : Hackers Backdoor Telnyx Python SDK on PyPI to Steal Cloud and Dev Credentials
- 14:34 : Silent Drift: How LLMs Are Quietly Breaking Organizational Access Control
- 14:34 : Healthcare IT Platform CareCloud Probing Potential Data Breach
- 14:34 : 3 SOC Process Fixes That Unlock Tier 1 Productivity
- 14:34 : ⚡ Weekly Recap: Telecom Sleeper Cells, LLM Jailbreaks, Apple Forces U.K. Age Checks and More
- 14:34 : Cyber Briefing: 2026.03.30
- 14:34 : Stryker restores most manufacturing after cyberattack
- 14:5 : Dark Web Market Lists Alleged 375TB Lockheed Martin Data for $600M
- 14:5 : Russian Hackers Deploy “CTRL” for RDP Hijacking
- 14:5 : Citrix NetScaler bug exploited in days, may be multiple flaws in a trench coat
- 14:5 : Cybersecurity Faces New Threats from AI and Quantum Tech
- 14:5 : Signal Phishing Campaign Attributed to Russian Intelligence FBI Says
- 14:5 : Diligent automates time-consuming steps in third-party reviews
- 13:34 : North Korean IT Worker Used Stolen Identity, AI-Generated Resume in Job Scam
- 13:34 : Exposed Server Leaks TheGentlemen Ransomware Toolkit, Credentials, and Ngrok Tokens
- 13:34 : vDefend’s Built-in Advantage: Enable Closed-Loop Lateral Security for Zero-Trust Private Cloud
- 13:34 : Coro launches MCP capabilities to simplify security operations through AI workflows
- 13:6 : CrySome RAT: Stealthy .NET Malware Adds AV Killer, HVNC Features
- 13:6 : When AI Trust Breaks: The ChatGPT Data Leakage Flaw That Redefined AI Vendor Security Trust
- 13:6 : Vim Vulnerability Let Attackers Execute Arbitrary Command Via Weaponized Files
- 13:5 : CanisterWorm Malware Attacking Docker/K8s/Redis to Gain Access and Steal Secrets
- 13:5 : Stored XSS Bug in Jira Work Management Could Lead to Full Organization Takeover
- 13:5 : Huskeys Emerges From Stealth With $8 Million in Funding
- 13:5 : IPVanish Threat Protection Pro blocks malicious activity before they reach the user
- 13:5 : DeepLoad Malware Combines ClickFix With AI-Generated Code to Avoid Detection
- 13:5 : IT Security News Hourly Summary 2026-03-30 15h : 14 posts
- 12:32 : India Set to Ban Hikvision, TP-Link Devices in April
- 12:32 : FIRESIDE CHAT: AI gives rise to a semantic attack surface, forcing a new class of network defense
- 12:32 : 7 tabletop exercise scenarios every cybersecurity team should practice in 2026
- 12:32 : Critical Fortinet FortiClient EMS bug under active attack (CVE-2026-21643)
- 12:32 : EU Investigates Cyberattack on Websites
- 12:32 : Ransomware Hits Goodwill Grand Rapids
- 12:32 : Spotify Seeks $300M From Anna’s Archive
- 12:32 : CISA Chief Warns Shutdown Raises Cyber Risks
- 12:31 : India To Ban Hikvision TP Link CCTV
- 12:12 : WordPress Plugin Flaw Exposes Sensitive Data Across 800,000+ Sites
- 12:12 : ClickFix Evades PowerShell Detection via Rundll32 and WebDAV
- 12:12 : OffSec and Deloitte Portugal Announces Strategic Partnership
- 12:11 : Russian APT Star Blizzard Adopts DarkSword iOS Exploit Kit
- 12:11 : Second data breach at European Commission this year leaves open questions over resilience
- 11:35 : TA446 Uses DarkSword Exploit Kit to Target iPhone Users
- 11:35 : The State of Secrets Sprawl 2026: 9 Takeaways for CISOs
- 11:34 : Apple’s Camera Indicator Lights
- 11:34 : Critical Fortinet Forticlient EMS Vulnerability Exploited in Attacks
- 11:34 : TeamPCP Supply Chain Attack Allegedly Compromised Databricks Platform
- 11:34 : Critical n8n Vulnerability Let Attackers Achieve Remote Code Execution
- 11:34 : Critical Grafana Vulnerabilities Let Attackers Achieve Remote Code Execution
- 11:34 : Hacked Hospitals, Hidden Spyware: Iran Conflict Shows How Digital Fight Is Ingrained in Warfare
- 11:34 : European Commission Reports Cyber Intrusion and Data Theft
- 11:34 : Second data breach at European Commission this year leaves questions over resilience
- 11:34 : Critical Citrix NetScaler Vulnerability Exploited in the Wild
- 11:12 : TeamPCP Uses Fake Ringtone File in Tainted Telnyx SDK to Steal Credentials
- 11:11 : New Homoglyph Tricks Let Cybercriminals Mimic Trusted Domains
- 11:11 : Critical Fortinet FortiClient EMS flaw exploited for Remote Code Execution
- 11:11 : Telnyx Targeted in Growing TeamPCP Supply Chain Attack
- 11:11 : Charity Fraud: How to Avoid Falling for Fake Donation Campaigns
- 11:11 : Android 17 tweaks location privacy with one-time access
- 11:11 : ICO Fines UK Nuisance Call Scammers £100,000
- 10:31 : European Commission admits attackers broke into public web systems, but says little else
- 10:31 : Russian CTRL Toolkit Delivered via Malicious LNK Files Hijacks RDP via FRP Tunnels
- 10:11 : Critical Fortinet FortiClient EMS Vulnerability Actively Exploited in Attacks
- 10:11 : Telnyx Python SDK Backdoored on PyPI to Steal Cloud Credentials
- 10:11 : MIWIC26: Laura Price, Cyber Skills & Partnership Lead at BT
- 10:5 : IT Security News Hourly Summary 2026-03-30 12h : 12 posts
- 9:32 : Stored XSS Vulnerability in Jira Work Management Could Enable Full Organization Takeover
- 9:32 : LiteLLM supply chain attack exposes millions to credential theft
- 9:32 : World Back Up Day 2026 – What are the takeaways?
- 9:32 : New “Prompt Poaching” Attack Steals Users’ AI Conversations via Malicious Browser Extensions
- 9:32 : India Set to Ban Sale of Hikvision, TP-Link, CCTV Products From April
- 9:32 : Exploitation of Fresh Citrix NetScaler Vulnerability Begins
- 9:32 : 6 trends redefining organizations’ future with IAM
- 9:32 : How OpenClaw’s agent skills become an attack surface
- 9:32 : Why user behavior is the primary entry point for cyberattacks
- 9:18 : $650B and Counting: How AI Infrastructure Spending Is Reshaping U.S. Tech Strategy
- 9:18 : New macOS Infinity Stealer uses Nuitka Python payload and ClickFix
- 9:18 : Making stolen data worthless: why security must start with the data
- 8:34 : Meta Ramps Spending On El Paso Data Centre To $10bn
- 8:34 : FBI Confirms Kash Patel Email Hack as US Offers $10M Reward for Hackers
- 8:34 : European Commission Confirms Cloud Data Breach
- 8:9 : DJI Launches First 360-Degree Drone
- 8:9 : Critical Grafana Flaws Allow Attackers to Achieve Remote Code Execution
- 8:9 : 10 Best Data Loss Prevention Software in 2026
- 8:9 : Russia-linked APT TA446 uses DarkSword exploit to target iPhone users in phishing wave
- 7:34 : Southampton School Closed For Days Following Hack
- 7:34 : Microsoft Releases Key WinRE and Setup Updates to Prepare for 2026 Secure Boot Changes
- 7:34 : Security contractor blew the whistle on support crew’s viral indifference
- 7:34 : VoidLink Malware Framework Shows that AI-assisted Malware is Not Experimental Anymore
- 7:34 : A week in security (March 23 – March 29)
- 7:34 : F5 BIG-IP DoS Flaw Upgraded to Critical RCE, Now Exploited in the Wild
- 7:34 : The EU CRA – Treating Cybersecurity as Product Liability
- 7:34 : SystemRescue 13 updates its kernel to Linux 6.18 LTS, adds new recovery tools
- 7:34 : Three China-Linked Clusters Target Southeast Asian Government in 2025 Cyber Campaign
- 7:34 : FBI email theft, Lloyds Bank glitch, API keys running loose
- 7:7 : New widespread EvilTokens kit: device code phishing as-a-service – Part 1
- 7:7 : Co-Op Chief Steps Down As Hack Leads To £125m Loss
- 7:7 : CanisterWorm Targets Docker, Kubernetes, and Redis to Steal Secrets
- 7:5 : IT Security News Hourly Summary 2026-03-30 09h : 4 posts
- 6:7 : Hackers Probe Citrix NetScaler Systems Ahead of Suspected CVE-2026-3055 Exploitation
- 6:7 : 10 Best Log Monitoring Tools in 2026
- 6:7 : 10 Best Spam Filter Tools 2026
- 6:7 : Why risk alone doesn’t get you to yes
- 5:34 : Anthropic’s Latest AI Test Pressures Cybersecurity Stocks Lower
- 5:34 : FIFA World Cup 2026: A Match Between Fans and Scammers
- 5:34 : ShipSec Studio brings open-source workflow orchestration to security operations
- 5:7 : CISA Warns of Actively Exploited F5 BIG-IP Vulnerability in Ongoing Attacks
- 5:7 : VoidLink Proves AI-Assisted Malware Is No Longer Experimental
- 5:7 : US foreign router ban criticized for being ‘industrial policy disguised as cybersecurity’
- 5:7 : Breaking out: Can AI agents escape their sandboxes?
- 4:34 : US foreign router ban criticized as ‘industrial policy disguised as cybersecurity’
- 4:34 : Microsoft’s March Security Update of High-Risk Vulnerability Notice for Multiple Products
- 4:34 : The Hidden Tracking Risk Inside Your Tires
- 4:34 : Don’t count on government guidance after a smart home breach
- 4:34 : Russian State Hackers Go After IoS Devices
- 4:9 : 10 Best Fraud Detection Tools in 2026
- 4:5 : IT Security News Hourly Summary 2026-03-30 06h : 1 posts
- 3:7 : Planning a spring break trip? Don’t fall for these 7 travel scams
- 2:7 : ISC Stormcast For Monday, March 30th, 2026 https://isc.sans.edu/podcastdetail/9870, (Mon, Mar 30th)
- 2:7 : Attribute-Based Access Control for AI Capability Negotiation
- 1:5 : IT Security News Hourly Summary 2026-03-30 03h : 1 posts
- 0:11 : DShield (Cowrie) Honeypot Stats and When Sessions Disconnect, (Mon, Mar 30th)
- 23:9 : Are your NHIs fully supported for optimal performance?
- 23:9 : What role does innovation play in Agentic AI development?
- 22:5 : IT Security News Hourly Summary 2026-03-30 00h : 2 posts
- 21:58 : IT Security News Weekly Summary 13
- 21:55 : IT Security News Daily Summary 2026-03-29