133 posts were published in the last hour
- 21:32 : RSAC 2026: Rethinking Trust in Agentic AI Security
- 21:32 : Friday Squid Blogging: Jurassic Fish Chokes on Squid
- 20:9 : Fake ChatGPT Ad Blocker Chrome Extension Caught Spying on Users
- 19:32 : [un]prompted 2026 – The Hard Part Isn’t Building the Agent: Measuring Effectiveness
- 19:32 : [un]prompted 2026 – The Hard Part Isn’t Building The Agent: Measuring Effectiveness
- 19:5 : IT Security News Hourly Summary 2026-04-03 21h : 1 posts
- 18:34 : 14,000+ F5 BIG-IP APM Devices Exposed Online Amid Active RCE Vulnerability Exploits
- 18:2 : China-Linked TA416 Targets European Governments with PlugX and OAuth-Based Phishing
- 17:34 : Axios NPM supply chain incident
- 17:34 : Do not get high(jacked) off your own supply (chain)
- 17:34 : News brief: Iran cyberattacks escalate, U.S. targets named
- 17:34 : Cisco 2026 State of Wireless Report: AI Wireless Threats Grow as Security Gaps Widen
- 17:34 : Meet Vespasian. It Sees What Static Analysis Can’t.
- 17:34 : Randall Munroe’s XKCD ‘Amperage’
- 17:34 : NoVoice Android Malware Infects 2.3 Million Devices on Google Play
- 17:34 : Netherlands Ministry of Finance Cyberattack Exposes Gaps in Government Security Defenses
- 17:34 : Attackers Exploit Critical Flaw to Breach 766 Next.js Hosts and Steal Data
- 17:34 : Hackers Use Fake Legal Emails to Spread Casbaneiro Malware
- 17:34 : Microsoft Details Cookie-Controlled PHP Web Shells Persisting via Cron on Linux Servers
- 17:9 : Axois NPM Supply Chain Incident
- 17:9 : North Korean Hackers Abuse GitHub to Spy on South Korean Firms
- 16:32 : FBI Declares Surveillance System Breach a ‘Major Incident’
- 16:32 : Android Alert: 50 Google Play Apps Linked to ‘NoVoice’ Malware Reached 2.3M Downloads
- 16:32 : Hackers Abuse Trusted Platforms to Steal Bank Credentials From Philippine Users
- 16:32 : Axios Maintainer Confirms The npm Compromise Was via a Targeted Social Engineering Attack
- 16:32 : Kimsuky Deploys Malicious LNK Files to Deliver Python-Based Backdoor in Multi-Stage Attack
- 16:32 : Researchers warn of critical flaws in Progress ShareFile
- 16:32 : Trump’s FY2027 budget again targets CISA
- 16:7 : Hybrid work, expanded risk: what needs to change
- 16:7 : Armis State of Cyberwarfare Report: AI-Powered Cyber Attacks Accelerate Worldwide
- 16:7 : High-Severity Vulnerabilities, Supply Chain Breaches, and AI Threats Redefine Cybersecurity This Week
- 16:7 : Europe’s cyber agency blames hacking gangs for massive data breach and leak
- 16:7 : [un]prompted 2026 – Evaluating Threats & Automating Defense At Google
- 16:7 : How AWS KMS and AWS Encryption SDK overcome symmetric encryption bounds
- 16:5 : IT Security News Hourly Summary 2026-04-03 18h : 7 posts
- 15:32 : AI Firm Mercor Confirms Breach as Hackers Claim 4TB of Stolen Data
- 15:32 : AI Breakthroughs, Security Breaches, and Industry Shakeups Define the Week in Tech
- 15:32 : NHI Governance Is the Outcome. GitGuardian Is How You Get There
- 15:32 : Government agencies see cyber threats as major barrier to tech improvements
- 15:11 : Blocking children from social media is a badly executed good idea
- 15:11 : North Korea–linked hackers drain $285M from Drift in sophisticated attack
- 15:11 : The Middle East Conflict Is Redefining Global Cybersecurity Priorities
- 14:32 : Board-Ready Security Metrics That Actually Matter
- 14:32 : Cyber Briefing: 2026.04.03
- 14:13 : Weaponizing Trust Signals: Claude Code Lures and GitHub Release Payloads
- 14:13 : AI Future: The Leading International AI and Web3 Forum to Take Place in April
- 14:13 : CrystalX RAT: new MaaS malware combines spyware, stealer, and remote access
- 14:13 : Securing the Physical World as It Comes Online
- 13:32 : TeamPCP Supply Chain Campaign: Update 006 – CERT-EU Confirms European Commission Cloud Breach, Sportradar Details Emerge, and Mandiant Quantifies Campaign at 1,000+ SaaS Environments, (Fri, Apr 3rd)
- 13:31 : New Phishing Platform Used in Credential Theft Campaigns Against C-Suite Execs
- 13:13 : New Progress ShareFile Flaws Expose Servers to Unauthorized Remote Takeover
- 13:13 : In Other News: ChatGPT Data Leak, Android Rootkit, Water Facility Hit by Ransomware
- 13:13 : TrueConf Zero-Day Exploited in Asian Government Attacks
- 13:13 : Cisco IMC auth bypass vulnerability allows attackers to alter user passwords (CVE-2026-20093)
- 13:5 : IT Security News Hourly Summary 2026-04-03 15h : 16 posts
- 12:37 : Infrastructure Engineer Pleads Guilty to Locking 254 Windows Servers at Former Employer
- 12:37 : Microsoft Forces Unmanaged Windows 11 Devices to Upgrade to Version 24H2
- 12:36 : Company that Secretly Records and Publishes Zoom Meetings
- 12:36 : Critical ShareFile Flaws Lead to Unauthenticated RCE
- 12:36 : Why Third-Party Risk Is the Biggest Gap in Your Clients’ Security Posture
- 12:36 : UNC1069 Social Engineering of Axios Maintainer Led to npm Supply Chain Attack
- 12:36 : Hasbro Hit in Cyberattack Disrupting Ops
- 12:36 : Drift Hit By North Korean Hackers Seize Funds
- 12:36 : Man Admits Locking Thousands of Windows PCs
- 12:36 : CERT-EU Reports EC Hack Affecting EU Data
- 12:36 : Free VPNs Leak Data Despite Privacy Claims
- 12:7 : Hackers Use Venom Stealer to Turn ClickFix Lures Into Full Data Exfiltration Pipelines
- 12:7 : Hackers Use Phorpiex Botnet to Spread Ransomware, Sextortion, and Crypto-Clipping Malware
- 12:7 : Malicious Chrome Extension “ChatGPT Ad Blocker” Steals ChatGPT Conversations
- 12:7 : The Future of Cyber Warfare and its Impact on Global Business Stability
- 12:7 : Windows Security app gets Secure Boot certificate status indicators as 2026 expiration approaches
- 11:32 : Mobile Attack Surface Expands as Enterprises Lose Control
- 11:32 : HIPAA – I Do Not Think That Word Means What You Say It Means
- 11:32 : Why Privileged Access is Becoming the Control Plane for Agentic AI
- 11:32 : Ask Me Anything Cyber
- 11:7 : 14,000+ F5 BIG-IP APM Instances Exposed Online as Attackers Exploit RCE Vulnerability
- 11:7 : CISA Includes TrueConf Security Flaw in KEV Catalog After Exploitation in the Wild
- 11:7 : Kimsuky Uses Malicious LNK Files to Drop Python Backdoor
- 11:7 : React2Shell Exploited in Large-Scale Credential Harvesting Campaign
- 11:7 : AI Governance by Terms of Service is Not Governance at All: The Anthropic Case, White House Policy, and the Coming Race to the Bottom
- 11:7 : Claude Code source leak exploited to spread malware
- 10:34 : Axios npm compromise traced to targeted social engineering attack
- 10:34 : T-Mobile Sets the Record Straight on Latest Data Breach Filing
- 10:7 : CERT-EU Confirms Trivy Supply Chain Attack Led to European Commission AWS Breach
- 10:7 : Hackers Compromised 700+ Next.js Hosts by Exploiting React2Shell Vulnerability
- 10:7 : Multiple TP-Link Vulnerabilities Let Attackers Trigger DoS and Crash Routers
- 10:7 : Microsoft Forcing Upgrades to Unmanaged Windows 11, Version 24H2
- 10:7 : North Korean Hackers Drain $285 Million From Drift in 10 Seconds
- 10:5 : IT Security News Hourly Summary 2026-04-03 12h : 7 posts
- 9:36 : AI Models Including Gemini 3 and Claude Haiku 4.5 Secretly Protected Other Models From Removal
- 9:36 : Trusted Platforms Exploited to Steal Philippine Banking Credentials
- 9:36 : Malicious Chrome Extension “ChatGPT Ad Blocker” Targets Users, Steals Conversations
- 9:36 : CBP Facility Codes Sure Seem to Have Leaked Via Online Flashcards
- 9:36 : Drift Loses $285 Million in Durable Nonce Social Engineering Attack Linked to DPRK
- 9:36 : New SparkCat Variant in iOS, Android Apps Steals Crypto Wallet Recovery Phrase Images
- 9:9 : Pro-Iran Handala group breached Israeli defence contractor PSK Wind Technologies
- 7:34 : Compliance Won’t Save Healthcare: Reducing the Blast Radius Will
- 7:34 : PGBouncer: Connection Pooling for Managed PostgreSQL Databases
- 7:34 : TrendAI Insight: New U.S. National Cyber Strategy
- 7:34 : Hackers Weaponize Venom Stealer via ClickFix Lures for Massive Data Exfiltration
- 7:34 : TP-Link Router Flaws Allowed Attackers to Launch DoS Attacks and Cause Crashes
- 7:34 : Best VPN For Linux In 2026
- 7:34 : 20 Best Application Performance Monitoring Tools in 2026
- 7:34 : North Korea-Related Campaign Abuses GitHub as C2 in New LNK Phishing Attacks
- 7:34 : North Korea-Linked Hackers Compromise Axios npm Package in Major Supply Chain Attack
- 7:34 : APERION releases SmartFlow SDK for secure, on-prem AI governance without cloud reliance
- 7:34 : Texas hospital breach, CISA orders NetScaler patch, ISO file RAT warning
- 7:7 : Attackers Abuse React2Shell Flaw to Compromise 700+ Next.js Hosts
- 7:7 : Phorpiex Botnet Fuels Ransomware, Sextortion, and Crypto-Theft Attacks
- 7:7 : Trivy supply chain attack enabled European Commission cloud breach
- 7:5 : IT Security News Hourly Summary 2026-04-03 09h : 1 posts
- 6:32 : North Korea-Linked Hackers Hit Axios npm in Supply Chain Attack
- 6:2 : OpenSSH 10.3 Released With Patch for Shell Injection and Other Security Flaws
- 6:2 : Microsoft releases open-source toolkit to govern autonomous AI agents
- 5:34 : Qilin Ransomware Deploys Malicious DLL to Disable Most EDR Defenses
- 5:34 : Top 10 Best SaaS Security Posture Management (SSPM) Tools 2026
- 5:34 : North Korea Uses GitHub as C2 in New LNK Phishing Campaign
- 5:5 : Adobe Data Breach Allegedly Exposes 13 Million Support Tickets
- 5:5 : Click, wait, repeat: Digital trust erodes one login at a time
- 5:4 : Which messaging app takes the most limited approach to permissions on Android?
- 4:34 : New infosec products of the month: March 2026
- 4:34 : Electric Vehicles and EV Security – Steve Visconti CEO of Xiid Corporation with David Shipley
- 4:5 : IT Security News Hourly Summary 2026-04-03 06h : 1 posts
- 3:31 : Adobe Breach – Threat Actor Allegedly Claims Leak of 13 Million Support Tickets and Employee Records
- 2:9 : ISC Stormcast For Friday, April 3rd, 2026 https://isc.sans.edu/podcastdetail/9878, (Fri, Apr 3rd)
- 1:13 : Granular Policy Enforcement for Hybrid Classical-Quantum AI Workflows
- 23:7 : GenAI Alone Isn’t Enough: Rethinking AI in Cybersecurity
- 23:7 : Crowdstrike 2026 Global Threat Report: Adversaries Use AI to Bypass Defenses
- 22:34 : When Your Own Eyes Turn Against You: How Compromised Security Cameras and IoT/OT Devices Become Tools for Your Attackers
- 22:34 : AWS, Wasabi, Cloudflare, and Backblaze go head-to-head in new cloud storage test
- 22:9 : The SOC Analyst Was Never Meant to Be a Ticket Processor. Autonomous Triage Proves It.
- 22:5 : IT Security News Hourly Summary 2026-04-03 00h : 6 posts
- 21:55 : IT Security News Daily Summary 2026-04-02