48 posts were published in the last hour
- 20:4 : Sample Malware Phone Back C&C (Command and Control) MD5s From Domains Belonging to XSS Forum Users – A Compilation
- 19:5 : IT Security News Hourly Summary 2026-04-04 21h : 3 posts
- 18:5 : Qilin ransomware group claims the hack of German political party Die Linke
- 18:5 : US Lawmakers Question VPN Surveillance, Seek Transparency on Privacy Risks
- 18:5 : Why Single-Signal Fraud Detection Fails Against Modern Multi-Stage Cyber Attacks
- 18:5 : China-based TA416 Targets European Businesses via Phishing Campaigns
- 17:12 : U.S. CISA adds a flaw in TrueConf Client to its Known Exploited Vulnerabilities catalog
- 16:18 : UNC1069 Targets Node.js Maintainers via Fake LinkedIn, Slack Profiles
- 16:5 : IT Security News Hourly Summary 2026-04-04 18h : 1 posts
- 15:34 : [un]prompted 2026 – Security Guidance as a Service
- 14:34 : Microsoft Identifies Cookie Driven PHP Web Shells Maintaining Access on Linux Servers
- 14:34 : FortiClient EMS zero-day exploited, emergency hotfixes available (CVE-2026-35616)
- 14:11 : Critical Fortinet FortiClient EMS 0-Day Vulnerability Actively Exploited in the Wild
- 13:32 : The Risks and Rewards of AI SEO in High-Stakes Search Environments
- 13:7 : After fighting malware for decades, this cybersecurity veteran is now hacking drones
- 12:2 : Top Node.js Maintainers Targeted in Sophisticated Social Engineering Scheme
- 12:2 : Hackers Weaponize Claude Code Leak to Spread Vidar and GhostSocks Malware
- 12:2 : New Progress ShareFile Bugs Let Attackers Take Over Servers Without Logging In
- 11:36 : Jenny was a Friend of Mine – MCPs and Friends
- 11:7 : Hackers Are Posting the Claude Code Leak With Bonus Malware
- 11:7 : European Commission Confirms Data Breach Linked to Trivy Supply Chain Attack
- 11:7 : Using AI at Work? Here’s How to Avoid Accidentally Leaking Company Data
- 10:5 : IT Security News Hourly Summary 2026-04-04 12h : 2 posts
- 9:9 : Hackers Launch Social Engineering Offensive Against Key Node.js Maintainers
- 9:9 : European Commission breach exposed data of 30 EU entities, CERT-EU says
- 8:34 : LinkedIn Uses Hidden JavaScript to Scan for Over 6,000 Chrome Extensions on Visitors’ Browsers
- 7:11 : Top 10 Best VPN For Chrome in 2026
- 7:11 : Top 10 Best User Access Management Tools in 2026
- 7:5 : IT Security News Hourly Summary 2026-04-04 09h : 3 posts
- 6:34 : Top 10 Best Privileged Access Management (PAM) Solutions 2026
- 6:34 : Crunchyroll – 1,195,684 breached accounts
- 6:15 : Top 10 Best Identity And Access Management (IAM) Companies 2026
- 5:32 : LinkedIn Hidden Code Secretly Scans Users’ Computers for Installed Software
- 5:32 : LinkedIn Hidden Code Secretly Searches Your Browser for Installed Extensions
- 5:4 : Anthropic Ends Claude Subscription Access for Third-Party Tools Like OpenClaw
- 4:7 : Anthropic Officially Ends Claude Subscriptions for Third-Party Tools Like OpenClaw
- 4:5 : IT Security News Hourly Summary 2026-04-04 06h : 1 posts
- 3:9 : SongTrivia2 – 291,739 breached accounts
- 1:9 : Supply Chain Attacks Surge in March 2026
- 23:36 : That dream job offer from Coca-Cola or Ferrari? It’s a trap for your passwords
- 23:7 : Trump wants to take a battle axe to CISA again and slash $707M from budget
- 22:34 : How to protect your data with Agentic AI
- 22:34 : What makes Non-Human Identities safe for companies
- 22:34 : How reliable are NHIs in identity management
- 22:14 : When an Attacker Meets a Group of Agents: Navigating Amazon Bedrock’s Multi-Agent Applications
- 22:14 : Meta Pauses Work With Mercor After Data Breach Puts AI Industry Secrets at Risk
- 22:5 : IT Security News Hourly Summary 2026-04-04 00h : 3 posts
- 21:55 : IT Security News Daily Summary 2026-04-03