176 posts were published in the last hour
- 21:32 : Private Chats, Photos of Celebs Exposed in Suspected Stalkerware Leak
- 21:31 : Escape AI Pentesting Agents 2.0 – A Deep Dive
- 21:31 : Top Threats We’re Tracking in April
- 21:11 : Bot her emails: most modern phishing campaigns are AI-enabled
- 20:11 : Hackers are actively exploiting a bug in cPanel, used by millions of websites
- 20:11 : More PayPal emails hijacked to deliver tech support scams
- 20:11 : [un]prompted 2026 – Traditional ML vs. LLMs: Who Can Classifv Better?
- 20:11 : White House Pushes Back Against Anthropic’s Mythos Expansion
- 19:34 : FBI cyber boss: China’s hacker-for-hire ecosystem ‘out of control’
- 19:34 : SAP npm Supply Chain Attack Targets Developer Credentials
- 19:34 : After dissing Anthropic for limiting Mythos, OpenAI restricts access to Cyber, too
- 19:34 : CVE-2026-31431 (Copy Fail): Linux Kernel LPE
- 19:34 : PyTorch Lightning and Intercom-client Hit in Supply Chain Attacks to Steal Credentials
- 19:11 : Misconfigured Server Run by Hackers Leaks 345,000 Stolen Credit Cards
- 19:11 : Copy Fail: New Linux bug enables Root via page‑cache corruption
- 19:11 : AI Fuels ‘Industrial’ Cybercrime as Time-to-Exploit Shrinks to Hours
- 19:11 : Anthropic Unveils Claude Security to Counter AI-Powered Exploit Surge
- 19:5 : IT Security News Hourly Summary 2026-04-30 21h : 8 posts
- 18:36 : Imperva Customers Protected Against CVE-2026-41940 in cPanel & WHM
- 18:36 : Retailer Secures Website After Customer Data Leak Risk Identified
- 18:9 : Wordfence Intelligence Weekly WordPress Vulnerability Report (April 20, 2026 to April 26, 2026)
- 18:9 : Great responsibility, without great power
- 18:9 : Sugar Baby Scams: How to Spot and Avoid Them
- 18:9 : OpenAI Rolls Out ‘Advanced’ Security Mode for At-Risk Accounts
- 18:9 : Microsoft Windows 11 April 2026 Security Update Breaks Third-Party Backup Applications
- 18:9 : Fake Court Summons And Survey Scams Surge As Regions Bank Warns Of Rising Consumer Fraud Risks
- 17:34 : Google’s fix for critical Gemini CLI bug might break your CI/CD pipelines
- 17:34 : Copy Fail (CVE-2026-31431): Frequently asked questions about Linux kernel privilege escalation vulnerability
- 17:34 : Linux Kernel Flaw ‘Copy Fail’ Exposes Widespread Privilege Escalation Risk
- 17:34 : PyTorch Lightning Compromised in PyPI Supply Chain Attack to Steal Credentials
- 17:8 : Agent’s claims on WhatsApp access spark security concerns
- 17:8 : Enhancing AI-Driven Defense with Anthropic’s Claude Opus 4.7
- 17:7 : Popular Python Package lightning Hacked in Supply Chain Attack
- 17:7 : FBI and CISA Released Zero Trust Principles Implementation Guide for OT Environments
- 17:7 : New PhaaS Platform Phoenix Drives Brand-Impersonation Smishing Across Finance, Telecom, and Logistics
- 17:7 : Targeted Large-Scale Campaign Attacking U.S. Organizations with Fake Event Invitations
- 17:7 : Qilin Ransomware Enumerates RDP Authentication History on a Compromised Server
- 17:7 : French prosecutors link 15-year-old to mega-breach at state’s secure document agency
- 17:7 : What’s new, updated, or recently released in Microsoft Security
- 16:36 : ABB Ability OPTIMAX
- 16:36 : ABB System 800xA, Symphony Plus IEC 61850
- 16:36 : ABB Edgenius Management Portal
- 16:36 : ABB AWIN Gateways
- 16:36 : ABB Ability Symphony Plus Engineering
- 16:36 : Hackers stole hundreds of thousands of Roblox accounts: Here’s what to do
- 16:36 : Email threat landscape: Q1 2026 trends and insights
- 16:9 : 5 Layers of Prompt Injection Defense You Can Wire Into Any Node.js App
- 16:9 : [un]prompted 2026 – Capability-Based Authorization For Al Agents
- 16:9 : Three Arrested for Hacking Over 610,000 Roblox Accounts
- 16:5 : IT Security News Hourly Summary 2026-04-30 18h : 12 posts
- 15:32 : Cisco Introduces Model Provenance Kit to Strengthen AI Supply Chain Security
- 15:32 : AI Adoption Fuels Rise in Identity Attack Path Risk
- 15:32 : Unit 42 Expands Frontier AI Defense with Armadin Partnership
- 15:32 : Bank of America Bets Big on Risky Anthropic AI
- 15:29 : Beyond the Ledger: Why Akamai Is Redefining How We Measure CLIMATE Impact
- 15:29 : Managed vs Self-Managed Cloud Hosting: Choosing the Best Option for Your Business
- 15:29 : Clean Code: Package Architecture, Dependency Flow, and Scalability, Part 4
- 15:29 : CISO’s guide to centralized vs. federated security models
- 15:29 : Dental practice software maker fixes bug that exposed patients’ medical records
- 15:29 : SonicWall Urges Immediate Patching of Firewall Vulnerabilities
- 15:29 : Deep#Door Python Backdoor Evades Detection On Windows
- 15:29 : PwC partners with Google Cloud to take on the managed security market
- 14:37 : Forescout Launches Mission:Possible Global Partner Tour to Drive Channel Growth Across 90 Cities
- 14:37 : WordPress Plugin Hacked Since 2020 to Inject Malicious Code Silently
- 14:37 : Jenkins Patches High-Severity Plugin Flaws Including Path Traversal and Stored XSS
- 14:36 : Google Gemini CLI Vulnerabilities Allow Attackers to Execute Commands on Host Systems
- 14:36 : SAP NPM Packages Targeted in Supply Chain Attack
- 14:36 : Anti-DDoS Firm Heaped Attacks on Brazilian ISPs
- 14:36 : ThreatsDay Bulletin: SMS Blaster Busts, OpenEMR Flaws, 600K Roblox Hacks and 25 More Stories
- 14:36 : Cyber Briefing: 2026.04.30
- 14:9 : cPanel zero-day exploited for months before patch release (CVE-2026-41940)
- 14:9 : CISA and Partners Publish Zero Trust Guidance For OT Security
- 13:34 : Strengthening Trust in Digital Education Platforms with Passwordless Authentication
- 13:34 : Ransomware Victims up 389%, TTE in Less Than Two Days: How Can Defenders Stay Ahead?
- 13:34 : Why Enterprises Need an MCP Gateway, Not Native Connectors
- 13:34 : FBI and International Agencies Shut Down Scam Centers, Arrest 276 People
- 13:34 : Cisco releases open-source toolkit for verifying AI model lineage
- 13:34 : UK: Education Sector Faces Surge in Cyber Breaches Despite Stable National Threat Levels
- 13:9 : Critical Gemini CLI Flaw Enabled Host Code Execution, Supply Chain Attacks
- 13:9 : Ransomware Attacks on Schools: 4 Warning Signs IT Teams Shouldn’t Ignore
- 13:9 : EtherRAT Distribution Spoofing Administrative Tools via GitHub Facades
- 13:9 : New Python Backdoor Uses Tunneling Service to Steal Browser and Cloud Credentials
- 13:9 : U.S. Charges Suspected Scattered Spider Member
- 13:9 : Claude Mythos Fears Startle Japan’s Financial Sector
- 13:9 : Cybercrime Fighters Club Launched
- 13:5 : IT Security News Hourly Summary 2026-04-30 15h : 12 posts
- 12:37 : Check Point Cyber Security Now Available Across All Levels of U.S. Government
- 12:37 : 90,000 Screenshots of One Celebrity’s Phone Were Exposed Online
- 12:37 : Hackers arrested for stealing and reselling 600,000 Roblox accounts
- 12:37 : Proxmox Backup Server 4.2 arrives with S3 storage support and parallel sync jobs
- 12:37 : Researchers develop tool to expose GPS signal spoofing in transit networks
- 12:37 : Nine-year-old Linux kernel flaw enables reliable local privilege escalation (CVE-2026-31431)
- 12:37 : Met Police face criticism for using AI to spy on their own officers
- 12:37 : Vidar Rises to Top of Chaotic Infostealer Market
- 12:36 : PromptMink Malware Targets Crypto Trading Agents
- 12:36 : Feuding Ransomware Groups Leak Each Other’s Data
- 12:36 : Sandhills Medical Ransomware Breach
- 12:36 : OpenAI Cyber Defense Roadmap Released
- 12:4 : Nearly half of UK businesses pwned last year as phishing keeps doing the job like it’s 2005
- 12:4 : EnOcean SmartServer Flaws Expose Buildings to Remote Hacking
- 12:4 : Benchmarking AI Pentesting Tools: A Practical Comparison
- 11:34 : What type of ‘C2 on a sleep cycle’ do they leave behind? Novel Chinese spy group found in critical networks in Poland, Asia
- 11:34 : Critical cPanel & WHM Vulnerability Exploited as Zero-Day for Months
- 11:34 : Hackers Use Hidden QEMU Linux VMs to Evade Windows Security and Launch Stealth Attacks
- 10:32 : OpenAI Unveils Cyber Defense Roadmap Focused on AI-Powered Security
- 10:32 : PoC Disclosed for Critical Root ASUSTOR ADM RCE Flaw
- 10:32 : Fast16 Malware
- 10:32 : Bug of the year (so far): Nasty cPanel vulnerability probably exploited as a 0-day
- 10:32 : ‘Copy Fail’ Logic Flaw in Linux Kernel Enables System Takeover
- 10:7 : Australian Regulator Warns Banks Over AI Risks
- 10:7 : Exposed Data Illustrates the Nightmare Scenario for a Stalkerware Victim
- 10:7 : Meta accused of violating DSA by failing to safeguard minors
- 10:7 : CVE MCP Server Turns Claude Into a Fully Capable Security Analyst With 27 Tools Across 21 APIs
- 10:6 : OpenAI Releases 5-Point Action Plan to Strengthen AI-Powered Cyber Defense
- 10:6 : Europol Busts Albanian Scam Call Centers in Major Online Fraud Case
- 10:5 : IT Security News Hourly Summary 2026-04-30 12h : 20 posts
- 9:36 : Anthropic Considers Funding Offers At $900bn Valuation
- 9:36 : Meta Shares Slump As It Boosts Capex Prediction
- 9:36 : Google Sells Custom AI Chips For First Time Amid Cloud Growth
- 9:36 : Amazon Cloud Growth Beats Expectations Amid AI Boom
- 9:36 : Attackers Exploit cPanel Authentication Bypass 0-Day After PoC Release
- 9:36 : What We Do in the Shadows: How CISOs Can Crack Down on Shadow AI
- 9:36 : New Linux ‘Copy Fail’ Vulnerability Enables Root Access on Major Distributions
- 9:36 : Cyber is the Number One Global “People Risk,” Says Marsh
- 9:9 : Backdoored WordPress Plugin Abuses Remote Update Checker for Silent Code Delivery
- 9:9 : Jenkins Plugin Updates Fix Path Traversal and Stored XSS Bugs
- 9:9 : Best AI security tools for exposure assessment in 2026
- 9:9 : ProFTPD’s SQL Injection Vulnerability Enables Remote Code Execution Attacks
- 9:9 : CISA Warns of ConnectWise ScreenConnect Vulnerability Exploited in Attacks
- 9:9 : Novel KarstoRAT RAT Enables Webcam Monitoring, Audio Recording, and Remote Payload Execution
- 9:9 : Qinglong Task Scheduler RCE Vulnerabilities Exploited in the Wild
- 9:9 : Claude-Generated Commit Adds PromptMink Malware to Crypto Trading Agent
- 9:9 : Britain’s £6B armoured sickener Ajax cleared for duty despite injuring troops
- 9:9 : Sandhills Medical Says Ransomware Breach Affects 170,000
- 9:9 : Wasn’t Visibility Supposed to Fix This?
- 9:8 : It’s Not the Computer, Stupid. It’s the Information in It. Two Recent Indictments Stretch the Limits of “Theft” of Information.
- 8:9 : Qinglong Task Scheduler RCE Flaws Exploited in the Wild
- 8:9 : Finance company stores DB credentials in helpfully labeled spreadsheet
- 8:9 : Large-scale Roblox hacking operation shut down by Ukrainian authorities
- 8:9 : Identity Continuity for Epic EHR
- 8:9 : Bad Bots in the Agentic Age: What the 2026 Thales Bad Bot Report Reveals
- 7:35 : Chinese Regulators Suspend Robotaxi Licences After Incident
- 7:35 : 9-Year-Old Linux Kernel Vulnerability “Copy Fail” Enables Full Root Access
- 7:35 : cPanel 0-Day Authentication Bypass Vulnerability Actively Exploited in the Wild — PoC Released
- 7:35 : Europol Busts €50 Million Online Fraud Network Running Corporate-Style Scam Call Centres
- 7:35 : SonicWall SonicOS Vulnerabilities Allow Attackers to Bypass Access Controls and Crash Firewall
- 7:35 : New EtherRAT Variant Uses Trojanized Tftpd64 Installer to Bridge Web2 Malware and Web3 Theft
- 7:35 : Google Fixes CVSS 10 Gemini CLI CI RCE and Cursor Flaws Enable Code Execution
- 7:35 : Roblox hackers arrested, Microsoft 0-day falls short, Dubai scam takedown
- 7:5 : IT Security News Hourly Summary 2026-04-30 09h : 5 posts
- 7:4 : O2 Looks To Boost Sunderland 5G Service
- 7:4 : Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India
- 7:4 : A photon was teleported across 270 meters in stunning quantum breakthrough
- 7:4 : Identity Access Management Strategy for Non-Human Identities
- 7:4 : Ukrainian Police Arrest Three Hackers Who Compromised 610,000 Roblox Accounts and Sold Them for $225,000
- 6:4 : Compromised SAP npm Packages Found Harvesting Developer and CI/CD Secrets
- 6:4 : SOC 2 Type 2 mapping to Secure SDLC Requirements
- 6:4 : Cursor AI Extension Access Developer Tokens Leads to Full Credential Compromise
- 6:4 : Security Researchers Uncover QEMU-Powered Evasion in Payouts King Ransomware
- 5:34 : ProFTPD SQL Injection Flaw Opens Door To Remote Code Execution Attacks
- 5:34 : SonicWall SonicOS Flaw Lets Attackers Bypass Access Controls and Crash Firewalls
- 5:4 : Linux Kernel 0-Day “Copy Fail” Grants Root Access Across Major Distros Since 2017
- 4:34 : Salesforce’s New “Headless 360” Lets AI Agents Run Its Platform
- 4:5 : IT Security News Hourly Summary 2026-04-30 06h : 2 posts
- 4:5 : Linux Kernel 0-Day “Copy Fail” Roots Every Major Distribution Since 2017
- 3:32 : Coming Soon: AI-Scan OpenClaw Ecosystem Security Scanning Capabilities
- 3:4 : Adaptive Security Leadership in an Expanding Threat Surface
- 2:32 : Udemy Data Breach – 1.4 Million Records Leaked by ShinyHunters
- 2:8 : ISC Stormcast For Thursday, April 30th, 2026 https://isc.sans.edu/podcastdetail/9912, (Thu, Apr 30th)
- 1:38 : KasadaIQ’s Q1 Insights: How AI Became Adversary Infrastructure
- 1:11 : Microsoft Confirms Windows Flaw Is Being Exploited After Incomplete Patch
- 1:5 : IT Security News Hourly Summary 2026-04-30 03h : 1 posts
- 0:32 : Danger of Libredtail [Guest Diary], (Wed, Apr 29th)
- 0:4 : Linux cryptographic code flaw offers fast route to root
- 22:5 : IT Security News Hourly Summary 2026-04-30 00h : 7 posts
- 21:55 : IT Security News Daily Summary 2026-04-29