158 posts were published in the last hour
- 21:34 : AI Agent Security: Automating Workflow Without Creating Prompt Injection or Data Leak Risks
- 21:34 : From teen hacker to Iron Dome researcher, this founder raised $28M to fight AI phishing
- 21:34 : Discord enables end-to-end encrypted voice and video calling for every user
- 21:34 : The Gentlemen Ransomware Attacks Windows, Linux, NAS, BSD, and ESXi Attacks
- 21:2 : Hackers have compromised dozens of popular open source packages in an ongoing supply-chain attack
- 20:32 : Drupal is rolling out an emergency security update on May 20. You cannot miss it
- 20:2 : CISA GitHub Leak Exposes AWS GovCloud Secrets
- 20:2 : OffSec Launches Instructor-Led Live Training for Enterprise Security Teams
- 19:34 : Kimsuky Hackers Use LNK and JSE Lures to Target Recruiters, Crypto Users, and Defense Officials
- 19:5 : IT Security News Hourly Summary 2026-05-19 21h : 5 posts
- 18:32 : Microsoft dismantled malware-signing network Fox Tempest
- 18:32 : Operation Ramz Seizes 53 Servers Linked to Cyber Scams and Malware Threats
- 18:32 : 3 Tactics Elite SOCs Use to Operationalize Threat Intelligence
- 18:32 : DirtyDecrypt Linux Kernel Vulnerability PoC Exploit Code Released
- 18:32 : Malware Campaign Uses JavaScript, PowerShell, and Shellcode to Deliver Crypto Clipper
- 18:2 : Grafana Rejects Ransom Demand After GitHub Breach Exposes Codebase Theft
- 18:2 : AdvancedHEALTH Ransomware Claim Includes 2.3M Patient Data Lines
- 18:2 : Microsoft Confirms Windows Update Bug Blocking Security Fixes
- 18:2 : America’s top cyber-defense agency left a GitHub repo open with with passwords, keys, tokens – and incredibly obvious filenames
- 17:32 : The Invisible Workforce: Why Your Household Apps Now Have Their Own Digital IDs
- 17:32 : Cyber Agony Aunts: New book Offers Practical Look at Resilience
- 17:31 : Trapdoor Android Ad Fraud Scheme Hit 659 Million Daily Bid Requests Using 455 Apps
- 17:2 : How Parts Inventory Management Software Fixes Inventory Challenges
- 17:2 : Why Commercial Cyber Threat Intelligence is Failing Defence Operations
- 16:32 : ZKTeco CCTV Cameras
- 16:32 : ScadaBR
- 16:32 : ABB CoreSense HM and CoreSense M10
- 16:32 : Siemens RUGGEDCOM APE1808 Devices
- 16:32 : Kieback & Peter DDC Building Controllers
- 16:32 : Critical PostgreSQL Vulnerabilities Enables Code Execution and SQL Injections
- 16:32 : Biometrics, diagnoses, and bank details exposed in major healthcare breach
- 16:32 : Microsoft Disrupts Malware-Signing Service Run by ‘Fox Tempest’
- 16:31 : Drupal to Patch Highly Critical Vulnerability at Risk of Quick Exploitation
- 16:31 : Governing infrastructure as code using pattern-based policy as code
- 16:5 : IT Security News Hourly Summary 2026-05-19 18h : 11 posts
- 16:2 : TP-Link, Photoshop, OpenVPN, Norton VPN vulnerabilities
- 16:2 : Pwn2Own Berlin 2026 Closes With $1.3 Million in Zero-Day Payouts
- 16:2 : Hackers have compromised dozens of popular open source packages in an ongoing supply chain attack
- 16:2 : Clear your calendar, Drupal user: You have a critically urgent patch to install
- 16:2 : Exposing Fox Tempest: A malware-signing service operation
- 15:32 : US cyber agency CISA exposed reams of passwords and cloud keys to the open web
- 15:32 : Microsoft Edge Stops Loading Saved Passwords Into Memory at Startup
- 15:32 : Critical Apache Flink Vulnerability Enables Remote code execution Attacks
- 15:32 : Compromised GitHub Action Exfiltrates Workflow Credentials to Attacker Domain
- 15:32 : Meta Challenges Ofcom Over Online Safety Act Fees and Penalties
- 15:32 : Fake Claude AI Site Spreads New Beagle Windows Backdoor – Here’s How to Stay Safe
- 15:2 : Securing the AI Supply Chain in the European Union
- 15:2 : New VoidStealer Malware Bypasses Chrome’s Protection to Steal User Data
- 15:2 : Attackers Use Cloudflare Storage Endpoint to Exfiltrate Files From Compromised Networks
- 15:2 : DirtyDecrypt PoC Released for Linux Kernel CVE-2026-31635 LPE Vulnerability
- 15:2 : Microsoft Takes Down Fox Tempest for Providing Ransomware-Enabling Signing Tool
- 15:2 : Telecom sector launches its own private ISAC
- 14:32 : You Can Get Some of Your Nudes Removed From the Internet Under a New Law
- 14:32 : Check Point Wants AI Agents to Do What Security Teams Can’t: Manage Networks at Machine Speed
- 14:31 : Cyber Briefing: 2026.05.19
- 14:2 : Criminal IP Returns to Infosecurity Europe 2026 with Advanced AI-Driven TI & ASM
- 13:32 : The Network Security Problem No One Could Solve – Until Now.
- 13:32 : Nx Console VS Code Extension Compromised to Steal Developer and Cloud Secrets
- 13:32 : New VoidStealer Malware Bypasses Chrome’s App-Bound Encryption to Steal Passwords and Cookies
- 13:32 : Facebook scam promises cheap Aldi meat boxes, steals payment info instead
- 13:32 : Selector extends AI-driven observability into multi-cloud environments
- 13:31 : PureLogs infostealer is stealing credentials worldwide
- 13:5 : IT Security News Hourly Summary 2026-05-19 15h : 16 posts
- 13:4 : Inside SHADOW-WATER-063’s Banana RAT: From Build Server to Banking Fraud
- 13:3 : Two-Thirds of Nonhuman Accounts Are Unseen and Unmanaged, According to Orchid Security’s Identity Gap Report
- 13:3 : UAC-0184 Uses Bitsadmin and HTA Files to Deliver Gated Malware
- 13:3 : VoidStealer Malware Targets Chrome Data Despite Built-In Browser Protections
- 13:3 : Zero Day Microsoft Exchange Servers On Target | CVE-2026-42897
- 13:3 : Unpatched ChromaDB Vulnerability Can Lead to Server Takeover
- 13:3 : Legacy Windows Tool MSHTA Fuels Surge in Silent Malware Attacks
- 13:3 : New macOS infostealer impersonates Apple, Microsoft, and Google in a single attack chain
- 13:3 : Canonical ships Ubuntu Core 26 with 15 years of security maintenance
- 13:2 : LaunchDarkly adds real-time controls for AI agents in production
- 13:2 : Drupal to Release Urgent Core Security Updates on May 20, Sites Told to Prepare
- 13:2 : The New Phishing Click: How OAuth Consent Bypasses MFA
- 12:32 : GitHub Token Exposure at Grafana Triggered Codebase Theft Incident
- 12:32 : Crypto at Risk: Experts Believe Quantum Threat Arriving by 2030
- 12:32 : The end of unencrypted Discord calls is here
- 12:31 : AI Raises the Bar on Vulnerability Awareness and Secure-by-Design Software
- 12:3 : Critical SEPPmail Gateway Flaws Allow Remote Code Execution and Mail Traffic Theft
- 12:3 : Critical Marimo Security Vulnerability Enables Remote Code Execution Attacks
- 12:3 : Microsoft to Retire Teams Together Mode to Enhance Performance Improvements
- 12:3 : B1ack’s Stash Marketplace Gives Away 4.6 Million Stolen Credit Cards
- 12:3 : Agentic AI Accelerates Software Builds and Mobile App Attacks
- 11:32 : Microsoft Edge Enhances Security by Preventing Password Loading at Startup
- 11:32 : Operation Ramz Dismantles 53 Servers Used in Scam and Malware Campaigns
- 11:32 : macOS Malware Abuses Fake Google Update for Persistence
- 11:32 : YouTube wants your face to fight deepfakes
- 11:31 : Cyber Resilience is the New Business Continuity Plan
- 11:2 : Hosting Service Standards That Define High-Performing Agencies
- 11:2 : ShinyHunters Takes Responsibility for Attack on Learning Management Platform
- 11:2 : Laurie Anderson Is Quoting Me
- 11:2 : 201 Arrested in Crackdown on Cybercrime in Middle East, North Africa
- 10:32 : Hackers Actively Exploit ‘Nginx Rift’ Vulnerability Affecting NGINX, F5 Products
- 10:32 : How EM is boosting the career trajectory of VM analysts
- 10:32 : SEPPMail Secure E-Mail Gateway Vulnerabilities Enable RCE and Mail Traffic Access
- 10:5 : IT Security News Hourly Summary 2026-05-19 12h : 15 posts
- 10:2 : From PDB strings to MaaS: Tracking a commodity BadIIS ecosystem used by Chinese-speaking threat
- 10:2 : AI-Generated Bug Submissions Create ‘Carnage’
- 10:2 : Gentlemen Ransomware Targets Windows, Linux, NAS, BSD, and ESXi Systems
- 10:2 : How to Make Apps and Websites Remove Your Nonconsensual Nudes
- 10:2 : Hackers Compromise @antv Packages in Mini Shai-Hulud npm Attack Wave
- 10:2 : PoC Released for DirtyDecrypt Linux Kernel Vulnerability
- 9:32 : Bank Says EV Expansion Faces Infrastructure, Insurance Barriers
- 9:32 : 20-Year-Old PostgreSQL Flaw Gets Public PoC Exploit for Remote Code Execution
- 9:32 : Kimsuky Uses LNK, JSE Lures to Target Recruiters, Crypto Users, Defense Officials
- 9:32 : Massive MENA cybercrime Operation Ramz disrupts infrastructure and arrests 201 suspects
- 9:32 : Poland shifts away from Signal following cyberattacks on officials’ accounts
- 9:32 : 7-Eleven Notifies Franchise Applicants After Breach Exposes Personal Data
- 9:32 : NCSC warns organisations not to rush into agentic AI
- 9:32 : How EM is Boosting the Career Trajectory of VM Analysts
- 9:32 : Grafana Labs Confirms Hackers Stole Source Code
- 9:2 : UK Gov’t Saves Millions By Ending Palantir Contract
- 9:2 : PostgreSQL Flaws Expose Databases to Remote Code Execution and SQL Injection
- 9:2 : Four-Faith Industrial Routers Targeted in Botnet Hijacking Campaign
- 9:2 : CISA Admin Exposes AWS GovCloud Credentials on Public GitHub Repository
- 8:32 : Waymo Cars Flood Quiet Atlanta Cul-De-Sac
- 8:32 : Shai-Hulud worm copycats emerge after source code leak
- 8:32 : Compromised Nx Console 18.95.0 Targeted VS Code Developers with Credential Stealer
- 8:32 : Hackers Bypass Security Tools to Target Users Directly
- 8:3 : JLR Profit Drops 99 Percent After Cyber-Attack
- 8:3 : Jurors Dismiss Musk’s OpenAI Lawsuit
- 8:2 : Students Boo Former Google Chief Schmidt Over AI Remarks
- 8:2 : Hackers Exploit Entra ID Accounts to Steal Microsoft 365, Azure Data
- 8:2 : iProov brings identity verification to video meetings to reduce fraud risks
- 8:2 : Babel Street targets AI-driven threats with new agentic investigation capabilities
- 8:2 : YouTube Expands AI Likeness Detection to All Creators Aged 18 and Over
- 7:32 : JavaScript Malware Campaign Drops Crypto Clipper via PowerShell
- 7:32 : Hackers Abuse Microsoft Entra ID Accounts to Exfiltrate Microsoft 365 and Azure Data
- 7:32 : Egnyte unveils Email Capture and AI features to unify fragmented data
- 7:32 : Linus Torvalds talks AI bug hunters, 7-Eleven ransom demand, MENA’s new cybercrime op
- 7:5 : IT Security News Hourly Summary 2026-05-19 09h : 4 posts
- 7:2 : Compromised GitHub Action Steals Workflow Credentials
- 7:2 : Popular GitHub Action Tags Redirected to Imposter Commit to Steal CI/CD Credentials
- 6:32 : Mini Shai-Hulud Attack Hits @antv npm Packages
- 6:32 : Critical Vulnerability Exposes Industrial Robot Fleets to Hacking
- 6:2 : Microsoft to Retire Teams Together Mode to Improve Performance
- 6:2 : CISA Admin Reportedly Exposes AWS GovCloud Credentials in Public GitHub Repository
- 6:2 : Public Instagram posts provide raw material for AI phishing campaigns
- 5:32 : Compromised Nx Console VS Code Extension Steals Developer and Cloud Secrets
- 5:32 : Mythos Preview Automates PoC Exploit Creation for Vulnerability Research
- 5:32 : SEPPmail Gateway Flaws Expose Organizations to RCE and Email Traffic Interception
- 5:32 : Earbud sensors can authenticate users by their heartbeat, study finds
- 5:32 : Mini Shai-Hulud Pushes Malicious AntV npm Packages via Compromised Maintainer Account
- 5:31 : GitHub Actions Supply Chain Attack Redirects Tags to Steal CI/CD Credentials
- 5:2 : AI infrastructure is cracking under sovereignty demands
- 4:32 : Mythos Preview Builds PoC Exploits in Automated Vulnerability Research
- 4:32 : Cybersecurity jobs available right now: May 19, 2026
- 4:32 : Exchange Zero-Day Under Attack, Ransomware Gets Smarter, Fortinet Critical Flaws
- 2:2 : ISC Stormcast For Tuesday, May 19th, 2026 https://isc.sans.edu/podcastdetail/9936, (Tue, May 19th)
- 1:32 : CTT – 468,124 breached accounts
- 0:2 : Are Attackers Hiding Inside Your Network Traffic?
- 0:2 : Do fear the Reaper – stealer swipes macOS users’ passwords, wallets, then backdoors them
- 23:31 : How Storm-2949 turned a compromised identity into a cloud-wide breach
- 22:32 : Shai-Hulud copycat worm infects yet another npm package
- 22:5 : IT Security News Hourly Summary 2026-05-19 00h : 2 posts
- 22:3 : Addi – 34,532,941 breached accounts
- 21:55 : IT Security News Daily Summary 2026-05-18