210 posts were published in the last hour
- 22:55 : IT Security News Daily Summary 2026-01-04
- 20:5 : IT Security News Hourly Summary 2026-01-04 21h : 2 posts
- 20:4 : NDSS 2025 – A New PPML Paradigm For Quantized Models
- 19:31 : Trump admin sends heart emoji to commercial spyware makers with lifted Predator sanctions
- 19:2 : Resecurity Caught ShinyHunters in Honeypot
- 16:2 : What is happening to the Internet in Venezuela? Did the U.S. use cyber capabilities?
- 15:32 : Russian Threat Actors Deploy Zero-Click Exploit in High-Impact Attack on France
- 15:32 : 2026 Digital Frontiers: AI Deregulation to Surveillance Surge
- 15:32 : China-linked Hackers Exploit Critical Cisco Zero-day as VPN Attacks Surge
- 15:32 : Former Cybersecurity Employees Involved in Ransomware Extortion Incidents Worth Millions
- 15:32 : Chinese Open AI Models Rival US Systems and Reshape Global Adoption
- 14:5 : IT Security News Hourly Summary 2026-01-04 15h : 2 posts
- 14:2 : Security Affairs newsletter Round 557 by Pierluigi Paganini – INTERNATIONAL EDITION
- 14:2 : SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 78
- 11:31 : 8 WhatsApp Features to Boost Your Security and Privacy
- 11:5 : IT Security News Hourly Summary 2026-01-04 12h : 2 posts
- 11:2 : President Trump blocks $2.9M Emcore chip sale over security concerns
- 11:2 : Palo Alto Networks security-intel boss calls AI agents 2026’s biggest insider threat
- 5:5 : IT Security News Hourly Summary 2026-01-04 06h : 1 posts
- 5:2 : Cryptocurrency Scam Emails and Web Pages As We Enter 2026, (Sun, Jan 4th)
- 0:31 : Can companies truly be free from cybersecurity threats with AI
- 0:31 : How independent can AI systems be in managing NHIs
- 0:31 : Can Agentic AI truly handle the complex needs of modern enterprises
- 23:5 : IT Security News Hourly Summary 2026-01-04 00h : 2 posts
- 22:55 : IT Security News Daily Summary 2026-01-03
- 22:33 : California residents can use new tool to demand brokers delete their personal data
- 20:31 : Finnish Authorities Detain Crew After Undersea Internet Cable Severed
- 20:5 : IT Security News Hourly Summary 2026-01-03 21h : 6 posts
- 20:2 : Bitfinex hacker Ilya Lichtenstein credits Trump for early release from prison
- 20:2 : French authorities investigate AI ‘undressing’ deepfakes on X
- 19:32 : ShinyHunters Claim Breach of US Cybersecurity Firm Resecurity (Updated)
- 19:31 : Resecurity Says ShinyHunters Fell for Honeypot After Breach Claim
- 19:31 : NDSS 2025 – DLBox: New Model Training Framework For Protecting Training Data
- 19:31 : Data Privacy vs Cybersecurity Solutions: Key Differences
- 18:2 : Fake DHL Pickup Slips Used in QR Code Phishing Scam
- 18:2 : GlassWorm Malware Returns with MacOS-focused Attack via VS Code Extensions
- 18:2 : This Week in Cybersecurity: User Data Theft, AI-Driven Fraud, and System Vulnerabilities
- 17:5 : IT Security News Hourly Summary 2026-01-03 18h : 1 posts
- 17:2 : ShinyHunters Claim Breach of US Cybersecurity Firm Resecurity
- 15:31 : Apple Forces iOS 26 Upgrade Amid Active iPhone Security Threats
- 15:31 : 2FA Fail: Hackers Exploit Microsoft 365 to Launch Code Phishing Attacks
- 15:2 : RondoDox Botnet is Using React2Shell to Hijack Thousands of Unpatched Devices
- 14:32 : Finnish Authorities Arrest Two Sailors in Probe Into Undersea Cable Disruption
- 14:32 : India’s RBI Opens Doors to Lateral Hiring in 2026, Signalling a Tech-First Shift in Financial Regulation
- 14:32 : Taiwan Holds 210 BTC Seized from Criminals, Debates Bitcoin’s Strategic Value
- 12:2 : Thousands of ColdFusion exploit attempts spotted during Christmas holiday
- 11:5 : IT Security News Hourly Summary 2026-01-03 12h : 5 posts
- 11:2 : President Trump Orders Divestment in $2.9 Million Chips Deal to Protect US Security Interests
- 10:32 : How to Protect Your iPhone or Android Device From Spyware
- 10:32 : VVS Stealer Uses PyArmor Obfuscation to Evade Static Analysis and Signature Detection
- 10:31 : Finland Arrests Two Cargo Ship Crew Members Over Undersea Cable Damage
- 10:31 : Infostealers Enable Attackers to Hijack Legitimate Business Infrastructure for Malware Hosting
- 5:31 : Final Encore Episode – Research, Cybersecurity Awareness and Training
- 3:31 : What is Enterprise Identity — And Why Most Companies Get SSO & RBAC Catastrophically Wrong
- 2:5 : IT Security News Hourly Summary 2026-01-03 03h : 4 posts
- 2:2 : Why are IT leaders optimistic about future AI governance
- 2:2 : How do Agentic AI systems deliver value in real-time operations
- 2:2 : How capable are current secrets rotation systems in preventing breaches
- 2:2 : Are investments in Privileged Access Management justified by results
- 0:2 : Protecting Your Digital Wallet: What You Need to Know About Fintech Security
- 23:5 : IT Security News Hourly Summary 2026-01-03 00h : 2 posts
- 23:2 : Two U.S. cybersecurity professionals plead guilty in BlackCat/Alphv ransomware case
- 22:55 : IT Security News Daily Summary 2026-01-02
- 21:2 : Security Professionals Plead Guilty in ALPHV Ransomware Case
- 20:31 : Bitfinex crypto thief who was serving five years thanks Trump for early release
- 20:5 : IT Security News Hourly Summary 2026-01-02 21h : 3 posts
- 20:2 : China’s New Cybersecurity Law Demands Faster Incident Reporting From Companies
- 19:31 : APT36 Uses Malicious Windows Shortcuts to Target Indian Government
- 19:31 : IBM Issues Critical Alert Over Authentication Bypass Flaw in API Connect Platform
- 19:2 : Tokyo FM Data Breach: Hacker Claims Over 3 Million Records Stolen
- 19:2 : Cybercrook claims to be selling infrastructure info about three major US utilities
- 18:31 : DarkSpectre Malware Hit 8.8M Browsers via Malicious Extensions
- 18:2 : 5 Challenges and Solutions in Mobile App Testing
- 17:5 : IT Security News Hourly Summary 2026-01-02 18h : 4 posts
- 17:2 : Critical Flaw Puts WHILL Electric Wheelchairs at Risk of Hijacking
- 16:32 : Hacker Claims 200GB Data Theft From European Space Agency — Here’s What We Know
- 16:31 : Brit lands invite-only Aussie visa after uncovering vuln in government systems
- 16:31 : Why Lightweight Browsers Are the Key to Faster, More Focused Web Productivity
- 16:2 : Debugging DNS response times with tshark, (Fri, Jan 2nd)
- 16:2 : Covenant Health data breach after ransomware attack impacted over 478,000 people
- 15:32 : Best of 2025: Huge Food Wholesaler Paralyzed by Hack — is it Scattered Spider Again?
- 15:32 : South Africa Warns of Cybercrime Surge Amid Festive Season
- 15:31 : Cyber Briefing: 2026.01.02
- 15:2 : TriZetto Data Breach Triggers Class-Action Lawsuits Against Cognizant
- 15:2 : Hackers Abusing Google Tasks Notification for Sophisticated Phishing Attack
- 15:2 : Handala Hackers Targeted Israeli Officials by Compromising Telegram Accounts
- 15:2 : 10,000+ Fortinet Firewalls Still Exposed to 5-year Old MFA Bypass Vulnerability
- 14:32 : 5 UC and collaboration trends reshaping the market in 2026
- 14:32 : The Kimwolf Botnet is Stalking Your Local Network
- 14:32 : Best of 2025: NIST Launches Updated Incident Response Guide
- 14:32 : Antivirus vs Identity Protection Software: What to Choose and How?
- 14:32 : Amazon Links Five-Year Cloud Cyber Campaign to Russia’s Sandworm Group
- 14:5 : IT Security News Hourly Summary 2026-01-02 15h : 8 posts
- 14:2 : RondoDoX Botnet Abuses React2Shell Vulnerability for Malware Deployment
- 14:2 : Cognizant Faces Multiple US Class-Action Lawsuits After TriZetto Data Breach
- 14:2 : Hacker Group Claims Responsibility for Alleged Tokyo FM Broadcasting Breach
- 14:2 : Google Tasks Feature Exploited in New Sophisticated Phishing Campaign
- 14:2 : Handala Hackers Breach Telegram Accounts Linked to Israeli Officials
- 14:2 : Transparent Tribe Launches New RAT Attacks Against Indian Government and Academia
- 13:31 : Potential Wallet Phishing Campaign Targets Cardano Users via ‘Eternl Desktop’ Announcement
- 13:31 : RondoDoX Botnet Weaponizing a Critical React2Shell Vulnerability to Deploy Malware
- 13:2 : Phishing campaign abuses Google Cloud Application to impersonate legitimate Google emails
- 12:31 : Flock Exposes Its AI-Enabled Surveillance Cameras
- 12:31 : LockBit takedown architect gets New Year award from King Charles
- 12:31 : Two US Cybersecurity Pros Plead Guilty Over Ransomware Attacks
- 12:31 : The ROI Problem in Attack Surface Management
- 12:2 : CISA Warns of WHILL Model C2 Wheelchairs Vulnerability Let Attackers Take Control of Product
- 12:2 : Cognizant Hit With Multiple US Class-Action Lawsuits Following TriZetto Data Breach
- 12:2 : Threat Actors Testing Modified and Highly Obfuscated Version of Shai Hulud Strain
- 12:2 : Goldman Sachs Clients Data May Be Exposed
- 12:2 : Thousands Of Medical Records Found
- 12:2 : ServiceNow To Buy Cyber Firm Armis
- 12:2 : Treasury Lifts Sanctions On Intellexa Execs
- 12:2 : Georgia Arrests Ex Spy Chief Over Scam Aid
- 11:32 : VVS Discord Stealer Using Pyarmor for Obfuscation and Detection Evasion
- 11:31 : How Protesters Became Content for the Cops
- 11:31 : RondoDox Botnet Exploiting React2Shell Vulnerability
- 11:31 : New ErrTraffic Service Enables ClickFix
- 11:5 : IT Security News Hourly Summary 2026-01-02 12h : 7 posts
- 11:2 : IBM warns of critical API Connect bug enabling remote access
- 11:2 : How AI made scams more convincing in 2025
- 10:32 : Adobe ColdFusion Servers Targeted in Coordinated Campaign
- 10:31 : Covenant Health Data Breach Impacts 478,000 Individuals
- 10:31 : Email-first cybersecurity predictions for 2026
- 10:31 : India’s Spyware Policy Could Reshape Tech Governance Norms
- 10:31 : Cybercriminals Abuse Google Cloud Email Feature in Multi-Stage Phishing Campaign
- 9:31 : Careto Hacker Group is Back After 10 Years of Silence with New Attack Tactics
- 9:31 : Lessons From Mongobleed Vulnerability (CVE-2025-14847) That Actively Exploited In The Wild
- 8:31 : Apache NuttX Vulnerability Let Attackers to Crash Systems
- 8:31 : Cisco XDR in 30: Turning Security Signals Into Confident Action
- 8:31 : NYC Inauguration bans Flipper Zero, UK taxes crypto, Finland seizes ship
- 6:31 : How AutoSecT Helps Security Teams Handle 1000+ Endpoints Effortlessly?
- 6:31 : What shadow AI means for SaaS security and integrations
- 5:31 : Careto Hacker Group Resurfaces After a Decade, Unleashing New Attack Techniques
- 5:31 : Apache NuttX Flaw Allows Attackers to Crash Embedded Systems
- 5:31 : Hospitals are drowning in threats they can’t triage
- 5:31 : From experiment to production, AI settles into embedded software development
- 4:2 : NYC Inauguration Security Policy Draws Attention for Targeting Specific Tech Tools
- 1:2 : Post-Quantum Identity and Access Management for AI Agents
- 0:31 : Grab Bag
- 0:31 : Windows Defender Support Logs
- 23:5 : IT Security News Hourly Summary 2026-01-02 00h : 1 posts
- 22:55 : IT Security News Daily Summary 2026-01-01
- 22:2 : 2026-01-01: Lumma Stealer infection with follow-up malware
- 21:31 : How Webflow Helps Companies Move Faster Without Sacrificing Brand Control
- 17:31 : Chinese-linked Browser Extensions Linked to Corporate Espionage Hit Millions of Users
- 17:5 : IT Security News Hourly Summary 2026-01-01 18h : 2 posts
- 17:2 : Trust Wallet confirms second Shai-Hulud supply-chain attack, $8.5M in crypto stolen
- 17:2 : ThreatsDay Bulletin: GhostAd Drain, macOS Attacks, Proxy Botnets, Cloud Exploits, and 12+ Stories
- 16:2 : Top 10 High-Risk Vulnerabilities Of 2025 that Exploited in the Wild
- 15:31 : Best of 2025: CVE-2025-29927 – Understanding the Next.js Middleware Vulnerability
- 15:2 : React2Shell under attack: RondoDox Botnet spreads miners and malware
- 15:2 : Why the Leak of 16 Billion Passwords Remains a Live Cybersecurity Threat in 2025
- 15:2 : Trust Wallet Chrome Extension Hack Costs $8.5 Million Theft
- 14:31 : Best of 2025: Google Gemini AI Flaw Could Lead to Gmail Compromise, Phishing
- 14:5 : IT Security News Hourly Summary 2026-01-01 15h : 1 posts
- 14:2 : TikTok US Deal: ByteDance Sells Majority Stake Amid Security Fears
- 12:31 : A Happy, Prosperous & Safe New Year 2026 Wish To You And Yours
- 11:5 : IT Security News Hourly Summary 2026-01-01 12h : 2 posts
- 10:31 : Two U.S. CyberSecurity Pros Plead Guilty for Working as ALPHV/BlackCat Affiliates
- 10:31 : WhatsApp Crypt Tool to Encrypt and Decrypt WhatsApp Backups
- 10:2 : RondoDox Botnet Exploits Critical React2Shell Flaw to Hijack IoT Devices and Web Servers
- 8:31 : Bitcoin’s Security Assumptions Challenged by Quantum Advancements
- 8:31 : Unleash Protocol Suffers $3.9M Crypto Loss After Unauthorized Smart Contract Upgrade
- 8:31 : Infosecurity’s Top 10 Cybersecurity Stories of 2025
- 8:31 : Unleash Protocol hackers drain millions, DarkSpectre campaigns exposed, Shai-Hulud attack led Trust Wallet heist
- 2:31 : Granular attribute-based access control for context window injections
- 23:5 : IT Security News Hourly Summary 2026-01-01 00h : 3 posts
- 23:2 : Hacker Claims European Space Agency Breach, Selling 200GB of Data
- 23:1 : IT Security News Weekly Summary January
- 22:55 : IT Security News Daily Summary 2025-12-31
- 21:31 : NDSS 2025 – Impact Tracing: Identifying The Culprit Of Misinformation In Encrypted Messaging Systems
- 21:31 : Randall Munroe’s XKCD ‘Inverted Catenaries’
- 21:31 : NDSS 2025 – • Decentralized Infrastructure For Sharing Trusted Encrypted Facts And Nothing More
- 20:31 : Microsoft Makes Teams ‘Secure by Default’ Starting January 2026
- 20:5 : IT Security News Hourly Summary 2025-12-31 21h : 1 posts
- 19:36 : Apache StreamPipes Flaw Lets Anyone Become Admin
- 18:32 : Malicious Jackson Lookalike Library Slips Into Maven Central
- 18:31 : Communicating AI Risk to the Board With Confidence | Kovrr
- 18:31 : Two US Banks Disclose Customer Data Exposure Linked to Marquis Software Ransomware Attack
- 18:31 : Advanced Rootkit Used to Conceal ToneShell Malware in Targeted Cyberespionage Attacks
- 18:2 : Self-Propagating GlassWorm Weaponizing VS Code Extensions to Attack macOS Users
- 17:32 : Malicious Manipulation of LLMs for Scalable Vulnerability Exploitation
- 17:32 : DarkSpectre Malware Campaign Hits Chrome, Edge, and Firefox Users
- 17:32 : NeuroSploit v2 Launches as AI-Powered Penetration Testing Framework
- 17:32 : New Cybercrime Tool “ErrTraffic” Enables Automated ClickFix Attacks
- 17:31 : GlassWorm Malware Turns VS Code Extensions into an Attack Vector Against macOS
- 17:31 : Security and Governance Patterns for Your Conversational AI
- 17:31 : Trust Wallet Chrome Extension Hack Drains $8.5M via Shai-Hulud Supply Chain Attack
- 17:5 : IT Security News Hourly Summary 2025-12-31 18h : 5 posts
- 17:2 : Everest Ransomware Leaks 1TB of Stolen ASUS Data
- 17:2 : ESA disclosed a data breach, hackers breached external servers
- 17:2 : European Space Agency hit again as cybercrims claim 200 GB data up for sale
- 16:31 : Avoid BigQuery SQL Injection in Go With saferbq
- 16:31 : DarkSpectre Browser Extension Campaigns Exposed After Impacting 8.8 Million Users Worldwide
- 15:32 : CVE-2025-14847: All You Need to Know About MongoBleed
- 15:32 : DarkSpectre Hackers Infected 8.8 Million Chrome, Edge, and Firefox Users with Malware
- 15:32 : New Cybercrime Tool ErrTraffic Let Attackers Automate ClickFix Attacks
- 15:32 : Best of 2025: News alert: SquareX research finds browser AI agents are proving riskier than human employees
- 15:32 : Holiday Scams Surge: How to Protect Yourself This Season
- 15:32 : Trust Wallet Reports 2596 Wallets Drained
- 15:32 : Sax Accounting Data Breach Affects 220,000
- 15:31 : US Cybersecurity Experts Plead Guilty
- 15:31 : French Software Firm Fined For Breach
- 15:31 : Coupang Recovers Laptop From River
- 15:2 : Singapore CSA warns of maximun severity SmarterMail RCE flaw
- 14:32 : DevSecOps as a Strategic Imperative for Modern DevOps
- 14:32 : Threat Actors Manipulating LLMs for Automated Vulnerability Exploitation
- 14:31 : Critical IBM API Connect Vulnerability Let Attackers Bypass Logins
- 14:31 : Best of 2025: NOT-So-Great Firewall: China Blocks the Web for 74 Min.