210 posts were published in the last hour
- 22:55 : IT Security News Daily Summary 2026-01-18
- 20:7 : Who’s Stalking Whom? ICE Uses Social Media and Phone Surveillance System to Track Protesters
- 20:5 : IT Security News Hourly Summary 2026-01-18 21h : 1 posts
- 19:36 : GootLoader uses malformed ZIP files to bypass security controls
- 18:34 : Pass’Sport – 6,366,133 breached accounts
- 17:34 : SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 80
- 14:36 : Security Affairs newsletter Round 559 by Pierluigi Paganini – INTERNATIONAL EDITION
- 14:5 : IT Security News Hourly Summary 2026-01-18 15h : 2 posts
- 13:34 : Black Basta Under Pressure After Ukraine Germany Enforcement Operation
- 13:34 : Malicious Chrome Extensions Target Enterprise HR and ERP Platforms to Steal Credentials
- 11:5 : IT Security News Hourly Summary 2026-01-18 12h : 2 posts
- 11:2 : Microsoft January 2026 Security Update Causes Credential Prompt Failures in Remote Desktop Connections
- 10:32 : Will 2026 See a ‘ChatGPT Moment’ for Microchip Implants?
- 9:4 : Week in review: PoC for FortiSIEM flaw released, Rakuten Viber CISO/CTO on messaging risks
- 8:5 : IT Security News Hourly Summary 2026-01-18 09h : 2 posts
- 8:4 : “How many states are there in the United States?”, (Sun, Jan 18th)
- 7:31 : ISO 9001:
- 5:5 : IT Security News Hourly Summary 2026-01-18 06h : 1 posts
- 4:31 : Mandiant Releases Rainbow Tables Enabling NTLMv1 Admin Password Hacking
- 23:5 : IT Security News Hourly Summary 2026-01-18 00h : 1 posts
- 22:55 : IT Security News Daily Summary 2026-01-17
- 20:5 : IT Security News Hourly Summary 2026-01-17 21h : 1 posts
- 19:31 : Ukraine–Germany operation targets Black Basta, Russian leader wanted
- 18:31 : NDSS 2025 – ScopeVerif: Analyzing The Security Of Android’s Scoped Storage Via Differential Analysis
- 17:31 : Cybersecurity Falls Behind as Threat Scale Outpaces Capabilities
- 17:31 : Black Basta Ransomware Leader Added to EU Most Wanted and INTERPOL Red Notice
- 17:5 : IT Security News Hourly Summary 2026-01-17 18h : 4 posts
- 17:4 : Let’s Encrypt has made 6-day IP-based TLS certificates Generally Available
- 16:31 : China-linked APT UAT-8837 targets North American critical infrastructure
- 16:9 : Your 100 Billion Parameter Behemoth is a Liability
- 16:9 : GootLoader Malware Uses Malformed ZIP Archives to Evade Detection
- 15:32 : JFrog Researchers Uncover RCE Exploit for Existing Redis Database Vulnerability
- 14:5 : IT Security News Hourly Summary 2026-01-17 15h : 1 posts
- 13:32 : Google Vertex AI Flaw Lets Low-Privilege Users Escalate to Service Agent Roles
- 12:32 : Google’s Vertex AI Vulnerability Enables Low-Privileged Users to Gain Service Agent Roles
- 12:32 : Argus – Python-powered Toolkit for Information Gathering and Reconnaissance
- 12:32 : Fast Pair, loose security: Bluetooth accessories open to silent hijack
- 12:31 : GhostPoster Malware Campaign Exposes Browser Extension Risks
- 12:31 : CIRO Discloses Phishing Breach Impacting Personal Data of 750,000 Individuals
- 12:2 : Why LinkedIn is a hunting ground for threat actors – and how to protect yourself
- 12:2 : US Hackers Reportedly Caused a Blackout in Venezuela
- 12:2 : Tennessee Man Pleads Guilty to Repeatedly Hacking Supreme Court’s Filing System
- 9:31 : Wireshark 4.6.3 Released, (Sat, Jan 17th)
- 9:4 : OpenAI to Show Ads in ChatGPT for Logged-In U.S. Adults on Free and Go Plans
- 8:5 : IT Security News Hourly Summary 2026-01-17 09h : 2 posts
- 7:31 : Researchers Gain Access to StealC Malware Command-and-Control Systems
- 7:6 : Critical XSS Vulnerabilities in Meta Conversion API Enable Zero-Click Account Takeover
- 6:31 : Identity Management Challenges in Pharma & Biotech SaaS Platforms (And How to Solve Them)
- 5:32 : Researchers Breach StealC Infrastructure, Access Malware Control Panels
- 5:31 : She Hacks Purple: An Interview With Cybersecurity Expert Tanya Janca
- 5:6 : Windows 11 January Update Sparks Widespread Shutdown Complaints
- 5:5 : IT Security News Hourly Summary 2026-01-17 06h : 1 posts
- 4:31 : Best Security Awareness Training Platforms For 2026
- 3:31 : 9 Cybersecurity Questions that Define a CISO
- 2:31 : Is advanced AI security affordable for small businesses
- 2:31 : Is your data truly secure with free AI tools
- 2:31 : How is AI improving the management of cloud secrets
- 2:31 : Can we be certain AI keeps cloud data secure
- 0:32 : Anatomy of an Attack: The Payroll Pirates and the Power of Social Engineering
- 23:5 : IT Security News Hourly Summary 2026-01-17 00h : 2 posts
- 22:55 : IT Security News Daily Summary 2026-01-16
- 22:31 : Sonatype Named DevOps Dozen Winner for Best DevSecOps Solution
- 20:31 : Vulnerability in Anthropic’s Claude Code Shows Up in Cowork
- 20:31 : Implementing data governance on AWS: Automation, tagging, and lifecycle strategy – Part 1
- 20:31 : Implementing data governance on AWS: Automation, tagging, and lifecycle strategy – Part 2
- 20:5 : IT Security News Hourly Summary 2026-01-16 21h : 8 posts
- 20:4 : Dangling DNS: The Most Overlooked Attack Surface in the AI Era
- 20:4 : IT Asset, Vulnerability, and Patch Management Best Practices
- 20:4 : Supreme Court hacker posted stolen government data on Instagram
- 20:4 : Authentication Flow Explained: Step-by-Step Login & Token Exchange Process
- 20:4 : Passwordless Authentication vs MFA: Security, UX & Implementation Compared
- 20:4 : JWT Claims Explained: Complete Guide to Standard & Custom JWT Token Claims
- 20:4 : Access Token vs Refresh Token: Key Differences & When to Use Each
- 19:31 : Unified AI-Powered Security
- 18:32 : ICE Agent Doxxing Platform was Crippled After Coordinated DDoS Attack
- 18:32 : News brief: Security flaws put thousands of systems at risk
- 18:32 : Windows 11 PCs Fail to Shut Down After January Security Update
- 18:31 : GootLoader Malware Uses 500–1,000 Concatenated ZIP Archives to Evade Detection
- 17:32 : How a hacking campaign targeted high-profile Gmail and WhatsApp users across the Middle East
- 17:32 : Cloudflare Acquired Open-source Web Framework Astro to Supercharge Development
- 17:32 : Security Researchers Warn of ‘Reprompt’ Flaw That Turns AI Assistants Into Silent Data Leaks
- 17:5 : IT Security News Hourly Summary 2026-01-16 18h : 11 posts
- 17:5 : Sorry Dave, I’m afraid I can’t do that! PCs refuse to shut down after Microsoft patch
- 17:4 : Cyber Fraud, Not Ransomware, is Now Businesses’ Top Security Concern
- 17:4 : Hollows Hunter
- 17:4 : US and allies collaborate on operational technology security guidance
- 17:4 : Critical flaw in Fortinet FortiSIEM targeted in exploitation threat
- 16:32 : In Other News: FortiSIEM Flaw Exploited, Sean Plankey Renominated, Russia’s Polish Grid Attack
- 16:7 : How 2 Missing Characters Nearly Compromised AWS
- 16:7 : Go Programming Language 1.26 Patches Several Security Flaws
- 16:6 : AWS CodeBuild Misconfiguration Could Have Enabled Full GitHub Repository Takeover
- 16:6 : Five Malicious Chrome Extensions Impersonate Workday and NetSuite to Hijack Accounts
- 16:6 : U.S. and allies collaborate on operational technology security guidance
- 15:32 : Exploits, AI Threats, and Cloud Malware Mark a Turbulent Week
- 15:31 : Data breach at Canada’s Investment Watchdog Canadian Investment Regulatory Organization impacts 750,000 people
- 15:31 : German cops add Black Basta boss to EU most-wanted list
- 15:31 : Cyber Briefing: 2026.01.16
- 15:5 : Go 1.26 Released With Fixes for Multiple Vulnerabilities Causing Memory Exhaustion
- 15:5 : UAT-8837 Launches Targeted Attacks to Steal Sensitive Organizational Data
- 15:5 : NSA Publishes New Guidelines for Implementing a Zero Trust Security Model
- 15:5 : Cisco Secure Email Gateway Zero-Day RCE Exploited in Active Attacks
- 15:4 : Google Begins Rolling Out Long-Awaited @gmail.com Email Feature to Users
- 15:4 : Google and Mozilla Patch 26 Security Flaws in Chrome 144, Firefox 147
- 15:4 : AI and the Corporate Capture of Knowledge
- 15:4 : Monnai Raises $12 Million for Identity and Risk Data Infrastructure
- 15:4 : Cisco fixes AsyncOS vulnerability exploited in zero-day attacks (CVE-2025-20393)
- 14:32 : Project Eleven Raises $20 Million for Post-Quantum Security
- 14:32 : Why Traditional Firewalls Fail Against Today’s High-Volume DDoS Attacks
- 14:32 : Anchorage Police Take Servers Offline
- 14:32 : Verizon Users Unhappy With Outage Credit
- 14:32 : FTC Bars GM From Selling Driver Location Data
- 14:32 : Jen Easterly Named CEO Of RSAC
- 14:32 : Dutch Police Arrest AVCheck Operator
- 14:5 : IT Security News Hourly Summary 2026-01-16 15h : 8 posts
- 14:5 : Fortinet Warns of Active FortiSIEM RCE Exploitation
- 14:4 : Windows Remote Assistance Flaw Bypasses Mark of the Web
- 14:4 : Inside the Rise of the Always Watching, Always Learning Enterprise Defense System
- 14:4 : From Quantum Resilience to Identity Fatigue: Three Trends Shaping Print Security in 2026
- 14:4 : GitLab Duo Agent Platform solves the AI paradox in software delivery
- 13:32 : Windows Admin Center Azure SSO Flaw Risks Tenant-Wide Compromise
- 13:31 : WhisperPair exposes Bluetooth earbuds and headphones to tracking and eavesdropping
- 13:31 : RondoDox botnet linked to large-scale exploit of critical HPE OneView bug
- 13:2 : 750,000 Impacted by Data Breach at Canadian Investment Watchdog
- 13:2 : Lumen Disrupts Aisuru–Kimwolf Botnet Powering Massive DDoS Attacks
- 13:2 : Google Rolls Out Gmail Address Change Feature
- 13:2 : Surge in Cybercrime Undermines Online Safety Efforts
- 13:2 : Cybersecurity Events 2026
- 12:32 : Bankrupt scooter startup left one private key to rule them all
- 12:31 : Cyber Insights 2026: Social Engineering
- 12:31 : Detecting forged browser fingerprints for bot detection, lessons from LinkedIn
- 12:31 : AI Breach Case Studies: Lessons for CISOs – FireTail Blog
- 12:31 : TamperedChef Malvertising Campaign Drops Malware via Fake PDF Manuals
- 12:2 : New Infostealer Campaign Targets Users via Spoofed Software Installers
- 12:2 : WhisperPair Attack Leaves Millions of Audio Accessories Open to Hijacking
- 12:2 : Account Compromise Surged 389% in 2025, Says eSentire
- 11:31 : Operation Endgame: Dutch Police Arrest Alleged AVCheck Operator
- 11:31 : China-linked APT UAT-9686 abused now patched maximum severity AsyncOS bug
- 11:31 : Cybersecurity Firms React to China’s Reported Software Ban
- 11:5 : IT Security News Hourly Summary 2026-01-16 12h : 7 posts
- 11:5 : Probably not the best security in the world: Carlsberg wristbands spill visitor pics
- 11:5 : TikTok to Roll Out Stronger Age Verification Across the EU
- 11:4 : Cisco 0-Day RCE Secure Email Gateway Vulnerability Exploited in the Wild
- 11:4 : LOTUSLITE Backdoor Targets U.S. Policy Entities Using Venezuela-Themed Spear Phishing
- 11:4 : Your Digital Footprint Can Lead Right to Your Front Door
- 10:31 : Google Rolls Out Long-Awaited @gmail.com Email Change Feature for Users
- 10:31 : Dutch police sell fake tickets to show how easily scams work
- 10:7 : Cisco Patches Vulnerability Exploited by Chinese Hackers
- 9:32 : Netherlands’ ASML Market Cap Tops $500bn
- 9:32 : India Presses Apple On Antitrust Delays
- 9:32 : Zero-Click Exploit Chain Discovered Targeting Google Pixel 9 Devices
- 9:32 : AWS Console Supply Chain Breach Enables GitHub Repository Hijacking
- 9:32 : Actively exploited critical flaw in Modular DS WordPress plugin enables admin takeover
- 9:32 : RondoDox Botnet Targets HPE OneView Vulnerability in Exploitation Wave
- 9:4 : Azure Identity Token Flaw Exposes Windows Admin Center to Tenant-Wide Breaches
- 9:4 : RSAC Stands Tall Appointing a True Leader, Jen Easterly as CEO
- 9:4 : China-Linked APT Exploits Sitecore Zero-Day in Attacks on American Critical Infrastructure
- 8:32 : Hachette, Cengage Seek To Join Google AI Case
- 8:32 : Your Android App Needs Scanning – Best Android App Vulnerability Scanner in 2026
- 8:32 : FalconStor Habanero simplifies compliant offsite backup for IBM Power users
- 8:31 : Easterly helms RSAC, Windows update problems, Police Copilot gaffe
- 8:5 : IT Security News Hourly Summary 2026-01-16 09h : 6 posts
- 8:5 : Amazon Offers ‘Sovereign’ Cloud For EU Customers
- 8:4 : New AWS Console Supply Chain Attack Lets Attackers Hijack AWS GitHub Repositories
- 8:4 : Go 1.25.6 and 1.24.12 Patch Critical Vulnerabilities Lead to DoS and Memory Exhaustion Risks
- 8:4 : Former CISA Director Jen Easterly Appointed CEO of RSAC
- 7:32 : Product showcase: Penetration test reporting with PentestPad
- 7:32 : Ransomware activity never dies, it multiplies
- 7:2 : Your digital safety checklist for the start of the year
- 7:2 : News alert: AppGuard reopens insider program as AI-enhanced malware outpaces detection defenses
- 7:2 : News alert: BreachLock unveils agentic AI pen testing that mimics attacker behavior on web apps
- 7:2 : As AI raises the stakes, app modernization and security are becoming inseparable
- 6:31 : New intelligence is moving faster than enterprise controls
- 6:31 : Cisco Patches Zero-Day RCE Exploited by China-Linked APT in Secure Email Gateways
- 6:2 : Who’s on the other end? Rented accounts are stress-testing trust in gig platforms
- 5:32 : New infosec products of the week: January 16, 2026
- 5:32 : Staples Slips Up On Data Removal
- 3:31 : ISC Stormcast For Friday, January 16th, 2026 https://isc.sans.edu/podcastdetail/9770, (Fri, Jan 16th)
- 3:5 : How safe are your secrets with agentic AI handling them
- 3:5 : Do AI-driven security systems empower compliance
- 3:5 : Are AI managed NHIs reliable in identity management
- 3:5 : How does Agentic AI deliver value in SOC operations
- 0:2 : Cisco finally fixes max-severity bug under active attack for weeks
- 23:5 : IT Security News Hourly Summary 2026-01-16 00h : 3 posts
- 22:55 : IT Security News Daily Summary 2026-01-15
- 22:31 : A ransomware attack disrupted operations at South Korean conglomerate Kyowon
- 22:31 : Chinese spies used Maduro’s capture as a lure to phish US govt agencies
- 22:2 : East-West Is the New North-South: Rethink Security for the AI-Driven Data Center
- 22:2 : CISA Issues New AI Security Guidance for Critical Infrastructure
- 22:2 : Kaiser to Pay $46M in Patient Data Lawsuit. Find Out If You’re Eligible
- 22:2 : 40K WordPress Installs at Risk From Modular DS Admin Bypass
- 21:31 : Securing AI-Generated Code: Preventing Phantom APIs and Invisible Vulnerabilities
- 21:31 : Flipping one bit leaves AMD CPUs open to VM vuln
- 21:2 : New PayPal Scam Sends Verified Invoices With Fake Support Numbers
- 21:2 : Palo Alto Networks Patches PAN-OS Bug That Can Disrupt GlobalProtect
- 21:2 : AWS CodeBuild Misconfiguration Exposed GitHub Repos to Potential Supply Chain Attacks
- 21:2 : Ask Me Anything Cyber – Inside Web Security Tools & Tactics
- 20:32 : DevSecOps for MLOps: Securing the Full Machine Learning Lifecycle
- 20:31 : Promptware Kill Chain – Five-Step Kill Chain Model for Analyzing Cyberthreats
- 20:31 : Hackers Abusing Legitimate Cloud and CDN Platforms to Host Phishing Kits
- 20:31 : NDSS 2025 – “Who Is Trying To Access My Account?”
- 20:5 : IT Security News Hourly Summary 2026-01-15 21h : 7 posts
- 20:3 : Check Point Research: VoidLink Shows Cloud-Native Linux Malware Evolving
- 20:2 : Elon Musk’s Grok ‘Undressing’ Problem Isn’t Fixed
- 19:31 : 10 important incident response metrics and how to use them
- 19:31 : Contagious Claude Code bug Anthropic ignored promptly spreads to Cowork
- 19:5 : Predicting 2026
- 19:5 : Why ICE Can Kill With Impunity
- 19:5 : Iran’s internet shutdown is now one of its longest ever, as protests continue
- 18:31 : Forget Predictions: True 2026 Cybersecurity Priorities From Leaders
- 18:31 : Researchers Disrupt Major Botnet Network After It Infects Millions of Android Devices