210 posts were published in the last hour
- 21:55 : IT Security News Daily Summary 2026-03-31
- 21:34 : Iran Threatens to Start Attacking Major US Tech Firms on April 1
- 21:34 : Don’t open that WhatsApp message, Microsoft warns
- 21:9 : Weaponizing the Protectors: TeamPCP’s Multi-Stage Supply Chain Attack on Security Infrastructure
- 21:9 : Synthetic data is all you need for Reinforcement Learning
- 21:9 : Flipping the Script: The Premiere of ‘The Women in Security’ Documentary at RSAC
- 21:9 : Axios Compromise on npm Introduces Hidden Malicious Package
- 21:9 : New compliance guide available: ISO/IEC 27001:2022 on AWS
- 20:32 : Reliability Is Security: Why SRE Teams Are Becoming the Frontline of Cloud Defense
- 20:32 : RSAC 2026 News: RSA Security and Microsoft Advance Identity Security for AI Era
- 20:32 : Check Point Research Reveals ChatGPT Data Exfiltration Flaw
- 20:32 : Cloud Security Alliance Wins 2026 SC Award for AI Security Certification
- 20:32 : BSidesSLC 2025 – Atomic Honeypot – A MySQL Honeypot That Fights Back
- 20:32 : Bridging the Gap: CSA’s AI Security Initiatives at RSAC
- 20:10 : Asking AI for personal advice is a bad idea, Stanford study shows
- 20:10 : Supply chain attack on Axios npm package: Scope, impact, and remediations
- 20:9 : Cybersecurity risks shape AI adoption, but investment accelerates nonetheless
- 19:34 : Crypto industry may be running out of time to prepare for quantum attacks
- 19:34 : Android Developer Verification Rollout Begins Ahead of September Enforcement
- 19:13 : Iran targets M365 accounts with password-spraying attacks
- 19:13 : North Korean hackers blamed for hijacking popular Axios open source project to spread malware
- 19:13 : Attackers hijack Axios npm account to spread RAT malware
- 19:5 : IT Security News Hourly Summary 2026-03-31 21h : 8 posts
- 18:34 : Wordfence Bug Bounty Program Monthly Report – February 2026
- 18:34 : Google Drive Expands AI Ransomware Detection, File Recovery to More Users
- 18:33 : DeepLoad Malware Found Stealing Browser Data Using ClickFix
- 18:12 : The US Military’s GPS Software Is an $8 Billion Mess
- 18:11 : North Korean hackers blamed for hijacking popular Axios open-source project to spread malware
- 18:11 : Axios Hijacked: npm Account Takeover Deploys Cross-Platform RAT to Millions
- 18:11 : 2026 SANS Identity Threats Report: Why Attacks Still Work
- 18:11 : Delve Faces Allegations of Fake Compliance Reports and Security Gaps Amid Customer Backlash
- 17:34 : VRP 2025 Year in Review
- 17:34 : WhatsApp malware campaign delivers VBScript and MSI backdoors
- 17:34 : Applying security fundamentals to AI: Practical advice for CISOs
- 17:34 : The threat to critical infrastructure has changed. Has your readiness?
- 17:5 : Pondurance MDR Essentials uses autonomous SOC to tackle AI-driven attacks
- 17:4 : TrueConf Zero-Day Exploited in Attacks on Southeast Asian Government Networks
- 16:32 : PX4 Autopilot
- 16:32 : Anritsu Remote Spectrum Monitor
- 16:32 : Amazon sends AI agents into pen testing and DevOps
- 16:32 : AWS Security Agent on-demand penetration testing now generally available
- 16:32 : Iran actors’ claims raise questions about larger cyber threat to US, allies
- 16:5 : Hacker hijacks Axios open-source project, used by millions, to push malware
- 16:5 : The Next Cybersecurity Crisis Isn’t Breaches—It’s Data You Can’t Trust
- 16:5 : Censys Raises $70 Million for Internet Intelligence Platform
- 16:5 : IT Security News Hourly Summary 2026-03-31 18h : 14 posts
- 16:5 : Beyond the Spectacle – RSAC 2026 and The 5 Layers of AI Security – FireTail Blog
- 16:4 : Latest Xloader Obfuscation Methods and Network Protocol
- 15:36 : Hackers Weaponize Legitimate Windows Tools to Disable Antivirus Before Ransomware Attacks
- 15:36 : Stolen Logins Are Fueling Everything From Ransomware to Nation-State Cyberattacks
- 15:36 : WhatsApp malware campaign delivers VBS payloads and MSI backdoors
- 15:36 : DoControl provides security coverage for Google Gemini Gems
- 15:36 : Codenotary AgentMon monitors agentic AI activity and behavior
- 15:7 : Axios supply chain attack chops away at npm trust
- 15:7 : Health data giant CareCloud says hackers accessed patients’ medical records
- 15:7 : Nearly half a Million mobile customers of Lloyds Banking Group affected by security incident
- 15:7 : Venom Stealer Raises Stakes With Continuous Credential Harvesting
- 15:7 : Between AI Urgency and AI Fatigue at RSAC 2026
- 15:7 : BSidesSLC 2025 – Considering Cloud Coverage In SIEM/XDR Design
- 15:7 : Google Maps’ Biggest Overhaul in a Decade: 8 Key Navigation Upgrades
- 15:7 : EvilTokens ramps up device code phishing targeting Microsoft 365 users
- 14:34 : Foxit flags hidden security risks in PDFs with new tool
- 14:34 : Cyber Briefing: 2026.03.31
- 14:12 : Akamai Enterprise Application Access Achieves FedRAMP Moderate Authorization
- 14:12 : Hackers Poison Axios npm Package with 100 Million Weekly Downloads
- 14:12 : CareCloud Incident Exposes Patient Data, Disrupts EHR Systems
- 14:12 : The Broken System That Keeps Shipping Crews Stranded in the Strait of Hormuz
- 14:11 : CrewAI Vulnerabilities Expose Devices to Hacking
- 14:11 : TeamPCP Moves From OSS to AWS Environments
- 14:11 : Is Your Repository Ready for What’s Next?
- 14:11 : New Bitdefender assessment helps organizations identify and eliminate hidden internal attack paths
- 14:11 : Hacker stripped more than $50 million from Uranium crypto exchange, spent it on trading cards
- 14:11 : Vertex AI Vulnerability Exposes Google Cloud Data and Private Artifacts
- 13:34 : Five Browser and AI Security Questions Keeping CxOs up at Night
- 13:34 : EvilTokens Emerges as New Phishing-as-a-Service Platform for Microsoft Account Takeover
- 13:34 : WordPress Plugin Vulnerability Exposes Sensitive Data From 800,000+ Sites
- 13:34 : Anthropic’s Claude Code Source Code Reportedly Leaked Via Their npm Registry
- 13:34 : Hackers Deploy Telegram-Based ResokerRAT With Screenshot and Persistence Features
- 13:34 : Google Unveils Ransomware Detection and File Restoration for Google Drive
- 13:34 : Download: 2026 SANS Identity Threats & Defenses Survey
- 13:34 : ChatGPT Security Issue Enabled Data Theft via Single Prompt
- 13:15 : TrendAI™ Research at RSAC 2026: Advancing Defense Across AI‑Driven and Cyber‑Physical Threats
- 13:15 : Axios NPM Packages Breached in Ongoing Supply Chain Attack
- 13:14 : Windows Tools Abused to Kill AV Ahead of Ransomware Attacks
- 13:14 : When Trusted Software Updates Become the Attack Vector: Inside Operation TrueChaos and a New Zero Day Vulnerability in a Popular Collaboration Tool
- 13:14 : Uncovering ROI of a Hybrid Mesh Architecture – 2026 IDC Business Value Study
- 13:14 : Iran-nexus Password Spray Campaign Targeting Cloud Environments, with a Focus on the Middle East
- 13:14 : Proton Launches Encrypted Video Conferencing and Unified Workspace to Take On Google and Microsoft
- 13:14 : Chinese Tech Leaders See 66 Billion Erased as AI Pressures Intensify
- 13:14 : Apple counters ClickFix attacks with macOS Terminal warning
- 13:14 : Windows 11 gets a rebuilt console engine with regex search, Sixel images and a 10x speed boost
- 13:14 : The AI Arms Race – Why Unified Exposure Management Is Becoming a Boardroom Priority
- 13:14 : Silver Fox Expands Asia Cyber Campaign with AtlasCross RAT and Fake Domains
- 13:14 : TeamPCP Explores Ways to Exploit Stolen Supply Chain Secrets
- 13:14 : Lloyds Data Breach Hits 500K Customers
- 13:14 : Researcher Decompiled White House New App
- 13:14 : US Charges Hacker In $53M Uranium Exploit
- 13:13 : Genesis Market: Check If You Were Targeted
- 13:5 : IT Security News Hourly Summary 2026-03-31 15h : 13 posts
- 12:32 : Passkeys vs Bots: Do They Really Solve the Human Verification Problem?
- 12:32 : Teampcp Pushes Malicious Telnyx On PyPI
- 12:32 : TA446 Deploys DarkSword iOS Exploit
- 12:32 : CISA Adds CVE to KEV After F5 Exploit
- 12:32 : Dutch Police Reveal Phishing Security Breach
- 12:32 : Stats SA Hit By Ransomware Data Leak
- 12:31 : ‘Missed opportunity’: US government’s absence from RSAC Conference leaves stark void
- 12:7 : Critical F5 BIG-IP Flaw Upgraded to 9.8 RCE, Exploited in the Wild
- 12:7 : Dutch Ministry of Finance takes treasury systems offline amid cyber incident investigation
- 12:7 : Exploitation of Critical Fortinet FortiClient EMS Flaw Begins
- 12:7 : Google Slashes Quantum Resource Requirements for Breaking Cryptocurrency Encryption
- 12:7 : TCP vs UDP: Difference, Examples, Future
- 12:7 : Axios npm packages backdoored in supply chain attack
- 11:34 : Inventors of Quantum Cryptography Win Turing Award
- 11:34 : Android developers just got a new verification layer
- 11:34 : Employee Data Breaches Surge to Seven-Year High
- 11:3 : Meet Sekoia Reveal: Turn fragmented asset data into unified SOC context
- 11:2 : Dutch Finance Ministry Responds to Cyberattack by Taking Systems Offline
- 11:2 : MIWIC26: Gizem Acar Tekin, CEO and Co-founder of Photarix
- 10:36 : PNG Vulnerabilities Allow Attackers to Trigger Crashes and Leak Sensitive Data
- 10:36 : Telegram-Based ResokerRAT Adds Screenshot Capture and Persistence
- 10:36 : Cybercriminals Abuse IRS and Tax Filing Lures to Push Malware in New Campaigns
- 10:36 : CISA Warns of Citrix NetScaler Vulnerability Actively Exploited in Attacks
- 10:36 : Apple New macOS Tahoe Feature Warns Users on ClickFix Attacks
- 10:36 : Supply chain blast: Top npm package backdoored to drop dirty RAT on dev machines
- 10:36 : Lloyds Data Security Incident Impacts 450,000 Individuals
- 10:36 : StrongSwan Flaw Allows Unauthenticated Attackers to Crash VPNs
- 10:36 : Change Intelligence and Deployment Connectors for Liquibase Secure
- 10:36 : Intel puts its data center performance knowledge on GitHub
- 10:14 : Ransomware in 2025: Blending in is the strategy
- 10:14 : Double Agents: Exposing Security Blind Spots in GCP Vertex AI
- 10:13 : Mistral Raises $830m In Debt To Buy Nvidia Chips
- 10:13 : U.S. CISA adds a flaw in Citrix NetScaler to its Known Exploited Vulnerabilities catalog
- 10:13 : Rspamd 4.0.0 ships memory savings, a new scan protocol, and a required migration step
- 10:5 : IT Security News Hourly Summary 2026-03-31 12h : 11 posts
- 9:36 : Meta Tests Paid Instagram Subscriptions
- 9:36 : Regulator Says Humans Remain Responsible For AI Audit Errors
- 9:36 : EvilTokens Launches New Phishing Service Targeting Microsoft Accounts
- 9:36 : Phishing SMS: How to Recognize Fraudulent Messages and Protect Yourself Effectively
- 9:36 : Let’s Stop Sovereignty Washing
- 9:36 : NCSC Urges Immediate Patching of F5 BIG-IP Bug
- 9:5 : Google Introduces Advanced Ransomware Defense and Recovery Features in Drive
- 9:5 : Cuties AI – 144,250 breached accounts
- 9:5 : California Gets Serious About Regulation (Again)
- 9:5 : The Quantum Clock is Ticking and Your Encryption is Running Out of Time
- 9:5 : Google Drive now detects ransomware and helps restore affected files
- 8:36 : DeepSeek AI Service Experiences Prolonged Outage
- 8:36 : Apple Adds ClickFix Attack Warnings in New macOS Tahoe Security Feature
- 8:35 : Hackers Deploy RoadK1ll Pivoting Malware to Turn Compromised Hosts Into Network Relays
- 8:35 : New DeepLoad Malware Uses ClickFix and AI-Generated Evasion to Breach Enterprise Networks
- 8:5 : Austria Plans Social Media ban For Under-14s
- 8:5 : Qilin Ransomware allegedly breached chemical manufacturer giant Dow Inc
- 8:5 : Poisoned Axios: npm Account Takeover, 50 Million Downloads, and a RAT That Vanishes After Install
- 7:36 : Application Control Bypass for Data Exfiltration, (Tue, Mar 31st)
- 7:36 : Google Maps Displays Non-Existent Clean Air Zone In Manchester
- 7:36 : Tax Filing Scams Used to Deliver Malware in New Cybercrime Campaigns
- 7:36 : GhostSocks Turns Victim Systems Into Residential Proxies for Evasive Cyberattacks
- 7:36 : macOS Terminal ClickFix attacks, Russian court sentences ‘Flint’, CareCloud probes data breach
- 7:9 : European Commission Confirms Data Breach
- 7:9 : DeepLoad Malware Uses ClickFix and AI Evasion to Hit Enterprise Networks
- 7:9 : CareCloud Data Breach Exposes Patient Data After Hackers Access IT Systems
- 7:9 : Critical Vulnerability in OpenAI Codex Allowed GitHub Token Compromise
- 7:9 : What Makes Browser Hijacking a Silent Threat?
- 7:9 : Axios Supply Chain Attack Pushes Cross-Platform RAT via Compromised npm Account
- 7:5 : IT Security News Hourly Summary 2026-03-31 09h : 5 posts
- 6:32 : ChatGPT Vulnerability Enabled Silent Leakage of Prompts and Sensitive Information
- 6:32 : Apple Adds Terminal Paste Warning in macOS Tahoe 26.4 to Block ClickFix Attacks
- 6:11 : Claude AI Uncovers Zero-Day RCE Vulnerabilities in Vim and Emacs
- 6:11 : RoadK1ll Malware Turns Hacked Devices Into Network Relays
- 6:11 : Why I’m done calling humans the weakest link
- 5:34 : GhostSocks Hijacks Devices as Proxy Network for Stealthy Cyberattacks
- 5:34 : Beyond Alert Fatigue: What European SOCs Actually Struggle With
- 5:34 : The art of making technical risk make sense to executives
- 5:11 : Notepad++ v8.9.3 Released With Fixes for cURL Security Flaw and Crash Bugs
- 5:11 : Notepad++ v8.9.3 Released Addressing cURL Security Vulnerability and Crash Issues
- 5:11 : Hottest cybersecurity open-source tools of the month: March 2026
- 4:9 : Claude AI Discovers Zero-Day RCE Vulnerabilities in Vim and Emacs
- 4:9 : Axios NPM Packages Compromised to Inject Malicious Codes in an Active Supply Chain Attack
- 4:9 : Cybersecurity jobs available right now: March 31, 2026
- 4:5 : IT Security News Hourly Summary 2026-03-31 06h : 1 posts
- 3:32 : Security at Scale: How Open VSX Is Raising the Bar
- 2:32 : Lloyds IT Glitch Exposed Data of Nearly 500,000 Banking Customers
- 2:31 : Cybercriminals Exploit Tax Season With New Phishing Tactics
- 2:7 : ISC Stormcast For Tuesday, March 31st, 2026 https://isc.sans.edu/podcastdetail/9872, (Tue, Mar 31st)
- 1:7 : AI Agents Are Democratizing Finance but Also Redefining Risk
- 1:7 : How AI caught a malicious North Korean insider at Exabeam
- 1:7 : PQ-Compliant Secure Multi-Party Computation for Model Contexts
- 1:5 : IT Security News Hourly Summary 2026-03-31 03h : 2 posts
- 0:9 : Kernel Observability for Data Movement
- 0:9 : Insider Threats Rise with North Korean AI Hiring Fraud Schemes
- 23:36 : Popular AI gateway startup LiteLLM ditches controversial startup Delve
- 23:36 : How can you be certain your AI is compliant?
- 23:36 : Why should you be excited about Agentic AI in cybersecurity?
- 22:36 : Department of Know: Gemini scours dark web, NSA worries about cybersecurity, APIs run loose
- 22:7 : Hybrid Vishing Campaigns Abuse Online Services to Evade Anti-Spam Filters
- 22:5 : IT Security News Hourly Summary 2026-03-31 00h : 2 posts
- 21:55 : IT Security News Daily Summary 2026-03-30
- 21:31 : Announcing Red Hat Advanced Cluster Security for Kubernetes 4.10
- 21:2 : OpenAI Codex Vulnerability Allowed Attackers to Steal GitHub Tokens
- 20:32 : BSidesSLC 2025 – Risk Management Explained Through Star Wars
- 20:32 : While TSA Made Headlines, CISA Went Dark
- 20:14 : CISA Adds One Known Exploited Vulnerability to Catalog
- 20:14 : 12 Best AWS Monitoring Tools in 2026
- 20:13 : OpenAI patches ChatGPT flaw that smuggled data over DNS
- 19:34 : OpenAI Patches ChatGPT Data Exfiltration Flaw and Codex GitHub Token Vulnerability
- 19:7 : China-Linked groups target Southeast Asian government with advanced malware in 2025
- 19:7 : Europol Takes Down Large Dark Web Scam Network
- 19:5 : IT Security News Hourly Summary 2026-03-30 21h : 6 posts
- 18:34 : Breach Readiness in the Age of Mythos: When Your AI Thinks, Learns, and Defends
- 18:12 : Wave Browser Brings Gaming Tools and Ocean Cleanup into the Same Tab
- 18:11 : RSAC 2026: Fraud Becomes a CISO-Level Security Threat