Ransomware continues to be the most financially damaging type of cyberattack affecting organizations around the world. One of the most effective tools for monitoring in Windows is the minifilter driver. By sitting directly in the file system I/O pipeline, a…
New Telegram Phishing Attack Abuses Authentication Workflows to Obtain Full Authorized User Sessions
A sophisticated Telegram phishing campaign has re-emerged, marking a significant evolution in how threat actors compromise user accounts. Unlike traditional credential harvesting, this operation does not rely on cloning login pages to steal passwords but instead manipulates the platform’s legitimate…
IT Security News Hourly Summary 2026-02-09 09h : 3 posts
3 posts were published in the last hour 7:36 : Black Basta Ransomware Integrates BYOVD Technique to Evade Defenses 7:7 : Cybersquatting Attacks Exploit Trusted Brands to Steal Customer Data and Spread Malware 7:7 : United Airlines CISO on building…
Black Basta Ransomware Integrates BYOVD Technique to Evade Defenses
A recent campaign by the Black Basta ransomware group has revealed a significant shift in attack tactics. This is a departure from standard operations, where attackers typically deploy a separate tool to turn off security software before running the actual…
Cybersquatting Attacks Exploit Trusted Brands to Steal Customer Data and Spread Malware
The nightmare scenario for any modern business is simple but devastating: scammers clone your website, steal your domain identity, and rob your customers. By the time the complaints roll in, the money is gone, and your reputation is left in…
United Airlines CISO on building resilience when disruption is inevitable
Aviation runs on complex digital systems built for stability, safety, and long lifecycles. That reality creates a unique cybersecurity challenge for airlines, where disruption can quickly become an operational and public trust crisis. In this Help Net Security interview, Deneen…
Beware of Apple Pay Phishing Attack that Aims to Steal Your Payment Details
A sophisticated phishing campaign is currently targeting Apple Pay users, utilizing deceptive emails and phone calls to steal sensitive financial information. The attack typically begins with an email that appears boringly familiar, featuring the official Apple logo and a clean,…
Hackers Attacking IT & OSINT Professionals with New PyStoreRAT to Gain Remote Access
A sophisticated new supply chain attack is targeting Information Technology administrators and Open Source Intelligence (OSINT) professionals. This campaign leverages the reputation of the trusted development platform GitHub to distribute a stealthy backdoor. Unlike typical opportunistic attacks, this operation employs…
Allama: Open-source AI security automation
Allama is an open-source security automation platform that lets teams build visual workflows for threat detection and response. It includes integrations with 80+ types of tools and services typical in security operations, including SIEM systems, endpoint detection and response products,…
BeyondTrust Remote Access Products Hit by 0-Day RCE Vulnerability
BeyondTrust has issued an urgent security advisory regarding a critical zero-day vulnerability affecting its popular remote access solutions. The flaw, tracked as CVE-2026-1731, carries a near-maximum severity score of 9.9 out of 10 on the CVSSv4 scale. It poses a significant risk to…
New Telegram Phishing Scam Hijacks Login Flow to Steal Fully Authorized User Sessions
A new and sophisticated Telegram phishing operation is active in the wild, targeting users globally by hijacking the platform’s legitimate authentication features. Unlike traditional phishing, which often relies on malware or cloning login pages to steal passwords, this campaign integrates…
Over 5 Million Misconfigured Git Web Servers Found Exposing Secrets Online
A massive widespread vulnerability in web server configurations has left millions of websites open to data theft and unauthorised takeover. A new 2026 study conducted by the Mysterium VPN research team reveals that nearly 5 million web servers worldwide are…
AI agents behave like users, but don’t follow the same rules
Security and governance approaches to autonomous AI agents rely on static credentials, inconsistent controls, and limited visibility. Securing these agents requires the same rigor and traceability applied to human users, according to Cloud Security Alliance’s Securing Autonomous AI Agents report.…
Wireless Network Security: A Beginner’s Guide
A practical introduction to wireless threats, defenses, and secure deployment for self-guided IT professionals. This article has been indexed from CyberMaterial Read the original article: Wireless Network Security: A Beginner’s Guide
Emerging AI Threats and Innovations in Cybersecurity
In today’s episode of Cybersecurity Today, host David Shipley discusses the latest developments and challenges in cybersecurity, including integrating AI into various systems, the rise of AI-driven security flaws, and the violent turn of cryptocurrency crime. The episode highlights a…
New “Crypto Scanner” Tool Helps Developers Identify Quantum Risks Before Q-Day
With the “Q-Day” horizon the point when quantum computers will be capable of breaking standard encryption projected for roughly 2033, the race to secure digital infrastructure is accelerating. To aid in this transition, Quantum Shield Labs has released Crypto Scanner, a…
OpenClaw Taps VirusTotal to Safeguard AI Agent Skill Ecosystem
As AI agents move from experimental chatbots to powerful tools capable of managing our finances and smart homes, security has become the top priority. Today, OpenClaw announced a major partnership with VirusTotal to bring advanced threat detection to ClawHub, its…
State-Backed Hackers Target Military Officials, Journalists via Signal
A suspected state-sponsored hacking group is actively targeting high-profile individuals across Europe. The Federal Office for the Protection of the Constitution (BfV) and the Federal Office for Information Security (BSI) have identified a coordinated espionage campaign aimed at military officials,…
Hackers Actively Exploiting SolarWinds Web Help Desk RCE Vulnerability to Deploy Custom Tools
Active exploitation of a remote code execution (RCE) vulnerability in SolarWinds Web Help Desk (WHD) is accelerating, with attackers rapidly weaponizing compromised instances to deploy legitimate but heavily abused administrative tooling. According to observations from Huntress, 84 endpoints across 78…
Hackers Leveraging Free Firebase Developer Accounts to Send Phishing Emails
The landscape of digital threats is constantly shifting, with cybercriminals increasingly adopting “living off the cloud” strategies to bypass security perimeters. By exploiting the infrastructure of trusted service providers, attackers can effectively cloak their malicious activities, making detection significantly more…
IT Security News Hourly Summary 2026-02-09 06h : 1 posts
1 posts were published in the last hour 4:36 : Indian police commissioner wants ID cards for AI agents
Indian police commissioner wants ID cards for AI agents
PLUS: China broadens cryptocurrency crackdown; Australian facial recognition privacy revisited; Singapore debuts electric VTOL; and more! Asia In Brief The Commissioner of Police in the Indian city of Hyderabad, population 11 million, has called for AI agents to be issued…
IT Security News Hourly Summary 2026-02-09 03h : 1 posts
1 posts were published in the last hour 1:35 : Flickr moves to contain data exposure, warns users of phishing
Flickr moves to contain data exposure, warns users of phishing
Flickr says a flaw at a third-party email provider may have exposed users’ names, email addresses, IPs, and account activity. Flickr is a photo-sharing platform owned by SmugMug. It has over 100 million registered users and millions of active photographers.…