Artificial intelligence tools are expanding faster than any digital product seen before, reaching hundreds of millions of users in a short period. Leading technology companies are investing heavily in making these systems sound approachable and emotionally responsive. The goal is…
Microsoft hiring energy strategists to power its Asian datacenters
PLUS: ASUS gets into healthcare gadgets; Vietnam’s first fab; Australia’s child social ban takes out 4.7 million accounts; And more! Asia In Brief Microsoft is hiring senior managers to ensure its datacenters in Asia can access the energy they need.……
Mandiant releases quick credential cracker, to hasten the death of a bad protocol
PLUS: Navy spy sent to brig for 200 months in brig; Black Axe busted again; Bill aims to crimp ICE apps; and more Infosec In Brief PLUS: Google’s security outfit Mandiant last week released tools that can crack credentials in…
Hacktivists hijacked Iran ’s state TV to air anti-regime messages and an appeal to protest from Reza Pahlavi
Activists hacked Iran ’s Badr satellite, briefly broadcasting Reza Pahlavi’s anti-regime protest messages on state TV channels. Anti-regime activists briefly took control of Iran ’s Badr satellite, hijacking state TV to broadcast Crown Prince Reza Pahlavi’s calls for protests against…
IT Security News Hourly Summary 2026-01-19 00h : 2 posts
2 posts were published in the last hour 22:58 : IT Security News Weekly Summary 03 22:55 : IT Security News Daily Summary 2026-01-18
IT Security News Weekly Summary 03
210 posts were published in the last hour 22:55 : IT Security News Daily Summary 2026-01-18 20:7 : Who’s Stalking Whom? ICE Uses Social Media and Phone Surveillance System to Track Protesters 20:5 : IT Security News Hourly Summary 2026-01-18…
IT Security News Daily Summary 2026-01-18
20 posts were published in the last hour 20:7 : Who’s Stalking Whom? ICE Uses Social Media and Phone Surveillance System to Track Protesters 20:5 : IT Security News Hourly Summary 2026-01-18 21h : 1 posts 19:36 : GootLoader uses…
Who’s Stalking Whom? ICE Uses Social Media and Phone Surveillance System to Track Protesters
ICE protests surveillance yet uses tech to track citizens’ devices, possibly violating privacy laws and the Fourth Amendment, revealed through ICE’s data tools. The post Who’s Stalking Whom? ICE Uses Social Media and Phone Surveillance System to Track Protesters appeared…
IT Security News Hourly Summary 2026-01-18 21h : 1 posts
1 posts were published in the last hour 19:36 : GootLoader uses malformed ZIP files to bypass security controls
GootLoader uses malformed ZIP files to bypass security controls
GootLoader malware uses malformed ZIP files made of hundreds of concatenated archives to evade detection. GootLoader is used by ransomware actors for initial access, then handed off to others. Built to evade detection, it accounted for 11% of bypassing malware…
Pass’Sport – 6,366,133 breached accounts
In December 2025, data from France’s Pass’Sport program was posted to a popular hacking forum. Initially misattributed to CAF (the French family allowance fund), the data contained 6.5M unique email addresses affecting 3.5M households. The data also included names, phone…
SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 80
Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape Malware Newsletter Gogs 0-Day Exploited in the Wild SHADOW#REACTOR – Text-Only Staging, .NET Reactor, and In-Memory Remcos RAT Deployment “Untrustworthy Fund”:…
Security Affairs newsletter Round 559 by Pierluigi Paganini – INTERNATIONAL EDITION
A new round of the weekly Security Affairs newsletter has arrived! Every week, the best security articles from Security Affairs are free in your email box. Enjoy a new round of the weekly SecurityAffairs newsletter, including the international press. Ukraine–Germany…
IT Security News Hourly Summary 2026-01-18 15h : 2 posts
2 posts were published in the last hour 13:34 : Black Basta Under Pressure After Ukraine Germany Enforcement Operation 13:34 : Malicious Chrome Extensions Target Enterprise HR and ERP Platforms to Steal Credentials
Black Basta Under Pressure After Ukraine Germany Enforcement Operation
Investigators say the Black Basta ransomware campaign left a trail of disruption that extended across Europe and beyond, impacting everything from hospital wards to industrial production lines that were abruptly halted, resulting in a temporary ban of internet and…
Malicious Chrome Extensions Target Enterprise HR and ERP Platforms to Steal Credentials
One after another, suspicious Chrome add-ons began appearing under false pretenses – each masquerading as helpful utilities. These were pulled from public view only after Socket, a cybersecurity group, traced them back to a single pattern of abuse. Instead…
IT Security News Hourly Summary 2026-01-18 12h : 2 posts
2 posts were published in the last hour 11:2 : Microsoft January 2026 Security Update Causes Credential Prompt Failures in Remote Desktop Connections 10:32 : Will 2026 See a ‘ChatGPT Moment’ for Microchip Implants?
Microsoft January 2026 Security Update Causes Credential Prompt Failures in Remote Desktop Connections
Microsoft has released an out-of-band emergency update to resolve a critical issue affecting Remote Desktop connections on Windows client devices. The problem emerged immediately following the installation of the January 2026 security update, identified as KB5074109. Administrators and users reported…
Will 2026 See a ‘ChatGPT Moment’ for Microchip Implants?
As Hollywood imagines our future, are brain and human microchip implants nearing a “ChatGPT moment” in 2026? Medical progress collides with privacy fears and state bans. The post Will 2026 See a ‘ChatGPT Moment’ for Microchip Implants? appeared first on…
Week in review: PoC for FortiSIEM flaw released, Rakuten Viber CISO/CTO on messaging risks
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: What security teams can learn from torrent metadata Security teams often spend time sorting through logs and alerts that point to activity happening outside corporate…
IT Security News Hourly Summary 2026-01-18 09h : 2 posts
2 posts were published in the last hour 8:4 : “How many states are there in the United States?”, (Sun, Jan 18th) 7:31 : ISO 9001:
“How many states are there in the United States?”, (Sun, Jan 18th)
I've seen many API requests for different LLMs in the honeypot logs. This article has been indexed from SANS Internet Storm Center, InfoCON: green Read the original article: “How many states are there in the United States?”, (Sun, Jan 18th)
ISO 9001:
What is ISO 9001? ISO 9001 is recognized globally as the standard for Quality Management Systems (QMS). Its full name is ISO 9001:2015, indicating the most recent revision published in 2015 by the International Organization for Standardization (ISO). This framework…
IT Security News Hourly Summary 2026-01-18 06h : 1 posts
1 posts were published in the last hour 4:31 : Mandiant Releases Rainbow Tables Enabling NTLMv1 Admin Password Hacking