210 posts were published in the last hour
- 22:55 : IT Security News Daily Summary 2025-02-09
- 22:10 : Stressfrei surfen: Opera Air kombiniert Browser und Achtsamkeits-Features
- 22:10 : Hacker-Challenge: Anthropic fordert Community mit Claude 3.5 heraus
- 22:10 : Googles Deepmind-Chef hält Hype um Deepseek für übertrieben: „Keine bahnbrechende Neuerung“
- 21:32 : DEF CON 32 – Exploiting Bluetooth From Your Car To The Bank Account
- 20:5 : IT Security News Hourly Summary 2025-02-09 21h : 2 posts
- 20:4 : The biggest breach of US government data is under way
- 19:32 : Chinese Hackers Exploit SSH Daemon to Maintain Persistent Access in Cyber-Espionage Operations
- 17:32 : Hackers Steal Login Details via Fake Microsoft ADFS login pages
- 17:5 : IT Security News Hourly Summary 2025-02-09 18h : 4 posts
- 16:8 : Trotz Kritik an KI-Kunst: Christie’s hält an geplanter Ausstellung fest
- 16:8 : Google Maps wird schlauer: So soll KI Gemini den Kartendienst auf ein neues Level bringen
- 16:8 : Europas Antwort auf ChatGPT und Deepseek: OpenEuroLLM stellt sich vor
- 16:7 : SECURITY AFFAIRS MALWARE NEWSLETTER – ROUND 32
- 15:32 : Cybersecurity Weekly Brief: Latest on Attacks, Vulnerabilities, & Data Breaches
- 15:32 : India Expands Aadhaar Authentication, Allowing Private Sector Access to Biometric Data
- 15:32 : Fake Wedding Invitation Malware Targets Android Users
- 15:32 : Grubhub Data Breach Exposes Customer and Driver Information
- 15:32 : Kimsuky Hackers Deploy forceCopy Malware in Spear-Phishing Attacks
- 15:16 : Security Affairs newsletter Round 510 by Pierluigi Paganini – INTERNATIONAL EDITION
- 15:15 : How to Root Out Malicious Employees
- 14:5 : IT Security News Hourly Summary 2025-02-09 15h : 1 posts
- 13:7 : Cyber Security in Customer Engagement: The Triple Defence Strategy
- 12:32 : Nach Sicherheitswarnungen: USA planen Verbot von Deepseek
- 11:32 : Sicherheitsforscher warnen USA vor Verbot von Deepseek
- 11:7 : USA planen Verbot von Deepseek – Sicherheitsforscher warnen
- 11:5 : IT Security News Hourly Summary 2025-02-09 12h : 2 posts
- 10:12 : Dein Auto, deine Farbe: Google Maps ermöglicht personalisierte Navigations-Icons
- 10:12 : Fax trifft KI: Deutsche Firma ermöglicht ChatGPT-Kommunikation für Retro-Fans
- 9:33 : Cyberangriff? OpenAI untersucht potenzielles Leck von 20 Millionen Nutzerdaten
- 9:32 : PlayStation Network Down; Outage Leaves Gamers Frustrated (Updated)
- 9:32 : Week in review: Exploited 7-Zip 0-day flaw, crypto-stealing malware found on App Store, Google Play
- 8:32 : Cybersecurity versus physische Sicherheit oder doch nicht?
- 8:5 : IT Security News Hourly Summary 2025-02-09 09h : 4 posts
- 7:32 : 10 Best UTM (Unified Threat Management) Firewalls – 2025
- 7:32 : Hackers Use Forked Stealer to Breach Russian Businesses
- 7:9 : Youthmanual – 937,912 breached accounts
- 7:9 : Hackers Compromising IIS Servers to Deploy BadIIS Malware
- 23:32 : Justifying the Investment in Cloud Compliance
- 23:32 : Getting Better at Detecting Cyber Threats
- 23:32 : Exciting Advances in Privileged Access Management
- 23:7 : PlayStation Network Down; Outage Leaves Gamers Frustrated
- 23:5 : IT Security News Hourly Summary 2025-02-09 00h : 4 posts
- 22:55 : IT Security News Daily Summary 2025-02-08
- 22:5 : Fake News: Warum der dritte Whatsapp-Haken nur ein Gerücht ist
- 22:5 : OpenAI Deep Research: 5 Stunden Arbeit in 5 Minuten
- 22:5 : PlayStation Network outage has been going on for over 24 hours
- 20:18 : Hackers Monetize LLMjacking, Selling Stolen AI Access for $30 per Month
- 20:5 : IT Security News Hourly Summary 2025-02-08 21h : 2 posts
- 19:9 : Crypto Wallet Scam: Not For Free, (Sat, Feb 8th)
- 19:9 : Kimsuky APT group used custom RDP Wrapper version and forceCopy stealer
- 17:32 : DEF CON 32 – From Easy Wins To Epic Challenges: Bounty Hunter Edition
- 17:32 : Mastercard to Eliminate 16-Digit Card Numbers by 2030 for Enhanced Security
- 17:7 : UK Is Ordering Apple to Break Its Own Encryption
- 17:7 : Dangers of AI Phishing Scam and How to Spot Them
- 17:5 : IT Security News Hourly Summary 2025-02-08 18h : 8 posts
- 16:32 : Ethical Hacker Finds Security Flaw in Subaru Starlink, Gains Remote Access to Vehicles
- 16:32 : RSA Encryption Breached by Quantum Computing Advancement
- 16:32 : Quishing On The Rise: Strategies to Avert QR Code Phishing
- 16:12 : Rply: Diese KI-App antwortet auf deine Chat-Nachrichten – so gut funktioniert das
- 16:12 : „Höchst besorgniserregend": Hacker greifen gezielt Whatsapp-Nutzer mit Spyware an
- 16:12 : Luxus-Leben auf Kosten der Investoren: KI-Startup-Gründer verprasst 60 Millionen Dollar
- 16:12 : Steve Jobs’ Albtraum wird wahr: Dieser alternative App-Store verbreitet Pornos auf iPhones
- 16:11 : UK is Ordering Apple to Break its Own Encryption
- 15:2 : Navigating the New Frontier: Strengthening Cybersecurity Through Next-Gen Identity & Access Governance
- 15:2 : Amazon Faces Lawsuit Over Alleged Secret Collection and Sale of User Location Data
- 15:2 : AI and Quantum Computing Revive Search Efforts for Missing Malaysia Airlines Flight MH370
- 14:6 : Russia’s intelligence recruits Ukrainians for terror attacks via messaging apps
- 14:5 : IT Security News Hourly Summary 2025-02-08 15h : 3 posts
- 13:32 : NAKIVO Launches v11 with Agentless Backup and Recovery for Proxmox Virtual Environments
- 13:11 : Teen Hacker “Natohub” Caught for NATO, UN, and US Army Breaches
- 13:11 : 20% of Organizations Have Experienced a Non-Human Identity Security Incident
- 12:10 : Snoopers’ Charter: Großbritannien will Zugriff auf iCloud-Backups weltweit
- 12:9 : UK Secret Order Demands That Apple Give Access to Users’ Encrypted Data
- 11:32 : UK Pressures Apple to Create Global Backdoor To Spy on Encrypted iCloud Access
- 11:5 : IT Security News Hourly Summary 2025-02-08 12h : 3 posts
- 10:14 : ChatGPT-Fail: Anwalt fliegt mit KI-generierten Fake-Zitaten vor Gericht auf
- 10:14 : Apple überrascht mit neuer Einladungs-App – wir haben sie für euch ausprobiert
- 10:14 : Junge Talente statt erfahrene Profis: Deepseeks unkonventioneller Weg zur KI-Spitze
- 8:32 : DeepSeek: The Game-Changer in AI and the Impact on Cybersecurity
- 8:9 : Quishing: Vorsicht vor QR-Codes
- 7:2 : Cybersecurity Warning: DeepSeek App Poses Potential Data Risks
- 7:2 : Malicious ML Models on Hugging Face Leverage Broken Pickle Format to Evade Detection
- 6:32 : Anzeige: KI gewinnbringend einsetzen und Risiken minimieren
- 5:5 : IT Security News Hourly Summary 2025-02-08 06h : 1 posts
- 4:9 : CISA Warns of Trimble Cityworks RCE Vulnerability Exploited to Hack IIS Servers
- 3:9 : HPE Alerts Employees of Data Breach After Russian Cyberattack on Office 365
- 2:32 : Achieving Independence with Robust IAM Systems
- 2:32 : Budget-Friendly Cybersecurity That Fits
- 2:32 : Capable Protection: Enhancing Cloud-Native Security
- 1:4 : Teen on Musk’s DOGE Team Graduated from ‘The Com’
- 23:32 : Shortlist Revealed For Most Inspiring Women in Cyber Awards 2025 After Record Breaking Number of Entries
- 23:16 : U.S. CISA adds Trimble Cityworks flaw to its Known Exploited Vulnerabilities catalog
- 23:16 : Binary Cryptology with the Internet of Things Communication
- 23:16 : Can Your Security Measures Be Turned Against You?
- 23:16 : Exciting updates to the Copilot (AI) Bounty Program: Enhancing security and incentivizing innovation
- 23:5 : IT Security News Hourly Summary 2025-02-08 00h : 9 posts
- 22:55 : IT Security News Daily Summary 2025-02-07
- 22:32 : Apple’s ELEGNT framework could make home robots feel less like machines and more like companions
- 22:32 : UK Government Reportedly Demands Access to Encrypted iCloud Files Worldwide
- 22:10 : Google Maps: Dieses neue Symbol soll Autofahrern helfen – was es bedeutet
- 22:9 : ASP.NET Vulnerability Lets Hackers Hijack Servers, Inject Malicious Code
- 22:9 : iOS 18.3.1 Release Expected Within the Next Few Weeks
- 22:9 : What is DMARC: Protecting Your Domain from Email Fraud
- 22:9 : ACLU Warns DOGE’s ‘Unchecked’ Access Could Violate Federal Law
- 22:9 : Week in Review: APTs using Gemini, ransomware payments decrease, abandoned AWS risk
- 21:32 : The best VPN for streaming in 2025: Expert tested and reviewed
- 21:4 : The UK’s Demands for Apple to Break Encryption Is an Emergency for Us All
- 20:32 : EFF to Ninth Circuit: Young People Have a First Amendment Right to Use Social Media (and All of Its Features)
- 20:32 : Ransom Payments Fell 35% in 2024 After LockBit, BlackCat Takedowns
- 20:5 : IT Security News Hourly Summary 2025-02-07 21h : 7 posts
- 20:2 : The advantages and disadvantages of AI in cybersecurity
- 20:2 : Ransomware hits healthcare, critical services in January
- 19:32 : IT Teams Worry About Increasing Cost of Cyber Tools From AI Features, While Criminals Barely Use Them
- 19:32 : AI Security is API Security: What CISOs and CIOs Need to Know
- 19:9 : Trimble Releases Security Updates to Address a Vulnerability in Cityworks Software
- 19:9 : Hospital Sisters Health System impacted 882,782 individuals
- 19:9 : Meta Trained Its Llama AI Models Using 81.7 TB of Books Stolen From Torrent Shadow Libraries
- 18:32 : Best Practices for Preparing and Automating Security Questionnaires
- 18:32 : 10 Common Mistakes in Managing Your Splunk Environment (and how to avoid them)
- 18:32 : Efficient Cybersecurity Compliance: The Smart Approach to Mitigating Risks
- 18:32 : Enhancing telecom security with AWS
- 18:7 : Take my money: OCR crypto stealers in Google Play and App Store
- 18:7 : Investors, Trump and the Illuminati: What the “Nigerian prince” scams became in 2024
- 18:7 : ThreatMate Raises $3.2 Million for Attack Surface Management Platform
- 17:32 : South Korean Prosecutors To Appeal After Samsung Boss ‘Not Guilty’ Ruling
- 17:32 : A View on Understanding Non-Human Identities Governance
- 17:32 : What is physical security and how does it work?
- 17:32 : UK Home Office silent on alleged Apple backdoor order
- 17:5 : Wordfence Intelligence Weekly WordPress Vulnerability Report (January 27, 2025 to February 2, 2025)
- 17:5 : 20 Million OpenAI accounts offered for sale
- 17:5 : Hackers Exploit US Government agency’s Cloud System for Cryptojacking
- 17:5 : IT Security News Hourly Summary 2025-02-07 18h : 22 posts
- 16:33 : Tata Technologies Report Suffering Ransomware Attack
- 16:32 : Securing GAI-Driven Semantic Communications: A Novel Defense Against Backdoor Attacks
- 16:32 : Autonomous LLMs Reshaping Pen Testing: Real-World AD Breaches and the Future of Cybersecurity
- 16:32 : Top 21 Kali Linux tools and how to use them
- 16:32 : DEF CON 32 – Custom, Cheap, Easy, And Safe Badges Without Starting From Scratch
- 16:32 : Yahoo Finance: U.S. Lawmakers Push to Ban China’s DeepSeek AI Over Security Risks – Feroot Security Analysis
- 16:18 : Le Chat ausprobiert: So schlägt sich die französische KI-App im Vergleich zu ChatGPT, Claude und Deepseek
- 16:18 : Diese KI wurde für 50 Dollar in nur 30 Minuten erstellt – und soll trotzdem mit OpenAI gleichziehen
- 16:18 : 20 Jahre Google Maps: Wie sich der Kartendienst aus dem Browser zu einer der beliebtesten Apps entwickelt hat
- 16:18 : Besserer Einblick in KI-Logik: OpenAI erweitert o3-Mini um ein neues Feature
- 16:18 : KI-Power für Tabellen: Gemini verwandelt Google Sheets-Daten jetzt in Grafiken
- 16:18 : Europol: Finanzinstitute sollten rasch auf quantensichere Kryptografie umsatteln
- 16:17 : DOGE sparks Cybersecurity concerns
- 16:17 : 7,000 Exposed Ollama APIs Leave DeepSeek AI Models Wide Open to Attack
- 16:17 : Cybercriminals Target IIS Servers to Spread BadIIS Malware
- 16:17 : Cyber Attack Severity Rating System Established in UK
- 16:17 : Hackers Attacking Web Login Pages of Popular Firewalls for Brute-Force Attacks
- 16:17 : FINALLY! FCC Gets Tough on Robocall Fraud
- 16:17 : WhatsApp Uncovers Zero-Click Spyware Attack Linked to Israeli Firm Paragon
- 16:16 : Gmail Confirms AI Hack: 2.5 Billion Users Warned of Phishing Scam
- 16:16 : DeepSeek App Transmits Sensitive User and Device Data Without Encryption
- 16:16 : Most UK GDPR Enforcement Actions Targeted Public Sector in 2024
- 15:33 : RBI’s Anti-Fraud Masterstroke: bank.in and fin.in Domains to Revolutionize Online Banking Security
- 15:33 : The best travel VPNs of 2025: Expert tested and reviewed
- 15:33 : Cyber Attack Severity Rating System Established in U.K.
- 15:33 : HPE begins notifying data breach victims after Russian government hack
- 15:32 : Screenshot-Reading Malware
- 15:32 : Researchers at University of Crete Developes Uncrackable Optical Encryption
- 15:13 : EU Bans AI Systems Deemed ‘Unacceptable Risk’
- 14:17 : Cybersicher mit sechs Cybertrends
- 14:16 : Blue Origin Mission Successfully Tests Lunar Gravity
- 14:16 : UK Orders Apple To Provide Access To Encrypted User Data – Report
- 14:16 : In Other News: Cybersecurity Salaries, NanoLock Collapse, NSO Transparency Report
- 14:16 : CISA Warns of Active Exploits Targeting Trimble Cityworks Vulnerability
- 14:16 : Malicious AI Models on Hugging Face Exploit Novel Attack Technique
- 14:5 : IT Security News Hourly Summary 2025-02-07 15h : 10 posts
- 13:32 : Hackers Leveraging Image & Video Attachments to Deliver Malware
- 13:32 : How to use Tor to privately browse the web – it’s easier than you think
- 13:32 : Information of 883,000 Stolen in Crippling Attack on Hospital Sisters Health System
- 13:12 : Microsoft Sysinternals 0-Day Vulnerability Enables DLL Injection Attacks on Windows
- 13:12 : Ghidra 11.3 Released – A Major Update to NSA’s Open-Source Tool
- 13:12 : New Scareware Attack Targeting Mobile Users to Deploy Malicious Antivirus Apps
- 13:12 : Check Point Helps Gentera Secure the Financial Future of Millions
- 13:12 : New Facebook Fake Copyright Notices Phishing Steals Your FB Credentials
- 13:12 : New Attack Technique Uncovered Abusing Kerberos Delegation in Active Directory Networks
- 13:12 : CISA Warns of Active Exploitation in Trimble Cityworks Vulnerability Leading to IIS RCE
- 12:33 : UK government demands Apple backdoor to encrypted cloud data: report
- 12:32 : Coalition of US states to file lawsuit after Musk’s DOGE gains access to Americans’ personal data
- 12:32 : UK Engineering Giant IMI Hit by Cyberattack
- 12:32 : Attackers compromise IIS servers by leveraging exposed ASP.NET machine keys
- 12:13 : [UPDATE] [mittel] Oracle Java SE: Mehrere Schwachstellen
- 12:13 : [UPDATE] [hoch] Oracle Java SE: Mehrere Schwachstellen
- 12:13 : [NEU] [mittel] libtasn1: Schwachstelle ermöglicht Denial of Service
- 12:13 : [NEU] [UNGEPATCHT] [kritisch] ProFTPD: Schwachstelle ermöglicht Codeausführung
- 12:12 : Microsoft Edge Vulnerabilities Let Attackers Execute Remote Code – Update Now!
- 12:12 : UK industry leaders unleash hurricane-grade scale for cyberattacks
- 12:11 : 430,000 Impacted by Data Breaches at New York, Pennsylvania Healthcare Organizations
- 12:11 : Microsoft Identifies 3,000+ Publicly Disclosed ASP.NET Machine Keys Vulnerable to Code Injection
- 12:11 : AI-Powered Social Engineering: Reinvented Threats
- 11:32 : 7-Zip 0-Day Flaw Added to CISA’s List of Actively Exploited Vulnerabilities
- 11:32 : Third-Party Risk Management Failures Expose UK Finance Sector
- 11:10 : Kaspersky Anti-Virus: Schwachstelle ermöglicht Denial of Service
- 11:10 : [NEU] [hoch] Moxa Switch (EDS, ICS, IKS und SDS): Schwachstelle ermöglicht Denial of Service
- 11:10 : [NEU] [mittel] Kaspersky Anti-Virus: Schwachstelle ermöglicht Denial of Service
- 11:9 : SSL 2.0 turns 30 this Sunday… Perhaps the time has come to let it die?, (Fri, Feb 7th)
- 11:9 : Logsign Vulnerability Allows Remote Attackers to Bypass Authentication
- 11:9 : Research Reveals Data Breaches On The Rise at UK Law Firms
- 11:9 : PowerSchool data breach affected 16,000 students in the UK
- 11:9 : Developers Beware! Malicious ML Models Detected on Hugging Face Platform
- 11:9 : India’s RBI Introduces Exclusive “bank.in” Domain to Combat Digital Banking Fraud
- 11:5 : IT Security News Hourly Summary 2025-02-07 12h : 20 posts
- 10:33 : Ohne Nutzerinteraktion: Kritische Outlook-Lücke wird aktiv ausgenutzt
- 10:9 : Microsoft Edge: Mehrere Schwachstellen
- 10:9 : Anthropic setzt auf KI – aber Bewerbungen müssen selbst verfasst werden
- 10:9 : In diesem PDF läuft Linux – das steckt dahinter
- 10:9 : Geheimbefehl: Apple soll Briten Behördenzugriff auf verschlüsselte iCloud geben
- 10:9 : [NEU] [hoch] Microsoft Dynamics 365: Schwachstelle ermöglicht Privilegieneskalation