210 posts were published in the last hour
- 22:32 : Microsoft is named a Leader in the 2025 Gartner® Magic Quadrant™ for cyber-physical systems protection platforms
- 22:7 : Trump’s DoD CISO pick previously faced security clearance suspension
- 22:7 : Russia-linked APTs target Signal messenger
- 22:7 : Microsoft is named a Leader in the 2025 Gartner® Magic Quadrant™ for cyber-physical systems protection platforms
- 21:32 : Copyright and AI: the Cases and the Consequences
- 21:32 : AI and Copyright: Expanding Copyright Hurts Everyone—Here’s What to Do Instead
- 21:32 : Microsoft is named a Leader in the 2025 Gartner® Magic Quadrant™ for cyber-physical systems protection platforms
- 21:3 : How to Recognize AI Attacks and Strategies for Securing Your AI Applications
- 21:3 : The head of US AI safety has stepped down. What now?
- 21:3 : 9 tips for migrating between managed SOC providers
- 21:3 : Lina’s Write-up
- 21:3 : New Web Inject Attack Campaigns Targeting MacOS Users To Deploy FrigidStealer Malware
- 21:3 : Check out this free automated tool that hunts for exposed AWS secrets in public repos
- 21:3 : Microsoft is named a Leader in the 2025 Gartner® Magic Quadrant™ for cyber-physical systems protection platforms
- 20:32 : Randall Munroe’s XKCD ‘Archive Request’
- 20:32 : DEF CON 32 – Dysfunctional Unity: The Road To Nowhere
- 20:32 : Microsoft is named a Leader in the 2025 Gartner® Magic Quadrant™ for cyber-physical systems protection platforms
- 20:5 : Spanish spyware startup Mollitiam Industries shuts down
- 20:5 : Cybersecurity Talent Crisis: Future Defenders Rise to the Challenge in CTF Showdown
- 20:5 : RWPQC 2025 Unites Industry Leaders to Drive Cybersecurity and Quantum Innovation
- 20:5 : Hackers Inject FrigidStealer Malware on Your macOS Via Fake Browser Updates
- 20:5 : Russian CryptoBytes Hackers Exploiting Windows Machines To Deploy UxCryptor Ransomware
- 20:5 : Microsoft is named a Leader in the 2025 Gartner® Magic Quadrant™ for cyber-physical systems protection platforms
- 20:5 : IT Security News Hourly Summary 2025-02-19 21h : 10 posts
- 19:32 : MITRE ATT&CK Evaluations — Cortex XDR Among Elite in Endpoint Security
- 19:32 : Protected: zQA Content Editing Styles
- 19:32 : Microsoft is named a Leader in the 2025 Gartner® Magic Quadrant™ for cyber-physical systems protection platforms
- 19:10 : Most Children Bypass Social Media Age Restrictions – Australian Regulator
- 19:10 : US AI Safety Institute will be ‘gutted,’ Axios reports
- 19:10 : Darktrace: 96% of Phishing Attacks in 2024 Exploited Trusted Domains Including SharePoint & Zoom Docs
- 19:9 : #StopRansomware: Ghost (Cring) Ransomware
- 19:9 : CISA and Partners Release Advisory on Ghost (Cring) Ransomware
- 19:9 : Beware! New Fake Browser Updates Deploy NetSupport RAT & StealC Malware on Your Windows
- 19:9 : Microsoft is named a Leader in the 2025 Gartner® Magic Quadrant™ for cyber-physical systems protection platforms
- 18:32 : Mira Murati AI Startup Launches With Some Familiar Faces
- 18:32 : BlackLock Emerging As a Major Player In RaaS With Variants for Windows, VMWare ESXi, & Linux Environments
- 18:32 : Microsoft is named a Leader in the 2025 Gartner® Magic Quadrant™ for cyber-physical systems protection platforms
- 18:12 : How to recognize tax scams and fraud?
- 18:12 : Hackers Tricking Users Into Linking Devices to Steal Signal Messages
- 18:12 : A Stytch in time: Connected Apps untangles authorization tie-ups for AI agents
- 18:12 : Yikes: Jailbroken Grok 3 can be made to say and reveal just about anything
- 18:12 : What is email spoofing?
- 18:11 : From Defense to Offense: Inside-Out Data Security Strategies for CISOs in 2025
- 18:11 : Microsoft is named a Leader in the 2025 Gartner® Magic Quadrant™ for cyber-physical systems protection platforms
- 18:11 : Hackers Exploit Signal’s Linked Devices Feature to Hijack Accounts via Malicious QR Codes
- 17:33 : Unifi Protect: Kritische Sicherheitslücken in Kameras und Verwaltungsoberfläche
- 17:32 : I tried Norton Private Browser to see how it compares to Tor – here’s what I found
- 17:32 : Device Code Phishing
- 17:32 : Your Social Security Number is on the Dark Web: What Do You Do?
- 17:32 : WordPress Plugin Vulnerability Exposes 90,000 Sites to Attack
- 17:6 : Anzeige: BSI-Vorfall-Experte werden – jetzt mit 15 Prozent Rabatt
- 17:5 : Crunchbase’s AI can predict startup success with 95% accuracy—will it change investing?
- 17:5 : The best secure browsers for privacy in 2025: Expert tested
- 17:5 : North Korean Hackers Using Dropbox & PowerShell Scripts To Infiltrate Organizations
- 17:5 : Stop Censoring Abortion: The Fight for Reproductive Rights in the Digital Age
- 17:5 : EFF and Repro Uncensored Launch #StopCensoringAbortion Campaign
- 17:5 : IT Security News Hourly Summary 2025-02-19 18h : 23 posts
- 16:33 : Elon Musk’s xAI Introduces Grok-3 AI Chatbot
- 16:32 : Google Fixes YouTube Security Flaw That Exposed User Emails
- 16:32 : Addressing the Security Risks Posed by IoT Devices
- 16:32 : Hackers Exploit ThinkPHP and ownCloud Vulnerabilities from 2022 and 2023
- 16:32 : China-backed APT40 Hacking Outfit Implicated for Samoa Cyberattacks
- 16:32 : Sandworm’s Evolving Cyber Threat: BadPilot Expands Global Reach
- 16:32 : Finastra Notifies Customers of Data Breach
- 16:12 : Warum Apple gerade 135.000 Apps aus dem Store geschmissen hat
- 16:12 : Die EU stuft Whatsapp jetzt wohl als sehr große Plattform ein: Was das für euch bedeutet
- 16:12 : Windows 11: Versteckte App soll euch bei der Datenübertragung zwischen PCs helfen
- 16:12 : OpenAI: Wie KI Fehler löst, ohne die Ursache zu verstehen – und warum das ein Problem ist
- 16:11 : Zero Trust Architecture a priority to President Donald Trump
- 16:11 : Russian CryptoBytes Hackers Target Windows Machines with UxCryptor Ransomware
- 16:11 : Snake Keylogger Targets Chrome, Edge, and Firefox Users in New Attack Campaign
- 16:11 : Hackers Converting Stolen Payment Card Data into Apple & Google Wallets
- 16:10 : Hackers Exploit Jarsigner Tool to Deploy XLoader Malware
- 16:10 : Russian Hackers Target Signal Messenger Users to Steal Sensitive Data
- 16:10 : Microsoft’s Muse AI can design video game worlds after watching you play
- 16:10 : MSPs weigh in: Key SOAR benefits driving MDR success
- 16:10 : US Army soldier pleads guilty to AT&T and Verizon hacks
- 16:10 : Palo Alto Warns of Hackers Combining Vulnerabilities to Compromise Firewalls
- 16:10 : CaaS Surges in 2025, Along With RATs, Ransomware
- 16:10 : iOS 18 settings to lock down your privacy and security
- 15:32 : Google Warned Of Lawsuit Over ‘Gulf of Mexico’ Name Change
- 15:32 : 2025-02-18: SmartApeSG script for fake browser update leads to NetSupport RAT and StealC
- 15:32 : Flaws in Xerox VersaLink MFPs Spotlight Printer Security Concerns
- 15:6 : INE Security’s Cybersecurity and IT Training Enhances Career Stability in Tech
- 15:5 : What is challenge-response authentication?
- 15:5 : Venture capital firm Insight Partners discloses security breach
- 15:5 : Threat Actors Using $10 Infostealer Malware To Breach Critical US Security
- 15:5 : Hackers Turning Stolen Payment Card Data into Apple & Google Wallets
- 15:5 : Lee Enterprises Ransomware Attack Compromises ‘Critical’ Systems
- 15:5 : How Hackers Manipulate Agentic AI with Prompt Engineering
- 15:5 : CardinalOps expands Threat Exposure Management platform
- 15:5 : Fortinet enhances FortiAnalyzer to deliver accelerated threat hunting and incident response
- 14:32 : Multiple Vulnerabilities Discovered in NVIDIA CUDA Toolkit
- 14:32 : Australian IVF giant Genea confirms hackers ‘accessed data’ during cyberattack
- 14:32 : Malwarebytes introduces native ARM support for Windows devices
- 14:32 : CISO Conversations: Kevin Winter at Deloitte and Richard Marcus at AuditBoard
- 14:32 : Fortinet Extends Scope and Reach of SOC Platform
- 14:32 : Australian IVF Clinic Suffers Data Breach Following Cyber Incident
- 14:8 : „Save Social“
- 14:7 : Russian Hackers Attacking Signal Messenger Users To Gain Access To Sensitive Data
- 14:7 : Raymond IT Systems Hit by Cyber Attack – Investigation In progress
- 14:7 : South Korea Confirm DeepSeek Sending Data Chinese ByteDance Servers
- 14:7 : Google now allows digital fingerprinting of its users
- 14:7 : Blockaid Raises $50 Million to Secure Blockchain Applications
- 14:7 : Echoworx launches Manage Your Own Keys feature powered by AWS
- 14:5 : IT Security News Hourly Summary 2025-02-19 15h : 16 posts
- 13:33 : Sicherheitsupdates: Lernplattform Moodle vielfältig angreifbar
- 13:33 : [UPDATE] [hoch] Node.js: Mehrere Schwachstellen
- 13:32 : How Blockchain Games Ensure Transparency and Fairness
- 13:32 : Duo vs Microsoft Authenticator: Which Tool Is Better?
- 13:32 : VC Company Insight Partners Hacked
- 13:32 : Spies Eye AUKUS Nuclear Submarine Secrets, Australia’s Intelligence Chief Warns
- 13:13 : heise-Angebot: iX-Workshop: Spezialwissen für KRITIS – Prüfverfahrenskompetenz gemäß § 8a BSIG
- 13:12 : Google To Pay $340m To Settle Tax Probe In Italy
- 13:12 : 10 Best LMS SaaS Platforms for Scalable Online Learning
- 13:12 : Celebrating Excellence: Check Point’s Americas 2024 Partner Award of the Year Winners
- 13:12 : Hundreds of Dutch medical records bought for pocket change at flea market
- 13:12 : Palo Alto Networks warns of another firewall vulnerability under attack by hackers
- 13:12 : OpenSSH bugs allows Man-in-the-Middle and DoS Attacks
- 13:12 : Macs targeted by info stealers in new era of cyberthreats
- 13:12 : Chrome 133, Firefox 135 Updates Patch High-Severity Vulnerabilities
- 13:12 : New Snake Keylogger Variant Leverages AutoIt Scripting to Evade Detection
- 12:33 : [NEU] [mittel] Citrix Systems NetScaler Console und NetScaler Agent: Schwachstelle ermöglicht Privilegieneskalation
- 12:32 : UK Rejects Chinese Plea Over Divest Order For Scottish Chip Firm
- 12:32 : New IRS and Tax-Themed Cyber Attacks Fueled With New Domain Registrations
- 12:32 : Saving the Internet in Europe: Defending Privacy and Fighting Surveillance
- 12:32 : New FrigidStealer macOS Malware Distributed as Fake Browser Update
- 12:32 : The Ultimate MSP Guide to Structuring and Selling vCISO Services
- 12:10 : Google Chrome: Mehrere Schwachstellen
- 12:10 : Punkteklau im Supermarkt: Cyberkriminelle stehlen Rewe-Bonuspunkte
- 12:10 : Zugangsdaten in Gefahr: Windows-Nutzer millionenfach mit Keylogger attackiert
- 12:10 : [NEU] [hoch] Google Chrome: Mehrere Schwachstellen
- 12:10 : [NEU] [niedrig] vim: Schwachstelle ermöglicht Manipulation von Dateien
- 12:9 : Mozilla Addresses High-Severity Memory Safety Vulnerabilities in Firefox 135.0.1
- 12:9 : Raymond IT Systems Hit by Cyber Attack, Authorities Investigating
- 12:9 : Free Diagram Tool Aids Management of Complex ICS/OT Cybersecurity Decisions
- 12:9 : Cyber Investor Insight Partners Suffers Security Breach
- 11:34 : Ubiquiti UniFi (Protect Camera und Application): Mehrere Schwachstellen
- 11:34 : [NEU] [mittel] Atlassian Bitbucket: Schwachstelle ermöglicht Codeausführung
- 11:34 : [NEU] [hoch] libxml2: Mehrere Schwachstellen
- 11:34 : [NEU] [mittel] Citrix Systems Secure Access client: Mehrere Schwachstellen ermöglichen Privilegieneskalation
- 11:33 : [NEU] [UNGEPATCHT] [kritisch] D-LINK Router (DIR-823 EOL): Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff
- 11:33 : [NEU] [hoch] Ubiquiti UniFi (Protect Camera und Application: Mehrere Schwachstellen
- 11:32 : Signals of Trouble: Multiple Russia-Aligned Threat Actors Actively Targeting Signal Messenger
- 11:32 : Xerox Versalink Printers Vulnerabilities Could Let Hackers Steal Credentials
- 11:32 : A Signal Update Fends Off a Phishing Technique Used in Russian Espionage
- 11:32 : New Wave of ‘Scam-Yourself’ Attacks Utilizing AI-Generated Videos With DeepFake
- 11:32 : Most Popular Passwords Cracked Within a Second
- 11:32 : 90,000 WordPress Sites Vulnerable to Local File Inclusion Attacks
- 11:32 : Firefox 135.0.1 Released with Fix for High-Severity Memory Safety Vulnerabilities
- 11:32 : Lee Enterprises Newspaper Disruptions Caused by Ransomware
- 11:10 : [NEU] [mittel] Atlassian Bamboo/Jira : Mehrere Schwachstellen ermöglichen Denial of Service
- 11:9 : 90,000 WordPress Sites Exposed to Local File Inclusion Attacks
- 11:9 : How Russian Hackers Are Exploiting Signal ‘Linked Devices’ Feature for Real-Time Spying
- 11:9 : Trojanized Game Installers Deploy Cryptocurrency Miner in Large-Scale StaryDobry Attack
- 11:9 : Russian State Hackers Target Signal to Spy on Ukrainians
- 11:5 : IT Security News Hourly Summary 2025-02-19 12h : 15 posts
- 10:34 : [NEU] [niedrig] Joomla: Schwachstelle ermöglicht SQL Injection
- 10:34 : [NEU] [mittel] Fluent Bit: Mehrere Schwachstellen ermöglichen Denial of Service
- 10:34 : [UPDATE] [mittel] Internet Systems Consortium BIND: Mehrere Schwachstellen ermöglichen Denial of Service
- 10:33 : What is Data Marketing?
- 10:33 : Malaysia’s Data Sharing Bill 2024: Pioneering Secure and Efficient Government Collaboration
- 10:33 : CIS Control 01: Inventory and Control of Enterprise Assets
- 10:33 : Spam and phishing in 2024
- 10:33 : Yahoo Data Leak – Hackers Allegedly Advertised 602,000 Email Accounts
- 10:12 : Mozilla Firefox: Schwachstelle ermöglicht Codeausführung
- 10:12 : KI im Praxistest: Perplexity Deep Research erfindet Zahlen und vergisst Quellen
- 10:12 : Zonos ausprobiert: Was das quelloffene Text-to-Speech-Tool kann – und woran es scheitert
- 10:12 : [NEU] [hoch] Mozilla Firefox: Schwachstelle ermöglicht Codeausführung
- 10:11 : London celebrity talent agency reports itself to ICO following Rhysida attack claims
- 10:11 : Edge Delta Security Data Pipelines mitigates security threats
- 10:11 : Hundreds of US Military and Defense Credentials Compromised
- 9:33 : [UPDATE] [mittel] Oracle Java SE und OpenJDK: Mehrere Schwachstellen
- 9:33 : [UPDATE] [mittel] Oracle Java SE: Mehrere Schwachstellen
- 9:32 : [UPDATE] [hoch] bzip2: Schwachstelle ermöglicht Ausführen von beliebigem Programmcode mit den Rechten des Dienstes
- 9:32 : Critical Apache Ignite Vulnerability Let Attackers Execute Remote Code
- 9:32 : Pangea introduces AI guardrails to secure AI applications
- 9:12 : Sicherheitsupdate OpenSSH: Angreifer können sich in Verbindungen einklinken
- 9:12 : Jahrelang unentdeckt: Zwei OpenSSH-Lücken gefährden unzählige Systeme
- 9:11 : Attackers are chaining flaws to breach Palo Alto Networks firewalls
- 8:33 : Linus Torvalds würde Maintainer-Veto zu Rust-Kernel-Code übergehen
- 8:32 : CISA Warns of Active Exploitation of SonicWall SonicOS RCE Vulnerability
- 8:32 : Veeam brings recovery orchestrator to Microsoft Hyper-V customers
- 8:32 : OpenSSH flaws enable new attacks, Microsoft prepares for deprecation, Zwipe files for bankruptcy
- 8:19 : Sicherung Kritischer Infrastrukturen (KRITIS) – Innovative Sicherheitslösungen für die Herausforderungen der modernen Welt
- 8:19 : Bootloader U-Boot: Sicherheitslücken ermöglichen Umgehen der Chain-of-Trust
- 8:18 : XWorm Cocktail: A Mix of PE data with PowerShell Code, (Wed, Feb 19th)
- 8:18 : CISA Issues Warning on Palo Alto PAN-OS Security Flaw Under Attack
- 8:18 : CISA Releases Two New ICS Advisories Exploits Following Vulnerabilities
- 8:18 : Weaponized Signal, Line, and Gmail Apps Delivers Malware That Changes System Defenses
- 8:18 : GPT-4o Copilot Trained in Over 30 Popular Programming Languages
- 8:18 : Russian Government Proposed New Penalties to Combat Cybercrime
- 8:5 : IT Security News Hourly Summary 2025-02-19 09h : 5 posts
- 7:33 : Juniper Session Smart Router: Sicherheitsleck ermöglicht Übernahme
- 7:32 : Surge in IRS and Tax-Themed Cyber Attacks Driven by Fresh Domain Registrations
- 7:13 : Russian Government Proposes Stricter Penalties to Tackle Cybercrime
- 7:13 : Critical Flaw in Apache Ignite (CVE-2024-52577) Allows Attackers to Execute Code Remotely
- 7:13 : U.S. CISA adds SonicWall SonicOS and Palo Alto PAN-OS flaws to its Known Exploited Vulnerabilities catalog
- 6:32 : Ransomware attacks on Food and Agriculture sector could intensify
- 6:32 : How to thwart cyber attacks on connected cars
- 6:32 : GPT-4o Copilot Covers More Than 30 Popular Programming Languages
- 6:32 : Does AI Detection Remover Really Work? How to Fix Text Like a Pro!
- 6:32 : Hidden Dangers of Security Threats in the Tide of DeepSeek
- 6:32 : Kunai: Open-source threat hunting tool for Linux
- 6:9 : Is quishing the new phishing? Protecting your business against the next threat vector
- 6:9 : VC-backed cybersecurity startups and the exit crunch
- 6:9 : CISA Adds Palo Alto Networks and SonicWall Flaws to Exploited Vulnerabilities List
- 5:32 : CISA Issues Two New ICS Advisories Addressing Exploits and Vulnerabilities
- 5:32 : Cyber hygiene habits that many still ignore
- 5:11 : Chrome Buffer Overflow Flaws Let Hackers Execute Arbitrary Code & Gain System Access