176 posts were published in the last hour
- 22:32 : Apple Intelligence: Alles, was ihr zum Deutschlandstart wissen müsst
- 21:32 : Bybit Hack: $1.4B Stolen from World’s 2nd Largest Crypto Exchange
- 21:32 : Google Announces Quantum-Safe Digital Signatures in Cloud KMS, Takes “Post-Quantum Computing Risks Seriously”
- 21:32 : Cornered by the UK’s Demand for an Encryption Backdoor, Apple Turns Off Its Strongest Security Setting
- 21:2 : INE Security’s Cybersecurity and IT Training Enhances Career Stability in Tech
- 21:2 : 2025-02-18: SmartApeSG script for fake browser update leads to NetSupport RAT and StealC
- 21:2 : Controlling Access to Google BigQuery Data
- 20:32 : Leaked Files Tie Chinese Cybersecurity Firm to Government Censorship
- 20:32 : Apple Breaks Silence on UK Probe, Removes Data Protection Tool From UK Users
- 20:32 : Palo Alto Networks vulnerabilities exploited in chained attack
- 20:32 : Auto-Generated Password Vulnerability In Sitevision Leaks Signing Key
- 20:5 : IT Security News Hourly Summary 2025-02-21 21h : 7 posts
- 20:2 : Harnessing Agentic AI To Supercharge Security Awareness Training
- 20:2 : DOGE’s USDS Purge Included the Guy Who Keeps Veterans’ Data Safe Online
- 19:32 : Cases of China-Backed Spy Groups Using Ransomware Come to Light
- 19:9 : Patch Now: Check Point Research Explains Shadow Pad, NailaoLocker, and its Protection
- 19:9 : Crypto exchange Bybit says it was hacked and lost around $1.4B
- 19:9 : Bridewell and I-TRACING Form Strategic Partnership
- 19:9 : How DDoS Attacks Work and How You Can Protect Your Business From Them
- 18:34 : From log analysis to rule creation: How AWS Network Firewall automates domain-based security for outbound traffic
- 18:8 : „Save Social“
- 18:8 : SPAWNCHIMERA Malware Exploits Ivanti Buffer Overflow Vulnerability by Applying a Critical Fix
- 18:7 : Check Point Research Explains Shadow Pad, NailaoLocker, and its Protection
- 18:7 : Fake job offers target software developers with infostealers
- 18:7 : Don’t Miss Out: 15 Months of Powerful Cyber Protection and Backup for Only $30
- 18:7 : Crypto exchange Bybit says it was hacked and lost around $1.4 billion
- 17:39 : Anzeige: IT-Notfallplanung und BCM – so funktioniert’s
- 17:37 : ACRStealer Malware Abuses Google Docs as C2 to Steal Login Credentials
- 17:37 : NSA Allegedly Hacked Northwestern Polytechnical University, China Claims
- 17:37 : Sitevision Auto-Generated Password Vulnerability Lets Hackers Steal Signing Key
- 17:37 : What is a network packet?
- 17:37 : ACRStealer Malware Exploiting Google Docs as C2 To Steal Login Credentials
- 17:37 : China Claim That NSA Allegedly Hacked Northwestern Polytechnical University
- 17:37 : EFF at RightsCon 2025
- 17:37 : Data Leak Exposes TopSec’s Role in China’s Censorship-as-a-Service Operations
- 17:37 : Apple Drops iCloud’s Advanced Data Protection in the U.K. Amid Encryption Backdoor Demands
- 17:9 : CISA Adds One Known Exploited Vulnerability to Catalog
- 17:9 : Healthcare security lapses keep piling up
- 17:5 : IT Security News Hourly Summary 2025-02-21 18h : 16 posts
- 16:34 : Security and privacy concerns challenge public sector’s efforts to modernize
- 16:15 : Amazons Play-Store-Alternative wird eingestellt: Was Android-Nutzer jetzt wissen müssen
- 16:15 : Youtube Premium Lite soll bald in Deutschland starten: Wo ihr mit dem Abo trotzdem Werbung seht
- 16:15 : Droht die KI-Blase bald zu zerplatzen? Microsoft-CEO hat eine eindeutige Meinung
- 16:15 : Musik mit Youtube-Videos machen: Diese ungewöhnliche Webseite macht’s möglich
- 16:14 : Apple backs out of offering Data Security tool to UK customers
- 16:14 : Apple Withdraws Advanced Data Protection For UK, After Government Order
- 16:14 : American Airlines now lets you track your luggage with AirTags – here’s how
- 16:14 : Apple pulls iCloud end-to-end encryption feature for UK users after government demanded backdoor
- 16:14 : Implementing Cryptography in AI Systems
- 16:14 : Darcula 3.0 Tool Automatically Generates Phishing Kit For Any Brand
- 16:14 : Freelance Software Developers in North Korean Malware Crosshairs
- 16:14 : The Upcoming Tech Revolution Foreseen by Sundar Pichai
- 16:14 : Italian Spyware Firm SIO Linked to Malicious Android Apps Targeting WhatsApp Users
- 16:14 : whoAMI Name Assaults Can Compromise AWS Accounts to Malicious Code Execution
- 16:14 : Android Phishing Apps: A Growing Cybersecurity Threat in 2024
- 15:32 : Sweden Investigates Another Baltic Sea Cable Damage Incident
- 15:32 : Digital life protection: How Webroot keeps you safe in a constantly changing world
- 15:32 : Is your whole digital life protected? 4 ways to address common vulnerabilities
- 15:32 : A huge trove of leaked Black Basta chat logs expose the ransomware gang’s key members and victims
- 15:5 : OpenH264-Sicherheitslücke: Schadcode über Videos im Browser
- 15:5 : Is your phone truly waterproof? Here’s what the IP rating tells you
- 15:5 : B1ack’s Stash released 1 Million credit cards
- 15:5 : Cisco Details ‘Salt Typhoon’ Network Hopping, Credential Theft Tactics
- 14:32 : Signals of Trouble: Multiple Russia-Aligned Threat Actors Actively Targeting Signal Messenger
- 14:32 : Critical UniFi Protect Camera Vulnerability Enables Remote Code Execution Attacks
- 14:32 : Nagios XI Flaw Exposes User Details and Emails to Unauthenticated Attackers”
- 14:32 : Salt Typhoon Exploited Cisco Devices With Custom Tool to Spy on US Telcos
- 14:13 : Aufgeschoben ist nicht aufgehoben: Wahlen für NIS2-Umsetzung nutzen
- 14:13 : Ransomware im LLM: Forscher füttern ChatGPT mit Daten der “Black Basta”-Bande
- 14:12 : OpenAI’s ‘Operator’ AI Agent Starts Rollout In Select Countries
- 14:12 : Critical Vulnerability in Fluent Bit Exposes Cloud Services to Potential Cyber Attacks
- 14:12 : Cyber Criminals Using URL Tricks to Deceive Users
- 14:12 : What is application allowlisting?
- 14:12 : The US Is Considering a TP-Link Router Ban—Should You Worry?
- 14:12 : CL0P Ransomware Attacking Telecommunications & Healthcare Sectors In Large Scale
- 14:12 : Persistent Phishing Campaign Uses Surveymonkey and Cloudflare, Bypasses Gmail’s Spam Filter
- 14:12 : In Other News: Black Basta Chats Leaked, New SEC Cyber Unit, DOGE Site Hacked
- 14:12 : Cybercriminals Can Now Clone Any Brand’s Site in Minutes Using Darcula PhaaS v3
- 14:12 : DoD Contractor Pays $11.2M over False Cyber Certifications Claims
- 14:5 : IT Security News Hourly Summary 2025-02-21 15h : 3 posts
- 13:31 : [UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service
- 13:30 : [UPDATE] [mittel] zlib: Schwachstelle ermöglicht nicht spezifizierten Angriff
- 13:30 : [UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen ermöglichen Privilegieneskalation
- 13:4 : Cisa: Cybersecurity-Experten der US-Regierung entlassen
- 13:3 : (g+) Musk, Bezos, Zuckerberg: Warum Tescreal Demokratien gefährdet
- 13:3 : Experts race to extract intel from Black Basta internal chat leaks
- 13:3 : What Is EDR? Endpoint Detection and Response
- 13:3 : Why Internal Audit Services Are Key to Risk Management in Today’s Business Landscape
- 13:2 : Webinar: Learn How to Identify High-Risk Identity Gaps and Slash Security Debt in 2025
- 12:34 : Top 9 Arctic Wolf Competitors and Alternatives
- 12:34 : How China Pinned University Cyberattacks on NSA Hackers
- 12:5 : Schadcodeausführung möglich: Gefährliche OpenH264-Lücke bedroht Firefox-Nutzer
- 12:5 : CISA Warns of Attacks Exploiting Craft CMS Vulnerability
- 12:4 : Is Vibe Coding The Future of Software Development
- 11:34 : Kleinere Budgets und Fachkräftemangel fordern CISOs
- 11:33 : Schadcodeausführung möglich: Sicherheitslücke in OpenH264 gefährdet Firefox-Nutzer
- 11:32 : Investigating LLM Jailbreaking of Popular Generative AI Web Products
- 11:32 : Second Recently Patched Flaw Exploited to Hack Palo Alto Firewalls
- 11:32 : AI-Powered Deception is a Menace to Our Societies
- 11:32 : BlackBasta Ransomware Chatlogs Leaked Online
- 11:32 : OpenSSL 3.5 will be the next long term stable (LTS) release
- 11:5 : IT Security News Hourly Summary 2025-02-21 12h : 18 posts
- 11:3 : CISA und FBI warnen vor Ransomware-Bande Ghost
- 11:2 : U.S. CISA adds Craft CMS and Palo Alto Networks PAN-OS flaws to its Known Exploited Vulnerabilities catalog
- 10:32 : New Darcula 3.0 Tool Generates Phishing Kits to Mimic Global Brands
- 10:32 : Angry Likho: Old beasts in a new forest
- 10:32 : Top 9 Arctic Wolf alternatives and competitors
- 10:32 : zkLend DeFi Platform Hacked, Loses $9.5 Million
- 10:15 : Effizientes Arbeiten: Cloud Computing als Gamechanger
- 10:15 : Microsoft Magma: Dieses KI-Modell steuert Roboter und Software – was daran so besonders ist
- 10:15 : Datenschutz: Musks Behörde bekommt keinen Zugriff auf sensible IRS-Daten
- 10:15 : Linux-Images schreiben: Tails-Entwickler warnen vor Balenaetcher
- 10:15 : [NEU] [UNGEPATCHT] [niedrig] Keycloak: Schwachstelle ermöglicht Cross-Site Scripting
- 10:15 : [NEU] [hoch] xwiki: Schwachstelle ermöglicht Codeausführung
- 10:15 : [NEU] [mittel] Nagios Enterprises Nagios XI: Mehrere Schwachstellen
- 10:14 : Adversary-in-the-Middle Hackers Exploit Vulnerabilities to Deploy Advanced Malware
- 10:14 : CL0P Ransomware Launches Large-Scale Attacks on Telecom and Healthcare Sectors
- 10:14 : Salt Typhoon Hackers Exploit Cisco Vulnerability to Gain Device Access on US.Telecom Networks
- 10:14 : Cyber Threat Actors Leveraging Exploits To Attack Financial Sector With Advanced Malware
- 10:13 : Google Cloud’s Multi-Factor Authentication Mandate: Setting a Standard or Creating an Illusion of Security?
- 9:33 : Cybersicherheit: Hamburg und BSI verstärken Zusammenarbeit
- 9:32 : OpenText unveils AI-powered threat detection and response capabilities
- 9:32 : Microsoft’s Quantum Chip Breakthrough Accelerates Threat to Encryption Protocols
- 9:12 : Google Chrome/Microsoft Edge: Mehrere Schwachstellen
- 9:12 : Sicherheitsupdates Atlassian: Attacken auf Bamboo Data Center and Server möglich
- 9:12 : [UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff
- 9:12 : [UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen
- 9:12 : [UPDATE] [mittel] Apache Tomcat: Schwachstelle ermöglicht Codeausführung
- 9:12 : [UPDATE] [hoch] Apache Tomcat: Mehrere Schwachstellen
- 9:11 : Atlassian fixed critical flaws in Confluence and Crowd
- 9:11 : Cybersecurity Survey Indicates Organizations Favouring Consolidation and Automation
- 9:11 : Versa Sovereign SASE enables organizations to create self-protecting networks
- 8:32 : Symbiotic Security improves software vulnerability detection in the coding process
- 8:32 : CISA Flags Craft CMS Vulnerability CVE-2025-23209 Amid Active Attacks
- 8:32 : Cisco Confirms Salt Typhoon Exploited CVE-2018-0171 to Target U.S. Telecom Networks
- 8:32 : NioCorp BEC scam, Australian IVF breach, SEC’s cyber unit
- 8:12 : Roboter im Einzelhandel – das neue Sicherheitspersonal?
- 8:12 : Cyberangriffe auf Palo Alto PAN-OS und Craft CMS laufen
- 8:11 : CISA Releases 7 ICS Advisories Detailing Vulnerabilities & Exploits
- 8:5 : IT Security News Hourly Summary 2025-02-21 09h : 7 posts
- 7:33 : Angriffe auf KI-gestützte Software abwehren – Secure by Design
- 7:32 : CISA Issues Seven ICS Advisories Highlighting Critical Vulnerabilities
- 7:32 : Chinese Hackers Using New Bookworm Malware In Attacks Targeting Southeast Asia
- 7:32 : SPAWNCHIMERA Malware Exploiting Ivanti Buffer Overflow Vulnerability By Applying A Fix
- 7:32 : Pegasus Spyware Used Widely to Target Individuals in Private Industry & Finance Sectors
- 7:7 : Pegasus Spyware Now Targeting Business Executives and Financial Sector Professionals
- 7:7 : Ivanti endpoint manager can become endpoint ravager, thanks to quartet of critical flaws
- 6:33 : Anzeige: 15 Prozent auf Security-Workshops – nur noch eine Woche
- 6:32 : Genea Australia data breach and Black Basta Ransomware gang data leak
- 6:32 : Controlling Shadow AI: Protecting Knowledge Management from Cyber Threats
- 6:7 : Cybercriminals Leverage Google Tag Manager for Credit Card Data Theft
- 6:7 : How to secure Notes on iOS and macOS
- 6:7 : Mastering the cybersecurity tightrope of protection, detection, and response
- 5:32 : Baby, You Can Hack My Car: Upstream’s 2025 Automotive and Smart Mobility Cybersecurity Report
- 5:11 : Google Released PoC Exploit For Palo Alto Firewall Command Injection Vulnerability
- 5:5 : IT Security News Hourly Summary 2025-02-21 06h : 3 posts
- 4:31 : New infosec products of the week: February 21, 2025
- 4:9 : New Active Directory Pentesting Tool For KeyCredentialLink Management
- 4:9 : Thailand ready to welcome 7,000 trafficked scam call center victims back from Myanmar
- 2:7 : Windows Wi-Fi Password Stealer Malware Found Hosted on GitHub
- 2:5 : IT Security News Hourly Summary 2025-02-21 03h : 4 posts
- 1:32 : Life in the Swimlane with Gabriella Lopez, Senior Sales Development Representative
- 1:9 : ISC Stormcast For Friday, February 21st, 2025 https://isc.sans.edu/podcastdetail/9334, (Fri, Feb 21st)
- 1:9 : CISA Adds Two Known Exploited Vulnerabilities to Catalog
- 1:9 : Linux royalty backs adoption of Rust for kernel code, says its rise is inevitable
- 0:32 : Cocospy – 1,798,059 breached accounts
- 0:32 : Spyic – 875,999 breached accounts
- 0:32 : Driving Innovation with Secure Cloud Practices
- 0:32 : Feel Empowered: Managing Access with Precision
- 0:32 : Build a Confident Security Posture with Proven Tactics
- 0:9 : Tool update: sigs.py – added check mode, (Fri, Feb 21st)
- 0:9 : Salt Typhoon used custom malware JumbledPath to spy U.S. telecom providers
- 0:9 : Microsoft expands Copilot bug bounty targets, adds payouts for even moderate messes
- 23:32 : How to Sue a Company Under GDPR for Data Misuse and Privacy Violations
- 23:32 : Oops, some of our customers’ Power Pages sites were exploited, says Microsoft
- 23:5 : IT Security News Hourly Summary 2025-02-21 00h : 5 posts