210 posts were published in the last hour
- 22:55 : IT Security News Daily Summary 2025-02-23
- 22:32 : Apple räumt auf: Deshalb fliegen 135.000 Apps aus dem Store
- 22:32 : Whatsapp wird „sehr große Plattform“: Das ändert sich für Nutzer
- 20:32 : Investigators Link $1.4B Bybit Hack to North Korea’s Lazarus Group
- 20:32 : Windscribe VPN review: A flexible and free VPN
- 20:5 : IT Security News Hourly Summary 2025-02-23 21h : 1 posts
- 19:32 : Top 10 Best Ransomware Protection Tools – 2025
- 18:7 : 50 World’s Best Penetration Testing Companies – 2025
- 18:7 : 10 Best Email Security Gateways In 2025
- 17:5 : IT Security News Hourly Summary 2025-02-23 18h : 5 posts
- 16:33 : Wie ich meine Rezepte per Open Source verwalte – und warum es für mich nicht mehr ohne geht
- 16:33 : Microsoft-Entwickler enthüllt: So entstand das Windows 95-Setup-Design
- 16:33 : Perplexity Deep Research im Test: Wenn KI Fakten erfindet
- 16:32 : What the Bybit Hack Means for Crypto Security and the Future of Multisig Protection
- 16:7 : U.S. CISA adds Microsoft Power Pages flaw to its Known Exploited Vulnerabilities catalog
- 15:33 : Chinese Spies Allegedly Engaged in Ransomware Operations
- 15:33 : USAID Cybersecurity Aid to Ukraine Halted as Trump Administration Freezes Projects
- 15:33 : Amazon Prime Phishing Campaign Siphons Login And Payment Info
- 15:33 : Protect Your Security Cameras from Hackers with These Simple Steps
- 15:32 : Cyber-Espionage Malware FinalDraft Exploits Outlook Drafts for Covert Operations
- 14:5 : IT Security News Hourly Summary 2025-02-23 15h : 1 posts
- 14:2 : SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 34
- 13:2 : Security Affairs newsletter Round 512 by Pierluigi Paganini – INTERNATIONAL EDITION
- 11:5 : IT Security News Hourly Summary 2025-02-23 12h : 5 posts
- 11:2 : Wireshark 4.4.4 Released, (Sun, Feb 23rd)
- 10:33 : Whatsapp erleichtert iPhone-Nutzern den Umgang mit ungelesenen Nachrichten
- 10:33 : Leben mit KI: Brauchen wir eine Digital-Diät?
- 10:33 : Warum wir aufhören sollten, KI mit KI zu füttern – und lieber unser Hirn benutzen sollten
- 10:33 : Nordkorea: Milliardendiebstahl erschüttert Kryptobörse Bybit
- 9:32 : Week in review: PostgreSQL 0-day exploited in US Treasury hack, top OSINT books to learn from
- 9:7 : Securing Payment Pages: A Complete Guide to PCI DSS 4.0.1 Compliance for SAQ A-EP Merchants
- 8:32 : Neuer Standort für LivEye
- 8:32 : Zero Day: Als würde man Joe Biden auf Hacker-Jagd schicken
- 6:9 : New Zhong Stealer Malware Exploit Zendesk to Attack Fintech and Cryptocurrency
- 5:5 : IT Security News Hourly Summary 2025-02-23 06h : 1 posts
- 4:6 : BlackBastaGPT – A ChatGPT Powered Tool to Uncover Ransomware Group Tactics
- 2:5 : IT Security News Hourly Summary 2025-02-23 03h : 1 posts
- 1:6 : Lazarus APT stole $1.5B from Bybit, it is the largest cryptocurrency heist ever
- 23:5 : IT Security News Hourly Summary 2025-02-23 00h : 2 posts
- 22:55 : IT Security News Daily Summary 2025-02-22
- 22:32 : Neuer Captcha-Test: KI-generierte Bilder trennen Menschen von Bots
- 20:5 : IT Security News Hourly Summary 2025-02-22 21h : 1 posts
- 19:5 : North Korea’s Lazarus Group Hacks Bybit, Steals $1.5 Billion in Crypto
- 18:5 : Größter Krypto-Coup aller Zeiten: Bybit verliert 1,5 Milliarden US-Dollar
- 18:4 : Hackers Target South America and Southeast Asia
- 17:5 : IT Security News Hourly Summary 2025-02-22 18h : 2 posts
- 16:32 : Neo Gamma: Kann dieser Roboter bald die Hausarbeit für uns erledigen?
- 16:32 : Whatsapp wird bunter: Individuelle Chatgestaltung mit frischen Hintergründen und Sprechblasenfarben
- 16:5 : Bybit Hack Drains $1.5 Billion From Cryptocurrency Exchange
- 16:4 : Russian State Actors Target Microsoft 365 Accounts Via Device Code Phishing Campaign
- 16:4 : Hackers Leak 15,000 FortiGate Device Configs, IPs, and VPN Credentials
- 15:2 : ADR Report | Application Detection and Response Trends | Contrast Labs
- 12:7 : Advanced Data Protection: Apple entfernt erweiterte iCloud-Sicherheit in UK
- 12:7 : $1.4 Billion Stolen From ByBit in Biggest Crypto Theft Ever
- 12:7 : Apple removes iCloud encryption in UK following backdoor demand
- 11:5 : IT Security News Hourly Summary 2025-02-22 12h : 2 posts
- 10:32 : Telekom und Vodafone wollen Funklöcher mit Drohnen überbrücken
- 10:32 : KI in Filmen: Urheberschaft, künstlerische Freiheit und die Frage der Authentizität
- 9:32 : (g+) Alternative zum Passwort: Passkeys kommen aus der Nische
- 8:33 : FH Wedel und NBS – Vereint für Forschung, Lehre und Praxis
- 8:33 : Secure Coding: Sicheres Passwort-Handling in Java – von String zu char[]
- 8:32 : Huge Data Leak Puts 2.7 Billion Records at Risk – What You Should Know
- 8:32 : The Dark Side of AI: Project Synapse
- 8:5 : IT Security News Hourly Summary 2025-02-22 09h : 1 posts
- 8:4 : Bybit Confirms Record-Breaking $1.46 Billion Crypto Heist in Sophisticated Cold Wallet Attack
- 6:31 : Bybit Hack: Massive $1.5 Billion Worth Ethereum Stolen
- 6:4 : OpenAI Bans Accounts Misusing ChatGPT for Surveillance and Influence Campaigns
- 5:32 : Salt Typhoon Hackers Exploit Cisco Vulnerability To Gain Access To U.S. Telecom Networks
- 5:5 : IT Security News Hourly Summary 2025-02-22 06h : 4 posts
- 4:5 : New Guidelines: Cybersecurity Resilience in the Healthcare Industry
- 4:5 : Feel Relieved with Effective Secrets Sprawl Control
- 4:5 : Stay Calm: Securing Your Enterprise Against Leaks
- 4:5 : Achieving Satisfaction in Cloud Security Investments
- 1:2 : The Judicial Conference Should Continue to Liberally Allow Amicus Briefs, a Critical Advocacy Tool
- 23:32 : Week in Review: More telecoms breached, Chase blocks Zelle, more DeepSeek bans
- 23:5 : IT Security News Hourly Summary 2025-02-22 00h : 2 posts
- 22:55 : IT Security News Daily Summary 2025-02-21
- 22:32 : Apple Intelligence: Alles, was ihr zum Deutschlandstart wissen müsst
- 21:32 : Bybit Hack: $1.4B Stolen from World’s 2nd Largest Crypto Exchange
- 21:32 : Google Announces Quantum-Safe Digital Signatures in Cloud KMS, Takes “Post-Quantum Computing Risks Seriously”
- 21:32 : Cornered by the UK’s Demand for an Encryption Backdoor, Apple Turns Off Its Strongest Security Setting
- 21:2 : INE Security’s Cybersecurity and IT Training Enhances Career Stability in Tech
- 21:2 : 2025-02-18: SmartApeSG script for fake browser update leads to NetSupport RAT and StealC
- 21:2 : Controlling Access to Google BigQuery Data
- 20:32 : Leaked Files Tie Chinese Cybersecurity Firm to Government Censorship
- 20:32 : Apple Breaks Silence on UK Probe, Removes Data Protection Tool From UK Users
- 20:32 : Palo Alto Networks vulnerabilities exploited in chained attack
- 20:32 : Auto-Generated Password Vulnerability In Sitevision Leaks Signing Key
- 20:5 : IT Security News Hourly Summary 2025-02-21 21h : 7 posts
- 20:2 : Harnessing Agentic AI To Supercharge Security Awareness Training
- 20:2 : DOGE’s USDS Purge Included the Guy Who Keeps Veterans’ Data Safe Online
- 19:32 : Cases of China-Backed Spy Groups Using Ransomware Come to Light
- 19:9 : Patch Now: Check Point Research Explains Shadow Pad, NailaoLocker, and its Protection
- 19:9 : Crypto exchange Bybit says it was hacked and lost around $1.4B
- 19:9 : Bridewell and I-TRACING Form Strategic Partnership
- 19:9 : How DDoS Attacks Work and How You Can Protect Your Business From Them
- 18:34 : From log analysis to rule creation: How AWS Network Firewall automates domain-based security for outbound traffic
- 18:8 : „Save Social“
- 18:8 : SPAWNCHIMERA Malware Exploits Ivanti Buffer Overflow Vulnerability by Applying a Critical Fix
- 18:7 : Check Point Research Explains Shadow Pad, NailaoLocker, and its Protection
- 18:7 : Fake job offers target software developers with infostealers
- 18:7 : Don’t Miss Out: 15 Months of Powerful Cyber Protection and Backup for Only $30
- 18:7 : Crypto exchange Bybit says it was hacked and lost around $1.4 billion
- 17:39 : Anzeige: IT-Notfallplanung und BCM – so funktioniert’s
- 17:37 : ACRStealer Malware Abuses Google Docs as C2 to Steal Login Credentials
- 17:37 : NSA Allegedly Hacked Northwestern Polytechnical University, China Claims
- 17:37 : Sitevision Auto-Generated Password Vulnerability Lets Hackers Steal Signing Key
- 17:37 : What is a network packet?
- 17:37 : ACRStealer Malware Exploiting Google Docs as C2 To Steal Login Credentials
- 17:37 : China Claim That NSA Allegedly Hacked Northwestern Polytechnical University
- 17:37 : EFF at RightsCon 2025
- 17:37 : Data Leak Exposes TopSec’s Role in China’s Censorship-as-a-Service Operations
- 17:37 : Apple Drops iCloud’s Advanced Data Protection in the U.K. Amid Encryption Backdoor Demands
- 17:9 : CISA Adds One Known Exploited Vulnerability to Catalog
- 17:9 : Healthcare security lapses keep piling up
- 17:5 : IT Security News Hourly Summary 2025-02-21 18h : 16 posts
- 16:34 : Security and privacy concerns challenge public sector’s efforts to modernize
- 16:15 : Amazons Play-Store-Alternative wird eingestellt: Was Android-Nutzer jetzt wissen müssen
- 16:15 : Youtube Premium Lite soll bald in Deutschland starten: Wo ihr mit dem Abo trotzdem Werbung seht
- 16:15 : Droht die KI-Blase bald zu zerplatzen? Microsoft-CEO hat eine eindeutige Meinung
- 16:15 : Musik mit Youtube-Videos machen: Diese ungewöhnliche Webseite macht’s möglich
- 16:14 : Apple backs out of offering Data Security tool to UK customers
- 16:14 : Apple Withdraws Advanced Data Protection For UK, After Government Order
- 16:14 : American Airlines now lets you track your luggage with AirTags – here’s how
- 16:14 : Apple pulls iCloud end-to-end encryption feature for UK users after government demanded backdoor
- 16:14 : Implementing Cryptography in AI Systems
- 16:14 : Darcula 3.0 Tool Automatically Generates Phishing Kit For Any Brand
- 16:14 : Freelance Software Developers in North Korean Malware Crosshairs
- 16:14 : The Upcoming Tech Revolution Foreseen by Sundar Pichai
- 16:14 : Italian Spyware Firm SIO Linked to Malicious Android Apps Targeting WhatsApp Users
- 16:14 : whoAMI Name Assaults Can Compromise AWS Accounts to Malicious Code Execution
- 16:14 : Android Phishing Apps: A Growing Cybersecurity Threat in 2024
- 15:32 : Sweden Investigates Another Baltic Sea Cable Damage Incident
- 15:32 : Digital life protection: How Webroot keeps you safe in a constantly changing world
- 15:32 : Is your whole digital life protected? 4 ways to address common vulnerabilities
- 15:32 : A huge trove of leaked Black Basta chat logs expose the ransomware gang’s key members and victims
- 15:5 : OpenH264-Sicherheitslücke: Schadcode über Videos im Browser
- 15:5 : Is your phone truly waterproof? Here’s what the IP rating tells you
- 15:5 : B1ack’s Stash released 1 Million credit cards
- 15:5 : Cisco Details ‘Salt Typhoon’ Network Hopping, Credential Theft Tactics
- 14:32 : Signals of Trouble: Multiple Russia-Aligned Threat Actors Actively Targeting Signal Messenger
- 14:32 : Critical UniFi Protect Camera Vulnerability Enables Remote Code Execution Attacks
- 14:32 : Nagios XI Flaw Exposes User Details and Emails to Unauthenticated Attackers”
- 14:32 : Salt Typhoon Exploited Cisco Devices With Custom Tool to Spy on US Telcos
- 14:13 : Aufgeschoben ist nicht aufgehoben: Wahlen für NIS2-Umsetzung nutzen
- 14:13 : Ransomware im LLM: Forscher füttern ChatGPT mit Daten der “Black Basta”-Bande
- 14:12 : OpenAI’s ‘Operator’ AI Agent Starts Rollout In Select Countries
- 14:12 : Critical Vulnerability in Fluent Bit Exposes Cloud Services to Potential Cyber Attacks
- 14:12 : Cyber Criminals Using URL Tricks to Deceive Users
- 14:12 : What is application allowlisting?
- 14:12 : The US Is Considering a TP-Link Router Ban—Should You Worry?
- 14:12 : CL0P Ransomware Attacking Telecommunications & Healthcare Sectors In Large Scale
- 14:12 : Persistent Phishing Campaign Uses Surveymonkey and Cloudflare, Bypasses Gmail’s Spam Filter
- 14:12 : In Other News: Black Basta Chats Leaked, New SEC Cyber Unit, DOGE Site Hacked
- 14:12 : Cybercriminals Can Now Clone Any Brand’s Site in Minutes Using Darcula PhaaS v3
- 14:12 : DoD Contractor Pays $11.2M over False Cyber Certifications Claims
- 14:5 : IT Security News Hourly Summary 2025-02-21 15h : 3 posts
- 13:31 : [UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service
- 13:30 : [UPDATE] [mittel] zlib: Schwachstelle ermöglicht nicht spezifizierten Angriff
- 13:30 : [UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen ermöglichen Privilegieneskalation
- 13:4 : Cisa: Cybersecurity-Experten der US-Regierung entlassen
- 13:3 : (g+) Musk, Bezos, Zuckerberg: Warum Tescreal Demokratien gefährdet
- 13:3 : Experts race to extract intel from Black Basta internal chat leaks
- 13:3 : What Is EDR? Endpoint Detection and Response
- 13:3 : Why Internal Audit Services Are Key to Risk Management in Today’s Business Landscape
- 13:2 : Webinar: Learn How to Identify High-Risk Identity Gaps and Slash Security Debt in 2025
- 12:34 : Top 9 Arctic Wolf Competitors and Alternatives
- 12:34 : How China Pinned University Cyberattacks on NSA Hackers
- 12:5 : Schadcodeausführung möglich: Gefährliche OpenH264-Lücke bedroht Firefox-Nutzer
- 12:5 : CISA Warns of Attacks Exploiting Craft CMS Vulnerability
- 12:4 : Is Vibe Coding The Future of Software Development
- 11:34 : Kleinere Budgets und Fachkräftemangel fordern CISOs
- 11:33 : Schadcodeausführung möglich: Sicherheitslücke in OpenH264 gefährdet Firefox-Nutzer
- 11:32 : Investigating LLM Jailbreaking of Popular Generative AI Web Products
- 11:32 : Second Recently Patched Flaw Exploited to Hack Palo Alto Firewalls
- 11:32 : AI-Powered Deception is a Menace to Our Societies
- 11:32 : BlackBasta Ransomware Chatlogs Leaked Online
- 11:32 : OpenSSL 3.5 will be the next long term stable (LTS) release
- 11:5 : IT Security News Hourly Summary 2025-02-21 12h : 18 posts
- 11:3 : CISA und FBI warnen vor Ransomware-Bande Ghost
- 11:2 : U.S. CISA adds Craft CMS and Palo Alto Networks PAN-OS flaws to its Known Exploited Vulnerabilities catalog
- 10:32 : New Darcula 3.0 Tool Generates Phishing Kits to Mimic Global Brands
- 10:32 : Angry Likho: Old beasts in a new forest
- 10:32 : Top 9 Arctic Wolf alternatives and competitors
- 10:32 : zkLend DeFi Platform Hacked, Loses $9.5 Million
- 10:15 : Effizientes Arbeiten: Cloud Computing als Gamechanger
- 10:15 : Microsoft Magma: Dieses KI-Modell steuert Roboter und Software – was daran so besonders ist
- 10:15 : Datenschutz: Musks Behörde bekommt keinen Zugriff auf sensible IRS-Daten
- 10:15 : Linux-Images schreiben: Tails-Entwickler warnen vor Balenaetcher
- 10:15 : [NEU] [UNGEPATCHT] [niedrig] Keycloak: Schwachstelle ermöglicht Cross-Site Scripting
- 10:15 : [NEU] [hoch] xwiki: Schwachstelle ermöglicht Codeausführung
- 10:15 : [NEU] [mittel] Nagios Enterprises Nagios XI: Mehrere Schwachstellen
- 10:14 : Adversary-in-the-Middle Hackers Exploit Vulnerabilities to Deploy Advanced Malware
- 10:14 : CL0P Ransomware Launches Large-Scale Attacks on Telecom and Healthcare Sectors
- 10:14 : Salt Typhoon Hackers Exploit Cisco Vulnerability to Gain Device Access on US.Telecom Networks
- 10:14 : Cyber Threat Actors Leveraging Exploits To Attack Financial Sector With Advanced Malware
- 10:13 : Google Cloud’s Multi-Factor Authentication Mandate: Setting a Standard or Creating an Illusion of Security?
- 9:33 : Cybersicherheit: Hamburg und BSI verstärken Zusammenarbeit
- 9:32 : OpenText unveils AI-powered threat detection and response capabilities
- 9:32 : Microsoft’s Quantum Chip Breakthrough Accelerates Threat to Encryption Protocols
- 9:12 : Google Chrome/Microsoft Edge: Mehrere Schwachstellen
- 9:12 : Sicherheitsupdates Atlassian: Attacken auf Bamboo Data Center and Server möglich
- 9:12 : [UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff
- 9:12 : [UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen
- 9:12 : [UPDATE] [mittel] Apache Tomcat: Schwachstelle ermöglicht Codeausführung
- 9:12 : [UPDATE] [hoch] Apache Tomcat: Mehrere Schwachstellen
- 9:11 : Atlassian fixed critical flaws in Confluence and Crowd
- 9:11 : Cybersecurity Survey Indicates Organizations Favouring Consolidation and Automation
- 9:11 : Versa Sovereign SASE enables organizations to create self-protecting networks
- 8:32 : Symbiotic Security improves software vulnerability detection in the coding process