200 posts were published in the last hour
- 22:32 : Indiana-Jones-Methode: Forscher zeigen, wie leicht sich KI-Modelle austricksen lassen
- 22:32 : Enhancing security with Microsoft’s expanded cloud logs
- 22:4 : PayPal scam abuses Docusign API to spread phishy emails
- 21:32 : AV Detection & Anti-Malware Scans Bypassed Using Red Team Tool SpecterInsight
- 21:6 : Avoid unexpected credit card charges with my ultimate online shopping hack
- 20:32 : Did Trump Admin Order U.S. Cyber Command and CISA to Stand Down on Russia? (Story updated)
- 20:32 : Why Are Airlines a Prime Target for Cyberattacks?
- 20:5 : Scammers Mailing Ransom Letters While Posing as BianLian Ransomware
- 20:5 : Hackers launder most of Bybit’s stolen crypto worth $1.4B
- 20:5 : New AI-Powered Scam Detection Features to Help Protect You on Android
- 20:5 : Windows KDC Proxy RCE Vulnerability Let Attackers Control The Server Remotely – Technical Analysis
- 20:5 : VMware splats guest-to-hypervisor escape bugs already exploited in wild
- 20:5 : IT Security News Hourly Summary 2025-03-04 21h : 3 posts
- 19:32 : Hackers launder most of Bybit’s stolen crypto worth $1.4 billion
- 19:32 : Comic Agilé – Luxshan Ratnaravi, Mikkel Noe-Nygaard – #327 – Including QA Tasks At Sprint Planning
- 19:9 : Securing generative AI models on Azure AI Foundry
- 18:32 : How to generate random passwords from the Linux command line
- 18:32 : 49,000+ Access Management Systems Worldwide Configured With Massive Security Gaps
- 18:32 : Hackers Deliver XWorm via Malicious Registry Files in a New Stegocampaign Attack
- 18:32 : Android TV Users Watch Out: Dangerous Vo1d Botnet Hits 1.6 Million Devices
- 18:2 : Pathfinder AI – Hunters Announces New AI Capabilities for Smarter SOC Automation
- 18:2 : Misconfigured AWS Accounts Are Fueling Phishing Campaigns
- 17:33 : Contextual AI’s new AI model crushes GPT-4o in accuracy — here’s why it matters
- 17:33 : Hackers Hijacking Access to Cloud-based AI Models With Exposed Keys in 19 Minutes
- 17:33 : Meet Rayhunter: A New Open Source Tool from EFF to Detect Cellular Spying
- 17:33 : ICS/OT Security Budgets Increasing, but Critical Areas Underfunded: Report
- 17:33 : Hacker Leaks Stolen Data After Cyberattack on Orange Group
- 17:33 : Samsung Secure Folder Vulnerability Exposes Hidden Images
- 17:33 : North Korea-Linked Hackers Target Crypto with RustDoor and Koi Stealer
- 17:33 : The Need for Unified Data Security, Compliance, and AI Governance
- 17:33 : Cisco Talos Uncovers Lotus Blossom’s Multi-Campaign Cyber Espionage Operations
- 17:33 : Researchers Link CACTUS Ransomware Tactics to Former Black Basta Affiliates
- 17:33 : New Cyber-Espionage Campaign Targets UAE Aviation and Transport
- 17:33 : Private 5G Networks Face Security Risks Amid AI Adoption
- 17:5 : IT Security News Hourly Summary 2025-03-04 18h : 29 posts
- 17:4 : JavaGhost Uses Amazon IAM Permissions to Phish Organizations
- 17:4 : Contextual.ai’s new AI model crushes GPT-4o in accuracy—here’s why it matters
- 17:3 : Edimax IC-7100 IP Camera
- 17:3 : Hitachi Energy MACH PS700
- 17:3 : Keysight Ixia Vision Product Family
- 17:3 : CISA Releases Eight Industrial Control Systems Advisories
- 17:3 : Hitachi Energy UNEM/ECST
- 16:34 : Aus für uBlock Origin in Chromium-Browsern – wie du den Werbeblocker jetzt noch nutzen kannst
- 16:34 : KI im Dilemma: Löst Probleme, versteht aber nicht warum – und das kann teuer werden
- 16:34 : Ein traumatisierter Chatbot: Warum Forscher jetzt ChatGPT "therapieren" wollen
- 16:34 : Upscaling-Fail: Wie Netflix eine 80er-Serie mit KI ruiniert
- 16:34 : Android-Nutzer verärgert: Google installiert Bildscanner ohne Zustimmung
- 16:32 : LLMjacking – Hackers Abuse GenAI With AWS NHIs to Hijack Cloud LLMs
- 16:32 : Google Secretly Tracks Android Devices Even Without User-Opened Apps
- 16:32 : CISA Adds Four Known Exploited Vulnerabilities to Catalog
- 16:32 : Digital nomads and risk associated with the threat of infiltred employees
- 16:32 : Intel TDX Connect Bridges the CPU-GPU Security Gap
- 16:32 : Hunters Announces New AI Capabilities with Pathfinder AI for Smarter SOC Automation
- 16:6 : Das Quantenrätsel: Den nächsten großen Sprung schaffen
- 16:6 : Romanian Distillery Scanning for SMTP Credentials, (Tue, Mar 4th)
- 16:6 : CISA issues warning against Qilin ransomware group
- 16:5 : GrassCall Malware Targets Job Seekers to Steal Login Credentials
- 16:5 : Researchers Unveil APT28’s Advanced HTA Trojan Obfuscation Tactics
- 16:5 : Microsoft Removing DES Encryption from Windows 11 24H2 and Windows Server 2025″
- 16:5 : Hackers Exploiting Business Relationships to Attack Arab Emirates Aviation Sector
- 16:5 : Microsoft Strengthens Trust Boundary for VBS Enclaves
- 16:5 : AI Asset Inventories: The Only Way to Stay on Top of a Lightning-fast Landscape
- 16:5 : VMware Security Flaws Exploited in the Wild—Broadcom Releases Urgent Patches
- 16:5 : VMware Warns Customers to Patch Actively Exploited Zero-Day Vulnerabilities
- 15:32 : Aqara’s first outdoor camera is this smart home enthusiast’s dream device
- 15:32 : What is BitLocker?
- 15:32 : Types of DNS servers and how they work, plus security threats
- 15:5 : Google, Meta and Apple Fuel the World’s Largest Surveillance Machine
- 15:5 : U.S. Seizes $31 Million Funds Drained from Crypto Exchange
- 15:5 : Tata Technologies Allegedly Breached – Huntress Claim Leak of Sensitive data
- 15:5 : Identity Verification — The Front Line to Workforce Security
- 15:5 : Red Canary expands Security Data Lake to help organizations optimize their SIEM costs
- 15:5 : Rubrik strengthens protection for cloud, SaaS, and on-premises environments
- 15:5 : Prioritizing data and identity security in 2025
- 14:33 : KI-Kameras für Krankenhaus
- 14:32 : Tool update: mac-robber.py, (Tue, Mar 4th)
- 14:32 : The Critical Role of CISOs in Managing IAM, Including NHIs
- 14:32 : What is vishing? Voice phishing is surging – expert tips on how to spot it and stop it
- 14:32 : I’ve never lost a drone in over a decade of flying them – here’s my secret
- 14:32 : Polish space agency says it’s investigating a cyberattack
- 14:32 : Google fixed two actively exploited Android flaws
- 14:32 : Aryon Security Debuts With Platform to Prevent Cloud Misconfigurations
- 14:5 : Did Trump Admin Order U.S. Cyber Command and CISA to Stand Down on Russia?
- 14:5 : Exploiting DeepSeek-R1: Breaking Down Chain of Thought Security
- 14:5 : Auxia raises $23.5 million to tackle enterprise marketing’s ‘reacquisition treadmill’
- 14:5 : IT Security News Hourly Summary 2025-03-04 15h : 19 posts
- 14:5 : eBook: What does it take to be a full-fledged virtual CISO?
- 13:33 : Kritische Lücke in VMware ESXi, Fusion und Workstation wird missbraucht
- 13:32 : Hunters International Claims Tata Technologies Cyberattack
- 13:32 : Five Reasons Retail Chains Can’t Ignore SASE
- 13:32 : How to Use KeePass: Step-by-Step Guide
- 13:32 : Polish Space Agency Hit by Cyberattack
- 13:7 : VMware ESXi: Mehrere Schwachstellen
- 13:7 : [NEU] [hoch] VMware ESXi: Mehrere Schwachstellen
- 13:6 : Google, Meta, and Apple Power the World’s Biggest Surveillance System
- 13:6 : Authorities Seize $31 Million Linked to Crypto Exchange Hack
- 13:6 : Salesforce’s AgentExchange launches with 200+ partners to automate your boring work tasks
- 13:6 : JFrog Becomes an AI System of Record, Debuts JFrog ML
- 13:5 : VMware ESXi Vulnerabilities Exploited in Wild to Execute Malicious Code
- 13:5 : New Android RAT Dubbed “AndroRAT” Attacking to Steal Pattern, PIN & Passcodes
- 13:5 : Docusnap for Windows Vulnerability Let Attackers Access Sensitive Data
- 13:5 : Hackers Attacking 4000+ ISPs With New Malware for Remote Access
- 13:5 : Vulnerabilities Patched in Qualcomm, Mediatek Chipsets
- 13:5 : North Korean Fake IT Workers Leverage GitHub to Build Jobseeker Personas
- 12:32 : New Chinese Zhong Stealer Infects Fintech via Customer Support
- 12:32 : Mass exploitation campaign hit 4,000+ ISP networks to deploy info stealers and crypto miners
- 12:32 : Trojaned AI Tool Leads to Disney Hack
- 12:32 : Broadcom Patches 3 VMware Zero-Days Exploited in the Wild
- 12:32 : Veriti Research Uncovers Malware Exploiting Cloud Services
- 12:6 : „Demokratie und Gemeinwohl: Online-Plattformen brauchen Kontrolle“
- 12:6 : Betrugsmasche ködert Opfer mit Paypal-“No Code Checkout”-Seiten
- 12:6 : Spionage möglich: Google warnt vor aktiv ausgenutzten Android-Lücken
- 12:6 : [UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen ermöglichen Privilegieneskalation
- 12:6 : [UPDATE] [niedrig] wpa_supplicant: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen
- 12:6 : [UPDATE] [mittel] Red Hat Enterprise Linux (Raptor2): Mehrere Schwachstellen ermöglichen Denial of Service
- 12:6 : [UPDATE] [mittel] PostgreSQL: Mehrere Schwachstellen
- 12:5 : Google Patches Pair of Exploited Vulnerabilities in Android
- 12:4 : CISO Liability Risks Spur Policy Changes at 93% of Organizations
- 11:33 : Keine Datenlecks mehr: TrapC soll die Speicherprobleme von C und C++ beheben
- 11:33 : Patchday: Angreifer attackieren Android-Smartphones
- 11:32 : TSMC To Spend $100bn On New US Plants
- 11:32 : Amazon To Invest $8.2bn To Expand India Cloud Infrastructure
- 11:32 : Docusnap for Windows Flaw Exposes Sensitive Data to Attackers
- 11:32 : Booking a Threat: Inside LummaStealer’s Fake reCAPTCHA
- 11:32 : CISA Warns of Windows Win32k Vulnerability Exploited to Run Arbitrary code
- 11:32 : How New AI Agents Will Transform Credential Stuffing Attacks
- 11:5 : So nutzen Betrüger Social-Media-Plattformen aus
- 11:5 : [NEU] [hoch] ESRI ArcGIS: Mehrere Schwachstellen
- 11:5 : [NEU] [hoch] Android Patchday März 2025: Mehrere Schwachstellen
- 11:5 : [UPDATE] [mittel] vim (tar.vim plugin): Schwachstelle ermöglicht Codeausführung
- 11:5 : IT Security News Hourly Summary 2025-03-04 12h : 17 posts
- 11:4 : CISA Warns of Active Exploitation of Microsoft Windows Win32k Vulnerability
- 11:4 : Exploitation Long Known for Most of CISA’s Latest KEV Additions
- 10:33 : Android Patchday März 2025: Mehrere Schwachstellen
- 10:33 : Bald nur noch Maschinen am Telefon? Wie KI das Callcenter erobert
- 10:33 : Angriff auf Siri: Google bringt Gemini auf den Sperrbildschirm eures iPhones
- 10:33 : HP stopft 233 Sicherheitslecks im Thin-Client-OS ThinPro
- 10:32 : Eutelsat Shares Jump After Trump-Zelensky Meltdown
- 10:32 : SEC To Drop Lawsuit Against Crypto Exchange Kraken
- 10:32 : How Google tracks Android device users before they’ve even opened an app
- 10:32 : Over 4,000 ISP IPs Targeted in Brute-Force Attacks to Deploy Info Stealers and Cryptominers
- 10:32 : Suspected Iranian Hackers Used Compromised Indian Firm’s Email to Target U.A.E. Aviation Sector
- 10:32 : CISA Urges Government to Patch Exploited Cisco, Microsoft Flaws
- 10:7 : OT-Systeme: Fertigungsbranche mit Spear Phishing konfrontiert
- 10:7 : Mit OCEAN auf der Spur von Hackern und manipulierter Software
- 10:7 : KI-Trainingsdaten: Tausende gültiger API-Keys in gecrawlten Webdaten entdeckt
- 10:5 : Juggling Cyber Risk Without Dropping the Ball: Five Tips for Risk Committees to Regain Control of Threats
- 10:5 : Half of Online Gambling Firms Lose 10% of Revenue to Fraud
- 9:36 : Samsung Android: Mehrere Schwachstellen
- 9:36 : [NEU] [mittel] IBM Business Automation Workflow: Mehrere Schwachstellen ermöglichen Denial of Service
- 9:36 : [NEU] [hoch] Samsung Android: Mehrere Schwachstellen
- 9:34 : At DeepSeek, Liberal Arts Graduates Give AI Human Touch
- 9:34 : Nvidia, Broadcom Running Manufacturing Tests With Intel
- 9:34 : What is SaaS Security Posture Management (SSPM)?
- 9:34 : Enhancing Security Monitoring with Tripwire’s Change Audit: New Rules for Firewalls, WFP, and Microsoft Store Applications
- 9:34 : DPRK IT Fraud Network Uses GitHub to Target Global Companies
- 9:6 : [NEU] [mittel] MinIO: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen
- 9:5 : Update Alert: Google Warns of Critical Android Vulnerabilities Under Exploit
- 9:5 : 33.3 Million Cyber Attacks Targeted Mobile Devices In 2024, Keep Your Devices Safe!
- 9:5 : IBM Storage Virtualize Vulnerabilities Let Attackers Execute Arbitrary Code
- 9:5 : BigAnt Server 0-day Vulnerability Let Attackers Execute Malicious Code Via File Uploads
- 9:5 : Threat Actors Leveraging AES Cryptography For Payload Protection
- 9:5 : Google Warns of Two Critical Android Vulnerabilities Under Attack – Update Now!
- 9:4 : It’s bad enough we have to turn on cams for meetings, now the person staring at you may be an AI deepfake
- 9:4 : Immuta AI and Copilot enhance data governance at scale
- 8:33 : Insolvenz und Betriebsrente: Das müssen Arbeitgeber wissen
- 8:32 : BigAnt Server 0-Day Vulnerability Lets Attackers Run Malicious Code Remotely
- 8:32 : CISA denies claims, Ransomware group claims attack, Latin America’s security crisis
- 8:5 : Attacken auf Sicherheitslecks in Cisco RV-Routern, WhatsUp Gold und Windows
- 8:5 : IT Security News Hourly Summary 2025-03-04 09h : 9 posts
- 8:4 : The More You Care, The More You Share: Information Sharing and Cyber Awareness
- 8:4 : Key Takeaways from the CSA Understanding Data Security Risk Survey
- 7:32 : CISA maintains stance on Russian cyber threats despite policy shift
- 7:32 : VulnCheck Exposes CVEs from Black Bastas’ Chats
- 7:32 : US Pauses Offensive Cyber-Ops Against Russia
- 7:5 : How to Prevent a Second Cyber Attack After the First: A Guide to Strengthening Your Cybersecurity Post-Breach
- 7:5 : Open Source Security Risks Continue to Rise
- 7:5 : News alert: Bubba AI launches Comp AI to help 100,000 startups get SOC 2 compliant by 2032
- 7:5 : Building cyber resilience in banking: Expert insights on strategy, risk, and regulation
- 6:32 : DDoS attacks by 30k botnets and IBM n Vodafone safe internet from quantum computing attacks
- 6:32 : Bubba AI, Inc. is Launching Comp AI to Help 100,000 Startups Get SOC 2 Compliant by 2032.
- 6:32 : Cisco, Hitachi, Microsoft, and Progress Flaws Actively Exploited—CISA Sounds Alarm
- 6:5 : Progress WhatsUp Gold Path Traversal Vulnerability Exposes Systems to Remote code Execution
- 6:5 : IBM Storage Virtualize Flaws Allow Remote Code Execution
- 6:5 : CISA Warns of Cisco Small Business Routers Vulnerability Exploited in Wild
- 6:5 : Why a push for encryption backdoors is a global security risk
- 6:5 : CISO vs. CIO: Where security and IT leadership clash (and how to fix it)
- 5:5 : CISA Alerts on Active Exploitation of Cisco Small Business Router Flaw
- 5:5 : IT Security News Hourly Summary 2025-03-04 06h : 2 posts
- 5:5 : Cybersecurity jobs available right now: March 4, 2025
- 5:5 : Google’s March 2025 Android Security Update Fixes Two Actively Exploited Vulnerabilities
- 4:4 : 7 Stages of Non-Human Identity Security Maturity
- 3:32 : Plugging the holes in open banking
- 2:32 : ISC Stormcast For Tuesday, March 4th, 2025 https://isc.sans.edu/podcastdetail/9348, (Tue, Mar 4th)
- 2:32 : So … Russia no longer a cyber threat to America?
- 2:5 : IT Security News Hourly Summary 2025-03-04 03h : 1 posts
- 1:5 : Winners of Most Inspiring Women in Cyber Awards 2025 Revealed
- 0:32 : Lee Enterprises ransomware attack halts freelance and contractor payments
- 0:4 : Mozilla Revises Firefox Terms of Use After Inflaming Users Over Data Usage
- 23:5 : IT Security News Hourly Summary 2025-03-04 00h : 3 posts