210 posts were published in the last hour
- 22:55 : IT Security News Daily Summary 2025-05-11
- 20:32 : You think ransomware is bad now? Wait until it infects CPUs
- 20:5 : IT Security News Hourly Summary 2025-05-11 21h : 1 posts
- 19:9 : Security Affairs newsletter Round 523 by Pierluigi Paganini – INTERNATIONAL EDITION
- 19:9 : SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 45
- 18:31 : StealC Malware Gets a Major Upgrade, Becomes More Dangerous
- 17:5 : IT Security News Hourly Summary 2025-05-11 18h : 1 posts
- 17:4 : Google will pay Texas $1.4 billion over its location tracking practices
- 16:6 : Co-op Cyberattack Exposes Member Data in Major Security Breach
- 16:6 : Threat Analysts Reveal How “Evil AI” is Changing Hacking Dynamics
- 15:32 : BSidesLV24 – Proving Ground – The Immortal Retrofuturism Of Mainframe Computers And How To Keep Them Safe
- 14:32 : Cobb County Suffers Alleged Data Breach by Russian Hackers
- 14:5 : IT Security News Hourly Summary 2025-05-11 15h : 1 posts
- 12:5 : Sicherheit: Microsoft Teams verhindert künftig Screenshots
- 11:7 : KI: Weder Utopie, noch Dystopie – Diese zwei Princeton-Forscher fordern eine neue Sichtweise
- 11:7 : Grusel-Glitch: ChatGPT erschreckt Nutzer mit dämonischer Stimme
- 11:6 : The Legacy Cyber Threat: Why We Must Prioritize Modernization
- 8:35 : Week in review: The impact of a CVE-free future on cyber defense, Patch Tuesday forecast
- 7:33 : S-TOP 2025: Treffen zum Wissensaustausch und Networking
- 5:0 : „Ich tippe das direkt aus meinem Gehirn“: Generative KI lässt Neuralink-Patienten schneller kommunizieren
- 4:34 : Microsoft Teams To Block Screen Capture During Meetings
- 23:5 : IT Security News Hourly Summary 2025-05-11 00h : 1 posts
- 23:4 : OpenAI kauft Windsurf: Ein Blick hinter die 3-Milliarden-Dollar-Übernahme
- 23:3 : Driving Innovation with Enhanced NHIDR Capabilities
- 23:3 : Stay Satisfied with Comprehensive Secrets Vaulting
- 23:3 : Feel Relieved with Efficient Secrets Rotation
- 23:2 : Building Adaptable NHIs for a Secure Future
- 22:55 : IT Security News Daily Summary 2025-05-10
- 22:33 : Keine Zugriffsrechte: Bremer Online-Meldeportal war jahrelang defekt
- 20:5 : IT Security News Hourly Summary 2025-05-10 21h : 3 posts
- 19:2 : Ascension reveals personal data of 437,329 patients exposed in cyberattack
- 18:32 : New AI System Lets Self-Driving Cars Share Road Experiences Like a Social Network
- 18:32 : Multiplatform Malware Campaign Uses PDF Invoices to Deploy Java-Based RAT
- 17:32 : Sophisticated PhaaS Phish Toolkits are Now Genetrating Realistic Fake Phishing Pages
- 17:7 : Bitcoin-Investments und Menopause-Fragen: Warum Metas KI-App zum Datenschutz-Albtraum wird
- 17:7 : Musik als Festplattenkiller: Wie ein Janet-Jackson-Song Windows-Laptops zerstörte
- 17:7 : GPT-4o, GPT-4.5 oder o1-pro? OpenAI verrät endlich, welches Modell wofür gedacht ist
- 17:7 : Vodafone: Warum jetzt „Betrug möglich!“ auf deinem Display erscheinen könnte
- 17:7 : „Fokus auf Wahrheit statt Ideologie“: Warum Musks Grok die Trump-Fans zur Weißglut treibt
- 17:5 : IT Security News Hourly Summary 2025-05-10 18h : 5 posts
- 17:5 : Critical Azure and Power Apps Vulnerabilities Allow Attackers to Exploit RCE
- 17:4 : Your Home Address Might be Available Online — Here’s How to Remove It
- 16:33 : How to Detecting Backdoors in Enterprise Networks
- 16:33 : BSidesLV24 – Proving Ground – Are You Content With Our Current Attacks On Content-Type?
- 16:7 : Bluetooth Core 6.1 Released – What’s New!
- 16:7 : Securing Windows Endpoints Using Group Policy Objects (GPOs): A Configuration Guide
- 16:7 : Google Secretly Tracked You — Pays $1.4 Billion Privacy Settlement To Texas
- 16:7 : EU Fines TikTok $600 Million for Data Transfers to China
- 16:7 : M&S Hackers Conned IT Help Desk Workers Into Accessing Firm Systems
- 15:32 : Chrome 137 Integrates Gemini Nano AI to Combat Tech Support Scams
- 15:32 : Co-op Hack Triggers Widespread Scam Risk for Consumers
- 15:32 : Magento Extension Supply Chain Attack Backdoors Hundreds of E-Commerce Sites
- 15:7 : DOGE Employee Computer Infected with Malware and Leaked Data Found Info-Stealer Logs
- 15:7 : Operation Moonlander dismantled the botnet behind Anyproxy and 5socks cybercriminals services
- 14:32 : Google Chrome Uses Advanced AI to Combat Sophisticated Online Scams
- 14:32 : Why CISOs Must Prioritize Cybersecurity Culture in Remote Work
- 14:32 : Feds disrupt proxy-for-hire botnet, indict four alleged net miscreants
- 14:5 : IT Security News Hourly Summary 2025-05-10 15h : 1 posts
- 13:32 : North Korea’s OtterCookie Malware Added a New Feature to Attack Windows, Linux, and macOS
- 13:7 : Keine Zugriffsrechte: Bremer Online-Meldeportal war jahrelang kaputt
- 12:32 : “PupkinStealer” A New .NET-Based Malware Steals Browser Credentials & Exfiltrate via Telegram
- 11:5 : IT Security News Hourly Summary 2025-05-10 12h : 1 posts
- 11:4 : Das passiert, wenn ein Youtuber sein Netflix-Passwort mit der Welt teilt
- 11:4 : Google Gemini: Diese Mini-Änderung spart euch stundenlanges Bilderchaos
- 11:4 : Deepfakes von Berliner Forschern imitieren den Herzschlag
- 11:4 : 19 Milliarden gestohlene Passwörter: Was du unbedingt vermeiden solltest
- 11:3 : Action-Figur aus ChatGPT: Das Risiko hinter dem lustigen Trend
- 11:2 : Steganography Challenge: My Solution, (Sat, May 10th)
- 11:2 : ICE’s Deportation Airline Hack Reveals Man ‘Disappeared’ to El Salvador
- 11:2 : Five things we learned from WhatsApp vs. NSO Group spyware lawsuit
- 11:2 : UK Ministry of Defence is spending less with US biz, and more with Europeans
- 10:31 : Your Android phone is getting a new security secret weapon – and it’s a big deal
- 10:4 : Beware! Fake AI Video Generation Platforms Drop Stealer Malware on Your Computers
- 9:4 : 20 Years old Proxy Botnet Network Dismantled That Exploits 1000 Unique Unpatched Devices Weekly
- 8:5 : IT Security News Hourly Summary 2025-05-10 09h : 3 posts
- 7:33 : Bedrohungen im Gesundheitswesen: Grobe Verstöße beim Datenschutz
- 7:32 : Germany Shuts Down eXch Over $1.9B Laundering, Seizes €34M in Crypto and 8TB of Data
- 7:32 : Google Pays $1.375 Billion to Texas Over Unauthorized Tracking and Biometric Data Collection
- 7:5 : Building IDP Resilience
- 7:4 : How to rationalize IDPs (without painful migrations)
- 7:4 : Exposing a Government Data Breach: Whistleblower Tells All – Cybersecurity Today Special Report
- 5:33 : Anzeige: So bringen Unternehmen KI und Datenschutz unter einen Hut
- 5:4 : Catching a phish with many faces
- 4:31 : Japanese Logistics Firm KWE Faces Ransomware Attack, Causing Service Delays
- 3:2 : Microsoft Listens to Security Concerns and Delays New OneDrive Sync
- 2:2 : Chinese Hackers Exploit SAP RCE Vulnerability to Upload Supershell Backdoors
- 2:2 : Threat Actors Attacking Job Seekers With Three New Unique Adversaries
- 23:5 : Lebenslang ChatGPT? OpenAI testet neue Abo-Modelle
- 23:5 : Echo-Effekt: Neue Cyber-Waffe zwingt Malware zur Selbstzerstörung
- 23:5 : IT Security News Hourly Summary 2025-05-10 00h : 5 posts
- 22:55 : IT Security News Daily Summary 2025-05-09
- 22:9 : Threat Brief: CVE-2025-31324
- 22:9 : How Signal, WhatsApp, Apple, and Google Handle Encrypted Chat Backups
- 21:34 : Stay Confident with Robust Secrets Management
- 21:34 : How Protected Are Your NHIs in Cloud Environments?
- 21:34 : Feel Reassured with Advanced Secret Scanning
- 21:34 : Week in Review: Agriculture ransomware increase, Congress challenges CISA cuts, Disney’s slacker hacker
- 21:5 : What your tools miss at 2:13 AM: How gen AI attack chains exploit telemetry lag – Part 1
- 21:5 : News brief: AI security risks highlighted at RSAC 2025
- 21:4 : Hackers Attacking IT Admins by Poisoning SEO to Move Malware on Top of Search Results
- 20:5 : IT Security News Hourly Summary 2025-05-09 21h : 10 posts
- 19:32 : OpenText Report Shines Spotlight on Malware Infection Rates
- 19:32 : Congratulations to the Top MSRC 2025 Q1 Security Researchers!
- 19:4 : A cyber attack briefly disrupted South African Airways operations
- 19:4 : Malicious Python Package Mimic as Attacking Discord Developers With Malicious Remote Commands
- 18:31 : COLDRIVER Using New Malware To Steal Documents From Western Targets and NGOs
- 18:8 : Google Chrome will use AI to block tech support scam websites
- 18:8 : OpenAI’s $3B Windsurf move: the real reason behind its enterprise AI code push
- 18:7 : VC behemoth Insight Partners fears top-secret financial info swiped by cyber-miscreants
- 18:7 : OtterCookie v4 Adds VM Detection and Chrome, MetaMask Credential Theft Capabilities
- 18:7 : BREAKING: 7,000-Device Proxy Botnet Using IoT, EoL Systems Dismantled in U.S. – Dutch Operation
- 18:7 : 6 Year Old Sleeper Attack Uncovered, Fake Bank Draft Scam, and Signal Tool Breach
- 18:7 : Critical Cybersecurity Breaches: OneDrive Default Settings, PowerSchool Ransom, and DOGE Staffer Compromises
- 17:32 : Cyberattackers Targeting IT Help Desks for Initial Breach
- 17:32 : US Customs and Border Protection Plans to Photograph Everyone Exiting the US by Car
- 17:32 : FBI and Dutch police seize and shut down botnet of hacked routers
- 17:7 : Sicherheitsexperten erklären: Darum sollte dein Passwort mindestens 16 Zeichen lang sein
- 17:7 : Diese KI bestimmt das biologische Alter nur per Foto: So sollen Patienten davon profitieren
- 17:7 : Retro-Charme trifft auf künstliche Intelligenz: Diese App verbindet Karl Klammer mit KI
- 17:7 : Netflix bekommt ein neues Design: Was sich auf deinem Fernseher ändert
- 17:7 : Whatsapp auf der Smartwatch: So nutzt du den Messenger am Handgelenk
- 17:6 : Threat Actors Target Job Seekers with Three New Unique Adversaries
- 17:5 : Hackers Weaponizing Facebook Ads to Deploy Multi-Stage Malware Attacks
- 17:5 : New Stealthy .NET Malware Hiding Malicious Payloads Within Bitmap Resources
- 17:5 : OpenAI’s $3B Windsurf move: the real reason behind its enterprise AI agent code push
- 17:5 : New Mamona Ransomware Attack Windows Machines by Abusing Ping Commands
- 17:5 : Google to Launch Gemini AI for Children Under 13
- 17:5 : IT Security News Hourly Summary 2025-05-09 18h : 7 posts
- 16:32 : Immutable Secrets Management: A Zero-Trust Approach to Sensitive Data in Containers
- 16:32 : MCP: A Comprehensive Guide to Extending AI Capabilities
- 16:32 : ColorTokens + Nozomi Networks: A Partnership That’s Built for the Trenches of OT and IoT Security
- 16:6 : Bill Gates Hits Out At Elon Musk Over Children Deaths
- 16:6 : Phishing Attack Uses Blob URIs to Show Fake Login Pages in Your Browser
- 16:6 : RSA Conference 2025: How Agentic AI Is Redefining Trust, Identity, and Access at Scale
- 16:6 : Global Cybercrime Crackdown Dismantles Major Phishing-as-a-Service Platform ‘LabHost’
- 16:6 : AI Bots Fuel 57% of Holiday Shopping Traffic, Study Finds
- 16:6 : UK Retail Sector Hit by String of Cyberattacks, NCSC Warns of Wake-Up Call
- 16:6 : Russian Hacktivists Disrupt Dutch Institutions with DDoS Attacks
- 15:33 : Sabotage: CDU wehrt sich gegen gefälschte Internetseite von Merz
- 15:33 : No cyber threat to India ATMs from Pakistan Ransomware Attack
- 15:33 : Scattered Spider Malware Targets Klaviyo, HubSpot, and Pure Storage Platforms
- 15:32 : Mobile security matters: Protecting your phone from text scams
- 15:32 : 5 Must-Have Security Features for Native Apps
- 15:32 : New Supply Chain Attack Targets Legitimate npm Package with 45,000 Weekly Downloads
- 15:32 : How to manage migration of hsm1.medium CloudHSM clusters to hsm2m.medium
- 15:4 : In Other News: India-Pakistan Cyberattacks, Radware Vulnerabilities, xAI Leak
- 14:33 : Windows Server: AD-Anmeldeprobleme nach Installation der April-Updates
- 14:32 : Gain Deeper Visibility into Risks to Meet Security Compliance Demands
- 14:32 : Popular Scraping Tool’s NPM Package Compromised in Supply Chain Attack
- 14:32 : It’s Not Your MSP, It’s Your SEG: Email Security History 101 (Part 1)
- 14:32 : Kasada Ranks #4 Among Australia’s Best Technology Employers in 2025
- 14:6 : Kurz vor Schließung: Von Kryptodieben genutztes Swapping-Portal zerschlagen
- 14:5 : Celsius Founder Alex Mashinsky Sentenced To 12 Years In Prison
- 14:5 : Hackers Target IT Admins by Poisoning SEO to Push Malware to Top Search Results
- 14:5 : Chinese Hackers Exploit SAP RCE Vulnerability to Deploy Supershell Backdoors
- 14:5 : WatchGuard transitions new CEO
- 14:5 : 160,000 Impacted by Valsoft Data Breach
- 14:5 : IT Security News Hourly Summary 2025-05-09 15h : 9 posts
- 13:34 : Videoüberwachung und Gesichtserkennung: Duo für Sicherheit
- 13:33 : Apple Developing Specialised Chips For Smart Glasses, AI Servers – Report
- 13:33 : New Supply Chain Attack Compromises Popular npm Package with 45,000 Weekly Downloads
- 13:33 : Malicious Python Package Impersonates Discord Developers to Deploy Remote Commands
- 13:33 : New Mamona Ransomware Targets Windows Systems Using Abused Ping Command
- 13:33 : April 2025 Malware Spotlight: FakeUpdates Dominates as Multi-Stage Campaigns Blend Commodity Malware with Stealth
- 13:33 : RSAC 2025 Conference: Identity security highlights
- 13:33 : Florida bill requiring encryption backdoors for social media accounts has failed
- 13:32 : Fake AI platforms deliver malware diguised as video content
- 13:8 : Indirect Prompt Injection Exploits LLMs’ Lack of Informational Context
- 13:8 : Hackers Exploit PDF Invoices to Target Windows, Linux, and macOS Systems
- 13:8 : Threat Actors Leverage Multimedia Systems in Stealthy Vishing Attacks
- 13:8 : Zencoder launches Zen Agents, ushering in a new era of team-based AI for software development
- 13:8 : Cybercriminal services target end-of-life routers, FBI warns
- 13:8 : State of ransomware in 2025
- 13:8 : Threat Actors Using Multimedia Systems Via Stealthy Vishing Attack
- 13:8 : Scattered Spider Malware Targeting Klaviyo, HubSpot, and Pure Storage Services
- 13:8 : openSUSE deep sixes Deepin desktop over security stink
- 13:8 : Malicious NPM Packages Target Cursor AI’s macOS Users
- 12:33 : Legacy Login in Microsoft Entra ID Exploited to Breach Cloud Accounts
- 12:33 : FreeDrain Phishing Attack Targets Users to Steal Financial Login Credentials
- 12:33 : LockBit Hacked – 20 Critical CVEs Exploited by LockBit Uncovered
- 12:33 : Hackers Weaponizing PDF Invoices to Attack Windows, Linux & macOS Systems
- 12:33 : Hackers Using Windows Remote Management to Stealthily Navigate Active Directory Network
- 12:33 : Rising Tides: Kelley Misata on Bringing Cybersecurity to Nonprofits
- 12:33 : Deploying AI Agents? Learn to Secure Them Before Hackers Strike Your Business
- 12:33 : Initial Access Brokers Target Brazil Execs via NF-e Spam and Legit RMM Trials
- 12:33 : Google Deploys On-Device AI to Thwart Scams on Chrome and Android
- 12:0 : Windows Server 2025: AD-Anmeldeprobleme nach Installation der April-Updates
- 11:33 : Datenleck bei Parkhausbetreiber APCOA
- 11:33 : [NEU] [mittel] Linux Kernel: Mehrere Schwachstellen
- 11:32 : Agenda Ransomware Group Adds SmokeLoader and NETXLOADER to Their Arsenal
- 11:32 : Essential Cybersecurity Controls (ECC-1:2018) – A Comprehensive Guide
- 11:32 : Tripwire Patch Priority Index for April 2025
- 11:32 : LockBit Ransomware Gang Breached, Secrets Exposed
- 11:32 : SAP Zero-Day Targeted Since January, Many Sectors Impacted
- 11:32 : LockBit hacked: What does the leaked data show?
- 11:32 : UN Launches New Cyber-Attack Assessment Framework
- 11:5 : IT Security News Hourly Summary 2025-05-09 12h : 20 posts
- 11:1 : Landen eure biometrischen Passbilder bei Amazon? Sicherheitsexperten warnen vor den Folgen
- 11:1 : Chrome: So soll euch der Google-Browser künftig vor Online-Betrug schützen
- 11:1 : Kurz vor Schließung: Polizei zerschlägt von Kriminellen genutztes Kryptoportal
- 10:34 : Apple verstärkt seine Sicherheitsfunktionen für Kinder: Welche Auswirkungen hat das? | Offizieller Blog von Kaspersky
- 10:34 : [NEU] [mittel] Eclipse Jetty: Mehrere Schwachstellen
- 10:34 : [NEU] [mittel] IBM TXSeries Multiplatforms: Mehrere Schwachstellen ermöglichen Codeausführung
- 10:34 : [NEU] [niedrig] Erlang/OTP: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen
- 10:34 : [NEU] [niedrig] Checkmk: Schwachstelle ermöglicht Offenlegung von Informationen
- 10:33 : Stealthy .NET Malware: Hiding Malicious Payloads as Bitmap Resources
- 10:33 : If you own an AirTag, you need these accessories to maximize its potential
- 10:33 : What Should You Consider When Choosing an AI Penetration Testing Company?
- 10:33 : Critical Azure & Power Apps Vulnerabilities Let Attackers Escalate Privileges
- 10:33 : Company and Personal Data Compromised in Recent Insight Partners Hack