188 posts were published in the last hour
- 21:33 : Ransomware-Gang: Fahndungserfolg in der Republik Moldau
- 21:3 : Apple Updates Everything: May 2025 Edition, (Mon, May 12th)
- 21:2 : Backdoored Magento Extensions Impact Multiple Online Stores
- 21:2 : OpenAI just fixed ChatGPT’s most annoying business problem: meet the PDF export that changes everything
- 21:2 : U.S. CISA adds TeleMessage TM SGNL to its Known Exploited Vulnerabilities catalog
- 20:7 : Ransomware-Gang: Fahnungserfolg in der Republik Moldau
- 20:5 : IT Security News Hourly Summary 2025-05-12 21h : 11 posts
- 19:34 : China, US Reach Deal To Pause Punitive Tariffs
- 19:34 : New Noodlophile Malware Spreads Through Fake AI Video Generation Platforms
- 19:33 : Lumma Stealer Upgraded with PowerShell Tools and Advanced Evasion Techniques
- 19:33 : Your old router could be a security threat – here’s why and what to do
- 19:33 : Forrester’s Top 10 Emerging Tech for 2025: Which 3 are Standouts?
- 19:33 : CISA mutes own website, shifts routine cyber alerts to Musk’s X, RSS, email
- 19:33 : Apple Patches Major Security Flaws in iOS, macOS Platforms
- 19:33 : What CIOs and CISOs Are Saying About Fake IT Workers: 4 Key Takeaways
- 19:33 : Monitoring and optimizing the cost of the unused access analyzer in IAM Access Analyzer
- 19:3 : APT37 Hackers Use Weaponized LNK Files and Dropbox for Command-and-Control Operations
- 19:3 : Kimsuky Hacker Group Deploys New Phishing Techniques and Malware Campaigns
- 19:3 : AI-Based Threat Detection in Cloud Security
- 19:3 : Researchers found one-click RCE in ASUS’s pre-installed software DriverHub
- 19:3 : Why aggregating your asset inventory leads to better security
- 18:32 : 82,000 WordPress Sites Affected by Arbitrary File Upload Vulnerability in TheGem WordPress Theme
- 18:32 : The default TV setting you should turn off ASAP – and why experts recommend it
- 18:32 : Nitrogen Ransomware Exploits Antirootkit Driver File to Disable AV & EDR Tools
- 18:32 : Hackers Arrested for Ransomware Attacks on Dutch Firms, Causing €4.5 Million in Damages
- 18:32 : Marbled Dust leverages zero-day in Output Messenger for regional espionage
- 18:32 : Law enforcement takes down proxy botnets used by criminals
- 17:32 : Attackers pwn charter airline helping Trump’s deportation campaign
- 17:32 : Technical Advisory Committees Election Results
- 17:9 : Heuschnupfen clever managen: Die 5 besten Apps für die Pollenflug-Saison
- 17:8 : Google Messages: So könnt ihr künftig peinliche Nachrichten wieder zurückziehen
- 17:8 : Wie ein neues KI-Echtzeit-System für Kopfhörer unterschiedliche Sprachen gleichzeitig übersetzt
- 17:7 : FakeUpdates, Remcos, AgentTesla Top Malware Charts in Stealth Attack Surge
- 17:7 : You could get $10K from 23andMe’s data breach – how to file a claim today
- 17:7 : Horabot Unleashed: A Stealthy Phishing Threat
- 17:7 : Lumma Stealer Evolves with New PowerShell Tools & Advanced Techniques
- 17:7 : Linux Firewall IPFire 2.29 Core Update 194 Released with Security Enhancements
- 17:7 : Implementing safety guardrails for applications using Amazon SageMaker
- 17:5 : IT Security News Hourly Summary 2025-05-12 18h : 17 posts
- 16:32 : India Issues Alert On Pakistan-Based Malware “Dance of the Hillary”
- 16:32 : How to disable ACR on your TV (and why you shouldn’t wait to do it)
- 16:32 : Encrypt AI, Protect Your IP: DataKrypto Tackles the LLM Security Crisis While Redefining What Encryption Should Be!
- 16:5 : What should we learn from International Anti Ransomware Day
- 16:5 : Update to How CISA Shares Cyber-Related Alerts and Notifications
- 16:5 : Vulnerability Summary for the Week of May 5, 2025
- 16:5 : Hacktivist Attacks on India Overstated Amid APT36 Espionage Threat
- 15:32 : Open Source Linux Firewall IPFire 2.29 – Core Update 194 Released: What’s New!
- 15:32 : Kimsuky Hacker Group Employs New Phishing Tactics & Malware Infections
- 15:32 : BSidesLV24 – Proving Ground – Demystifying SBOMs: Strengthening Cybersecurity Defenses
- 15:32 : ⚡ Weekly Recap: Zero-Day Exploits, Developer Malware, IoT Botnets, and AI-Powered Scams
- 15:32 : ASUS Patches DriverHub RCE Flaws Exploitable via HTTP and Crafted .ini Files
- 15:8 : 20-Year-Old Proxy Botnet Network Dismantled After Exploiting 1,000 Unpatched Devices Each Week
- 15:8 : Threat Actors Leverage DDoS Attacks as Smokescreens for Data Theft
- 15:8 : How Trustworthy Is Big Data?
- 15:8 : Your password manager is under attack: How to defend yourself against a new threat
- 15:8 : The Ongoing Risks of Hardcoded JWT Keys
- 15:8 : Cybersecurity Agencies on High Alert as Attacks Spike After Pahalgam Incident
- 15:8 : SentinelOne EDR Exploit Allows Babuk Ransomware Deployment Through Installer Abuse
- 15:8 : Kelly Benefits Data Leak Affects 260,000 People
- 15:8 : ⚡ Weekly Recap: Zero-Day Exploits, Developer Malware, IoT Botnets, and AI-Powered Scams
- 15:8 : Criminal Proxy Network Infects Thousands of IoT Devices
- 14:34 : Phishing Campaign Uses Blob URLs to Bypass Email Security and Avoid Detection
- 14:34 : “PupkinStealer” – .NET Malware Steals Browser Data and Exfiltrates via Telegram
- 14:34 : Security Firm Andy Frain Says 100,000 People Impacted by Ransomware Attack
- 14:34 : ⚡ Weekly Recap: Zero-Day Exploits, Developer Malware, IoT Botnets, and AI-Powered Scams
- 14:34 : #Infosec2025: Experts to Shine Light on Vendor Supply Chain Resilience Against Third-Party Risks
- 14:5 : It Is 2025, And We Are Still Dealing With Default IoT Passwords And Stupid 2013 Router Vulnerabilities, (Mon, May 12th)
- 14:5 : Is your Microsoft account passwordless yet? Why it (probably) should be and how to do it right
- 14:5 : 100 leading AI scientists map route to more ‘trustworthy, reliable, secure’ AI
- 14:5 : Threat actors use fake AI tools to deliver the information stealer Noodlophile
- 14:5 : Google Researchers Leverage Mach IPC Messages to Find and Exploit Sandbox Escapes
- 14:5 : VMware Tools Vulnerability Let Attackers Tamper Files to Trigger Malicious Operations
- 14:5 : ⚡ Weekly Recap: Zero-Day Exploits, Developer Malware, IoT Botnets, and AI-Powered Scams
- 14:5 : IT Security News Hourly Summary 2025-05-12 15h : 12 posts
- 13:33 : Netzwerk bei Zementproduzent wieder stabil
- 13:32 : AI, Agents, and the Future of Cyber Security
- 13:32 : Ransomware Reloaded: Why 2025 Is the Most Dangerous Year Yet
- 13:32 : ⚡ Weekly Recap: Zero-Day Exploits, Developer Malware, IoT Botnets, and AI-Powered Scams
- 13:5 : Google Agrees to $1.3 Billion Settlement in Texas Privacy Lawsuits
- 13:5 : Hunted Labs Entercept combats software supply chain attacks
- 13:5 : Compromised SAP NetWeaver instances are ushering in opportunistic threat actors
- 13:5 : ⚡ Weekly Recap: Zero-Day Exploits, Developer Malware, IoT Botnets, and AI-Powered Scams
- 13:5 : EU Launches Free Entry-Level Cyber Training Program
- 12:33 : VMware Tools Vulnerability Allows Attackers to Modify Files and Launch Malicious Operations
- 12:33 : SAP NetWeaver Vulnerability Exploited in Wild by Chinese Hackers
- 12:33 : Hackers Leverage JPG Images to Execute Fully Undetectable Ransomware
- 12:33 : 437,000 Impacted by Ascension Health Data Breach
- 12:33 : Security Gamechangers: CrowdStrike’s AI-Native SOC & Next Gen SIEM Take Center Stage at RSAC 2025
- 12:8 : Microsoft 365: Unterstützung nach Support-Ende von Windows 10
- 12:8 : [UPDATE] [hoch] Mozilla Firefox, Firefox ESR und Thunderbird: Mehrere Schwachstellen
- 12:8 : [UPDATE] [hoch] Mozilla Firefox, Mozilla Firefox ESR und Mozilla Thunderbird: Mehrere Schwachstellen
- 12:8 : [UPDATE] [hoch] Mozilla Firefox und Thunderbird: Mehrere Schwachstellen
- 12:8 : [UPDATE] [mittel] Nvidia Treiber: Mehrere Schwachstellen
- 12:7 : Zero Trust in the Age of Digital Transformation: The New Cybersecurity Paradigm
- 12:7 : The Persistence Problem: Why Exposed Credentials Remain Unfixed—and How to Change That
- 11:32 : Florida Backdoor Bill Fails
- 11:32 : US Deportation Airline GlobalX Confirms Hack
- 11:32 : Asus DriverHub Vulnerabilities Expose Users to Remote Code Execution Attacks
- 11:32 : FreeDrain Phishing Scam Drains Crypto Hobbyists’ Wallets
- 11:10 : Warum KI-Halluzinationen zunehmen, wenn wir von Chatbots knappe Antworten verlangen
- 11:10 : Praktische Funktion in iOS 19: Apple soll Umgang mit öffentlichen WLANs deutlich vereinfachen
- 11:10 : Gemini in Google Meet: Wie ihr per KI neue Hintergründe für Meetings erstellt
- 11:10 : Golem Karrierewelt: Live-Webinar: Microsoft Sentinel – SIEM in der Cloud
- 11:10 : Von AMD-Lücke inspiriert: Forscher warnt vor Ransomware im CPU-Microcode
- 11:6 : CoreWeave ‘Seeking $1.5bn In Debt’ After IPO Disappointment
- 11:6 : Deepfakes, Scams, and the Age of Paranoia
- 11:6 : Hackers Exploit Copilot AI for SharePoint to Access Passwords & Other Sensitive Data
- 11:6 : Cybercrime Escalates in 2025 as Hackers Target Everyday Devices with Sophisticated Attacks
- 11:6 : Microsoft Releases Detailed Guide to Fix Windows Blue Screen Errors
- 11:5 : Hackers Exploiting Legacy Protocols in Microsoft Entra ID to Bypass MFA & Conditional Access
- 11:5 : Major Retail Chains Suffer Data Breaches Amid Rising Cyber Threats to Consumer Trust
- 11:5 : A week in security (May 4 – May 10)
- 11:5 : Cybersecurity’s Early Warning System: How Live Network Traffic Analysis Detects The ‘Shock Wave’ Before the Breach ‘Tsunami’
- 11:5 : Firewall Rule Bloat: The Problem and How AI can Solve it
- 11:5 : IT Security News Hourly Summary 2025-05-12 12h : 8 posts
- 10:9 : [NEU] [mittel] IBM App Connect Enterprise Certified Container: Mehrere Schwachstellen
- 10:9 : [NEU] [niedrig] Linux Kernel: Mehrere Schwachstellen
- 10:8 : UK Government Backs AESC EV Battery Plant In £1bn Deal
- 10:8 : Huawei Shows First HarmonyOS Laptop
- 10:8 : Murdered Man Addresses Arizona Court In AI Video
- 10:8 : Google Settles Race Discrimination Lawsuit For $50m
- 10:8 : Anthropic Says DOJ Plan Would Harm AI Investment
- 10:8 : New SEO Poisoning Campaign Targeting IT Admins With Malware
- 10:8 : Metasploit Update Adds Erlang/OTP SSH Exploit and OPNSense Scanner
- 10:7 : Britain’s cyber agents and industry clash over how to tackle shoddy software
- 10:7 : German Authorities Take Down Crypto Swapping Service eXch
- 10:7 : Ensuring High Availability and Resilience in the ‘Everything App’ Era
- 10:7 : Resecurity One simplifies cybersecurity operations
- 9:34 : TuneUp und Dienste in Avast, AVG, Avira und Norton reißen Sicherheitslücken auf
- 9:34 : Als Proxy missbraucht: 20 Jahre altes Router-Botnetz zerschlagen
- 9:34 : [NEU] [mittel] Apache Commons Configuration: Schwachstelle ermöglicht Denial of Service
- 9:33 : Japanese Account Hijackers Make $2bn+ of Illegal Trades
- 9:5 : [NEU] [mittel] IBM Storage Scale: Mehrere Schwachstellen
- 9:5 : Google Researchers Use Mach IPC to Uncover Sandbox Escape Vulnerabilities
- 9:5 : A Subtle Form of Siege: DDoS Smokescreens as a Cover for Quiet Data Breaches
- 9:5 : Assessment Frameworks for NIS Directive Compliance
- 9:5 : PoC Exploit Released For Linux Kernel’s nftables Subsystem Vulnerability
- 9:5 : New Phishing Attack Abusing Blob URLs to Bypass SEGs and Evade Analysis
- 9:4 : US Announces Botnet Takedown, Charges Against Russian Administrators
- 8:36 : So schützt du deine Social-Media-Konten vor SIM-Swapping-Angriffen | Offizieller Blog von Kaspersky
- 8:36 : [NEU] [hoch] Kong Insomnia: Schwachstelle ermöglicht Codeausführung
- 8:36 : [NEU] [UNGEPATCHT] [mittel] Grub: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen
- 8:34 : Hackers Exploit Legacy Protocols in Microsoft Entra ID to Bypass MFA and Conditional Access
- 8:34 : Cybercriminals Hide Undetectable Ransomware Inside JPG Images
- 8:34 : Unending ransomware attacks are a symptom, not the sickness
- 8:34 : Fake AI Tools Used to Spread Noodlophile Malware, Targeting 62,000+ via Facebook Lures
- 8:34 : German Police Shutter “eXch” Money Laundering Service
- 8:5 : Microsoft 365: Support für Office-Apps unter Windows 10 plötzlich erweitert
- 8:5 : Mitel SIP Phone Flaws Allow Attackers to Inject Malicious Commands
- 8:5 : Defendnot: A Tool That Disables Windows Defender by Registering as Antivirus
- 8:5 : IT Security News Hourly Summary 2025-05-12 09h : 5 posts
- 8:5 : Hackers Abuse Copilot AI in SharePoint to Steal Passwords and Sensitive Data
- 7:34 : Gesundheitswesen in Gefahr: Schutzkonzepte gegen Bedrohungen
- 7:32 : Nvidia ‘Downgrading’ H20 AI Chip For China
- 7:32 : Defendnot — A New Tool That Disables Windows Defender by Posing as an Antivirus Solution
- 7:32 : Critical Vulnerabilities in Mitel SIP Phones Let Attackers Inject Malicious Commands
- 7:32 : Japan finance hacks, Pearson suffers cyberattack, Teams blocks screen captures
- 7:6 : Windows 10: Support für Microsoft-365-Apps überraschend erweitert
- 7:6 : [UPDATE] [mittel] Django: Schwachstelle ermöglicht Denial of Service
- 7:6 : [UPDATE] [mittel] PostgreSQL: Schwachstelle ermöglicht Denial of Service
- 7:5 : Microsoft Teams to Safeguard Meetings by Blocking Screen Snaps
- 7:5 : German police seized eXch crypto exchange
- 7:5 : When Visibility Meets Action in NHS Cybersecurity
- 7:4 : Bluetooth 6.1 released, enhances privacy and power efficiency
- 6:33 : [UPDATE] [mittel] Apache ActiveMQ: Schwachstelle ermöglicht Denial of Service
- 6:32 : Cyber Threats Target HR, AI Tools, and Critical Infrastructure: A Comprehensive Update
- 6:3 : DragonForce Ransomware targeting M&S vows not to target Russia or Soviet Union
- 6:3 : Can Your Photos Stored Online Cause Privacy Concerns
- 6:3 : New Exploit Method Extracts Microsoft Entra Tokens Through Beacon
- 6:3 : How to give better cybersecurity presentations (without sounding like a robot)
- 6:3 : Why security teams cannot rely solely on AI guardrails
- 5:32 : PoC Code Published for Linux nftables Security Vulnerability
- 5:32 : SPIRE: Toolchain of APIs for establishing trust between software systems
- 5:5 : IT Security News Hourly Summary 2025-05-12 06h : 1 posts
- 5:3 : [UPDATE] [hoch] Linux Kernel: Mehrere Schwachstellen
- 5:3 : DOGE worker’s old creds found exposed in infostealer malware dumps
- 5:3 : Facebook Flaws and Privacy Laws: A Journey into Early Social Media Security from 2009
- 5:2 : Layoffs pose a cybersecurity risk: Here’s why offboarding matters
- 4:32 : Despite drop in cyber claims, BEC keeps going strong
- 4:3 : Microsoft Teams verhindert mit neuer Funktion Screenshots
- 2:9 : ISC Stormcast For Monday, May 12th, 2025 https://isc.sans.edu/podcastdetail/9446, (Mon, May 12th)
- 23:6 : Strawberry ausprobiert: Der KI-Browser zeigt, wie smart Browsing wirklich sein kann
- 23:6 : Microsoft Teams: Neues Feature soll Screenshots in Meetings blockieren können
- 23:5 : Justify Your Investment in Cloud-Native NHIs
- 23:5 : Achieve Stability with Streamlined Secrets Management
- 23:5 : IT Security News Hourly Summary 2025-05-12 00h : 2 posts
- 22:58 : IT Security News Weekly Summary 19
- 22:55 : IT Security News Daily Summary 2025-05-11