210 posts were published in the last hour
- 21:32 : Fitting Cybersecurity Investments into Your Budget
- 21:32 : Free to Choose the Right Security for Your Cloud
- 20:9 : Why Your MTTR Is Too Slow — And How to Fix It Fast
- 20:5 : IT Security News Hourly Summary 2025-05-20 21h : 4 posts
- 19:32 : New RedisRaider Campaign Attacking Linux Servers by Abusing Redis Configuration
- 19:7 : New Go-Based Malware ‘RedisRaider’ Exploits Redis Servers to Mine Cryptocurrency
- 19:6 : 4G Calling (VoLTE) flaw allowed to locate any O2 customer with a phone call
- 18:32 : Securing iCloud Accounts – Best Practices for iPhone Users
- 18:32 : Hackers Exploit TikTok & Instagram APIs to Validate Stolen Accounts
- 18:32 : Preventing App-Based Threats on Android Devices – 2025’s Security Landscape
- 18:32 : Randall Munroe’s XKCD ‘Renormalization’
- 18:2 : The best VPN services for iPhone in 2025: Expert tested and reviewed
- 17:32 : The people in Elon Musk’s DOGE universe
- 17:32 : The State of AI in Cybersecurity 2025: What’s Working, What’s Lagging, and Why It Matters Now More Than Ever
- 17:6 : OpenAI enthüllt: Welches GPT-Modell passt wirklich zu deiner Aufgabe?
- 17:6 : NotebookLLM landet auf dem Smartphone: Das kann Googles KI-App
- 17:6 : Nvidia forciert Roboterentwicklung: Das können die neuen Groot-Modelle
- 17:6 : Action-Figuren aus ChatGPT: Der unsichtbare Preis deiner kreativen Fotos
- 17:6 : Copilot für eure Dateien: Microsoft verpasst jetzt auch dem Windows Explorer ein KI-Update
- 17:5 : How to Enable iOS Lockdown Mode for Enhanced Protection Against Sophisticated Cyber Threats
- 17:5 : OneDrive New Feature of Syncing Personal & Corporate Account is Rolling Out
- 17:5 : Best Android Security Apps for Enterprise and Personal Use
- 17:5 : Hackers Attacking Organizations with Weaponized RAR Archive to Deliver Pure Malware
- 17:5 : Hazy Hawk Exploits DNS Records to Hijack CDC, Corporate Domains for Malware Delivery
- 17:5 : IT Security News Hourly Summary 2025-05-20 18h : 20 posts
- 17:5 : How to automate incident response for Amazon EKS on Amazon EC2
- 16:33 : Vom OTP-Problem zur Entdeckung: Wie ein Autokäufer VWs App-Schwachstellen fand
- 16:32 : AI agent adoption is driving increases in opportunities, threats, and IT budgets
- 16:32 : Application Security Testing: Security Scanning and Runtime Protection Tools
- 16:5 : Ransomware attack on UK Food Distributor to supermarkets
- 16:5 : ABUP IoT Cloud Platform
- 16:5 : National Instruments Circuit Design Suite
- 16:5 : Danfoss AK-SM 8xxA Series
- 16:5 : Please Drone Responsibly: C-UAS Legislation Needs Civil Liberties Safeguards
- 16:5 : Freshly discovered bug in OpenPGP.js undermines whole point of encrypted comms
- 16:5 : Safeguarding Personal Privacy in the Age of AI Image Generators
- 16:5 : Understanding Cybersquatting: How Malicious Domains Threaten Brands and Individuals
- 16:5 : Here’s Why Websites Are Offering “Ad-Lite” Premium Subscriptions
- 16:5 : Uncensored AI Tool Raises Cybersecurity Alarms
- 15:36 : Accenture Files Leak – New Research Reveals Projects Controlling Billions of User Data
- 15:36 : INDIA Launches e-Zero FIR To Bolster Cybercrime Crackdown
- 15:36 : Stopping Chargeback Abuse: How Device Identification Protects Your Bottom Line
- 15:36 : Standards for a Machine‑First Future: SPICE, WIMSE, and SCITT
- 15:36 : Scripting Outside the Box: API Client Security Risks (2/2)
- 15:36 : 100+ Fake Chrome Extensions Found Hijacking Sessions, Stealing Credentials, Injecting Ads
- 15:8 : The End of VPNs — Part 2: Beyond the Buzz of Zero Trust
- 15:8 : Hazy Hawk Attack Spotted Targeting Abandoned Cloud Assets Since 2023
- 15:8 : More_Eggs Malware Uses Job Application Emails to Distribute Malicious Payloads
- 15:8 : Kimsuky APT Group Deploys PowerShell Payloads to Deliver XWorm RAT
- 15:8 : A security key for every employee? YubiKey-as-a-Service goes global
- 15:8 : GitHub Copilot’s New AI Coding Agent Saves Developers Time – And Requires Their Oversight
- 15:8 : Android Security Guide – Safeguarding Against Malware in 2025
- 15:8 : Serviceaide Cyber Attack Exposes 480,000 Catholic Health Patients’ Data
- 15:8 : 5 Ways to Connect IOCs to Real-World Threats for SOC Teams
- 15:8 : CISA Adds MDaemon Email Server XSS Vulnerability to KEV Catalog Following Exploitation
- 15:8 : VMware ESXi & vCenter Vulnerability Let Attackers Run Arbitrary Commands
- 15:7 : Debt Collector Data Breach Affects 200,000 Harbin Clinic Patients
- 14:32 : RedisRaider Campaign Targets Linux Servers by Exploiting Misconfigured Redis Instances
- 14:32 : Russian APT Groups Intensify Attacks in Europe with Zero-Day Exploits and Wipers
- 14:5 : IT Security News Hourly Summary 2025-05-20 15h : 21 posts
- 14:4 : Researchers Scanning the Internet, (Tue, May 20th)
- 14:4 : Regeneron to Buy 23andMe for $256M Amid Growing Data Privacy Concerns
- 14:4 : Hackers Abuse TikTok and Instagram APIs to Verify Stolen Account Credentials
- 14:3 : iPhone Security 101 – Protecting Your Device from Phishing Scams
- 14:3 : Microsoft to Integrate AI With Windows 11 File Explorer
- 14:3 : WordPress Plugin Vulnerability Exposes 22,000 Sites to Cyber Attacks
- 14:3 : NATO-Flagged Vulnerability Tops Latest VMware Security Patch Batch
- 14:3 : The OpenSSL Corporation and the OpenSSL Foundation Launch Distinguished Contributor Awards with OpenSSL 3.5 Honorees
- 13:34 : Thüringer Polizei modernisiert Leitstellen mit Frequentis
- 13:33 : LockBit Leak Shows Affiliates Use Pressure Tactics, Rarely Get Paid
- 13:33 : Hackers Use Weaponized RAR Archives to Deliver Pure Malware in Targeted Attacks
- 13:33 : CISA Includes MDaemon Email Server XSS Flaw in KEV Catalog
- 13:32 : Exploiting the AI Boom: How Threat Actors Are Targeting Trust in Generative Platforms like Kling AI
- 13:32 : Cynet boosts AI-powered threat detection accuracy
- 13:32 : AWS Default IAM Roles Found to Enable Lateral Movement and Cross-Service Exploitation
- 13:32 : South Asian Ministries Hit by SideWinder APT Using Old Office Flaws and Custom Malware
- 13:5 : Cyberattack on Serviceaide Compromises Data of 480,000 Catholic Health Patients
- 13:5 : A security key for every employee? Yubikey-as-a-Service goes global
- 13:5 : China-linked UnsolicitedBooker APT used new backdoor MarsSnake in recent attacks
- 13:5 : 23andMe and its customers’ genetic data bought by a pharmaceutical org
- 13:5 : Vulnerability Exploitation Probability Metric Proposed by NIST, CISA Researchers
- 13:5 : Red Hat Enterprise Linux 10 helps mitigate future quantum-based threats
- 13:5 : Product showcase: Secure digital and physical access with the Swissbit iShield Key 2
- 12:33 : Security Flaw in WordPress Plugin Puts 22,000 Websites at Risk of Cyber Attacks
- 12:33 : Threat Actors Deploy Bumblebee Malware via Poisoned Bing SEO Results
- 12:33 : Cloud Security and Privacy: Best Practices to Mitigate the Risks
- 12:33 : How to create a remote access policy, with template
- 12:33 : DPRK IT Workers Pose as Polish & US Nationals to Obtain Full-Stack Developer Roles
- 12:33 : Phishing Attack Prevention – Best Practices for 2025
- 12:33 : Adidas Data Breach – Customers’ Personal Information Exposed
- 12:33 : Threat Actors Deliver Bumblebee Malware Poisoning Bing SEO
- 12:33 : Ransomware attack on food distributor spells more pain for UK supermarkets
- 12:33 : TrustCloud Raises $15 Million for Security Assurance Platform
- 12:33 : Event Preview: 2025 Threat Detection & Incident Response (Virtual) Summit
- 12:6 : [NEU] [mittel] TYPO3 Core: Mehrere Schwachstellen
- 12:6 : [UPDATE] [mittel] GnuTLS: Schwachstelle ermöglicht Denial of Service
- 12:6 : [NEU] [hoch] TYPO3 Extensions: Mehrere Schwachstellen
- 12:5 : Compromised RVTools Installer Spreading Bumblebee Malware
- 12:5 : Qilin Exploits SAP Zero-Day Vulnerability Weeks Ahead of Public Disclosure
- 12:5 : Critical VMware Cloud Foundation Vulnerability Exposes Sensitive Data
- 12:5 : Your Data, Your Responsibility: Securing Your Organization’s Future in the Cloud
- 12:5 : Ransomware Simulation Playbook- Build Real-World Cyber Resilience Without Paying the Price
- 12:5 : The Crowded Battle: Key Insights from the 2025 State of Pentesting Report
- 12:5 : Mounting GenAI Cyber Risks Spur Investment in AI Security
- 11:35 : “Bits & Böses”: Wenn aus Worten Waffen werden – Hass im Netz
- 11:35 : Große Molkerei hat Lieferengpässe: Cyberangriff trifft deutsches Werk von Arla
- 11:35 : [NEU] [hoch] VMware Cloud Foundation: Mehrere Schwachstellen
- 11:33 : WordPress Plugin Flaw Puts 22,000 Websites at Risk of Cyber Attacks
- 11:33 : DoorDash Hack
- 11:33 : Tor Browser 14.5.2 Released With Bug Fixes & New Capabilities
- 11:33 : Malicious npm Package in Koishi Chatbots Silently Exfiltrate Sensitive Data in Real Time
- 11:33 : O2 VoLTE Vulnerability Exposes Location of Any Customer With a Phone Call
- 11:33 : Telecommunications Companies in Spain Experiencing Downtime
- 11:33 : Malware-infected printer delivered something extra to Windows users
- 11:33 : Trojanized KeePass opens doors for ransomware attackers
- 11:33 : Outpost24 simplifies threat analysis with AI-enhanced summaries
- 11:9 : Erinnerungsvermögen für KI: Wie Microsoft das Web neu erfinden will
- 11:9 : Genervt von schlechten Übersetzungen auf dem iPhone? So tauscht ihr Apples Standard-App gegen Google Translate
- 11:9 : Klimawandel: Warum ihr genau überlegen solltet, welche Aufgaben eine KI für euch erledigt
- 11:9 : No-Code vs. Vibe-Coding: Was bringt dich schneller zur eigenen KI-Anwendung?
- 11:9 : GitHub Copilot bekommt KI-Agenten: So soll die Funktion Entwickler unterstützen
- 11:9 : GNU Taler: Halbanonymes Bezahlsystem startet Betrieb in der Schweiz
- 11:9 : [UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service und unspezifische Angriffe
- 11:9 : [UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen
- 11:8 : UAE Recruiting US Personnel Displaced by DOGE to Work on AI for its Military
- 11:8 : DPRK IT Workers Impersonate Polish and US Nationals to Secure Full-Stack Developer Positions
- 11:5 : IT Security News Hourly Summary 2025-05-20 12h : 15 posts
- 10:33 : HCL-Domino-Add-on Leap gegen mögliche Attacken abgesichert
- 10:33 : Blackout: Wie gefährlich sind chinesische Wechselrichter?
- 10:33 : [NEU] [hoch] Ivanti Neurons for ITSM: Schwachstelle ermöglicht Erlangen von Administratorrechten
- 10:32 : Spain Orders Airbnb To Shut Down Listings
- 10:32 : Court Rules Delta Can Pursue CrowdStrike Over Mass Outage
- 10:32 : Critical Multer Vulnerability Puts Millions of Node.js Apps at Risk
- 10:32 : What to Expect When You’re Convicted
- 10:32 : O2 Service Vulnerability Exposed User Location
- 10:32 : CloudSEK Raises $19 Million for Threat Intelligence Platform
- 10:11 : Wie Phishing-E-Mails von no-reply@accounts.google.com versendet werden | Offizieller Blog von Kaspersky
- 10:10 : Biometrische Daten: EU einigt sich auf neues elektronisches Einreisesystem
- 10:8 : Duping Cloud Functions: An emerging serverless attack vector
- 10:8 : New Nitrogen Ransomware Targets Financial Firms in the US, UK and Canada
- 10:8 : Windows 11 Privilege Escalation Vulnerability Let Attackers Gain Admin Access in Under 300 Milliseconds
- 10:8 : How IoT Security Cameras Are Susceptible to Cyber Attacks
- 10:8 : Government Organizations Lose Nearly a Month in Downtime for Every Ransomware Attack
- 10:8 : UK’s Legal Aid Agency discloses a data breach following April cyber attack
- 10:8 : Intruder vs. Pentest Tools vs. Attaxion: Selecting The Right Security Tool
- 10:8 : Microsoft Releases Emergency Fix for BitLocker Recovery Issue
- 10:8 : Madhu Gottumukkala Officially Announced as CISA Deputy Director
- 10:8 : The Windows Subsystem for Linux goes open source
- 10:8 : Chinese Hackers Deploy MarsSnake Backdoor in Multi-Year Attack on Saudi Organization
- 9:34 : Forscher deckt auf: Vertrauliche Daten von VW-Besitzern waren frei abrufbar
- 9:33 : Italy Fines Replika AI Maker £4m Over Child Safety
- 9:32 : AMD Sells ZT’s AI Server Manufacturing Unit To Sanmina
- 9:32 : Microsoft Issues Urgent Patch to Resolve BitLocker Recovery Problem
- 9:32 : O2 VoLTE Flaw Allows Tracking of Customers’ Locations Through Phone Calls
- 9:32 : Half of Consumers Targeted by Social Media Fraud Ads
- 9:8 : Firefox: Mozilla schließt Sicherheitslücken aus Pwn2Own-Hacker-Wettbewerb
- 9:8 : [NEU] [hoch] Lexmark Multifunction Printer: Schwachstelle ermöglicht Codeausführung
- 9:8 : [NEU] [niedrig] IBM App Connect Enterprise: Schwachstelle ermöglicht Denial of Service
- 9:8 : [NEU] [mittel] OpenCTI: Schwachstelle ermöglicht Denial of Service
- 9:8 : [NEU] [hoch] Broadcom Automic Automation: Schwachstelle ermöglicht Privilegieneskalation
- 9:7 : Malicious npm Package in Koishi Chatbots Steals Sensitive Data in Real Time
- 9:7 : Virgin Media O2 patches hole that let callers snoop on your coordinates
- 9:7 : Go-Based Malware Deploys XMRig Miner on Linux Hosts via Redis Configuration Abuse
- 9:7 : New 23andMe Buyer Regeneron Promises to Prioritize Security
- 8:33 : [NEU] [hoch] VMware Tanzu Spring Security: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen
- 8:32 : Dell Taps Nvidia Blackwell Ultra For Latest AI Servers
- 8:32 : Microsoft’s GitHub Offers AI Coding Agent
- 8:32 : Tycoon2FA Linked Phishing Attack Targeting Microsoft 365 Users to Steal Logins
- 8:32 : W3LL Phishing Kit Actively Attacking Users to Steal Outlook Login Credentials
- 8:32 : CISA Adds Ivanti EPMM 0-day to KEV Catalog Following Active Exploitation
- 8:32 : Multiple pfSense Firewall Vulnerabilities Let Attackers Inject Malicious Codes
- 8:12 : Partnerangebot: Blackfort Technology – „Schwachstellenmanagement in der Praxis – So setzen Sie DORA & andere regulatorische Vorgaben um“
- 8:12 : [UPDATE] [niedrig] IBM WebSphere Application Server: Schwachstelle ermöglicht Cross-Site Scripting
- 8:12 : [UPDATE] [mittel] Node.js: Mehrere Schwachstellen
- 8:12 : [UPDATE] [hoch] Mozilla Thunderbird: Mehrere Schwachstellen
- 8:12 : [UPDATE] [hoch] WebKit: Mehrere Schwachstellen
- 8:12 : [UPDATE] [niedrig] Linux Kernel: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff
- 8:9 : Engineering Calm in Crisis: Lessons from the Frontlines of Security
- 8:9 : W3LL Phishing Kit Launches Active Campaign to Steal Outlook Login Credentials
- 8:9 : Tor Browser 14.5.2 Released: Bug Fixes and Enhanced Features
- 8:9 : Sarcoma Ransomware Unveiled: Anatomy of a Double Extortion Gang
- 8:9 : CampusGuard ScriptSafe prevents unauthorized script execution
- 8:9 : Absolute Extreme Resilience accelerates recovery following cyberattacks and IT incidents
- 8:5 : IT Security News Hourly Summary 2025-05-20 09h : 13 posts
- 7:34 : Modernisierter Demobereich beim VdS-Lehrgang in Köln
- 7:34 : Gehärtete Images von Docker verbessern die Sicherheit und entlasten Entwickler
- 7:34 : Windows 10: Notfallfix für Bitlocker-Panne erfordert manuellen Eingriff
- 7:32 : The Rise of Shadow Apps: How Rogue Spreadsheets Are Undermining Your Business
- 7:32 : Huawei Debuts HarmonyOS Laptop With 18-Inch Folding Display
- 7:32 : Commvault enhances cyber resilience for Red Hat OpenShift Virtualization workloads
- 7:32 : Legal Aid breached, patients at risk from cyberattacks, 23andMe buyer
- 7:5 : [UPDATE] [mittel] GNU libc: Schwachstelle ermöglicht Codeausführung
- 7:3 : Critical pfSense Firewall Flaws Enable Attackers to Inject Malicious Code
- 7:3 : CISA Adds Actively Exploited Ivanti EPMM Zero-Day to KEV Catalog
- 7:3 : Accenture Files Leaked – New Investigation Exposed Dark Side of Accenture Projects Controlling Billion of Users Data
- 7:3 : New Phishing Attack Mimic as Zoom Meeting Invites to Steal Login Details
- 7:3 : Malware Evasion Techniques – What Defenders Need to Know
- 7:2 : Malicious PyPI Packages Exploit Instagram and TikTok APIs to Validate User Accounts
- 6:32 : Honeypots become a strategic layer in cyber defence
- 6:32 : Microsoft 365 Users Targeted by Tycoon2FA Linked Phishing Attack to Steal Credentials
- 6:32 : Closing security gaps in multi-cloud and SaaS environments
- 6:6 : Google Chrome / Microsoft Edge: Mehrere Schwachstellen
- 6:6 : Anzeige: Künstliche Intelligenz datenschutzkonform einsetzen
- 6:6 : [UPDATE] [hoch] Google Chrome / Microsoft Edge: Mehrere Schwachstellen
- 6:5 : UK Cyber Crime takes a new turn towards TV show the Blacklist
- 6:4 : How a Turing Test Can Curb AI-Based Cyber Attacks
- 6:4 : Chinese APT Hackers Attacking Orgs via Korplug Loaders and Malicious USB Drives
- 6:4 : Containers are just processes: The illusion of namespace security
- 5:5 : IT Security News Hourly Summary 2025-05-20 06h : 1 posts
- 5:4 : New Hannibal Stealer With Stealth & Obfuscation Evades Detection