210 posts were published in the last hour
- 22:55 : IT Security News Daily Summary 2025-06-08
- 20:5 : IT Security News Hourly Summary 2025-06-08 21h : 1 posts
- 18:5 : ProxyBlob – SOCKS5 Over Azure Blob Storage for Covert Network Tunneling
- 17:5 : IT Security News Hourly Summary 2025-06-08 18h : 1 posts
- 17:3 : iOS 26 statt iOS 19: Was der überraschende Namenswechsel für dein iPhone bedeutet
- 16:35 : Best Practices for SOC Threat Intelligence Integration
- 16:34 : Fake AI Tools Are Being Used to Spread Dangerous Malware
- 16:34 : How Banks Are Battling Digital Fraud
- 15:34 : Massive Cyberattack Disrupts KiranaPro’s Operations, Erases Servers and User Data
- 14:34 : London Startup Allegedly Deceived Microsoft with Fake AI Engineers
- 14:34 : Malicious Browser Extensions Infect Over 700 Users Across Latin America Since Early 2025
- 14:34 : New Supply Chain Malware Operation Hits npm and PyPI Ecosystems, Targeting Millions Globally
- 14:7 : Host Header Injection-Based Open Redirect
- 14:7 : Over 950K weekly downloads at risk in ongoing supply chain attack on Gluestack packages
- 14:6 : Germany Police Have ID’d the Leader of Trickbot Criminal Gang
- 14:5 : IT Security News Hourly Summary 2025-06-08 15h : 3 posts
- 13:5 : Enterprises are getting stuck in AI pilot hell, say Chatterbox Labs execs
- 13:5 : From Quarterbacks to CxOs: Why We All Need a Coach
- 12:9 : Starlink-Gäste-WLAN im Weißen Haus ohne Sicherheitskontrollen
- 12:6 : Security Affairs newsletter Round 527 by Pierluigi Paganini – INTERNATIONAL EDITION
- 12:6 : SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 48
- 11:11 : KI-Suchmaschine Perplexity: Der „Google-Killer” unter der Lupe
- 11:11 : Windows 11: So aktiviert ihr ChatGPT statt Copilot
- 11:11 : OpenAI-CMO Kate Rouch: So half ChatGPT ihr durch ihre Krebstherapie
- 11:5 : IT Security News Hourly Summary 2025-06-08 12h : 1 posts
- 10:40 : IT Security: Sorge im Weißen Haus wegen Starlink-Zugang
- 9:32 : Malicious Browser Extensions Infect 722 Users Across Latin America Since Early 2025
- 8:33 : Microsoft: Abhilfe für Sicherheitslücke durch gelöschte “inetpub”-Ordner
- 8:32 : Week in review: Google fixes exploited Chrome zero-day, Patch Tuesday forecast
- 8:14 : (g+) EU-OS: Hoffentlich wird’s bald
- 7:38 : VdS-Brandschutztage 2025: Feuer frei für neue Trends
- 7:38 : Windows: Designproblem erlaubt Aushebeln von Gruppenrichtlinien
- 5:32 : Wireshark 4.4.7 Released, (Sun, Jun 8th)
- 5:32 : Extracting With pngdump.py, (Sun, Jun 8th)
- 5:32 : From StackStorm to DeepTempo
- 5:32 : Europe just launched DNS4EU, a public DNS resolver with privacy and security options
- 5:5 : IT Security News Hourly Summary 2025-06-08 06h : 1 posts
- 3:37 : Rust-Developed InfoStealer Extracts Sensitive Data from Chromium-Based Browsers
- 23:6 : Google Play-Store: So kündigst du unnötige Abos mit einem Klick
- 23:6 : Bitkom-Studie: So viele Apps haben die Deutschen im Schnitt auf ihrem Smartphone
- 23:6 : Der KI-Terminator: Dieser Starinvestor befreit Firmen von Menschen und ersetzt sie durch Algorithmen
- 23:5 : Scalable Solutions for NHI Management
- 23:5 : Boost Your Confidence with Strong NHI Management
- 23:5 : Driving Innovation through Secure NHIs
- 23:5 : Empower Your Team with Robust NHI Protocols
- 23:5 : IT Security News Hourly Summary 2025-06-08 00h : 1 posts
- 22:55 : IT Security News Daily Summary 2025-06-07
- 21:4 : Trump administration takes aim at Biden and Obama cybersecurity rules
- 20:5 : IT Security News Hourly Summary 2025-06-07 21h : 3 posts
- 18:32 : Over 20 Malicious Apps on Google Play Target Users for Seed Phrases
- 18:32 : The 2024 Red Hat Product Security Risk Report: CVEs, XZ Backdoor, SSCAs, AI…oh my!
- 18:5 : Experts found 4 billion user records online, the largest known leak of Chinese personal data from a single source
- 17:32 : OffensiveCon25 – No Signal, No Security: Dynamic Baseband Vulnerability Research
- 17:5 : IT Security News Hourly Summary 2025-06-07 18h : 5 posts
- 17:4 : ChatGPT: Euer Löschen-Button ist jetzt wirkungslos – KI-Chats werden zu Beweismitteln
- 17:4 : Smarte Alternativen: So schützt du deine Daten mit Googles neuer Offline-KI-App
- 17:4 : KI statt E-Mail: Deepmind-Chef plant die Zukunft der Kommunikation
- 17:4 : SOS auf dem Sperrbildschirm: Wie dein Smartphone im Notfall zum Helden wird
- 17:4 : Wenn die KI entscheidet: Wie Meta die Zukunft der Social-Media-Sicherheit gestalten will
- 17:3 : Unimed AI Chatbot Exposes Millions of Patient Messages in Major Data Leak
- 16:32 : Critical Bug in E-commerce Website, Over 10000 Customers Impacted
- 16:5 : Kali GPT- AI Assistant That Transforms Penetration Testing on Kali Linux
- 15:32 : TSA Advises Against Using Airport USB Ports to Charge Your Phone
- 15:7 : MCP (Model Context Protocol) and Its Critical Vulnerabilities
- 15:7 : US Sanctions Philippines-Based Web Host Tied to $200 Million Crypto Scam Network
- 15:7 : AI Agents Raise Cybersecurity Concerns Amid Rapid Enterprise Adoption
- 11:6 : Whatsapp-Trick enthüllt: So kopierst du Nachrichten ohne Frust
- 11:6 : Entsperren unter Druck: Warum PINs und Muster sicherer sind als Fingerabdrücke
- 11:6 : Geheimnisvoller Hacker deckt Cyberkriminelle auf: Warum er auf Millionen verzichtet
- 11:6 : Nach Whatsapp: Meta bringt Instagram auf das iPad – was dahinter steckt
- 11:6 : Von GPT-4 bis GPT-4.5: Welche KI wirklich beim Lernen hilft
- 11:5 : The Mystery of iPhone Crashes That Apple Denies Are Linked to Chinese Hacking
- 10:7 : AI Fraud Emerges as a Growing Threat to Consumer Technology
- 8:5 : Cybersecurity Month in Review: Uncovering Digital and Physical Threats
- 8:5 : IT Security News Hourly Summary 2025-06-07 09h : 3 posts
- 7:33 : Studie: KI-Agenten trotz Sicherheitslücken auf dem Vormarsch
- 7:32 : Disk Union – 690,667 breached accounts
- 6:32 : New Rust Based InfoStealer Extracts Sensitive Data from Chromium-based Browsers
- 6:9 : Hackers Using New ClickFix Technique To Exploits Human Error Via Fake Prompts
- 6:9 : 5 SaaS Blind Spots that Undermine HIPAA Security Safeguards
- 5:5 : IT Security News Hourly Summary 2025-06-07 06h : 1 posts
- 5:3 : KI-Modelle wehren sich gegen Abschaltung – was hinter dem Verhalten steckt
- 3:31 : After its data was wiped, KiranaPro’s co-founder cannot rule out an external hack
- 2:14 : APT41 Exploits Google Calendar in Stealthy Cyberattack; Google Shuts It Down
- 2:13 : How Biometric Data Collection Affects Workers
- 2:5 : IT Security News Hourly Summary 2025-06-07 03h : 1 posts
- 0:32 : Hundreds of GitHub Malware Repos Targeting Novice Cybercriminals Linked to Single User
- 23:5 : IT Security News Hourly Summary 2025-06-07 00h : 5 posts
- 23:4 : Attackers exploit Fortinet flaws to deploy Qilin ransomware
- 23:4 : Victory! Austin Organizers Cancel City’s Flock ALPR Contract
- 22:55 : IT Security News Daily Summary 2025-06-06
- 22:33 : LLM04: Data & Model Poisoning – FireTail Blog
- 22:33 : Unleashing Powerful Cloud-Native Security Techniques
- 22:33 : Why Securing NHIs Reduces Your Cyber Risk
- 22:33 : Are Your Cloud NHIs Truly Protected?
- 22:33 : Ensuring Certainty in NHIs Lifecycle Management
- 21:8 : Anthropic appoints a national security expert to its governing trust
- 21:7 : Friday Squid Blogging: Squid Run in Southern New England
- 21:7 : EFF to Department Homeland Security: No Social Media Surveillance of Immigrants
- 21:7 : Week in Review: Senators’ CSRB bid, Deepfakes dodge detection, Microsoft-CrowdStrike collaboration
- 20:32 : Italian lawmakers say Italy used spyware to target phones of immigration activists, but not against journalist
- 20:32 : 2025 ISO and CSA STAR certificates now available with three new Regions
- 20:7 : News brief: CISA and partners face budget overhauls, cuts
- 20:6 : New ClickFix Attack Exploits Fake Cloudflare Human Check to Install Malware Silently
- 20:6 : ChatGPT used for evil: Fake IT worker resumes, misinfo, and cyber-op assist
- 20:5 : IT Security News Hourly Summary 2025-06-06 21h : 9 posts
- 19:32 : How to choose and set up a mobile VPN for an Android phone
- 19:32 : Cybercriminals Are Hiding Malicious Web Traffic in Plain Sight
- 19:7 : Secure IaC With a Shift-Left Approach
- 19:7 : Russia-linked threat actors targets Ukraine with PathWiper wiper
- 19:6 : DragonForce Ransomware Claimed To Compromise Over 120 Victims in The Past Year
- 18:34 : Popular Chrome Extensions Found Leaking Data via Unencrypted Connections
- 18:34 : Hearing on the Federal Government and AI
- 18:33 : Threat Actors Using ViperSoftX Malware to Exfiltrate Sensitive Details
- 18:33 : New PathWiper Malware Attacking Critical Infrastructure To Deploy Administrative Tools
- 18:33 : Beware of Fake AI Business Tools That Hides Ransomware
- 18:33 : How to update Chrome on every operating system
- 18:33 : They Deepfaked Through the Bathroom Window: How Cybercriminals Are Targeting Executives & Key Personnel at Home
- 18:33 : New Atomic macOS Stealer Campaign Exploits ClickFix to Target Apple Users
- 18:33 : How to use on-demand rotation for AWS KMS imported keys
- 17:6 : Emotional abhängig von ChatGPT? Was die Bindungstheorie über die Beziehung zu KI-Tools verrät
- 17:6 : KI und Mathematik: Wie Sprachmodelle wirklich gut rechnen sollen
- 17:6 : Google Chrome: So soll der Browser Nutzern Millionen Stunden Zeit einsparen
- 17:5 : New Rust-Developed InfoStealer Drains Sensitive Data from Chromium-Based Browsers
- 17:5 : EFF to Court: Young People Have First Amendment Rights
- 17:5 : Cybersecurity Snapshot: Experts Issue Best Practices for Migrating to Post-Quantum Cryptography and for Improving Orgs’ Cyber Culture
- 17:5 : IT Security News Hourly Summary 2025-06-06 18h : 14 posts
- 16:34 : Android 16: Beta gewährt Blick auf Googles erweitertes Sicherheitsprogramm
- 16:33 : Hackers Leverage New ClickFix Tactic to Exploit Human Error with Deceptive Prompts
- 16:33 : FBI Issues Play Ransomware Security Advisory & Mitigation Steps to Take Now
- 16:33 : How to navigate the Windows Hello for Business requirements
- 16:33 : OpenAI forced to preserve ChatGPT chats
- 16:33 : Fresh strain of pro-Russian wiper flushes Ukrainian critical infrastructure
- 16:33 : Want to Leave Facebook? Do this.
- 16:3 : OpenAI Appeals User Data Preservation Order In NYT Lawsuit
- 16:3 : ClickFix Attack Uses Fake Cloudflare Verification to Silently Deploy Malware
- 16:3 : Hundreds of Malicious GitHub Repos Targeting Novice Cybercriminals Traced to Single User
- 15:34 : NEOM McLaren Formula E Team & Trend Micro Innovation History
- 15:34 : Beware: Fake AI Business Tools Spreading Hidden Ransomware
- 15:34 : DragonForce Ransomware Reportedly Compromised Over 120 Victims in the Past Year
- 15:34 : Privacy-Preserving AI: How Multimodal Models Are Changing Data Security
- 15:33 : The Rise of Vibe Coding: Innovation at the Cost of Security
- 15:33 : Enhancing SQL Server Security With AI-Driven Anomaly Detection
- 15:33 : The Synergy of Security and Development: Integrating Threat Models With DevOps
- 15:33 : Apple Mail freezing after updating to iOS 18.5? Here’s a fix you can try
- 15:33 : Report on the Malicious Uses of AI
- 15:33 : Long-Standing NATO Partnership Strengthens Our Collective Cyber Defenses
- 15:33 : WhatsApp Launches First Dedicated iPad App with Full Multitasking and Calling Features
- 14:35 : NIS2: Wenig Änderungen in geleaktem Schwarz-Rot-Entwurf
- 14:35 : Amazon Cuts More Jobs, This Time At Books Division
- 14:35 : Scattered Spider Hackers Target Tech Company Help-Desk Administrators
- 14:34 : Chrome Extensions Vulnerability Exposes API Keys, Secrets, and Tokens
- 14:34 : Microsoft Unveils European Security Program to Target Cybercriminal Networks
- 14:34 : Booking.com reservation abused as cybercriminals steal from travelers
- 14:34 : In Other News: FBI Warns of BadBox 2, NSO Disputes WhatsApp Fine, 1,000 Leave CISA
- 14:34 : OAuth Tokens: The Danger Behind the Commvault Breach
- 14:34 : Adidas Confirms Data Leak After User Service Provider Hack
- 14:8 : Wie sicher ist öffentliches WLAN? | Offizieller Blog von Kaspersky
- 14:8 : NICKNAME: Zero-Click iMessage Exploit Targeted Key Figures in US, EU
- 14:8 : ViperSoftX Malware Used by Threat Actors to Steal Sensitive Information
- 14:8 : Microsoft Unveils European Security Effort to Disrupt Cybercrime Networks
- 14:8 : New Mirai Variant Exploits TBK DVR Flaw for Remote Code Execution
- 14:8 : 86 million AT&T customer records reportedly up for sale on the dark web
- 14:7 : North Korea’s Innovative Laptop Farm Scam Alarms Cybersecurity Experts
- 14:7 : Microsoft Helps CBI Dismantle Indian Call Centers Behind Japanese Tech Support Scam
- 14:7 : Empower Users and Protect Against GenAI Data Loss
- 14:7 : Scattered Spider Uses Tech Vendor Impersonation and Phishing Kits to Target Helpdesks
- 14:5 : IT Security News Hourly Summary 2025-06-06 15h : 6 posts
- 13:34 : Die größten IT-Dienstleister: Beratung und Services im Vergleich
- 13:34 : Microsoft: Power Automate mit kritischer Lücke, Ende für Endkundenversion
- 13:33 : U.S. Offers $10M Bounty for Information on RedLine Malware Creator
- 13:33 : No Excuses: Why Multi-Factor Authentication is Non-Negotiable
- 13:32 : Uncle Sam moves to seize $7.7M laundered by North Korean IT worker ring
- 13:32 : 3 Reasons to Visit IRONSCALES at Pax8 Beyond 2025
- 13:3 : 86 million A&T customer records reportedly up for sale on the dark web
- 13:3 : US to Offer $10 Million Reward for Details About RedLine Malware Developer
- 13:3 : Cybersecurity M&A Roundup: 42 Deals Announced in May 2025
- 13:2 : Millions of Android devices roped into Badbox 2.0 botnet. Is yours among them?
- 12:32 : Gesetzesvorhaben: Ist dDoS in Russland künftig legal?
- 12:32 : Tesla Sinks As Elon Musk, Donald Trump Feud Erupts
- 12:3 : U.S. Offers $10M bounty for info on RedLine malware creator and state hackers
- 12:3 : Your ransomware nightmare just came true – now what?
- 12:3 : Top AI-Driven Pentest Tools 2025
- 11:34 : Datenlecks bei Cartier, Northface und Victoria’s Secret
- 11:33 : How Enterprises Can Meet AI Literacy Requirements Before They’re Forced
- 11:33 : Critical RCE Vulnerability in AWS Amplify Studio – PoC Now Public
- 11:33 : ANY.RUN Empowers Government Agencies with Real-Time Threat Detection
- 11:33 : MIND Raises $30 Million for Data Loss Prevention
- 11:32 : Inside the Mind of the Adversary: Why More Security Leaders Are Selecting AEV
- 11:32 : #Infosec2025: Top Six Cyber Trends CISOs Need to Know
- 11:5 : IT Security News Hourly Summary 2025-06-06 12h : 20 posts
- 11:4 : Mehr Privatsphäre mit Gemini Live: Neue Funktion verhindert, dass andere die KI-Antworten mithören
- 11:4 : iPhone-Nutzer haben Probleme mit Apples Mail-App: Diese Workarounds gibt es
- 11:4 : Windows 11: So einfach greift ihr jetzt auf euer Android-Smartphone zu
- 11:4 : Emotional abhängig von ChatGPT? Was die Bindungstheorie über Beziehung zu KI-Tools verrät
- 11:4 : Referentenentwurf zu NIS2 geleakt
- 11:4 : USA: Admin-Panels zahlreicher Wasserwerke frei zugänglich im Netz
- 11:4 : [UPDATE] [mittel] Apache Hadoop: Schwachstelle ermöglicht Offenlegung von Informationen
- 11:2 : BADBOX 2.0 Infected Over 1 Million Android Devices Worldwide
- 11:2 : HPE Insight Remote Support Vulnerability Let Attackers Execute Remote Code
- 10:34 : [NEU] [hoch] Microsoft Power Automate Desktop: Schwachstelle ermöglicht Privilegieneskalation
- 10:34 : Innovation, Not Infrastructure: Akamai?s Managed Cloud Services
- 10:33 : Blitz Malware: A Tale of Game Cheats and Code Repositories
- 10:33 : US Offers $10 Million Reward for Tips About State-Linked RedLine Cybercriminals
- 10:33 : Destructive ‘PathWiper’ Targeting Ukraine’s Critical Infrastructure
- 10:4 : [UPDATE] [mittel] Golang Go: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen
- 10:4 : Beyond Code: The Leadership Imperative in the Age of AI
- 10:4 : The Common Challenges of API Development and How to Overcome Them
- 10:3 : Critical FreeRTOS-Plus-TCP Flaw Allows Code Execution or System Crash
- 10:3 : Analysis of the latest Mirai wave exploiting TBK DVR devices with CVE-2024-3721