210 posts were published in the last hour
- 22:55 : IT Security News Daily Summary 2025-06-15
- 20:34 : Introducing Guernsey Cyber Security Centre
- 17:7 : Apple Intelligence auf der WWDC: Tim Cook muss jetzt endlich bei der KI abliefern
- 17:7 : Das Claude-Kollektiv: So hat Anthropic seine Multi-Agenten-KI gebaut
- 17:7 : Meta AI in Whatsapp nervt? Diese 7 Messenger sind die besten Alternativen
- 17:5 : IT Security News Hourly Summary 2025-06-15 18h : 2 posts
- 16:38 : Mirai Botnet Variant is Building Swarm by Exploiting DVR Flaw
- 16:38 : Stolen Customer Data from Ticketmaster Incident Resurfaces Online
- 16:37 : DVLA Scams Target Thousands of UK Drivers with Fake Fines, Car Deals, and Fraudulent Fees
- 16:37 : Cloudfare CAPTCHA Page Tricks Users Into Downloading Malware
- 16:5 : LinuxFest Northwest: Clonezilla Live On RISC-V Crafting Open Source Live Systems For Open Hardware
- 15:7 : The Growing Threat of AI-powered Cyberattacks in 2025
- 15:7 : Sensata Technologies Confirms Data Breach After April Ransomware Attack, Notifies Employees of Exposed Personal Information
- 14:5 : IT Security News Hourly Summary 2025-06-15 15h : 3 posts
- 14:4 : Canada’s second-largest airline WestJet is containing a cyberattack
- 13:5 : Meta AI: Private Informationen können versehentlich in der App landen
- 13:4 : The Cost of Ignoring Patches: How State and Local Governments Can Mitigate Damaging Security Breaches
- 12:37 : Angreifer können Server über Schwachstelle in Dell iDRAC Tools attackieren
- 12:5 : Sicherheitslücke in Dell iDRAC Tools gefährdet Server
- 12:4 : SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 49
- 11:20 : „Fundamentales Hindernis“: Apple-Forscher beweisen, dass Reasoning von ChatGPT und Co. ein leeres Versprechen ist
- 11:20 : Erschreckend einfach: Forscher finden 40.000 ungeschützte Überwachungskameras – auch in Deutschland
- 11:20 : Wenn das iPhone Anrufer abwimmelt: Unsere Eindrücke von der WWDC 2025 im Podcast
- 11:20 : ChatGPT verliert Schachpartie gegen 46 Jahre alten Atari – und gibt dem Spiel die Schuld
- 11:20 : KI-Einsatz bei Duolingo: Warum der CEO die Kritik unterschätzte
- 11:20 : Sicherheitslücken Tenable Agent: Angreifer können Systemdaten überschreiben
- 11:19 : Expanding on ChunkyIngress – Clippy Goes Rogue (GoClipC2)
- 11:5 : IT Security News Hourly Summary 2025-06-15 12h : 4 posts
- 10:4 : CARsenal: Kali Linux 2025.2 bringt Tools zum Hacken von Autos mit
- 10:4 : Security Affairs newsletter Round 528 by Pierluigi Paganini – INTERNATIONAL EDITION
- 10:3 : Guardrails Breached: The New Reality of GenAI-Driven Attacks
- 9:36 : IBM AIX/VIOS und DataPower Gateway für Schadcode-Attacken anfällig
- 8:5 : Week in review: Microsoft fixes exploited zero-day, Mirai botnets target unpatched Wazuh servers
- 7:18 : Explosives Wachstum bei Generativer KI: Sicherheitsrisiken steigen
- 1:36 : Upcoming Speaking Engagements
- 23:10 : Cyberfalle Spam-Mails: Manche „Unsubscribe"-Buttons sind gefährlicher als der Spam selbst
- 23:7 : How Can NHIs Enhance Overall System Security?
- 23:7 : Why Proactive NHI Management is a Must?
- 23:7 : Are Your Cloud Secrets Safe From Threats?
- 23:7 : Secure Your Machine Identities Effectively
- 23:5 : IT Security News Hourly Summary 2025-06-15 00h : 1 posts
- 22:55 : IT Security News Daily Summary 2025-06-14
- 20:34 : Top 10 Challenges Implementing DMARC in GWS
- 17:5 : IT Security News Hourly Summary 2025-06-14 18h : 1 posts
- 17:4 : Was brachte die WWDC 2025? Alle Neuerungen für iPhone, Mac & Apple Watch im Überblick
- 17:4 : Wie ChatGPT Menschen in eine psychische Krise stürzt
- 17:3 : LinuxFest Northwest: See How Far COSMIC Has Come This Year
- 16:32 : FBI Warns of Luna Moth Ransomware Attacks Targeting U.S. Law Firms
- 15:32 : Why Exploring the Dark Web Can Lead to Legal Trouble, Malware, and Emotional Harm
- 15:3 : OAuth 2.0 Security Best Practices: How to Secure OAuth Tokens & Why Use PKCE
- 14:33 : LockBit’s Admin Panel Leak Exposes It’s Affiliates & Millions in Crypto
- 14:33 : Detecting Zero-Day Vulnerabilities in .NET Assemblies With Claude AI
- 14:7 : How to Monetize Unity Apps: Best Practices
- 14:7 : Anne Wojcicki’s nonprofit reaches deal to acquire 23andMe
- 14:5 : IT Security News Hourly Summary 2025-06-14 15h : 3 posts
- 13:5 : Hundreds of WordPress Websites Hacked By VexTrio Viper Group to Run Massive TDS Services
- 13:5 : Small Manufacturers, Big Target: The Growing Cyber Threat and How to Defend Against It
- 12:7 : Windows 11 24H2 KASLR Broken Using an HVCI-Compatible Driver with Physical Memory Access
- 11:32 : Got a new password manager? How to clean up the password mess you left in the cloud
- 11:10 : Angriff auf Privatsphäre: Dieser Google-Bug hätte Millionen Telefonnummern offenlegen können
- 11:10 : watchOS 26: Wie Apple deine nächste Trainingseinheit in einen Motivationsmarathon verwandelt
- 11:10 : Voller Smartphone-Speicher? Whatsapp hat die Lösung parat!
- 11:9 : RFK Jr. Orders HHS to Give Undocumented Migrants’ Medicaid Data to DHS
- 11:5 : IT Security News Hourly Summary 2025-06-14 12h : 1 posts
- 10:35 : Urteil: Heimliche Kamera im WG-Zimmer nicht immer strafbar
- 10:34 : NIST Released 19 Zero Trust Architecture Implementations Guide – What’s New
- 10:34 : Tenable Agent for Windows Vulnerability Let Attackers Login as Admin to Delete The System Files
- 10:34 : AMOS macOS Stealer Hides in GitHub With Advanced Sophistication Methods
- 10:34 : FBI Urges Immediate Action as Play Ransomware Attacks Surge
- 10:34 : Weak Links in Healthcare Infrastructure Fuel Cyberattacks
- 10:6 : Palo Alto Networks fixed multiple privilege escalation flaws
- 9:34 : Kali Linux 2025.2 delivers Bloodhound CE, CARsenal, 13 new tools
- 8:5 : IT Security News Hourly Summary 2025-06-14 09h : 2 posts
- 8:4 : Threat Actors Attacking Cryptocurrency and Blockchain Developers with Weaponized npm and PyPI Packages
- 7:37 : Lithium-Akkus: Schutz vor Brandgefahr im Betrieb
- 7:36 : More Steganography!, (Sat, Jun 14th)
- 7:4 : Unusual toolset used in recent Fog Ransomware attack
- 7:4 : The Secret CISO: Navigating the Human and Technical Challenges in Cybersecurity
- 5:35 : 2025-06-13: Traffic analysis exercise: It’s a trap!
- 5:5 : IT Security News Hourly Summary 2025-06-14 06h : 1 posts
- 3:34 : Discord Invite Link Hijacking Delivers AsyncRAT and Skuld Stealer Targeting Crypto Wallets
- 2:7 : DNS Rebind Protection Revisited
- 2:5 : IT Security News Hourly Summary 2025-06-14 03h : 1 posts
- 0:38 : Unusual Toolset Behind Fog Ransomware Prompts Fresh Security Concerns
- 23:6 : A cyberattack on United Natural Foods caused bread shortages and bare shelves
- 23:5 : IT Security News Hourly Summary 2025-06-14 00h : 3 posts
- 22:55 : IT Security News Daily Summary 2025-06-13
- 22:34 : Cyber weapons in the Israel-Iran conflict may hit the US
- 22:5 : Top 5 Skills Entry-Level Cybersecurity Professionals Need
- 22:4 : ‘No Kings’ Protests, Citizen-Run ICE Trackers Trigger Intelligence Warnings
- 21:36 : News brief: Gartner Security and Risk Management Summit recap
- 21:3 : ‘No Kings’ Protests, Citizen-Run ICE Trackers Trigger Intelligence Warnings
- 21:3 : LinuxFest Northwest: Chaos Testing Of A Postgres Cluster On Kubernetes
- 21:2 : Week in Review: Google and Cloudflare outages, Copilot Zero-Click, Cloudflare’s Claude flair
- 20:5 : IT Security News Hourly Summary 2025-06-13 21h : 5 posts
- 20:4 : What a smart contract audit is, and how to conduct one
- 20:4 : How to write a risk appetite statement: Template, examples
- 19:2 : CISO’s guide to building a strong cyber-resilience strategy
- 18:34 : Do you trust Xi with your ‘private’ browsing data? Apple, Google stores still offer China-based VPNs, report says
- 18:34 : How to create post-quantum signatures using AWS KMS and ML-DSA
- 18:5 : Understanding the Fundamentals of Cryptography
- 18:5 : Paraguay Suffered Data Breach: 7.4 Million Citizen Records Leaked on Dark Web
- 17:38 : Meta AI is a ‘Privacy Disaster’ — OK Boomer
- 17:38 : AI security strategies from Amazon and the CIA: Insights from AWS Summit Washington, DC
- 17:10 : Reich durch KI: Wie OpenAI-Mitarbeiter Milliarden mit Aktien verdienen
- 17:10 : Whatsapp: Diese Neuerungen erwarten euch ab sofort im Messenger
- 17:10 : Liquid Glass in macOS: So aktivierst ihr den Look auch in Windows
- 17:9 : Kritik an Palantir im Polizeieinsatz: Hat Staatsschutz Vorrang vor Privatsphäre?
- 17:9 : The cloud broke Thursday and it’ll happen again – how to protect your business before then
- 17:8 : China and Taiwan Accuse Each Other for Cyberattacks Against Critical Infrastructure
- 17:8 : US Seizes $7.7 Million From Crypto Linked to North Korea’s IT Worker Scam
- 17:5 : IT Security News Hourly Summary 2025-06-13 18h : 11 posts
- 16:39 : Anzeige: Microsoft-Defender-Werkzeuge effektiv einsetzen
- 16:38 : Mitigating prompt injection attacks with a layered defense strategy
- 16:38 : How identity management is shifting into the agent era
- 16:38 : Zero-Click Flaw in Microsoft Copilot Illustrates AI Agent, RAG Risks
- 16:38 : FBI Issues Alert as BADBOX 2.0 Malware Infects Over 1 Million Devices, Hijacking Home Networks Worldwide
- 16:9 : Meta Sues Developer of CrushAI ‘Nudify’ App
- 16:9 : First Known Zero-Click AI Exploit: Microsoft 365 Copilot’s ‘EchoLeak’ Flaw
- 16:9 : INTERPOL-Led Effort Dismantles Infostealer Malware Network in 26 Countries Across Asia-Pacific Region
- 16:9 : CBP’s Predator Drone Flights Over LA Are a Dangerous Escalation
- 16:9 : Kali Linux 2025.2 Released: Smartwatch Wi-Fi Injection, Android Radio, and Hacking Tools
- 16:9 : Your Meta AI chats might be public, and it’s not a bug
- 16:9 : Predator Spyware Activity Resurfaces in Mozambique Using Novel Techniques
- 16:9 : Massive Data Leak Exposes Billions of Records in Suspected Chinese Surveillance Database
- 15:37 : Kali Linux 2025.2 Released: New Tools, Smartwatch and Car Hacking Added
- 15:37 : Toxic trend: Another malware threat targets DeepSeek
- 15:37 : What Can Schools Expect When Choosing Heimdal?
- 15:37 : Securing the Connected Factory Floor
- 15:37 : Apple fixes zero-click exploit underpinning Paragon spyware attacks
- 15:37 : Former CISA and NCSC Heads Warn Against Glamorizing Threat Actor Names
- 15:37 : AWS CIRT announces the launch of the Threat Technique Catalog for AWS
- 15:8 : Global analysis of Adversary-in-the-Middle phishing threats
- 15:8 : First Known ‘Zero-Click’ AI Exploit: Microsoft 365 Copilot’s EchoLeak Flaw
- 15:8 : Argusee and Agentic AI in Cybersecurity
- 15:8 : Envilder – Secure AWS SSM CLI for Environment Variable Management
- 14:36 : Over 269,000 Websites Infected with JSFireTruck JavaScript Malware in One Month
- 14:8 : Phishing und Passwort-Klau: Bösartige Skripte im Mail-Anhang als Vektorgrafik
- 14:7 : Google Resolves Global Cloud Outage
- 14:6 : Discover Check Point’s AI-powered, cloud-delivered security solutions at AWS re:Inforce 2025
- 14:6 : Here’s What Marines and the National Guard Can (and Can’t) Do at LA Protests
- 14:6 : Microsoft 365 Authentication Issues Disrupt User Access Across Multiple Regions
- 14:6 : Predator Mobile Spyware Remains Consistent with New Design Changes to Evade Detection
- 14:6 : Wanted: Junior cybersecurity staff with 10 years’ experience and a PhD
- 14:6 : In Other News: Cloudflare Outage, Cracked.io Users Identified, Victoria’s Secret Cyberattack Cost
- 14:5 : IT Security News Hourly Summary 2025-06-13 15h : 11 posts
- 13:36 : Sicherheitskonzepte für Brandschutz und KRITIS
- 13:35 : API Security Under Federal Scrutiny: A Wake-Up Call for CIOs
- 13:35 : Spring Framework Flaw Enables Remote File Disclosure via “Content‑Disposition” Header
- 13:35 : NIST Releases New Guide – 19 Strategies for Building Zero Trust Architectures
- 13:34 : Paragon Spyware Used to Spy on European Journalists
- 13:34 : Arsen Launches AI-Powered Vishing Simulation to Help Organizations Combat Voice Phishing at Scale
- 13:3 : E-Mail-Sicherheit: Verstärkte Angriffe mit SVG
- 13:3 : Red team AI now to build safer, smarter models tomorrow
- 13:3 : New GitHub Device Code Phishing Attacks Targeting Developers to Steal Tokens
- 13:3 : Acer Control Center Vulnerability Let Attackers Execute Malicious Code as a Privileged User
- 13:2 : New SmartAttack Steals Sensitive Data From Air-Gapped Systems via Smartwatches
- 12:37 : TeamFiltration Abused in Entra ID Account Takeover Campaign
- 12:37 : iOS zero-click attacks used to deliver Graphite spyware (CVE-2025-43200)
- 12:5 : Meta Invests $14.3bn In AI Firm Scale, Poaches CEO
- 12:5 : Microsoft Defender Spoofing Flaw Enables Privilege Escalation and AD Access
- 12:5 : The New AI Attack Surface — How Cortex Cloud Secures MCP
- 12:5 : Industry Reactions to Trump Cybersecurity Executive Order: Feedback Friday
- 11:37 : Acer Control Center Flaw Lets Attackers Run Malicious Code as Elevated User
- 11:37 : Amazon Cloud Cam Flaw Allows Attackers to Intercept and Modify Network Traffic
- 11:37 : Heimdal for Schools: Why IT Teams Are Making the Switch
- 11:37 : Beyond Cyber Essentials: How to Go Beyond Compliance and Achieve Comprehensive Security
- 11:36 : Cyber Attacks on Schools: How Educational Institutions Are Tackling Cyber Threats
- 11:36 : When Schools Choose Heimdal: What to Expect
- 11:36 : Microsoft Defender Spoofing Vulnerability Allows Privilege Escalation and AD Access
- 11:36 : PoC Exploit Released for Windows Disk Cleanup Tool Elevation of Privilege Vulnerability
- 11:36 : New TokenBreak Attack Bypasses AI Model’s with Just a Single Character Change
- 11:36 : HashiCorp Nomad Vulnerability Allows Privilege Escalation via ACL Policy Lookup Exploit
- 11:36 : CTEM is the New SOC: Shifting from Monitoring Alerts to Measuring Risk
- 11:36 : Ransomware Gangs Exploit Unpatched SimpleHelp Flaws to Target Victims with Double Extortion
- 11:36 : European Journalists Targeted by Paragon Spyware, Citizen Lab Confirms
- 11:7 : KI, hilf mir bei der Urlaubsplanung: MIT-Forscher entwickeln „Problemlöser“ für Sprachmodelle
- 11:7 : KI als eigenes Werk verkauft: Autorin vergisst Chatbot-Antwort im fertigen Buch
- 11:7 : Nach über 100 Jahren: Cyberangriff drängt deutsche Firma in die Insolvenz
- 11:7 : [NEU] [hoch] xwiki: Mehrere Schwachstellen
- 11:6 : Developers Beware – Sophisticated Phishing Scams Exploit GitHub Device Code Flow to Hijack Tokens
- 11:6 : Apple confirmed that Messages app flaw was actively exploited in the wild
- 11:6 : January 2025 Cyber Attacks Statistics
- 11:6 : SimpleHelp Vulnerability Exploited Against Utility Billing Software Users
- 11:6 : Microsoft Data Loss Prevention (DLP): Tips to Protect Your Business Following the Latest Outage
- 11:5 : IT Security News Hourly Summary 2025-06-13 12h : 12 posts
- 10:35 : [NEU] [mittel] Red Hat Satellite: Schwachstelle ermöglicht Denial of Service
- 10:34 : Serverless Tokens in the Cloud: Exploitation and Detections
- 10:34 : Unpatched IT Tool Opens Door – Hackers Breach Billing Software Firm via SimpleHelp RMM
- 10:34 : HashiCorp Nomad ACL Lookup Flaw Allows Privilege Escalation
- 10:34 : Paragon Spyware used to Spy on European Journalists
- 10:34 : Fog Ransomware Attack Employs Unusual Tools
- 10:34 : SAML vs. OAuth 2.0: Mastering the Key Differences
- 10:6 : [UPDATE] [hoch] Apache Commons BeanUtils: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen
- 10:5 : Fog Ransomware Uses Pentesting Tools to Steal Data and Launch Attacks
- 10:5 : Graphite Spyware Uses iOS Zero-Click Flaw to Target Journalists
- 10:4 : Ransomware Gang Exploits SimpleHelp RMM to Compromise Utility Billing Firm
- 10:4 : Google “strongly encourages” its users to stop using passwords
- 9:33 : [NEU] [mittel] Python: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen
- 9:33 : [NEU] [mittel] VMware Tanzu Spring Framework: Schwachstelle ermöglicht Manipulation von Dateien
- 9:33 : [NEU] [hoch] Tenable Security Nessus: Mehrere Schwachstellen
- 9:32 : JSFireTruck Obfuscation Helps Cybercriminals Hijack Trusted Sites with Malicious JavaScript
- 9:32 : Fog Ransomware Actors Exploits Pentesting Tools to Exfiltrate Data and Deploy Ransomware
- 9:32 : Ransomware Actors Exploit Unpatched SimpleHelp RMM to Compromise Billing Software Provider
- 9:32 : Microsoft 365 Copilot: New Zero-Click AI Vulnerability Allows Corporate Data Theft
- 9:5 : iPhone-Nutzer attackiert: Zero-Click-Lücke in iOS für Spyware-Attacken missbraucht
- 8:34 : Hintertürpflicht für britische Lauscher: WhatsApp will Apple helfen
- 8:34 : [NEU] [hoch] xwiki: Schwachstelle ermöglicht SQL Injection
- 8:33 : PoC Exploit Unveiled for Windows Disk Cleanup Elevation Vulnerability
- 8:33 : Slapped wrists for Financial Conduct Authority staff who emailed work data home