208 posts were published in the last hour
- 21:34 : Microsoft is named a Leader in The Forrester Wave™: Security Analytics Platforms, 2025
- 21:7 : Don’t panic, but it’s only a matter of time before critical ‘CitrixBleed 2’ is under attack
- 21:7 : Thousands of private camera feeds found online. Make sure yours isn’t one of them
- 21:7 : Microsoft is named a Leader in The Forrester Wave™: Security Analytics Platforms, 2025
- 20:40 : Anthropic Did Not Violate Authors’ Copyright, Judge Rules
- 20:40 : SparkKitty Spyware on App Store and Play Store, Steals Photos for Crypto Data
- 20:40 : Generative AI and privacy are best frenemies – a new study ranks the best and worst offenders
- 20:39 : Cybersecurity governance: A guide for businesses to follow
- 20:39 : NCSC Warns of SHOE RACK Malware Using DOH & SSH Protocol for Attacking Fortinet Firewalls
- 20:39 : New DRAT V2 Updates C2 Protocol Expands Functional Capabilities With Shell Command Execution
- 20:39 : Innovator Spotlight: Qualys
- 20:39 : Black Hat SEO Poisoning Search Engine Results For AI to Distribute Malware
- 20:39 : Why Every File Demands Sanitization
- 20:39 : LinuxFest Northwest: GNU/Linux Loves All
- 20:39 : Microsoft is named a Leader in The Forrester Wave™: Security Analytics Platforms, 2025
- 20:39 : New U.S. Visa Rule Requires Applicants to Set Social Media Account Privacy to Public
- 20:5 : IT Security News Hourly Summary 2025-06-24 21h : 9 posts
- 20:0 : Anthropic gewinnt Verfahren: KI-Training mit urheberrechtlich geschützten Büchern zulässig
- 19:12 : Quick Password Brute Forcing Evolution Statistics, (Tue, Jun 24th)
- 19:12 : Microsoft is named a Leader in The Forrester Wave™: Security Analytics Platforms, 2025
- 18:35 : ControlID iDSecure On-Premises
- 18:35 : The U.S. House banned WhatsApp on government devices due to security concerns
- 18:35 : Here’s Why Using SMS Two-Factor Authentication Codes Is Risky
- 18:35 : Microsoft is named a Leader in The Forrester Wave™: Security Analytics Platforms, 2025
- 18:6 : AT&T customer? You might get a cut of $177 million data breach settlement
- 18:6 : Multifactor authentication: 5 examples and strategic use cases
- 18:5 : Gonjeshke Darande Threat Actors Pose as Hacktivist Infiltrated Iranian Crypto Exchange
- 18:5 : New FileFix Attack Abuses Windows File Explorer to Execute Malicious Commands
- 18:5 : Microsoft is named a Leader in The Forrester Wave™: Security Analytics Platforms, 2025
- 17:35 : OpenAI Removes Mention Of Jony Ive Partnership After Trademark Dispute
- 17:35 : Androxgh0st Botnet Expands Reach, Exploiting US University Servers
- 17:35 : Beware of fake SonicWall VPN app that steals users’ credentials
- 17:35 : Microsoft is named a Leader in The Forrester Wave™: Security Analytics Platforms, 2025
- 17:7 : Google AI Mode schlägt vor, was du suchen solltest – basierend auf deiner Aktivität
- 17:6 : Waymo Partners Uber To Launch Atlanta Robotaxi Service
- 17:6 : Bank of America, Netflix, and Microsoft Hacked to Inject Fake Phone Numbers
- 17:6 : How to get Windows 10 extended security updates for free: 2 options
- 17:6 : Anton’s Security Blog Quarterly Q2 2025
- 17:6 : WhatsApp BANNED by House Security Goons — But Why?
- 17:6 : Microsoft is named a Leader in The Forrester Wave™: Security Analytics Platforms, 2025
- 17:5 : IT Security News Hourly Summary 2025-06-24 18h : 21 posts
- 16:36 : Kali Linux 2025.1c Fixes Key Issue, Adds New Tools and Interface Updates
- 16:36 : New DRAT V2 Update Enhances C2 Protocol with Shell Command Execution Capabilities
- 16:36 : CISA Releases Eight Industrial Control Systems Advisories
- 16:36 : Delta Electronics CNCSoft
- 16:36 : Kaleris Navis N4 Terminal Operating System
- 16:36 : Schneider Electric Modicon Controllers
- 16:36 : Parsons AccuWeather Widget
- 16:35 : Microsoft is named a Leader in The Forrester Wave™: Security Analytics Platforms, 2025
- 16:35 : Lessons from Helsinki: NCSC-FI’s Role in Mitigating a Major Data Breach
- 16:4 : Amazon To Invest £40 Billion In UK, Campaigners Warn Of Data Centre Consumption
- 16:4 : Kubernetes Admission Controllers: Your First Line of Defense
- 16:4 : Threat Actors Abuse ConnectWise Configuration to Build a Signed Malware
- 16:4 : Google Cloud Donates A2A Protocol to Linux Foundation Enables Secure, Intelligent Communication
- 16:4 : Zimbra Classic Web Client Vulnerability Let Attackers Execute Arbitrary JavaScript
- 16:4 : Facebook, Netflix, Microsoft Hijacked to Insert Fake Phone Number
- 16:4 : 2,000+ Devices Hacked Using Weaponized Social Security Statement Themes
- 16:4 : AutoPwnKey – AV Evasion via Simulated User Interaction
- 16:4 : The Hidden Front: Iran, Cyber Warfare, and the Looming Threat to U.S. Critical Infrastructure
- 16:4 : Application and API Security Can’t Rely Solely on Perimeter Defenses or Scanners | Notes on Gartner AppSec Research | Contrast Security
- 16:4 : Malware Campaign Uses Rogue WordPress Plugin to Skim Credit Cards
- 15:35 : How CISOs became the gatekeepers of $309B AI infrastructure spending
- 15:35 : Integrated Threat Management: A Unified Strategy for Modern Business Security
- 15:35 : Linux Foundation launches Agent2Agent, a protocol that enables agentic AI interoperability
- 15:6 : Cryptominers? Anatomy: Shutting Down Mining Botnets
- 15:6 : TLDR* May Work for EULAs But Your Contracts?
- 15:6 : Gonjeshke Darande Hackers Pose as Activists to Infiltrate Iranian Crypto Exchange
- 15:6 : AI/ML Big Data-Driven Policy: Insights Into Governance and Social Welfare
- 15:6 : The vulnerability management gap no one talks about
- 15:6 : The Security Fallout of Cyberattacks on Government Agencies
- 15:6 : Mclaren Health Care Data Breach Impacts Over 743,000 Patients
- 14:36 : CitrixBleed 2: Electric Boogaloo — CVE-2025–5777
- 14:36 : Threat Actors Exploit ConnectWise Configuration to Create Signed Malware
- 14:36 : Over 2,000 Devices Compromised by Weaponized Social Security Statement Phishing Attacks
- 14:36 : What is residual risk? How is it different from inherent risk?
- 14:36 : What is pure risk?
- 14:36 : What is risk avoidance?
- 14:36 : Critical Convoy Vulnerability Let Attackers Execute Remote Code on Affected Servers
- 14:36 : Targeted Cyber Threat Disrupts Washington Post Newsroom Operations
- 14:36 : Hackers Target Over 70 Microsoft Exchange Servers to Steal Credentials via Keyloggers
- 14:35 : Researchers Find Way to Shut Down Cryptominer Campaigns Using Bad Shares and XMRogue
- 14:6 : LegoGPT: Die KI, die aus deinen Ideen stabile Bauwerke zaubert
- 14:6 : AI Slop: Was hinter dem KI-Begriff steckt – und warum ihr damit künftig häufiger konfrontiert werdet
- 14:6 : Ab 2026: EU-Staaten sollen auf Post-Quanten-Kryptografie wechseln
- 14:5 : Why a Classic MCP Server Vulnerability Can Undermine Your Entire AI Agent
- 14:5 : Weaponized DMV-Themed Phishing Scam Targets U.S. Citizens to Steal Personal and Financial Data
- 14:5 : Dissecting a Malicious Havoc Sample
- 14:5 : DataKrypto and Tumeryk Join Forces to Deliver World’s First Secure Encrypted Guardrails for AI LLMs and SLMs
- 14:5 : IT Security News Hourly Summary 2025-06-24 15h : 9 posts
- 14:5 : ManageEngine helps MSPs manage day-to-day operations
- 14:4 : Barracuda Managed Vulnerability Security identifies and prioritizes vulnerabilities
- 13:39 : Sicherheitskonzepte für Veranstaltungen: DEB fordert klare Zuständigkeiten
- 13:39 : Vom Phishing zum Casino: Kryptobetrüger verzockt Millionenbeute beim Glücksspiel
- 13:38 : EagleSpy v5 RAT Promoted by Hacker for Stealthy Android Access
- 13:38 : Want a free VPN? How to use ProtonVPN on Android without having to pay
- 13:38 : Russia-linked APT28 use Signal chats to target Ukraine official with malware
- 13:38 : Xiaomi’s Interoperability App Vulnerability Let Hackers Gain Unauthorized Access to the Victim’s Device
- 13:38 : OPPO Clone Phone Weak WiFi Hotspot Exposes Sensitive Data
- 13:37 : Pro-Iranian Hacktivists Targeting US Networks Department of Homeland Security Warns
- 13:37 : Siemens Notifies Customers of Microsoft Defender Antivirus Issue
- 13:6 : Windows 95 im Alltag: Wo Retro-Betriebssysteme noch unersetzlich sind
- 13:6 : Kanadischer Provider: Ungepatchte Cisco-Sicherheitslücke als Einfallstor
- 13:5 : Trends in Ransomware Attacks in Q3, 2024
- 13:5 : Zimbra Classic Web Client Vulnerability Allows Arbitrary JavaScript Execution
- 13:5 : PDFguard: AI Engine Against Growing Threats in PDFs
- 13:5 : 75 million deepfakes blocked: Persona leads the corporate fight against hiring fraud
- 13:5 : 2 clever ways Android 16 guards your security – but you need to enable them
- 13:5 : US House bans WhatsApp from staff devices
- 13:5 : Fortifying Retail Security: Practical Steps to Prevent Cyberattacks
- 12:34 : UK May Compel Google To Change Search Rankings, Offer Alternatives
- 12:34 : Between Buzz and Reality: The CTEM Conversation We All Need
- 12:34 : Half of Security Pros Want GenAI Deployment Pause
- 12:9 : [NEU] [hoch] HPE OneView: Schwachstelle ermöglicht Privilegieneskalation
- 12:8 : Unveiling Supply Chain Transformation: IIoT and Digital Twins
- 12:8 : Weaponized DMV-Themed Phishing Attacking U.S. Citizens to Harvest Personal and Financial Data
- 12:8 : Four REvil ransomware crooks walk free, escape gulag fate, after admitting guilt
- 12:8 : Trojanized SonicWall NetExtender app exfiltrates VPN credentials
- 12:8 : Reported Impersonation Scams Surge 148% as AI Takes Hold
- 11:38 : Vom Phish zum Casino: Krypto-Scammer verzockt Millionenbeute beim Glücksspiel
- 11:37 : Google Cloud Donates A2A Protocol to Linux Foundation for Smarter, Secure Communication
- 11:37 : NCSC Warns of SHOE RACK Malware Targeting Fortinet Firewalls via DOH & SSH Protocols
- 11:37 : Critical Convoy Flaw Allows Remote Code Execution on Servers
- 11:37 : US bans WhatsApp from House of Representatives staff devices
- 11:37 : Here’s a Subliminal Channel You Haven’t Considered Before
- 11:5 : [NEU] [mittel] JetBrains TeamCity: Mehrere Schwachstellen
- 11:5 : [NEU] [hoch] IGEL OS: Schwachstelle ermöglicht Privilegieneskalation
- 11:5 : IT Security News Hourly Summary 2025-06-24 12h : 14 posts
- 11:4 : Amazon Launches Second Batch Of Project Kuiper Satellites
- 11:4 : DHS Warns of Pro-Iranian Hacktivists Targeting U.S. Networks
- 11:4 : OPPO Clone Phone Vulnerability Leaks Sensitive Data via Weak WiFi Hotspot
- 11:4 : OWASP AI Testing Guide – A New Project to Detect Vulnerabilities in AI Applications
- 11:4 : Aviatrix Cloud Controller Authentication Vulnerability Let Attackers Execute Remote Code
- 11:4 : Prometei Botnet Activity Spikes
- 11:4 : Identity Is the New Perimeter: Why Proofing and Verification Are Business Imperatives
- 11:4 : Hackers Exploit Misconfigured Docker APIs to Mine Cryptocurrency via Tor Network
- 10:36 : Zweite Beta von iOS 26 ist da: Apple reagiert auf Kritik der Nutzer
- 10:36 : [NEU] [mittel] OpenVPN: Schwachstelle ermöglicht Denial of Service
- 10:36 : [NEU] [hoch] Red Hat OpenShift: Schwachstelle ermöglicht Manipulation von Dateien
- 10:36 : [NEU] [mittel] Red Hat Enterprise Linux (mod_proxy_cluster): Schwachstelle ermöglicht Manipulation von Daten
- 10:36 : [NEU] [mittel] Red Hat Enterprise Linux (iputils): Schwachstelle ermöglicht Denial of Service
- 10:35 : Revenge, Fame, and Fun: The Motives Behind Modern Cyberattacks
- 10:8 : WinRAR: Schwachstelle ermöglicht Codeausführung
- 10:8 : KI ruft das FBI: Wie ein virtueller Getränkeautomat zum Sicherheitsrisiko wurde
- 10:8 : [NEU] [mittel] Notepad++: Schwachstelle ermöglicht Privilegieneskalation
- 10:7 : [NEU] [mittel] WinRAR: Schwachstelle ermöglicht Codeausführung
- 10:6 : North Korean Hackers Use Malicious Zoom Apps to Execute System-Takeover Attacks
- 10:6 : WinRAR Directory Vulnerability Allows Arbitrary Code Execution Using a Malicious File
- 10:6 : Sophisticated Malware Campaign Targets WordPress and WooCommerce Sites with Obfuscated Skimmers
- 10:6 : Photo-Stealing Spyware Sneaks Into Apple App Store, Google Play
- 10:6 : Chinese APT Hacking Routers to Build Espionage Infrastructure
- 10:6 : Using AI to Identify Patterns in Vishing Attempts
- 10:6 : High-risk WinRAR RCE vulnerability patched, update quickly! (CVE-2025-6218)
- 10:6 : APT28 Uses Signal Chat to Deploy BEARDSHELL Malware and COVENANT in Ukraine
- 10:6 : U.S. House Bans WhatsApp on Official Devices Over Security and Data Protection Issues
- 9:33 : Jetzt beim Digitaltag 2025 mitmachen!
- 9:33 : Patch verschlafen: Großer Telco-Provider über Cisco-Lücke von 2023 attackiert
- 9:32 : LapDogs Hackers Compromise 1,000 SOHO Devices Using Custom Backdoor for Stealthy Attacks
- 9:10 : Künstlicher Gruppenzwang: Wie sich KI-Agenten gegenseitig beeinflussen
- 9:10 : Update: In IBM Storage Protect eingebauter Admin-Account gefährdet Systeme
- 9:10 : Die wahren Kosten der Open-Source-Unterstützung für Unternehmen | Offizieller Blog von Kaspersky
- 9:9 : Patch seit 2023 verfügbar: Großer Telco-Provider über alte Cisco-Lücke infiltriert
- 9:9 : Advanced Malware Campaign Targets WordPress and WooCommerce Sites with Hidden Skimmers
- 9:8 : WinRAR Vulnerability Let Execute Arbitrary Code Using a Malicious File
- 9:8 : Apple, Netflix, Microsoft Sites ‘Hacked’ for Tech Support Scams
- 9:8 : Unstructured Data Management: Closing the Gap Between Risk and Response
- 9:8 : NSFOCUS was Selected as a Representative Provider of Gartner® “Innovation Insight: Adversarial Exposure Validation in China”
- 9:8 : Common Good Cyber Fund launches to support nonprofits protecting the internet
- 9:8 : NCSC Urges Experts to Join Cyber Advisor Program
- 8:36 : Deepseek: Diese Daten soll der KI-Konzern an chinesische Geheimdienste weitergeleitet haben
- 8:35 : Google Chrome: Unterstützung für Android 8 und 9 endet
- 8:34 : Xiaomi Interoperability App Flaw Allows Unauthorized Access to User Devices
- 8:34 : OWASP Launches AI Testing Guide to Uncover Vulnerabilities in AI Systems
- 8:34 : I found a worthy Ring alternative in this video security camera (and it has no subscriptions)
- 8:34 : U.S. warns of incoming cyber threats following Iran airstrikes
- 8:34 : China-linked APT Salt Typhoon targets Canadian Telecom companies
- 8:7 : WhatsApp Banned on U.S. House Staffers Devices Due to Potential Security Risks
- 8:7 : North Korean Hackers Trick Users With Weaponized Zoom Apps to Execute System-Takeover Commands
- 8:5 : IT Security News Hourly Summary 2025-06-24 09h : 9 posts
- 7:35 : Fachkräftemangel bremst Cybersicherheit in deutschen Unternehmen
- 7:35 : BSI warnt: Immer weniger Menschen nutzen 2FA und sichere Passwörter
- 7:34 : ‘Psylo’ browser tries to obscure digital fingerprints by giving every tab its own IP address
- 7:34 : Retaliatory Iranian cyberattacks, steel giant confirms breach, ransomware hits healthcare system again
- 7:4 : Fehlkonfigurationen in Cloud-Umgebungen
- 7:4 : Kanboard: Sicherheitslücke ermöglicht Kontoübernahme
- 7:4 : [UPDATE] [mittel] Red Hat Enterprise Linux (yaml-libyam): Schwachstelle ermöglicht Manipulation von Dateien
- 7:3 : WinRAR Vulnerability Exploited with Malicious Archives to Execute Code
- 7:3 : ‘Psylo’ browser tries to obscure digital fingerprints by giving very tab its own IP address
- 7:3 : Cyber Intel Pros and Hobbyists Can Now Report Threats Anonymously
- 6:37 : Aviatrix Cloud Controller Flaw Enables Remote Code Execution via Authentication Bypass
- 6:36 : LapDogs Hackers Leverages 1,000 SOHO Devices Using a Custom Backdoor to Act Covertly
- 6:5 : New Echo Chamber Attack Breaks AI Models Using Indirect Prompts
- 6:5 : Why work-life balance in cybersecurity must start with executive support
- 5:32 : Notepad++ Vulnerability Allows Full System Takeover — PoC Released
- 5:32 : The real story behind cloud repatriation in 2025
- 5:32 : Reconmap: Open-source vulnerability assessment, pentesting management platform
- 5:5 : IT Security News Hourly Summary 2025-06-24 06h : 2 posts
- 5:0 : [UPDATE] [hoch] Zabbix: Mehrere Schwachstellen
- 4:34 : Cybersecurity jobs available right now: June 24, 2025
- 3:36 : Notepad++ Vulnerability Let Attacker Gain Complete System Control – PoC Released
- 3:36 : China-linked Salt Typhoon Exploits Critical Cisco Vulnerability to Target Canadian Telecom
- 2:6 : ISC Stormcast For Tuesday, June 24th, 2025 https://isc.sans.edu/podcastdetail/9502, (Tue, Jun 24th)
- 2:5 : IT Security News Hourly Summary 2025-06-24 03h : 1 posts
- 1:2 : Bulletproof Security Workflows with Grip’s Jira Integration
- 0:2 : Typhoon-like gang slinging TLS certificate ‘signed’ by the Los Angeles Police Department
- 23:5 : IT Security News Hourly Summary 2025-06-24 00h : 3 posts
- 22:55 : IT Security News Daily Summary 2025-06-23
- 22:32 : Salt Typhoon Targets Telecoms via Router Flaws, Warn FBI and Canada
- 22:32 : Heightened Cyber Threat from Iran Sparks Urgent Calls for Vigilance and Mitigation