210 posts were published in the last hour
- 21:7 : Hacktivist Group Claimed Attacks Across 20+ Critical Sectors Following Iran–Israel Conflict
- 20:32 : A sophisticated cyberattack hit the International Criminal Court
- 20:6 : A Keycloak Example: Building My First MCP Server Tools With Quarkus
- 20:6 : Lock down your AT&T account to prevent SIM swapping attacks – here’s how
- 20:5 : Snake Keyloggers Abuse Java Utilities to Evade Security Tools
- 20:5 : Microsoft admits to Intune forgetfulness
- 20:5 : Critical Vulnerability in Anthropic’s MCP Exposes Developer Machines to Remote Exploits
- 20:5 : Remote access to AWS: A guide for hybrid workforces
- 20:5 : IT Security News Hourly Summary 2025-07-01 21h : 8 posts
- 18:35 : Identity-Based Attacks: A Deep Dive into Modern Recovery Solutions
- 18:34 : Esse Health data breach impacted 263,000 individuals
- 18:10 : TA829 Hackers Use New TTPs and Enhanced RomCom Backdoor to Evade Detection
- 18:9 : New DEVMAN Ransomware by DragonForce Targets Windows 10 and 11 Users
- 18:9 : Senate removes ban on state AI regulations from Trump’s tax bill
- 18:9 : Doctors Warned Over Use of Unapproved AI Tools to Record Patient Conversations
- 18:9 : Thousands of WordPress Sites at Risk as Motors Theme Flaw Enables Admin Account Takeovers
- 18:9 : Planning your move to Microsoft Defender portal for all Microsoft Sentinel customers
- 17:5 : IT Security News Hourly Summary 2025-07-01 18h : 16 posts
- 17:3 : Kimusky Hackers Employ ClickFix Technique to Run Malicious Scripts on Victim Devices
- 17:3 : What is risk analysis?
- 17:3 : Cyber Threat Intelligence: 3 Key Benefits For SOCs And MSSPs
- 17:3 : International Criminal Court swats away ‘sophisticated and targeted’ cyberattack
- 17:3 : New Report Ranks Best And Worst Generative AI Tools For Privacy
- 17:3 : TA829 and UNK_GreenSec Share Tactics and Infrastructure in Ongoing Malware Campaigns
- 16:39 : chwoot: Kritische Linux-Lücke macht Nutzer auf den meisten Systemen zu Root
- 16:38 : 600,000 WordPress Sites Affected by Arbitrary File Deletion Vulnerability in Forminator WordPress Plugin
- 16:38 : Hacktivist Group Launches Attacks on 20+ Critical Sectors Amid Iran–Israel Conflict
- 16:8 : FBI Warns of Health Insurance Scam Stealing Personal and Medical Data
- 16:8 : Snake Keyloggers Exploit Java Utilities to Evade Detection by Security Tools
- 16:8 : FESTO Automation Suite, FluidDraw, and Festo Didactic Products
- 16:8 : FESTO Didactic CP, MPS 200, and MPS 400 Firmware
- 16:8 : FESTO CODESYS
- 16:8 : Stealthy WordPress Malware Deliver Windows Trojan via PHP Backdoor
- 16:8 : Google Chrome May Soon Turn Webpages Into Podcasts With AI Audio Overviews
- 16:8 : Update your Chrome to fix new actively exploited zero-day vulnerability
- 16:7 : How AI Impacts KYC and Financial Security
- 16:7 : Microsoft introduces protection against email bombing
- 16:7 : Cloudflare Now Blocks AI Web Scraping by Default
- 15:37 : Bedrohungslage spitzt sich weiter zu
- 15:37 : Microsoft setzt den Rotstift an: Warum die Authenticator-App bald deine Passwörter löscht
- 15:37 : [UPDATE] [niedrig] Linux Kernel: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff
- 15:36 : [UPDATE] [hoch] Verschiedene Linux Distributionen: Mehrere Schwachstellen ermöglichen Privilegieneskalation
- 15:36 : [UPDATE] [mittel] Microsoft Developer Tools: Mehrere Schwachstellen
- 15:36 : [UPDATE] [hoch] Google Chrome und Microsoft Edge: Mehrere Schwachstellen ermöglichen Codeausführung
- 15:36 : [UPDATE] [mittel] Google Chrome / Microsoft Edge: Mehrere Schwachstellen
- 15:34 : Raising the Bar: Infinity Global Services’ Pen Testing Achieves CREST-Accreditation
- 15:34 : DCRAT Impersonating the Colombian Government
- 15:34 : Bluetooth vulnerability in audio devices can be exploited to spy on users
- 15:34 : Iranian Hackers Threaten More Trump Email Leaks Amid Rising U.S. Cyber Tensions
- 15:6 : OpenAI zieht die Notbremse: Warum bei dem KI-Unternehmen eine Woche lang die Arbeit stillsteht
- 15:5 : Elastic WAF: Reshaping Application Security for DevOps and Hybrid Environments
- 15:5 : Ghost in the Machine: A Spy’s Digital Lifeline
- 15:5 : New Flaw in IDEs Like Visual Studio Code Lets Malicious Extensions Bypass Verified Status
- 15:5 : Google Issues Emergency Patch for Fourth Chrome Zero-Day of 2025
- 14:34 : Got a suspicious UPS text? Don’t reply – it might be a scam. Here’s how to tell
- 14:34 : Cybersecurity career path: A strategic guide for professionals
- 14:34 : Linux 6.16-rc4 Released With Fixes for Filesystem, Driver & Hardware Support
- 14:34 : Pakistani Actors Built 300+ Cracking Websites Used to Deliver Info-Stealer Malware
- 14:34 : New Report Uncovers Major Overlaps in Cybercrime and State-Sponsored Espionage
- 14:7 : Internationaler Strafgerichtshof erneut von ausgefeilter Cyberattacke betroffen
- 14:7 : Critical Vulnerability in Microsens Devices Exposes Systems to Hackers
- 14:7 : Europe’s EUVD could shake up the vulnerability database ecosystem
- 14:7 : DOJ Charges 324 in Sprawling $14.6 Billion Health Care Fraud Scams
- 14:7 : Navigating AI Security Risks in Professional Settings
- 14:6 : Russian APT28 Targets Ukraine Using Signal to Deliver New Malware Families
- 14:6 : International Criminal Court Hit by “Sophisticated and Targeted” Attack
- 14:5 : IT Security News Hourly Summary 2025-07-01 15h : 7 posts
- 13:37 : KRITIS-Dachgesetz: 5 Tipps für Unternehmen
- 13:37 : Google und Sparkassen starten Altersverifikationssystem
- 13:35 : Operationalize Day-2 Services for API Security and Microsegmentation
- 13:35 : CRITICAL_PROCESS_DIED: How to Fix This Windows Blue Screen Error
- 13:35 : Europol Dismantles Fraud Crypto Investment Ring That Tricked 5000+ Victims Worldwide
- 13:35 : Microsoft Teams to Let Users Add Agents and Bots in Current Conversations
- 13:35 : DOJ Charges 324 in Sprawling $14.6 Billion Healthcare Fraud Scams
- 13:7 : Windows 11 25H2 bringt wenige neue Funktionen: Warum sich Nutzer trotzdem freuen dürften
- 13:7 : Viele Sicherheitslücken in Dell OpenManage Network Integration geschlossen
- 13:7 : Google und Sparkassen arbeiten an Altersverifikationssystem
- 13:6 : Commitment to Powering Europe?s Digital Sovereignty and Competitiveness
- 13:6 : What Are Some Ways To Diversify Your Crypto Portfolio In 2025?
- 13:6 : Swiss Government Confirms Radix Ransomware Attack Leaked Federal Data
- 13:6 : GDPR violations prompt Germany to push Google and Apple to ban DeepSeek AI
- 13:5 : Critical Microsens Product Flaws Allow Hackers to Go ‘From Zero to Hero’
- 13:5 : How OTP Works (Step-by-Step) — What Really Happens Behind Those One-Time Codes
- 13:5 : Cloudflare blocks AI crawlers by default, letting sites choose what gets scraped
- 13:5 : Sudo local privilege escalation vulnerabilities fixed (CVE-2025-32462, CVE-2025-32463)
- 13:5 : Crypto Hack Losses in First Half of 2025 Exceed 2024 Total
- 12:11 : Update für Google Drive: Diese neuen Funktionen machen den Upload per Smartphone noch einfacher
- 12:11 : GPT-4o oder o1-pro? So findest du das perfekte Modell für deine nächste Aufgabe
- 12:9 : IBM Cloud Pak Vulnerabilities Allow HTML Injection by Remote Attackers
- 12:9 : Microsoft Authenticator won’t manage your passwords anymore – here’s why and what’s next
- 12:9 : Blind Eagle Hackers Using Open-Source RATs & Ciphers to Hinder Static Detection
- 12:9 : New C4 Bomb Attack Bypasses Chrome’s AppBound Cookie Encryption
- 12:9 : LevelBlue to Acquire Trustwave to Create Major MSSP
- 11:38 : iOS 26 und macOS 26: Warum du auf diese neuen Funktionen verzichten musst
- 11:38 : Root-Zugriff für alle: Kritische Sudo-Lücke gefährdet unzählige Linux-Systeme
- 11:37 : (g+) Registermodernisierung: Zutritt für Unbefugte verboten
- 11:37 : [NEU] [mittel] Dell Secure Connect Gateway: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff
- 11:36 : Scammers Use Microsoft 365 Direct Send to Spoof Emails Targeting US Firms
- 11:36 : Pakistani Threat Actors Created 300+ Cracking Sites to Distribute Info-Stealing Malware
- 11:36 : Microsoft Teams Enables In‑Chat Bot & Agent Integration
- 11:36 : Iranian Blackout Affected Misinformation Campaigns
- 11:36 : Facebook wants to look at your entire camera roll for “AI restyling” suggestions, and more
- 11:36 : Etsy Stops Unwanted Traffic & Reduces Computing Costs with DataDome & Google
- 11:36 : Chrome Zero-Day CVE-2025-6554 Under Active Attack — Google Issues Security Update
- 11:36 : A New Maturity Model for Browser Security: Closing the Last-Mile Risk
- 11:10 : Google Chrome: Schwachstelle ermöglicht Codeausführung
- 11:10 : Immer genug Wasser trinken: Diese Apps und Tipps helfen euch dabei
- 11:10 : Bits & Böses: “Der Kampf gegen Hass ist wie ein Kampf gegen Windmühlen”
- 11:10 : [NEU] [hoch] IBM Storage Scale: Mehrere Schwachstellen
- 11:10 : [NEU] [hoch] Google Chrome: Schwachstelle ermöglicht Codeausführung
- 11:10 : [NEU] [hoch] Red Hat Ansible Automation Platform: Mehrere Schwachstellen
- 11:10 : [NEU] [hoch] MediaWiki: Mehrere Schwachstellen
- 11:8 : OpenAI Says No Plans To Deploy Google AI Chips
- 11:8 : Meta Restructures AI Efforts With New Unit
- 11:8 : How SOCs Improve Key Cybersecurity KPIs with Better Threat Analysis
- 11:8 : New C4 Bomb Attack Breaks Through Chrome’s AppBound Cookie Protections
- 11:8 : Linux 6.16-rc4 Launches Out With Filesystem, Driver, and Hardware Fixes
- 11:8 : Stealthy WordPress Malware Uses PHP Backdoor to Deliver Windows Trojan
- 11:8 : 5 Critical Security Risks Facing COBOL Mainframes
- 11:8 : Europol dismantles €460M crypto scam targeting 5,000 victims worldwide
- 11:8 : Django App Vulnerabilities Chained to Execute Arbitrary Code Remotely
- 11:8 : 263,000 Impacted by Esse Health Data Breach
- 11:8 : Google patches actively exploited Chrome (CVE‑2025‑6554)
- 11:7 : Ransomware Strike on Swiss Health Foundation Exposes Government Data
- 11:5 : IT Security News Hourly Summary 2025-07-01 12h : 25 posts
- 10:31 : Youtube: Genervt von KI-Übersetzungen? Diese Browser-Erweiterung räumt damit auf
- 10:31 : [NEU] [hoch] IGEL OS: Schwachstelle ermöglicht Codeausführung
- 10:31 : [NEU] [hoch] Tenable Security Nessus: Schwachstelle ermöglicht Manipulation von Dateien
- 10:31 : [NEU] [hoch] sudo: Mehrere Schwachstellen
- 10:31 : [NEU] [mittel] Red Hat Enterprise Linux (python-setuptools): Schwachstelle ermöglicht Codeausführung
- 10:31 : [NEU] [mittel] Dell NetWorker: Schwachstelle ermöglicht Offenlegung von Informationen
- 10:6 : Windows: Microsoft findet 400 Millionen Nutzer wieder
- 10:6 : Cybercrime: US-Regierung geht gegen nordkoreanische Fake-ITler vor
- 10:6 : [NEU] [UNGEPATCHT] [mittel] Trellix Endpoint Security: Schwachstelle ermöglicht Cross-Site Scripting
- 10:5 : June Patch Tuesday from Microsoft Fixed 70+ Bugs, Including A Zero-Day
- 10:5 : Ransomware Detection Best Practices: How to Catch Attacks Before Data is Lost
- 10:5 : Blind Eagle Hackers Leverage Open-Source RATs and Ciphers to Evade Static Detection
- 10:5 : Thousands of Citrix NetScaler Instances Unpatched Against Exploited Vulnerabilities
- 10:5 : U.S. Arrests Facilitator in North Korean IT Worker Scheme; Seizes 29 Domains and Raids 21 Laptop Farms
- 10:4 : Google Patches Critical Zero-Day Flaw in Chrome’s V8 Engine After Active Exploitation
- 9:40 : Sicherheitsupdates: IBM App Connect Enterprise Container und MQ sind verwundbar
- 9:39 : US Takes Down North Korean Fraud Ring
- 9:39 : Circle Applies To Create National Trust Bank After IPO Success
- 9:39 : North Korean IT Workers Employ New Tactics to Infiltrate Global Organizations
- 9:38 : Terrible tales of opsec oversights: How cybercrooks get themselves caught
- 9:38 : North Korean Remote IT Workers Added New Tactics and Techniques to Infiltrate Organizations
- 9:38 : U.S DOJ Announces Nationwide Actions to Combat North Korean Remote IT Workers
- 9:38 : CISA Warns of Citrix NetScaler ADC and Gateway Vulnerability Actively Exploited in Attacks
- 9:38 : Iranian Hackers’ Preferred ICS Targets Left Open Amid Fresh US Attack Warning
- 9:38 : Our pentest quote form saves you time
- 9:37 : Scam Centers Expand Global Footprint with Trafficked Victims
- 9:9 : Siri doch ohne Apple-KI? Welche Pläne der iPhone-Konzern für den smarten Sprachassistenten hat
- 9:9 : Mysteriöser Hacker packt aus: Wie er Cyberkriminelle entlarvt und dabei Millionen sausen lässt
- 9:9 : Let’s Encrypt: Nachrichten zu abgelaufenen Zertifikaten eingestellt
- 9:9 : Podcast Besser Wissen: Wir machen uns frei!
- 9:9 : Nutzerbeschwerden: Midea-Klimaanlagen machen sich unerwartet selbstständig
- 9:9 : [UPDATE] [mittel] Python: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen
- 9:9 : [UPDATE] [mittel] PAM: Schwachstelle ermöglicht Privilegieneskalation
- 9:8 : CISA Warns Iranian Cyber Threats Targeting U.S. Critical Infrastructure
- 9:8 : US Storms 29 Laptop Farms in Crackdown on North Korean IT Worker Schemes
- 9:8 : US DoJ and Microsoft Target North Korean IT Workers
- 8:36 : Google Buys Power From Nascent Fusion Project
- 8:35 : Meta, ByteDance Must Face Lawsuit Over ‘Subway Surfing’ Death
- 8:35 : CISA and U.S. Agencies warn of ongoing Iranian cyber threats to critical infrastructure
- 8:34 : Linux Sudo chroot Vulnerability Enables Hackers to Elevate Privileges to Root
- 8:34 : Top 20 Best Endpoint Management Tools – 2025
- 8:34 : CISA Warns of Iranian Cyber Actors May Attack U.S. Critical Infrastructure
- 8:34 : Scam centers are spreading, and so is the human cost
- 8:34 : U.S. Arrests Key Facilitator in North Korean IT Worker Scheme, Seizes $7.74 Million
- 8:7 : Überwachungskameras aus China: Kanada ordnet Schließung von Hikvision Canada an
- 8:7 : [UPDATE] [mittel] Intel Prozessoren: Mehrere Schwachstellen ermöglichen Offenlegung von Informationen
- 8:7 : [UPDATE] [hoch] Mozilla Firefox, Firefox ESR, Thunderbird and Thunderbird ESR: Mehrere Schwachstellen
- 8:7 : [UPDATE] [hoch] Python: Mehrere Schwachstellen
- 8:7 : [UPDATE] [hoch] Microsoft Developer Tools: Mehrere Schwachstellen
- 8:7 : [UPDATE] [mittel] GNU libc: Mehrere Schwachstellen ermöglichen Manipulation von Daten
- 8:6 : Django App Vulnerabilities Allow Remote Code Execution
- 8:6 : AI Is Enhancing The Traditional Pentesting Approach – A Detailed Analysis
- 8:5 : IT Security News Hourly Summary 2025-07-01 09h : 7 posts
- 7:42 : Webbrowser Chrome: Sicherheitslücke wird angegriffen
- 7:40 : Meta Hires Four OpenAI Researchers For New Unit
- 7:40 : New Iran warning, Chinese surveillance company banned, CISA names new executive director
- 7:8 : Chrome: Google stopft attackierte Sicherheitslücke
- 7:7 : Chrome 138 Update Patches Zero-Day Vulnerability
- 6:36 : Proton bashes Apple and joins antitrust suit that seeks to throw the App Store wide open
- 6:36 : Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- 6:36 : Tracer AI combats fraud, counterfeits and narrative attacks in ChatGPT
- 6:7 : Sicherheitsexperten beraten Umgang mit Cyberattacken
- 6:6 : CISA Issues Alert on Actively Exploited Citrix NetScaler ADC and Gateway Vulnerability
- 6:6 : Europol Dismantles Massive Crypto Investment Scam Targeting 5000+ victims Worldwide
- 6:6 : How cybercriminals are weaponizing AI and what CISOs should do about it
- 5:36 : BDSW hält Mindestlohnerhöhung für wirtschaftlich bedenklich
- 5:36 : USA: Erneut koordinierte Aktion gegen Nordkoreas Remote-Angestellte
- 5:35 : Chrome 0-Day Flaw Exploited in the Wild to Execute Arbitrary Code
- 5:34 : Windows 11 Just Got Smarter: Your 1Password Passkeys Now Work Seamlessly!
- 5:5 : U.S. DOJ Cracks Down on North Korean Remote IT Workforce Operating Illegally
- 5:5 : GenAI is everywhere, but security policies haven’t caught up
- 5:5 : Microsoft Removes Password Management from Authenticator App Starting August 2025
- 4:36 : News alert: SquareX research finds browser AI agents are proving riskier than human employees
- 4:36 : Think Twice Before Using Text Messages for Security Codes — Here’s a Safer Way
- 4:36 : Cybersecurity jobs available right now: July 1, 2025
- 4:36 : How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- 4:5 : Chrome 0-Day Vulnerability Exploited in the Wild to Execute Arbitrary Code – Patch Now
- 0:4 : LinuxFest Northwest: See How Far COSMIC Has Come This Year
- 0:4 : Best Software Composition Analysis (SCA) Tools: Top 6 Solutions in 2025
- 23:5 : IT Security News Hourly Summary 2025-07-01 00h : 2 posts
- 23:3 : Best Secure Tools for Protecting Remote Teams in 2025
- 23:1 : IT Security News Weekly Summary July
- 22:55 : IT Security News Daily Summary 2025-06-30
- 22:34 : The Rise of Agentic AI: From Chatbots to Web Agents
- 22:33 : The Rise of Agentic AI: Uncovering Security Risks in AI Web Agents