19 posts were published in the last hour
- 13:38 : [UPDATE] [mittel] AngularJS: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen
- 13:38 : [UPDATE] [niedrig] Angular: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen
- 13:38 : [UPDATE] [mittel] Bootstrap: Mehrere Schwachstellen ermöglichen Cross-Site Scripting
- 13:38 : [UPDATE] [mittel] Red Hat Enterprise Linux (pki-core): Schwachstelle ermöglicht Offenlegung von Informationen
- 13:38 : [UPDATE] [hoch] Red Hat Enterprise Linux pki-core: Mehrere Schwachstellen
- 13:37 : EU cybersecurity rules for smart devices enter into force
- 13:37 : Microsoft Bets $10,000 on Prompt Injection Protections of LLM Email Client
- 13:37 : Five Ways Spear Phishing Tactics are Evolving in 2025
- 13:37 : Attackers actively exploiting flaw(s) in Cleo file transfer software (CVE-2024-50623)
- 13:36 : The Future of Network Security: Automated Internal and External Pentesting
- 13:36 : Scottish Parliament TV at Risk of Deepfake Attacks
- 13:6 : Transfer-Software von Cleo: Hinter Firewall bringen, Patch wirkungslos
- 13:5 : How Red Teaming Helps Meet DORA Requirements
- 13:5 : November 2024’s Most Wanted Malware: Androxgh0st Leads the Pack, Targeting IoT Devices and Critical Infrastructure
- 13:5 : Poker Cheaters Allegedly Use Tiny Hidden Cameras to Spot Dealt Cards
- 13:5 : A CISO’s Guide to Managing Risk as the World Embraces AI
- 13:5 : Heart surgery device maker’s security bypassed, data encrypted and stolen
- 13:5 : Astrix Security Banks $45M Series B to Secure Non-Human Identities
- 13:5 : China’s Surveillance System: Cracks in a Digital Panopticon