14 posts were published in the last hour
- 13:33 : Security pros baited with fake Windows LDAP exploit traps
- 13:33 : Building Resilience Into Cyber-Physical Systems Has Never Been This Mission-Critical
- 13:32 : Code Intelligence Spark automates software testing
- 13:32 : Product Review: How Reco Discovers Shadow AI in SaaS
- 13:19 : Mozilla Firefox, Firefox ESR und Thunderbird: Mehrere Schwachstellen
- 13:19 : Übernahme fremder Konten: Ungewöhnlicher Phishing-Angriff zielt auf Paypal-Nutzer
- 13:19 : [UPDATE] [hoch] Red Hat OpenShift: Mehrere Schwachstellen
- 13:18 : Thousands of Live Hacker Backdoors Found in Expired Domains
- 13:18 : New PayPal Phishing Abusing Microsoft365 Domains for Sophisticated Attacks
- 13:18 : Cracking the Code: How Banshee Stealer Targets macOS Users
- 13:18 : Hackers are exploiting a new Ivanti VPN security bug to hack into company networks
- 13:18 : U.S. CISA adds Ivanti Connect Secure, Policy Secure, and ZTA Gateways flaw to its Known Exploited Vulnerabilities catalog
- 13:18 : GFI KerioControl Firewall Vulnerability Exploited in the Wild
- 13:18 : EU Commission Liable for Breaching EU’s Own Data Protection Rules