210 posts were published in the last hour
- 22:32 : BADBOX Botnet Infected Over 190,000 Android Devices Including LED TVs
- 22:32 : 242,000 Times Downloaded Malicious Apps from Android and iOS Stealing Crypto Recovery Keys
- 22:5 : CISA Adds Four Vulnerabilities to Catalog for Federal Enterprise
- 22:5 : The biggest breach of US government data is under way
- 22:5 : U.S. CISA adds Linux kernel flaw to its Known Exploited Vulnerabilities catalog
- 22:5 : Paraguay’s Broadband Providers Continue to Struggle to Attain Best Practices at Protecting Users’ Data
- 22:5 : Semgrep Raises $100M for AI-Powered Code Security Platform
- 22:5 : AWS renews MTCS Level 3 certification under the SS584:2020 standard
- 21:32 : Cache Hit Ratio: The Key Metric for Happier Users and Lower Expenses
- 21:32 : 5 great Chrome browser alternatives that put your privacy first
- 21:32 : Paragon spyware used to target citizens across Europe, says Italian government
- 21:7 : Proton Pass vs. 1Password: Which password manager is right for you?
- 21:7 : DOGE latest: Citrix supremo has ‘read-only’ access to US Treasury payment system
- 21:7 : Passkeys: The future of secure and seamless authentication
- 21:7 : Victory! EFF Helps Defeat Meritless Lawsuit Against Journalist
- 20:32 : Building a Cyber-Resilient Public Sector Through Hands-on Security Training
- 20:9 : DeepSeek Sends Data To Blacklisted China Mobile – Report
- 20:9 : Musky minion granted ‘read-only’ access to federal payment systems
- 20:9 : Experts Find Hidden Backdoors Inside Chinese Software Stealing Patient Data
- 20:5 : IT Security News Hourly Summary 2025-02-05 21h : 6 posts
- 19:32 : Google releases responsible AI report while removing its anti-weapons pledge
- 19:32 : 10 Cyber Recommendations for the Trump Administration
- 19:32 : Hackers Using AI Agents To Validate Stolen Credit Cards
- 19:32 : CISA Adds Actively Exploited Linux Kernel Vulnerability to Known Exploited Vuln Catalog
- 19:5 : OpenText Secure Cloud: Streamline workflows with integrations
- 19:5 : Ransomware payments dropped in 2024 as victims refused to pay hackers
- 19:5 : DeepSeek AI Model Riddled With Security Vulnerabilities
- 18:32 : The Collapse of USAID Is Already Fueling Human Trafficking and Slavery at Scammer Compounds
- 18:32 : 4 Ways to Mitigate the Human Factors of Cybersecurity
- 18:7 : Phishing via “com-” prefix domains, (Wed, Feb 5th)
- 18:7 : Alphabet Disappoints Investors, Despite Profit, Revenue Increases
- 18:7 : The Collapse of USAID Is Fueling Human Trafficking and Slavery at Scammer Compounds
- 18:7 : New target of Paragon spyware comes forward
- 17:32 : How AWS Network Firewall session state replication maximizes high availability for your application traffic
- 17:5 : 21% of CISOs Have Been Pressured Not to Report a Compliance Issue, Research Finds
- 17:5 : What is a cyberthreat hunter (cybersecurity threat analyst)?
- 17:5 : CISA Adds One Known Exploited Vulnerability to Catalog
- 17:5 : Threat Actors Exploiting DeepSeek’s Rise To Fuel Cyber Attacks
- 17:5 : Ransomware Attack Disrupts New York Blood Center Operations Amid Critical Shortage
- 17:5 : Cybercrime gang exploited VeraCore zero-day vulnerabilities for years (CVE-2025-25181, CVE-2024-57968)
- 17:5 : IT Security News Hourly Summary 2025-02-05 18h : 26 posts
- 16:34 : Deep will Unterwassersiedlungen in allen Ozeanen aufbauen
- 16:33 : Amazon To Face Legal Action Over Warehouse Closures
- 16:33 : Banking Malware Uses Live Numbers to Hijack OTPs, Targeting 50,000 Victims
- 16:33 : Cybercriminals Leveraging AI to Verify Stolen Credit Card Data
- 16:33 : Malicious Android & iOS Apps Downloaded Over 242,000 Times, Stealing Crypto Recovery Keys
- 16:33 : BADBOX Botnet Surges: Over 190,000 Android Devices Infected, Including LED TVs
- 16:33 : Netgear fixes critical bugs as Five Eyes warn about break-ins at the edge
- 16:33 : In the Search for Talent, Candidates with Certifications Stand Out
- 16:33 : Small business owners, secure your web shop
- 16:33 : How Agentic AI will be Weaponized for Social Engineering Attacks
- 16:33 : Sophisticated Phishing Campaign Targets Ukraine’s Largest Bank
- 16:7 : Microsoft 365: Dieser Vorteil wird Kunden jetzt gestrichen
- 16:7 : Schluss mit Kleingedrucktem: Adobe Acrobat bekommt KI-Übersetzer für Vertragstexte
- 16:7 : Apple überrascht mit neuer Einladungs-App – wir haben sie ausprobiert
- 16:7 : Google Maps: Keine Lust mehr auf den blauen Pfeil? Diese Alternativen bekommt ihr bald
- 16:6 : Good news as ransomware pay fell by 35 percent in 2024
- 16:6 : Threat Actors Exploiting Free Email Services to Target Government and Educational Institutions
- 16:6 : Zero-Day Vulnerabilities in Microsoft Sysinternals Tools Enable DLL Injection Attacks on Windows
- 16:6 : Hackers Using AI Agents to Validate Stolen Credit Cards
- 16:6 : AI Regulation in the U.S.: Navigating Post-EO 14110
- 16:6 : The best AirTag wallets of 2025: Expert tested
- 16:5 : Man Sentenced to 7 Years in Prison for Role in $50M Internet Scam
- 16:5 : U.S. CISA adds Microsoft .NET Framework, Apache OFBiz, and Paessler PRTG Network Monitor flaws to its Known Exploited Vulnerabilities catalog
- 16:5 : 9 Best Endpoint Management Software in 2025
- 16:5 : Cross-Platform JavaScript Stealer Targets Crypto Wallets in New Lazarus Group Campaign
- 16:5 : Ransomware Payments Decline 35% as Victims Resist Demands
- 15:33 : CES Las Vegas 2025: Einblicke in die Zukunft der Technologie
- 15:33 : Passkeys: Bundesagentur für Arbeit erhöht Zugangssicherheit
- 15:33 : Google unterstützt Ausbildungsprogramm für bessere IT-Sicherheit an TU München
- 15:32 : Alphabet Lifts Ban On AI For Weapons
- 15:32 : 5 great Chrome-like browsers that put your privacy first
- 15:32 : How to create a third-party risk management policy
- 15:32 : Multiple IBM Cloud Pak Vulnerabilities Let Attackers Execute Remote Code
- 15:32 : Industry Moves for the week of February 3, 2025 – SecurityWeek
- 15:32 : Hacker Conversations: David Kennedy – an Atypical Typical Hacker
- 15:32 : Preventing account takeover on centralized cryptocurrency exchanges in 2025
- 15:4 : Mehr Sicherheit: Bundesagentur für Arbeit setzt auf Passkeys
- 15:3 : How to turn on Private DNS Mode on Android – and why it’s a must for security
- 15:3 : The best Wyze Cam alternative I’ve tested is only $20 with this deal
- 15:3 : New ‘Browser Syncjacking’ Attack Exploits Chrome Extensions for Full Device Takeover
- 15:3 : Community Health Centre Data Breach Impacts Over 1 Million Patients
- 15:3 : Two-Month Cyber Breach at Mizuno USA Under Investigation
- 15:3 : Bengaluru Woman Loses ₹2 Lakh to Sophisticated IVR-Based Cyber Scam
- 15:3 : SafeBreach exposure validation platform identifies security gaps
- 14:33 : Sicher im Smarthome – Sicherheitschecks für Datenschutz
- 14:32 : Cyber Insights 2025: OT Security
- 14:32 : Swap EOL Zyxel routers, upgrade Netgear ones!
- 14:6 : Netgear: Nighthawk Pro Gaming-Router mit Schadcode-Leck
- 14:6 : Kaspersky-Apps für Android herunterladen, installieren und aktualisieren | Offizieller Blog von Kaspersky
- 14:5 : Canadian Charged in $65M KyberSwap, Indexed Finance DeFi Hack
- 14:5 : Michael Trites Joins Aembit as Senior Vice President of Global Sales
- 14:5 : SparkCat campaign target crypto wallets using OCR to steal recovery phrases
- 14:5 : Apple’s macOS Kernel Vulnerability Let Attackers Escalate Privileges – PoC Released
- 14:5 : US cranks up espionage charges against ex-Googler accused of trade secrets heist
- 14:5 : Cybersecurity M&A Roundup: 45 Deals Announced in January 2025
- 14:5 : Silent Lynx Using PowerShell, Golang, and C++ Loaders in Multi-Stage Cyberattacks
- 14:5 : Cybercriminals Use Go Resty and Node Fetch in 13 Million Password Spraying Attempts
- 14:5 : Mobile Malware Targeting Indian Banks Exposes 50,000 Users
- 14:5 : IT Security News Hourly Summary 2025-02-05 15h : 7 posts
- 13:32 : SystemBC Strikes Linux: Why Proactive Defense Is Now Critical
- 13:32 : IBM Cloud Pak Security Vulnerabilities Expose Sensitive Data to Attackers
- 13:32 : Check Point Software Collaborates with AppDirect to Offer Streamlined Cyber Security Solutions
- 13:32 : How to Add Fingerprint Authentication to Your Windows 11 Computer
- 13:32 : Despite Catastrophic Hacks, Ransomware Payments Dropped Dramatically Last Year
- 13:32 : 2024: The Year Data Security Took a Beating
- 13:32 : Satori provides visibility into data store risk levels
- 13:4 : Kosteneinsparungen: Let’s Encrypt stellt Ablaufwarnungen für Zertifikate ein
- 13:4 : [UPDATE] [mittel] libyaml: Schwachstelle ermöglicht Denial of Service
- 13:3 : Apple’s macOS Kernel Vulnerability (CVE-2025-24118) Exposes Users to Privilege Escalation Attacks – PoC Released
- 13:3 : INDIA Finance Ministry Bans ChatGPT, DeepSeek For Official Use
- 13:3 : How App Orchid’s AI and Google Cloud are changing the game for business data analytics
- 13:3 : Critical Netgear Vulnerabilities Let Attackers Execute Remote Code
- 13:3 : Hackers Exploit GPU Vulnerabilities to Take Complete Control of Your Device
- 13:3 : Riot Raises $30 Million for Employee Cybersecurity Solution
- 12:33 : [UPDATE] [hoch] Linux Kernel: Mehrere Schwachstellen
- 12:33 : [UPDATE] [hoch] Red Hat OpenShift: Mehrere Schwachstelle
- 12:33 : [UPDATE] [mittel] Red Hat OpenShift: Mehrere Schwachstellen
- 12:33 : [UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service
- 12:32 : China Retaliates Against Trump’s Tariffs, Starts Google Probe
- 12:32 : Australia Bans China’s DeepSeek On Government Devices
- 12:32 : Investors, Trump and the Illuminati: What the “Nigerian prince” scams became in 2024
- 12:32 : Russian Hackers Exploited 7-Zip Zero-Day Against Ukraine
- 12:32 : New Veeam Flaw Allows Arbitrary Code Execution via Man-in-the-Middle Attack
- 12:8 : [UPDATE] [mittel] cURL: Schwachstelle ermöglicht Ausführen von beliebigem Programmcode mit Benutzerrechten
- 12:8 : [UPDATE] [mittel] GnuPGP: Schwachstelle ermöglicht Offenlegung von Informationen
- 12:8 : [UPDATE] [hoch] Perl: Schwachstelle ermöglicht Ausführen von beliebigem Programmcode mit Administratorrechten
- 12:8 : [UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen
- 12:7 : CIS Control 03: Data Protection
- 12:7 : Zero Trust Principles for Critical Infrastructure Security
- 12:7 : Threat Actors Leveraging Free Email Services To Attack Govt & Education Entities
- 12:7 : CISA Releases Nine Advisories Detailing Vulnerabilities and Exploits Surrounding ICS
- 12:7 : Chrome 133, Firefox 135 Patch High-Severity Vulnerabilities
- 12:7 : Cybersecurity in IT Infrastructure: Protecting Digital Assets
- 12:7 : The Path of Least Resistance to Privileged Access Management
- 11:33 : Microsoft: Umgehen der Voraussetzungen von Windows 11 ist unerwünscht
- 11:32 : Webinar Today: Defenders on the Frontline – Incident Response and Threat Intel Under the Microscope
- 11:32 : Crypto-stealing iOS, Android malware found on App Store, Google Play
- 11:32 : Navigating the Future: Key IT Vulnerability Management Trends
- 11:8 : Zugriffsmanagement: HPE Aruba Networking CPPM ist verwundbar
- 11:8 : Veeam Backup: Codeschmuggel durch MitM-Lücke im Updater möglich
- 11:8 : [NEU] [niedrig] Golang Go: Schwachstelle ermöglicht Offenlegung von Informationen
- 11:8 : [NEU] [mittel] HCL BigFix Server Automation: Schwachstelle ermöglicht Denial of Service
- 11:7 : Hackers Using Fake Microsoft ADFS Login Pages to Steal Credentials
- 11:7 : Hackers Exploits ADFS to Bypass MFA & Gain Access to Critical Systems
- 11:7 : CISA Issues Exploitation Warning for .NET Vulnerability
- 11:7 : Five Eyes Launch Guidance to Improve Edge Device Security
- 11:5 : IT Security News Hourly Summary 2025-02-05 12h : 12 posts
- 10:33 : Kein Support mehr: Hersteller drängt wegen Router-Lücken auf Entsorgung
- 10:32 : Critical Netgear Vulnerabilities Allow Hackers to Execute Remote Code
- 10:32 : Router maker Zyxel tells customers to replace vulnerable hardware exploited by hackers
- 10:32 : AsyncRAT Campaign Uses Python Payloads and TryCloudflare Tunnels for Stealth Attacks
- 10:32 : Destructive Attacks on Financial Institutions Surge
- 10:32 : Cybercriminals Eye DeepSeek, Alibaba LLMs for Malware Development
- 10:5 : Google Chrome: Mehrere Schwachstellen
- 10:5 : Mozilla Firefox und Thunderbird: Mehrere Schwachstellen
- 10:5 : Opera Air bringt Achtsamkeit in den Browser – wir haben es ausprobiert
- 10:5 : Cybersecurity: Wie Tabletop-Übungen dein Team auf den Ernstfall vorbereiten
- 10:5 : Whatsapp: Dritter blauer Haken als Sicherheitsfeature? Was wirklich dahintersteckt
- 10:5 : [UPDATE] [hoch] Red Hat Enterprise Linux: Mehrere Schwachstellen
- 10:4 : Giddy Up! It’s Time for Defense Tech Companies to Get Ahead of CMMC Before They Get Left Behind
- 10:4 : CISA Adds Actively Exploited Apache and Microsoft Vulnerabilities to its Database
- 10:4 : Threat Actors Exploiting DeepSeek’s Rise to Fuel Cyber Attacks
- 10:4 : Hackers Can Exploit GPU Flaws to Gain Full Control of Your Device
- 10:3 : Comparing “Records of Processing Activities” (ROPA) and “Data Protection Impact Assessments” (DPIA)
- 10:3 : Zyxel Issues ‘No Patch’ Warning for Exploited Zero-Days
- 10:3 : Tenable Acquires Vulcan Cyber, Building on AI-Powered Risk Prioritization
- 10:3 : Atrinet URL Scanner helps comabat SMS phishing
- 10:3 : Veriti Cloud automates remediation across both on-premises and cloud environments
- 10:3 : Dynatrace strengthens cloud security posture management
- 10:3 : Destructive Attacks on Financial Institutions Surge 13%
- 9:31 : Jetzt trifft es auch Go: Bösartiges Typosquatting im Ökosystem entdeckt
- 9:31 : [UPDATE] [mittel] Adobe Experience Manager: Mehrere Schwachstellen
- 9:31 : [UPDATE] [hoch] Synology DiskStation Manager: Mehrere Schwachstellen
- 9:31 : [UPDATE] [hoch] Checkmk: Mehrere Schwachstellen
- 9:31 : [UPDATE] [hoch] Microsoft .NET Framework: Schwachstelle ermöglicht Offenlegung von Informationen
- 9:31 : [UPDATE] [hoch] Oracle Health Sciences Applications: Mehrere Schwachstellen
- 9:6 : Support ausgelaufen: Keine Sicherheitsupdates mehr für attackierte Zyxel-Router
- 9:6 : Typosquatting im Go-Ökosystem: Gefälschtes BoltDB-Paket entdeckt
- 9:6 : Transparenzberichte: Behördenanfragen an E-Mail-Anbieter zum Großteil unzulässig
- 9:5 : International Civil Aviation Organization (ICAO) and ACAO Breached: Cyberespionage Groups Targeting Aviation Safety Specialists
- 8:34 : Spell: KI-gestütztes Krisenmanagement
- 8:34 : 7-Zip: Mark-of-the-Web-Lücke wurde von Angreifern missbraucht
- 8:33 : Chinese Hackers Attacking Linux Devices With New SSH Backdoor
- 8:33 : Take my money: OCR crypto stealers in Google Play and App Store
- 8:33 : CISA Releases Guidance to Protect Firewalls, Routers, & Internet-Facing Servers
- 8:33 : Critical Veeam Backup Vulnerability Let Attackers Execute Arbitrary Code to Gain Root Access
- 8:33 : 0-Day Vulnerabilities in Microsoft Sysinternals Tools Allow Attackers To Launch DLL Injection Attacks on Windows
- 8:33 : Hackers Exploiting A Six-Year-Old IIS Vulnerability To Gain Remote Access
- 8:33 : TinyZero – Researchers Replicated DeepSeek’s R1-Zero Model for Just $30
- 8:32 : Meta identifies risky AI systems, Ferret malware joins ‘Contagious Interview’ campaign, credential theft rises as a target
- 8:32 : DeepSeek AI Controversies, Shadow AI Risks: Cyber Security Today for Wednesday February 5, 2025
- 8:5 : IT Security News Hourly Summary 2025-02-05 09h : 3 posts
- 8:4 : Hackers Exploit ADFS to Bypass MFA and Access Critical Systems
- 7:7 : NSA asks iPhone users to use flap covers to banish privacy concerns
- 7:7 : Can Smartwatches Be Targeted by Cyber Attacks?
- 6:32 : CISA Releases Nine Security Advisories on ICS Vulnerabilities and Exploits
- 6:32 : Hackers Exploiting a Six-year-old IIS Vulnerability to Gain Remote Access
- 6:7 : Veeam Backup Vulnerability Allows Attackers to Execute Arbitrary Code
- 6:7 : CISA Adds Apache, Microsoft Vulnerabilities to Its Database that Are Actively Exploited in the Wild
- 6:7 : CISA Adds Four Actively Exploited Vulnerabilities to KEV Catalog, Urges Fixes by Feb 25
- 5:32 : Upskilling the UK workforce for the AI revolution
- 5:32 : OpenNHP: Cryptography-driven zero trust protocol
- 5:5 : CISA Releases New Guidelines to Secure Firewalls, Routers, and Internet-Facing Servers
- 5:5 : Arctic Wolf and BlackBerry Announce Closing of Acquisition for Cylance
- 5:5 : AI-Powered Cyber Warfare, Ransomware Evolution, and Cloud Threats Shape 2025 Cyber Landscape
- 5:5 : Cato Networks Appoints Karl Soderlund as Global Channel Chief to Accelerate Channel Growth in SASE Market
- 5:5 : Chrome Use-After-Free Vulnerabilities Let Attackers Execute Remote Code – Update Now
- 5:5 : IT Security News Hourly Summary 2025-02-05 06h : 2 posts
- 4:32 : More destructive cyberattacks target financial institutions