29 posts were published in the last hour
- 13:34 : [UPDATE] [mittel] gcc: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen
- 13:33 : [UPDATE] [mittel] Intel Prozessoren: Schwachstelle ermöglicht Offenlegung von Informationen
- 13:33 : [UPDATE] [mittel] Ansible: Schwachstelle ermöglicht Offenlegung von Informationen
- 13:33 : [UPDATE] [mittel] jQuery: Mehrere Schwachstellen ermöglichen Cross-Site Scripting
- 13:33 : [UPDATE] [hoch] Intel Prozessoren: Mehrere Schwachstellen
- 13:32 : Cybercriminals Exploit Pyramid Pentesting Tool for Covert C2 Communications
- 13:32 : Urgent Apple released iOS 18.3.1 and iPadOS 18.3.1 Security Updates
- 13:32 : January 2025’s Most Wanted Malware: FakeUpdates Continues to Dominate
- 13:32 : CyberArk snaps up Zilla Security for up to $175M
- 13:32 : Introducing Cortex Cloud — The Future of Real-Time Cloud Security
- 13:32 : Chinese Cyberspy Possibly Launching Ransomware Attacks as Side Job
- 13:32 : Sandworm APT’s initial access subgroup hits organizations accross the globe
- 13:7 : CYBERSNACS #Folge 30: Cyber Resilience What ?
- 13:7 : Sicherheitslücken: Gitlab-Entwickler raten zu zügigem Update
- 13:7 : Eckert & Ziegler: Cyberangriff trifft Berliner Medizintechnik-Konzern
- 13:6 : FortiOS Vulnerability Allows Super-Admin Privilege Escalation – Patch Now!
- 13:6 : Palo Alto Firewall Flaw Exploited in RA World Ransomware Attacks
- 13:6 : 30,000 WordPress Sites Exposed to Exploitation via File Upload Vulnerability
- 13:6 : New Phishing Attacks Abuses Webflow CDN & CAPTCHAs to Steal Credit Card details
- 13:6 : Threat Actors in Russia, China, and Iran Targeting Local communities in the U.S
- 13:6 : Barcelona-based spyware startup Variston shuts down, per filing
- 13:6 : Sophos lays off 6% of workforce following Secureworks acquisition
- 13:6 : Russia-linked APT Seashell Blizzard is behind the long running global access operation BadPilot campaign
- 13:6 : National Apprenticeship Week: Alternative Routes into Cyber
- 13:6 : Threat Actors Exploiting DeepSeek’s Popularity To Deploy Malware
- 13:6 : Deciphering End User Data Access Patterns is Key to a Strong SaaS Security Posture
- 13:5 : RA World Ransomware Attack in South Asia Links to Chinese Espionage Toolset
- 13:5 : Fast Deployments, Secure Code: Watch this Learn to Sync Dev and Sec Teams
- 13:5 : Romance Baiting Losses Surge 40% Annually