151 posts were published in the last hour
- 22:4 : Dutch Police shut down bulletproof hosting provider Zservers and seized 127 servers
- 21:9 : Holiverse Makes NASA’s Latest Achievements Accessible to Everyone
- 20:5 : IT Security News Hourly Summary 2025-02-17 21h : 1 posts
- 19:11 : New Golang-based backdoor relies on Telegram for C2 communication
- 18:4 : The XCSSET info-stealing malware is back, targeting macOS users and devs
- 17:32 : Creative SVG File Upload to Local File Inclusion Vulnerability Affecting 90,000 Sites Patched in Jupiter X Core WordPress Plugin
- 17:32 : Pro-Russia Hackers NoName057(16) Hit Italian Banks and Airports
- 17:7 : Shadow AI: How unapproved AI apps are compromising security, and what you can do about it
- 17:7 : Microsoft Defender vs. McAfee: Features, Pricing, Pros & Cons
- 17:7 : Atlas of Surveillance
- 17:7 : Three Ways to Safeguard Your Smart Home From Cybercriminals
- 17:7 : Ransomware Tactics Evolve as Hackers Shift Focus to Data Theft
- 17:7 : Apps Illegally Sold Location Data of US Military and Intelligence Personnel
- 17:7 : Microsoft Uncovers New XCSSET macOS Malware Variant with Advanced Obfuscation Tactics
- 17:5 : IT Security News Hourly Summary 2025-02-17 18h : 13 posts
- 16:33 : IRS: Doge will Systemzugang zum US-Finanzamt
- 16:32 : Romance Scams, AI Fuel Record Crypto Fraud Revenues In 2024
- 16:32 : Ransomware Gangs Encrypt Systems After 17hrs From Initial Infection
- 16:32 : DEF CON 32 – Evading Modern Defenses When Phishing With Pixels
- 16:32 : Microsoft Detects New XCSSET MacOS Malware Variant
- 16:32 : South Korea Suspends Downloads of AI Chatbot DeepSeek
- 16:10 : Windows 2000 feiert 25. Geburtstag: Warum das Betriebssystem eigentlich schon deutlich älter sein sollte
- 16:10 : Cyberangriffe verhindern: Wie Unternehmen mit integrierten IT-Strukturen widerstandsfähiger werden
- 16:10 : KI im Kino: Wie die Technik für Kontroversen sorgt – und doch längst Alltag ist
- 16:10 : Muss Apple neue Siri-Funktionen erneut verschieben? Warum das Update wohl weiter auf sich warten lässt
- 16:10 : Warum Deepseek Risiken birgt und in welchen Ländern die KI schon verboten wurde
- 16:10 : BSI-Bericht: Erhebliche Schwachstellen bei Fitness-Trackern & Co.
- 16:9 : Unlocking OSINT: Top books to learn from
- 15:36 : Akira Ransomware is now targeting legacy servers of defunct companies
- 15:7 : Hackers Exploit Telegram API to Spread New Golang Backdoor
- 15:7 : White Paper: Advancing Cybersecurity Through Kernel Immunization
- 14:32 : Münchner Sicherheitskonferenz: „Wir müssen mit technologischen Innovationen Schritt halten“
- 14:8 : 10 Key SOC Challenges and How AI Addresses Them
- 14:8 : Ransomware Gangs Encrypt Systems 17 Hours After Initial Infection
- 14:8 : Replit and Anthropic’s AI just helped Zillow build production software—without a single engineer
- 14:7 : Xerox Printers Vulnerability Let Attackers Capture Authentication Data From LDAP & SMB
- 14:7 : CISA Warns of Apple iOS Vulnerability Exploited in Wild
- 14:7 : RansomHub Evolves To Attack Windows, ESXi, Linux and FreeBSD Operating Systems
- 14:7 : XCSSET macOS malware returns with first new version since 2022
- 14:7 : New FinalDraft Malware Spotted in Espionage Campaign
- 14:7 : A PostgreSQL zero-day was also exploited in US Treasury hack (CVE-2025-1094)
- 14:5 : IT Security News Hourly Summary 2025-02-17 15h : 15 posts
- 13:32 : Beware! Fake Outlook Support Calls Leading to Ransomware Attacks
- 13:32 : New XCSSET Malware Targets macOS Users Through Infected Xcode Projects
- 13:32 : Xerox Printer Vulnerability Exposes Authentication Data Via LDAP and SMB
- 13:32 : Stealthy Malware in WordPress Sites Enables Remote Code Execution by Hackers
- 13:32 : Bridging the Gap Between Security and Risk with CRQ
- 13:13 : Brocade SANnav: Angreifer können Zugangsdaten durch Sicherheitslecks erlangen
- 13:13 : Verschlüsselter Messenger: Elon Musks X blockiert plötzlich Links zu Signal
- 13:12 : My Very Personal Guidance and Strategies to Protect Network Edge Devices, (Thu, Feb 6th)
- 13:12 : HashFlare Fraud: Two Estonians Admit to Running $577M Crypto Scam
- 13:12 : Threat Actors Exploiting Modified SharpHide Tool to Conceal Registry Entries
- 13:12 : CISA Warns of Active Exploitation of Apple iOS Security Flaw
- 13:12 : Check Point’s SASE Tops Scores for Threat Prevention
- 13:12 : The CISO’s Myopia
- 13:12 : Russian State Hackers Target Organizations With Device Code Phishing
- 13:12 : South Korea Suspends DeepSeek AI Downloads Over Privacy Violations
- 12:33 : [UPDATE] [mittel] Intel Firmware: Mehrere Schwachstellen
- 12:33 : [UPDATE] [mittel] Intel Prozessoren: Mehrere Schwachstellen
- 12:33 : [UPDATE] [hoch] Golang Go: Mehrere Schwachstellen
- 12:32 : IDOR Vulnerability in ExHub Allows Attackers to Alter Hosting Configurations
- 12:32 : New XCSSET Malware Attacking macOS Users by Infecting Xcode Projects
- 12:32 : Hidden Malware in WordPress Websites Allows Attackers to Execute Malicious Code Remotely
- 12:3 : Winzip: Angreifer können durch Sicherheitsleck Schadcode einschleusen
- 12:3 : [NEU] [hoch] HP LaserJet: Mehrere Schwachstellen
- 12:3 : Massive Data Exposure at Mars Hydro Highlights IoT Security Risks
- 12:2 : 127 Servers of Bulletproof Hosting Service Zservers Seized by Dutch Police
- 12:2 : Two Estonians plead guilty in $577M cryptocurrency Ponzi scheme
- 11:34 : Safe Browsing: KI-Feature in Google Chrome ab sofort verfügbar
- 11:34 : Winzip: Sicherheitslücke ermöglicht Unterschieben von Schadcode
- 11:34 : Äquivalenzverordnung zum BSI C5-Testat: Das Chaos geht weiter
- 11:33 : Nokia’s $2.3bn Infinera Deal Set For ‘Unconditional’ EU Approval
- 11:33 : Meta Looks To Develop AI-Powered Humanoid Robots
- 11:33 : TSMC In Talks To Take Over Intel Chip Factories
- 11:33 : Romance Scams, AI Fuel Record Scam Crypto Revenues In 2024
- 11:33 : How to Rebuild and Restore SQL Server Master Database
- 11:33 : eSentire Uncovers EarthKapre/RedCurl Attack Targeting Law Firms
- 11:33 : IDOR Vulnerability in ExHub Let Attacker Modify Web Hosting Configuration
- 11:33 : Downloads of DeepSeek’s AI Apps Paused in South Korea Over Privacy Concerns
- 11:33 : ⚡ THN Weekly Recap: Google Secrets Stolen, Windows Hack, New Crypto Scams and More
- 11:32 : CISO’s Expert Guide To CTEM And Why It Matters
- 11:32 : Telegram Used as C2 Channel for New Golang Malware
- 11:10 : Google Chrome: KI-Schutz vor Phishing-Websites & Co. ab sofort aktivierbar
- 11:10 : [NEU] [mittel] Mattermost Desktop: Schwachstelle ermöglicht nicht spezifizierten Angriff
- 11:9 : Linux Kernel 6.14 rc3 Released With The Fixes for Critical Issues
- 11:9 : Pro-Russia collective NoName057(16) launched a new wave of DDoS attacks on Italian sites
- 11:9 : Industry Moves for the week of February 17, 2025 – SecurityWeek
- 11:9 : Xerox Versalink Printer Vulnerabilities Enable Lateral Movement
- 11:9 : ⚡ THN Weekly Recap: Google Secrets Stolen, Windows Hack, New Crypto Scams and More
- 11:5 : IT Security News Hourly Summary 2025-02-17 12h : 11 posts
- 10:33 : [NEU] [niedrig] Microsoft Edge: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen
- 10:32 : New Golang-Based Backdoor Uses Telegram Bot API for Evasive C2 Operations
- 10:32 : ⚡ THN Weekly Recap: Google Secrets Stolen, Windows Hack, New Crypto Scams and More
- 10:32 : Estonian Duo Plead Guilty to $577m Crypto Ponzi Scheme
- 10:12 : Microsoft Edge: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen
- 10:12 : Whatsapp: So kannst du jetzt das Aussehen deiner Chats nach deinen Wünschen gestalten
- 10:11 : whoAMI attack could allow remote code execution within AWS account
- 10:11 : New Android Security Feature that Blocks Changing Sensitive Setting During Calls
- 10:11 : Indian Post Office Portal Exposed Thousands of KYC Records With Username & Mobile Number
- 10:11 : Multiple Russian Actors Attacking Orgs To Hack Microsoft 365 Accounts via Device Code Authentication
- 10:11 : Palo Alto Networks and SonicWall Firewalls Under Attack
- 9:33 : Google Chrome und Microsoft Edge: Mehrere Schwachstellen
- 9:33 : USB-C bei iPhone und Mac absichern: MDM-Admins dürfen Sicherheit reduzieren
- 9:32 : Baidu Shifts Ernie AI Model To Open Source
- 9:32 : US To Renegotiate Chips Act Awards
- 9:32 : #TripwireBookClub – Black Hat Bash: Creative Scripting for Hackers and Pentesters
- 9:32 : Advanced Ransomware Evasion Techniques in 2025
- 9:32 : Beware of Fake Outlook Troubleshooting Calls that Ends Up In Ransomware Deployment
- 9:3 : KB5051987: Windows-11-Update macht den Explorer kaputt
- 9:2 : Indian Post Office Portal Leak Exposes Thousands of KYC Records
- 9:2 : Rowing in the Same Direction: 6 Tips for Stronger IT and Security Collaboration
- 8:32 : US Lawmakers Blast UK’s Demand For Encrypted Apple Data
- 8:32 : Threat Actors Leveraging Modified Version of SharpHide Tool To Create Hidden Registry
- 8:32 : Meta Paid Out $2.3 Million to Researchers via Bug Bounty Program
- 8:32 : PurpleLab – A Free Cybersecurity Lab for Security Teams to Detect, Analyze & Simulate Threats
- 8:32 : A week in security (February 10 – February 16)
- 8:32 : Device code attacks, phone TOAD solution, more telecoms breached
- 8:16 : KI kritisch betrachtet
- 8:16 : HP-Laserdrucker ermöglichen Codeschmuggel durch Postscript-Sicherheitsleck
- 8:5 : IT Security News Hourly Summary 2025-02-17 09h : 8 posts
- 7:33 : Angriffe auf Sicherheitslücken in iOS, iPadOS, Mitel SIP-Phones und PAN-OS
- 7:33 : Digitalisierung: Warum wir in Deutschland nicht online wählen (werden)
- 7:32 : Android’s New Security Feature Prevents Sensitive Setting Changes During Calls
- 7:32 : UK’s Secret Apple Backdoor Request, AI Chatbots Used For Stalking
- 7:8 : Angreifer attackieren Sicherheitslücken in iOS, Mitel SIP-Phones und PAN-OS
- 7:7 : How to recognize tax scams and fraud?
- 7:7 : Hackers Exploit Microsoft Teams Invites to Gain Unauthorized Access
- 7:7 : Hackers Abusing Microsoft Teams Meeting Invites to Trick Victims for Gaining Access
- 6:33 : Datenschutzbedenken: Nach Italien verbietet auch Südkorea DeepSeek
- 6:33 : Prorussischer DDoS-Angriff legt Internetseiten von Bayerns Staatsregierung lahm
- 6:32 : Can Simulated Phishing Attacks Help in Training and Creating Awareness Among Employees?
- 6:32 : How CISOs can balance security and business agility in the cloud
- 6:7 : Samsung brings in Quantum safe security to its Knox Security Ecosystem
- 6:7 : Meta’s Bug Bounty Initiative Pays $2.3 Million to Security Researchers in 2024
- 6:7 : Lessons Learned from Being a Single Mum that Relate to Cyber Security
- 6:7 : Orbit: Open-source Nuclei security scanning and automation platform
- 5:32 : Google Chrome Introduces AI to Block Malicious Websites and Downloads
- 5:32 : Linux Kernel 6.14 rc3 Released – What’s New!
- 5:32 : Google Chrome AI-Powered Security Now Available for All Users – Enable Now!
- 5:32 : DEF CON 32 – I Am Still The Captain Now!
- 5:32 : The hidden risks of a broken data provisioning system
- 3:32 : Cybersecurity Weekly Recap: Latest on Attacks, Vulnerabilities, & Data Breaches
- 3:32 : Twin Google flaws allowed researcher to get from YouTube ID to Gmail address in a few easy steps
- 3:9 : Get the best best Wyze Cam alternative I’ve tested for only $20 through Presidents’ Day
- 2:32 : Twin Google flaws allowed attacker to get from YouTube ID to Gmail address in a few easy steps
- 2:5 : IT Security News Hourly Summary 2025-02-17 03h : 1 posts
- 1:32 : ISC Stormcast For Monday, February 17th, 2025 https://isc.sans.edu/podcastdetail/9326, (Mon, Feb 17th)
- 0:36 : PCI DSS 4: Compliance Guide for SAQ A-EP Merchants to comply with Requirements 6.4.3 and 11.6.1
- 0:9 : Fujitsu worries US tariffs will see its clients slow digital spend
- 23:5 : IT Security News Hourly Summary 2025-02-17 00h : 5 posts
- 22:58 : IT Security News Weekly Summary 07