195 posts were published in the last hour
- 22:33 : Gravierende Schwächen: Wie schlecht sind GPT-4o und Claude im Programmieren?
- 22:4 : Support Canada’s CCCS PBHVA overlay compliance with the Landing Zone Accelerator on AWS
- 21:2 : Unfurl v2025.02 released, (Mon, Feb 24th)
- 21:2 : DOGE’s HR email is getting the ‘Bee Movie’ spam treatment
- 21:2 : A large botnet targets M365 accounts with password spraying attacks
- 20:32 : US Dept of Housing screens sabotaged to show deepfake of Trump sucking Elon’s toes
- 20:32 : Four ways to grant cross-account access in AWS
- 20:5 : IT Security News Hourly Summary 2025-02-24 21h : 4 posts
- 19:32 : Botnet of 130K Devices Targets Microsoft 365 in Password-Spraying Attack
- 19:32 : What Microsoft’s Majorana 1 Chip Means for Quantum Decryption
- 19:7 : Inside the Telegram Groups Doxing Women for Their Facebook Posts
- 19:7 : Threat Actors Stealing Users Browser Fingerprints To Bypass Security Measures & Impersonate Users
- 18:32 : Prompt-Injection-Angriffe: Grok 3 lässt sich leicht manipulieren
- 18:32 : Anthropic’s Claude 3.7 Sonnet takes aim at OpenAI and DeepSeek in AI’s next big battle
- 18:6 : 100,000 WordPress Sites Affected by Arbitrary File Upload, Read and Deletion Vulnerability in Everest Forms WordPress Plugin
- 18:6 : TSforge New Tool Bypasses Windows Activation on All Versions
- 18:6 : Sliver C2 Server Vulnerability Enables TCP Hijacking for Traffic Interception
- 18:6 : Widespread Chrome Malware: 16 Extensions Infect Over 3.2 Million Users
- 18:6 : UAC-0212: Hackers Unleash Devastating Cyber Assault on Critical Infrastructure
- 18:6 : GitVenom Campaign Abuses Thousands of GitHub Repositories to Infect Users
- 18:6 : Leaked Black Basta Chats Expose Ransomware Secrets & Infighting
- 18:6 : TVs at HUD Played an AI-Generated Video of Donald Trump Kissing Elon Musk’s Feet
- 18:6 : Rad Security Raises $14 Million for AI, Cloud Security Platform
- 18:6 : The Evolution of Single Sign-On for Autonomous AI Agents: Securing Non-Human Identities in the Age of Agentic Automation
- 18:6 : Fintech Giant Finastra Breach Exposed Private Data, Company Notifies Victims
- 18:6 : South Korea Blocks DeepSeek AI App Downloads Amid Data Security Investigation
- 18:6 : Pro-Russia Hackers Target Italian Banks and Airports Amid Rising Tensions
- 18:5 : How AI Agents Are Transforming Cryptocurrency
- 17:32 : Industrial Organizations Under Siege: Chinese Hackers Wield Advanced FatalRAT Malware
- 17:32 : Android App on Google Play Targets Indian Users to Steal Login Credentials
- 17:32 : Three years on, Europe looks to Ukraine for the future of defense tech
- 17:32 : OpenAI Bans ChatGPT Accounts Used by Chinese Group for Spy Tools
- 17:32 : Enhanced In-Call Security in Android 16 Aims to Tackle Scammers
- 17:32 : ⚡ THN Weekly Recap: From $1.5B Crypto Heist to AI Misuse & Apple’s Data Dilemma
- 17:32 : New Malware Campaign Uses Cracked Software to Spread Lumma and ACR Stealer
- 17:6 : Virgin Media O2 Users Affected By Broadband Outage
- 17:5 : TVs at HUD Played an AI-Generated Video of Donald Trump Kissing Elon Musk’s Feet
- 17:5 : Researchers accuse North Korea of $1.4 billion Bybit crypto heist
- 17:5 : Australia bans government use of Kaspersky software due to ‘unacceptable security risk’
- 17:5 : Australia Prohibits Kaspersky Software in Government Networks Over Major Security Concerns
- 17:5 : Integration with Gloo Gateway | Impart Security
- 17:5 : ⚡ THN Weekly Recap: From $1.5B Crypto Heist to AI Misuse & Apple’s Data Dilemma
- 17:5 : Essential Addons for Elementor XSS Vulnerability Discovered
- 17:5 : IT Security News Hourly Summary 2025-02-24 18h : 17 posts
- 16:33 : Die Indiana-Jones-Methode knackt große Sprachmodelle: So einfach offenbaren sie schädliche Informationen
- 16:33 : Besser als Google Maps? Dieser Kartendienst kombiniert ChatGPT, Perplexity und Wikipedia
- 16:33 : Diese KI kann funktionierende Chips entwerfen, die selbst Experten nicht verstehen
- 16:32 : Hackers Use Google Docs and Steam to Spread ACRStealer Infostealer
- 16:32 : Surveillance pricing is “evil and sinister,” explains Justin Kloczko (Lock and Code S06E04)
- 16:32 : Vulnerability Summary for the Week of February 17, 2025
- 16:32 : ⚡ THN Weekly Recap: From $1.5B Crypto Heist to AI Misuse & Apple’s Data Dilemma
- 16:32 : Connect your on-premises Kubernetes cluster to AWS APIs using IAM Roles Anywhere
- 16:6 : Kaspersky ban across Australia government agencies
- 16:6 : Why Gmail is replacing SMS codes with QR codes – and what it means for you
- 16:5 : The best password generator of 2025: Expert tested
- 16:5 : Android App on Google Play Attacking Indian Users To Steal Login Credentials
- 16:5 : SafeLine WAF vs CloudFlare: Which One Should You Choose?
- 16:5 : GhostSocks Malware Exploiting SOCKS5 Proxy to Bypass Detection Systems
- 16:5 : LogonBox SSPR 2.4.11 – Now Available
- 16:5 : LogonBox VPN 2.4.11 – Now Available
- 16:5 : ⚡ THN Weekly Recap: From $1.5B Crypto Heist to AI Misuse & Apple’s Data Dilemma
- 15:32 : Phishing Campaigns Targeting Higher Education Institutions
- 15:32 : Women in Cybersecurity Leadership: Inspiring Role Models at the Top
- 15:32 : NinjaOne Scores $500M in Series C Extensions at $5 Billion Valuation
- 15:32 : ⚡ THN Weekly Recap: From $1.5B Crypto Heist to AI Misuse & Apple’s Data Dilemma
- 15:32 : Michigan Man Indicted for Dark Web Credential Fraud
- 15:8 : What is red teaming?
- 15:8 : Palo Alto Networks Recognized as a Leader in Omdia Market Radar
- 15:7 : Apple has Discontinued its Advanced Data Protection (ADP) Feature for UK Users
- 15:7 : Vulnerability in Internet-Connected Smart Beds Let Attackers Access Other Devices in Network
- 15:7 : BIG SHARK Android RAT Cracked & Leaked from Chinese Market
- 15:7 : Shifting the cybersecurity odds
- 15:7 : BigID Next provides organizations with visibility and control over their data
- 15:7 : ⚡ THN Weekly Recap: From $1.5B Crypto Heist to AI Misuse & Apple’s Data Dilemma
- 15:7 : Google Cloud Shields Data With Quantum-Resistant Digital Signatures
- 14:33 : Australien verbannt Kaspersky von Regierungsrechnern
- 14:33 : PirateFi auf Steam – ein Spiel, das einen Trojaner enthält | Offizieller Blog von Kaspersky
- 14:32 : A single default password exposes access to dozens of apartment buildings
- 14:32 : PoC exploit for Ivanti Endpoint Manager vulnerabilities released (CVE-2024-13159)
- 14:32 : ⚡ THN Weekly Recap: From $1.5B Crypto Heist to AI Misuse & Apple’s Data Dilemma
- 14:12 : Mosolf akquiriert Stoof International
- 14:12 : Neue Adresse: Phishing-Masche schockt Nutzer mit echten E-Mails von Paypal
- 14:11 : How Payment Orchestration Enhances Business Efficiency
- 14:11 : Smart Bed Security Flaw Lets Hackers Access Other Network Devices
- 14:11 : Dive Deeper into Network Mysteries: Wireshark 4.4.0 is Here!
- 14:11 : How hunting for vulnerable drivers unraveled a widespread attack
- 14:11 : LogRhythm vs Splunk (2025): SIEM Tool Comparison
- 14:11 : A data leak exposes the operations of the Chinese private firm TopSec, which provides Censorship-as-a-Service
- 14:11 : Australia bans Kaspersky over national security concerns
- 14:11 : Chinese Hackers Attacking Industrial Organizations With Sophisticated FatalRAT
- 14:11 : The software UK techies need to protect themselves now Apple’s ADP won’t
- 14:11 : Massive botnet hits Microsoft 365 accounts
- 14:11 : ⚡ THN Weekly Recap: From $1.5B Crypto Heist to AI Misuse & Apple’s Data Dilemma
- 14:11 : IT/OT Convergence Fuels Manufacturing Cyber Incidents
- 14:5 : IT Security News Hourly Summary 2025-02-24 15h : 10 posts
- 13:31 : Windows-Vorschau: OpenSSH-Korrekturen, Recall-Neustart, farbiges Akkusymbol
- 13:6 : “SpyLend”: Android-Malware aus Play-Store erpresst Opfer
- 13:6 : (g+) Sicherheitslücken: Schon mal was gehackt?
- 13:5 : Hardware Crypto Wallets vs. Mobile vs. Desktop: Which Should You Choose?
- 13:5 : How to utilize VPN for safe work and remote work environments
- 13:5 : New ChatGPT’s Premium Features Subscription Phishing Attack Steal Logins
- 13:5 : Stablecoin Bank Hacked – Hackers Stolen $49.5M in Attack
- 13:5 : Kaspersky Banned on Australian Government Systems
- 13:5 : Account takeover detection: There’s no single tell
- 13:5 : ⚡ THN Weekly Recap: From $1.5B Crypto Heist to AI Misuse & Apple’s Data Dilemma
- 12:33 : “SpyLend”-Android-Malware: Erpressung und Finanzkriminalität aus dem Play-Store
- 12:32 : The Agile Advantage: Doubling Down on the Biggest Business Challenges
- 12:32 : More Research Showing AI Breaking the Rules
- 12:32 : ⚡ THN Weekly Recap: From $1.5B Crypto Heist to AI Misuse & Apple’s Data Dilemma
- 12:3 : Fernzugriff auf fremde Betten: Backdoor in smarter Matratzenauflage entdeckt
- 12:3 : [UPDATE] [mittel] Mattermost: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff
- 12:3 : PirateFi Game Infected Steam Users’ Devices With Malware
- 12:3 : Cutting edge, Composable and Connected: The Next-Gen ERP Solutions Powering Business in 2025
- 12:3 : Hackers Hijack YouTube Channels to Target CS2 Fans with Fake Giveaways
- 12:2 : US Charges Genesis Market User
- 12:2 : ⚡ THN Weekly Recap: From $1.5B Crypto Heist to AI Misuse & Apple’s Data Dilemma
- 11:34 : [NEU] [UNGEPATCHT] [mittel] ffmpeg: Schwachstelle ermöglicht Denial of Service, potentiell Codeausführung
- 11:33 : X Wins Motion To Dismiss German Judge
- 11:33 : The Mobile Catalyst: Shaping Digital Innovation in Business
- 11:33 : Google’s Waze Qualifies For More Stringent EU Rules
- 11:33 : Head-to-Head: The Mobile Catalyst
- 11:33 : Alibaba Shares Surge On AI Plans
- 11:33 : Apple Removes Advanced Data Protection (ADP) for UK Users
- 11:33 : Conducting Security Audits in Supply Chain Management
- 11:32 : Google Cloud KMS Adds Quantum-Safe Digital Signatures to Defend Against Future Threats
- 11:32 : Becoming Ransomware Ready: Why Continuous Validation Is Your Best Defense
- 11:32 : ⚡ THN Weekly Recap: From $1.5B Crypto Heist to AI Misuse & Apple’s Data Dilemma
- 11:32 : Experts Slam Government After “Disastrous” Apple Encryption Move
- 11:5 : IT Security News Hourly Summary 2025-02-24 12h : 10 posts
- 11:3 : Wireshark 4.4.4 Released – Explore the Latest Features!
- 11:2 : Making Sense of Australia’s New Cybersecurity Legislation
- 11:2 : Protecting the Manufacturing Sector from Ransomware
- 10:33 : Wertewandel in US-Unternehmen: Was hat das mit KI zu tun?
- 10:33 : Windows-10-Support endet: 3 Möglichkeiten, um Windows 11 zu umgehen
- 10:33 : Grok hat sich geweigert, Elon Musk und Donald Trump als Quellen für falsche Informationen zu nennen
- 10:33 : Windows 11: So will Microsoft das Startmenü verändern
- 10:32 : Stablecoin Bank Hit by Cyberattack, Loses $49.5M to Hackers
- 10:32 : Wireshark 4.4.4 Released With Fix for Vulnerability That Triggers DoS Attack
- 10:32 : Australia Bans Kaspersky Software Over National Security and Espionage Concerns
- 10:3 : Telekom bringt “SMS-Firewall”
- 10:3 : [NEU] [hoch] Linux Kernel: Schwachstelle ermöglichen nicht spezifizierten Angriff
- 10:3 : [NEU] [mittel] Mattermost Mobile: Schwachstelle ermöglicht nicht spezifizierten Angriff
- 10:2 : Industry Moves for the week of February 24, 2025 – SecurityWeek
- 10:2 : $1.5 Billion Bybit Heist Linked to North Korean Hackers
- 10:2 : Bybit Offers $140m Bounty to Recover Funds After Mega Crypto-Heist
- 9:33 : [UPDATE] [kritisch] Apache log4j: Schwachstelle ermöglicht Codeausführung
- 9:33 : [UPDATE] [mittel] Red Hat JBoss Enterprise Application Platform: Mehrere Schwachstellen ermöglichen Denial of Service
- 9:33 : [UPDATE] [hoch] Red Hat JBoss Enterprise Application Platform: Mehrere Schwachstellen
- 9:33 : [UPDATE] [mittel] Red Hat JBoss Application Server (JBoss): Mehrere Schwachstellen
- 9:33 : [UPDATE] [mittel] libxml2: Mehrere Schwachstellen ermöglichen Denial of Service
- 9:32 : LockBit Ransomware Strikes: Exploiting a Confluence Vulnerability
- 9:32 : GhostSocks Malware Uses SOCKS5 Proxy to Evade Detection Systems
- 9:32 : The GitVenom campaign: cryptocurrency theft using GitHub
- 9:7 : Sicherheitsupdates: Angreifer können Wireshark crashen lassen
- 9:5 :
- 9:5 : SpyLend Android malware found on Google Play enabled financial cyber crime and extortion
- 9:5 : DeepSeek Unveils FlashMLA, A Decoding Kernel That’s Make Things Blazingly Fast
- 9:5 : Parallels Desktop 0-Day Vulnerability Gain Root Privileges – PoC Released
- 9:5 : Hackers Exploited Confluence Server Vulnerability To Deploy LockBit Ransomware
- 9:5 : A week in security (February 17 – February 23)
- 9:5 : The Essential Guide to Horizon Scanning in Compliance and Regulatory Frameworks
- 8:32 : North Koreans Steal $1.5bn From Crypto Exchange Bybit
- 8:32 : $1.5B Bybit hack, UK E2E pulled, PayPal phishing emails
- 8:32 : Inside a Cyber Crime Group: Cyber Security Today for Monday, Feb 24, 2025
- 8:5 : Zombie oder Zukunftsweiser – Zu wem zählen Sie?
- 8:5 : Paypal-Phishing: “Neue Adresse”-Funktion missbraucht
- 8:5 : IT Security News Hourly Summary 2025-02-24 09h : 4 posts
- 8:4 : Fake ChatGPT Premium Phishing Scam Spreads to Steal User Credentials
- 8:4 : Exim Mail Transfer Vulnerability Let Attackers Inject Malicious SQL Queries
- 7:32 : 10 Best DevOps Tools in 2025
- 7:32 : UniFi Protect Camera Vulnerability Allows Remote Code Execution Attacks
- 7:2 : Parallels Desktop 0-Day Exploit Enables Root Privileges – PoC Released
- 7:2 : Cisco Confirms Salt Typhoon Exploitation in Telecom Hits
- 6:32 : Exim Mail Transfer Vulnerability Allows Attackers to Inject Malicious SQL
- 6:32 : Cybercrooks Exploit URL Manipulation in Sophisticated Phishing Scam
- 6:32 : Man vs. machine: Striking the perfect balance in threat intelligence
- 6:8 : US Satellites enabled with AI Tech to make them immune to Cyber Attacks
- 6:8 : How Password Managers Enhance Security in Corporate Networks
- 6:8 : Biggest Crypto Hack in History – Hackers Stolen $1.46 Billion Worth Crypto From Bybit
- 5:32 : PoC Exploit Released for F5 BIG-IP Command Injection Vulnerability
- 5:32 : Why AI deployment requires a new level of governance
- 5:32 : Misconfig Mapper: Open-source tool to uncover security misconfigurations
- 5:7 : Google Introduces Quantum-Safe Digital Signatures in Cloud KMS
- 5:7 : Cutting Through the Noise: Smart Deduplication for Stronger Cybersecurity
- 5:7 : Bybit Confirms Record-Breaking $1.5 Billion Crypto Heist in Sophisticated Cold Wallet Attack
- 4:2 : Rather than add a backdoor, Apple decides to kill iCloud E2EE for UK peeps
- 3:32 : Record Breaking Crypto Hack – Attackers Stolen $1.46 Billion From Bybit Exchange
- 2:5 : IT Security News Hourly Summary 2025-02-24 03h : 2 posts
- 2:4 : ISC Stormcast For Monday, February 24th, 2025 https://isc.sans.edu/podcastdetail/9336, (Mon, Feb 24th)
- 1:32 : The best travel VPNs of 2025: Expert tested and reviewed
- 0:32 : Confluence Exploit Leads to LockBit Ransomware
- 23:32 : Trump 2.0 Brings Cuts to Cyber, Consumer Protections
- 23:32 : DEF CON 32 – Efficient Bug Bounty Automation Techniques
- 23:5 : IT Security News Hourly Summary 2025-02-24 00h : 4 posts
- 22:58 : IT Security News Weekly Summary 08