21 posts were published in the last hour
- 14:3 : Find-My-Netzwerk: Angriff macht fremde Bluetooth-Geräte trackbar wie Airtags
- 14:3 : Angry Likho APT Resurfaces with Lumma Stealer Attacks Against Russia
- 14:3 : The Hidden Cost of Compliance: When Regulations Weaken Security
- 14:3 : New TgToxic Banking Trojan Variant Evolves with Anti-Analysis Upgrades
- 14:3 : 89% of Enterprise GenAI Usage Is Invisible to Organizations Exposing Critical Security Risks, New Report Reveals
- 14:3 : Space Pirates Targets Russian IT Firms With New LuckyStrike Agent Malware
- 14:2 : LibreOffice: Windows vulnerability affects links in documents, patch available
- 13:32 : Google’s SafetyCore App Secretly Scans All Photos on Android Devices
- 13:32 : Networking in DevOps: Your Beginner Guide
- 13:32 : What is quantum in physics and computing?
- 13:32 : Sites of Major Orgs Abused in Spam Campaign Exploiting Virtual Tour Software Flaw
- 13:32 : The 2025 State of Application Risk Report: Understanding Toxic Combinations in Application Security
- 13:6 : [UPDATE] [mittel] Golang Go (x/net/html): Schwachstelle ermöglicht Denial of Service
- 13:6 : [UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service
- 13:6 : [UPDATE] [mittel] libsndfile: Mehrere Schwachstellen ermöglichen Denial of Service
- 13:6 : [UPDATE] [kritisch] PHP: Mehrere Schwachstellen
- 13:6 : [UPDATE] [hoch] docker: Mehrere Schwachstellen
- 13:5 : New “nRootTag” Attack Turns 1.5 Billion iPhones as Free Tracking Agents for Attacker
- 13:5 : Cisco Nexus Vulnerability Let Attackers Inject Malicious Commands
- 13:5 : Software Vulnerabilities Take Almost Nine Months to Patch
- 13:5 : GitHub repos exposed, HaveIBeenPwned adds 244M stolen passwords, Anagram gamifies cybersecurity training