210 posts were published in the last hour
- 22:55 : IT Security News Daily Summary 2025-03-02
- 20:32 : The Rise of QR Phishing: How Scammers Exploit QR Codes and How to Stay Safe
- 18:32 : 11 Application Security Testing Types
- 18:2 : C++ creator calls for help to defend programming language from ‘serious attacks’
- 17:32 : Lending App Data Breach Leaves Sensitive Customer Information Unprotected
- 17:32 : FBI Warns: ‘Ghost’ Ransomware Is Spreading— Here’s How to Stay Safe
- 17:5 : IT Security News Hourly Summary 2025-03-02 18h : 5 posts
- 16:33 : Mit OpenAI-Unterstützung: Dieser Roboter will unsere Hausarbeit übernehmen
- 16:33 : Programmierfehler: Warum der Nachname „Null“ Computer in die Knie zwingt
- 16:33 : Anthropic präsentiert neue KI-Modelle: Das können Sonnet 3.7 und Claude Code
- 16:33 : Stille als Protest: Warum 1.000 Top-Musiker ein leeres Album veröffentlicht haben
- 16:33 : Microsoft-CEO warnt: KI-Blase könnte wie Dotcom-Crash enden
- 15:32 : Crypto Scammers Are Targeting AI Trade Bots
- 15:32 : These Four Basic PC Essentials Will Protect You From Hacking Attacks
- 15:32 : Strengthening PC Security with Windows Whitelisting
- 15:32 : Default Password Creates Major Security Risk for Apartment Complexes
- 14:32 : Massive Sicherheitslücken bei Gebäude-Zugangssystemen entdeckt
- 11:41 : Security Affairs newsletter Round 513 by Pierluigi Paganini – INTERNATIONAL EDITION
- 11:41 : SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 35
- 11:5 : IT Security News Hourly Summary 2025-03-02 12h : 2 posts
- 10:40 : „Digitale Fettleibigkeit“: Warum wir unseren Medienkonsum überdenken sollten
- 10:39 : Meta fired 20 employees for leaking information, more firings expected
- 9:5 : (Re)Building the Ultimate Homelab NUC Cluster – Part 3
- 9:5 : Week in review: Botnet hits M365 accounts, PoC for Ivanti Endpoint Manager vulnerabilities released
- 8:33 : VdS-Lehrgänge: Installation von Sprinkleranlagen nach FM
- 8:14 : Wireshark 4.4.5 Released, (Sun, Mar 2nd)
- 6:5 : Flat Earth Sun, Moon and Zodiac App – 33,294 breached accounts
- 5:5 : IT Security News Hourly Summary 2025-03-02 06h : 1 posts
- 4:5 : Hackers can Crack Into Car Cameras Within Minutes Exploiting Vulnerabilities
- 4:4 : Network Penetration Testing Checklist – 2025
- 4:4 : Stalkerware: How Scammers Might Be Tracking Your Phone and What You Can Do
- 23:5 : IT Security News Hourly Summary 2025-03-02 00h : 6 posts
- 22:34 : OpenAI will KI-Videogenerator Sora in ChatGPT integrieren
- 22:34 : Grok 3: KI weigert sich, Trump und Musk als Desinformationsquellen zu nennen
- 22:33 : When Your SaaS Vendor Goes Dark: A Guide to Protecting Your Business
- 22:33 : Freedom to Choose the Best Secrets Vault?
- 22:33 : How Supported is Your NHIs Policy Enforcement?
- 22:33 : Justified Spending on Cybersecurity Technology?
- 20:32 : Weak cyber defenses are exposing critical infrastructure — how enterprises can proactively thwart cunning attackers to protect us all
- 20:5 : IT Security News Hourly Summary 2025-03-01 21h : 1 posts
- 19:32 : Ransomware gangs exploit a Paragon Partition Manager BioNTdrv.sys driver zero-day
- 17:32 : Microsoft disrupted a global cybercrime ring abusing Azure OpenAI Service
- 17:5 : IT Security News Hourly Summary 2025-03-01 18h : 5 posts
- 16:33 : KI entwirft rätselhafte Chips, die Experten ins Staunen versetzen
- 16:33 : US-Verteidigungsminister stoppt Russland-Planungen der Cyberkräfte
- 16:32 : Independent Audit for Your Secrets Management?
- 16:32 : Certain About Your Data Privacy Measures?
- 16:32 : How Stable is Your Cloud Infrastructure Security?
- 16:3 : LightSpy Malware Attacks Users, Launches Over 100 Commands to Steal Data
- 16:2 : Bybit Suffers Historic $1.5 Billion Crypto Hack, Lazarus Group Implicated
- 15:32 : Metrics That Matter for CISOs
- 15:32 : DM Clinical Research Database Exposed Online, Leaking 1.6M Patient Records
- 15:32 : Beware of Fake Viral Video Links Spreading Malware
- 15:32 : Open Access to Critical Data With Bank Staff Leading to Financial Scam
- 15:32 : Call Merging Scams and Financial Security Risks with Prevention Strategies
- 15:7 : Business Continuity Planning: Scenarios vs. impact
- 14:5 : IT Security News Hourly Summary 2025-03-01 15h : 1 posts
- 14:2 : The New Face of Executive Protection: Why Digital and Physical Security Can No Longer Stand Alone
- 13:4 : AI’s High-Stakes Gamble: Balancing Breakthroughs with Unseen Risks
- 12:32 : Why Cyber Resilience Legislation is Vital to Safeguarding Our Networks
- 12:5 : The Trump Administration Is Deprioritizing Russia as a Cyber Threat
- 11:5 : IT Security News Hourly Summary 2025-03-01 12h : 4 posts
- 10:33 : KI meets Kartendienst: Pampam vereint das Beste aus ChatGPT, Perplexity und Wikipedia
- 10:32 : Schluss mit nervigem Scrollen: Mit dieser Open-Source-Lösung verwalte ich meine Rezepte stressfrei
- 10:32 : Produktivitäts-Booster für deinen Mac: So aktivierst du die geheime Sound-Funktion von Apple
- 10:32 : Indiana Jones gegen KI: Wie schädliche Informationen aus Sprachmodellen ausgegraben werden
- 9:4 : Mozilla Updates Firefox Terms Again After Backlash Over Broad Data License Language
- 8:33 : Sicherer Zugang zum Hotel
- 8:32 : Tarlogic Discovers Security Flaw Allowing Eavesdropping on Private Conversations Via Bluetooth Headset Microphone
- 8:32 : Almost All Organisations Experienced API Security Issues in Past Year
- 6:32 : Anzeige: Zero Trust in Microsoft 365 erfolgreich umsetzen
- 6:3 : Android Phone’s Unlocked Using Cellebrite’s Linux USB Zero-day Exploit
- 6:3 : Angel One Data Breach: 8 Million Users Personal Records at Risk
- 5:5 : IT Security News Hourly Summary 2025-03-01 06h : 1 posts
- 5:4 : BlackLock Ransomware: The Fastest-Growing Cyber Threat and How to Stay Safe
- 2:32 : Microsoft Listed Hackers Abusing Azure OpenAI Service to Generate Malicious Content
- 2:32 : Hackers Abused Google & PayPal’s Infrastructure to Steal Users Personal Data
- 2:5 : IT Security News Hourly Summary 2025-03-01 03h : 1 posts
- 1:33 : 2025 ISO and CSA STAR certificates now available with four additional services
- 23:32 : Attackers could hack smart solar systems and cause serious damages
- 23:5 : IT Security News Hourly Summary 2025-03-01 00h : 7 posts
- 23:1 : IT Security News Weekly Summary March
- 22:55 : IT Security News Daily Summary 2025-02-28
- 22:32 : DEF CON 32 – Inside Dash Cam Custom Protocols And Discovered 0days
- 22:5 : What is a watering hole attack?
- 22:5 : Friday Squid Blogging: Eating Bioluminescent Squid
- 22:5 : DMARC Adoption among Europe’s Higher Education Sector
- 22:5 : Week in Review: Apple encryption, gamification for security, DISA breach
- 21:32 : Empowering Women in Cybersecurity: How Education and Training Are Key
- 21:2 : Microsoft Disrupts Storm-2139 for LLMjacking and Azure AI Exploitation
- 20:32 : Notorious Malware, Spam Host “Prospero” Moves to Kaspersky Lab
- 20:32 : Amnesty Reveals Cellebrite Zero-Day Android Exploit on Serbian Student Activist
- 20:7 : Researchers uncover unknown Android flaws used to hack into a student’s phone
- 20:5 : IT Security News Hourly Summary 2025-02-28 21h : 2 posts
- 19:32 : $1.5B Bybit Hack is Linked to North Korea, FBI Says, in Potentially the Largest Crypto Heist Ever
- 19:32 : Ransomware criminals love CISA’s KEV list – and that’s a bug, not a feature
- 18:32 : Over 350 High-Profile Websites Hit by 360XSS Attack
- 18:32 : Microsoft to shut down Skype, Here is the Deadline
- 18:32 : Cisco Infuses Security into Networking with New Nexus Smart Switch and Hypershield Integration
- 18:4 : Cyber Security Today February 2025 Month In Review
- 17:33 : Microsoft To Retire Skype On 5 May
- 17:33 : What is multifactor authentication?
- 17:33 : Millions of stalkerware users exposed again
- 17:33 : Amnesty Finds Cellebrite’s Zero-Day Used to Unlock Serbian Activist’s Android Phone
- 17:5 : IT Security News Hourly Summary 2025-02-28 18h : 15 posts
- 17:3 : How to Avoid Costly Technical Debt and Get Your Software Project Back on Track
- 17:3 : Senator Susan Collins’ Betrayal of Maine Demands Accountability
- 17:3 : Apple Lets Stalkers Find YOU — ‘nRootTag’ Team Breaks AirTag Crypto
- 17:2 : New Phishing Scam Uses Authentic PayPal Address: Cyber Security Today February 26, 2025
- 16:33 : Google installiert Nacktscanner auf Android-Smartphones – so kannst du die App deaktivieren
- 16:33 : Microsoft: Ist ihre Videocall-App nach 14 Jahren am Ende?
- 16:33 : „Ich würde alle eliminieren“: KI wurde mit unsicherem Code trainiert, gibt plötzlich bösartige Antworten
- 16:33 : Deep Dive: Wie entscheidend KI in aktuellen Kriegen ist
- 16:32 : Openreach To Start Telephone Exchange Closure Process
- 16:32 : Hacktivist Groups Emerge With Powerful Tools for Large-Scale Cyber Operations
- 16:32 : Chinese Hackers Breach Belgium State Security Service as Investigation Continues
- 16:32 : Microsoft targets AI deepfake cybercrime network in lawsuit
- 16:32 : The biggest data breaches of 2025 — so far
- 16:9 : Belgian Intelligence Agency emails leaked by Barracuda Vulnerability
- 16:9 : Enhanced capabilities sustain the rapid growth of Vo1d botnet
- 15:32 : Chinese Hackers Exploiting Check Point’s VPN Zero-Day Flaw to Attack Orgs Worldwide
- 15:32 : Bybit Crypto Exchange Hacked for $1.5 Billion in Largest Crypto Heist
- 15:32 : Building Robust AI Systems with Verified Data Inputs
- 15:32 : Role of Continuous Threat Exposure Management in Business Security
- 15:32 : OT/ICS cyber threats escalate as geopolitical conflicts intensify
- 15:10 : Lightning-Fast Requests with Early Data
- 15:10 : The best VPN services for torrenting in 2025: Expert tested and reviewed
- 15:10 : What is FCAPS (fault, configuration, accounting, performance and security)?
- 15:9 : Gabbard Decries Britain’s Reported Demand for Apple to Provide Backdoor Access to Users’ Cloud Data
- 15:9 : MITRE Caldera RCE vulnerability with public PoC fixed, patch ASAP! (CVE-2025–27364)
- 15:9 : 5,000 Phishing PDFs on 260 Domains Distribute Lumma Stealer via Fake CAPTCHAs
- 15:9 : RDP: a Double-Edged Sword for IT Teams – Essential Yet Exploitable
- 14:32 : Kommentar zur Cybersicherheit im öffentlichen Sektor
- 14:32 : Top Tech Conferences & Events to Add to Your Calendar in 2025
- 14:32 : Next-Gen Phishing Techniques – How Back-End Tech Made Scams More Effective
- 14:32 : Third-Party Attacks Drive Major Financial Losses in 2024
- 14:5 : Auch in Deutschland: 49.000 Zutrittskontrollsysteme hängen ungeschützt am Netz
- 14:5 : Belgium investigating alleged cyberattack on intelligence agency by China-linked hackers
- 14:5 : IT Security News Hourly Summary 2025-02-28 15h : 5 posts
- 14:5 : Nakivo Backup & Replication Tool Vulnerability Allows Attackers to Read Arbitrary Files – PoC Released
- 13:33 : Europol gelingt großer Schlag gegen Ersteller KI-generierter Kinderpornos
- 13:33 : Fünf Sicherheitslücken in Gitlab geschlossen
- 13:32 : Migrating from Hub and Spoke Network to Azure Virtual WAN
- 13:32 : In Other News: Krispy Kreme Breach Cost, Pwn2Own Berlin, Disney Hack Story
- 13:3 : Google Starts Layoffs In Cloud, HR Units
- 13:3 : DeepSeek Unveiled — Exposing the GenAI Risks Hiding in Plain Sight
- 13:3 : PingAM Java Agent Vulnerability Let Attackers Gain Unauthorized Access
- 13:3 : New Pass-the-Cookie Attack Bypass Microsoft 365 & YouTube MFA Logins
- 13:3 : Njrat Attacking Users Abusing Microsoft Dev Tunnels for C2 Communications
- 13:3 : Poco RAT Malware Exploits PDF Files to Infiltrate Systems and Steal Data
- 13:3 : OSPS Baseline: Practical security best practices for open source software projects
- 12:33 : [UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen
- 12:33 : [UPDATE] [mittel] Linux Kernel: Schwachstelle ermöglicht Denial of Service
- 12:33 : [UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff
- 12:32 : Cisco fixed command injection and DoS flaws in Nexus switches
- 12:8 : Malware in gefälschten GitHub-Repositorys | Offizieller Blog von Kaspersky
- 12:8 : [NEU] [hoch] Linux Kernel: Mehrere Schwachstellen
- 12:7 : Ransomware Group Takes Credit for Lee Enterprises Attack
- 12:7 : Microsoft Exposes LLMjacking Cybercriminals Behind Azure AI Abuse Scheme
- 12:7 : Cybersecurity M&A Roundup: SolarWinds Acquired for $4.4bn
- 11:34 : Videoeditor DaVinci Resolve ermöglicht Rechteausweitung in macOS
- 11:34 : Android: Riesiges Botnetz steuert 1,6 Millionen TV-Geräte
- 11:33 : JavaGhost’s Persistent Phishing Attacks From the Cloud
- 11:33 : Man Jailed 24 Years for Running Dark Web CSAM Sites from Coffee Shop
- 11:32 : New Pass-the-Cookie Attacks Bypass MFA, Giving Hackers Full Account Access
- 11:32 : Telegram as #1 Messenger Used by Cybercriminals for Communications
- 11:32 : Vo1d Botnet Evolves as It Ensnares 1.6 Million Android TV Boxes
- 11:32 : Spotlight on Regulatory Compliance: The Challenges Your IT and Security Teams May Face
- 11:8 : Partnerangebot: CARMAO Academy – „BCM-Praktiker – Zertifikatslehrgang“
- 11:8 : [NEU] [hoch] IBM MQ: Mehrere Schwachstellen
- 11:7 : Microsoft Names Suspects in Lawsuit Against AI Hackers
- 11:7 : Old Vulnerabilities Among the Most Widely Exploited
- 11:5 : IT Security News Hourly Summary 2025-02-28 12h : 13 posts
- 10:33 : DrayTek Vigor: Mehrere Schwachstellen
- 10:33 : Instagram-Feed zurücksetzen: Wie ihr die Funktion aktiviert und was sich dadurch ändert
- 10:33 : Google Übersetzer bekommt ein KI-Update: Wie die App dadurch besser wird
- 10:33 : Mehr als nur Deepseek: Auch im Bereich der Video-KI lohnt ein Blick nach China
- 10:33 : [NEU] [hoch] Rancher: Mehrere Schwachstellen
- 10:33 : [NEU] [hoch] DrayTek Vigor: Mehrere Schwachstellen
- 10:32 : How to Protect Your Digital Identity While Gaming Online
- 10:32 : Lynx Ransomware Attacking Organizations to Exfiltrate Sensitive Data
- 10:32 : Sticky Werewolf Uses Undocumented Implant to Deploy Lumma Stealer in Russia and Belarus
- 10:32 : 12,000+ API Keys and Passwords Found in Public Datasets Used for LLM Training
- 10:5 : Datendiebstahl statt Verschlüsselung dominiert
- 10:5 : Microsoft: Unsichere DES-Verschlüsselung fliegt aus Windows raus
- 10:5 : [UPDATE] [hoch] IBM QRadar SIEM (Log Source Management App): Mehrere Schwachstellen
- 10:4 : New GitHub Scam With Thousand of “mods” & “cracks” Steal Your Data
- 10:4 : 1.6 Million Android TVs Worldwide Hacked by Vo1d Botnet
- 9:33 : [UPDATE] [hoch] IBM Informix: Mehrere Schwachstellen
- 9:33 : [UPDATE] [hoch] zlib: Schwachstelle ermöglicht nicht spezifizierten Angriff
- 9:33 : [UPDATE] [mittel] zlib: Schwachstelle ermöglicht Codeausführung
- 9:33 : [UPDATE] [hoch] bzip2: Schwachstelle ermöglicht Ausführen von beliebigem Programmcode mit den Rechten des Dienstes
- 9:33 : Chinese Hackers Exploit Check Point VPN Zero-Day to Target Organizations Globally
- 9:32 : Prolific Data Extortion Actor Arrested in Thailand
- 9:5 : Nasa: Asteroiden-Sonde Lucy fotografiert zweites Ziel
- 9:4 : PingAM Java Agent Vulnerability Allows Attackers to Bypass Security
- 8:33 : Sicherheitsupdate: Angreifer können Middleware IBM TXSeries kompromittieren
- 8:33 : “Passwort” Folge 26: Homomorphe Verschlüsselung
- 8:32 : China-linked threat actors stole 10% of Belgian State Security Service (VSSE)’s staff emails
- 8:32 : 18 Best Web Filtering Solutions – 2025
- 8:32 : Wallbleed Exposes Memory Vulnerability in China’s Great Firewall DNS System
- 8:32 : 260 Domains Hosting 5,000 Weaponized PDF Files Attacking Users to Steal Credit Card Data
- 8:32 : Massive Banking Data Leaks Under Scrutiny as Cyber Fraud Cases Surge
- 8:32 : Cyber espionage increase, Nakasone cyber warning, PolarEdge exploits Cisco
- 8:7 : Die Qual der Wahl
- 8:6 : New GitHub Scam Uses Fake “Mods” and “Cracks” to Steal User Data
- 8:5 : IT Security News Hourly Summary 2025-02-28 09h : 1 posts
- 7:33 : Cyber-Bande Cl0p: Angeblich Daten bei HP und HPE geklaut
- 7:2 : IRS contractor leaked the tax returns of over 400k Americans and businesses
- 7:2 : 5 Best Practices for Bolstering Physical Access Security in Data Centers in 2025