210 posts were published in the last hour
- 22:55 : IT Security News Daily Summary 2025-03-30
- 21:32 : “This isn’t the Matrix”
- 20:5 : IT Security News Hourly Summary 2025-03-30 21h : 3 posts
- 19:36 : German Doner Kebab – 162,373 breached accounts
- 19:12 : Schluss mit Meeting-Chaos: Google Meet hilft dir, den Überblick zu bewahren
- 19:12 : Signal-Gate wächst: Passwörter hochrangiger US-Sicherheitspolitiker frei im Netz verfügbar
- 19:12 : Google gibt Gemini 2.5 Pro für alle frei – zumindest ein bisschen
- 19:12 : Hugging-Face-Experten warnen: Wir sollten KI-Agenten nicht die volle Kontrolle geben
- 18:34 : BSidesLV24 – IATC – Introduction To I Am The Cavalry – Day Two – Preparing for 2027
- 18:9 : Beyond encryption: Why quantum computing might be more of a science boom than a cybersecurity bust
- 18:9 : Google Deletes User Data by Mistake – Who’s Affected and What to Do
- 17:32 : TsarBot Android Malware Mimics 750 Banking & Finance Apps to Steal Credentials
- 17:32 : Inside Daisy Cloud: 30K Stolen Credentials Exposed
- 17:5 : IT Security News Hourly Summary 2025-03-30 18h : 1 posts
- 17:5 : North Korea Establishes Research Center 227 to Strengthen Cyber Warfare Capabilities
- 17:4 : AI and Privacy – Issues and Challenges
- 17:4 : Gmail Upgrade Announced by Google with Three Billion Users Affected
- 16:34 : Hackers Employ New ClickFix Captcha Technique to Deliver Ransomware
- 16:34 : Apache Tomcat Vulnerability (CVE-2025-24813) Exploited to Execute Code on Servers
- 15:6 : How Digital Signatures Provide the Necessary Safeguards to Restore Trust in The Manufacturing Process
- 14:34 : Sam’s Club Investigates Alleged Cl0p Ransomware Breach
- 14:34 : Security Affairs newsletter Round 517 by Pierluigi Paganini – INTERNATIONAL EDITION
- 14:34 : SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 39
- 13:10 : Künstliche Intelligenz mit Eigenleben: Cursor-KI verweigert die Arbeit
- 13:10 : Google Gemini Live: Vom Smartphone-Bildschirm zur Umweltanalyse
- 13:10 : Industrie 4.0: Verschlafen deutsche Unternehmen die digitale Transformation?
- 13:10 : KI-Schock für Indien: 500 Millionen Jobs stehen auf dem Spiel
- 13:9 : Personalisierte Werbung: So wirst du von deinem Smart TV ausspioniert
- 13:9 : Effective Cyber Drills Must Mirror the Realities of The Battlefield
- 11:11 : From checkbox to confidence: Why passing the audit isn’t the endgame
- 11:5 : IT Security News Hourly Summary 2025-03-30 12h : 2 posts
- 9:15 : Neuer LLM-Jailbreak: Mit psychologischem Gaslighting gegen KI-Filter
- 9:14 : Genetic Breach Fallout: 23andMe’s Collapse Raises Security Alarms
- 8:33 : Week in review: Chrome sandbox escape 0-day fixed, Microsoft adds new AI agents to Security Copilot
- 7:17 : Optimierter Brandschutz für Kunststoff-Ladungsträger
- 5:34 : RESURGE Malware Exploits Ivanti Flaw with Rootkit and Web Shell Features
- 5:7 : Anzeige: Microsoft 365 für Admins von Einrichtung bis Verwaltung
- 23:5 : IT Security News Hourly Summary 2025-03-30 00h : 1 posts
- 22:55 : IT Security News Daily Summary 2025-03-29
- 21:32 : What are the cost implications of maintaining NHI compliance?
- 21:32 : What best practices ensure long-term compliance for NHIs?
- 21:32 : How can technology simplify the process of NHI compliance?
- 20:5 : IT Security News Hourly Summary 2025-03-29 21h : 4 posts
- 19:13 : Twitter (X) Hit by 2.8 Billion Profile Data Leak in Alleged Insider Job
- 19:13 : “Crocodilus” A New Malware Targeting Android Devices for Full Takeover
- 19:13 : Gamaredon Hackers Weaponize LNK Files to Deliver Remcos Backdoor
- 19:13 : BSidesLV24 – IATC – Time Is Up. You Have Three Years, 3 Months, 3 Weeks, To Protect Your Stuff. What Do You Do?
- 18:39 : Künstliche Intelligenz auf dem Prüfstand: AGI-Test deckt Schwächen aktueller KI-Modelle auf
- 18:39 : Google Maps-Zeitachse gelöscht: Dieser Trick könnte eure verlorenen Daten retten
- 18:39 : Dr. Google im Wandel: Sind KI-Tools tatsächlich nützlich für Gesundheitsberatung?
- 18:38 : FBI and DOJ seize $8.2 Million in romance baiting crypto fraud scheme
- 18:38 : CISA Warns of ESURGE Malware Exploiting Ivanti RCE Vulnerability
- 18:38 : Lotus Blossom APT Exploits WMI for Post-Exploitation Activities
- 17:33 : Datenleck: 1,5 Millionen private Fotos von Dating-Apps für LGBTQ+ enthüllt
- 17:32 : Experts warn of the new sophisticate Crocodilus mobile banking Trojan
- 17:7 : Don’t make this USB mistake! Protect your data with this discounted encrypted gadget
- 17:6 : Frankenstein Scam: Here’s How to Safeguard Yourself Against Synthetic Identity Fraud
- 17:5 : IT Security News Hourly Summary 2025-03-29 18h : 2 posts
- 16:7 : BSI-Studie: Zahlreiche Schwachstellen in Krankenhausinformationssystemen
- 16:6 : Ransomware Found in VSCode Extensions Raises Concerns Over Microsoft’s Security Review
- 15:32 : Twitter (X) Hit by Data Leak of 2.8 Billion Users; Allegedly an Insider Job
- 15:32 : Babuk Locker 2.0 vs Seceon Platform: MITRE ATT&CK Mapping and Early-Stage Detection & Remediation
- 15:9 : Evolution Of Cyber Threats: Why Attack Surface Management Is Critical Today
- 15:9 : X (Twitter) Largest Data Breach Ever? 2.8 Billion User Info Leaked
- 14:32 : Beware the “Dream Vacation” Nightmare: Unmasking Travel Package Spam and Protecting Yourself
- 14:5 : IT Security News Hourly Summary 2025-03-29 15h : 7 posts
- 13:39 : Cybersicherheit: Kriminelle wollten Arbeitslosengeld erbeuten
- 13:38 : News alert: SquareX discloses nasty browser-native ransomware that’s undetectable by antivirus
- 13:5 : ChatGPT wird höflicher: OpenAI optimiert KI-Konversationen für bessere User-Erfahrung
- 13:5 : „Unsere GPUs schmelzen“: OpenAI bremst Bildgenerierung in ChatGPT
- 13:5 : Installation aus der Hölle: Wie ich Linux auf meinem Mac einrichten wollte – und dazu Windows brauchte
- 13:5 : E-Mails verfassen leichtgemacht: Gmails Gemini lernt Deutsch, Italienisch und Französisch
- 13:5 : WWDC 2025: Apple verspricht spannende Software-Neuheiten – iOS 19 und macOS 16 im Fokus
- 13:4 : Why Eliminating the Cyber Safety Review Board Weakens Critical Infrastructure and Cyber Resilience
- 11:34 : Executive Perspectives: Pierre Noel on Cybersecurity Leadership, Risk, and Resilience
- 11:9 : Top Trump Officials’ Passwords and Personal Phone Numbers Discovered Online
- 11:9 : Malware in Lisp? Now you’re just being cruel
- 11:5 : IT Security News Hourly Summary 2025-03-29 12h : 2 posts
- 10:32 : Kriminelle wollten Leistungen der Bundesagentur ergaunern
- 10:32 : RamiGPT – AI Tool To Escalate Privilege & Gain Root Access Within a Minute
- 10:2 : 46 New Vulnerabilities in Solar Inverters Systems Let Attackers Tamper Inverter Settings
- 10:2 : Gamaredon Hacker Group Using Weaponize LNK Files To Drop Remcos Backdoor on Windows
- 10:2 : ClickFix Captcha – A Creative Technique That Allow Attackers Deliver Malware and Ransomware on Windows
- 10:2 : Attackers Exploit Click Tolerance to Deliver Malware to Users
- 8:36 : Neues Torsystem für Bäckerei
- 8:35 : 4 Tips For Crypto Wallet Security
- 8:35 : Top 5 Web Application Penetration Testing Companies UK
- 8:35 : DeBackdoor – Framework to Detect Backdoor Attacks on Deep Models
- 8:35 : New Android Trojan Crocodilus Abuses Accessibility to Steal Banking and Crypto Credentials
- 8:10 : PCI DSS 4.0.1 and Non-Human Identity Management: What You Need to Know
- 8:10 : Cyber Security Today Profile Series: Dr. Priscilla Johnson on Environmental Engineering, Water Strategy, and Cyber Intelligence
- 8:5 : IT Security News Hourly Summary 2025-03-29 09h : 2 posts
- 7:13 : Personal Data Exposure: The Silent Cybersecurity Threat That You Need to Address
- 7:13 : Red Team Activities Turns More Sophisticated With The Progress of Artificial Intelligence
- 6:6 : Congress Must Reject Transparent Efforts to Undermine the Courts
- 5:5 : IT Security News Hourly Summary 2025-03-29 06h : 1 posts
- 4:6 : BlackLock Ransomware Exposed After Researchers Exploit Leak Site Vulnerability
- 2:5 : IT Security News Hourly Summary 2025-03-29 03h : 1 posts
- 1:38 : Researchers find a way to shield quantum information from ‘noise’
- 0:32 : PCI DSS 4.0: Achieve Compliance with Feroot Before March 31
- 23:5 : IT Security News Hourly Summary 2025-03-29 00h : 3 posts
- 22:55 : IT Security News Daily Summary 2025-03-28
- 22:36 : News brief: China-linked APTs and Russian access broker
- 22:36 : Cybersecurity & Infrastructure Security Agency (CISA) Pledge
- 21:34 : Crooks are reviving the Grandoreiro banking trojan
- 21:34 : Friday Squid Blogging: Squid Werewolf Hacking Group
- 21:18 : Welcher Browser bietet derzeit den besten Datenschutz? – Alternativen zu Chrome, Edge und Firefox | Offizieller Blog von Kaspersky
- 21:18 : CISA Adds One Known Exploited Vulnerability to Catalog
- 21:18 : MAR-25993211-r1.v1 Ivanti Connect Secure (RESURGE)
- 21:18 : CISA Releases Malware Analysis Report on RESURGE Malware Associated with Ivanti Connect Secure
- 21:18 : Week in Review: Microsoft Trust abuse, 23andMe bankruptcy risks, NIST’s growing backlog
- 21:18 : AWS continues to support government cloud security and shape FedRAMP’s evolution toward automated compliance
- 20:34 : New Morphing Meerkat Phishing Kit Exploits DNS to Spoof 100+ Brands
- 20:34 : A Congressional Bill to Limit Court Power Through Injunctions Is a Bad, Transparent Effort to Limit Court Power
- 20:5 : IT Security News Hourly Summary 2025-03-28 21h : 4 posts
- 19:38 : Russian authorities arrest three suspects behind Mamont Android banking trojan
- 19:38 : Oracle Hack PR Drama: Deny, Deny, Deny — Despite Damning Data
- 19:11 : Ansible Security and Testing Tools for Automation
- 19:11 : WhatsApp Fixes Security Flaw Exploited by Spyware
- 18:35 : Mit selbst programmiertem Tool wehrt sich ein Open-Source-Entwickler gegen KI-Scraper
- 18:35 : Von Smishing bis Whaling: 9 Arten von Phishing-Angriffen, die ihr kennen solltet
- 18:34 : Geheimchat-Affäre in den USA: Signal ist der Gewinner der Trump-Panne
- 18:11 : Engaging Online Learning: Strategies to Keep Students Focused and Motivated
- 18:11 : How to Implement CMMS Software in Your Organization
- 18:11 : New Python-Based Discord RAT Attacking Users to Steal Login Credentials
- 17:32 : Hackers Exploit DNS MX Records to Create Fake Logins Imitating 100+ Brands
- 17:32 : Ascom Confirms Cyberattack as HellCat Hackers Exploit Jira Servers
- 17:32 : Oracle Denies Claim of Server Breach
- 17:32 : Betruger Backdoor Linked to RansomHub Ransomware Attacks on Critical Infrastructure
- 17:11 : PJobRAT Android Malware Masquerades as Dating and Messaging Apps to Target Military Personnel
- 17:11 : New Python-Based Discord RAT Targets Users to Steal Login Credentials
- 17:11 : Vulnerability in most browsers abused in targeted attacks
- 17:5 : IT Security News Hourly Summary 2025-03-28 18h : 7 posts
- 16:39 : NASA, Boeing To Begin Starliner Testing After ‘Anomalies’
- 16:39 : Tax Season = Prime Time for Scammers — Here’s How to Stay Safe
- 16:39 : Mozilla patches Firefox bug ‘exploited in the wild,’ similar to bug attacking Chrome
- 16:39 : Again and again, NSO Group’s customers keep getting their spyware operations caught
- 16:39 : Guide to Network Device Configuration Review
- 16:9 : Oracle Health data breach related to hospitals
- 16:9 : A Deep Dive into Water Gamayun’s Arsenal and Infrastructure
- 15:34 : Russian Hackers Mimic as CIA to Steal Ukraine Defense Intelligence Data
- 15:34 : PJobRAT Android RAT as Dating & Instant Messaging Apps Attacking Military Personnel
- 15:34 : Nine in Ten Healthcare Organizations Use the Most Vulnerable IoT Devices
- 15:34 : Solar Power System Vulnerabilities Could Result in Blackouts
- 15:11 : Cybersecurity Trends for 2025
- 15:11 : Security in the CI/CD Pipeline
- 15:11 : Advanced Network Security with Check Point CloudGuard and Nutanix Cloud Platform
- 15:11 : You Can Stockpile Food—But You Can’t Stockpile Trust
- 15:11 : The best VPN for Mac in 2025: Expert tested and reviewed
- 15:11 : Fortinet vs Palo Alto NGFWs 2025: Comparison Guide
- 14:33 : Potsdamer Konferenz für Nationale Cybersicherheit 2025
- 14:32 : Microsoft’s passwordless future is here for Outlook, Xbox, 365, and more
- 14:32 : Researchers Uncover 46 Critical Flaws in Solar Inverters From Sungrow, Growatt, and SMA
- 14:7 : EU To Invest €1.3bn in AI, Cybersecurity, Digital Skills
- 14:7 : SHELBY Malware Steals Data by Abusing GitHub as Command-and-Control Server
- 14:7 : Russian Hackers Impersonate CIA to Steal Ukrainian Defense Intelligence Data
- 14:7 : 5 Chromecast tricks to unlock your TV’s full potential (including a hidden streaming hack)
- 14:5 : IT Security News Hourly Summary 2025-03-28 15h : 15 posts
- 13:35 : [UPDATE] [mittel] Ghostscript: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff
- 13:35 : [UPDATE] [mittel] OpenSSL: Mehrere Schwachstellen ermöglichen Umgehen von Sicherheitsvorkehrungen
- 13:35 : [UPDATE] [mittel] OpenSSL: Mehrere Schwachstellen
- 13:34 : 46 New Vulnerabilities in Solar Inverter Systems Allow Attackers to Tamper with Settings
- 13:34 : SHELBY Malware Steal Data Abusing GitHub for Command-and-control Server
- 13:34 : CoffeeLoader Uses GPU-Based Armoury Packer to Evade EDR and Antivirus Detection
- 13:34 : FBI Issues new alert over phishing SMS scam targeting highway toll customers
- 13:10 : Microsoft überarbeitet Log-ins und Anmeldungen
- 13:10 : The CMMC Compliance Journey
- 13:10 : DeBackdoor: A Framework for Detecting Backdoor Attacks in Deep Learning Models
- 13:9 : Backup Data Resiliency: Backups Alone Aren’t Enough
- 13:9 : Mozilla patches Firefox bug ‘exploited in the wild’, similar to bug attacking Chrome
- 13:9 : Addressing Federal Cybersecurity Challenges in the Cloud Era
- 13:9 : Critical Condition: Legacy Medical Devices Remain Easy Targets for Ransomware
- 13:9 : Cybercriminals Exploit Psychological Vulnerabilities in Ransomware Campaigns
- 12:38 : Microsoft 365 wird schneller: Dieser Trick soll Apps wie Word beim Start beschleunigen
- 12:38 : Wer mit ChatGPT Ghibli-Memes erstellt, beleidigt sich selbst
- 12:37 : A Tale of Two Phishing Sites, (Fri, Mar 28th)
- 12:37 : Meta Launches Friends Tab, As Zuck Touts “OG Facebook”
- 12:37 : Cardiff’s children’s chief confirms data leak 2 months after cyber risk was ‘escalated’
- 12:37 : How to create a strong passphrase, with examples
- 12:37 : Threat Actors Hacked 150,000 Sites to Link Chinese Gambling Sites
- 12:37 : RansomHub’s EDRKillShifter Link With Other Well-Established Ransomware Gang’s – New Research
- 12:37 : New FamousSparrow Malware Attacking Hotels & Engineering Companies to New Backdoor
- 12:37 : PlayBoy Locker Ransomware Attacking Windows, NAS and ESXi Operating Systems
- 12:37 : Hackers Abuse MailChimp Email Marketing Platform via Phishing, and Social Engineering Tactics
- 12:37 : 9-Year-Old NPM Crypto Package Hijacked for Information Theft
- 12:10 : SquareX Discloses Browser-Native Ransomware that Puts Millions at Risk
- 12:10 : AI Datasets Reveal Human Values Blind Spots
- 12:10 : Russian Phishing Uses Fake CIA Sites to Target Anti-war, Ukraine Supporters
- 12:10 : Red Team Tactics Grow More Sophisticated with Advancements in Artificial Intelligence
- 12:10 : In Other News: Hellcat Hackers Unmasked, CrushFTP Bug Controversy, NYU Hacked
- 12:10 : JFK and the Houthis: Haste Makes Waste of Security
- 12:9 : Trump CISA Cuts Threaten US Election Integrity, Experts Warn
- 11:36 : Mozilla Firefox und Firefox ESR: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen
- 11:36 : [NEU] [hoch] Linux Kernel: Mehrere Schwachstellen
- 11:36 : [NEU] [UNGEPATCHT] [mittel] Red Hat JBoss Enterprise Application Platform: Schwachstelle ermöglicht Cross-Site Scripting
- 11:36 : [NEU] [hoch] Mozilla Firefox und Firefox ESR: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen
- 11:36 : [NEU] [mittel] Shibboleth Identity Provider: Schwachstelle ermöglicht Offenlegung von Informationen
- 11:35 : Malicious Snow White Movie Download Targets Viewers with New Malware
- 11:35 : VanHelsing Ransomware: What You Need To Know
- 11:35 : AIs as Trusted Third Parties
- 11:35 : New Issuance Requirements Improve HTTPS Certificate Validation
- 11:35 : Cloudflare open sources OPKSSH to bring Single Sign-On to SSH
- 11:34 : Morphing Meerkat PhaaS Platform Spoofs 100+ Brands
- 11:9 : Sicherheitslücken Gitlab: Heruntergestufte Admins behalten weitreichende Rechte
- 11:9 : [NEU] [mittel] JetBrains TeamCity: Mehrere Schwachstellen
- 11:9 : [UPDATE] [hoch] CrushFTP: Schwachstelle ermöglicht das Umgehen der Authentisierung
- 11:8 : Generative AI providers rewriting the rules of automated traffic – F5 report
- 11:8 : GLPI ITSM Tool Flaw Allows Attackers to Inject Malicious SQL Queries
- 11:8 : Hackers Exploit MailChimp Email Marketing Platform Using Phishing and Social Engineering Tactics
- 11:8 : Keeper Unveils Latest WearOS App for Android