210 posts were published in the last hour
- 21:32 : Fake Alpine Quest Mapping App Spotted Spying on Russian Military
- 21:32 : Malicious npm Packages Attacking Linux Developers to Install SSH Backdoors
- 21:32 : Hackers Abuse Cloudflare Tunnel Infrastructure to Deliver Multiple RATs
- 21:3 : Chatbot-Desaster bei Hype-Startup – was Führungskräfte aus dem KI-Chaos lernen können
- 20:32 : Biometrics vs. passcodes: What lawyers say if you’re worried about warrantless phone searches
- 20:32 : RIP, Google Privacy Sandbox
- 20:32 : Actionable Protection Strategies for 2025 with Shrav Mehta
- 20:32 : The Evolution of Vulnerability Management with Steve Carter
- 20:5 : IT Security News Hourly Summary 2025-04-22 21h : 5 posts
- 20:3 : Lotus Panda Hackers Strike Southeast Asian Governments With Browser Stealers, Sideloaded Malware
- 20:3 : Two CISA officials jump ship, both proud of pushing for Secure by Design software
- 20:3 : Randall Munroe’s XKCD ‘Anchor Screws’
- 20:3 : The AI Bot Epidemic: The Imperva 2025 Bad Bot Report
- 20:3 : CircuitMeter Integrates Its Advanced Energy Metering With Hyperview DCIM Platform
- 20:3 : BSidesLV24 – Common Ground – Cyber Harassment: Stop The Silence, Save Lives
- 19:32 : Beyond SSL: Advanced Cyber Security Tools Every eCommerce Site Needs
- 19:32 : New Magecart Attack With Malicious JavaScript Steals Credit Card Data
- 19:32 : FBI Warns of Scammers Mimic as IC3 Employees to Defraud Individuals
- 19:4 : Criminal IP to Showcase Advanced Threat Intelligence at RSAC™ 2025
- 19:4 : SSL.com Vulnerability Allowed Fraudulent SSL Certificates for Major Domains
- 19:3 : What is crypto ransomware? How cryptocurrency aids attackers
- 18:32 : Criminal IP to Showcase Advanced Threat Intelligence at RSAC™ 2025
- 18:32 : Fog ransomware channels Musk with demands for work recaps or a trillion bucks
- 18:2 : Criminal IP to Showcase Advanced Threat Intelligence at RSAC™ 2025
- 18:2 : SandboxAQ Launches AQtive Guard to Secure Billions of AI-Driven Non-Human Identities
- 17:33 : Criminal IP to Showcase Advanced Threat Intelligence at RSAC™ 2025
- 17:33 : Docker plans Model Context Protocol security boost
- 17:32 : A pot of $250K is now available to ransomware researchers, but it feeds a commercial product
- 17:32 : Docker Malware Exploits Teneo Web3 Node to Earn Crypto via Fake Heartbeat Signals
- 17:5 : IT Security News Hourly Summary 2025-04-22 18h : 19 posts
- 17:3 : Criminal IP to Showcase Advanced Threat Intelligence at RSAC™ 2025
- 17:3 : AppOmni and Splunk SaaS: A Unified Front for Enhanced Security Insights
- 17:3 : AWS empowers global security culture at Wicked6 Cyber Games
- 16:34 : Anzeige: Cyberangriffe abwehren mit fundiertem Hacking-Wissen
- 16:34 : Criminal IP to Showcase Advanced Threat Intelligence at RSAC™ 2025
- 16:34 : Hackers Exploit Cloudflare Tunnel Infrastructure to Deploy Multiple Remote Access Trojans
- 16:34 : Software Bill of Materials (SBOM): Enhancing Software Transparency and Security
- 16:33 : Siemens TeleControl Server Basic SQL
- 16:33 : Siemens TeleControl Server Basic
- 16:33 : Schneider Electric Wiser Home Controller WHC-5918A
- 16:33 : CISA Releases Five Industrial Control Systems Advisories
- 16:33 : ABB MV Drives
- 16:33 : Android Improves Its Security
- 16:33 : This is not just any ‘cyber incident’ … this is an M&S ‘cyber incident’
- 16:33 : Not All Multipath Is Created Equal
- 16:33 : Landmark Admin Hack: Massive Data Leak Hits 1.6 Million Americans
- 16:33 : Microsoft Reports 92% Adoption Rate for Phishing-Resistant MFA Among Corporate Users
- 16:3 : New cryptocurrency creation will lead to more ransomware attacks
- 16:3 : Criminal IP to Showcase Advanced Threat Intelligence at RSAC™ 2025
- 16:3 : Threat Actors Leverage npm and PyPI with Impersonated Dev Tools for Credential Theft
- 16:3 : Cybersecurity Indicators: How IOCs, IOBs, and IOAs Empower Threat Detection & Prevention
- 16:3 : Security Analysts Express Concerns Over AI-Generated Doll Trend
- 16:3 : Top U.S. Banks Cut Off Digital Data Sharing With OCC After Major Cyberattack
- 16:3 : SuperCard X Enables Contactless ATM Fraud in Real-Time
- 15:33 : Criminal IP to Showcase Advanced Threat Intelligence at RSAC™ 2025
- 15:33 : New Google email scams are alarmingly convincing – how to spot them
- 15:33 : Tired of unsolicited nude pics? Google’s new safety feature can help – how it works
- 15:33 : The danger of data breaches — what you really need to know
- 15:33 : Infostealer Malware FormBook Spread via Phishing Campaign – Part I
- 15:33 : UN says Asian scam call center epidemic expanding globally amid political heat
- 15:32 : Cloud Data Security Play Sentra Raises $50 Million Series B
- 15:32 : 54% of tech hiring managers expect layoffs in 2025
- 15:5 : Wenn KI-Agenten unsere Computer bedienen: Neues Framework macht weiteren Schritt nach vorne
- 15:5 : KI krempelt unsere Vorstellung von Suchmaschinen um: Was kommt nach dem Googeln?
- 15:5 : KI wird in 20 Jahren die Weltherrschaft übernehmen – glauben 44 Prozent der Gen Z
- 15:5 : KI zum Klimaschutz: Gute Idee, doch es löst ein Dilemma nicht auf
- 15:4 : Microsoft’s patch for CVE-2025–21204 symlink vulnerability introduces another symlink vulnerability
- 15:4 : Virtual Client Computing Market: Tapping on the Domain of Innumerable Opportunities
- 15:4 : Criminal IP to Showcase Advanced Threat Intelligence at RSAC™ 2025
- 15:4 : Security Metrics Every CISO Needs to Report to the Board in 2025
- 15:4 : Criminal IP Set to Unveil Next-Gen Threat Intelligence at RSAC™ 2025
- 15:4 : Malicious npm and PyPI Pose as Developer Tools to Steal Login Credentials
- 15:3 : Chrome To Add New “Protect your IP address” Settings With Incognito Tracking Protections
- 15:3 : Strategic Cybersecurity Budgeting – CISO Best Practices
- 15:3 : Identity Theft Concerns Rise as USPS Flags Suspicious Package Deliveries
- 15:3 : Billbug Espionage Group Deploys New Tools in Southeast Asia
- 14:33 : Criminal IP to Showcase Advanced Threat Intelligence at RSAC™ 2025
- 14:33 : Cybercriminals Exploit Network Edge Devices to Infiltrate SMBs
- 14:33 : Hackers Exploit Legitimate Microsoft Utility to Deliver Malicious DLL Payload
- 14:33 : NymVPN: Introducing a security-first decentralized VPN with a Mixnet flair
- 14:33 : Marks & Spencer confirms cybersecurity incident amid ongoing disruption
- 14:33 : Cyberattack Knocks Texas City’s Systems Offline
- 14:33 : Building a Smarter, Safer Grid with IEEE 2030.5 and Certificate Lifecycle Management Automation
- 14:33 : GCP Cloud Composer Bug Let Attackers Elevate Access via Malicious PyPI Packages
- 14:32 : New Cryptojacking Malware Targets Docker with Novel Mining Technique
- 14:5 : IT Security News Hourly Summary 2025-04-22 15h : 21 posts
- 14:3 : Criminal IP to Showcase Advanced Threat Intelligence at RSAC™ 2025
- 14:3 : December 2024 Cyber Attacks Statistics
- 14:3 : Using Risk to Prove the Value of Cyber Threat Intelligence
- 14:3 : All Gmail users at risk from clever replay attack
- 14:3 : 1Password Extends Reach of IAM Platform to AI Agents and Unmanaged Devices
- 14:3 : Perforce Puppet update accelerates vulnerability remediation
- 13:34 : Vorsicht auf Linkedin: Fake-Stellenangebote im Umlauf
- 13:33 : A Sustainability Program with Regional Nuance
- 13:33 : TP-Link Router Vulnerabilities Allow Attackers to Execute Malicious SQL Commands
- 13:33 : The Green IT Approach To Cyber Security And What Efficient Implementation Can Achieve
- 13:33 : The State of Ransomware in the First Quarter of 2025: Record-Breaking 126% Spike in Public Extortion Cases
- 13:33 : Samsung One UI Security Flaw Exposes Users Data in Plain Text With No Expiration!
- 13:33 : Researchers Uncovered Latest Version of Lumma InfoStealer with Code Flow Obfuscation
- 13:33 : Hackers Leverage Windows MS Utility Tool to Inject Malicious DLL Payload
- 13:33 : Why The Seceon Platform Is A Must-Have To Tackle Today’s Threat Landscape
- 13:33 : Augmented, Not Replaced – Humans Outpace AI in Simbian’s SOC Hackathon Championship – Results and Winners Announced!
- 13:32 : Ketch Data Sentry uncovers hidden privacy risks
- 13:4 : Faster Vulnerability Patching Reduces Risk and Lowers Cyber Risk Index
- 13:4 : VentureBeat spins out GamesBeat, accelerates enterprise AI mission
- 13:4 : Relyance AI builds ‘x-ray vision’ for company data: Cuts AI compliance time by 80% while solving trust crisis
- 13:4 : Russian organizations targeted by backdoor masquerading as secure networking software updates
- 13:4 : Staying Ahead of AI-Powered Threats: Insights from Delinea Labs’ Inaugural Cybersecurity Report
- 13:4 : AI-powered Vishing
- 12:35 : Moodle: Mehrere Schwachstellen
- 12:35 : E-Mail-Spoofing: Betrüger schocken Google-Nutzer mit Fake-Vorladung
- 12:35 : [NEU] [hoch] Linux Kernel: Mehrere Schwachstellen
- 12:35 : [NEU] [hoch] Moodle: Mehrere Schwachstellen
- 12:35 : [NEU] [mittel] Microsoft GitHub Enterprise: Mehrere Schwachstellen
- 12:34 : Russian Host Proton66 Tied to SuperBlack and WeaXor Ransomware
- 12:34 : Samsung One UI Vulnerability Leaks Sensitive Data in Plain Text With No Expiration!
- 12:34 : Malicious npm Packages Target Linux Developers with SSH Backdoor Attacks
- 12:34 : The AI market does not understand AI safety
- 12:34 : New Rust Botnet Hijacking Routers to Inject Commands Remotely
- 12:34 : SSL.com Scrambles to Patch Certificate Issuance Vulnerability
- 12:34 : Survey Surfaces Challenges Securing SaaS Applications
- 12:33 : Beyond Firewalls: Why Phishing Demands a People-First, Trust-Centric Response
- 12:33 : PoC exploit for critical Erlang/OTP SSH bug is public (CVE-2025-32433)
- 12:33 : Proofpoint Prime unifies multistage attack protection across digital channels
- 12:4 : Microsoft streicht altem Windows virtualisierungsbasierte Sicherheitsenklaven
- 12:4 : [NEU] [UNGEPATCHT] [mittel] cPanel/WHM: Mehrere Schwachstellen
- 12:4 : [NEU] [mittel] Tenable Security Nessus: Mehrere Schwachstellen
- 12:4 : [NEU] [mittel] Liferay Portal und Liferay DXP: Schwachstelle ermöglicht Cross-Site Scripting
- 12:3 : What Is PAM-as-a-Service (PAMaaS)?
- 12:3 : Open Source Security Firm Hopper Emerges From Stealth With $7.6M in Funding
- 12:3 : Phishers Exploit Google Sites and DKIM Replay to Send Signed Emails, Steal Credentials
- 12:2 : 5 Major Concerns With Employees Using The Browser
- 11:32 : The AI-Powered Reboot: Rethinking Defense for Web Apps and APIs
- 11:32 : AI Ethics, Cybersecurity and Finance: Navigating the Intersection
- 11:32 : Legacy Google Service Abused in Phishing Attacks
- 11:5 : [NEU] [mittel] Proxmox Virtual Environment: Mehrere Schwachstellen
- 11:5 : [NEU] [hoch] PyTorch: Schwachstelle ermöglicht Codeausführung
- 11:5 : [NEU] [hoch] IBM Power Hardware Management Console: Mehrere Schwachstellen
- 11:5 : IT Security News Hourly Summary 2025-04-22 12h : 18 posts
- 11:4 : Microsoft Entra ID Lockouts After MACE App Flags Legit Users
- 11:4 : Magecart Launches New Attack Using Malicious JavaScript to Steal Credit Card Data
- 11:4 : Latest Lumma InfoStealer Variant Found Using Code Flow Obfuscation
- 11:4 : New Rust-Based Botnet Hijacks Routers to Inject Remote Commands
- 11:4 : Most Secure Cloud Storage for Privacy & Protection for 2025
- 11:3 : Privileged Access Management (PAM) Best Practices
- 11:3 : Top 11 Privileged Access Management Software Solutions in 2025
- 11:3 : Microsoft Boosts MSA Signing Service Security on Azure Following Storm-0558 Breach
- 11:3 : Sophisticated WordPress Ad-fraud Plugins Generated 1.4 Billion Ad Requests Per Day
- 11:3 : CISA Warns Threat Hunting Staff to Stop Using Censys & VirusTotal
- 11:3 : UN Researchers Warn That Asian Scam Operations Are Spreading Across the Rest of the World
- 10:35 : [NEU] [mittel] Zyxel Firewall: Mehrere Schwachstellen ermöglichen Privilegieneskalation
- 10:34 : Year in Review: Attacks on identity and MFA
- 10:34 : The Role of SSL Certificates in Website Security and Performance
- 10:34 : Shopify Must Face California Privacy Lawsuit
- 10:34 : FTC Sues Uber Over ‘Deceptive’ Subscription Practices
- 10:34 : Amazon ‘Pauses’ Some Data Centre Leasing Plans
- 10:34 : CATL Introduces ‘Naxtra’ Sodium-Ion Batteries
- 10:34 : Russian Court Says Google Disclosed Data On Ukraine Casualties
- 10:34 : FBI Alerts Public to Scammers Posing as IC3 Officials in Fraud Scheme
- 10:34 : Japan Sounds Alarm Over Hackers Draining Millions from Compromised Trading Accounts
- 10:34 : Two Healthcare Orgs Hit by Ransomware Confirm Data Breaches Impacting Over 100,000
- 10:34 : How to Set Up SPF, DKIM, and DMARC for Customer.io
- 10:34 : The Expand, Enhance, Expire (3E Framework) for Successful Product Innovation
- 10:34 : Morphing Meerkat Phishing Kit: A Deep Dive into Its Threats & Tactics
- 10:34 : COGNNA Adds AI Agents to SOC Platform
- 10:34 : Stellar Cyber boosts security operations with human-augmented Autonomous SOC
- 10:4 : [NEU] [niedrig] libxml2: Schwachstelle ermöglicht Denial of Service
- 10:3 : [NEU] [hoch] Broadcom Fabric OS: Schwachstelle ermöglicht Codeausführung als “root”
- 10:3 : [UPDATE] [mittel] Progress Software MOVEit: Schwachstelle ermöglicht Privilegieneskalation
- 10:2 : Scalllywag Ad Fraud Network Generates 1.4 Billion Bid Requests Daily
- 9:33 : AWS-Kunden gefährdet: Hacker verschlüsseln massenhaft S3-Buckets und fordern BTC
- 9:33 : [NEU] [mittel] Red Hat Enterprise Linux (virtuoso-opensource): Schwachstelle ermöglicht Denial of Service
- 9:33 : [NEU] [hoch] IBM Power Hardware Management Console: Schwachstelle ermöglicht Privilegieneskalation
- 9:33 : [NEU] [mittel] OpenText Enterprise Security Manager: Schwachstelle ermöglicht Darstellen falscher Informationen
- 9:33 : [NEU] [niedrig] IBM Maximo Asset Management: Schwachstelle ermöglicht Offenlegung von Informationen
- 9:32 : CISA Issues Warning Against Using Censys, VirusTotal in Threat Hunting Ops
- 9:32 : Abilene city, Texas, takes systems offline following a cyberattack
- 9:5 : Wie ein Softwareentwickler Social-Media-Infrastruktur ohne Meta und Co. fördern will
- 9:5 : Dieser Nonsens-Begriff erobert die Wissenschaft – Grund ist ein KI-Fehler
- 9:5 : Asus-Router: Sicherheitslücke ermöglicht unbefugtes Ausführen von Funktionen
- 9:5 : Datenleck bei Gravy Analytics: So schützt du deine Standortdaten | Offizieller Blog von Kaspersky
- 9:5 : [UPDATE] [mittel] shadow: Schwachstelle ermöglicht Offenlegung von Informationen
- 9:5 : [UPDATE] [mittel] ImageMagick: Mehrere Schwachstellen
- 9:5 : [UPDATE] [mittel] shadow: Schwachstelle ermöglicht Darstellen falscher Informationen
- 9:5 : [UPDATE] [mittel] jQuery: Mehrere Schwachstellen ermöglichen Cross-Site Scripting
- 9:4 : [UPDATE] [hoch] bzip2: Schwachstelle ermöglicht Ausführen von beliebigem Programmcode mit den Rechten des Dienstes
- 9:3 : Digital Hygiene in Healthcare: Where Cybersecurity Is a Matter of Life and Death
- 9:3 : Latest PCI DSS Standards: Use Third Parties – But at Your Own Risk
- 9:3 : The Cyber War on Democracy: Lessons from the 2024 RNC Email Hack
- 9:3 : HPE Performance Cluster Manager Vulnerability Allow Remote Attacker to Bypass Authentication
- 9:3 : Critical Windows Update Stack Vulnerability Allows Code Execution & Privilege Escalation
- 9:3 : Why CISOs Are Betting Big on AI, Automation & Zero Trust
- 9:3 : Patching Vulnerabilities Faster Reduces Risks & Lower Cyber Risk Index
- 9:3 : $40bn Southeast Asian Scam Sector Growing “Like a Cancer”
- 8:33 : Google Chrome und Microsoft Edge: Mehrere Schwachstellen
- 8:33 : [UPDATE] [kritisch] Erlang/OTP SSH: Schwachstelle ermöglicht Codeausführung
- 8:33 : [UPDATE] [hoch] Google Chrome und Microsoft Edge: Mehrere Schwachstellen
- 8:33 : [UPDATE] [hoch] Ivanti Endpoint Manager: Mehrere Schwachstellen
- 8:33 : [UPDATE] [hoch] Linux Kernel: Mehrere Schwachstellen
- 8:33 : [UPDATE] [mittel] Linux Kernel: Schwachstelle ermöglicht Denial of Service
- 8:32 : Critical Flaw in Windows Update Stack Enables Code Execution and Privilege Escalation
- 8:32 : PoC Released for Critical Unauthenticated Erlang/OTP RCE Vulnerability
- 8:32 : Japan ’s FSA warns of unauthorized trades via stolen credentials from fake security firms’ sites
- 8:32 : Microsoft Secures MSA Signing with Azure Confidential VMs Following Storm-0558 Breach
- 8:5 : IT Security News Hourly Summary 2025-04-22 09h : 3 posts
- 8:4 : WordPress: Angreifer können über Greenshift-Plug-in Schadcode hochladen
- 8:3 : Detecting Multi-Stage Infection Chains Madness
- 8:3 : Fake Certificate Issued for Alibaba Cloud After SSL.com Validation Trick
- 8:3 : WordPress Ad-Fraud Plugins Trigger Massive 1.4 Billion Daily Ad Requests
- 8:3 : The Complete Guide to PAM Tools, Features, and Techniques