210 posts were published in the last hour
- 21:33 : Steuergeld finanziert Angriffe mit Zerodays
- 20:32 : Meta unleashes Llama API running 18x faster than OpenAI: Cerebras partnership delivers 2,600 tokens per second
- 20:32 : BSidesLV24 – Ground Truth – Reassessing 50k Vulnerabilities: Insights From SSVC Evaluations In Japan’s Largest Telco
- 20:5 : IT Security News Hourly Summary 2025-04-29 21h : 5 posts
- 20:2 : RSAC Conference 2025
- 20:2 : SentinelOne warns of threat actors targeting its systems and high-value clients
- 19:2 : Watch out for any Linux malware sneakily evading syscall-watching antivirus
- 18:33 : Common Tool Errors – Kerberos
- 18:33 : Cyber Espionage Campaign Targets Uyghur Exiles with Trojanized Language Software
- 18:33 : Researchers Uncover SuperShell Payloads and Various Tools in Hacker’s Open Directories
- 18:33 : 44% of the zero-days exploited in 2024 were in enterprise solutions
- 18:3 : Scattered Spider Suspected in Major M&S Cyberattack
- 18:3 : CISA Adds One Known Exploited Vulnerability to Catalog
- 18:3 : Proofpoint Leverages AI to Extend Scope of Cybersecurity Reach
- 18:3 : Don’t Delete Spam Emails Too Quickly — Here’s Why
- 18:3 : New Reports Uncover Jailbreaks, Unsafe Code, and Data Theft Risks in Leading AI Systems
- 18:3 : WhatsApp Launches Private Processing to Enable AI Features While Protecting Message Privacy
- 17:33 : 20.5 Million DDoS Barrage Shattered Records Leading Attack Fired Off 4.8 Billion Packets
- 17:33 : New Gremlin Stealer Advertised on Hacker Forums Targets Credit Card Data and Login Credentials
- 17:33 : Google Reports 75 Zero-Day Vulnerabilities Actively Exploited in the Wild
- 17:32 : Outlaw Cybergang Launches Global Attacks on Linux Environments with New Malware
- 17:32 : Konni APT Deploys Multi-Stage Malware in Targeted Organizational Attacks
- 17:32 : WhatsApp Is Walking a Tightrope Between AI Features and Privacy
- 17:32 : Enterprise tech dominates zero-day exploits with no signs of slowdown
- 17:32 : Are Puppies the New Booth Babes: What Do You Think?
- 17:5 : IT Security News Hourly Summary 2025-04-29 18h : 11 posts
- 17:3 : Apple AirPlay: Sicherheitsforscher warnen vor gravierenden Lücken
- 17:3 : GPUAF: Two Methods to Root Qualcomm-Based Android Phones
- 17:3 : Verizon 2025 Report Highlights Surge in Cyberattacks Through Third Parties
- 17:3 : Delta Electronics ISPSoft
- 17:2 : Rockwell Automation ThinManager
- 17:2 : CISA Releases Three Industrial Control Systems Advisories
- 16:34 : Effizienz neu gedacht: Die kostenlose Timetracking-App Timescribe im Test
- 16:34 : Recall in Windows 11: Verfolgt mein Computer jetzt alles, was ich tue?
- 16:34 : Reddit-User wurden ungefragt Teil eines KI-Experiments
- 16:34 : Beim Jugendschutz versagt? Meta schränkt KI-Chatbot nach Sex-Chat-Vorwürfen ein
- 16:34 : Schwere Lücken in AirPlay: Apple patcht, andere Geräte wohl weiter angreifbar
- 16:34 : Anzeige: Schutz vor Cyberangriffen mit Microsoft Defender
- 16:33 : Wordfence: The World’s Leading Quality WordPress Vulnerability Intelligence Provider
- 16:32 : Google Wallet brings digital IDs to more states – how to add yours
- 16:32 : NVIDIA Riva Vulnerabilities Exposes Enable Authorized Access to Cloud Environments
- 16:32 : How Healthcare Providers Investigate And Prevent Cyber Attacks: Real-world Examples
- 16:32 : How do You Know if You’re Ready for a Red Team Partnership?
- 16:32 : Introducing Mend’s Integration with Microsoft Defender for Cloud
- 16:3 : Insider Threat alert as Cybersecurity firm CEO plants malware into hospital network
- 16:3 : SecAI Debuts at RSA 2025, Redefining Threat Investigation with AI
- 16:3 : SentinelOne’s Purple AI Athena Brings Autonomous Decision-Making to the SOC
- 16:3 : Microsoft announces the 2025 Security Excellence Awards winners
- 16:2 : New WordPress Malware Masquerades as Plugin
- 15:32 : More Scans for SMS Gateways and APIs, (Tue, Apr 29th)
- 15:32 : The Transformative Power of Artificial Intelligence in Cloud Security
- 15:32 : Indian court orders blocking of Proton Mail
- 15:32 : China now America’s number one cyber threat – US must get up to speed
- 15:32 : Scientists Warn of Cybersecurity Threats in Next-Gen DNA Sequencing
- 15:32 : Google Ends Privacy Sandbox, Keeps Third-Party Cookies in Chrome
- 15:4 : Elektronische Patientenakte: Hochlaufphase der ePA bundesweit gestartet
- 15:3 : 6 Best CMMC Consulting Services for Small Businesses
- 15:3 : AirPlay Zero-Click RCE Vulnerability Enables Remote Device Takeover via Wi-Fi
- 15:3 : CISA Adds Broadcom Brocade Fabric OS Vulnerability to Known Exploited Vulnerabilities Catalog
- 15:3 : China’s Secret Weapon? How EV Batteries Could be Weaponized to Disrupt America
- 15:3 : HPE Extends Scope of Cybersecurity Reach Across Multiple Platforms
- 15:3 : Phorpiex Botnet Delivers LockBit Ransomware with Automated Tactics
- 14:32 : Akamai Firewall for AI: Get Powerful Protection for New LLM App Threats
- 14:32 : Digital rampage saw ex-Disney employee remove nut allergy info from menus, dox co-workers, and more
- 14:32 : SentinelOne Uncovers Chinese Espionage Campaign Targeting Its Infrastructure and Clients
- 14:5 : IT Security News Hourly Summary 2025-04-29 15h : 12 posts
- 14:3 : Elevating MSSP Managed Security Services with Managed Detection and Response (MDR)
- 14:3 : The 5 Best VPNs for Amazon Fire Stick in 2025
- 14:3 : OpenBSD 7.7 Released with Significant Performance & Security Enhancements
- 14:3 : Google Warns of 75 Zero-Day Vulnerabilities Exploited in the Wild
- 14:3 : Europol Creates Operational Taskforce to Tackle Violence-as-a-Service
- 14:3 : Google Chrome Vulnerability Let Attackers Escape Payload from Sandbox – Technical Details Disclosed
- 14:3 : Fraudulent email domain tracker: April 2025
- 14:3 : Bitwarden Access Intelligence defends against credential risks and phishing
- 14:3 : New Gremlin Infostealer Distributed on Telegram
- 13:33 : Krisenkommunikation: Litfaßsäule 4.0 warnt Darmstädter
- 13:32 : Blinded from Above: How Relentless Cyber-Attacks Are Knocking Satellites Out of Sight
- 13:32 : What is an automation architect?
- 13:32 : Infosec pros tell Trump to quit bullying Chris Krebs – it’s undermining security
- 13:32 : Investigating the Role of DarkStorm Team in the Recent X Outage
- 13:32 : ExtraHop strenghtens network detection and response
- 13:6 : Docker: Rechteausweitungslücke in Desktop für Windows
- 13:6 : Hauptstadtportal berlin.de nach DDoS-Attacke wieder online
- 13:6 : Nordkoreanische Fake-ITler: “Wie dick ist Kim Jong-un?”
- 13:4 : Threat Actors Accelerate Transition from Reconnaissance to Compromise – New Report Finds
- 13:4 : Google Chrome Vulnerability Allows Attackers to Bypass Sandbox Restrictions – Technical Details Revealed
- 13:4 : Millions of Apple Airplay-Enabled Devices Can Be Hacked via Wi-Fi
- 13:4 : Google Threat Intelligence Group (GTIG) tracked 75 actively exploited zero-day flaws in 2024
- 13:4 : Hackers Actively Attacking Git Configuration Files From 4,800+ IP’s
- 13:4 : 20.5 Million DDoS Attacks, With One Exceeding 4.8 Billion Packets
- 13:4 : Tsunami Malware Actively Attacking Users Incorporates With Miners & Credential Stealers
- 13:4 : JokerOTP Platform With 28,000+ Phishing Attacks Dismantled
- 13:4 : Windows Server 2025 Hotpatching Service to be Rolled Out From July 1st, 2025
- 13:3 : Pistachio Raises $7 Million for Cybersecurity Training Platform
- 13:3 : CISA warns about actively exploited Broadcom, Commvault vulnerabilities
- 12:32 : LayerX Raises $11 Million for Browser Security Solution
- 12:3 : [NEU] [hoch] Redmine.org Redmine: Mehrere Schwachstellen
- 12:3 : China is using AI to sharpen every link in its attack chain, FBI warns
- 12:3 : Cybersecurity Firms Raise Over $1.7 Billion Ahead of RSA Conference 2025
- 12:2 : Google Reports 75 Zero-Days Exploited in 2024 — 44% Targeted Enterprise Security Products
- 12:2 : Product Walkthrough: Securing Microsoft Copilot with Reco
- 11:34 : Strafverfolger hackten offensichtlich den Cybercrime-Marktplatz BreachForums
- 11:34 : Attackierte SAP-Lücke: Hunderte verwundbare Server im Netz
- 11:34 : Behobener Bricking-Bug auf dem iPhone: “Eine Zeile Code” soll gereicht haben
- 11:34 : Seiko-Epson-Druckertreiber ermöglicht Rechteausweitung auf System
- 11:33 : Kritik an elektronischer Patientenakte wird lauter
- 11:33 : Europol Launches Taskforce to Combat Violence-as-a-Service Networks
- 11:32 : ResolverRAT Targets Healthcare and Pharmaceutical Sectors Through Sophisticated Phishing Attacks
- 11:32 : Applying Security Engineering to Prompt Injection Security
- 11:32 : What privacy? Perplexity wants your data, builds browser to track you and serve ads
- 11:32 : Google Tracked 75 Zero-Days in 2024
- 11:32 : Marks & Spencer cyber incident linked to ransomware group
- 11:32 : Infostealers Harvest Over 30,000 Australian Banking Credentials
- 11:5 : IT Security News Hourly Summary 2025-04-29 12h : 7 posts
- 11:4 : Cloudflare Report: Deutschland das am häufigsten per DDoS attackierte Land
- 11:4 : [NEU] [mittel] Apache Tomcat: Mehrere Schwachstellen
- 11:4 : [NEU] [mittel] Docker Desktop: Schwachstelle ermöglicht Privilegieneskalation
- 11:4 : [NEU] [mittel] Dell Computer: Mehrere Schwachstellen ermöglichen nicht spezifizierte Angriffe
- 11:3 : How safe and secure is your iPhone really?
- 11:3 : VeriSource data breach impacted 4M individuals
- 11:3 : NIS2 Compliance | Challenges, Pain Points and Solutions
- 11:3 : When Satellites Go Dark – Persistent Cyber Assaults and The Growing Blind Spot
- 11:3 : RSA Conference 2025 – Announcements Summary (Day 1)
- 11:3 : Phishing 3.0: Trust, Deepfakes, and Why Your Inbox Might Betray You
- 11:3 : Dummy Title
- 10:33 : Dell Computer: Mehrere Schwachstellen ermöglichen nicht spezifizierte Angriffe
- 10:33 : Mythen und Fakten: Der wahre Einfluss von KI auf deine Unternehmenssicherheit
- 10:33 : Alibaba veröffentlicht Qwen 3: Das kann das neue KI-Spitzenmodell aus China
- 10:33 : KI-Halluzinationen erkennen: Diese Ansätze gibt es
- 10:33 : Endlich auch in Whatsapp Web: Diese beliebte Funktion des Messengers gibt es bald im Browser
- 10:32 : Gremlin Stealer: New Stealer on Sale in Underground Forum
- 10:32 : Hello 0-Days, My Old Friend: A 2024 Zero-Day Exploitation Analysis
- 10:32 : Outlaw cybergang attacking targets worldwide
- 10:32 : Exploited Vulnerability Exposes Over 400 SAP NetWeaver Servers to Attacks
- 10:2 : Year in Review: AI based threats
- 10:2 : Government hackers are leading the use of attributed zero-days, Google says
- 10:2 : Zero-Day Exploitation Figure Surges 19% in Two Years
- 9:33 : [NEU] [mittel] Fortra GoAnywhere MFT: Mehrere Schwachstellen
- 9:32 : Private Equity Firms ‘Circle’ NCC Group’s Escode
- 9:32 : Amazon Sellers ‘Pull Back’ From Prime Day Over Tariffs
- 9:32 : The one interview question that will protect you from North Korean fake workers
- 9:4 : Panne bei Wartungsarbeiten: Techniker von Oracle legen IT von 45 Kliniken lahm
- 9:3 : JokerOTP Platform Linked to 28,000+ Phishing Attacks Dismantled
- 9:3 : Critical Linux Kernel Vulnerability Exposes Systems to Privilege Escalation Attacks
- 9:3 : ResolverRAT Attacking Healthcare and Pharmaceutical Via Sophisticated Phishing Attacks
- 9:3 : CISA Warns of Exploited Broadcom, Commvault Vulnerabilities
- 9:3 : Huntress upgrades Managed ITDR to disrupt hacker tradecraft
- 9:3 : Varonis AI Shield helps employees use AI without putting data at risk
- 9:3 : Aqua Security unveils Secure AI for protecting workloads from code to cloud
- 9:3 : Europol Creates “Violence-as-a-Service” Taskforce
- 8:33 : [UPDATE] [hoch] Commvault Backup & Recovery: Schwachstelle ermöglicht Codeausführung
- 8:33 : [UPDATE] [hoch] Broadcom Fabric OS: Schwachstelle ermöglicht Codeausführung als “root”
- 8:33 : [UPDATE] [hoch] Apple macOS: Mehrere Schwachstellen
- 8:33 : [UPDATE] [hoch] Apple iOS und iPadOS: Mehrere Schwachstellen
- 8:33 : [UPDATE] [hoch] Linux Kernel: Mehrere Schwachstellen
- 8:32 : Huawei ‘To Begin Testing’ Next-Gen AI Chip Ascend 910D
- 8:32 : Pegatron ‘Continuing’ Manufacturing Plans Despite Tariffs
- 8:32 : Windows Server 2025 Gets Hotpatching Support Beginning July 1, 2025
- 8:32 : Bugcrowd enables organizations to test their security environments
- 8:9 : Ex-Mitarbeiter übt Rache: Drei Jahre Haft für manipulierte Disney-Speisekarten
- 8:7 : The Growing Threat of Ransomware to the Manufacturing Sector
- 8:7 : Ransomware Attacks on Critical Infrastructure Surge, Reports FBI
- 8:7 : U.S. CISA adds Qualitia Active! Mail, Broadcom Brocade Fabric OS, and Commvault Web Server flaws to its Known Exploited Vulnerabilities catalog
- 8:7 : Researchers Uncovered SuperShell Payloads & Multiple Tools From Hacker’s Open Directories
- 8:7 : Netwrix boosts identity and data security for Microsoft environments
- 8:7 : Arctic Wolf launches Cipher to enhance security investigations with AI insights
- 8:5 : IT Security News Hourly Summary 2025-04-29 09h : 11 posts
- 7:34 : Kostengünstiger Schutz gegen Quantenangriffe?
- 7:34 : Wachstum und Innovation: Sicherheitstechnik im Wandel
- 7:33 : DeepMind UK Staff ‘Seek Unionisation’ To Challenge Military Deals
- 7:33 : Critical Linux Kernel Flaw (CVE-2025-21756) Allows Privilege Escalation
- 7:33 : Lumu SecOps Platform allows teams to unify their entire security stack
- 7:33 : Oasis NHI Provisioning automates the provisioning of NHIs and their credentials
- 7:32 : Uyghur software malware, DDoS jumps, 4chan back
- 7:3 : Apache Tomcat Vulnerability Let Attackers Bypass Rules & Trigger DoS Condition
- 7:3 : Swiss boffins admit to secretly posting AI-penned posts to Reddit in the name of science
- 7:3 : Desired Effect Marketplace: Researchers Get Their Due, Defenders Get Realtime Info on Zero Days
- 7:2 : Eyes, ears, and now arms: IoT is alive
- 6:36 : Partnerangebot: TTS Trusted Technologies and Solutions GmbH – TTS Anwenderforum
- 6:36 : Partnerangebot: IT-Grundschutz-Seminar: BCM-Praktiker nach 200-4
- 6:33 : Behavioural economics of enterprise password management
- 6:33 : Futureproofing Enterprise Cloud Security: Navigating Cloud Key Management Complexity
- 6:33 : What’s worth automating in cyber hygiene, and what’s not
- 6:33 : Sumo Logic unveils innovations across AI, automation, and threat intelligence
- 6:33 : Malware Attack Targets World Uyghur Congress Leaders via Trojanized UyghurEdit++ Tool
- 6:3 : Akira Ransomware attack on Hitachi Vantara Servers
- 6:3 : What is Slopsquatting and is it a New Emerging Cyber Threat?
- 6:3 : Massive Attack: 4,800+ IPs Used to Target Git Configuration Files
- 6:2 : Why B2B Leaders Must Rethink Cybersecurity Strategies With AI at the Core
- 5:32 : CISA Issues Warning on Commvault Web Server Flaw Exploited in the Wild
- 5:32 : CISA Adds Broadcom Brocade Fabric OS Flaw to Known Exploited Vulnerabilities List
- 5:32 : DDoS attacks jump 358% compared to last year
- 5:32 : Want faster products and stronger trust? Build security in, not bolt it on
- 5:32 : ⚡ Weekly Recap: Critical SAP Exploit, AI-Powered Phishing, Major Breaches, New CVEs & More
- 5:32 : CISA Adds Actively Exploited Broadcom and Commvault Flaws to KEV Database
- 5:5 : IT Security News Hourly Summary 2025-04-29 06h : 4 posts
- 5:2 : Compliance Challenges in Cloud Data Governance
- 5:2 : ⚡ Weekly Recap: Critical SAP Exploit, AI-Powered Phishing, Major Breaches, New CVEs & More
- 4:32 : Cybersecurity jobs available right now: April 29, 2025
- 4:32 : Hopper Security emerges from stealth to fix open-source security problems
- 4:32 : Investing in security? It’s not helping you fix what matters faster
- 4:32 : ⚡ Weekly Recap: Critical SAP Exploit, AI-Powered Phishing, Major Breaches, New CVEs & More
- 4:2 : RSA Conference Dispatch: Mr. NHI – Leading the Movement to Expose Cybersecurity’s Biggest Blind Spot!
- 4:2 : ⚡ Weekly Recap: Critical SAP Exploit, AI-Powered Phishing, Major Breaches, New CVEs & More
- 3:32 : Open source text editor poisoned with malware to target Uyghur users
- 3:32 : ⚡ Weekly Recap: Critical SAP Exploit, AI-Powered Phishing, Major Breaches, New CVEs & More
- 3:3 : MIWIC25: Caroline Kamper, Strategic Cyber Threat Intelligence Analyst, SecAlliance
- 3:3 : CIOs Say Security Systems Not Delivering Value For Money, Too Complex To Manage
- 3:3 : Organisations Unprepared For Age of Quantum Computing
- 3:3 : Huntress Unveils Enhanced Identity Threat Detection & Response Solution as New Research Warns of Rising Identity-Based Attacks