210 posts were published in the last hour
- 22:55 : IT Security News Daily Summary 2025-05-18
- 20:5 : IT Security News Hourly Summary 2025-05-18 21h : 2 posts
- 19:7 : Ex-NSA bad-guy hunter listened to Scattered Spider’s fake help-desk calls: ‘Those guys are good’
- 18:32 : BSidesLV24 – GroundFloor – Discover The Hidden Vulnerability Intelligence Within CISA’s KEV Catalog
- 18:12 : Russia-Linked SpyPress Malware Exploits Webmails to Spy on Ukraine
- 17:7 : Datenschutz-Upgrade bei macOS 16: So stoppt Apple heimliche Zwischenablage-Leser
- 17:7 : KI im Kontrollverlust: Warum ein Getränkeautomaten-Agent nach 3 Wochen das FBI ruft
- 17:7 : KI-Hintergründe in Google Meet: So peppst du deine Meetings mit Gemini auf
- 17:7 : KI-Agenten ohne Coding-Skills erstellen? Wir haben Langflow ausprobiert
- 17:7 : KI im Visier von Cyberkriminellen: Wie Unternehmen sich schützen können
- 17:5 : FBI Warns of AI Voice Scams Impersonating US Govt Officials
- 14:35 : Google to Pay Texas $1.4 Billion For Collecting Personal Data
- 14:35 : Child Abuse Detection Efforts Face Setbacks Due to End-to-End Encryption
- 14:35 : India Faces Cyber Onslaught After Operation Sindoor Military Strikes
- 14:5 : IT Security News Hourly Summary 2025-05-18 15h : 1 posts
- 13:9 : SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 45
- 12:33 : Fairfax County, Va., CISO Michael Dent on Leadership
- 12:4 : Security Affairs newsletter Round 524 by Pierluigi Paganini – INTERNATIONAL EDITION
- 11:32 : How the Signal Knockoff App TeleMessage Got Hacked in 20 Minutes
- 11:7 : Von Herzchen zu Energie: Duolingos neuester Trick für mehr Motivation
- 11:7 : Vision Pro trifft Matrix3D: Apple öffnet das Tor zur Zukunft der Fotogrammetrie
- 11:7 : Bewegte Fotos dank KI: Was Tiktoks neue Funktion kann – und wo der Haken liegt
- 10:7 : Experts found rogue devices, including hidden cellular radios, in Chinese-made power inverters used worldwide
- 8:6 : Week in review: Microsoft patches 5 actively exploited 0-days, recently fixed Chrome vulnerability exploited
- 8:5 : IT Security News Hourly Summary 2025-05-18 09h : 1 posts
- 7:39 : Auszeichnung für Zusammenarbeit mit OWL Cyber Defense
- 6:33 : PupkinStealer Attacks Windows System to Steal Login Credentials & Desktop Files
- 1:31 : This Free Tool Helps You Find Out if Your Personal Information Is Exposed Online
- 23:5 : Gen Z: 42 Prozent kennen ihre eigene Mobilnummer nicht auswendig
- 23:5 : Wenn Chatbots Fantasie statt Fakten liefern: Warum knappe Antworten zu KI-Halluzinationen führen
- 23:5 : IT Security News Hourly Summary 2025-05-18 00h : 3 posts
- 23:5 : KI-Kompetenz auf dem Prüfstand: Warum Deutschland den Anschluss verliert
- 23:4 : Prime Air: Hat diese Sparmaßnahme Drohnen abstürzen lassen?
- 23:4 : Ensuring Satisfaction in Managing Non-Human Identities
- 23:3 : Are You Capable of Securing Your Digital Assets?
- 22:55 : IT Security News Daily Summary 2025-05-17
- 22:2 : Malware Defense 101 – Identifying and Removing Modern Threats
- 21:9 : OAuth 2.0 Overview
- 20:7 : AI Security Frameworks – Ensuring Trust in Machine Learning
- 20:5 : IT Security News Hourly Summary 2025-05-17 21h : 1 posts
- 19:4 : The Coinbase Data Breach: A Breakdown of What Went Wrong
- 17:32 : Preventing Phishing Attacks on Cryptocurrency Exchanges
- 17:8 : Schummeln 2.0: Warum ChatGPT Professoren in den Wahnsinn treibt
- 17:8 : Selbstzerstörung per Update: Diese Cyber-Waffe macht Botnetze unschädlich
- 17:8 : iOS-Bug: Warum Ben & Jerry’s deine Sprachnachricht ins Nirvana schickt
- 17:7 : Lebenslanges ChatGPT-Abo: Ein Schnäppchen oder digitaler Wahnsinn?
- 17:7 : US Government officials targeted with texts and AI-generated deepfake voice messages impersonating senior U.S. officials
- 17:6 : Compromised npm Package ‘rand-user-agent’ Used to Spread Remote Access Trojan
- 17:5 : IT Security News Hourly Summary 2025-05-17 18h : 4 posts
- 16:32 : Anzeige: So bringen Unternehmen KI und Datenschutz unter einen Hut
- 16:2 : Boffins devise technique that lets users prove location without giving it away
- 16:2 : FBI Warns Consumers to Replace Outdated Routers Hijacked by TheMoon Malware
- 16:2 : LockBit Ransomware Platform Breached Again, Ops Data Leaked
- 15:32 : BSidesLV24 – GroundFloor – Adversaries Also Lift & Shift: Cloud Threats Through The Eyes Of An Adversary
- 15:4 : Adversarial Machine Learning – Securing AI Models
- 14:31 : Coinbase Data Breach: Customer Data Compromised Through Insider Threat
- 14:5 : IT Security News Hourly Summary 2025-05-17 15h : 3 posts
- 14:2 : Shields up US retailers. Scattered Spider threat actors can target them
- 14:2 : Critical WordPress Plugin Vulnerability Exposes 10K+ Sites to Cyber Attack
- 14:2 : 10 Best NGINX Monitoring Tools – 2025
- 12:32 : New Ransomware Attack Mocking Elon Musk Supporters Using PowerShell to Deploy Payloads
- 12:32 : Blockchain Security – Protecting Decentralized Systems
- 12:32 : Sophisticated NPM Attack Exploits Google Calendar C2 For Sophisticated Communication
- 12:2 : VMware ESXi, Firefox, Red Hat Linux & SharePoint Hacked – Pwn2Own Day 2
- 12:2 : Critical Intel CPU Vulnerabilities Uncovered: Memory Leaks and Spectre v2 Exploitation
- 11:32 : AI-Powered Cyber Threats – Building Resilient Defenses
- 11:32 : Guide to Cloud API Security – Preventing Token Abuse
- 11:32 : Printer Company Offered Malicious Drivers Infected With XRed Malware
- 11:5 : IT Security News Hourly Summary 2025-05-17 12h : 2 posts
- 11:3 : LegoGPT: Der KI-Zauberer, der aus simplen Ideen Bauanleitungen zaubert
- 11:3 : Von Gaming bis Robotik: Diese drei Themen machen Nvidias Computex-Keynote zum Pflichttermin
- 11:2 : Coinbase Will Reimburse Customers Up to $400 Million After Data Breach
- 10:4 : New FrigidStealer Malware Attacking macOS Users to Steal Login Credentials
- 9:31 : xorsearch.py: Python Functions, (Sat, May 17th)
- 9:2 : U.S. CISA adds Google Chromium, DrayTek routers, and SAP NetWeaver flaws to its Known Exploited Vulnerabilities catalog
- 8:32 : Cloud Security Essentials – Protecting Multi-Cloud Environments
- 8:32 : Google Now Scans Screenshots to Identify Geographic Locations
- 8:2 : Beware! A threat actor could steal the titles of your private (and draft) WordPress posts!
- 7:6 : The Monthly Cybersecurity Review: Data Breaches, Ransomware, and Critical Infrastructure
- 6:4 : Securing Generative AI – Mitigating Data Leakage Risks
- 5:32 : Beyond the hype: The hidden security risks of AI agents and MCP
- 5:7 : Streaming-Chaos: Was passiert, wenn dein Netflix-Passwort viral geht?
- 5:5 : IT Security News Hourly Summary 2025-05-17 06h : 2 posts
- 3:38 : APT Group 123 Actively Attacking Windows Systems to Deliver Malicious Payloads
- 3:38 : VMware ESXi, Firefox, Red Hat Linux & SharePoint 0-Day Vulnerabilities Exploited – Pwn2Own Day 2
- 2:31 : Why Microsoft Says DeepSeek Is Too Dangerous to Use
- 2:5 : IT Security News Hourly Summary 2025-05-17 03h : 1 posts
- 0:31 : Security Theater REALized and Flying without REAL ID
- 0:4 : Fired US govt workers, Uncle Xi wants you! – to apply for this fake consulting gig
- 23:32 : Standing Up for LGBTQ+ Digital Safety this International Day Against Homophobia
- 23:8 : Lokale KI: Google bringt On-Device-Gemini auf Android-Smartphones
- 23:7 : HubSpot vs Salesforce: Which CRM Fits Your Business?
- 23:7 : America’s consumer watchdog drops leash on proposed data broker crackdown
- 23:6 : Coinbase Hacked and Turns the Tables on the Cybercriminals!
- 23:5 : IT Security News Hourly Summary 2025-05-17 00h : 7 posts
- 22:55 : IT Security News Daily Summary 2025-05-16
- 22:32 : UK Supermarket Avoided Ransomware Because ‘They Yanked Their Own Plug,’ Hackers Say
- 22:4 : Endpoint Security Controls: Designing a Secure Endpoint Architecture, Part 2
- 22:4 : News brief: Patch critical SAP, Samsung and chat app flaws now
- 21:33 : Week in Review: Hackers pump stocks, Microsoft stops screenshots, AI encrypts cybersecurity
- 21:5 : Shrink exploit windows, slash MTTP: Why ring deployment is now a must for enterprise defense
- 21:5 : Pwn2Own Berlin 2025 Day Two: researcher earned 150K hacking VMware ESXi
- 21:5 : House Moves Forward With Dangerous Proposal Targeting Nonprofits
- 20:32 : US man who hacked SEC’s X account to spike Bitcoin price sentenced to prison
- 20:5 : IT Security News Hourly Summary 2025-05-16 21h : 5 posts
- 20:2 : New botnet HTTPBot targets gaming and tech industries with surgical attacks
- 19:32 : Pwn2Own Berlin 2025: Windows 11, VMware, Firefox and Others Hacked
- 19:32 : Secure by Design: Modernizing Authentication With Centralized Access and Adaptive Signals
- 18:32 : Trump Has A “Little Problem” With Apple’s Tim Cook
- 18:32 : AWS Boss Calls For UK To Increase Nuclear Power – Report
- 18:32 : macOS Gatekeeper Explained – Strengthening System Defenses
- 18:32 : Hands-on Malware Analysis Training to Boost Up SOC & MSSP Teams
- 18:32 : Orca Security Acquires Opus to Gain AI Agent Orchestration Technology
- 17:32 : Threat Group Assessment: Muddled Libra (Updated May 16, 2025)
- 17:32 : Sophisticated NPM Attack Leverages Google Calendar2 for Advanced Communication
- 17:32 : Critical WordPress Plugin Flaw Puts Over 10,000 Sites of Cyberattack
- 17:5 : IT Security News Hourly Summary 2025-05-16 18h : 12 posts
- 17:4 : Studentin erwischt Professor mit KI-Text – und verlangt ihr Geld zurück
- 17:4 : NotebookLM getestet: Googles Notizen-App mit Macken
- 17:4 : Künstliche Intelligenz statt Hausarzt: Chinesisches Startup erprobt KI-Klinik in Saudi-Arabien
- 17:4 : Erschreckend? KI-Agenten geben sich eigene soziale Normen
- 17:3 : Ivanti EPMM Hit by Two Actively Exploited 0day Vulnerabilities
- 17:3 : Chinese Agent Impersonate as Stanford Student For Intelligence Gathering
- 17:3 : Printer Company Distributes Malicious Drivers Infected with XRed Malware
- 17:3 : New Ransomware Attack Targets Elon Musk Supporters Using PowerShell to Deploy Payloads
- 17:2 : Details of 1.1 Million Job Applicants Leaked by a Major Recruitment Platform
- 16:33 : Anzeige: Stabile Netzwerke professionell planen und absichern
- 16:33 : Gerichtsurteil: Google übertreibt es bei der Einwilligung
- 16:32 : The best Bluetooth trackers of 2025: Expert tested
- 16:5 : Zweiter Tag der Pwn2Own Berlin: Sandkistenausbrüche und KI-Exploits
- 16:5 : Ransomware attacks on education sector go unreported for months
- 16:5 : Pro-Ukraine Group Targets Russian Developers with Python Backdoor
- 16:5 : Linux Kernel Patching and Preventing Exploits in 2025
- 16:5 : SSH Auth Keys Reuse Exposes Sophisticated Targeted Phishing Attack
- 15:32 : Defamation case against DEF CON terminated with prejudice
- 15:32 : Coinbase Rejects $20M Ransom After Insider Data Leak, Faces Up to $400M in Fallout
- 15:32 : Ransomware Roundup – VanHelsing
- 15:32 : Coordinated Action Targets DDoS-for-Hire Empire with Arrests and Seizures
- 15:32 : Agentic AI Is Reshaping Cybersecurity Careers, Not Replacing Them
- 15:5 : Unit 42 Develops Agentic AI Attack Framework
- 15:5 : FBI Warns of US Govt Officials Impersonated in Malicious Message Campaign
- 15:5 : Malware Mastermind Andrei Tarasov Evades US Extradition Returns to Russia
- 15:5 : Chinese Agent Impersonates as Stanford Student For Intelligence Gathering
- 15:5 : New Vulnerability Affects All Intel Processors From The Last 6 Years
- 15:5 : Google Warns UK Retailer Hackers Now Targeting US
- 14:32 : RSAC Conference 2025
- 14:32 : In Other News: Hackers Not Behind Blackout, CISO Docuseries, Dior Data Breach
- 14:6 : Amazon Axes Jobs At Devices, Services Group – Again
- 14:5 : Windows 10 KB5058379 Update Causes PCs to Enter Recovery Mode and Prompt for BitLocker Key
- 14:5 : Communications Backdoor in Chinese Power Inverters
- 14:5 : Hackers Actively Exploiting PowerShell to Evade Antivirus & EDR
- 14:5 : Hackers Attacking Industrial Automation Systems With 11,600+ Malware Families
- 14:5 : Windows 10 KB5058379 Update Boots PCs into Windows Recovery
- 14:5 : Windows Security Updates – How to Stay Ahead of Vulnerabilities
- 14:5 : Multiple Ivanti Endpoint Mobile Manager Vulnerabilities Allows Remote Code Execution
- 14:5 : Broadcom employee data stolen by ransomware crooks following hit on payroll provider
- 14:5 : IT Security News Hourly Summary 2025-05-16 15h : 11 posts
- 13:32 : Prävention – Effektiv schützen vor Einbrüchen
- 13:32 : Smart Networks, Smarter Threats: Securing Telecoms in the Age of AI and Critical Infrastructure
- 13:6 : Digitalminister Wildberger: “Ich habe auch mal Software entwickelt”
- 13:5 : Cybercriminal Andrei Tarasov Escapes US Extradition, Returns to Russia
- 13:5 : Coinbase Says Breach May Cost $400 Million, Issues $20 Million Bounty
- 13:4 : Linux Foundation Shares Framework for Building Effective Cybersecurity Teams
- 12:32 : Operation RoundPress
- 12:32 : Sednit abuses XSS flaws to hit gov’t entities, defense companies
- 12:32 : Is it Illegal to Listen to a Podcast or Watch a Movie Online?
- 12:7 : Cybersecurity for Mergers and Acquisitions – A CISO’s Guide
- 12:7 : Meta sent cease and desist letter over AI training
- 12:7 : Data broker protection rule quietly withdrawn by CFPB
- 12:7 : New HTTPBot Botnet Launches 200+ Precision DDoS Attacks on Gaming and Tech Sectors
- 12:7 : US Officials Impersonated Via SMS and Voice Deepfakes
- 11:32 : APT Group 123 Targets Windows Systems in Ongoing Malicious Payload Campaign
- 11:32 : Frigidstealer Malware Targets macOS Users to Harvest Login Credentials
- 11:32 : FBI Alerts Public to Malicious Campaign Impersonating US Government Officials
- 11:32 : Good luck to Atos’ 7th CEO and its latest biz transformation
- 11:10 : Ohne Gesichtserkennung: Neue Video-Überwachungstools in den USA tracken andere Merkmale
- 11:10 : Sam Altman will, dass sich ChatGPT an dein ganzes Leben erinnert
- 11:10 : BSI warnt: Kritische Sicherheitslücke betrifft alle Windows-Versionen
- 11:10 : Ukraine: Millionen russischer Gerichtsakten bei Cyberangriff gelöscht
- 11:10 : [NEU] [UNGEPATCHT] [hoch] ESRI ArcGIS: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen
- 11:10 : [NEU] [hoch] Google Cloud Platform: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen
- 11:8 : DarkCloud Stealer: Comprehensive Analysis of a New Attack Chain That Employs AutoIt
- 11:8 : Hackers Now Targeting US Retailers After UK Attacks, Google
- 11:8 : Ivanti Endpoint Manager Vulnerabilities Allow Unauthenticated Remote Code Execution
- 11:8 : SSH Auth Key Reuse Uncovers Advanced Targeted Phishing Campaign
- 11:8 : Meta plans to train AI on EU user data from May 27 without consent
- 11:8 : From 60 to 4,000: NATO’s Locked Shields Reflects Cyber Defense Growth
- 11:7 : Cranium introduces AI red teaming platform
- 11:7 : CISA: Recently fixed Chrome vulnerability exploited in the wild (CVE-2025-4664)
- 11:7 : Top 10 Best Practices for Effective Data Protection
- 11:7 : UK Cyber Vacancies Growing 12% Per Year
- 11:5 : IT Security News Hourly Summary 2025-05-16 12h : 24 posts
- 10:33 : Rechtsextremismus: Wer hört bei der AfD künftig mit?
- 10:33 : [NEU] [mittel] Nextcloud: Mehrere Schwachstellen
- 10:33 : [NEU] [hoch] Netgate pfSense: Mehrere Schwachstellen
- 10:33 : [UPDATE] [mittel] Hitachi Ops Center: Mehrere Schwachstellen
- 10:32 : Jenkins Released Security Updates – Multiple Vulnerabilities Fixed That Allow Attackers to Exploit CI/CD Pipelines
- 10:32 : Salt Security Partners With Wiz, Combines Cloud and API Security
- 10:32 : Mitigating macOS Zero-Day Risks – Tools and Techniques
- 10:32 : Russian APT Exploiting Mail Servers Against Government, Defense Organizations
- 10:32 : Russian Espionage Operation Targets Organizations Linked to Ukraine War
- 10:5 : Vorratsdatenspeicherung: Dobrindt will “systematische Entdeckungsrisikos” schaffen
- 10:5 : [NEU] [mittel] Dell PowerScale OneFS: Mehrere Schwachstellen
- 10:5 : [NEU] [mittel] CPython: Schwachstelle ermöglicht Denial of Service
- 10:5 : [NEU] [UNGEPATCHT] [hoch] Google Cloud Platform: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen
- 10:4 : FBI Warns of Deepfake Messages Impersonating Senior Officials
- 9:33 : [UPDATE] [hoch] Apache Solr: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen
- 9:32 : INE Security Alert: Continuous CVE Practice Closes Critical Gap Between Vulnerability Alerts and Effective Defense
- 9:32 : I tested a TCL smart lock, and its palm vein recognition feature blew me away
- 9:32 : Researchers Expose New Intel CPU Flaws Enabling Memory Leaks and Spectre v2 Attacks