210 posts were published in the last hour
- 22:55 : IT Security News Daily Summary 2025-05-25
- 20:32 : FBI Warns of Silent Ransom Group Targeting Law Firms via Scam Calls
- 17:8 : LegoGPT: Forscher entwickeln KI, die deine Lego-Ideen in baubare Anleitungen verwandelt
- 17:8 : Co-Pilot für Hacker: Wie eine KI einen Bug aufspürte, den Menschen übersahen
- 17:8 : Verzerrte Bilder und seltsame Zahlen: Wie eine Studentin ihren Professor bei ChatGPT-Nutzung ertappte
- 16:32 : Pen Test Partners Uncovers Major Vulnerability in Microsoft Copilot AI for SharePoint
- 15:4 : Here’s How to Safeguard Your Smartphone Against Zero-Click Attacks
- 15:4 : AI Can Create Deepfake Videos of Children Using Just 20 Images, Expert Warns
- 14:32 : India’s Cyber Scams Create International Turmoil
- 14:2 : Last 24 hours: TechCrunch Disrupt 2025 Early Bird Deals will fly away after today
- 14:2 : SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 46
- 13:6 : Security Affairs newsletter Round 525 by Pierluigi Paganini – INTERNATIONAL EDITION
- 11:12 : KI im Kontrollverlust: Wieso ein Getränkeautomaten-Agent nach 3 Wochen das FBI ruft
- 11:12 : Google I/O zeigt: KI wird überall integriert – aber niemand soll es merken
- 11:12 : Für 275 Dollar pro Monat: Googles Video-KI Veo 3 vertont Clips mit perfekter Lippensynchronisation
- 10:6 : Operation ENDGAME disrupted global ransomware infrastructure
- 8:34 : Week in review: Trojanized KeePass allows ransomware attacks, cyber risks of AI hallucinations
- 8:33 : Hackers Use Fake VPN and Browser NSIS Installers to Deliver Winos 4.0 Malware
- 7:36 : Feuertrutz 2025: Brandschutz live erleben
- 5:32 : Cyberangriffe im KI-Zeitalter: Warum Resilienz und Sicherheitskultur entscheidend sind
- 23:32 : Feel Empowered by Mastering NHI Compliance
- 23:32 : Your Assurance in Securing NHIs Properly
- 23:32 : Stay Reassured with Latest NHI Security Practices
- 23:5 : Steuererklärung selbst erledigen: Hilfreiche Apps und Programme im Überblick
- 23:5 : Amazon Prime Video: Der geheime Trick, wie du Werbung umgehst und nichts zahlst
- 23:5 : IT Security News Hourly Summary 2025-05-25 00h : 1 posts
- 22:55 : IT Security News Daily Summary 2025-05-24
- 18:2 : Cybercrime is ‘orders of magnitude’ larger than state-backed ops, says ex-White House advisor
- 18:2 : Brno May 2025: Hosting OpenSSL Projects and Corporation BAC Members for Alignment and Connection
- 17:32 : BSidesLV24 – PasswordsCon – That’s Not My Name
- 17:5 : IT Security News Hourly Summary 2025-05-24 18h : 2 posts
- 17:3 : Übersetzungsfrust auf dem iPhone? So ersetzt ihr Apples App durch Google Translate!
- 17:3 : Sonnenschein garantiert? Die besten Wetter-Apps im Test
- 17:3 : Wenn der KI-Detektor lügt: Die Herausforderung an Universitäten
- 17:2 : Google Claims Attackers That Hit UK Firms Now Targeting American Stores
- 16:2 : Silent Ransom Group targeting law firms, the FBI warns
- 15:32 : Danabot under the microscope
- 15:2 : Spain Investigates Cybersecurity of Power Suppliers After Widespread Grid Outage
- 15:2 : Cyberattackers Use JPG Files to Deploy Ransomware Undetected
- 14:31 : Zimbra CVE-2024-27443 XSS Flaw Hits 129K Servers, Sednit Suspected
- 14:5 : IT Security News Hourly Summary 2025-05-24 15h : 2 posts
- 13:2 : SK Telecom Uncovers Two-Year Malware Attack, Leaking 26M IMSI Records
- 12:32 : Remembering John Young, co-founder of web archive Cryptome
- 11:6 : KI-Klatsch und Tratsch: Künstliche Intelligenz entwickelt eigene soziale Normen
- 11:6 : Windows 95, XP und NT: Diese Unternehmen setzen auf Nostalgie
- 11:4 : The US Is Building a One-Stop Shop for Buying Your Data
- 11:4 : Leader of Qakbot cybercrime network indicted in U.S. crackdown
- 10:5 : GitLab Duo Vulnerability Let Attack Inject Malicious link & Steal Source Code
- 10:5 : 184 Million Users’ Passwords Exposed From an Open Directory Controlled by Hackers
- 10:5 : .Net Based Chihuahua Infostealer Exploit Google Drive Steals Browser Credentials and Crypto Wallets
- 8:5 : IT Security News Hourly Summary 2025-05-24 09h : 1 posts
- 7:7 : Cyber Resilience Act: Was Hersteller jetzt beachten müssen
- 6:33 : From English Literature to Cybersecurity: A Journey Through Blockchain and Security
- 5:33 : Anzeige: Microsoft Intune umfassend beherrschen
- 5:5 : IT Security News Hourly Summary 2025-05-24 06h : 2 posts
- 5:4 : Ransomware May Soon Target the Brain of Your Computer — Here’s What You Need to Know
- 3:31 : Russian Cybercriminal Charged in $24 Million Qakbot Ransomware Scheme
- 3:7 : Cyber Heads Up: “BadSuccessor”—A Critical Active Directory Privilege Escalation Vulnerability in Windows Server 2025
- 2:32 : Naukri exposed recruiter email addresses, researcher says
- 1:6 : Offensive Threat Intelligence
- 23:32 : 184 Million Records Database Leak: Microsoft, Apple, Google, Facebook, PayPal Logins Found
- 23:32 : GenAI Assistant DIANNA Uncovering New Obfuscated Malware
- 23:32 : Threat Actor Selling Burger King Backup System RCE Vulnerability for $4,000
- 23:32 : Bypassing Zero-Trust Policies to Exploit Vulnerabilities & Manipulate NHI Secrets
- 23:32 : Feel Protected: Advances in NHI Security Techniques
- 23:32 : Ensuring Stability with Robust NHI Strategies
- 23:32 : Week in Review: Disabling Microsoft Defender, corrupted power inverters, bipartisan training bill
- 23:5 : IT Security News Hourly Summary 2025-05-24 00h : 2 posts
- 22:55 : IT Security News Daily Summary 2025-05-23
- 22:32 : Hackers Attacking macOS Users With Fake Ledger Apps to Deploy Malware
- 22:2 : BadSuccessor Exploits Windows Server 2025 Flaw for Full AD Takeover
- 20:5 : IT Security News Hourly Summary 2025-05-23 21h : 3 posts
- 20:4 : ConnectWise ScreenConnect Tops List of Abused RATs in 2025 Attacks
- 20:4 : Russian Hackers Target Western Firms Aiding Ukraine, Spy on Shipments
- 19:32 : Apple CEO reportedly urged Texas’ governor to ditch online child safety bill
- 19:32 : New Formjacking Malware Attacking E-Commerce Pages to Steal Credit Card Data
- 19:9 : Proactive Security in Distributed Systems: A Developer’s Approach
- 19:9 : Microsoft, DOJ Take Actions Against ‘Favored Info-Stealing Malware’ Lumma
- 18:32 : Researchers Uncovered Infrastructure & TTPs Used by ALCATRAZ Malware
- 18:32 : How to Respond to Data Breaches – A Comprehensive Guide
- 18:32 : Hackers Use TikTok Videos to Distribute Vidar and StealC Malware via ClickFix Technique
- 18:4 : Zero-Trust Policy Bypass Enables Exploitation of Vulnerabilities and Manipulation of NHI Secrets
- 18:4 : Ransomware scum leaked Nova Scotia Power customers’ info
- 17:33 : Operation Endgame Takes Down DanaBot Malware, Neutralizes 300 Servers
- 17:33 : Hackers Target macOS Users with Fake Ledger Apps to Deploy Malware
- 17:33 : Chinese Nexus Hackers Exploit Ivanti Endpoint Manager Mobile Vulnerability
- 17:33 : Threat Actor Sells Burger King Backup System RCE Vulnerability for $4,000
- 17:33 : Most AI chatbots devour your user data – these are the worst offenders
- 17:33 : 2025 Cybersecurity Trends – Key Threats and Solutions
- 17:33 : Threats Actors Using Copyright Phishing Lures to Deliver Rhadamanthys Stealer
- 17:33 : Enterprise Security Solutions – Building a Resilient Defense
- 17:33 : U.S. Authorities Seize DanaBot Malware Operation, Indict 16
- 17:8 : 184 Millionen Logins im Klartext: Der mysteriöse Datenfund, der selbst Profis schockiert
- 17:8 : Studie belegt: So einfach geben Chatbots illegale Informationen preis
- 17:8 : Android-Apps dürfen jetzt 5.000 Dollar kosten: Wie Google Wucher dennoch verhindern will
- 17:8 : Windows 11: Neue KI für Notepad und Paint – aber nur, wenn dein PC mitspielt
- 17:8 : Debatte um KI-Halluzinationen: Anthropic-Chef Amodei hält den Menschen für unzuverlässiger
- 17:7 : Lumma Stealer: Down for the count
- 17:7 : Danabot: Analyzing a fallen empire
- 17:7 : CISA says SaaS providers in firing line after Commvault zero-day Azure attack
- 17:5 : IT Security News Hourly Summary 2025-05-23 18h : 8 posts
- 16:31 : FTC Drops Case To Block Microsoft’s $69bn Activision Purchase
- 16:3 : Sui Cetus DEX Hit By Suspected $200M Hack
- 16:2 : Massive data breach exposes 184 million passwords for Google, Microsoft, Facebook, and more
- 16:2 : Dero miner zombies biting through Docker APIs to build a cryptojacking horde
- 16:2 : Cybercriminals Employ Fake AI tools to Propagate the Infostealer Noodlophile
- 15:33 : Datenschutz: Nutzer können sich an Sammelklage gegen X beteiligen
- 15:32 : A 3X Leader in Gartner 2025 Magic Quadrant for SSE
- 15:32 : TAG-110 Hackers Weaponize Word Templates for Targeted Attacks
- 15:32 : iPhone Phishing Defense – Recognizing and Blocking Attacks
- 14:33 : At TechCrunch Sessions: AI, Artemis Seaford and Ion Stoica confront the ethical crisis — when AI crosses the line
- 14:33 : Protecting iPhones from Spyware – Tools and Tips
- 14:32 : DanaBot Malware With 150 Active C2 servers & 1,000 Daily Victims Busted in Operation Endgame
- 14:32 : Threat Actors Deliver Winos 4.0 Impersonate as VPN & QQBrowser
- 14:32 : Chinese Nexus Hackers Actively Exploiting Ivanti Endpoint Manager Mobile Vulnerability
- 14:32 : Securing Android in the Enterprise – Policies and Solutions
- 14:32 : Signal Adds Screenshot-Blocker to Thwart ‘Windows Recall’
- 14:32 : Chinese cyber spies are using Ivanti EPMM flaws to breach EU, US organizations
- 14:5 : Trump Threatens Tariffs On Apple iPhones, EU Products
- 14:5 : EU Targets Stark Industries in Cyberattack Sanctions Crackdown
- 14:5 : Oversharing online? 5 ways it makes you an easy target for cybercriminals
- 14:5 : In Other News: Volkswagen App Hacked, DR32 Sentenced, New OT Security Solution
- 14:5 : Two Factor Authentication Under Threat as Sim Swap Fraud Escalates Sharply
- 14:5 : IT Security News Hourly Summary 2025-05-23 15h : 18 posts
- 14:5 : AI in Cybersecurity Market Sees Rapid Growth as Network Security Leads 2024 Expansion
- 13:34 : Öffentliche Verwaltung setzt verstärkt auf Cloud-Dienste
- 13:34 : Microsoft Copilot+ Recall: Wer es deaktivieren sollte und wie das geht | Offizieller Blog von Kaspersky
- 13:32 : Google Touts ‘AI Mode’ For Search Engine
- 13:32 : Venice.ai’s Unrestricted Access Sparks Concerns Over AI-Driven Cyber Threats
- 13:32 : ThreatCloud AI Gives Harmony SASE Customers an Edge Against Cyber Threats
- 13:32 : Key Insights from the 2025 Global Conference on Cyber Capacity Building
- 13:4 : Digitales Nomadentum: Mit dem Laptop um die Welt
- 13:3 : Hackers Expose 184 Million User Passwords via Open Directory
- 13:3 : GenAI Assistant DIANNA Uncovers New Obfuscated Malware
- 13:3 : ViciousTrap Uses Cisco Flaw to Build Global Honeypot from 5,300 Compromised Devices
- 13:3 : Survey Surfaces Limited Amount of Post Quantum Cryptography Progress
- 13:3 : TikTok videos + ClickFix tactic = Malware infection
- 12:33 : Volksversand: Große Versandapotheke informiert Kunden über Datenleck
- 12:33 : GitLab Duo Vulnerability Exploited to Inject Malicious Links and Steal Source Code
- 12:33 : New Formjacking Malware Targets E-Commerce Sites to Steal Credit Card Data
- 12:33 : Tracking the Cost of Quantum Factoring
- 12:32 : Android Security Patches – How to Stay Updated and Protected
- 12:32 : Apple XNU kernel Vulnerability Let Attackers Escalate Privileges
- 12:32 : New Blackhat AI Tool Venice.ai Let Attackers Create Malware in Minutes
- 12:32 : On Demand: Threat Detection & Incident Response (TDIR) Summit
- 12:9 : (g+) z/VSE: Das vergessene Betriebssystem
- 12:7 : Researchers Uncover Infrastructure and TTPs Behind ALCATRAZ Malware
- 12:7 : Podcast Episode: Love the Internet Before You Hate On It
- 12:7 : 300 Servers and €3.5M Seized as Europol Strikes Ransomware Networks Worldwide
- 11:33 : Watchguard Technologies: Führungswechsel nach einer Dekade
- 11:32 : Roblox chat ends in 10-year-old’s abduction
- 11:32 : Chrome 0-Day CVE-2025-4664 Exposes Windows, Linux Browser Activity
- 11:32 : 3AM Ransomware Attackers Pose as IT Support to Compromise Networks
- 11:32 : Signal Blocks Windows Recall
- 11:32 : Russian Qakbot Gang Leader Indicted in US
- 11:32 : DanaBot botnet disrupted, QakBot leader indicted
- 11:7 : Claude drohte die Abschaltung: So drastisch wehrte sich der KI-Chatbot dagegen
- 11:7 : Claude 4: Was die neuen Sonnet- und Opus-Modelle von Anthropic können
- 11:7 : Mozilla stellt Pocket ein: Was Nutzer jetzt wissen müssen
- 11:7 : Facebook und Instagram: So verhindert ihr, dass Meta eure Posts für KI nutzt
- 11:7 : ChatGPT bekommt neues Design: So findet ihr alle Features wieder
- 11:7 : Zahlreiche Dienste betroffen: Datenbank mit 184 Millionen Zugangsdaten entdeckt
- 11:7 : [UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff
- 11:7 : [UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen
- 11:7 : [NEU] [mittel] Tenable Security Nessus Network Monitor: Mehrere Schwachstellen ermöglichen Privilegieneskalation
- 11:5 : Winos 4.0 Malware Masquerades as VPN and QQBrowser to Target Users
- 11:5 : IT Security News Hourly Summary 2025-05-23 12h : 13 posts
- 11:5 : TAG-110 Hackers Deploy Malicious Word Templates in Targeted Attacks
- 11:4 : Critical NETGEAR Router Vulnerability Let Attackers Gain Full Admin Access
- 11:4 : Companies Warned of Commvault Vulnerability Exploitation
- 10:32 : NETGEAR Router Flaw Allows Full Admin Access by Attackers
- 10:32 : SafeLine WAF: Open Source Web Application Firewall with Zero-Day Detection and Bot Protection
- 10:32 : Law Enforcement Busts Initial Access Malware Used to Launch Ransomware
- 10:9 : [UPDATE] [mittel] Cisco WebEx: Mehrere Schwachstellen
- 10:9 : [NEU] [mittel] Grafana: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen
- 10:7 : Scarcity signals: Are rare activities red flags?
- 10:7 : Threat Brief: CVE-2025-31324 (Updated May 23)
- 10:7 : Mysterious hacking group Careto was run by the Spanish government, sources say
- 10:7 : Operation RapTor led to the arrest of 270 dark web vendors and buyers
- 10:7 : ModSecurity Vulnerability Exposes Millions of Web Servers to Severe DoS Condition
- 10:7 : LockBit Data Leak Unveils Most Active Affiliates & Their Innerworkings
- 10:7 : Exploitable Vulnerabilities in Canon Printers Allow Attackers to Gain Admin Privileges
- 9:34 : Warten auf Sicherheitsupdate: Versa Concerto ist schwer verwundet
- 9:33 : Operation Endgame 2.0: 20 Haftbefehle, Hunderte Server außer Gefecht gesetzt
- 9:32 : ViciousTrap Hackers Breaches 5,500+ Edge Devices from 50+ Brands, Turns Them into Honeypots
- 9:32 : Inside LockBit: Data Leak Reveals Leading Affiliates and How They Operate
- 9:32 : Apple XNU Kernel Flaw Enables Attackers to Escalate Privileges
- 9:32 : Operation Endgame Crushes DanaBot Malware, Shuts Down 150 C2 Servers and Halts 1,000 Daily Attacks
- 9:32 : Grandpa-conning crook jailed over sugar-coated drug scam
- 9:32 : Cityworks Zero-Day Exploited by Chinese Hackers in US Local Government Attacks
- 9:32 : Detect Vulnerabilities Faster With Website Scanner
- 9:6 : Operation Endgame: Infrastruktur gefährlicher Malware-Stämme vom Netz genommen
- 9:6 : [NEU] [hoch] Microsoft Edge: Schwachstelle ermöglicht Privilegieneskalation
- 9:6 : [NEU] [mittel] Zoho ManageEngine ServiceDesk Plus: Schwachstelle ermöglicht Offenlegung von Informationen
- 9:6 : [NEU] [mittel] OpenSSL: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen
- 9:4 : DanaBot Botnet Disrupted, 16 Suspects Charged
- 9:4 : Global Dark Web Sting Sees 270 Arrested
- 8:34 : Microsoft Edge: Schwachstelle ermöglicht Privilegieneskalation
- 8:34 : [UPDATE] [hoch] Linux Kernel: Mehrere Schwachstellen
- 8:34 : [UPDATE] [hoch] Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service
- 8:34 : [UPDATE] [mittel] Ghostscript: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff
- 8:32 : Chinese Spies Exploit Ivanti Vulnerabilities Against Critical Sectors
- 8:32 : DragonForce Engages in “Turf War” for Ransomware Dominance
- 8:7 : Mozilla Firefox / Thunderbird: Mehrere Schwachstellen
- 8:7 : 270 Personen verhaftet: Großer Schlag gegen illegalen Handel im Darknet
- 8:7 : E-Autos: Tesla-Mitarbeiter berichten von Überwachung
- 8:7 : [UPDATE] [hoch] Red Hat Enterprise Linux (corosync): Schwachstelle ermöglicht Codeausführung
- 8:7 : [UPDATE] [hoch] Google Chrome / Microsoft Edge: Mehrere Schwachstellen
- 8:7 : [UPDATE] [hoch] Mozilla Thunderbird: Mehrere Schwachstellen
- 8:6 : [UPDATE] [mittel] Red Hat Enterprise Linux (xdg-utils): Schwachstelle ermöglicht Umgehung von Sicherheitsvorkehrungen