146 posts were published in the last hour
- 20:32 : The Hidden Cyber Risks in Your Executive Team’s Digital Footprint
- 20:5 : IT Security News Hourly Summary 2025-05-26 21h : 7 posts
- 20:4 : SilverRAT Source Code Leaked Online: Here’s What You Need to Know
- 19:6 : Marlboro-Chesterfield Pathology data breach impacted 235,911 individuals
- 18:32 : Building a Secure LLM Gateway (and an MCP Server) with GitGuardian & AWS Lambda
- 18:8 : Fake DigiYatra Apps Target Indian Users to Steal Financial Data
- 18:8 : FBI Issues on Silent Ransom Group Using Fake IT Support Calls to Target Victims
- 18:8 : ChatGPT Deep Research Now Integrates with Dropbox and OneDrive to Retrieve Data
- 18:8 : Hackers Reportedly Selling Over 500 Stolen Crypto Databases on Dark-Web Forums
- 18:7 : Meteobridge Web Interface Vulnerability Let Attackers Inject Commands Remotely
- 18:7 : I’ve Seen Things
- 17:32 : Threat Actors Deploy Database Client Tools on Targeted Systems to Exfiltrate Sensitive Data
- 17:32 : 60 Malicious npm Packages Exfiltrate Hostnames, IP Addresses, and DNS Server Details
- 17:32 : How To Identify Hosts and Launching Payloads in Armitage – V2
- 17:8 : Nur noch heute möglich: So widersprichst du dem KI-Training mit deinen Daten bei Instagram und Facebook
- 17:8 : KI-Modelle wehren sich gegen Abschaltung – und eins ist besonders rebellisch
- 17:8 : Kann man Meta AI in Whatsapp und Instagram deaktivieren? Was ihr dazu wissen müsst
- 17:8 : WWDC 2025: Was uns auf Apples Entwicklerkonferenz erwartet
- 17:7 : Grok unter der Lupe: Wie Elon Musks KI-Chatbot zur Desinformationsschleuder wurde
- 17:7 : SVG Steganography, (Mon, May 26th)
- 17:7 : Generative AI May Handle 40% of Workload, Financial Experts Predict
- 17:5 : IT Security News Hourly Summary 2025-05-26 18h : 5 posts
- 16:33 : Backup-Täuschung: Warum Cloud-Wiederherstellung das neue Cyber-Blindfeld ist
- 16:32 : Signal Blocks Windows 11 Recall: ‘Microsoft Has Simply Given Us No Other Option’
- 16:32 : Nova Scotia Power Confirms Ransomware Attack – 280k Customers Affected
- 16:32 : SharpSuccessor – A PoC For Exploiting Windows Server 2025’s BadSuccessor Vulnerability
- 16:32 : Critical vBulletin Forum Vulnerability Let Attackers Execute Remote Code
- 15:32 : Chinese Hackers Exploit Cityworks 0-Day to Hit US Local Governments
- 15:32 : Quantum Computing Could Deliver Business Value by 2028 with 100 Logical Qubits
- 15:32 : Dior Confirms Hack: Personal Data Stolen, Here’s What to Do
- 15:6 : Vote for the sessions you want to see at TechCrunch Disrupt 2025
- 15:5 : Decoding EASA Regulation Part-IS: A Comprehensive Guide to Strengthening Aviation Cybersecurity
- 14:33 : FBI Warns of Silent Ransom Group Attacking Users Via Fake IT Calls
- 14:33 : ChatGPT Deep Research Now Integrates Dropbox & OneDrive to Pull Data
- 14:32 : Hard-Coded Telnet Credentials Leave D-Link Routers Wide Open to Remote Code Execution
- 14:32 : Vulnerability in Popular macOS App Cursor Allows Malware to Bypass Privacy Protections, Exposing User Data
- 14:32 : ChatGPT o3 Model Bypassed to Sabotage the Shutdown Mechanism
- 14:32 : ICYMI: A Look Back at Exposure Management Academy Highlights
- 14:32 : Over 70 Malicious npm and VS Code Packages Found Stealing Data and Crypto
- 14:5 : IT Security News Hourly Summary 2025-05-26 15h : 9 posts
- 13:33 : Werner Landstorfer ist neuer BDSW-Präsident
- 13:33 : Windows Server 2025: Rechteausweitungslücke im AD
- 13:32 : SharpSuccessor PoC Released to Weaponize Windows Server 2025 BadSuccessor Flaw
- 13:32 : Katz Stealer Attacking Chrome, Edge, Brave & Firefox to Steal Login Details
- 13:32 : Tenable Network Monitor Vulnerabilities Let Attackers Escalate Privileges
- 13:32 : Fake DigiYatra Apps Attacking Indian Users to Steal Financial Data
- 13:32 : 184 million records data leak: Google, PayPal and Netflix passwords leaked online
- 13:3 : AirBorne: Angriffe auf Geräte über Apple AirPlay | Offizieller Blog von Kaspersky
- 13:2 : Researchers Drop PoC for Fortinet CVE-2025-32756, Urging Quick Patching
- 13:2 : Oracle TNS Flaw Exposes System Memory to Unauthorized Access
- 12:32 : Bundeswehr setzt auf Google-Cloud
- 12:32 : ⚡ Weekly Recap: APT Campaigns, Browser Hijacks, AI Malware, Cloud Breaches and Critical CVEs
- 12:32 : CISO’s Guide To Web Privacy Validation And Why It’s Important
- 12:5 : GIMP: Mehrere Schwachstellen ermöglichen Codeausführung
- 12:5 : [NEU] [mittel] Red Hat Enterprise Linux (libsoup): Mehrere Schwachstellen
- 12:5 : [NEU] [hoch] GIMP: Mehrere Schwachstellen ermöglichen Codeausführung
- 12:4 : Severe vBulletin Flaw Allows Remote Code Execution by Attackers
- 12:4 : China-linked APT UNC5221 started exploiting Ivanti EPMM flaws shortly after their disclosure
- 12:4 : ⚡ Weekly Recap: APT Campaigns, Browser Hijacks, AI Malware, Cloud Breaches and Critical CVEs
- 11:33 : Datenleck: Adidas bestätigt Abfluss von Kundendaten durch Cyberangriff
- 11:32 : ChatGPT-03 Exploited to Override Critical Shutdown Protocols
- 11:32 : Bitwarden PDF File Handler Vulnerability Let Attackers Upload Malicious PDF Files
- 11:32 : 60 Malicious npm Packages Exfiltrates Exfiltrate Hostnames, IP’s, DNS Servers Details
- 11:32 : Street-Level QR Phishing: Cybercriminals Take Social Engineering to the Real World
- 11:32 : ⚡ Weekly Recap: APT Campaigns, Browser Hijacks, AI Malware, Cloud Breaches and Critical CVEs
- 11:6 : CYBERSNACS # Folge 32: IT-Sicherheit bei Kommunen
- 11:6 : 5 Dinge, die du diese Wochen wissen musst: Mehr KI „für alle, überall“
- 11:6 : Barrierefreie Website erstellen: Dein Guide für digitale Zugänglichkeit
- 11:6 : Alexa, was weißt du über mich? Die unbequeme Antwort steckt in Gigabytes an Daten
- 11:5 : [UPDATE] [hoch] Red Hat Enterprise Linux (libsoup): Mehrere Schwachstellen
- 11:5 : IT Security News Hourly Summary 2025-05-26 12h : 12 posts
- 11:4 : Over 40 Malicious Chrome Extensions Impersonate Popular Brands to Steal Sensitive Data
- 11:4 : A Starter Guide to Protecting Your Data From Hackers and Corporations
- 11:4 : ⚡ Weekly Recap: APT Campaigns, Browser Hijacks, AI Malware, Cloud Breaches and Critical CVEs
- 10:34 : Kriminelle Gruppe “Careto” angeblich von spanischer Regierung gelenkt
- 10:33 : BYD EV Sales Top Tesla In Europe For First Time
- 10:33 : UK, US Police Target Ransomware Gangs In Latest Action
- 10:33 : Oracle ‘To Spend $40bn’ On Nvidia Chips For Stargate Campus
- 10:33 : Telegram ‘Makes $540m Profit’ As Probes Continue
- 10:33 : Nova Scotia Power Suffers Ransomware Attack; 280,000 Customers’ Data Compromised
- 10:33 : Threat Actors Installing DB Client Tools on Targeted Systems to Exfiltrate Sensitive Data
- 10:33 : 40+ Malicious Chrome Extensions Mimic as Popular Chrome Brands Steals Sensitive Data
- 10:33 : Oracle TNS Protocol Vulnerability Let Attackers Access System Memory Contents
- 10:33 : Apache Tomcat Vulnerability Allows Remote Code Execution – PoC Released
- 10:32 : CRQ Explained: From Qualitative to Quantitative | Kovrr
- 10:32 : ⚡ Weekly Recap: APT Campaigns, Browser Hijacks, AI Malware, Cloud Breaches and Critical CVEs
- 10:9 : BSI veröffentlicht Empfehlungen zur Verbesserung der E-Mail-Sicherheit in Unternehmen
- 10:9 : Neuer Lieferkettenangriff mit bösartigen Skripten in npm-Paketen
- 10:9 : Gitlab Duo: Versteckter Kommentar lässt KI-Tool privaten Code leaken
- 10:9 : [NEU] [UNGEPATCHT] [kritisch] Microsoft Windows Server 2025: Schwachstelle ermöglicht Privilegieneskalation
- 10:9 : [NEU] [mittel] IBM SPSS: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen
- 10:7 : Linux 6.15 Launches with Major Performance and Hardware Upgrades
- 10:7 : Reborn in Rust: AsyncRAT
- 10:7 : ⚡ Weekly Recap: APT Campaigns, Browser Hijacks, AI Malware, Cloud Breaches and Critical CVEs
- 9:33 : [UPDATE] [hoch] Mozilla Firefox / Thunderbird: Mehrere Schwachstellen
- 9:33 : [UPDATE] [mittel] Django: Schwachstelle ermöglicht Denial of Service
- 9:33 : [UPDATE] [mittel] PostgreSQL: Schwachstelle ermöglicht Denial of Service
- 9:33 : [UPDATE] [mittel] Intel Prozessoren: Mehrere Schwachstellen ermöglichen Offenlegung von Informationen
- 9:33 : [UPDATE] [mittel] GNU libc: Schwachstelle ermöglicht Codeausführung
- 9:32 : TA-ShadowCricket: Sophisticated Hacker Group Targeting Government and Enterprise Networks
- 9:32 : D-Link Routers Exposed by Hard-Coded Telnet Credential
- 9:32 : What the UK’s New Cyber Resilience Bill Means for Businesses—and How to Stay Ahead
- 9:5 : [NEU] [niedrig] Bitwarden: Schwachstelle ermöglicht Cross-Site Scripting
- 9:5 : Fake software activation videos on TikTok spread Vidar, StealC
- 9:5 : Sophisticated Hacker Group TA-ShadowCricket Attacking Government & Enterprise Networks
- 9:5 : GNOME RDP Vulnerability Let Attackers Exhaust System Resources & Crash Process
- 9:5 : Critical WSO2 SOAP Vulnerability Let Attackers Reset Password for Any User Account
- 9:4 : NIST Introduces New Metric to Measure Likelihood of Vulnerability Exploits
- 8:33 : Operation Endgame 2: 15 Millionen E-Mail-Adressen und 43 Millionen Passwörter
- 8:33 : [UPDATE] [mittel] Mattermost: Mehrere Schwachstellen
- 8:32 : Police Probe Hacking Gang Over Retail Attacks
- 8:32 : Apple ‘Plans AI Smart Glasses’ For Next Year
- 8:32 : Bitwarden Flaw Allows Upload of Malicious PDFs, Posing Security Risk
- 8:32 : Privilege Escalation Flaws Found in Tenable Network Monitor
- 8:7 : A week in security (May 19 – May 25)
- 8:6 : Tech Executives Lead the Charge in Agentic AI Deployment
- 8:5 : IT Security News Hourly Summary 2025-05-26 09h : 9 posts
- 7:33 : Staatliche Milliarden-Investition: Chance für die Sicherheitsbranche
- 7:33 : Häufiger als andere Modelle: ChatGPT sabotiert bei Tests eigene Abschaltung
- 7:32 : Builder.ai Collapsed After Finding Sales ‘Inflated By 300 Percent’
- 7:32 : Linux 6.15 Released with Several New Features & Improvements
- 7:32 : AIDE – Lightweight Linux Host Intrusion Detection
- 7:32 : CISA’s Commvault warning, updated Killnet returns, fake VPN malware
- 7:3 : Google Gemini: Everything You Need to Know About Google’s Powerful AI
- 7:2 : Apache Tomcat RCE Vulnerability Exposed with PoC Released
- 7:2 : Nova Scotia Power Confirms Ransomware Attack, 280k Notified of Data Breach
- 6:32 : Unraveling Cyber Threats: Ransomware, Kidnapping, and Record-Breaking DDoS Attacks
- 6:12 : Um Bitcoin zu stehlen: US-Kryptoinvestor hat wohl wochenlang Touristen gefoltert
- 6:12 : Microsoft: Außerplanmäßige Updates für Windows Server 2022 und Windows 10
- 6:11 : Severe WSO2 SOAP Flaw Allows Unauthorized Password Resets for Any Use
- 6:10 : Why layoffs increase cybersecurity risks
- 6:10 : LlamaFirewall: Open-source framework to detect and mitigate AI centric security risks
- 5:33 : Um an dessen Bitcoin zu kommen: US-Kryptoinvestor soll Italiener gefoltert haben
- 5:32 : When AI Fights Back: Threats, Ethics, and Safety Concerns
- 5:32 : NIST proposes new metric to gauge exploited vulnerabilities
- 5:5 : IT Security News Hourly Summary 2025-05-26 06h : 1 posts
- 5:2 : TeleMessage security SNAFU worsens as 60 government staffers exposed
- 4:33 : [UPDATE] [niedrig] Ghostscript: Schwachstelle ermöglicht Offenlegung von Informationen
- 4:32 : Ransomware Hackers Target SAP Servers Through Critical Flaw
- 4:32 : Cyber threats are changing and here’s what you should watch for
- 4:2 : AI forces security leaders to rethink hybrid cloud strategies
- 2:32 : China approves rules for national ‘online number’ ID scheme
- 23:5 : IT Security News Hourly Summary 2025-05-26 00h : 2 posts
- 23:2 : OTP Authentication in 2025: How MojoAuth Stacks Up Against Twilio Verify, Auth0, Stytch & Descope
- 22:58 : IT Security News Weekly Summary 21
- 22:55 : IT Security News Daily Summary 2025-05-25