205 posts were published in the last hour
- 21:32 : LOLCLOUD – Azure Arc – C2aaS
- 21:4 : Meta stopped covert operations from Iran, China, and Romania spreading propaganda
- 20:5 : IT Security News Hourly Summary 2025-05-30 21h : 5 posts
- 19:33 : D-LINK Access Point (AP): Schwachstelle ermöglicht Codeausführung
- 19:33 : Google Chrome: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff
- 19:33 : Mozilla Firefox und Thunderbird: Mehrere Schwachstellen
- 19:32 : Countering Spear Phishing with Advanced Email Security Solutions
- 19:32 : Uber’s Secret Management Platform – Scaling Secrets Security Across Multi-Cloud
- 19:32 : SentinelOne Outage Leaves Security Teams Hanging for Six Hours
- 19:7 : ConnectWise customers get mysterious warning about ‘sophisticated’ nation-state hack
- 19:7 : A Hacker May Have Deepfaked Trump’s Chief of Staff in a Phishing Campaign
- 19:7 : She Got an Abortion. So A Texas Cop Used 83,000 Cameras to Track Her Down.
- 19:7 : Deadline Extended: More Time to Submit Your Proposal for the OpenSSL Conference 2025
- 18:33 : Feds arrest DoD techie, claim he dumped top secret files in park for foreign spies to find
- 18:33 : Detecting Evolving Phishing Campaigns in 2025 Cyber Environments
- 18:33 : Million-dollar Salaries, Board Influence Mark the CISO’s Rise
- 18:33 : Ransomware Attack Disrupts Kettering Health Network, Elective Procedures Canceled Across 14 Ohio Facilities
- 18:5 : Datensparsamkeit war gestern: Datenlecks bei Corplife und Lieferdiensten
- 18:5 : US medical org pays $50M+ to settle case after crims raided data and threatened to swat cancer patients
- 18:4 : BSidesLV24 – PasswordsCon – Cloud Attack: Dissecting Attack Paths With Graph-Mode
- 17:5 : IT Security News Hourly Summary 2025-05-30 18h : 20 posts
- 17:4 : KI als Waffe
- 17:4 : Google Lens trifft Youtube Shorts: Was euch die Bildsuche bei den kurzen Clips bringt
- 17:4 : Mehr KI und ein neuer Editor: Google Fotos bekommt großes Update
- 17:4 : KI schlägt bald Bitcoing-Mining als Stromfresser: Warum ein Experte dabei nicht nur den Energieverbrauch kritisiert
- 17:4 : Office-Dateien mit Android-Smartphones teilen: So geht es jetzt auch ohne Microsoft-Account
- 17:4 : Diese neue Gmail-Funktion spart euch viel Zeit – doch es gibt einen Haken
- 17:4 : Datensparsamkeit Fehlanzeige: Datenleck bei Corplife, Lieferdiensten & Webshops
- 17:2 : Attackers Exploit Microsoft Entra Billing Roles to Escalate Privileges in Organizational Environments
- 17:2 : Meta – yep, Facebook Meta – is now a defense contractor
- 17:2 : British supermarkets’ Supplier of Refrigerated Goods Hit by a Ransomware Attack
- 16:33 : Cybersecurity Workforce Research Report: Cybersecurity wird zum Teamsport
- 16:32 : Cops in Germany Claim They’ve ID’d the Mysterious Trickbot Ransomware Kingpin
- 16:32 : Eight things we learned from WhatsApp vs. NSO Group spyware lawsuit
- 16:32 : Sustaining Digital Certificate Security – Upcoming Changes to the Chrome Root Store
- 16:4 : Microsoft Unit In Russia To File For Bankruptcy
- 16:4 : Threat Actors Exploit Google Apps Script to Host Phishing Sites
- 16:4 : White House investigating how Trump’s chief of staff’s phone was hacked
- 16:4 : Detecting Deepfake Threats in Authentication and Verification Systems
- 15:35 : Cybersicherheit in der Supply Chain: Vertrauen ist gut, Kontrolle ist Pflicht
- 15:31 : Dadsec Hacker Group Uses Tycoon2FA Infrastructure to Steal Office365 Credentials
- 15:10 : Beware: Weaponized AI Tool Installers Infect Devices with Ransomware
- 15:10 : Is T-Mobile secretly recording your phone’s screen? How to check and turn it off
- 15:10 : Guide for delivering frequently software features that matter (series) #1/2
- 15:10 : Guide for delivering frequently software features that matter (series) #2/2: Challenges and the path forward
- 15:10 : CVE-2025-0655 – Remote Code Execution in D-Tale via Unprotected Custom Filters
- 15:10 : OffSec’s Take on the Global Generative AI Adoption Index
- 15:10 : New Malware Compromise Microsoft Windows Without PE Header
- 15:10 : Critical Icinga 2 Vulnerability Allows Attackers to Bypass Validation and Obtain Certificates
- 15:9 : Implementing Post-Quantum Cryptography for Future-Proof Security
- 15:9 : Deloitte Data Breach: Alleged Leak of Source Code & GitHub Credentials
- 15:9 : US Sanctions Philippine Company for Supporting Crypto Scams
- 15:9 : Firebase, Google Apps Script Abused in Fresh Phishing Campaigns
- 15:9 : New EDDIESTEALER Malware Bypasses Chrome’s App-Bound Encryption to Steal Browser Data
- 15:9 : Mandatory Ransomware Payment Disclosure Begins in Australia
- 14:32 : Texas Lawmakers Fail In Bid To Ban Social Media For Under 18s
- 14:32 : Attackers Exploit Microsoft Entra Billing Roles to Escalate Privileges
- 14:32 : Pure Crypter Uses Multiple Evasion Methods to Bypass Windows 11 24H2 Security Features
- 14:32 : Google Unveils AI With Deep Reasoning and Creative Video Capabilities
- 14:32 : Google’s AI Virtual Try-On Tool Redefines Online Shopping Experience
- 14:8 : Krieg: Nokia und Rheinmetall-Tochter bauen 5G-Militärnetze
- 14:7 : The Akamai Innovation Tour: A Journey in Perspective and Partnership
- 14:7 : Critical Icinga 2 Vulnerability Allows Attackers to Obtain Valid Certificates
- 14:7 : Microsoft Reveals Techniques for Defending Against Evolving AiTM Attacks
- 14:7 : IT Security Guru picks for Infosecurity Europe 2025
- 14:7 : Smarter Defenses: How AI Improves Security for Low/No-Code and Vibe Coded Applications
- 14:7 : Zero Trust Architecture Adoption for Enterprise Security in 2025
- 14:5 : IT Security News Hourly Summary 2025-05-30 15h : 13 posts
- 13:33 : Sicherheitsexpo 2025: KRITIS im Fokus
- 13:32 : INE Security and RedTeam Hacker Academy Announce Partnership to Advance Cybersecurity Skills in the Middle East
- 13:32 : Threat Actor Claims TikTok Breach, Puts 428 Million Records Up for Sale
- 13:32 : Hackers Use Gh0st RAT to Hijack Internet Café Systems for Crypto Mining
- 13:32 : Cops in Germany Claim They’ve ID’d the Mysterious Trickbot Ransomware Kingpin
- 13:32 : Watch Now: Why Context is a Secret Weapon in Application Security Posture Management
- 13:7 : New Study Uncovers Multiple Vulnerabilities in WeChat and IM Apps
- 13:7 : Windows 11 Security Update for 22H2 & 23H2 May Cause Recovery Errors
- 13:7 : How AI coding agents could destroy open source software
- 13:7 : What is security?
- 13:7 : Quantum Computing Threats to Traditional Cryptographic Systems
- 13:7 : US Banks Urge SEC to Repeal Cyber Disclosure Rule
- 12:32 : Exploits and vulnerabilities in Q1 2025
- 12:32 : Zscaler Moves to Acquire Red Canary MDR Service
- 12:8 : Schadcode-Attacken auf IBM Db2 und Tivoli Monitoring möglich
- 12:8 : Sicherheitslücke: Warum ChatGPT oft den gesamten Onedrive-Ordner lesen kann
- 12:8 : [NEU] [mittel] Linux Kernel: Mehrere Schwachstellen
- 12:7 : US SEC Drops Lawsuit Against Binance Crypto Exchange
- 12:7 : Victoria’s Secret US Website Restored After Security Incident
- 12:7 : MICI NetFax Server Flaws Allow Attackers to Execute Remote Code
- 12:7 : Generative AI Exploitation in Advanced Cyber Attacks of 2025
- 12:7 : Critical Cisco IOS XE Vulnerability Allows Arbitrary File Upload – PoC Released
- 12:7 : North Korean IT Workers Leverages Legitimate Software & Network Behaviors To Bypass EDR
- 12:7 : New BitM Attack Exploits Safari Vulnerability to Steal Login Credentials
- 12:7 : Windows 11 Security Update for Version 22H2 & 23H2 May Lead to Recovery Error
- 11:34 : [NEU] [mittel] Acronis Cyber Protect: Mehrere Schwachstellen
- 11:33 : [NEU] [hoch] VMware Tanzu Spring Cloud Gateway Server: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen
- 11:33 : Victoria’s Secret Website Down Following Security Incident
- 11:33 : Why Take9 Won’t Improve Cybersecurity
- 11:32 : MITRE Publishes Post-Quantum Cryptography Migration Roadmap
- 11:32 : Chinese Hacking Group APT41 Exploits Google Calendar to Target Governments
- 11:32 : Strategies for Enhancing Your Organization’s Cyber Resilience
- 11:32 : From the “Department of No” to a “Culture of Yes”: A Healthcare CISO’s Journey to Enabling Modern Care
- 11:32 : China-Linked Hackers Exploit SAP and SQL Server Flaws in Attacks Across Asia and Brazil
- 11:6 : Die Macht der unechten Bilder: Warum die Rechte auf KI-generierte Inhalte setzt
- 11:6 : Whatsapp setzt bald auf Nutzernamen statt Telefonnummern: Welche Regeln dafür gelten
- 11:6 : Von AGI bis Zero-Shot: Die wichtigsten KI-Begriffe schnell erklärt
- 11:6 : Google Drive: Gemini schaut jetzt deine Videos – und du sparst wertvolle Zeit
- 11:6 : [UPDATE] [hoch] GNU Emacs: Schwachstelle ermöglicht Codeausführung
- 11:6 : [UPDATE] [hoch] Linux Kernel: Mehrere Schwachstellen
- 11:6 : [UPDATE] [mittel] Grub: Mehrere Schwachstellen
- 11:5 : Hackers Use AI-Generated Videos on TikTok to Spread Info-Stealing Malware
- 11:5 : US Treasury sanctioned the firm Funnull Technology as major cyber scam facilitator
- 11:5 : CISA Releases Guidance on SIEM and SOAR Implementation
- 11:5 : IT Security News Hourly Summary 2025-05-30 12h : 23 posts
- 11:4 : ConnectWise Discloses Suspected State-Sponsored Hack
- 10:33 : Neustart und Firmware-Update zwecklos: Tausende Asus-Router kompromittiert
- 10:33 : Schwachstelle in der Smart-Home-App „Rubetek Home“ | Offizieller Blog von Kaspersky
- 10:33 : [UPDATE] [mittel] libtasn1: Schwachstelle ermöglicht Denial of Service
- 10:33 : [UPDATE] [mittel] Intel Prozessoren: Mehrere Schwachstellen
- 10:33 : [UPDATE] [hoch] PostgreSQL: Schwachstelle ermöglicht SQL Injection und Codeausführung
- 10:33 : [UPDATE] [hoch] OpenSSH: Mehrere Schwachstellen
- 10:32 : Chinese Phishing Service Haozi Resurfaces, Fueling Criminal Profits
- 10:32 : Novel Malware Evades Detection by Skipping PE Header in Windows
- 10:32 : Weaponized PyPI Package Executes Supply Chain Attack to Steal Solana Private Keys
- 10:32 : Crims defeat human intelligence with fake AI installers they poison with ransomware
- 10:32 : FBI Flags Philippines Tech Company Behind Crypto Scam Infrastructure
- 10:5 : [NEU] [hoch] Apache Commons BeanUtils: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen
- 10:5 : Safari Flaw Exploited by BitM Attack to Steal User Login Data
- 10:4 : 96% of IT pros say AI agents are a security risk, but they’re deploying them anyway
- 10:4 : Data watchdog put cops on naughty step for lost CCTV footage
- 9:34 : Kein Patch in Sicht: WordPress-Websites mit TI WooCommerce Wishlist verwundbar
- 9:34 : Datenschutz ade: KI-Tool ortet Youtube-Nutzer anhand ihrer Kommentare
- 9:34 : [UPDATE] [mittel] Red Hat OpenStack (python-h11): Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen
- 9:34 : [UPDATE] [hoch] Mozilla Thunderbird: Mehrere Schwachstellen
- 9:34 : [UPDATE] [mittel] Red Hat Satellite: Schwachstelle ermöglicht Denial of Service
- 9:34 : [UPDATE] [hoch] WebKitGTK: Mehrere Schwachstellen
- 9:34 : [NEU] [mittel] Apache Superset: Schwachstelle ermöglicht SQL Injection
- 9:33 : Next.js Dev Server Vulnerability Leads to Developer Data Exposure
- 9:32 : Ensuring Data Security in Cloud Storage and Collaboration Platforms
- 9:32 : CISA Releases Five ICS Advisories Targeting Vulnerabilities and Exploits
- 9:32 : Implementing Identity and Access Management in Cloud Security
- 9:32 : New Rust-based InfoStealer via Fake CAPTCHA Delivers EDDIESTEALER
- 9:32 : U.S. Sanctions Funnull for $200M Romance Baiting Scams Tied to Crypto Fraud
- 9:6 : [UPDATE] [mittel] Google Chrome: Schwachstelle ermöglicht nicht spezifizierten Angriff
- 9:6 : [UPDATE] [mittel] Red Hat Enterprise Linux (libsoup): Mehrere Schwachstellen
- 9:6 : [UPDATE] [mittel] Red Hat Enterprise Linux (python-tornado): Schwachstelle ermöglicht Denial of Service
- 9:6 : [UPDATE] [mittel] Google Chrome: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff
- 9:6 : [UPDATE] [hoch] Mozilla Firefox und Thunderbird: Mehrere Schwachstellen
- 9:5 : How AI coding agents could infiltrate and destroy open source software
- 9:5 : ConnectWise suffered a cyberattack carried out by a sophisticated nation state actor
- 9:5 : The UK wants you to sign up for £1B cyber defense force
- 9:4 : UK MoD Launches New Cyber Warfare Command
- 8:32 : New Rust-Based InfoStealer Uses Fake CAPTCHA to Deliver EDDIESTEALER
- 8:32 : North Korean IT Workers Exploit Legitimate Software and Network Tactics to Evade EDR
- 8:32 : Critical Cisco IOS XE Flaw Permits Arbitrary File Upload — PoC Released
- 8:5 : Detecting and Remediating Misconfigurations in Cloud Environments
- 8:5 : IT Security News Hourly Summary 2025-05-30 09h : 4 posts
- 8:5 : Infosecurity Europe 2025 drives cybersecurity priorities amid growing global risks
- 8:4 : CISA Urged to Enrich KEV Catalog with More Contextual Data
- 7:33 : Future Days 2025: Für mehr Partnerschaftlichkeit
- 7:33 : KB5058405: Update-Panne macht Windows-11-Systeme kaputt
- 7:32 : ConnectWise Hit by Advanced Cyberattack: Internal Data at Risk
- 7:32 : Windows startup failures, Victoria’s Secret cyberattack, stolen cookie threat
- 7:5 : Here’s how to remove personal info from people search sites
- 7:5 : Interlock ransomware: what you need to know
- 7:5 : Comprehensive Ransomware Mitigation Strategies for 2025 Enterprises
- 7:5 : Securing Multi-Cloud Infrastructures in 2025 Enterprise Deployments
- 7:5 : ConnectWise Hacked – Nation State Actors Compromised the Systems to Access Customer Data
- 7:5 : ConnectWise Hit by Cyberattack; Nation-State Actor Suspected in Targeted Breach
- 6:33 : SentinelOne Recovers: Platform Back Online After Extended Outage
- 6:33 : Apache Tomcat CGI Servlet Flaw Enables Security Constraint Bypass
- 6:5 : Using AI to outsmart AI-driven phishing scams
- 6:5 : Why privacy in blockchain must start with open source
- 6:5 : Cybersecurity Today: Hijacker Scams, Ransomware Attacks, and Summer Travel Threats
- 5:31 : Actionable Threat Intelligence for Mitigating Emerging Cyber Threats
- 5:5 : IT Security News Hourly Summary 2025-05-30 06h : 5 posts
- 5:4 : AI agents have access to key data across the enterprise
- 4:32 : SentinelOne Outage: Services Restored After Hours-Long Platform Disruption
- 4:32 : Integrating Threat Intelligence into Security Operations Centers
- 4:32 : Infosec products of the month: May 2025
- 4:32 : Exchange 2016, 2019 support ends soon: What IT should do to stay secure
- 4:32 : Meta Disrupts Influence Ops Targeting Romania, Azerbaijan, and Taiwan with Fake Personas
- 4:5 : Auslegungssache 135: Datenschutz im vernetzten Auto
- 3:32 : Apache Tomcat CGI Servlet Vulnerability Allows Security Constraint Bypass
- 3:32 : Predictive Cyber Risk Analysis Using Aggregated Threat Intelligence
- 3:32 : Feel Supported by Your NHI Security Team
- 3:32 : Unlocking Powerful Benefits with NHIs
- 3:32 : Building Trust Through Effective NHI Management
- 2:31 : Developing Collaborative Threat Intelligence Sharing Frameworks
- 2:8 : ISC Stormcast For Friday, May 30th, 2025 https://isc.sans.edu/podcastdetail/9472, (Fri, May 30th)
- 2:8 : U.S. Sanctions Cloud Provider ‘Funnull’ as Top Source of ‘Pig Butchering’ Scams
- 2:5 : IT Security News Hourly Summary 2025-05-30 03h : 4 posts
- 1:32 : Evaluating the Security Efficacy of Web Application Firewalls (WAFs)
- 1:32 : Real-Time Threat Intelligence for Proactive Cyber Defense in 2025
- 1:4 : Best home automation systems 2025: I’m a smart home reviewer and these are the top ones
- 1:4 : Security outfit SentinelOne’s services back online after lengthy outage
- 0:32 : Usage of “passwd” Command in DShield Honeypots, (Fri, May 30th)
- 0:32 : Feds gut host behind pig butchering scams that bilked $200M from Americans
- 0:2 : Windows Defender Enhancements for Advanced Threat Mitigation
- 23:7 : Alexa hört mit: Was dein smartes Zuhause wirklich über dich weiß
- 23:7 : Mehr als ein Algorithmus: Wie KI die Cybersicherheit auf ein neues Level hebt
- 23:7 : Apple: Warum du auf iOS 19 vergeblich warten könntest und was du stattdessen bekommst
- 23:6 : Detecting Lateral Movement in Windows-Based Network Infrastructures
- 23:5 : IT Security News Hourly Summary 2025-05-30 00h : 5 posts
- 22:55 : IT Security News Daily Summary 2025-05-29
- 22:4 : Microsoft’s May Patch Tuesday update fails on some Windows 11 VMs