210 posts were published in the last hour
- 21:3 : Ukraine’s military intelligence agency stole 4.4GB of highly classified internal data from Tupolev
- 21:3 : Ukraine strikes Russian bomber-maker with hack attack
- 21:2 : Web Application Firewall (WAF) Best Practices For Optimal Security
- 20:5 : YARA-X 1.0.0: The Stable Release and Its Advantages
- 20:5 : Ransomware scum leak patient data after disrupting chemo treatments at Kettering
- 20:5 : OffensiveCon25 – Garbage Collection In V8
- 20:5 : Microsoft Launches Free Security Program for European Governments
- 20:5 : From Idea to Outcome: How WWT Is Leading the AI Security Conversation at Scale
- 20:5 : IT Security News Hourly Summary 2025-06-04 21h : 8 posts
- 19:32 : What is a time-based one-time password?
- 19:32 : What is a next-generation firewall (NGFW)?
- 19:32 : Updated Guidance on Play Ransomware
- 19:32 : Ransomware gang claims responsibility for Kettering Health hack
- 19:2 : Reddit Sues Anthropic, Alleging “Unlawful Business Acts”
- 19:2 : Exclusive: Hackers Leak 86 Million AT&T Records with Decrypted SSNs
- 19:2 : New Crocodilus Malware That Gain Complete Control of Android Device
- 19:2 : Business Email Compromise Attacks: How To Detect Them Early
- 18:33 : Nokia To Lead EU Robotics, Done Project
- 18:32 : Hackers Leak 86 Million AT&T Records with Decrypted SSNs
- 18:6 : Composing The Future Of AI: How Anat Heilper Orchestrates Breakthroughs In Silicon And Software
- 18:5 : Vulnerability Summary for the Week of May 26, 2025
- 17:33 : Malware Masquerades as Legitimate, Hidden WordPress Plugin with Remote Code Execution Capabilities
- 17:33 : 9,000 WordPress Sites Affected by Arbitrary File Upload and Deletion Vulnerabilities in WP User Frontend Pro WordPress Plugin
- 17:33 : Exploiting Clickfix: AMOS macOS Stealer Evades Security to Deploy Malicious Code
- 17:33 : Automation you can trust: Cut backlogs without breaking builds
- 17:33 : News alert: $198K in Grants Awarded to Boost Cybersecurity Workforce in Massachusetts
- 17:33 : Meta’s Secret Spyware: ‘Local Mess’ Hack Tracks You Across the Web
- 17:5 : iOS 26 und macOS 26: Neue Namen, alte Probleme? Was uns bei der WWDC erwartet
- 17:5 : iOS 26 statt iOS 19? Was du zum Namen und zu den Funktionen des iPhone-Updates wissen musst
- 17:5 : Experten zweifeln Sicherheit von Musks neuem XChat an
- 17:5 : Neue Nachricht von Whatsapp? Darum chattet der Messenger jetzt mit euch
- 17:5 : IT Security News Hourly Summary 2025-06-04 18h : 19 posts
- 17:5 : Sind Fingerabdruck-Scanner jetzt unsicher? Wer euer Handy entsperren darf – und wie ihr es verhindert
- 17:3 : Threat Actors Exploit Malware Loaders to Circumvent Android 13+ Accessibility Safeguards
- 17:3 : OpenAI hits 3M business users and launches workplace tools to take on Microsoft
- 17:3 : Your Asus router may be part of a botnet – here’s how to tell and what to do
- 17:3 : Will Massive Security Glossary From Microsoft, Google, CrowdStrike, Palo Alto Improve Collaboration?
- 17:3 : CrowdStrike’s former CTO on cyber rivalries and how automation can undermine security for early-stage startups
- 17:3 : TCS Investigates Possible Link to M&S Cyberattack
- 16:33 : SCATTERED SPIDER Hackers Target IT Support Teams & Bypass Multi-Factor Authentication
- 16:33 : Qualcomm patches three exploited security flaws, but you could still be vulnerable
- 16:33 : #Infosec2025 Cloud-Native Technology Prompts New Security Approaches
- 16:4 : New Eleven11bot Hacks 86,000 IP Cameras for Large-Scale DDoS Attack
- 16:4 : DCRat Targets Latin American Users to Steal Banking Credentials
- 16:4 : The default TV setting you should turn off ASAP – and why professionals do the same
- 16:4 : Data breach at newspaper giant Lee Enterprises affects 40,000 people
- 16:4 : 16-30 January Cyber Attacks Timeline
- 16:3 : MathWorks Hit by Ransomware Attack Affecting Over 5 Million Clients
- 16:3 : Google Exposes Vishing Group UNC6040 Targeting Salesforce with Fake Data Loader App
- 15:35 : Investitionsbooster: Steuer-Impulse und Investitionsanreize für die Industrie
- 15:34 : Meta Signs 20 Year Deal For Nuclear Power To Meet AI Demand
- 15:34 : Lumma Infostealer Developers Persist in Their Malicious Activities
- 15:34 : HashiCorp Terraform leads IBM, Red Hat integration roadmap
- 15:34 : Google to Remove Two Certificate Authorities from Chrome Root Store
- 15:33 : Threat Actors Exploit ‘Prove You Are Human’ Scheme To Deliver Malware
- 15:33 : Windows Authentication Coercion Attacks Pose Significant Threats to Enterprise Networks
- 15:33 : IBM QRadar Vulnerabilities Let Attackers Access Sensitive Configuration Files
- 15:33 : Aembit Named to Rising in Cyber 2025 List of Top Cybersecurity Startups
- 15:33 : Google fixes another actively exploited vulnerability in Chrome, so update now!
- 15:33 : Fake IT support calls hit 20 orgs, end in stolen Salesforce data and extortion, Google warns
- 15:33 : #Infosec2025: Cybersecurity Support Networks Too Fragmented for SMBs, Say Experts
- 15:2 : Attackers fake IT support calls to steal Salesforce data
- 14:33 : The Cost of a Call: From Voice Phishing to Data Extortion
- 14:33 : Hello, Operator? A Technical Analysis of Vishing Threats
- 14:33 : Federal Judges Blocks Enforcement Of Florida Social Media Ban For Kids
- 14:33 : Aembit Recognized on the 2025 Rising in Cyber List of Top Cybersecurity Startups
- 14:33 : Malicious ‘Sleeper Agent’ Browser Extensions Infected 1.5 Million Users Globally
- 14:33 : Chaos RAT Malware Targets Windows and Linux via Fake Network Tool Downloads
- 14:33 : #Infosec2025: Simplicity Should Guide Cybersecurity Purchasing Decisions
- 14:7 : Debatte in Großbritannien: Gestohlene Smartphones sollen Cloudzugang verlieren
- 14:6 : Understanding Gartner Market Guide for Cloud Web Application and API Protection: How CloudGuard WAF Sets a New Standard in Web & API Protection
- 14:6 : Mistral AI’s new coding assistant takes direct aim at GitHub Copilot
- 14:6 : Android chipmaker Qualcomm fixes three zero-days exploited by hackers
- 14:5 : HPE fixed multiple flaws in its StoreOnce software
- 14:5 : New Firefox Feature Automatically Detects Malicious Extensions by Behavior
- 14:5 : Crims stole 40,000 people’s data from our network, admits publisher Lee Enterprises
- 14:5 : Google Warns of Vishing, Extortion Campaign Targeting Salesforce Customers
- 13:34 : Mit KI gegen Hacker: ADN startet Microsoft Security Week
- 13:33 : Why It?s Time to Retire Traditional VPNs, Part 1
- 13:33 : Longstanding NATO Partnership Strengthens Our Collective Cyber Defenses
- 13:33 : New Linux PumaBot Attacking IoT Devices by Brute-Forcing SSH Credentials
- 13:33 : Hackers Weaponize Ruby Gems To Exfiltrate Telegram Tokens and Messages
- 13:33 : Going Into the Deep End: Social Engineering and the AI Flood
- 13:33 : $400Million Coinbase Breach Linked to Customer Data Leak from India
- 13:33 : TSA Cautions Passengers Against Plugging Into Public USB Charging Stations
- 13:33 : FBI Warns of Silent Ransom Group Using Phishing and Vishing to Target U.S. Law Firms
- 13:32 : Your SaaS Data Isn’t Safe: Why Traditional DLP Solutions Fail in the Browser Era
- 13:32 : #Infosec2025: UK Retail Hack Was ‘Subtle, Not Complex,’ Says River Island CISO
- 13:32 : Phishing Campaign Uses Fake Booking.com Emails to Deliver Malware
- 13:32 : #Infosec2025: Concern Grows Over Agentic AI Security Risks
- 12:37 : [NEU] [hoch] Dell PowerScale: Mehrere Schwachstellen
- 12:36 : Smartphone Shipment Growth Down By Half, Warns Counterpoint
- 12:36 : Windows Authentication Coercion Attacks Present Major Risks to Enterprise Networks
- 12:36 : Don’t Be a Statistic: Proactive API Security in the Age of AI
- 12:35 : Cobalt improves pentest transparency, automation, and risk prioritization
- 12:35 : Widespread Campaign Targets Cybercriminals and Gamers
- 12:10 : [UPDATE] [hoch] util-linux: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen
- 12:10 : [UPDATE] [mittel] HTTP/2: Mehrere Schwachstellen ermöglichen Denial of Service
- 12:10 : [UPDATE] [hoch] less: Schwachstelle ermöglicht Codeausführung
- 12:10 : [UPDATE] [mittel] CUPS: Schwachstelle ermöglicht Manipulation von Dateien
- 12:10 : [UPDATE] [hoch] IBM QRadar SIEM: Mehrere Schwachstellen
- 12:8 : How to Protect Your Online Presence from Devastating DDoS Attacks
- 12:8 : 35,000 Internet-Connected Solar Power Systems Vulnerable to Cyberattacks
- 12:8 : Roundcube Webmail under fire: critical exploit found after a decade
- 12:8 : Forget Your Tech Stack – Focus on Sales First with Paul Green
- 12:8 : Compyl Raises $12 Million for GRC Platform
- 12:8 : ThreatBook Selected in the First-ever Gartner® Magic Quadrant™ for Network Detection and Response (NDR)
- 12:8 : Malicious PyPI, npm, and Ruby Packages Exposed in Ongoing Open-Source Supply Chain Attacks
- 12:8 : #Infosec2025: Device Theft Causes More Data Loss Than Ransomware
- 12:8 : OneDrive flaw can give websites and apps full access to your files, even if you pick just one
- 11:33 : [UPDATE] [mittel] avahi: Mehrere Schwachstellen ermöglichen Manipulation von Dateien
- 11:33 : APT37 Hackers Fake Academic Forum Invites to Deliver Malicious LNK Files via Dropbox Platform
- 11:32 : North Face Fashion Brand Warns of Credential Stuffing Attack
- 11:32 : State-Sponsored Groups Actively Targeting Manufacturing Sector & OT systems
- 11:32 : Ramnit Malware Infections Spike in OT as Evidence Suggests ICS Shift
- 11:32 : ThreatBook Selected in the First-ever Gartner® Magic Quadrant™ for Network Detection and Response (NDR)
- 11:32 : Google fixes Chrome zero-day with in-the-wild exploit (CVE-2025-5419)
- 11:5 : ChatGPT: So nutzt ihr die Memory-Funktion der KI jetzt auch ohne Abo
- 11:5 : Microsofts Azure-CTO über Vibe-Coding: „Es gibt eine Obergrenze“
- 11:5 : Wie KI lernen soll, was sie nicht weiß
- 11:5 : Samsung-Nutzer: Warum ihr euch jetzt in euren Account einloggen solltet
- 11:5 : Google zieht die Notbremse: Rollout für KI-Feature wird vorerst gestoppt
- 11:5 : Fiese Schnüffelei: Meta und Yandex spionierten Nutzer ihrer Android-Apps aus
- 11:5 : Kaspersky präsentiert dir eine Checkliste für einen sicheren Urlaub | Offizieller Blog von Kaspersky
- 11:5 : Solarkomponenten angreifbar: 35.000 Admin-Panels frei zugänglich im Netz
- 11:5 : [UPDATE] [mittel] Linux Kernel: Schwachstelle ermöglicht nicht spezifizierten Angriff
- 11:5 : [UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service und unspezifischen Angriff
- 11:5 : [UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service und unspezifische Angriffe
- 11:4 : New Malware Attack Uses Malicious Chrome & Edge Extensions to Steal Sensitive Data
- 11:4 : The Race to Build Trump’s ‘Golden Dome’ Missile Defense System Is On
- 11:4 : The Ramifications of Ukraine’s Drone Attack
- 11:3 : Microsoft Defender for Endpoint Contained 120,000 & Saved 180,000 Devices From Cyberattack
- 11:3 : Russian Hacker Black Owl Attacking Critical Industries To Steal Financial Details
- 11:3 : Wireshark Certified Analyst: Official Wireshark Certification Released for Security Professionals
- 11:3 : Apple’s iOS Activation Vulnerability Allows Injection of Unauthenticated XML Payloads
- 11:3 : ThreatSpike Raises $14 Million in Series A Funding
- 11:3 : Webinar Today: Redefining Vulnerability Management With Exposure Validation
- 11:3 : ThreatBook Selected in the First-ever Gartner® Magic Quadrant™ for Network Detection and Response (NDR)
- 10:34 : IT-Vorfall bei Connectwise: Staatliche Cyberkriminelle eingebrochen
- 10:33 : Wireshark Certified Analyst – Wireshark Released Official Certification for Security Professionals
- 10:33 : IBM QRadar Vulnerabilities Expose Sensitive Configuration Files to Attackers
- 10:33 : You’re Not Ready for Quantum Cracks
- 10:33 : You’re Not Ready
- 10:33 : A GPS Blackout Would Shut Down the World
- 10:33 : The US Grid Attack Looming on the Horizon
- 10:33 : The Rise of ‘Vibe Hacking’ Is the Next AI Nightmare
- 10:33 : Victoria’s Secret Says It Will Postpone Earnings Report After Recent Security Breach
- 10:32 : ThreatBook Selected in the First-ever Gartner® Magic Quadrant™ for Network Detection and Response (NDR)
- 10:4 : [UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen
- 10:4 : [UPDATE] [hoch] bluez: Schwachstelle ermöglicht Codeausführung
- 10:4 : [UPDATE] [niedrig] Linux Kernel: Mehrere Schwachstellen
- 10:4 : [UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service
- 10:3 : New Crocodilus Malware Grants Full Control Over Android Devices
- 10:3 : U.S. CISA adds Multiple Qualcomm chipsets flaws to its Known Exploited Vulnerabilities catalog
- 10:3 : Thousands Hit by The North Face Credential Stuffing Attack
- 10:3 : ThreatBook Selected in the First-ever Gartner® Magic Quadrant™ for Network Detection and Response (NDR)
- 9:35 : Angriffe laufen: Connectwise, Craft CMS und Asus-Router im Visier
- 9:34 : Phishing e-mail that hides malicious link from Outlook users, (Wed, Jun 4th)
- 9:34 : Pornhub Exits France Over Age Verification Law
- 9:34 : StormWall Reveals India, China and US Faced Most DDoS Attacks in Q1 2025
- 9:34 : The Future of Cybersecurity Standards for Global Federal Energy Systems
- 9:33 : CISA Releases ICS Advisories Covering Vulnerabilities & Exploits
- 9:33 : DollyWay World Domination Attack Hacked 20,000+ Sites & Redirects Users to Malicious Sites
- 9:33 : Threat Actors Bribed Overseas Support Agents to Steal Coinbase Customer Data
- 9:33 : Russian Dark Web Markets Most Popular Tools Fuels Credential Theft Attacks
- 9:33 : Cryptography Essentials – Securing Data with Modern Encryption Standards
- 9:33 : UK CyberEM Command to spearhead new era of armed conflict
- 9:33 : ThreatBook Selected in the First-ever Gartner® Magic Quadrant™ for Network Detection and Response (NDR)
- 9:5 : Datenleck bei Unterwegs: Großer Outdoor-Shop bestätigt Cyberangriff
- 9:5 : [NEU] [mittel] ZScaler Client Connector für MacOS: Schwachstelle ermöglicht Privilegieneskalation
- 9:5 : [NEU] [UNGEPATCHT] [hoch] libxml2: Mehrere Schwachstellen ermöglichen Denial of Service
- 9:3 : What 17,845 GitHub Repos Taught Us About Malicious MCP Servers
- 9:3 : Threat Actors Abuse ‘Prove You Are Human’ System to Distribute Malware
- 9:3 : Threat Actor Bribes Overseas Support Agents to Steal Coinbase Customer Data
- 9:3 : Podcast Episode: Why Three is Tor’s Magic Number
- 9:3 : ThreatBook Selected in the First-ever Gartner® Magic Quadrant™ for Network Detection and Response (NDR)
- 8:35 : Samsung Android: Mehrere Schwachstellen
- 8:35 : [UPDATE] [hoch] Red Hat Enterprise Linux (Advanced Cluster Management): Mehrere Schwachstellen
- 8:35 : [UPDATE] [hoch] Red Hat Enterprise Linux (Podman und Buildah): Schwachstelle ermöglicht Manipulation von Dateien
- 8:35 : [UPDATE] [mittel] libtasn1: Schwachstelle ermöglicht Denial of Service
- 8:35 : [UPDATE] [mittel] GnuTLS: Schwachstelle ermöglicht Denial of Service
- 8:35 : [UPDATE] [mittel] Intel Prozessoren: Mehrere Schwachstellen
- 8:32 : Microsoft Defender for Endpoint Prevents Cyberattack,Secures 180,000 Devices
- 8:32 : 35,000 Solar Power Systems Exposed to Internet
- 8:32 : ThreatBook Selected in the First-ever Gartner® Magic Quadrant™ for Network Detection and Response (NDR)
- 8:32 : Salt Illuminate strengthens API security
- 8:32 : #Infosec2025: Startups Focus on Visibility and Governance, not AI
- 8:11 : [UPDATE] [niedrig] GNU libc: Schwachstelle ermöglicht Denial of Service
- 8:11 : [UPDATE] [mittel] Red Hat Enterprise Linux (libxslt): Schwachstelle ermöglicht DoS und Codeausführung
- 8:11 : [UPDATE] [hoch] Linux Kernel: Mehrere Schwachstellen
- 8:10 : Hackers Exploit Ruby Gems to Steal Telegram Tokens and Messages
- 8:10 : Cartier disclosed a data breach following a cyber attack
- 8:10 : TXOne Networks unveils intelligent vulnerability mitigation capability
- 8:10 : Ukraine war spurred infosec vet Mikko Hyppönen to pivot to drones
- 8:10 : ThreatBook Selected in the First-ever Gartner® Magic Quadrant™ for Network Detection and Response (NDR)
- 8:10 : Varonis Identity Protection unifies identity and data security
- 8:10 : Zscaler empowers businesses to extend zero trust everywhere
- 8:10 : #Infosec2025: Majority of Compromises Caused by Stolen Credentials, No MFA
- 8:5 : IT Security News Hourly Summary 2025-06-04 09h : 8 posts
- 7:35 : Brandschutz auf einen Blick
- 7:35 : Patchday Android: Angreifer können sich höhere Rechte verschaffen
- 7:34 : Mecklenburg-Vorpommern: Hackerangriff trifft Diensthandys der Polizei
- 7:34 : Anzeige: Kostenfreie Weiterbildung zu IT-Sicherheit im Webdevelopment
- 7:33 : Custom Active Directory Extensions Create Stealthy Backdoors for Corporate Attacks
- 7:33 : Custom Active Directory Client-Side Extensions Enable Stealthy Corporate Backdoors
- 7:33 : ThreatBook Selected In The First-ever Gartner® Magic Quadrant™ For Network Detection And Response (NDR)
- 7:33 : Governments Losing Efforts To Gain Backdoor Access To Secure Communications – New Report
- 7:33 : How to Conduct a Red Team Exercise – Step-by-Step Guide
- 7:33 : Stay Ahead of Identity Threats with Grip ITDR 2.0 | Grip
- 7:33 : ThreatBook Selected in the First-ever Gartner® Magic Quadrant™ for Network Detection and Response (NDR)