197 posts were published in the last hour
- 21:38 : Kali Linux gets a UI refresh, new tools, and an updated car hacking toolset
- 21:38 : Connectivity is a Lifeline, Not a Luxury: Telecom Blackouts in Gaza Threaten Lives and Digital Rights
- 21:38 : How AWS improves active defense to empower customers
- 21:4 : Google’s Advanced Protection Arrives on Android: Should You Use It?
- 20:32 : Why 99% Accuracy Isn’t Good Enough: The Reality of ML Malware Detection
- 20:32 : 1Password and AWS join forces to secure AI, cloud environments for the enterprise
- 20:5 : Whatsapp-Scanner kommt: Warum die neue Funktion weit mehr als nur eine Spielerei ist
- 20:5 : Fehler? Microsoft bringt den Start-Ton von Windows Vista zurück
- 20:5 : IT Security News Hourly Summary 2025-06-16 21h : 12 posts
- 20:4 : EFF to NJ Supreme Court: Prosecutors Must Disclose Details Regarding FRT Used to Identify Defendant
- 19:34 : What is HMAC (Hash-Based Message Authentication Code)?
- 19:34 : Washington Post Journalists’ Microsoft Accounts Hacked in Targeted Cyberattack
- 19:3 : Washington Post Hacked – Multiple Journalists’ Email Accounts Compromised
- 19:3 : Katz Stealer Boosts Credential Theft with System Fingerprinting and Persistence Mechanisms
- 19:3 : CISA Adds Two Known Exploited Vulnerabilities to Catalog
- 19:3 : Law enforcement operation shut down dark web drug marketplace Archetyp Market
- 19:3 : Remorseless extortionists claim to have stolen thousands of files from Freedman HealthCare
- 19:3 : U.S. Seizes $7.74M in Crypto Tied to North Korea’s Global Fake IT Worker Network
- 18:34 : How to Remove a Virus From Your Android Phone in 4 Simple Steps
- 18:34 : Hackers Upload Weaponized Packages to PyPI Repositories to Steal AWS Tokens and Sensitive Data
- 18:5 : How Much Data Does Streaming Use? + 5 Tips to Manage Data
- 18:5 : Do iPhones Need Antivirus Software? iPhone Security Considerations + Safety Tips
- 18:5 : Malicious Payload Found in JPEG Image Using Steganography and Base64 Obfuscation
- 18:5 : Massive JSFireTruck Malware Campaign Infects Over 269,000 Websites
- 17:32 : Report Links Los Pollos and RichAds to Malware Traffic Operations
- 17:9 : The data on denying social media for kids (re-air) (Lock and Code S06E12)
- 17:9 : Washington Post Journalists’ Microsoft Accounts Hacked in Targetetd Cyberattack
- 17:9 : Protecting Minors Online Must Not Come at the Cost of Privacy and Free Expression
- 17:5 : IT Security News Hourly Summary 2025-06-16 18h : 12 posts
- 16:38 : Anzeige: Microsoft-365-Umgebungen umfassend absichern
- 16:37 : 3 leading multifactor authentication tool providers
- 16:37 : Canada’s WestJet says ‘expect interruptions’ online as it navigates cybersecurity turbulence
- 16:37 : LinuxFest Northwest: Beyond ARIA Labels What A Blind Film Enthusiast Can Teach Us About Open Source
- 16:7 : AI Skills Shortage Deepens as Enterprise Demand Grows Faster Than Talent Supply
- 16:7 : United Natural Foods Confirms Network Disruption from Cyberattack
- 16:7 : Understanding the Dynamic threat Landscape of Ransomware Attacks
- 16:7 : Cisco Introduces New Tools to Protect Networks from Rogue AI Agents
- 16:7 : Threat Actors Target Victims with HijackLoader and DeerStealer
- 15:34 : Car-sharing giant Zoomcar says hacker accessed personal data of 8.4 million users
- 15:34 : As grocery shortages persist, UNFI says it’s recovering from cyberattack
- 15:34 : Google’s $32 Billion Wiz Deal Draws DOJ Antitrust Scrutiny: Report
- 15:6 : Ongoing Money Laundering Insights
- 15:6 : Car sharing giant Zoomcar says hacker accessed personal data of 8.4 million users
- 15:6 : Microsoft Outlook Users Face Crashes When Creating New Emails, Temp Fix Issued
- 15:6 : Darknet Market Archetyp Takedown by Authorities in Joint Action ‘Operation Deep Sentinel’
- 15:6 : Former GCHQ Intern Jailed for Seven Years After Copying Top Secret Files to Mobile Phone
- 15:6 : Vulnerability Summary for the Week of June 9, 2025
- 15:5 : ⚡ Weekly Recap: iPhone Spyware, Microsoft 0-Day, TokenBreak Hack, AI Data Leaks and More
- 15:5 : Anubis Ransomware Encrypts and Wipes Files, Making Recovery Impossible Even After Payment
- 15:5 : Archetyp Market Shut Down in Europe-wide Law Enforcement Operation
- 14:34 : Mastering Kubernetes Observability: Boost Performance, Security, and Stability With Tracestore, OPA, Flagger, and Custom Metrics
- 14:34 : Eurocops arrest suspected Archetyp admin, shut down mega dark web drug shop
- 14:34 : ⚡ Weekly Recap: iPhone Spyware, Microsoft 0-Day, TokenBreak Hack, AI Data Leaks and More
- 14:6 : KI und Copyright: Hat Metas KI-Modell zu viel von Harry Potter gelernt?
- 14:6 : Bald auf dem Google-Friedhof: Instant Apps werden endgültig eingestellt – was das für euch bedeutet
- 14:6 : Abos und Werbeanzeigen in Whatsapp: Worauf ihr euch ab sofort einstellen müsst
- 14:6 : Wegen Windows 95: Wie ein Microsoft-Manager eine Ladenkasse zum Abstürzen brachte
- 14:5 : IT Security News Hourly Summary 2025-06-16 15h : 20 posts
- 14:4 : Archetyp Dark Web Market Seized, Admin Arrested in Spain
- 14:4 : Hackers Target and Hijack Washington Post Journalists’ Email Accounts
- 14:4 : Introducing the Ticket Enrichment AI Agent
- 14:4 : Malicious Loan App Removed from iOS and Google Play App Store Posed Severe Risks to Users
- 14:4 : What is a compliance audit? (With an example checklist)
- 14:4 : Katz Stealer Enhances Credential Theft Capabilities with System Fingerprinting and Persistence Mechanisms
- 14:4 : Microsoft Purview DLP to Restrict Microsoft 365 Copilot in Processing Emails With Sensitive Labels
- 14:4 : Zoomcar Hacked – 8.4 Million Users’ Sensitive Details Exposed
- 14:3 : Automated Guard Rails for Vibe Coding
- 14:3 : ⚡ Weekly Recap: iPhone Spyware, Microsoft 0-Day, TokenBreak Hack, AI Data Leaks and More
- 13:34 : Sicherheitsbeauftragter werden: So funktioniert’s
- 13:34 : Enhancements to Akamai API Security, Q2 2025
- 13:33 : Mac Mini won’t power on? Apple will fix it for you – for free
- 13:33 : Collaborating with the World Economic Forum to Advance Systemic Defense Solutions to Protect Our Digital Ecosystem
- 13:33 : Salesforce study finds LLM agents flunk CRM and confidentiality tests
- 13:33 : Archetyp Dark Web Market Shut Down by Law Enforcement
- 13:33 : App Store Security Threats in 2025: Why Hackers Target Mobile Ecosystems
- 13:33 : SinoTrack GPS vulnerabilities may allow attackers to track, control vehicles
- 13:33 : History made as MI6 appoints first female Chief
- 13:33 : Cyolo expands remote access coverage for OT and cyber-physical systems
- 13:33 : ⚡ Weekly Recap: iPhone Spyware, Microsoft 0-Day, TokenBreak Hack, AI Data Leaks and More
- 13:3 : The Impact of Quantum Decryption
- 13:3 : Operation Deep Sentinel: Authorities Shut Down Darknet Market Archetyp
- 13:3 : Zoomcar Data Breach Exposes Sensitive Details of 8.4 Million Users
- 13:3 : Microsoft adds export option to Windows Recall in Europe
- 13:3 : Washington Post Journalists’ Microsoft Email Accounts Hacked
- 13:3 : ⚡ Weekly Recap: iPhone Spyware, Microsoft 0-Day, TokenBreak Hack, AI Data Leaks and More
- 12:36 : Threat Actors Deploy XWorm Malware via Fake Travel Websites to Infect Users’ PCs
- 12:36 : Canadian Airline WestJet Suffers Cyberattack, Halts App and Web Services
- 12:36 : BERT Ransomware Escalates Attacks on Linux Machines with Weaponized ELF Files
- 12:36 : Scaling Beyond Borders: Establishing a Global Footprint
- 12:36 : How PureVPN’s Password Manager Closes A Major Security Gap Hackers Exploit
- 12:36 : Malicious Payload Uncovered in JPEG Image Using Steganography and Base64 Obfuscation
- 12:36 : 46,000+ Grafana Instances Exposed to Malicious Account Takeover Attacks
- 12:36 : 20+ Malicious Apps on Google Play Actively Attacking Users to Steal Login Credentials
- 12:36 : Hackers Upload Weaponized Packages to PyPI Repositories to Steal AWS, CI/CD and macOS Data
- 12:36 : Zoomcar Says Hackers Accessed Data of 8.4 Million Users
- 12:36 : Asheville Eye Associates Says 147,000 Impacted by Data Breach
- 12:36 : Police shut down long-running dark web drug market
- 12:36 : Playbook: Transforming Your Cybersecurity Practice Into An MRR Machine
- 12:36 : ⚡ Weekly Recap: iPhone Spyware, Microsoft 0-Day, TokenBreak Hack, AI Data Leaks and More
- 12:2 : North Korean APT Hackers Target Ukrainian Government Agencies to Steal Login Credentials
- 12:2 : New Anubis RaaS includes a wiper module
- 11:35 : BKA schaltet Darknet-Marktplatz “Archetyp Market” ab
- 11:35 : [NEU] [mittel] OTRS: Schwachstelle ermöglicht nicht spezifizierten Angriff
- 11:35 : Got a new password manager? How to clean up the credential mess you left in the cloud
- 11:34 : Generative AI Is Moving Fast. Are Your Security Practices Keeping Up?
- 11:34 : 240,000 Impacted by Data Breach at Eyecare Tech Firm Ocuco
- 11:34 : GUEST ESSAY: The AI illusion: Don’t be fooled, innovation without guardrails is just risk–at scale
- 11:34 : Tenable Fixes Three High-Severity Flaws in Vulnerability Scanner Nessus
- 11:5 : IT Security News Hourly Summary 2025-06-16 12h : 20 posts
- 11:4 : 5 Dinge, die du diese Woche wissen musst: Rückschau auf die WWDC – wo hat Apple wirklich überzeugt?
- 11:4 : Nie wieder schädliche Links: Diese Android-App schützt euch vor versteckter Malware
- 11:4 : "Höchste Priorität": Mark Zuckerberg sucht 50 Experten für sein KI-Team – wir hätten da ein paar Vorschläge
- 11:3 : Hackers Compromise Discord Invite to Inject Malicious Links Delivering AsyncRAT
- 11:3 : Hackers Can Hide Images in Text Data and Embeds Directly into DNS TXT Records
- 11:3 : North Korean APT Hackers Attacking Ukrainian Government Agencies to Steal Login Credentials
- 11:2 : Threat Actors Using Fake Travel Websites to Infect Users’ PCs with XWorm Malware
- 11:2 : Spy school dropout: GCHQ intern jailed for swiping classified data
- 10:38 : Carsenal: Neues Kali Linux enthält Tools zum Hacken von Autos
- 10:38 : [UPDATE] [mittel] OWASP ModSecurity: Schwachstelle ermöglicht Denial of Service
- 10:38 : [NEU] [hoch] PostgreSQL JDBC Treiber: Schwachstelle ermöglicht Offenlegung von Informationen
- 10:37 : US ‘Reviews’ Google’s $32bn Wiz Buy Over Competition Concerns
- 10:37 : China Postpones Approval Of $35bn Synopsys-Ansys Merger
- 10:37 : GrayAlpha Hackers Group Exploits Browser Updates to Deploy PowerNet Loader and NetSupport RAT
- 10:37 : Why We Made a Guide to Winning a Fight
- 10:37 : The WIRED Guide to Protecting Yourself From Government Surveillance
- 10:37 : 6 Tools for Tracking the Trump Administration’s Attacks on Civil Liberties
- 10:37 : How to Protect Yourself From Phone Searches at the US Border
- 10:37 : Anubis Ransomware Packs a Wiper to Permanently Delete Files
- 10:3 : Anubis Ransomware Introduces Irreversible File Destruction Feature
- 10:3 : Microsoft Purview DLP Now Controls Copilot’s Access to Sensitive Email Data
- 10:3 : Over 20 Malicious Google Play Apps Steal Users’ Login Credentials
- 10:3 : New Predator spyware infrastructure revealed activity in Mozambique for the first time
- 10:3 : Red Teaming AI: The Build Vs Buy Debate
- 10:3 : Hacktivists Strike Within Minutes of Israel Missile Attacks on Iran Nuclear Sites
- 10:3 : Anubis Ransomware Adds File-Wiping Capability
- 9:35 : Apple ‘Eyes Spring 2026’ For Delayed Siri AI Upgrade
- 9:35 : AstraZeneca In $5.3bn AI Drug Discovery Deal With China’s CSPC
- 9:35 : Gemini, Coinbase Set To Receive EU Crypto Licences
- 9:35 : Apple Hits Top Spot In China After Price Cuts
- 9:35 : Hackers Hijacked Discord Invite to Inject Malicious Links That Deliver AsyncRAT
- 9:35 : Hackers Could Hide Images in Text Data and Embeds Directly into DNS TXT Records
- 9:35 : Over a Third of Grafana Instances Exposed to XSS Flaw
- 9:6 : Juni-Patchday: Windows-Update macht Fujitsu-Rechner kaputt
- 9:6 : [NEU] [niedrig] Grafana: Schwachstelle ermöglicht Offenlegung von Informationen
- 9:5 : A JPEG With A Payload, (Mon, Jun 16th)
- 9:5 : Brace Yourselves: The Game-Changing Impact of India’s DPDP Act, 2023
- 9:5 : Canadian Airline WestJet Hit by Cyberattack
- 9:5 : High-Severity Vulnerabilities Patched in Tenable Nessus Agent
- 8:33 : [NEU] [UNGEPATCHT] [niedrig] libxml2: Schwachstelle ermöglicht Denial of Service
- 8:33 : [NEU] [mittel] M-Files Server: Schwachstelle ermöglicht Offenlegung von Informationen
- 8:32 : Google Massive Cloud Outage Linked to API Management System
- 8:32 : How collaborative security can build you a better business
- 8:32 : WestJet Investigates Cyber-Attack Impacting Customers
- 8:5 : IT Security News Hourly Summary 2025-06-16 09h : 1 posts
- 8:3 : GoldFactory: Cyberkriminelle stehlen dein Gesicht
- 7:36 : Marktübersicht: Vielfalt bei automatischen Löschanlagen
- 7:36 : Dell ControlVault: Angreifer können Systeme vollständig kompromittieren
- 7:36 : Kein Geld zu holen: Kidnapper lassen Krypto-Influencer wegen Pleite wieder frei
- 7:35 : Temu Resumes Direct Shipments From China After Trade Talks
- 7:35 : Uncovering the Technique of Hiding Images in DNS TXT Entries
- 7:35 : Anubis Ransomware With Wipe Mode That Permanently Erases File With No Recovery Option
- 7:35 : IBM Backup Services Vulnerability Let Attackers Escalate Privileges
- 7:35 : GrayAlpha Hacker Group Weaponizes Browser Updates to Deploy PowerNet Loader and NetSupport RAT
- 7:35 : A week in security (June 9 – June 15)
- 7:35 : Washington Post hacked, WestJet suffers cyberattack, Texas DoT breach
- 7:6 : Pride Tech: LGBTIQ+ Digital Security
- 7:6 : IBM Backup Services Flaw Allows Hackers to Gain Elevated Access
- 7:6 : Google Cloud Suffers Major Disruption After API Management Error
- 7:6 : Cities of the Future or Hacker’s Paradise? The Cybersecurity Risks of Smart Cities
- 7:6 : Protecting Against Origin Server DDoS Attacks
- 7:6 : Malicious PyPI Package Masquerades as Chimera Module to Steal AWS, CI/CD, and macOS Data
- 7:6 : Cybersecurity Today: WestJet Cyber Incident, Anubis Ransomware Evolution, Discord Exploits, and Google Cloud Outage
- 6:34 : KIA Ecuador Keyless Entry Systems Vulnerability Faces Major Theft Threat
- 6:3 : Why banks’ tech-first approach leaves governance gaps
- 5:37 : Anzeige: Von CRA bis ISO – neue IT-Sicherheitsregularien meistern
- 5:36 : MDEAutomator: Open-source endpoint management, incident response in MDE
- 5:5 : IT Security News Hourly Summary 2025-06-16 06h : 1 posts
- 5:4 : Virtual kidnapping scams prey on our worst fears
- 4:37 : Google Chrome und Microsoft Edge: Mehrere Schwachstellen ermöglichen Codeausführung
- 4:37 : [UPDATE] [hoch] Google Chrome und Microsoft Edge: Mehrere Schwachstellen ermöglichen Codeausführung
- 4:36 : Why CISOs need to understand the AI tech stack
- 4:36 : Review: Learning Kali Linux, 2nd Edition
- 3:34 : AT&T Customers at Risk Again After New Data Leak
- 3:2 : KIA Ecuador Keyless Entry Systems Vulnerability Exposes Thousands of Vehicles to Theft
- 3:2 : Armored cash transport trucks allegedly hauled money for $190 million crypto-laundering scheme
- 2:5 : IT Security News Hourly Summary 2025-06-16 03h : 3 posts
- 2:4 : ISC Stormcast For Monday, June 16th, 2025 https://isc.sans.edu/podcastdetail/9494, (Mon, Jun 16th)
- 0:37 : Scalable Secrets Management for Growing Businesses
- 0:37 : Gain Full Control Over Your Digital Identities
- 0:37 : Drive Innovation Through Advanced NHI Management
- 23:5 : IT Security News Hourly Summary 2025-06-16 00h : 2 posts
- 23:0 : Metas KI-Forscherin warnt: „Je autonomer Agenten sind, desto schwieriger wird es für Menschen, sie zu knacken“
- 22:58 : IT Security News Weekly Summary 24
- 22:55 : IT Security News Daily Summary 2025-06-15
- 22:36 : How to delete your 23andMe data
- 22:9 : Hackers Leak Data of 10,000 VirtualMacOSX Customers in Alleged Breach
- 22:9 : Dems demand audit of CVE program as Federal funding remains uncertain