210 posts were published in the last hour
- 21:34 : AWS locks down cloud security, hits 100% MFA enforcement for root users
- 21:5 : Scattered Spider Aims at US Insurers After UK Retail Hit, Google Warns
- 21:5 : New ClickFix Malware Variant ‘LightPerlGirl’ Targets Users in Stealthy Hack
- 20:32 : WhatsApp to start targeting you with ads
- 20:5 : IT Security News Hourly Summary 2025-06-17 21h : 3 posts
- 20:2 : Pro-Israel hacktivist group claims responsibility for alleged Iranian bank hack
- 19:33 : New Sorillus RAT Targets European Organizations Through Tunneling Services
- 19:33 : ChatGPT can now connect to MCP servers – here’s how, and what to watch for
- 19:33 : Think Before You Click: ‘Unsubscribe’ Buttons Could Be a Trap, Experts Warn
- 19:32 : LinuxFest Northwest: Challenges of Managing Community Meetup Post-Pandemic
- 19:32 : Google Chrome Zero-Day CVE-2025-2783 Exploited by TaxOff to Deploy Trinper Backdoor
- 19:5 : 11 Simple Ways to Remove Your Information From the Internet
- 19:5 : New KimJongRAT Stealer Uses Weaponized LNK File to Deploy PowerShell-Based Dropper
- 18:34 : New Chaos RAT Variants Targeting Windows and Linux Systems to Steal Sensitive Data
- 18:34 : Why SMS two-factor authentication codes aren’t safe and what to use instead
- 18:34 : Google’s Gerrit Code Platform Vulnerability Allows Hack of 18 Google Projects Including ChromiumOS
- 18:2 : New Sophisticated Multi-Stage Malware Campaign Uses VBS Files to Execute PowerShell Script
- 18:2 : LangSmith Bug Could Expose OpenAI Keys and User Data via Malicious Agents
- 17:36 : Github-CEO erklärt: So können sich Entwickler im KI-Zeitalter durchsetzen
- 17:35 : Beware: Weaponized Research Papers Delivering Malware Through Password-Protected Documents
- 17:35 : Pro-Israel hacktivist group claims reponsibility for alleged Iranian bank hack
- 17:35 : New Veeam Vulnerabilities Enables Malicious Remote Code Execution on Backup Servers
- 17:35 : How to Detect Threats Early For Fast Incident Response: 3 Examples
- 17:35 : DanaBot Malware Network Disrupted After Researchers Discover Key Flaw
- 17:10 : XDSpy Threat Actors Exploit Windows LNK Zero-Day Vulnerability to Target Windows System Users
- 17:10 : Kimsuky and Konni APT Groups Lead Active Attacks Targeting East Asia
- 17:10 : Sitecore CMS flaw let attackers brute-force ‘b’ for backdoor
- 17:9 : Baby Tigers Bite — The Hidden Risks of Scaling AI Too Fast
- 17:9 : U.S. Moves to Collect $7.74 Million Tied to N. Korea IT Worker Scam
- 17:5 : IT Security News Hourly Summary 2025-06-17 18h : 15 posts
- 16:33 : Hacklink Market Linked to SEO Poisoning Attacks in Google Results
- 16:33 : Siemens Mendix Studio Pro
- 16:33 : Fuji Electric Smart Editor
- 16:33 : CISA Releases Five Industrial Control Systems Advisories
- 16:33 : Dover Fueling Solutions ProGauge MagLink LX Consoles
- 16:33 : LS Electric GMWin 4
- 16:32 : How AWS is simplifying security at scale: Four keys to faster innovation from AWS re:Inforce 2025
- 16:32 : Improve your security posture using Amazon threat intelligence on AWS Network Firewall
- 16:32 : Secure your Express application APIs in minutes with Amazon Verified Permissions
- 16:4 : Adobes KI-App ist da: Was Firefly auf dem Smartphone für Kreativ-Workflows bedeutet
- 16:4 : Cybertrading-Betrug: Ermittler nehmen fast 800 Domains vom Netz
- 16:3 : How to Get Hacked on Facebook
- 16:3 : New Microsoft Excel Token Protection Policy May Block Certain Data Imports
- 16:3 : Citrix NetScaler ADC and Gateway Vulnerabilities Allow Attackers to Access Sensitive Data
- 16:3 : Email Hosting Provider Cock.li Hacked – 1 Million Email Addresses Stolen
- 16:3 : Researchers unearth keyloggers on Outlook login pages
- 16:3 : Beyond compute: Shifting vulnerability detection left with Amazon Inspector code security capabilities
- 15:39 : Rapid Rebuild Hackathon 2025: When Legacy Meets Innovation
- 15:39 : M&S Faces £300M Loss After Cyberattack Involving DragonForce and Scattered Spider
- 15:39 : Data Security Posture Insights: Overcoming Complexity and Threat Landscape
- 15:39 : AI Integration Raises Alarms Over Enterprise Data Safety
- 15:39 : Hacklink Marketplace Fuels Surge in Covert SEO Poisoning Attacks
- 15:10 : ChatGPT und Co.: Diese 6 Geheimnisse solltet ihr besser für euch behalten!
- 15:9 : Redefining identity security in the age of agentic AI
- 14:38 : Obwohl sie erst wenige Monate aktiv ist: Das ist die derzeit gefährlichste Ransomware-Gruppe
- 14:38 : Datenschutz: Wie viel EU steckt in DNS4EU?
- 14:36 : How to Achieve SOC 2 Compliance in AWS Cloud Environments
- 14:36 : Kali vs. ParrotOS: Security-focused Linux distros compared
- 14:36 : Tips to make your summer travels cyber safe
- 14:36 : U.S. CISA adds Apple products, and TP-Link routers flaws to its Known Exploited Vulnerabilities catalog
- 14:35 : WhatsApp to Show Ads for Users in Status & Updates Tab
- 14:35 : Critical Sitecore CMS Platform Vulnerabilities Let Attackers Gain Full Control of Deployments
- 14:35 : New Sorillus RAT Actively Attacking European Organizations Via Tunneling Services
- 14:35 : BeyondTrust Tools RCE Vulnerability Let Attackers Execute Arbitrary Code
- 14:35 : The Quantum Supply Chain Risk: How Quantum Computing Will Disrupt Global Commerce
- 14:35 : What Is Vulnerability Prioritization? A No-Fluff Playbook
- 14:35 : Aravo Evaluate Engine manages and optimizes third-party risks
- 14:35 : Silver Fox APT Targets Taiwan with Complex Gh0stCringe and HoldingHands RAT Malware
- 14:6 : Windows Hello: Warum die Gesichtserkennung bei schlechtem Licht nicht mehr funktioniert
- 14:5 : 23andMe hit with £2.3M fine after exposing genetic data of millions
- 14:5 : Free AI coding security rules now available on GitHub
- 14:5 : UK ICO Fines 23andMe £2.3m for Data Protection Failings
- 14:5 : Introducing the new console experience for AWS WAF
- 14:5 : IT Security News Hourly Summary 2025-06-17 15h : 11 posts
- 13:34 : Von Schloss bis Cloud: Zutrittskontrolle von BKS
- 13:34 : How Long Until the Phishing Starts? About Two Weeks, (Tue, Jun 17th)
- 13:34 : Critical Vulnerabilities in Sitecore Could Lead to Widespread Enterprise Attacks
- 13:34 : BeyondTrust Tools RCE Vulnerability Allows Attackers Execute Arbitrary Code
- 13:33 : Without automation, external attack surface management misses the point
- 13:33 : DMV-Themed Phishing Campaign Targeting U.S. Citizens
- 13:33 : The default TV setting you should turn off immediately – and why experts recommend it
- 13:33 : Threat Group Targets Companies in Taiwan
- 13:33 : New Variants of Chaos RAT Attacking Windows and Linux Systems to Steal Sensitive Data
- 13:33 : ASUS Armoury Crate Vulnerability Let Attackers Escalate to System User on Windows Machine
- 13:33 : New KimJongRAT Stealer Using Weaponized LNK File to Deploy Powershell Based Dropper
- 13:33 : Zyxel Firewall Vulnerability Again in Attacker Crosshairs
- 13:33 : Google Warns of Scattered Spider Attacks Targeting IT Support Teams at U.S. Insurance Firms
- 13:33 : Taiwan Hit by Sophisticated Phishing Campaign
- 12:41 : Deutschlandticket ohne App-Zwang
- 12:41 : Videoüberwachung
- 12:40 : Hackers Manipulate Search Engines to Push Malicious Sites
- 12:40 : Google Chrome 0-Day Vulnerability Exploited by APT Hackers in the Wild
- 12:40 : Critical sslh Vulnerabilities Let Hackers Trigger Remote DoS Attacks
- 12:40 : Kimsuky and Konni APT Groups Accounts Most Active Attacks Targeting East Asia
- 12:40 : Beware of Weaponized Research Papers That Delivers Malware Via Password-Protected Documents
- 12:40 : New Sophisticated Multi-Stage Malware Campaign Weaponizes VBS Files to Execute PowerShell Script
- 12:40 : US Insurance Industry Warned of Scattered Spider Attacks
- 12:39 : How Azul and Moderne Are Boosting Java Developer Productivity
- 12:39 : Novel TokenBreak Attack Method Can Bypass LLM Security Features
- 12:4 : Leitfaden von Save the Children: Pädokriminellen das Bild-Material entziehen
- 12:4 : “Bits & Böses”: Wer moderiert den Hass im Netz?
- 12:3 : Zoomcar Data Breach Exposes Personal Info of 8.4 Million Users
- 12:3 : Backups Are Under Attack: How to Protect Your Backups
- 12:3 : Hard-Coded ‘b’ Password in Sitecore XP Sparks Major RCE Risk in Enterprise Deployments
- 12:3 : Are Forgotten AD Service Accounts Leaving You at Risk?
- 12:3 : Circumvent Raises $6 Million for Cloud Security Platform
- 12:3 : Sumsub Device Intelligence offers protection against identity threats
- 11:36 : Workaround verfügbar: Outlook nervt Nutzer mit Absturz beim Öffnen von E-Mails
- 11:36 : [UPDATE] [mittel] GIMP: Schwachstelle ermöglicht Codeausführung
- 11:36 : [UPDATE] [hoch] GIMP: Mehrere Schwachstellen ermöglichen Codeausführung
- 11:36 : [UPDATE] [hoch] Apache Commons BeanUtils: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen
- 11:36 : [NEU] [mittel] IBM Tivoli Netcool/OMNIbus: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen
- 11:35 : Hackers Use Fake Verification Prompt and Clickfix Technique to Deploy Fileless AsyncRAT
- 11:35 : WhatsApp’s Status Tab Set to Feature Ads as Meta Monetizes Platform
- 11:35 : Attackers target Zyxel RCE vulnerability CVE-2023-28771
- 11:35 : Where AI Provides Value
- 11:35 : Reddit’s new AI-powered tools scan your posts to serve you better ads
- 11:35 : Smart air fryers ordered to stop invading our digital privacy
- 11:35 : Chained Flaws in Enterprise CMS Provider Sitecore Could Allow Remote Code Execution
- 11:5 : IT Security News Hourly Summary 2025-06-17 12h : 12 posts
- 11:3 : ASUS Armoury Crate Vulnerability Lets Hackers Gain System-Level Access on Windows
- 11:3 : Hackers Deliver Fileless AsyncRAT Using Clickfix Technique via Fake Verification Prompt
- 11:3 : XDSpy Threat Actors Leverages Windows LNKs Zero-Day Vulnerability to Attack Windows System Users
- 11:2 : Organizations Warned of Vulnerability Exploited Against Discontinued TP-Link Routers
- 10:37 : Exploring a New KimJongRAT Stealer Variant and Its PowerShell Implementation
- 10:37 : Italy Opens DeepSeek Probe Over False Information
- 10:37 : OpenAI In $200m Pentagon Deal
- 10:37 : Critical sslh Vulnerabilities Allow Remote Denial-of-Service Attacks
- 10:36 : Water Curse Hacker Group Uses 76 GitHub Accounts to Spread Multistage Malware
- 10:36 : Are WAFs Obsolete? Pros, Cons, and What the Future Holds
- 10:36 : How Human Behavior Can Strengthen Healthcare Cybersecurity
- 10:36 : Hackers Actively Exploiting Zyxel RCE Vulnerability Via UDP Port
- 10:36 : Threat Actors Exploits OEM Permissions on Android Devices to Perform Privilege Escalation Attacks
- 10:36 : CISA Warns of iOS 0-Click Vulnerability Exploited in the Wild
- 10:36 : Malicious Loan App on iOS & Google Play Store Infected 150K+ Users Devices
- 10:36 : Water Curse Hacker Group Weaponized 76 GitHub Accounts to Deliver Multistage Malware
- 10:36 : Asus Armoury Crate Vulnerability Leads to Full System Compromise
- 10:36 : New Flodrix Botnet Variant Exploits Langflow AI Server RCE Bug to Launch DDoS Attacks
- 10:36 : Microsoft Promises to Keep European Cloud Data in Europe
- 9:40 : Windows 11: Update soll Fehler beheben, sorgt aber für neue Probleme
- 9:40 : Apple: Sicherheitslücke in diversen Betriebssystemen wird angegriffen
- 9:39 : Dutch Court Upholds Competition Ruling Against Apple
- 9:39 : OpenAI ‘Considers’ Making Antitrust Allegations Against Microsoft
- 9:39 : TP-Link Router Flaw CVE-2023-33538 Under Active Exploit, CISA Issues Immediate Alert
- 9:6 : KI in der Kriegsführung: OpenAI erhält 200 Millionen Dollar von den US-Streitkräften
- 9:6 : Lügen-Bot: Wenn KI versehentlich lernt, uns besser zu betrügen
- 9:6 : Durch Juni-Updates: Gravierende DHCP-Probleme bei Windows Server
- 9:6 : [NEU] [UNGEPATCHT] [hoch] D-LINK Router: Mehrere Schwachstellen ermöglichen Denial of Service
- 9:5 : Hackers Exploiting Chrome Zero‑Day Vulnerability in the Wild
- 9:5 : 150K+ Users Affected by Malicious Loan Apps on iOS and Google Play
- 9:5 : Recent Langflow Vulnerability Exploited by Flodrix Botnet
- 9:5 : Inside PayPal’s Strategy to Stop AI-Powered Bots & Reduce Fraud
- 8:36 : [NEU] [hoch] BeyondTrust Remote Support: Schwachstelle ermöglicht Codeausführung
- 8:35 : China Robot Industry Projected To Reach $108bn In 2028
- 8:35 : Huawei, ByteDance ‘Plan’ Major Brazil Cloud Deals
- 8:35 : State-sponsored hackers compromised the email accounts of several Washington Post journalists
- 8:35 : India-based car-sharing company Zoomcar suffered a data breach impacting 8.4M users
- 8:35 : Threat Actors Abuse Windows Run Prompt to Execute Malicious Command and Deploy DeerStealer
- 8:34 : Brits Lose £106m to Romance Fraud in a Year
- 8:8 : So kaufst du eine Reise-eSIM und verbindest sie mit Kaspersky eSIM Store | Offizieller Blog von Kaspersky
- 8:8 : Nord- und Ostsee: Dänemark setzt Drohnen für maritime Sicherheit ein
- 8:8 : [UPDATE] [mittel] Golang Go: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen
- 8:8 : [UPDATE] [mittel] Google Chrome / Microsoft Edge: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff
- 8:8 : [UPDATE] [hoch] Mozilla Firefox und Thunderbird: Mehrere Schwachstellen
- 8:8 : [NEU] [mittel] IBM App Connect Enterprise: Schwachstelle ermöglicht Manipulation der Konfiguration
- 8:7 : CISA Alerts: iOS Zero‑Click Flaw Actively Exploited
- 8:7 : Android Devices Under Siege: How Threat Actors Abuse OEM Permissions for Privilege Escalation
- 8:7 : Got a new password manager? Don’t leave your old logins exposed in the cloud – do this next
- 8:5 : IT Security News Hourly Summary 2025-06-17 09h : 11 posts
- 7:35 : Passwort Adé
- 7:35 : VdS 6003: Neue Brandschutz-Richtlinie für Rechenzentren
- 7:35 : VS Code 1.101 erhöht die Sicherheit von MCP und verbesset die Versionskontrolle
- 7:34 : Meta Brings Ads To WhatsApp After Long Delay
- 7:34 : Beyond Just Detection: Oasis Offers Full Lifecycle Management for NHIs
- 7:34 : 2FA middleman, Archetyp seized, Zoomcar hacked
- 7:8 : Windows: Entsperren mit Gesichtserkennung nicht mehr im Dunkeln
- 7:8 : Gesichtserkennung: Windows Hello verweigert Anmeldung bei Dunkelheit
- 7:7 : DeerStealer Malware Deployed Through Exploitation of Windows Run Prompt by Threat Actors
- 7:7 : GCHQ Intern Sentenced to 7 Years for Illegally Copying Secret Files to Smartphone
- 7:7 : How to disable ACR on your TV (and why doing so makes such a big difference)
- 7:7 : Google to scale up AI-powered fraud detection and security operations in India
- 7:7 : Apache Tomcat Vulnerabilities Allow Authentication Bypass and DoS Attacks
- 7:7 : From LLMs to Cloud Infrastructure: F5 Aims to Secure the New AI Attack Surface
- 7:7 : Women in CyberSecurity (WiCyS): Building Community and Fostering Opportunity in Cybersecurity
- 6:34 : Windows: Entsperren mit Gesichtserkennung nicht mehr im Dunklen
- 6:34 : [UPDATE] [mittel] Intel Prozessoren: Mehrere Schwachstellen ermöglichen Offenlegung von Informationen
- 6:34 : [UPDATE] [hoch] WebKitGTK: Mehrere Schwachstellen
- 6:34 : [UPDATE] [mittel] CPython: Schwachstelle ermöglicht Denial of Service
- 6:34 : [UPDATE] [niedrig] Linux Kernel: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff
- 6:33 : [UPDATE] [hoch] Linux Kernel: Mehrere Schwachstellen
- 6:33 : Apache Tomcat Flaws Allow Auth Bypass and DoS Attacks
- 6:33 : Top 5 AI SOC Analyst Platforms to Watch out for in 2025
- 6:33 : NSFOCUS APT Monthly Briefing – April 2025
- 6:32 : Hackers love events. Why aren’t more CISOs paying attention?
- 6:32 : BigID Vendor AI Assessment reduces third-party AI risk
- 6:3 : Akkuforschung: Chinesische Studentin an TU München unter Spionageverdacht
- 6:3 : [UPDATE] [mittel] Wireshark: Schwachstelle ermöglicht Denial of Service
- 6:3 : [UPDATE] [niedrig] Django: Schwachstelle ermöglicht Manipulation von Dateien
- 6:2 : Hackers Weaponize Langflow Vulnerability to Launch Flodrix Botnet
- 6:2 : Before scaling GenAI, map your LLM usage and risk zones
- 6:2 : Meta Starts Showing Ads on WhatsApp After 6-Year Delay From 2018 Announcement
- 5:36 : Zyxel Devices Under Attack as Hackers Exploit UDP Port RCE Flaw
- 5:7 : Updates to Red Hat Advanced Cluster Security for Kubernetes Cloud Service strengthen your security posture
- 5:7 : GrayAlpha Exposed: Deploys Malware via Infection Vectors
- 5:7 : CISOs brace for a surge in domain-based cyber threats
- 5:7 : CURBy: A quantum random number generator you can verify
- 5:5 : IT Security News Hourly Summary 2025-06-17 06h : 5 posts
- 4:35 : [UPDATE] [mittel] M-Files Server: Schwachstelle ermöglicht Offenlegung von Informationen
- 4:34 : Cybersecurity jobs available right now: June 17, 2025
- 4:3 : Hackers Actively Exploiting Langflow RCE Vulnerability to Deploy Flodrix Botnet