210 posts were published in the last hour
- 22:55 : IT Security News Daily Summary 2025-06-22
- 20:34 : Scammers Use Inferno Drainer to Steal $43K from CoinMarketCap Users
- 20:34 : Cloud quantum computing: A trillion-dollar opportunity with dangerous hidden risks
- 20:34 : Scattered Spider Targets Aflac, Other Insurance Companies
- 20:5 : IT Security News Hourly Summary 2025-06-22 21h : 1 posts
- 18:34 : „Fundamentales Hindernis“: Apple-Forscher belegen, dass Reasoning von ChatGPT und Co. ein leeres Versprechen ist
- 17:35 : Reich durch KI: Wie OpenAI-Mitarbeiter Milliarden mit Aktien kassieren – ohne Börsengang
- 17:5 : IT Security News Hourly Summary 2025-06-22 18h : 2 posts
- 16:35 : Security Affairs newsletter Round 529 by Pierluigi Paganini – INTERNATIONAL EDITION
- 16:35 : SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 50
- 16:35 : Cloudflare Explains Major Service Outage: Not a Security Breach, No Data Lost
- 16:34 : The True Cost of Legacy Software: A Comprehensive Look
- 16:5 : Weekly Cybersecurity News Recap – Top Vulnerabilities, Threat and Data Breaches
- 15:10 : Why Scale Matters in Today’s Cybersecurity Landscape Futureproofing for Better Outcomes
- 15:10 : Quantum breakthrough: ‘Magic states’ now easier, faster, and way less noisy
- 14:34 : Microsoft Entra ID Faces Surge in Coordinated Credential-Based Attacks
- 14:10 : So schnell knacken Hacker dein Passwort – und was du dagegen tun kannst
- 14:5 : IT Security News Hourly Summary 2025-06-22 15h : 1 posts
- 13:34 : Why Network Disaster Recovery Solutions Are a Non-negotiable for Modern Businesses
- 12:33 : Keine Werbung oder unnötige Zugriffsrechte: Diese kostenlosen Android-Apps solltet ihr kennen
- 11:8 : 16 Billion Leaked Records May Not Be a New Breach, But They’re a Threat
- 11:5 : IT Security News Hourly Summary 2025-06-22 12h : 2 posts
- 10:3 : Rekord bei DDoS-Attacke mit 7,3 TBit/s
- 9:38 : AWS Raises Expertise Bar for MSSP Partners
- 8:41 : (g+) Zero-Day-Exploits: Wie Hacker IT-Systeme knacken
- 8:40 : 16 billion passwords leaked across Apple, Google, more: What to know and how to protect yourself
- 8:4 : Datenschutz im KI-Zeitalter: Warum das Urteil zu Meta ein Weckruf sein muss
- 7:43 : Gewinnspiele: Verbraucherzentrum warnt vor Betrugsmaschen
- 7:6 : Week in review: Keyloggers found on Outlook login pages, police shut down dark web drug market
- 5:5 : IT Security News Hourly Summary 2025-06-22 06h : 1 posts
- 3:5 : Neue Studie zeigt: In stressigen Situationen zeigen sich KI-Modell erschreckend skrupellos
- 3:4 : OpenVPN Driver Vulnerability Let Attackers Crash Windows Systems
- 2:7 : Israeli Social Media Users Targeted in Covert Iranian Influence Campaign
- 2:5 : IT Security News Hourly Summary 2025-06-22 03h : 1 posts
- 1:34 : Truth Social Crashes as Trump Live-Posts Iran Bombing
- 1:34 : Threat Actor Allegedly Selling FortiGate API Exploit Tool Targeting FortiOS
- 1:5 : Mattermost Vulnerabilities Let Attackers Execute Remote Code Via Path Traversal
- 1:5 : Are Your Secrets Protected Against Data Breaches?
- 1:5 : How Secure Are Your Cloud-Based Non-Human Identities?
- 1:5 : Why Being Proactive with NHIs Can Save Your Business
- 0:7 : Aflac Cyber Attack – Hackers May Have Stolen Personal And Health Information
- 23:5 : IT Security News Hourly Summary 2025-06-22 00h : 2 posts
- 23:2 : CyberWarfare on the Rise With Surge in Hacktivist Activity Following Israel-Iran
- 22:55 : IT Security News Daily Summary 2025-06-21
- 22:3 : DuckDuckGo Browser’s Scam Blocker to Guard Against Phishing and Malware Sites
- 21:2 : Open Directories Exposes Publically Available tools Used by Hackers
- 20:5 : IT Security News Hourly Summary 2025-06-21 21h : 4 posts
- 20:2 : Surge in XSS Cyberattacks Targets Popular Webmail Platforms, ESET Reports
- 19:2 : Microsoft Announces New Graph Powered Detection of Hybrid Attack Targeting Organizations
- 18:34 : 2025-06-21: Koi Loader/Koi Stealer infection
- 18:8 : Iranian Hacktivist Attacking Israeli Military, Government, and Infrastructure Targets
- 18:8 : LinuxFest Northwest: The First Black Software Engineer in America: Technology and Race
- 17:5 : IT Security News Hourly Summary 2025-06-21 18h : 4 posts
- 16:34 : T-Mobile Denies Involvement After Hackers Claim Massive Customer Data Breach
- 16:3 : Sommergewitter voraus: Diese Blitzschutz-Tipps retten Router, NAS und Co.
- 16:3 : 2025-06-20: Malware disguised as cracked version of popular software
- 15:34 : Critical OpenVPN Driver Vulnerability Allows Attackers to Crash Windows Systems
- 15:5 : NIS2: Aktueller Referentenentwurf geleakt
- 15:5 : Why CISOs Need an AI-Native Strategy
- 14:33 : NIS2: Neuer Leak des Referentenentwurfs
- 14:32 : Iran confirmed it shut down internet to protect the country against cyberattacks
- 14:32 : Predator Spyware Campaign Resurfaces With a New Infrastructure
- 14:32 : Fake DeepSeek AI Installers Deliver BrowserVenom Malware
- 14:5 : IT Security News Hourly Summary 2025-06-21 15h : 5 posts
- 14:4 : Report Warns of Sophisticated DDoS Campaigns Crippling Global Banks
- 13:32 : The Evolving Cloud Security Landscape: Empowering Startups in a Post-Acquisition World
- 13:5 : DuckDuckGo Rolls Out New Scam Blocker to Protect Users from Online Threats
- 13:5 : Your passwords are everywhere: What the massive 16 billion login leak means for you
- 12:41 : Violence-as-a-Service: Encrypted Apps Used in Recruiting Teens as Hitmen
- 12:6 : Wer hat das letzte Wort bei Apple? Diese drei Köpfe steuern die Produktentwicklung
- 12:5 : How Smart Timesheet Software Is Changing the Way of Work
- 11:32 : Urheberrechtszoff um Meta: Wenn KI sich an Harry Potter zu gut erinnert
- 10:32 : ADS & Python Tools, (Sat, Jun 21st)
- 10:32 : Israel Says Iran Is Hacking Security Cameras for Spying
- 10:32 : Scattered Spider Behind Cyberattacks on M&S and Co-op, Causing Up to $592M in Damages
- 10:6 : Aflac Finds Suspicious Activity on US Network That May Impact Social Security Numbers, Other Data
- 8:5 : IT Security News Hourly Summary 2025-06-21 09h : 3 posts
- 7:32 : Nostalgie oder Panne? Microsoft bringt den Windows-Vista-Startsound zurück
- 7:32 : Starkregen: Wie Rückstauklappen Häuser wirksam schützen können
- 7:4 : Scientists create ‘universal translator’ for quantum tech
- 7:4 : AI Vulnerabilities and the Gentle Singularity: A Deep Dive with Project Synapse
- 6:40 : Godfather Android trojan uses virtualization to hijack banking and crypto apps
- 5:34 : Whatsapp wird zum Scanner: Warum die neue Funktion ein Gamechanger ist
- 5:5 : IT Security News Hourly Summary 2025-06-21 06h : 2 posts
- 5:4 : U.S. Homeland Security Reportedly Buys Airline Passenger Data from Private Brokers
- 4:4 : Microsoft Warns of OneDrive Bug that Causes Searches to Appear Blank
- 3:5 : Microsoft Announces New Security Defaults for Windows 365 Cloud PCs
- 2:5 : IT Security News Hourly Summary 2025-06-21 03h : 1 posts
- 1:5 : The $4.88 Million Question: Why Password-Based Breaches Are Getting More Expensive
- 0:34 : PCI DSS 4.0.1: What Changed and How is this the Next Step for Universal MFA
- 23:34 : Hospital cyber attacks cost $600K/hour. Here’s how AI is changing the math
- 23:5 : IT Security News Hourly Summary 2025-06-21 00h : 10 posts
- 22:55 : IT Security News Daily Summary 2025-06-20
- 22:32 : The Next Wave of Cybersecurity
- 22:3 : Anubis Ransomware Lists Disneyland Paris as New Victim
- 22:3 : Hackers Target 700+ ComfyUI AI Image Generation Servers to Spread Malware
- 22:3 : Aflac Discloses Cybersecurity Incident, Customer Data Potentially Exposed Amid Industry-Wide Attacks
- 22:3 : LinuxFest Northwest: The Geology of Open Source
- 21:33 : Cyberattack Disrupts Russian Dairy Supply Chain by Targeting Animal Certification System
- 21:33 : Cloudflare blocked record-breaking 7.3 Tbps DDoS attack against a hosting provider
- 21:32 : Friday Squid Blogging: Gonate Squid Video
- 21:32 : Netflix, Apple, BofA websites hijacked with fake help-desk numbers
- 21:32 : Week in Review: ClickFake deepfake scam, Krispy Kreme breach, NIST ZTA guidance
- 21:4 : Prometei Botnet Targets Linux Servers for Cryptocurrency Mining Operations
- 20:34 : Beware of Weaponized MSI Installer Masquerading as WhatsApp to Deliver XWorm RAT
- 20:34 : Heard about the 16 billion passwords leak? Here are the facts and how to protect yourself
- 20:5 : Mocha Manakin Uses Paste-and-Run Technique to Deceive Users into Downloading Malware
- 20:5 : Anthropic study: Leading AI models show up to 96% blackmail rate against executives
- 20:5 : News brief: LOTL attacks, spoofed sites, malicious repositories
- 20:5 : IT Security News Hourly Summary 2025-06-20 21h : 10 posts
- 19:34 : Threat Actors Manipulate Google Search Results to Display Scammer’s Phone Number Instead of Real Number
- 19:34 : What is perfect forward secrecy (PFS)?
- 19:4 : Insomnia API Client Vulnerability Enables Arbitrary Code Execution via Template Injection
- 18:37 : KI-Sprachmuster: Warum wir langsam alle ein wenig wie ChatGPT klingen
- 18:37 : Threat Actors Exploit Vercel Hosting Platform to Distribute Remote Access Malware
- 18:37 : CVE-2025-49763 – Remote DoS via Memory Exhaustion in Apache Traffic Server via ESI Plugin
- 18:36 : US Pig Butchering Victims ‘Will’ Get Refunds — Feds Seize $225M Cryptocurrency
- 18:5 : TxTag Phishing Campaign Exploits .gov Domain to Deceive Employees
- 18:5 : A Token of Appreciation for Sustaining Donors 💞
- 18:5 : Protect Yourself From Meta’s Latest Attack on Privacy
- 18:5 : Qilin ransomware top dogs treat their minions to on-call lawyers for fierier negotiations
- 18:5 : Looks like Aflac is the latest insurance giant snagged in Scattered Spider’s web
- 17:33 : PowerShell Loaders Use In-Memory Execution to Evade Disk-Based Detection
- 17:33 : Your Kubernetes Survival Kit: Master Observability, Security, and Automation
- 17:33 : Prometei Botnet Attacking Linux Servers to Mine Cryptocurrency
- 17:33 : A Token of Appreciation for Sustaining Donors 💞
- 17:33 : Top 7 Ambient Listening AI Tools Revolutionizing Healthcare in 2025
- 17:33 : Qilin Ransomware Adds “Call Lawyer” Feature to Pressure Victims for Larger Ransoms
- 17:7 : New Detection Method Uses Hackers’ Own Jitter Patterns Against Them
- 17:7 : 16 billion passwords leaked from Apple, Google, more: Here are the facts and how to protect yourself
- 17:7 : Iran’s government says it shut down internet to protect against cyberattacks
- 17:7 : A Token of Appreciation for Sustaining Donors 💞
- 17:7 : Cybersecurity Snapshot: Tenable Report Spotlights Cloud Exposures, as Google Catches Pro-Russia Hackers Impersonating Feds
- 17:5 : IT Security News Hourly Summary 2025-06-20 18h : 8 posts
- 16:33 : Norway Plans Temporary Ban On New Crypto Mining Data Centres
- 16:33 : Hackers Use Social Engineering to Target Expert on Russian Operations
- 16:33 : 16 Billion Credentials Leaked, Though Some Critics Question the Data
- 16:33 : Beware of Weaponized MSI Installer Mimic as WhatsApp Delivers Modified XWorm RAT
- 16:33 : A Token of Appreciation for Sustaining Donors 💞
- 16:33 : Fake Resumes Become Weapon of Choice for FIN6 Threat Group
- 16:33 : Smartwatches: New Air-Gapped System Assault Vehicle
- 16:33 : Trend Micro Patches Critical Remote Code Execution and Authentication Bypass Flaws in Apex Central and PolicyServer
- 16:5 : Anzeige: Professionelle Incident Response mit BSI-Zertifizierung
- 16:5 : I found the easiest way to delete myself from the internet (and you shouldn’t wait to use it, too)
- 16:4 : A Token of Appreciation for Sustaining Donors 💞
- 15:36 : A Token of Appreciation for Sustaining Donors 💞
- 15:8 : BBC Warns Perplexity Of Legal Action Over Content Use
- 15:8 : Mocha Manakin Using Paste and Run Technique to Trick Users Into Downloading Malicious Payloads
- 15:8 : Record Breaking 7.3 Tbps DDoS Attack Blasting 37.4 Terabytes in Just 45 Seconds
- 15:8 : A Token of Appreciation for Sustaining Donors 💞
- 15:8 : The Digital Pandemic: Inside 2024’s Most Devastating Cyber Breaches
- 14:36 : Cybersicherheit: Iran soll israelische Sicherheitskameras gehackt haben
- 14:35 : What is risk assessment?
- 14:35 : A Token of Appreciation for Sustaining Donors 💞
- 14:5 : IT Security News Hourly Summary 2025-06-20 15h : 13 posts
- 14:4 : 16 Milliarden Passwörter im Netz gefunden? Was du jetzt wissen musst
- 14:4 : Neues KI-Tool: Was kann der Videogenerator von Midjourney?
- 14:3 : Threat Actors Poisoning Google Search Results to Display The Scammer’s Phone Number Instead of Real Number
- 14:3 : A Token of Appreciation for Sustaining Donors 💞
- 14:3 : In Other News: Viasat Hacked by China, Washington Post Cyberattack, Crowhammer
- 13:33 : Assa Abloy lädt zum Online-Seminar für smarte Gebäudetechnik
- 13:32 : Massive DDoS Attack Hits 7.3 Tbps Delivering 37.4 Terabytes in 45 Seconds
- 13:32 : Third-Party Access: The Cyber Risk Manufacturers Can’t Afford to Ignore
- 13:32 : World Economic Forum Meeting on Rethinking Cyber Resilience: A Fortinet Q&A
- 13:32 : Hackers Exploit ComfyUI 700+ AI Image Generation Servers to Deploy Malware
- 13:32 : A Token of Appreciation for Sustaining Donors 💞
- 13:32 : M&S and Co-op Hacks Classified as Single Cyber Event
- 13:5 : The Rising Deepfake Risk for Businesses: A Step-By-Step Defense Strategy Built Around the Basics of Security
- 13:5 : Azure Misconfiguration Lets Attackers Take Over Cloud Infrastructure
- 13:5 : How to turn off ACR on your TV (and what your TV stops tracking when you do)
- 13:5 : A Token of Appreciation for Sustaining Donors 💞
- 13:5 : Record-Breaking 7.3 Tbps DDoS Attack Targets Hosting Provider
- 13:5 : Personal Data of Oxford City Council Officers Exposed
- 12:32 : New Mocha Manakin Malware Deploys NodeInitRAT via Clickfix Attack
- 12:32 : Threat Actors Leverage Hosting Platform Vercel to Deliver Remote Access Malware
- 12:32 : Insomnia API Client Vulnerability Arbitrary Code Execution via Template Injection
- 12:32 : A Token of Appreciation for Sustaining Donors 💞
- 12:32 : Iran’s State TV Hijacked Mid-Broadcast Amid Geopolitical Tensions; $90M Stolen in Crypto Heist
- 12:7 : Preisverhandlungen mit KI-Agent: Darauf solltest du beim Einsatz für Finanzgeschäfte achten
- 12:7 : Per Virtualisierung: Gefährliche Android-Malware stiehlt Daten aus Banking-Apps
- 12:5 : Waymo Applies For New York Testing Permit
- 12:5 : AntiDot 3-in-1 Android Botnet Malware Grants Attackers Full Control Over Victim Devices
- 12:5 : A Token of Appreciation for Sustaining Donors 💞
- 12:5 : Godfather Android Trojan Creates Sandbox on Infected Devices
- 12:5 : Microsoft boosts default security of Windows 365 Cloud PCs
- 12:5 : Meta To Introduce Full Passkey Support for Facebook on Mobiles
- 11:33 : [NEU] [hoch] IBM QRadar SIEM: Mehrere Schwachstellen
- 11:32 : Oxford City Council Hit by Cyberattack Exposing Employee Personal Data
- 11:32 : A Token of Appreciation for Sustaining Donors 💞
- 11:32 : Motors Theme Vulnerability Exploited to Hack WordPress Websites
- 11:8 : Cyberangriffe: Nordkoreanische Hacker faken Vorgesetzte in Videokonferenzen
- 11:8 : [UPDATE] [hoch] Linux Kernel: Mehrere Schwachstellen
- 11:7 : Resurgence of the Prometei Botnet
- 11:7 : GodFather Android Malware Uses On-Device Virtualization to Hijack Legitimate Banking Apps
- 11:7 : Versa Director Flaws Let Attackers Execute Arbitrary Commands
- 11:7 : 184 million passwords for Google, Microsoft, Facebook, and more leaked in massive data breach
- 11:7 : Your Android phone is getting a big security upgrade for free – these Pixel models included
- 11:7 : Linux flaws chain allows Root access across major distributions
- 11:7 : Surveillance in the US
- 11:7 : ClamAV 1.4.3 and 1.0.9 Released With Fix for Vulnerabilities that Enable Remote Code Execution
- 11:7 : New TxTag Phishing Attack Leverages .gov Domain to Trick Employees
- 11:6 : A Token of Appreciation for Sustaining Donors 💞
- 11:6 : Attack on Oxford City Council exposes 21 years of election worker data
- 11:6 : FreeType Zero-Day Found by Meta Exploited in Paragon Spyware Attacks
- 11:6 : Massive 7.3 Tbps DDoS Attack Delivers 37.4 TB in 45 Seconds, Targeting Hosting Provider
- 11:6 : 6 Steps to 24/7 In-House SOC Success
- 11:5 : IT Security News Hourly Summary 2025-06-20 12h : 11 posts
- 10:32 : Ubiquiti UniFi Network Application: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen
- 10:32 : ClamAV: Mehrere Schwachstellen ermöglichen Denial of Service
- 10:32 : RPS und FPRPC: Microsoft blockt Legacy-Protokolle für Microsoft 365