210 posts were published in the last hour
- 22:32 : SimilarWeb data: This obscure AI startup grew 8,658% while OpenAI crawled at 9%
- 21:32 : China-linked APT Silk Typhoon targets IT Supply Chain
- 21:32 : SandboxAQ Joins UN AI Hub to Bolster Cybersecurity and Drive AI Innovation
- 21:32 : Ransomware Attack Ends a 150 Year Company
- 20:32 : DEF CON 32 – War Stories – Stranger In A Changed Land
- 20:5 : IT Security News Hourly Summary 2025-03-05 21h : 12 posts
- 19:32 : KIAM vs AWS IAM Roles for Service Accounts (IRSA)
- 19:32 : Catalan court says NSO Group executives can be charged in spyware investigation
- 19:32 : Microsoft To Harden The Trust Boundary of VBS Enclaves
- 19:32 : Organizations Still Not Patching OT Due to Disruption Concerns: Survey
- 19:32 : Industry Moves for the week of March 3, 2025 – SecurityWeek
- 19:32 : US Indicts China’s iSoon ‘Hackers-for-Hire’ Operatives
- 19:9 : Why is Apple Taking Legal Action Against UK’s Government?
- 19:9 : Microsoft Blames Widespread Outage on “Problematic Code Change”
- 19:9 : Google Issues Urgent Alert for Exploited Android Vulnerabilities
- 19:9 : 7 container security best practices
- 19:9 : Apple vs. UK — ADP E2EE Back Door Faceoff
- 19:9 : AWS completes the annual Dubai Electronic Security Centre certification audit to operate as a Tier 1 cloud service provider in the Emirate of Dubai
- 18:32 : What is the Digital Operational Resilience Act (DORA)?
- 18:32 : US Charges 12 Alleged Spies in China’s Freewheeling Hacker-for-Hire Ecosystem
- 18:32 : Highly Targeted Cyber Espionage Campaign Targeting UAE Aviation Sector
- 18:32 : Key Takeaways from the SEON 2025 Digital Fraud Outlook
- 18:32 : Attackers Target Over 4000 IP Addresses of US, China ISPs
- 18:6 : Youtube Premium Lite geht an den Start: Das erwartet euch beim günstigeren Abo
- 18:6 : Verstecktes Mac-Feature: So aktivierst du Apples geheime Konzentrationshilfe
- 18:4 : Judge Denies Elon Musk’s Request To Block OpenAI Non-Profit Bid
- 18:4 : Former NSA official says federal worker cuts will have ‘devastating impact’ on cyber and national security
- 17:32 : Waymo Begins Robotaxi Rides In Austin Via Uber App
- 17:32 : Chinese Silk Typhoon Group Targets IT Tools for Network Breaches
- 17:32 : Apple Taking Legal Action Against UK Over Backdoor Demands
- 17:32 : US Charges 12 Alleged Spies in China’s Freewheeling Hacker-for-Hire Ecosystem
- 17:32 : Apple drags UK government to court over ‘backdoor’ order
- 17:32 : China’s Silk Typhoon, tied to US Treasury break-in, now hammers IT and govt targets
- 17:5 : IT Security News Hourly Summary 2025-03-05 18h : 20 posts
- 17:4 : KI-Bedrohungen und Komplexität setzen Unternehmen zu
- 17:4 : BAMF: Skurrile Testkonten ermöglichten unautorisierten Datenzugriff
- 17:3 : Qualcomm Boss Touts Performance Of New Modem Against Apple’s C1
- 17:3 : Justice Department charges Chinese hackers-for-hire linked to Treasury breach
- 17:3 : Hunters International gang claims the theft of 1.4 TB of data allegedly stolen from Tata Technologies
- 17:3 : Preparing for the New European Machinery Compliance Regulation
- 17:3 : Microsoft Warns of Silk Typhoon Hackers Attacking IT Supply Chain
- 17:3 : SpecterOps Scores $75M Series B to Scale BloodHound Enterprise Platform
- 17:3 : DEF CON 32 – War Stories – Breaking Network Crypto In Popular Chinese Keyboard Apps
- 17:3 : Middle East Banks Strengthen Cybersecurity Amid Growing Threats
- 17:3 : The 5 stages of incident response grief
- 17:3 : Silk Typhoon Shifts Tactics to Exploit Common IT Solutions
- 16:5 : GoStringUngarbler: Deobfuscating Strings in Garbled Binaries
- 16:5 : North Korea exploits GitHub with fake profiles and Insider Threats
- 16:5 : Cactus Ransomware: What You Need To Know
- 16:5 : Cybereason CEO Resigns Amid Funding Dispute with Investors
- 16:5 : Russian Telecom Company “Beeline” Hit, Users Face Internet Outage
- 16:5 : India’s Escalating Crisis of Fake Institutions and Digital Fraud
- 16:5 : Genea Cyberattack: Termite Ransomware Leaks Sensitive Patient Data
- 16:5 : China-Linked Silk Typhoon Expands Cyber Attacks to IT Supply Chains for Initial Access
- 15:32 : Trump Says US Should Kill Landmark CHIPS And Science Act
- 15:32 : New Eleven11bot botnet infected +86K IoT devices
- 15:32 : Hong Kong Launches Its First Generative AI Model
- 15:5 : Alli AI Announces Upcoming Public Launch of AI-Powered Content Creation Platform
- 15:5 : Broadcom urges VMware customers to patch ‘emergency’ zero-day bugs under active exploitation
- 15:5 : Hackers Leveraging Business Relationship To Attack Arab Emirates Aviation Sector
- 15:5 : Cisco Webex for BroadWorks Vulnerability Let Remote Attackers Access Data & Credentials
- 15:5 : WordPress Plugin Vulnerability Exposes 10,000 Sites to Code Execution Attacks
- 15:5 : Apple takes UK government to court over ‘backdoor’ order
- 15:5 : Nonprofits Face Surge in Cyber-Attacks as Email Threats Rise 35%
- 14:33 : Apropos Sicherheitstechnik stärkt Marktposition durch Asset Deal
- 14:32 : I spoke to a task scammer. Here’s how it went
- 14:32 : Eleven11bot Captures 86,000 IoT Devices for DDoS Attacks
- 14:32 : Google Rolls Out AI Scam Detection for Android to Combat Conversational Fraud
- 14:32 : Dark Caracal Uses Poco RAT to Target Spanish-Speaking Enterprises in Latin America
- 14:32 : Defending against USB drive attacks with Wazuh
- 14:5 : Why I use virtual cards for online purchases – and you should too
- 14:5 : CIA director says US has paused sharing intelligence with Ukraine
- 14:5 : Color Dating – 220,503 breached accounts
- 14:5 : Iranian Hackers Target UAE Firms With Polyglot Files
- 14:5 : Google Introduces New AI-Powered Scam Detection Features for Android
- 14:5 : IT Security News Hourly Summary 2025-03-05 15h : 7 posts
- 13:33 : l+f: Ransomware-Attacke via Schneckenpost
- 13:33 : [UPDATE] [hoch] Linux Kernel: Mehrere Schwachstellen
- 13:32 : CISA Issues Alert on Actively Exploited VMware Vulnerabilities
- 13:32 : Salesforce launches Agentforce 2dx, letting AI run autonomously across enterprise systems
- 13:32 : Tripwire Patch Priority Index for February 2025
- 13:32 : North Korean Fake IT Workers Pose as Blockchain Developers on GitHub
- 13:32 : Silk Typhoon targeting IT supply chain
- 12:33 : Microsoft: Cloud-PCs wiederherstellen mit Windows 365 Disaster Recovery Plus
- 12:33 : [NEU] [hoch] Kibana: Schwachstelle ermöglicht Codeausführung
- 12:32 : Cisco Webex for BroadWorks Flaw Opens Door for Attackers to Access Credentials
- 12:32 : Android zero-day vulnerabilities actively abused. Update as soon as you can
- 12:32 : Leeds United kick card swipers into Row Z after 5-day cyberattack
- 12:32 : Identity: The New Cybersecurity Battleground
- 12:32 : Chinese APT Lotus Panda Targets Governments With New Sagerunex Backdoor Variants
- 12:7 : Google Chrome: Mehrere Schwachstellen ermöglichen Denial of Service
- 12:7 : So will dich Google per KI vor Scam-Nachrichten schützen
- 12:7 : Windows 11: Was die neue Copilot-App besser machen soll – und wo sie ChatGPT schlägt
- 12:7 : Belastende Infos können KI-Chatbots stressen – wie sie sich wieder beruhigen lassen
- 12:7 : [NEU] [hoch] Google Chrome: Mehrere Schwachstellen ermöglichen Denial of Service
- 12:6 : Australia Bans Kaspersky Products From Government Systems
- 12:6 : Meta Fired Employees For Alleged Information Leaks
- 12:6 : Thousands of Misconfigured AMS Risk Buildings’ Security Globally
- 12:6 : Microsoft Retires Skype, Asks Users To Switch To Teams Free
- 12:6 : New Auto-Color Linux Malware Targets Universities, Government Organizations
- 12:6 : Apple Appeals UK Order For ‘Backdoor’ iCloud Access – Report
- 12:6 : North Korean IT Workers Exploit GitHub to Launch Global Cyber Attacks
- 12:6 : Operation Sea Elephant Targets Organizations to Steal Research Data
- 12:5 : Beware! Fake CAPTCHA Hidden LummaStealer Threat Installing Silently
- 12:5 : Over 10,000 WordPress Sites Exposed by Donation Plugin Code Execution Vulnerability
- 12:5 : CISA Identifies Five New Vulnerabilities Currently Being Exploited
- 12:5 : U.S Treasury Sanctions Admin of Nemesis Darknet Marketplace
- 12:5 : CISA Warns of Actively Exploited VMware Vulnerabilities, Urges Immediate Patching
- 12:5 : Ransomware Group Claims Attack on Tata Technologies
- 11:33 : LibreOffice: Schwachstelle ermöglicht Codeausführung
- 11:33 : Anklage: 21-Jähriger soll mit Phishing 550.000 Euro Schaden angerichtet haben
- 11:33 : Kampf gegen Online-Betrug: Telefónica prüft Identität von O2-Kunden für Dritte
- 11:33 : [NEU] [mittel] Golang Go: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen
- 11:32 : Cybercriminals Impersonate Electronic Frontier Foundation to Target Gaming Community
- 11:32 : 1 Million Third-Party Android Devices Have a Secret Backdoor for Scammers
- 11:32 : November 2024 Cyber Attacks Statistics
- 11:32 : Chrome 134, Firefox 136 Patch High-Severity Vulnerabilities
- 11:32 : Stress and Burnout Impacting Vast Majority of IT Pros
- 11:6 : Use one Virtual Machine to own them all — active exploitation of ESXicape
- 11:6 : Beneath the Surface: Detecting and Blocking Hidden Malicious Traffic Distribution Systems
- 11:6 : Trump Suspends Offensive Cyber Operations Against Russia
- 11:6 : Hackers Exploit Cloud Misconfigurations to Spread Malware
- 11:5 : U.S. Cracks Down on Nemesis Darknet Admin with New Treasury Sanctions
- 11:5 : Microsoft To Remove DES Encryption from Windows 11 24H2 & Windows Server 2025
- 11:5 : Vim Editor Vulnerability Exploited Via TAR Files to Trigger Code Execution
- 11:5 : Telegram EvilVideo Vulnerability Exploited to Execute Malicious Code on Victim Device
- 11:5 : Knostic Secures $11 Million to Rein in Enterprise AI Data Leakage, Oversharing
- 11:5 : What is the Process of ISO 27001 Certification?
- 11:5 : What is Red Teaming?
- 11:5 : Top 7 Cyber Security Challenges Faced by SaaS Organizations
- 11:5 : Why Supply Chain Attacks Are The Biggest Threat To Businesses?
- 11:5 : IT Security News Hourly Summary 2025-03-05 12h : 12 posts
- 10:33 : Pixel Patchday March 2025: Mehrere Schwachstellen
- 10:33 : Mozilla Firefox, Mozilla Firefox ESR und Mozilla Thunderbird: Mehrere Schwachstellen
- 10:33 : Browser-Updates: Sicherheitslücken gestopft – und µBlock abgedreht
- 10:33 : Zwei Sicherheitslücken in IBM Business Automation Workflow geschlossen
- 10:33 : [NEU] [hoch] Pixel Patchday March 2025: Mehrere Schwachstellen
- 10:33 : [NEU] [hoch] Mozilla Firefox, Mozilla Firefox ESR und Mozilla Thunderbird: Mehrere Schwachstellen
- 10:32 : Telegram EvilVideo Vulnerability Exploited to Run Malicious Code on Victims’ Devices
- 10:32 : Vim Vulnerability (CVE-2025-27423) Allows Code Execution via Malicious TAR Archives
- 10:32 : Polish Space Agency POLSA disconnected its network following a cyberattack
- 10:32 : Undercover miner: how YouTubers get pressed into distributing SilentCryptoMiner as a restriction bypass tool
- 10:32 : Qilin ransomware gang claims attacks on cancer clinic, OB-GYN facility
- 10:32 : Over Half of Organizations Report Serious OT Security Incidents
- 10:3 : [UPDATE] [hoch] Podman: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen
- 10:3 : [UPDATE] [mittel] docker: Schwachstelle ermöglicht Offenlegung von Informationen
- 10:3 : [UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff
- 10:3 : [UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen
- 10:3 : [UPDATE] [mittel] expat: Mehrere Schwachstellen ermöglichen Denial of Service
- 10:3 : LinkedIn Phishing Scam: Fake InMail Messages Spreading ConnectWise Trojan
- 10:3 : US Sanctions Iranian Administrator of Nemesis Darknet Marketplace
- 10:2 : Sonatype AI SCA delivers visibility and control over AI/ML usage
- 9:33 : Salamitaktik: Apple gibt weitere Infos zu Sicherheitslücken in iOS 18 heraus
- 9:33 : Vielfältige Attacken auf Nvidias KI-Architektur Hopper vorstellbar
- 9:33 : VM-Ausbruch möglich: VMware-Lücken lassen Hacker ganze Cloudumgebungen kapern
- 9:32 : Detection engineering at scale: one step closer (part three)
- 9:32 : Integrating Payroll Systems: Risks, Challenges, and Solutions
- 9:32 : eSentire Next Level MDR identifies, prioritizes, and mitigates exposures
- 9:32 : Sonatype AI SCA provides visibility and control over AI/ML usage
- 9:32 : Would-be Extortionists Send “BianLian” Ransom Notes in the Mail
- 9:32 : US Government Shuts Down Top Tech Unit: Hashtag Trending for Wednesday, March 5, 2025
- 9:6 : iOS 18: Apple reicht Infos zu Sicherheitspatches nach, aber nicht bei allen
- 9:6 : [UPDATE] [hoch] VMware ESXi: Mehrere Schwachstellen
- 9:5 : Silicon UK AI For Your Business Podcast: Entering the Age of Agentic AI in 2025?
- 9:5 : ICS Environments and Patch Management: What to Do If You Can’t Patch
- 9:5 : Understanding the Abu Dhabi Healthcare Information and Cyber Security Standard
- 9:5 : Apple is challenging U.K.’s iCloud encryption backdoor order
- 9:5 : NVIDIA Warns of Multiple Vulnerabilities that Let Attackers Execute Malicious Code
- 9:5 : Zoho ADSelfService Plus Vulnerability Let Attackers Gain Unauthorized Access
- 9:5 : HPE Remote Support Tool Vulnerability Let Attackers Execute Arbitrary code – PoC Released
- 9:5 : GrassCall Malware Attacking Job Seekers To Steal Login Credentials
- 9:5 : Researchers Detailed APT28’s HTA Trojan Multi-Layer Obfuscation Techniques
- 9:5 : How prevention is better than cure
- 8:33 : Linux-Lücke wird attackiert
- 8:32 : The UK’s Competition Watchdog Launches Investigation into Mobile Platforms
- 8:32 : VMware Urges Immediate Patching for Exploited Vulnerabilities: CISA Issues Emergency Directive
- 8:32 : New Eleven11bot DDoS Botnet Powered by 80,000 Hacked Devices
- 8:32 : Omega Systems’ Enterprise Password Management solution reduces the risk of cyberattacks
- 8:32 : Apple vs UK encryption backdoor, VMware bugs allow sandbox escape, JavaGhost targets AWS
- 8:8 : Vorsicht bei Cyberattacke – Firmenleitung haftet
- 8:8 : LibreOffice: Funktion zur Sharepoint-Integration ermöglicht Makro-Ausführung
- 8:7 : Zoho ADSelfService Plus Flaw Allows Hackers to Gain Unauthorized Access
- 8:7 : PoC Released for HPE Remote Support Tool Vulnerability Allowing Remote Code Execution
- 8:7 : Enhance Private 5G Security for Industrial Deployments
- 8:7 : Seven Malicious Go Packages Found Deploying Malware on Linux and macOS Systems
- 8:7 : US Cyber Security Confusion: Cyber Security Today for Wednesday, March 5, 2015
- 8:5 : IT Security News Hourly Summary 2025-03-05 09h : 3 posts
- 7:32 : From Event to Insight: Unpacking a B2B Business Email Compromise (BEC) Scenario
- 7:32 : U.S. CISA adds Linux kernel and VMware ESXi and Workstation flaws to its Known Exploited Vulnerabilities catalog
- 7:5 : Can Tokenization Help Secure Payment Data for Financial Institutions
- 7:5 : Chrome 134 Released, Fixes 14 Vulnerabilities That Could Crash the Browser
- 7:5 : New Mobile App Scanning Tool Created by Approov and CMU Africa
- 6:32 : DDoS Attack on Beeline Russia
- 6:32 : NVIDIA Issues Warning About Severe Security Flaws Enabling Code Attacks
- 6:3 : The UK’s Competition Watchdog Launches Investigation into Apple and Google’s Mobile Platforms
- 6:3 : Windows KDC Proxy RCE Vulnerability Allows Remote Server Takeover
- 6:3 : Chrome 134 Launches with Patches for 14 Crash-Inducing Vulnerabilities
- 6:3 : Why multi-cloud security needs a fresh approach to stay resilient
- 6:3 : Specops Secure Access strengthens security for Windows, RDP, and VPN logins
- 6:3 : Fix Inventory: Open-source cloud asset inventory tool
- 5:32 : Scammers take over social media
- 5:5 : IT Security News Hourly Summary 2025-03-05 06h : 2 posts
- 5:2 : News alert: Hunters announces ‘Pathfinder AI’ to enhance detection and response in SOC workflows
- 4:5 : Android prüft Google Messages und Anrufe per KI auf mögliche Betrugsversuche
- 2:5 : IT Security News Hourly Summary 2025-03-05 03h : 3 posts
- 2:5 : ISC Stormcast For Wednesday, March 5th, 2025 https://isc.sans.edu/podcastdetail/9350, (Wed, Mar 5th)
- 2:4 : The best travel VPNs of 2025: Expert tested and reviewed
- 1:32 : Ransomware thugs threaten Tata Technologies with leak if demands not met
- 0:32 : Google Cuts Off uBlock Origin on Chrome as Firefox Stands Firm on Ad Blockers
- 0:32 : VMware fixed three actively exploited zero-days in ESX products