210 posts were published in the last hour
- 21:7 : Protecting Your Business Communications: The Critical Role of Secure Email Gateways
- 21:7 : The Person in Charge of Testing Tech for US Spies Has Resigned
- 21:7 : Security Pros Say Hunters International RaaS Operators are ‘Changing Jerseys’
- 21:7 : WordPress Plugin Flaw Exposes 600,000 Sites to File Deletion
- 20:5 : IT Security News Hourly Summary 2025-07-03 21h : 9 posts
- 19:34 : Self-Supervised Learning Techniques
- 19:34 : RegRipper
- 19:34 : China-linked group Houken hit French organizations using zero-days
- 19:4 : How to Check If Your Phone Is Tapped: 11 Signs + Best Practices
- 18:32 : Trump Officials Want to Prosecute Over the ICEBlock App. Lawyers Say That’s Unconstitutional
- 18:32 : Apache Tomcat and Camel Vulnerabilities Actively Exploited in The Wild
- 18:32 : Citrix Warns Authentication Failures Following The Update of NetScaler to Fix Auth Vulnerability
- 18:32 : Threat Actors Widely Abuse .COM TLD to Host Credential Phishing Website
- 18:7 : A message from Bruce the mechanical shark
- 18:7 : New Fake Marketplace From China Mimics Top Retail Brands for Fraud
- 18:7 : The OWASP Top 10 for LLM Applications: An Overview of AI Security Risks
- 18:7 : There’s still time to share your story
- 17:37 : CBP Wants New Tech to Search for Hidden Data on Seized Phones
- 17:37 : Cybercriminals Target Brazil: 248,725 Exposed in CIEE One Data Breach
- 17:37 : Dire Wolf Gang Hits Tech and Manufacturing Sectors, Targets 11 Countries
- 17:37 : North Korean Hackers Target Fintech and Gaming Firms with Fake Zoom Apps
- 17:6 : Anzeige: So werden mit Microsoft Copilot Arbeitsprozesse optimiert
- 17:5 : New Hpingbot Exploits Pastebin for Payload Delivery and Uses Hping3 for DDoS Attacks
- 17:5 : Beware of Fake Chinese E-Commerce Sites Imitating Apple, Wrangler, and Exploiting Payment Services like MasterCard and PayPal
- 17:5 : Dust hits $6M ARR helping enterprises build AI agents that actually do stuff instead of just talking
- 17:5 : AI-Generated Phishing Sites Mimic Okta, Microsoft 365 in New Threat Campaign
- 17:5 : Big Tech’s Mixed Response to U.S. Treasury Sanctions
- 17:5 : Mitsubishi Electric MELSOFT Update Manager
- 17:5 : CISA Releases Four Industrial Control Systems Advisories
- 17:5 : Hitachi Energy MicroSCADA X SYS600
- 17:5 : Hitachi Energy Relion 670/650 and SAM600-IO Series
- 17:5 : Mitsubishi Electric MELSEC iQ-F Series
- 17:5 : California Residents Are Protesting Against Waymo Self-Driving Cars
- 17:5 : IT Security News Hourly Summary 2025-07-03 18h : 5 posts
- 17:5 : Massive Android Fraud Operations Uncovered: IconAds, Kaleidoscope, SMS Malware, NFC Scams
- 16:11 : Azure API Vulnerabilities Expose VPN Keys and Grant Over-Privileged Access via Built-In Roles
- 16:11 : Microsoft Windows Firewall complains about Microsoft code
- 16:11 : Google open-sources privacy tech for age verification
- 15:38 : Kriminalität: Scammer erbeuten in Deutschland mehr als 10 Milliarden Euro
- 15:36 : Citrix Alerts on Authentication Failures After NetScaler Update to Resolve Auth Vulnerability
- 15:36 : Threat Actors Exploit .COM TLD to Host Widespread Credential Phishing Sites
- 15:36 : CVE-2025-29306 – Unauthenticated Remote Code Execution in FoxCMS v1.2.5 via Unserialize Injection
- 15:36 : Surmodics Hit by Cyberattack, Shuts Down IT Systems Amid Ongoing Investigation
- 15:5 : Apache Tomcat and Camel Vulnerabilities Actively Targeted in Cyberattacks
- 15:5 : Amazon Prime Day 2025: Deals Await, But So Do the Cyber Criminals
- 15:4 : Ransomware gang Hunters International says it’s shutting down
- 15:4 : Scientists just simulated the “impossible” — fault-tolerant quantum code cracked at last
- 15:4 : AI Tools Like GPT Direct Users to Phishing Sites Instead of Legitimate Ones
- 15:4 : 13-Year-Old Dylan – Youngest Security Researcher Collaborates with Microsoft Security Response Center
- 15:4 : Android Spyware Catwatchful Exposes Credentials of Over 62,000+ Customer Accounts
- 15:4 : Urgent Update: Microsoft Edge Fixes Actively Exploited Chromium Vulnerability
- 15:4 : Microsoft Confirms Error Entry in Windows Firewall With Advanced Security
- 15:4 : Young Consulting finds even more folks affected in breach mess – now over 1 million
- 15:4 : Fake Firefox Extensions Mimic Crypto Wallets to Steal Seed Phrases
- 15:4 : Privilege Escalation Flaw Found in Azure Machine Learning Service
- 14:6 : Mehrere Schwachstellen in Sitecore CMS | Offizieller Blog von Kaspersky
- 14:5 : OpenAI Rolls Out Premium Data Connections for ChatGPT Users
- 14:5 : CVE Program Launches Two New Forums to Enhance CVE Utilization
- 14:5 : IT Security News Hourly Summary 2025-07-03 15h : 11 posts
- 13:39 : Orange Cyberdefense im deutschen Siegerteam der NATO-Cyberübung
- 13:37 : Real Performance Improvements 2025
- 13:37 : 13-Year-Old Dylan Joins Forces with Microsoft Security Response Center as the Youngest Security Researcher
- 13:37 : Scattered Spider Attacks US Airlines – The MSP Cyber News Snapshot – July 3rd
- 13:37 : RondoDox Unveiled: Breaking Down a New Botnet Threat
- 13:8 : KI-Debugging-Tool MCP Inspector: Codeausführung durch Sicherheitslücke möglich
- 13:7 : Wordfence Intelligence Weekly WordPress Vulnerability Report (June 23, 2025 to June 29, 2025)
- 13:7 : Microsoft Edge Fixes Actively Exploited Chromium Flaw — Update Immediately
- 13:7 : Let’s Encrypt Expands to Issue SSL/TLS Certificates for IP Addresses
- 13:7 : Microsoft Acknowledges Error Entry in Windows Firewall With Advanced Security
- 13:7 : New ‘BUBBAS GATE’ Malware Advertised on Telegram Boasts SmartScreen and AV/EDR Bypass
- 13:7 : Drug cartel hacked cameras and phones to spy on FBI and identify witnesses
- 13:6 : Catwatchful “child monitoring” app exposes victims’ data
- 13:6 : Meta calls €200M EU fine over pay-or-consent ad model ‘unlawful’
- 13:6 : You can’t trust AI chatbots not to serve you phishing pages, malicious downloads, or bad code
- 12:36 : CEOs von Saleforce und Google geben mit der Effizienz von KI an: Doch wie viel Arbeit übernimmt sie tatsächlich?
- 12:35 : Versuchte Entführung: Krypto-Milliardär beißt Kidnapper einen Finger ab
- 12:34 : Pro-Russian Hackers Forge New Alliances for High-Profile Cyberattacks
- 12:34 : Top 10 Best Google Alternatives In 2025
- 12:34 : Beware of Chinese Fake e-Commerce Websites Mimic Apple, Wrangler Jeans and Abuses Payment Services Like MasterCard and PayPal
- 12:34 : Pro-Russian Hackers Making New Alliances to Launch High-Profile Attacks
- 12:33 : Microsoft Confirms Laying Off 9,000 Employees, Impacting 4% of its Workforce
- 12:33 : Anthropic’s MCP Server Vulnerability Allowed Attackers to Escape Sandbox and Execute Code
- 12:7 : 12-Year-Old Sudo Vulnerability Exposes Linux Systems to Root Privilege Escalation
- 12:7 : CISA Adds One Known Exploited Vulnerability to Catalog
- 12:7 : Automation and Vulnerability Exploitation Drive Mass Ransomware Breaches
- 11:38 : [NEU] [UNGEPATCHT] [hoch] Google Chrome: Mehrere Schwachstellen ermöglichen Umgehen von Sicherheitsvorkehrungen
- 11:38 : Silicon AI for Your Business Podcast: The Transformation Code
- 11:38 : Bumble Chief Accuses Staff Of ‘Freaking Out’ Over Job Cuts
- 11:38 : Intel’s Tan ‘May Shift’ Customers To New Process
- 11:37 : Surveillance Used by a Drug Cartel
- 11:37 : Ransomware crew Hunters International shuts down, hands out keys to victims
- 11:37 : Cisco Warns of Hardcoded Credentials in Enterprise Software
- 11:37 : Undetectable Android Spyware Backfires, Leaks 62,000 User Logins
- 11:37 : Analysis Surfaces Increased Usage of LLMs to Craft BEC Attacks
- 11:37 : Cisco fixes maximum-severity flaw in enterprise unified comms platform (CVE-2025-20309)
- 11:37 : Over 40 Malicious Firefox Extensions Target Cryptocurrency Wallets, Stealing User Assets
- 11:37 : North Korean Hackers Target Crypto Firms with Novel macOS Malware
- 11:12 : „Wie ein Rorschach-Test“: Warum die KI-Urheberrechtsurteile noch vieles offen lassen
- 11:12 : Erschreckend einfach: Mit 10 Dollar und ein paar Tricks wird ChatGPT zum Hassredner
- 11:12 : KI-Entwicklertool MCP Inspector: Kritische Lücke erlaubt Codeausführung
- 11:11 : [NEU] [mittel] poppler: Schwachstelle ermöglicht Denial of Service
- 11:11 : [NEU] [hoch] Drupal: Mehrere Schwachstellen ermöglichen Umgehen von Sicherheitsvorkehrungen
- 11:11 : [NEU] [mittel] Linux Kernel: Mehrere Schwachstellen
- 11:11 : [NEU] [mittel] Hashicorp Vagrant: Schwachstelle ermöglicht Codeausführung
- 11:10 : N Korean Hackers Drop NimDoor macOS Malware Via Fake Zoom Updates
- 11:10 : Anthropic MCP Server Flaw Allows Sandbox Escape and Code Execution
- 11:10 : AI Tools Like GPT, Perplexity Misleading Users to Phishing Sites
- 11:10 : Microsoft to Lay Off 9,000 Employees, Affecting 4% of Workforce
- 11:10 : Microsoft, PayPal, DocuSign, and Geek Squad faked in callback phishing scams
- 11:10 : Your Brother printer might have a critical security flaw – how to check and what to do next
- 11:10 : Europol shuts down Archetyp Market, longest-running dark web drug marketplace
- 11:10 : Top 30 Best Penetration Testing Tools – 2025
- 11:10 : Weaponization of LNK Files Surge by 50% and Primarily Used in Four Different Malware Categories
- 11:9 : Wing FTP Server Max Severe Vulnerability Let Attackers Take Full Server Control
- 11:9 : Keymous+ Hacker Group Claims 700+ DDoS Attacks Around The Globe
- 11:9 : 12-Year-Old Sudo Linux Vulnerability Enables Privilege Escalation to Root User
- 11:9 : North Korean Hackers Use Fake Zoom Updates to Install macOS Malware
- 11:9 : Beyond Silos: The Power of Internal Collaboration on Transforming Fraud Prevention
- 11:9 : Chinese Hackers Exploit Ivanti CSA Zero-Days in Attacks on French Government, Telecoms
- 11:9 : The Hidden Weaknesses in AI SOC Tools that No One Talks About
- 11:5 : IT Security News Hourly Summary 2025-07-03 12h : 19 posts
- 10:31 : Eigenartige Firewall-Fehler: Microsoft gesteht Update-Panne bei Windows 11 24H2
- 10:8 : OpenAI verrät dir, wann du welches ChatGPT-Modell benutzen solltest
- 10:8 : Update-Panne bei Microsoft: Firewall-Fehler in Windows 11 können ignoriert werden
- 10:7 : Apache Under the Lens: Tomcat’s Partial PUT and Camel’s Header Hijack
- 10:7 : The Promise and Peril of Digital Security in the Age of Dictatorship
- 9:39 : Microsoft Edge: Schwachstelle ermöglicht Ausführen von beliebigem Programmcode mit Benutzerrechten
- 9:39 : [NEU] [hoch] Microsoft Edge: Schwachstelle ermöglicht Ausführen von beliebigem Programmcode mit Benutzerrechten
- 9:38 : Heimdal Partners with Portland to Deliver Unified Cybersecurity for Benelux MSPs
- 9:10 : Wieso du vielleicht doch öfter mal Emojis nutzen solltest
- 9:10 : Ransomware: Lösegeldverhandler soll von Hackern Provision kassiert haben
- 9:10 : [NEU] [hoch] Cisco Unified Communications Manager (CUCM): Schwachstelle ermöglicht Erlangen von Administratorrechten
- 9:8 : Tesla Second-Quarter Deliveries Plummet In Second Quarter
- 9:8 : Qantas Confirms Customer Data Stolen By Hackers
- 9:8 : Mainland China To Overtake Taiwan Chip Capacity By 2030
- 9:8 : Google Proposes Latest Search Changes To Avoid EU Fine
- 9:8 : Microsoft To Cut 9,000 More Jobs As It Invest In AI
- 9:8 : Ransomware Attacks on Organizations Surge 213% in Q1 of 2025
- 9:8 : OT Security in Ports: Lessons from the Coast Guard’s Latest Warning
- 9:8 : CISA Warns of Chrome 0-Day Vulnerability Exploited in Attacks
- 9:8 : Chinese Student Charged for Running a Mass Smishing Campaign to Harvest Victims Personal Details
- 9:8 : Cisco Unified CM Vulnerability Allows Remote Attacker to Login As Root User
- 9:7 : 10 World’s Best Cyber Security Companies – 2025
- 9:7 : Top 10 Best Penetration Testing Tools – 2025
- 9:7 : Linux Users Urged to Patch Critical Sudo CVE
- 8:36 : [UPDATE] [hoch] IGEL OS: Schwachstelle ermöglicht Privilegieneskalation
- 8:35 : China Linked Houken Hackers Breach French Systems with Ivanti Zero Days
- 8:35 : Keymous+ Hacker Group Claims Responsibility for Over 700 Global DDoS Attacks
- 8:35 : Kelly Benefits data breach has impacted 550,000 people, and the situation continues to worsen as the investigation progresses
- 8:35 : We Are Losing the Scan/Patch Battle
- 8:12 : Cisco entfernt SSH-Hintertür in Unified Communications Manager
- 8:12 : Ethereum’s Pivotal Role in Decentralized Finance Evolution
- 8:10 : Surge in LNK File Weaponization by 50%, Fueling Four Major Malware Types
- 8:9 : Apache Seata Flaw Enables Deserialization of Untrusted Data
- 8:8 : Cl0p Ransomware Data Exfiltration Vulnerable to RCE Attacks
- 8:8 : Threat Actors Weaponize PDFs to Impersonate Microsoft, DocuSign, Dropbox and More in Phishing Attack
- 8:8 : Let’s Encrypt rolls out free security certs for IP addresses
- 8:8 : The Differences and Similarities Between Shadow IT and BYOC
- 8:7 : Columbia hack, hunger relief ransomware, Qantas breach
- 8:5 : IT Security News Hourly Summary 2025-07-03 09h : 4 posts
- 7:31 : Backdoor in Unified CM: Fest kodierte Admin-Zugangsdaten in Cisco-Tool entdeckt
- 7:7 : Cyberdome: Deutschland und Israel kooperieren in Cyberabwehr
- 7:6 : Cisco Unified CM Vulnerability Lets Remote Attacker Gain Root Access
- 7:6 : Wing FTP Server Vulnerability Allows Full Server Takeover by Attackers
- 7:5 : ChatGPT creates phisher’s paradise by recommending the wrong URLs for major companies
- 6:33 : New macOS Malware Employs Process Injection and Remote Communications to Exfiltrate Keychain Credentials
- 6:33 : Esse Health Data Breach Exposes 263,000 Patients Personal and Health Information
- 6:33 : StealthMACsec strengthens Ethernet network security
- 6:33 : GitPhish: Open-source GitHub device code flow security assessment tool
- 6:4 : ModSecurity WAF Vulnerability Enables DoS Using Empty XML Elements
- 6:4 : How to Secure Your Promo Codes Against Cyber Exploits
- 6:4 : A third of organisations take more than 90 days to remediate threats
- 6:4 : Cyberattacks are draining millions from the hospitality industry
- 6:4 : Healthcare CISOs must secure more than what’s regulated
- 5:36 : AI tools are everywhere, and most are off your radar
- 5:35 : Critical Cisco Vulnerability in Unified CM Grants Root Access via Static Credentials
- 5:6 : Cl0p Ransomware’s Exfiltration Process Exposes RCE Vulnerability
- 5:6 : Gamaredon in 2024: Cranking out spearphishing campaigns against Ukraine with an evolved toolset
- 5:5 : IT Security News Hourly Summary 2025-07-03 06h : 1 posts
- 4:38 : 2025-07-02: Lumma Stealer infection with follow-up Rsockstun malware
- 4:38 : IDE Extensions Like VSCode Let Attackers Bypass Trust Checks and Malware on Developer Machines
- 4:38 : 90% aren’t ready for AI attacks, are you?
- 4:5 : Industrial security is on shaky ground and leaders need to pay attention
- 3:35 : Taiwan: Ehemaliger Rettungssanitäter verkauft Daten aus Leitstelle an Bestatter
- 2:2 : ISC Stormcast For Thursday, July 3rd, 2025 https://isc.sans.edu/podcastdetail/9512, (Thu, Jul 3rd)
- 23:34 : Microsoft Authenticator Users: Your Passwords Could Be Inaccessible Soon – Act Now
- 23:5 : IT Security News Hourly Summary 2025-07-03 00h : 1 posts
- 23:3 : Cisco scores a perfect 10 – sadly for a critical flaw in its comms platform
- 22:55 : IT Security News Daily Summary 2025-07-02
- 22:33 : Google Releases Emergency Fix For Chrome Zero-Day Flaw – Users Should Update Now
- 22:10 : Schatten KI gefährdet Unternehmen
- 22:10 : KI-Agenten im Browser: Wie die Helfer zu neuen Risiken führen
- 22:10 : Google Wallet: So kannst du bald dein Alter verifizieren, ohne persönliche Daten zu übermitteln
- 22:10 : Europäische GenAI: So gelingt der Wechsel in fünf Schritten
- 22:10 : Schwachstellen: IBM Storage Scale für Attacken anfällig
- 22:10 : Windows 11: Microsoft aktiviert Hotpatching standardmäßig
- 22:10 : Cyberattacke: Angreifer öffnen Staudammventile
- 22:10 : Sicherheitslücken entdeckt: Mehrere Sportuhren per Bluetooth angreifbar
- 22:10 : Cyberangriff in Norwegen: Hacker reißen Ventile eines Staudamms auf
- 22:9 : Agentic AI Is Here ? and It?s Shaping the Future of Bot Defense
- 22:9 : US Senate Eliminates State AI Restrictions In 99-1 Vote
- 22:9 : California Jury Finds Google Liable For $314.6m Data Payout
- 22:9 : Blind Eagle Linked to Russian Host Proton66 in Latin America Attacks
- 22:9 : Qantas Confirms Major Data Breach Linked to Third-Party Vendor
- 22:9 : New macOS Malware Uses Process Injection and Remote Access to Steal Keychain Credentials
- 22:9 : Esse Health Data Breach Exposes Personal and Medical Information of 263,000 Patients
- 22:8 : Cybercriminals Use Malicious PDFs to Impersonate Microsoft, DocuSign, and Dropbox in Targeted Phishing Attacks
- 22:8 : Gamaredon Unleashes Six New Malware Tools for Stealth, Persistence, and Lateral Movement
- 22:8 : Chinese Student Charged in Mass Smishing Campaign to Steal Victims’ Personal Information
- 22:8 : Microservice Madness: Debunking Myths and Exposing Pitfalls