107 posts were published in the last hour
- 21:36 : Friday Squid Blogging: How Squid Skin Distorts Light
- 20:34 : Critical Sudo bugs expose major Linux distros to local Root exploits
- 20:34 : Ransomware Attacks Spike Despite Gang Closure
- 17:9 : Schutzfunktion iOS 26: Das passiert, wenn Facetime nackte Menschen erkennt
- 17:9 : GitHub Copilot und Co.: Warum KI-Coding-Tools an komplexen Projekten scheitern
- 17:9 : Fingerabdruck oder PIN? Warum du deine Entsperrmethoden überdenken solltest
- 17:9 : Forscher decken auf: Diesen Einfluss hat googeln auf deine Kreativität
- 17:8 : Personal AI Agents Could Become Digital Advocates in an AI-Dominated World
- 17:8 : 2.2 Million People Impacted by Ahold Delhaize Data Breach
- 17:8 : Cybercrime Gang Hunters International Shuts Down, Returns Stolen Data as Goodwill
- 17:7 : Cloudflare Thwarts Record-Breaking DDoS Attack as Global Threat Escalates
- 16:41 : Yet More Stalkerware Leaks Secret Data: ‘Catwatchful’ is Latest Nasty App
- 16:41 : The 47-Day SSL Certificate Era: What It Means for Site Owners and IT Teams
- 16:7 : Anzeige: Methodik, Standards und Prüfung zum IT-Grundschutz-Praktiker
- 15:2 : AI and Cybersecurity: A Deep Dive into Enterprise Applications and Digital Sovereignty with Krish Banerjee
- 14:5 : IT Security News Hourly Summary 2025-07-04 15h : 9 posts
- 14:2 : Disrupting the Ransomware Attack Chain with Hybrid Mesh Security (Part 1)
- 13:33 : Verkehrsüberwachung: Schon Hunderte Autofahrer von erstem Handy-Blitzer erwischt
- 13:32 : Google fined $314M for misusing idle Android users’ data
- 13:32 : NightEagle APT Exploits Microsoft Exchange Flaw to Target China’s Military and Tech Sectors
- 13:5 : CII: Stellungnahme zum NIS2-Referentenentwurf
- 13:4 : Malicious SEO Plugins on WordPress Can Lead to Site Takeover
- 12:33 : Kommentar: Von wegen KI bedroht Jobs – Daten sind wirklich in Gefahr!
- 12:33 : Ukraine unterstützt: Russland verurteilt Hacker zu langer Haftstrafe
- 12:32 : Instagram Now Rotating TLS Certificates Daily with 1-Week Validity
- 12:32 : Apache APISIX Vulnerability Enables Cross-Issuer Access Under Misconfigurations
- 12:6 : Sogar Notstrom fehlt: Schlechte Sicherheitstandards in Rechenzentren des Bundes
- 12:6 : [NEU] [mittel] Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service
- 12:5 : SquareX Reveals That Employees Are No Longer The Weakest Link, Browser AI Agents Are
- 12:5 : Ransomware: Hunters International Is Not Shutting Down, It’s Rebranding
- 11:35 : Scattered Spider Enhances Tactics to Exploit Legitimate Tools for Evasion and Persistence
- 11:35 : Multiple PHP Vulnerabilities Allow SQL Injection & DoS Attacks – Update Now
- 11:34 : Critical HIKVISION applyCT Vulnerability Exposes Devices to Code Execution Attacks
- 11:34 : Validation is an Increasingly Critical Element of Cloud Security
- 11:5 : IT Security News Hourly Summary 2025-07-04 12h : 4 posts
- 11:4 : Überweisungen: Belgische Banken starten VoP-Verfahren vorzeitig
- 11:4 : Cyberangriffe auf Russland: Pro-ukrainischer Hacker zu 16 Jahren Haft verurteilt
- 11:3 : Hackers Abuse Legitimate Inno Setup Installer to Deliver Malware
- 11:3 : Next.js Vulnerability Allows Attackers to Trigger DoS via Cache Poisoning
- 11:3 : In Other News: Hacker Helps Kill Informants, Crylock Developer Sentenced, Ransomware Negotiator Probed
- 10:33 : [UPDATE] [mittel] Linux Kernel: Schwachstelle ermöglicht Denial of Service
- 10:32 : Cisco Issues Emergency Fix for Critical Root Credential Flaw in Unified CM
- 10:32 : Critical HIKVISION applyCT Flaw Allows Remote Code Execution
- 10:32 : Researchers Discover New Method to Identify Azure Arc in Enterprise Environments and Maintain Persistence
- 10:32 : Writable File in Lenovo Path Lets Attackers Evade AppLocker Restrictions
- 10:32 : Mastering Real-Time Cloud Data Governance Amid Evolving Threats and Regulations
- 10:32 : WhatsApp Under Fire for AI Update Disrupting Group Communication
- 10:32 : Taiwan Flags Chinese Apps Over Data Security Violations
- 10:7 : Kaspersky-FAQ zur Verwendung und Verwaltung von Passkeys | Offizieller Blog von Kaspersky
- 10:7 : Github: Forscher macht aus gelöschten Commits 25.000 US-Dollar
- 10:6 : Hunters International Ransomware Gang Rebrands as World Leaks
- 10:6 : Hackers Exploit Java Debug Wire Protocol Servers to Deploy Cryptomining Payloads
- 10:6 : Hackers use Fake Cloudflare Verification Screen to Trick Users into Executing Malware
- 10:6 : New “123 | Stealer” Advertised on Underground Hacking Forums for $120 Per Month
- 10:6 : Microsoft Investigating Forms Service Issue Not Accessible for Users
- 10:6 : New Sophisticated Attack ypasses Content Security Policy Using HTML-Injection Technique
- 10:6 : Massive Android Ad Fraud ‘IconAds’ Leverages Google Play to Attack Phone Users
- 10:6 : The Role Culture and Trust Play in Countering Deepfakes
- 10:5 : Critical Sudo Vulnerabilities Let Local Users Gain Root Access on Linux, Impacting Major Distros
- 10:5 : Your AI Agents Might Be Leaking Data — Watch this Webinar to Learn How to Stop It
- 9:36 : “FoxyWallet”: Mehr als 40 bösartige Firefox-Add-ons entdeckt
- 9:33 : Massive Android Ad Fraud ‘IconAds’ Uses Google Play to Target and Exploit Users
- 9:9 : Cybercriminals Use Fake Cloudflare Verification Screens to Deceive Users into Running Malware
- 9:9 : EU Launches Plan to Implement Quantum-Secure Infrastructure
- 8:37 : [NEU] [hoch] Dell Data Protection Advisor: Mehrere Schwachstellen
- 8:37 : [UPDATE] [hoch] Cisco Unified Communications Manager (CUCM): Schwachstelle ermöglicht Erlangen von Administratorrechten
- 8:35 : A flaw in Catwatchful spyware exposed logins of +62,000 users
- 8:35 : Google Ordered to Pay $314M for Misusing Android Users’ Cellular Data Without Permission
- 8:5 : IT Security News Hourly Summary 2025-07-04 09h : 3 posts
- 7:36 : Namensänderung in letzter Sekunde: So sollte ChatGPT ursprünglich heißen
- 7:36 : Härtere Strafen für Geldautomatensprenger geplant
- 7:36 : Ransomware-Lösegeld-Verhandler gönnte sich offenbar Provisionen
- 7:36 : Rechnungshof warnt: Cybersicherheit der Bundes-IT unzureichend
- 7:36 : [NEU] [mittel] Vercel Next.js: Mehrere Schwachstellen
- 7:36 : [NEU] [niedrig] Docker Desktop: Schwachstelle ermöglicht Offenlegung von Informationen
- 7:36 : [NEU] [mittel] LANCOM LW-500 Access Point: Schwachstelle ermöglicht Denial of Service
- 7:35 : Multiple PHP Vulnerabilities Enables SQLi and DoS Attacks – Update Now
- 7:35 : Undetectable Android spyware is detectable, Hunters ransomware quits, Salt Typhoon dormant
- 7:6 : Cybercrime: Lösegeldverhandler zwackte sich wohl Provisionen ab
- 7:5 : New “123 | Stealer” Malware Rented on Dark Web for $120/Month
- 7:5 : Researchers Defeat Content Security Policy Protections via HTML Injection
- 7:5 : Catwatchful Android Spyware Leaks Credentials of 62,000+ Users
- 7:5 : NTLM relay attacks are back from the dead
- 6:5 : [UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service
- 6:5 : [UPDATE] [hoch] Linux Kernel: Mehrere Schwachstellen
- 6:5 : [UPDATE] [mittel] IBM Semeru Runtime: Mehrere Schwachstellen ermöglichen Denial of Service
- 6:5 : New hires, new targets: Why attackers love your onboarding process
- 5:38 : Anzeige: Microsoft-365 richtig absichern – so gelingt’s
- 5:38 : [UPDATE] [mittel] F5 BIG-IP: Mehrere Schwachstellen
- 5:38 : [UPDATE] [mittel] Apache Camel: Schwachstelle ermöglicht Manipulation von Dateien
- 5:38 : [UPDATE] [mittel] Apache Camel: Schwachstelle ermöglicht Manipulation
- 5:37 : A Simple Guide to Launching GenAI Successfully
- 5:37 : Exposed and unaware? Smart buildings need smarter risk controls
- 5:37 : Africa’s cybersecurity crisis and the push to mobilizing communities to safeguard a digital future
- 5:8 : Azure API Vulnerabilities Leak VPN Keys and Built-In Roles Allow Over-Privileged Access
- 5:8 : New Hpingbot Abusing Pastebin for Payload Delivery and Hping3 Tool to Launch DDoS Attacks
- 4:38 : Kaspersky erhebt Kosten von IT-OT-Angriffen
- 4:37 : AI Dilemma: Emerging Tech as Cyber Risk Escalates
- 4:37 : New infosec products of the week: July 4, 2025
- 4:37 : Internet outages are costing companies millions every month
- 3:3 : How government cyber cuts will affect you and your business
- 3:3 : Bridging the Security Knowledge Gap: Introducing AI ExplAIn for Imperva Cloud WAF
- 1:37 : Psychological Contract Breach and the Power of Security Culture – Research Insights
- 23:36 : Why Diverse Cloud Environments Require Flexible Security
- 23:36 : Catwatchful – 61,641 breached accounts
- 23:5 : IT Security News Hourly Summary 2025-07-04 00h : 5 posts
- 22:55 : IT Security News Daily Summary 2025-07-03