180 posts were published in the last hour
- 22:33 : Cybersecurity: Wie Tabletop-Übungen dein Team auf den Ernstfall vorbereiten
 - 22:32 : Less is more: How ‘chain of draft’ could cut AI costs by 90% while improving performance
 - 21:32 : AI-powered SEO services: revolutionizing digital marketing
 - 21:32 : U.S. CISA adds Multiple Cisco Small Business RV Series Routers, Hitachi Vantara Pentaho BA Server, Microsoft Windows Win32k, and Progress WhatsUp Gold flaws to its Known Exploited Vulnerabilities catalog
 - 21:5 : Less is more: How ‘Chain of Draft’ could cut AI costs by 90% while improving performance
 - 21:5 : Paragon Partition Manager Vulnerabilities Let Attackers Escalate Privilege & Trigger DoS Attacks
 - 20:32 : Bubba AI, Inc. is launching Comp AI to help 100,000 startups get SOC 2 compliant by 2032.
 - 20:5 : IT Security News Hourly Summary 2025-03-03 21h : 3 posts
 - 20:4 : Anthropic raises $3.5 billion, reaching $61.5 billion valuation as AI investment frenzy continues
 - 19:32 : Fake IT Support Calls Trick Microsoft Teams Users into Installing Ransomware
 - 19:32 : Lee Enterprises ransomware attack hits freelance and contractor payments
 - 19:3 : Enhancing the Wordfence Bug Bounty Program: New Incentives & a Stronger Focus on High-Impact Research
 - 19:3 : Want to avoid a drone disaster? Don’t skip your pre-flight and post-flight checklists
 - 19:3 : Beyond “Move Fast and Fail Fast”: Balancing Speed, Security, and … Sanity in Software Development (with Podcast)
 - 19:3 : Hackers Weaponizing PowerShell & Microsoft Legitimate Apps To Deploy Malware
 - 19:3 : Hackers Exploit AWS Misconfigurations to Launch Phishing Attacks via SES and WorkMail
 - 18:11 : Security: USA stoppen wohl digitale Kriegsführung gegen Russland
 - 18:10 : Routers Under Attack as Scanning Attacks on IoT and Networks Surge to Record Highs
 - 18:10 : 33.3 Million Cyber Attacks Targeted Mobile Devices in 2024 as Threats Surge
 - 18:10 : Threat Actors Exploiting AES Encryption for Stealthy Payload Protection
 - 18:9 : What is cyberstalking and how to prevent it?
 - 18:9 : Security Pros Push Back as Trump Orders Halt to Cyber Ops vs. Russia
 - 17:32 : CISA: No Change on Defending Against Russian Cyber Threats
 - 17:7 : CrowdStrike 2025 Global Threat Report: 51-Second Breaches Shake Cybercrime
 - 17:7 : Hackers Using ClickFix Tactic to Attack Windows Machine & Gain Full Control of System
 - 17:7 : Google’s New Email Shield Feature Let Users Hide Email From Apps
 - 17:7 : Online crime-as-a-service skyrockets with 24,000 users selling attack tools
 - 17:5 : IT Security News Hourly Summary 2025-03-03 18h : 10 posts
 - 16:34 : Angst vor Geheimnisverrat und Festnahmen: China warnt KI-Experten vor Reisen in die USA
 - 16:34 : 1,6 Millionen Geräte: Sicherheitsforscher warnen vor riesiger Bot-Armee
 - 16:33 : How to Automate Security Questionnaires and Reduce Response Time
 - 16:33 : U.S. Orders To Pause Offensive Cyber Operations Against Russia
 - 16:33 : CISA Adds Five Known Exploited Vulnerabilities to Catalog
 - 16:33 : US said to halt offensive cyber operations against Russia
 - 16:33 : Cybersecurity not the hiring-’em-like-hotcakes role it once was
 - 16:33 : Attackers Leverage Microsoft Teams and Quick Assist for Access
 - 16:5 : Enhancing Mobile Banking Security: Protecting Your Data from Cyber Threats
 - 16:5 : Vishing attacks surged 442% last year – how to protect yourself
 - 16:5 : National Consumer Protection Week: Keeping your personal data safe in a digitally connected world
 - 16:5 : Innovation vs. security: Managing shadow AI risks
 - 15:33 : Zero-Trust Infinite Security: Masking’s Powerful New Ally
 - 15:33 : U.S. Authorities recovered $31 Million Related to 2021 Uranium Finance cyber heist
 - 15:33 : Lee Enterprises Confirms Ransomware Attack Impacting 75+ Publications
 - 15:33 : Google Cloud Introduces Quantum-Safe Digital Signatures
 - 15:32 : GitHub Scam: Fake Game Mods Steal User Credentials and Data
 - 15:32 : DBS Bank to Cut 4,000 Jobs Over Three Years as AI Adoption Grows
 - 15:32 : Scammers Exploit Google and PayPal’s Infrastructure to Steal Users Private Data
 - 15:32 : Vulnerability Summary for the Week of February 24, 2025
 - 15:7 : Not Lost in Translation: Rosetta 2 Artifacts in macOS Intrusions
 - 15:7 : Havoc: SharePoint with Microsoft Graph API turns into FUD C2
 - 15:7 : CISA Denies Reports of Shift in Cybersecurity Posture Amid Russian Threats
 - 14:34 : Cybersecurity als Innovationsmotor
 - 14:34 : Ohne Nutzerinteraktion: Wie Hacker fremde Gitlab-Accounts übernehmen konnten
 - 14:33 : New Malware Campaign Exploits Microsoft Graph API to Infect Windows
 - 14:33 : As Skype shuts down, its legacy is end-to-end encryption for the masses
 - 14:33 : U.S. Halts Cyber Operations Targeting Russia
 - 14:33 : Attackers Automating Vulnerability Exploits with Few Hours of Disclosure
 - 14:32 : HiveOS Vulnerabilities Let Attackers Execute Arbitrary Commands
 - 14:32 : North Korean IT Workers Using Astrill VPN To Hide Their IPs
 - 14:32 : TikTok: Major investigation launched into platform’s use of children’s data
 - 14:5 : IT Security News Hourly Summary 2025-03-03 15h : 22 posts
 - 14:3 : U.K. ICO Investigates TikTok, Reddit, and Imgur Over Children’s Data Protection Practices
 - 14:3 : Hackers Exploit Paragon Partition Manager Driver Vulnerability in Ransomware Attacks
 - 14:3 : Hackers Use ClickFix Trick to Deploy PowerShell-Based Havoc C2 via SharePoint Sites
 - 14:3 : AI is Evolving Faster Than Our Ability to Secure It
 - 14:3 : ⚡ THN Weekly Recap: Alerts on Zero-Day Exploits, AI Breaches, and Crypto Heists
 - 14:3 : Phishing Campaign Uses Havoc Framework to Control Infected Systems
 - 13:33 : Sicherheitslücke: Per Passwort-Reset fremde Gitlab-Konten infiltriert
 - 13:33 : [UPDATE] [hoch] GNU Emacs: Schwachstelle ermöglicht Codeausführung
 - 13:33 : [UPDATE] [mittel] Red Hat JBoss Enterprise Application Platform (Wildfly): Schwachstelle ermöglicht Cross-Site Scripting
 - 13:32 : Mozilla Tweaks Firefox Terms After Uproar Over Data Use Language
 - 13:32 : Five Reasons to Choose Secure SD-WAN from Check Point
 - 13:32 : Microsoft unveils finalized EU Data Boundary as European doubt over US grows
 - 13:32 : Quantum Wars: Google, Microsoft, and Amazon’s Competing Paths to Fault-Tolerant Qubits
 - 13:32 : ⚡ THN Weekly Recap: Alerts on Zero-Day Exploits, AI Breaches, and Crypto Heists
 - 13:7 : [UPDATE] [hoch] Rancher: Mehrere Schwachstellen
 - 13:6 : Google Launches Shielded Email to Keep Your Address Hidden from Apps
 - 13:6 : JavaGhost Leveraging Amazon IAM Permissions To Trigger Phishing Attack
 - 13:6 : UK watchdog investigates TikTok and Reddit over child data privacy concerns
 - 13:6 : Polish space agency confirms cyberattack
 - 13:6 : US Seizes $31 Million Worth of Crypto Stolen in Uranium Finance Hack
 - 13:6 : AI-Driven Changes Lead to Workforce Reduction at Major Asian Bank
 - 13:6 : ⚡ THN Weekly Recap: Alerts on Zero-Day Exploits, AI Breaches, and Crypto Heists
 - 12:30 : Zohocorp ADSelfService Plus: Sicherheitsleck ermöglicht Kontenübernahme
 - 12:30 : [NEU] [mittel] IBM Business Automation Workflow: Schwachstelle ermöglicht Cross-Site Scripting
 - 12:5 : Sicherheitslücke in IBM Storage Virtualize ermöglicht Schadcode-Ausführung
 - 12:4 : [UPDATE] [mittel] Linux-Kernel: Mehrere Schwachstellen ermöglichen Denial of Service und unspezifische Angriffe
 - 12:4 : [UPDATE] [mittel] libTIFF: Mehrere Schwachstellen ermöglichen Denial of Service
 - 12:4 : [UPDATE] [hoch] EDK2 NetworkPkg IP stack implementation: Mehrere Schwachstellen
 - 12:4 : [UPDATE] [hoch] Red Hat Enterprise Linux: Mehrere Schwachstellen
 - 12:4 : [UPDATE] [mittel] libTIFF: Schwachstelle ermöglicht Denial of Service
 - 12:3 : US Army Soldier Arrested for Hacking 15 Telecom Carriers
 - 12:3 : New Vulnerability in Substack let Attackers Take Over Subdomains
 - 12:3 : MediaTek Warns of Multiple Vulnerabilities that let Attackers Escalate Privileges
 - 12:3 : Apache Derby Vulnerability Let Attackers Bypass Authentication with LDAP Injection
 - 12:3 : Vulnerable Paragon Driver Exploited in Ransomware Attacks
 - 12:3 : The New Ransomware Groups Shaking Up 2025
 - 12:3 : Vodafone Trials Quantum-Safe Tech to Protect Smartphone Browsing
 - 11:33 : Mark of the Web: Some Technical Details, (Mon, Mar 3rd)
 - 11:33 : Uncovering .NET Malware Obfuscated by Encryption and Virtualization
 - 11:33 : Foxconn Breaks Ground On Massive EV Headquarters
 - 11:33 : Bitcoin Drops 25 Percent From Peak
 - 11:32 : JavaGhost: Exploiting Amazon IAM Permissions for Phishing Attacks
 - 11:32 : Hackers Using PowerShell and Microsoft Legitimate Apps to Deploy Malware
 - 11:32 : Indian Stock Broker Angel One Discloses Data Breach
 - 11:5 : New Poco RAT Via Weaponized PDF Attacking Users to Capture Sensitive Data
 - 11:5 : Industry Moves for the week of March 3, 2025 – SecurityWeek
 - 11:5 : Black Basta Leak Offers Glimpse Into Group’s Inner Workings
 - 11:5 : DOGE Access to Personal Information and The Difficulty of Showing Harm in Privacy Litigation
 - 11:5 : IT Security News Hourly Summary 2025-03-03 12h : 21 posts
 - 10:34 : Neue KI-Funktionen: Reasoning und Deep Research von OpenAI und Co. günstig oder gratis nutzen
 - 10:34 : [NEU] [niedrig] ffmpeg: Schwachstelle ermöglicht Denial of Service
 - 10:34 : [NEU] [UNGEPATCHT] [niedrig] libarchive: Schwachstelle ermöglicht Denial of Service und weitere nicht spezifizierte Angriffe
 - 10:34 : [NEU] [mittel] vim (tar.vim plugin): Schwachstelle ermöglicht Codeausführung
 - 10:33 : Alibaba To Ship High-Performance RISC-V Chip In March
 - 10:33 : OpenAI Launches GPT-4.5 AI With More ‘Emotional Nuance’
 - 10:33 : Space Pirates Hackers Attacking IT Organizations With LuckyStrike Using OneDrive
 - 10:33 : Paragon Partition Manager Vulnerabilities Allow Attackers to Escalate Privileges and Trigger DoS Attacks
 - 10:33 : North Korean IT Workers Hide Their IPs Using Astrill VPN
 - 10:33 : Njrat Exploits Microsoft Dev Tunnels for C2 Communication
 - 10:33 : Hackers Abused Google and PayPal’s Infrastructure to Steal Users Personal Data
 - 10:33 : Serbian student activist’s phone hacked using Cellebrite zero-day exploit
 - 10:33 : Mobile malware evolution in 2024
 - 10:33 : Outpost24 introduces CyberFlex to streamline attack surface management and pen testing
 - 10:33 : ICO Launches TikTok Investigation Over Use of Children’s Data
 - 10:11 : [NEU] [mittel] IBM MQ: Schwachstelle ermöglicht Offenlegung von Informationen
 - 10:10 : TechRepublic Premium Editorial Calendar: Policies, Hiring Kits, and Glossaries for Download
 - 10:10 : Vidar & StealC 2.0 Released by Threat Actors With a Complete New Build
 - 10:10 : Governments can’t seem to stop asking for secret backdoors
 - 10:10 : BYOVD Attacks Exploit Zero-Day in Paragon Partition Manager
 - 10:10 : OpenSSL 3.5 Alpha Repository Freeze Approaching
 - 9:34 : [NEU] [hoch] Samsung Exynos: Mehrere Schwachstellen
 - 9:34 : [NEU] [hoch] Red Hat Ansible Automation Platform: Schwachstelle ermöglicht Privilegieneskalation
 - 9:33 : [NEU] [hoch] IBM Storage Virtualize Produkte: Mehrere Schwachstellen
 - 9:33 : Black Basta and Cactus Ransomware Groups Add BackConnect Malware to Their Arsenal
 - 9:32 : DeepSeek Open-Sources AI Model Training Details
 - 9:32 : Tencent Releases ‘Turbo’ AI Model To Counter DeepSeek
 - 9:32 : Agentic AI: Redefining the Future of Autonomy in Business
 - 9:32 : The Enterprise Strikes Back: Microsoft Exposes the Architects of AI Abuse
 - 9:32 : Qilin Claims Lee Enterprises Ransomware Attack
 - 9:32 : Beyond the Perimeter: Why Zero Trust Data Exchange is Essential for Modern Security
 - 9:3 : Angreifer bringen verwundbaren Paragon-Treiber mit und missbrauchen ihn
 - 9:3 : Cleveland Municipal Court Remains Closed After Cyber Event
 - 9:3 : Why Off-the-Shelf Security Solutions Fail: The Need for Custom Cybersecurity Services
 - 9:3 : Trigon – A New Exploit Revealed for iOS 0-Day kernel Vulnerability
 - 9:3 : A week in security (February 24 – March 2)
 - 9:2 : Top CVEs & Vulnerabilities February 2025
 - 8:32 : Microsoft To Shut Down Skype After 20 Years
 - 8:32 : Palo Alto Networks provides AI-powered security to 5G enterprise customers
 - 8:32 : Hegseth orders standdown, Microsoft terminates Skype, Cuban offers lifeline
 - 8:7 : Aufregende Zukunft für den Zutrittsmarkt
 - 8:7 : Sicherheitsleck in Treiber von Paragon Partition Manager wird missbraucht
 - 8:7 : Honor ändert Strategie: Sieben Jahre Android-Updates nur für Oberklasse-Smartphones
 - 8:5 : IT Security News Hourly Summary 2025-03-03 09h : 5 posts
 - 7:33 : Substack Custom Domain Vulnerability Exposes Thousands to Potential Hijacking
 - 7:33 : Windows Hyper-V NT Kernel Vulnerability Let Attackers Gain SYSTEM Privileges – PoC Released
 - 7:33 : Staying Ahead with Advanced PAM Techniques?
 - 7:33 : Smart Secret Scanning Techniques: Are You Updated?
 - 7:33 : Is Your Secrets Rotation Getting Better?
 - 7:4 : What is happening with TikTok?
 - 6:32 : Pros and Cons of Using AI in Cybersecurity
 - 6:32 : US Military Personnel Arrested for Hacking 15 Telecom Providers
 - 6:32 : Commix: Open-source OS command injection exploitation tool
 - 6:3 : Russia not a cyber threat to the United States
 - 6:3 : PoC Released for Windows Hyper-V SYSTEM Privilege Exploit
 - 6:3 : Color Dating – 220,503 breached accounts
 - 6:3 : Critical Vulnerability in Wazuh Server Enables Remote Attackers to Execute Malicious Code
 - 6:3 : Review: The Chief AI Officer’s Handbook
 - 6:3 : Vo1d Botnet’s Peak Surpasses 1.59M Infected Android TVs, Spanning 226 Countries
 - 5:32 : Trigon: Latest iOS Kernel Exploit Uncovered
 - 5:32 : How QR code attacks work and how to protect yourself
 - 5:9 : Secure Your 5G Business Transformation
 - 4:2 : US Cyber Command reportedly pauses cyberattacks on Russia
 - 2:5 : IT Security News Hourly Summary 2025-03-03 03h : 2 posts
 - 2:2 : ISC Stormcast For Monday, March 3rd, 2025 https://isc.sans.edu/podcastdetail/9346, (Mon, Mar 3rd)
 - 1:32 : Qilin ransomware gang claimed responsibility for the Lee Enterprises attack
 - 23:7 : DEF CON 32 – Efficient Bug Bounty Automation Techniques
 - 23:5 : IT Security News Hourly Summary 2025-03-03 00h : 3 posts
 - 23:0 : Gegen Telefonbetrug: Warum Familien ein Geheimwort vereinbaren sollten
 - 22:58 : IT Security News Weekly Summary 09