Ein Blockchainexperte hat die Aktivitäten eines Betrügers aufgedeckt. Kryptos im Wert von Millionen von US-Dollar, die er anderen gestohlen hat, sind wohl weg. (Cybercrime, Phishing) Dieser Artikel wurde indexiert von Golem.de – Security Lesen Sie den originalen Artikel: Vom Phish…
Author: wordpress
Google Cloud Donates A2A Protocol to Linux Foundation for Smarter, Secure Communication
In a landmark move for the artificial intelligence industry, Google Cloud has donated its Agent2Agent (A2A) protocol to the Linux Foundation, marking a significant step toward open, secure, and interoperable communication between AI agents. The announcement was made at the…
NCSC Warns of SHOE RACK Malware Targeting Fortinet Firewalls via DOH & SSH Protocols
The National Cyber Security Centre (NCSC) has issued a critical alert regarding a newly identified malware, dubbed SHOE RACK, which has been observed targeting Fortinet firewalls and other perimeter devices. Developed using the Go 1.18 programming language, this malicious software…
Critical Convoy Flaw Allows Remote Code Execution on Servers
A critical vulnerability (CVE-2025-52562) in Performave Convoy—a KVM server management panel widely used by hosting providers—enables unauthenticated attackers to execute arbitrary code on affected systems. Rated the maximum CVSS score of 10.0, this flaw exposes servers to complete compromise without…
US bans WhatsApp from House of Representatives staff devices
The U.S. government has banned WhatsApp from devices used by U.S. House of Representatives staff, saying the app poses potential security risks. This article has been indexed from Security News | TechCrunch Read the original article: US bans WhatsApp from…
Here’s a Subliminal Channel You Haven’t Considered Before
Scientists can manipulate air bubbles trapped in ice to encode messages. This article has been indexed from Schneier on Security Read the original article: Here’s a Subliminal Channel You Haven’t Considered Before
[NEU] [mittel] JetBrains TeamCity: Mehrere Schwachstellen
Ein Angreifer kann mehrere Schwachstellen in JetBrains TeamCity ausnutzen, um einen Cross-Site Scripting Angriff durchzuführen, und um Informationen offenzulegen. Dieser Artikel wurde indexiert von BSI Warn- und Informationsdienst (WID): Schwachstellen-Informationen (Security Advisories) Lesen Sie den originalen Artikel: [NEU] [mittel] JetBrains…
[NEU] [hoch] IGEL OS: Schwachstelle ermöglicht Privilegieneskalation
Ein lokaler Angreifer kann eine Schwachstelle in IGEL OS ausnutzen, um seine Privilegien zu erhöhen. Dieser Artikel wurde indexiert von BSI Warn- und Informationsdienst (WID): Schwachstellen-Informationen (Security Advisories) Lesen Sie den originalen Artikel: [NEU] [hoch] IGEL OS: Schwachstelle ermöglicht Privilegieneskalation
IT Security News Hourly Summary 2025-06-24 12h : 14 posts
14 posts were published in the last hour 9:33 : Jetzt beim Digitaltag 2025 mitmachen! 9:33 : Patch verschlafen: Großer Telco-Provider über Cisco-Lücke von 2023 attackiert 9:32 : LapDogs Hackers Compromise 1,000 SOHO Devices Using Custom Backdoor for Stealthy Attacks…
Amazon Launches Second Batch Of Project Kuiper Satellites
Second batch of Kuiper internet satellites launched from Florida, as Amazon builds rival to Elon Musk’s Starlink This article has been indexed from Silicon UK Read the original article: Amazon Launches Second Batch Of Project Kuiper Satellites
DHS Warns of Pro-Iranian Hacktivists Targeting U.S. Networks
The Department of Homeland Security (DHS) has raised alarms over an increasing wave of low-level cyberattacks targeting U.S. networks, orchestrated by pro-Iranian hacktivist groups. This warning comes in the wake of heightened geopolitical tensions following the United States’ military strikes…
OPPO Clone Phone Vulnerability Leaks Sensitive Data via Weak WiFi Hotspot
A newly disclosed security vulnerability in OPPO’s widely used Clone Phone app has raised significant concerns over user privacy, as it exposes sensitive data through a weakly secured WiFi hotspot. The flaw, cataloged as CVE-2025-27387, has been rated as high…
OWASP AI Testing Guide – A New Project to Detect Vulnerabilities in AI Applications
The Open Web Application Security Project (OWASP) has announced the development of a comprehensive OWASP AI Testing Guide, marking a significant milestone in addressing the growing security challenges posed by artificial intelligence implementations across industries. This specialized framework emerges as…
Aviatrix Cloud Controller Authentication Vulnerability Let Attackers Execute Remote Code
Two critical vulnerabilities in Aviatrix Controller, a Software-Defined Networking (SDN) utility that enables cloud connectivity across different vendors and regions. The vulnerabilities allowed attackers to bypass authentication and execute remote code with root privileges, potentially compromising entire cloud infrastructures. Critical…
Prometei Botnet Activity Spikes
Palo Alto Networks has observed a spike in Prometei activity since March 2025, pointing to a resurgence of the botnet. The post Prometei Botnet Activity Spikes appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original…
Identity Is the New Perimeter: Why Proofing and Verification Are Business Imperatives
The future of secure digital engagement depends on continuous identity verification and proofing that can scale with risk. The post Identity Is the New Perimeter: Why Proofing and Verification Are Business Imperatives appeared first on SecurityWeek. This article has been…
Hackers Exploit Misconfigured Docker APIs to Mine Cryptocurrency via Tor Network
Misconfigured Docker instances are the target of a campaign that employs the Tor anonymity network to stealthily mine cryptocurrency in susceptible environments. “Attackers are exploiting misconfigured Docker APIs to gain access to containerized environments, then using Tor to mask their…
Zweite Beta von iOS 26 ist da: Apple reagiert auf Kritik der Nutzer
Apple verbessert in der zweiten Entwicklervorabversion von iOS 26 die Lesbarkeit des neuen „Liquid Glass“-Designs. Mit dem Update reagiert der iPhone-Hersteller auf Nutzerfeedback. Was jetzt neu ist. Dieser Artikel wurde indexiert von t3n.de – Software & Entwicklung Lesen Sie den…
[NEU] [mittel] OpenVPN: Schwachstelle ermöglicht Denial of Service
Ein lokaler Angreifer kann eine Schwachstelle in OpenVPN ausnutzen, um einen Denial of Service Angriff durchzuführen. Dieser Artikel wurde indexiert von BSI Warn- und Informationsdienst (WID): Schwachstellen-Informationen (Security Advisories) Lesen Sie den originalen Artikel: [NEU] [mittel] OpenVPN: Schwachstelle ermöglicht Denial…
[NEU] [hoch] Red Hat OpenShift: Schwachstelle ermöglicht Manipulation von Dateien
Ein lokaler Angreifer kann eine Schwachstelle in Red Hat OpenShift ausnutzen, um Dateien zu manipulieren. Dieser Artikel wurde indexiert von BSI Warn- und Informationsdienst (WID): Schwachstellen-Informationen (Security Advisories) Lesen Sie den originalen Artikel: [NEU] [hoch] Red Hat OpenShift: Schwachstelle ermöglicht…