180 posts were published in the last hour
- 22:33 : Cybersecurity: Wie Tabletop-Übungen dein Team auf den Ernstfall vorbereiten
- 22:32 : Less is more: How ‘chain of draft’ could cut AI costs by 90% while improving performance
- 21:32 : AI-powered SEO services: revolutionizing digital marketing
- 21:32 : U.S. CISA adds Multiple Cisco Small Business RV Series Routers, Hitachi Vantara Pentaho BA Server, Microsoft Windows Win32k, and Progress WhatsUp Gold flaws to its Known Exploited Vulnerabilities catalog
- 21:5 : Less is more: How ‘Chain of Draft’ could cut AI costs by 90% while improving performance
- 21:5 : Paragon Partition Manager Vulnerabilities Let Attackers Escalate Privilege & Trigger DoS Attacks
- 20:32 : Bubba AI, Inc. is launching Comp AI to help 100,000 startups get SOC 2 compliant by 2032.
- 20:5 : IT Security News Hourly Summary 2025-03-03 21h : 3 posts
- 20:4 : Anthropic raises $3.5 billion, reaching $61.5 billion valuation as AI investment frenzy continues
- 19:32 : Fake IT Support Calls Trick Microsoft Teams Users into Installing Ransomware
- 19:32 : Lee Enterprises ransomware attack hits freelance and contractor payments
- 19:3 : Enhancing the Wordfence Bug Bounty Program: New Incentives & a Stronger Focus on High-Impact Research
- 19:3 : Want to avoid a drone disaster? Don’t skip your pre-flight and post-flight checklists
- 19:3 : Beyond “Move Fast and Fail Fast”: Balancing Speed, Security, and … Sanity in Software Development (with Podcast)
- 19:3 : Hackers Weaponizing PowerShell & Microsoft Legitimate Apps To Deploy Malware
- 19:3 : Hackers Exploit AWS Misconfigurations to Launch Phishing Attacks via SES and WorkMail
- 18:11 : Security: USA stoppen wohl digitale Kriegsführung gegen Russland
- 18:10 : Routers Under Attack as Scanning Attacks on IoT and Networks Surge to Record Highs
- 18:10 : 33.3 Million Cyber Attacks Targeted Mobile Devices in 2024 as Threats Surge
- 18:10 : Threat Actors Exploiting AES Encryption for Stealthy Payload Protection
- 18:9 : What is cyberstalking and how to prevent it?
- 18:9 : Security Pros Push Back as Trump Orders Halt to Cyber Ops vs. Russia
- 17:32 : CISA: No Change on Defending Against Russian Cyber Threats
- 17:7 : CrowdStrike 2025 Global Threat Report: 51-Second Breaches Shake Cybercrime
- 17:7 : Hackers Using ClickFix Tactic to Attack Windows Machine & Gain Full Control of System
- 17:7 : Google’s New Email Shield Feature Let Users Hide Email From Apps
- 17:7 : Online crime-as-a-service skyrockets with 24,000 users selling attack tools
- 17:5 : IT Security News Hourly Summary 2025-03-03 18h : 10 posts
- 16:34 : Angst vor Geheimnisverrat und Festnahmen: China warnt KI-Experten vor Reisen in die USA
- 16:34 : 1,6 Millionen Geräte: Sicherheitsforscher warnen vor riesiger Bot-Armee
- 16:33 : How to Automate Security Questionnaires and Reduce Response Time
- 16:33 : U.S. Orders To Pause Offensive Cyber Operations Against Russia
- 16:33 : CISA Adds Five Known Exploited Vulnerabilities to Catalog
- 16:33 : US said to halt offensive cyber operations against Russia
- 16:33 : Cybersecurity not the hiring-’em-like-hotcakes role it once was
- 16:33 : Attackers Leverage Microsoft Teams and Quick Assist for Access
- 16:5 : Enhancing Mobile Banking Security: Protecting Your Data from Cyber Threats
- 16:5 : Vishing attacks surged 442% last year – how to protect yourself
- 16:5 : National Consumer Protection Week: Keeping your personal data safe in a digitally connected world
- 16:5 : Innovation vs. security: Managing shadow AI risks
- 15:33 : Zero-Trust Infinite Security: Masking’s Powerful New Ally
- 15:33 : U.S. Authorities recovered $31 Million Related to 2021 Uranium Finance cyber heist
- 15:33 : Lee Enterprises Confirms Ransomware Attack Impacting 75+ Publications
- 15:33 : Google Cloud Introduces Quantum-Safe Digital Signatures
- 15:32 : GitHub Scam: Fake Game Mods Steal User Credentials and Data
- 15:32 : DBS Bank to Cut 4,000 Jobs Over Three Years as AI Adoption Grows
- 15:32 : Scammers Exploit Google and PayPal’s Infrastructure to Steal Users Private Data
- 15:32 : Vulnerability Summary for the Week of February 24, 2025
- 15:7 : Not Lost in Translation: Rosetta 2 Artifacts in macOS Intrusions
- 15:7 : Havoc: SharePoint with Microsoft Graph API turns into FUD C2
- 15:7 : CISA Denies Reports of Shift in Cybersecurity Posture Amid Russian Threats
- 14:34 : Cybersecurity als Innovationsmotor
- 14:34 : Ohne Nutzerinteraktion: Wie Hacker fremde Gitlab-Accounts übernehmen konnten
- 14:33 : New Malware Campaign Exploits Microsoft Graph API to Infect Windows
- 14:33 : As Skype shuts down, its legacy is end-to-end encryption for the masses
- 14:33 : U.S. Halts Cyber Operations Targeting Russia
- 14:33 : Attackers Automating Vulnerability Exploits with Few Hours of Disclosure
- 14:32 : HiveOS Vulnerabilities Let Attackers Execute Arbitrary Commands
- 14:32 : North Korean IT Workers Using Astrill VPN To Hide Their IPs
- 14:32 : TikTok: Major investigation launched into platform’s use of children’s data
- 14:5 : IT Security News Hourly Summary 2025-03-03 15h : 22 posts
- 14:3 : U.K. ICO Investigates TikTok, Reddit, and Imgur Over Children’s Data Protection Practices
- 14:3 : Hackers Exploit Paragon Partition Manager Driver Vulnerability in Ransomware Attacks
- 14:3 : Hackers Use ClickFix Trick to Deploy PowerShell-Based Havoc C2 via SharePoint Sites
- 14:3 : AI is Evolving Faster Than Our Ability to Secure It
- 14:3 : ⚡ THN Weekly Recap: Alerts on Zero-Day Exploits, AI Breaches, and Crypto Heists
- 14:3 : Phishing Campaign Uses Havoc Framework to Control Infected Systems
- 13:33 : Sicherheitslücke: Per Passwort-Reset fremde Gitlab-Konten infiltriert
- 13:33 : [UPDATE] [hoch] GNU Emacs: Schwachstelle ermöglicht Codeausführung
- 13:33 : [UPDATE] [mittel] Red Hat JBoss Enterprise Application Platform (Wildfly): Schwachstelle ermöglicht Cross-Site Scripting
- 13:32 : Mozilla Tweaks Firefox Terms After Uproar Over Data Use Language
- 13:32 : Five Reasons to Choose Secure SD-WAN from Check Point
- 13:32 : Microsoft unveils finalized EU Data Boundary as European doubt over US grows
- 13:32 : Quantum Wars: Google, Microsoft, and Amazon’s Competing Paths to Fault-Tolerant Qubits
- 13:32 : ⚡ THN Weekly Recap: Alerts on Zero-Day Exploits, AI Breaches, and Crypto Heists
- 13:7 : [UPDATE] [hoch] Rancher: Mehrere Schwachstellen
- 13:6 : Google Launches Shielded Email to Keep Your Address Hidden from Apps
- 13:6 : JavaGhost Leveraging Amazon IAM Permissions To Trigger Phishing Attack
- 13:6 : UK watchdog investigates TikTok and Reddit over child data privacy concerns
- 13:6 : Polish space agency confirms cyberattack
- 13:6 : US Seizes $31 Million Worth of Crypto Stolen in Uranium Finance Hack
- 13:6 : AI-Driven Changes Lead to Workforce Reduction at Major Asian Bank
- 13:6 : ⚡ THN Weekly Recap: Alerts on Zero-Day Exploits, AI Breaches, and Crypto Heists
- 12:30 : Zohocorp ADSelfService Plus: Sicherheitsleck ermöglicht Kontenübernahme
- 12:30 : [NEU] [mittel] IBM Business Automation Workflow: Schwachstelle ermöglicht Cross-Site Scripting
- 12:5 : Sicherheitslücke in IBM Storage Virtualize ermöglicht Schadcode-Ausführung
- 12:4 : [UPDATE] [mittel] Linux-Kernel: Mehrere Schwachstellen ermöglichen Denial of Service und unspezifische Angriffe
- 12:4 : [UPDATE] [mittel] libTIFF: Mehrere Schwachstellen ermöglichen Denial of Service
- 12:4 : [UPDATE] [hoch] EDK2 NetworkPkg IP stack implementation: Mehrere Schwachstellen
- 12:4 : [UPDATE] [hoch] Red Hat Enterprise Linux: Mehrere Schwachstellen
- 12:4 : [UPDATE] [mittel] libTIFF: Schwachstelle ermöglicht Denial of Service
- 12:3 : US Army Soldier Arrested for Hacking 15 Telecom Carriers
- 12:3 : New Vulnerability in Substack let Attackers Take Over Subdomains
- 12:3 : MediaTek Warns of Multiple Vulnerabilities that let Attackers Escalate Privileges
- 12:3 : Apache Derby Vulnerability Let Attackers Bypass Authentication with LDAP Injection
- 12:3 : Vulnerable Paragon Driver Exploited in Ransomware Attacks
- 12:3 : The New Ransomware Groups Shaking Up 2025
- 12:3 : Vodafone Trials Quantum-Safe Tech to Protect Smartphone Browsing
- 11:33 : Mark of the Web: Some Technical Details, (Mon, Mar 3rd)
- 11:33 : Uncovering .NET Malware Obfuscated by Encryption and Virtualization
- 11:33 : Foxconn Breaks Ground On Massive EV Headquarters
- 11:33 : Bitcoin Drops 25 Percent From Peak
- 11:32 : JavaGhost: Exploiting Amazon IAM Permissions for Phishing Attacks
- 11:32 : Hackers Using PowerShell and Microsoft Legitimate Apps to Deploy Malware
- 11:32 : Indian Stock Broker Angel One Discloses Data Breach
- 11:5 : New Poco RAT Via Weaponized PDF Attacking Users to Capture Sensitive Data
- 11:5 : Industry Moves for the week of March 3, 2025 – SecurityWeek
- 11:5 : Black Basta Leak Offers Glimpse Into Group’s Inner Workings
- 11:5 : DOGE Access to Personal Information and The Difficulty of Showing Harm in Privacy Litigation
- 11:5 : IT Security News Hourly Summary 2025-03-03 12h : 21 posts
- 10:34 : Neue KI-Funktionen: Reasoning und Deep Research von OpenAI und Co. günstig oder gratis nutzen
- 10:34 : [NEU] [niedrig] ffmpeg: Schwachstelle ermöglicht Denial of Service
- 10:34 : [NEU] [UNGEPATCHT] [niedrig] libarchive: Schwachstelle ermöglicht Denial of Service und weitere nicht spezifizierte Angriffe
- 10:34 : [NEU] [mittel] vim (tar.vim plugin): Schwachstelle ermöglicht Codeausführung
- 10:33 : Alibaba To Ship High-Performance RISC-V Chip In March
- 10:33 : OpenAI Launches GPT-4.5 AI With More ‘Emotional Nuance’
- 10:33 : Space Pirates Hackers Attacking IT Organizations With LuckyStrike Using OneDrive
- 10:33 : Paragon Partition Manager Vulnerabilities Allow Attackers to Escalate Privileges and Trigger DoS Attacks
- 10:33 : North Korean IT Workers Hide Their IPs Using Astrill VPN
- 10:33 : Njrat Exploits Microsoft Dev Tunnels for C2 Communication
- 10:33 : Hackers Abused Google and PayPal’s Infrastructure to Steal Users Personal Data
- 10:33 : Serbian student activist’s phone hacked using Cellebrite zero-day exploit
- 10:33 : Mobile malware evolution in 2024
- 10:33 : Outpost24 introduces CyberFlex to streamline attack surface management and pen testing
- 10:33 : ICO Launches TikTok Investigation Over Use of Children’s Data
- 10:11 : [NEU] [mittel] IBM MQ: Schwachstelle ermöglicht Offenlegung von Informationen
- 10:10 : TechRepublic Premium Editorial Calendar: Policies, Hiring Kits, and Glossaries for Download
- 10:10 : Vidar & StealC 2.0 Released by Threat Actors With a Complete New Build
- 10:10 : Governments can’t seem to stop asking for secret backdoors
- 10:10 : BYOVD Attacks Exploit Zero-Day in Paragon Partition Manager
- 10:10 : OpenSSL 3.5 Alpha Repository Freeze Approaching
- 9:34 : [NEU] [hoch] Samsung Exynos: Mehrere Schwachstellen
- 9:34 : [NEU] [hoch] Red Hat Ansible Automation Platform: Schwachstelle ermöglicht Privilegieneskalation
- 9:33 : [NEU] [hoch] IBM Storage Virtualize Produkte: Mehrere Schwachstellen
- 9:33 : Black Basta and Cactus Ransomware Groups Add BackConnect Malware to Their Arsenal
- 9:32 : DeepSeek Open-Sources AI Model Training Details
- 9:32 : Tencent Releases ‘Turbo’ AI Model To Counter DeepSeek
- 9:32 : Agentic AI: Redefining the Future of Autonomy in Business
- 9:32 : The Enterprise Strikes Back: Microsoft Exposes the Architects of AI Abuse
- 9:32 : Qilin Claims Lee Enterprises Ransomware Attack
- 9:32 : Beyond the Perimeter: Why Zero Trust Data Exchange is Essential for Modern Security
- 9:3 : Angreifer bringen verwundbaren Paragon-Treiber mit und missbrauchen ihn
- 9:3 : Cleveland Municipal Court Remains Closed After Cyber Event
- 9:3 : Why Off-the-Shelf Security Solutions Fail: The Need for Custom Cybersecurity Services
- 9:3 : Trigon – A New Exploit Revealed for iOS 0-Day kernel Vulnerability
- 9:3 : A week in security (February 24 – March 2)
- 9:2 : Top CVEs & Vulnerabilities February 2025
- 8:32 : Microsoft To Shut Down Skype After 20 Years
- 8:32 : Palo Alto Networks provides AI-powered security to 5G enterprise customers
- 8:32 : Hegseth orders standdown, Microsoft terminates Skype, Cuban offers lifeline
- 8:7 : Aufregende Zukunft für den Zutrittsmarkt
- 8:7 : Sicherheitsleck in Treiber von Paragon Partition Manager wird missbraucht
- 8:7 : Honor ändert Strategie: Sieben Jahre Android-Updates nur für Oberklasse-Smartphones
- 8:5 : IT Security News Hourly Summary 2025-03-03 09h : 5 posts
- 7:33 : Substack Custom Domain Vulnerability Exposes Thousands to Potential Hijacking
- 7:33 : Windows Hyper-V NT Kernel Vulnerability Let Attackers Gain SYSTEM Privileges – PoC Released
- 7:33 : Staying Ahead with Advanced PAM Techniques?
- 7:33 : Smart Secret Scanning Techniques: Are You Updated?
- 7:33 : Is Your Secrets Rotation Getting Better?
- 7:4 : What is happening with TikTok?
- 6:32 : Pros and Cons of Using AI in Cybersecurity
- 6:32 : US Military Personnel Arrested for Hacking 15 Telecom Providers
- 6:32 : Commix: Open-source OS command injection exploitation tool
- 6:3 : Russia not a cyber threat to the United States
- 6:3 : PoC Released for Windows Hyper-V SYSTEM Privilege Exploit
- 6:3 : Color Dating – 220,503 breached accounts
- 6:3 : Critical Vulnerability in Wazuh Server Enables Remote Attackers to Execute Malicious Code
- 6:3 : Review: The Chief AI Officer’s Handbook
- 6:3 : Vo1d Botnet’s Peak Surpasses 1.59M Infected Android TVs, Spanning 226 Countries
- 5:32 : Trigon: Latest iOS Kernel Exploit Uncovered
- 5:32 : How QR code attacks work and how to protect yourself
- 5:9 : Secure Your 5G Business Transformation
- 4:2 : US Cyber Command reportedly pauses cyberattacks on Russia
- 2:5 : IT Security News Hourly Summary 2025-03-03 03h : 2 posts
- 2:2 : ISC Stormcast For Monday, March 3rd, 2025 https://isc.sans.edu/podcastdetail/9346, (Mon, Mar 3rd)
- 1:32 : Qilin ransomware gang claimed responsibility for the Lee Enterprises attack
- 23:7 : DEF CON 32 – Efficient Bug Bounty Automation Techniques
- 23:5 : IT Security News Hourly Summary 2025-03-03 00h : 3 posts
- 23:0 : Gegen Telefonbetrug: Warum Familien ein Geheimwort vereinbaren sollten
- 22:58 : IT Security News Weekly Summary 09