197 posts were published in the last hour
- 21:38 : Kali Linux gets a UI refresh, new tools, and an updated car hacking toolset
 - 21:38 : Connectivity is a Lifeline, Not a Luxury: Telecom Blackouts in Gaza Threaten Lives and Digital Rights
 - 21:38 : How AWS improves active defense to empower customers
 - 21:4 : Google’s Advanced Protection Arrives on Android: Should You Use It?
 - 20:32 : Why 99% Accuracy Isn’t Good Enough: The Reality of ML Malware Detection
 - 20:32 : 1Password and AWS join forces to secure AI, cloud environments for the enterprise
 - 20:5 : Whatsapp-Scanner kommt: Warum die neue Funktion weit mehr als nur eine Spielerei ist
 - 20:5 : Fehler? Microsoft bringt den Start-Ton von Windows Vista zurück
 - 20:5 : IT Security News Hourly Summary 2025-06-16 21h : 12 posts
 - 20:4 : EFF to NJ Supreme Court: Prosecutors Must Disclose Details Regarding FRT Used to Identify Defendant
 - 19:34 : What is HMAC (Hash-Based Message Authentication Code)?
 - 19:34 : Washington Post Journalists’ Microsoft Accounts Hacked in Targeted Cyberattack
 - 19:3 : Washington Post Hacked – Multiple Journalists’ Email Accounts Compromised
 - 19:3 : Katz Stealer Boosts Credential Theft with System Fingerprinting and Persistence Mechanisms
 - 19:3 : CISA Adds Two Known Exploited Vulnerabilities to Catalog
 - 19:3 : Law enforcement operation shut down dark web drug marketplace Archetyp Market
 - 19:3 : Remorseless extortionists claim to have stolen thousands of files from Freedman HealthCare
 - 19:3 : U.S. Seizes $7.74M in Crypto Tied to North Korea’s Global Fake IT Worker Network
 - 18:34 : How to Remove a Virus From Your Android Phone in 4 Simple Steps
 - 18:34 : Hackers Upload Weaponized Packages to PyPI Repositories to Steal AWS Tokens and Sensitive Data
 - 18:5 : How Much Data Does Streaming Use? + 5 Tips to Manage Data
 - 18:5 : Do iPhones Need Antivirus Software? iPhone Security Considerations + Safety Tips
 - 18:5 : Malicious Payload Found in JPEG Image Using Steganography and Base64 Obfuscation
 - 18:5 : Massive JSFireTruck Malware Campaign Infects Over 269,000 Websites
 - 17:32 : Report Links Los Pollos and RichAds to Malware Traffic Operations
 - 17:9 : The data on denying social media for kids (re-air) (Lock and Code S06E12)
 - 17:9 : Washington Post Journalists’ Microsoft Accounts Hacked in Targetetd Cyberattack
 - 17:9 : Protecting Minors Online Must Not Come at the Cost of Privacy and Free Expression
 - 17:5 : IT Security News Hourly Summary 2025-06-16 18h : 12 posts
 - 16:38 : Anzeige: Microsoft-365-Umgebungen umfassend absichern
 - 16:37 : 3 leading multifactor authentication tool providers
 - 16:37 : Canada’s WestJet says ‘expect interruptions’ online as it navigates cybersecurity turbulence
 - 16:37 : LinuxFest Northwest: Beyond ARIA Labels What A Blind Film Enthusiast Can Teach Us About Open Source
 - 16:7 : AI Skills Shortage Deepens as Enterprise Demand Grows Faster Than Talent Supply
 - 16:7 : United Natural Foods Confirms Network Disruption from Cyberattack
 - 16:7 : Understanding the Dynamic threat Landscape of Ransomware Attacks
 - 16:7 : Cisco Introduces New Tools to Protect Networks from Rogue AI Agents
 - 16:7 : Threat Actors Target Victims with HijackLoader and DeerStealer
 - 15:34 : Car-sharing giant Zoomcar says hacker accessed personal data of 8.4 million users
 - 15:34 : As grocery shortages persist, UNFI says it’s recovering from cyberattack
 - 15:34 : Google’s $32 Billion Wiz Deal Draws DOJ Antitrust Scrutiny: Report
 - 15:6 : Ongoing Money Laundering Insights
 - 15:6 : Car sharing giant Zoomcar says hacker accessed personal data of 8.4 million users
 - 15:6 : Microsoft Outlook Users Face Crashes When Creating New Emails, Temp Fix Issued
 - 15:6 : Darknet Market Archetyp Takedown by Authorities in Joint Action ‘Operation Deep Sentinel’
 - 15:6 : Former GCHQ Intern Jailed for Seven Years After Copying Top Secret Files to Mobile Phone
 - 15:6 : Vulnerability Summary for the Week of June 9, 2025
 - 15:5 : ⚡ Weekly Recap: iPhone Spyware, Microsoft 0-Day, TokenBreak Hack, AI Data Leaks and More
 - 15:5 : Anubis Ransomware Encrypts and Wipes Files, Making Recovery Impossible Even After Payment
 - 15:5 : Archetyp Market Shut Down in Europe-wide Law Enforcement Operation
 - 14:34 : Mastering Kubernetes Observability: Boost Performance, Security, and Stability With Tracestore, OPA, Flagger, and Custom Metrics
 - 14:34 : Eurocops arrest suspected Archetyp admin, shut down mega dark web drug shop
 - 14:34 : ⚡ Weekly Recap: iPhone Spyware, Microsoft 0-Day, TokenBreak Hack, AI Data Leaks and More
 - 14:6 : KI und Copyright: Hat Metas KI-Modell zu viel von Harry Potter gelernt?
 - 14:6 : Bald auf dem Google-Friedhof: Instant Apps werden endgültig eingestellt – was das für euch bedeutet
 - 14:6 : Abos und Werbeanzeigen in Whatsapp: Worauf ihr euch ab sofort einstellen müsst
 - 14:6 : Wegen Windows 95: Wie ein Microsoft-Manager eine Ladenkasse zum Abstürzen brachte
 - 14:5 : IT Security News Hourly Summary 2025-06-16 15h : 20 posts
 - 14:4 : Archetyp Dark Web Market Seized, Admin Arrested in Spain
 - 14:4 : Hackers Target and Hijack Washington Post Journalists’ Email Accounts
 - 14:4 : Introducing the Ticket Enrichment AI Agent
 - 14:4 : Malicious Loan App Removed from iOS and Google Play App Store Posed Severe Risks to Users
 - 14:4 : What is a compliance audit? (With an example checklist)
 - 14:4 : Katz Stealer Enhances Credential Theft Capabilities with System Fingerprinting and Persistence Mechanisms
 - 14:4 : Microsoft Purview DLP to Restrict Microsoft 365 Copilot in Processing Emails With Sensitive Labels
 - 14:4 : Zoomcar Hacked – 8.4 Million Users’ Sensitive Details Exposed
 - 14:3 : Automated Guard Rails for Vibe Coding
 - 14:3 : ⚡ Weekly Recap: iPhone Spyware, Microsoft 0-Day, TokenBreak Hack, AI Data Leaks and More
 - 13:34 : Sicherheitsbeauftragter werden: So funktioniert’s
 - 13:34 : Enhancements to Akamai API Security, Q2 2025
 - 13:33 : Mac Mini won’t power on? Apple will fix it for you – for free
 - 13:33 : Collaborating with the World Economic Forum to Advance Systemic Defense Solutions to Protect Our Digital Ecosystem
 - 13:33 : Salesforce study finds LLM agents flunk CRM and confidentiality tests
 - 13:33 : Archetyp Dark Web Market Shut Down by Law Enforcement
 - 13:33 : App Store Security Threats in 2025: Why Hackers Target Mobile Ecosystems
 - 13:33 : SinoTrack GPS vulnerabilities may allow attackers to track, control vehicles
 - 13:33 : History made as MI6 appoints first female Chief
 - 13:33 : Cyolo expands remote access coverage for OT and cyber-physical systems
 - 13:33 : ⚡ Weekly Recap: iPhone Spyware, Microsoft 0-Day, TokenBreak Hack, AI Data Leaks and More
 - 13:3 : The Impact of Quantum Decryption
 - 13:3 : Operation Deep Sentinel: Authorities Shut Down Darknet Market Archetyp
 - 13:3 : Zoomcar Data Breach Exposes Sensitive Details of 8.4 Million Users
 - 13:3 : Microsoft adds export option to Windows Recall in Europe
 - 13:3 : Washington Post Journalists’ Microsoft Email Accounts Hacked
 - 13:3 : ⚡ Weekly Recap: iPhone Spyware, Microsoft 0-Day, TokenBreak Hack, AI Data Leaks and More
 - 12:36 : Threat Actors Deploy XWorm Malware via Fake Travel Websites to Infect Users’ PCs
 - 12:36 : Canadian Airline WestJet Suffers Cyberattack, Halts App and Web Services
 - 12:36 : BERT Ransomware Escalates Attacks on Linux Machines with Weaponized ELF Files
 - 12:36 : Scaling Beyond Borders: Establishing a Global Footprint
 - 12:36 : How PureVPN’s Password Manager Closes A Major Security Gap Hackers Exploit
 - 12:36 : Malicious Payload Uncovered in JPEG Image Using Steganography and Base64 Obfuscation
 - 12:36 : 46,000+ Grafana Instances Exposed to Malicious Account Takeover Attacks
 - 12:36 : 20+ Malicious Apps on Google Play Actively Attacking Users to Steal Login Credentials
 - 12:36 : Hackers Upload Weaponized Packages to PyPI Repositories to Steal AWS, CI/CD and macOS Data
 - 12:36 : Zoomcar Says Hackers Accessed Data of 8.4 Million Users
 - 12:36 : Asheville Eye Associates Says 147,000 Impacted by Data Breach
 - 12:36 : Police shut down long-running dark web drug market
 - 12:36 : Playbook: Transforming Your Cybersecurity Practice Into An MRR Machine
 - 12:36 : ⚡ Weekly Recap: iPhone Spyware, Microsoft 0-Day, TokenBreak Hack, AI Data Leaks and More
 - 12:2 : North Korean APT Hackers Target Ukrainian Government Agencies to Steal Login Credentials
 - 12:2 : New Anubis RaaS includes a wiper module
 - 11:35 : BKA schaltet Darknet-Marktplatz “Archetyp Market” ab
 - 11:35 : [NEU] [mittel] OTRS: Schwachstelle ermöglicht nicht spezifizierten Angriff
 - 11:35 : Got a new password manager? How to clean up the credential mess you left in the cloud
 - 11:34 : Generative AI Is Moving Fast. Are Your Security Practices Keeping Up?
 - 11:34 : 240,000 Impacted by Data Breach at Eyecare Tech Firm Ocuco
 - 11:34 : GUEST ESSAY: The AI illusion: Don’t be fooled, innovation without guardrails is just risk–at scale
 - 11:34 : Tenable Fixes Three High-Severity Flaws in Vulnerability Scanner Nessus
 - 11:5 : IT Security News Hourly Summary 2025-06-16 12h : 20 posts
 - 11:4 : 5 Dinge, die du diese Woche wissen musst: Rückschau auf die WWDC – wo hat Apple wirklich überzeugt?
 - 11:4 : Nie wieder schädliche Links: Diese Android-App schützt euch vor versteckter Malware
 - 11:4 : "Höchste Priorität": Mark Zuckerberg sucht 50 Experten für sein KI-Team – wir hätten da ein paar Vorschläge
 - 11:3 : Hackers Compromise Discord Invite to Inject Malicious Links Delivering AsyncRAT
 - 11:3 : Hackers Can Hide Images in Text Data and Embeds Directly into DNS TXT Records
 - 11:3 : North Korean APT Hackers Attacking Ukrainian Government Agencies to Steal Login Credentials
 - 11:2 : Threat Actors Using Fake Travel Websites to Infect Users’ PCs with XWorm Malware
 - 11:2 : Spy school dropout: GCHQ intern jailed for swiping classified data
 - 10:38 : Carsenal: Neues Kali Linux enthält Tools zum Hacken von Autos
 - 10:38 : [UPDATE] [mittel] OWASP ModSecurity: Schwachstelle ermöglicht Denial of Service
 - 10:38 : [NEU] [hoch] PostgreSQL JDBC Treiber: Schwachstelle ermöglicht Offenlegung von Informationen
 - 10:37 : US ‘Reviews’ Google’s $32bn Wiz Buy Over Competition Concerns
 - 10:37 : China Postpones Approval Of $35bn Synopsys-Ansys Merger
 - 10:37 : GrayAlpha Hackers Group Exploits Browser Updates to Deploy PowerNet Loader and NetSupport RAT
 - 10:37 : Why We Made a Guide to Winning a Fight
 - 10:37 : The WIRED Guide to Protecting Yourself From Government Surveillance
 - 10:37 : 6 Tools for Tracking the Trump Administration’s Attacks on Civil Liberties
 - 10:37 : How to Protect Yourself From Phone Searches at the US Border
 - 10:37 : Anubis Ransomware Packs a Wiper to Permanently Delete Files
 - 10:3 : Anubis Ransomware Introduces Irreversible File Destruction Feature
 - 10:3 : Microsoft Purview DLP Now Controls Copilot’s Access to Sensitive Email Data
 - 10:3 : Over 20 Malicious Google Play Apps Steal Users’ Login Credentials
 - 10:3 : New Predator spyware infrastructure revealed activity in Mozambique for the first time
 - 10:3 : Red Teaming AI: The Build Vs Buy Debate
 - 10:3 : Hacktivists Strike Within Minutes of Israel Missile Attacks on Iran Nuclear Sites
 - 10:3 : Anubis Ransomware Adds File-Wiping Capability
 - 9:35 : Apple ‘Eyes Spring 2026’ For Delayed Siri AI Upgrade
 - 9:35 : AstraZeneca In $5.3bn AI Drug Discovery Deal With China’s CSPC
 - 9:35 : Gemini, Coinbase Set To Receive EU Crypto Licences
 - 9:35 : Apple Hits Top Spot In China After Price Cuts
 - 9:35 : Hackers Hijacked Discord Invite to Inject Malicious Links That Deliver AsyncRAT
 - 9:35 : Hackers Could Hide Images in Text Data and Embeds Directly into DNS TXT Records
 - 9:35 : Over a Third of Grafana Instances Exposed to XSS Flaw
 - 9:6 : Juni-Patchday: Windows-Update macht Fujitsu-Rechner kaputt
 - 9:6 : [NEU] [niedrig] Grafana: Schwachstelle ermöglicht Offenlegung von Informationen
 - 9:5 : A JPEG With A Payload, (Mon, Jun 16th)
 - 9:5 : Brace Yourselves: The Game-Changing Impact of India’s DPDP Act, 2023
 - 9:5 : Canadian Airline WestJet Hit by Cyberattack
 - 9:5 : High-Severity Vulnerabilities Patched in Tenable Nessus Agent
 - 8:33 : [NEU] [UNGEPATCHT] [niedrig] libxml2: Schwachstelle ermöglicht Denial of Service
 - 8:33 : [NEU] [mittel] M-Files Server: Schwachstelle ermöglicht Offenlegung von Informationen
 - 8:32 : Google Massive Cloud Outage Linked to API Management System
 - 8:32 : How collaborative security can build you a better business
 - 8:32 : WestJet Investigates Cyber-Attack Impacting Customers
 - 8:5 : IT Security News Hourly Summary 2025-06-16 09h : 1 posts
 - 8:3 : GoldFactory: Cyberkriminelle stehlen dein Gesicht
 - 7:36 : Marktübersicht: Vielfalt bei automatischen Löschanlagen
 - 7:36 : Dell ControlVault: Angreifer können Systeme vollständig kompromittieren
 - 7:36 : Kein Geld zu holen: Kidnapper lassen Krypto-Influencer wegen Pleite wieder frei
 - 7:35 : Temu Resumes Direct Shipments From China After Trade Talks
 - 7:35 : Uncovering the Technique of Hiding Images in DNS TXT Entries
 - 7:35 : Anubis Ransomware With Wipe Mode That Permanently Erases File With No Recovery Option
 - 7:35 : IBM Backup Services Vulnerability Let Attackers Escalate Privileges
 - 7:35 : GrayAlpha Hacker Group Weaponizes Browser Updates to Deploy PowerNet Loader and NetSupport RAT
 - 7:35 : A week in security (June 9 – June 15)
 - 7:35 : Washington Post hacked, WestJet suffers cyberattack, Texas DoT breach
 - 7:6 : Pride Tech: LGBTIQ+ Digital Security
 - 7:6 : IBM Backup Services Flaw Allows Hackers to Gain Elevated Access
 - 7:6 : Google Cloud Suffers Major Disruption After API Management Error
 - 7:6 : Cities of the Future or Hacker’s Paradise? The Cybersecurity Risks of Smart Cities
 - 7:6 : Protecting Against Origin Server DDoS Attacks
 - 7:6 : Malicious PyPI Package Masquerades as Chimera Module to Steal AWS, CI/CD, and macOS Data
 - 7:6 : Cybersecurity Today: WestJet Cyber Incident, Anubis Ransomware Evolution, Discord Exploits, and Google Cloud Outage
 - 6:34 : KIA Ecuador Keyless Entry Systems Vulnerability Faces Major Theft Threat
 - 6:3 : Why banks’ tech-first approach leaves governance gaps
 - 5:37 : Anzeige: Von CRA bis ISO – neue IT-Sicherheitsregularien meistern
 - 5:36 : MDEAutomator: Open-source endpoint management, incident response in MDE
 - 5:5 : IT Security News Hourly Summary 2025-06-16 06h : 1 posts
 - 5:4 : Virtual kidnapping scams prey on our worst fears
 - 4:37 : Google Chrome und Microsoft Edge: Mehrere Schwachstellen ermöglichen Codeausführung
 - 4:37 : [UPDATE] [hoch] Google Chrome und Microsoft Edge: Mehrere Schwachstellen ermöglichen Codeausführung
 - 4:36 : Why CISOs need to understand the AI tech stack
 - 4:36 : Review: Learning Kali Linux, 2nd Edition
 - 3:34 : AT&T Customers at Risk Again After New Data Leak
 - 3:2 : KIA Ecuador Keyless Entry Systems Vulnerability Exposes Thousands of Vehicles to Theft
 - 3:2 : Armored cash transport trucks allegedly hauled money for $190 million crypto-laundering scheme
 - 2:5 : IT Security News Hourly Summary 2025-06-16 03h : 3 posts
 - 2:4 : ISC Stormcast For Monday, June 16th, 2025 https://isc.sans.edu/podcastdetail/9494, (Mon, Jun 16th)
 - 0:37 : Scalable Secrets Management for Growing Businesses
 - 0:37 : Gain Full Control Over Your Digital Identities
 - 0:37 : Drive Innovation Through Advanced NHI Management
 - 23:5 : IT Security News Hourly Summary 2025-06-16 00h : 2 posts
 - 23:0 : Metas KI-Forscherin warnt: „Je autonomer Agenten sind, desto schwieriger wird es für Menschen, sie zu knacken“
 - 22:58 : IT Security News Weekly Summary 24
 - 22:55 : IT Security News Daily Summary 2025-06-15
 - 22:36 : How to delete your 23andMe data
 - 22:9 : Hackers Leak Data of 10,000 VirtualMacOSX Customers in Alleged Breach
 - 22:9 : Dems demand audit of CVE program as Federal funding remains uncertain