21 posts were published in the last hour
- 14:3 : Find-My-Netzwerk: Angriff macht fremde Bluetooth-Geräte trackbar wie Airtags
 - 14:3 : Angry Likho APT Resurfaces with Lumma Stealer Attacks Against Russia
 - 14:3 : The Hidden Cost of Compliance: When Regulations Weaken Security
 - 14:3 : New TgToxic Banking Trojan Variant Evolves with Anti-Analysis Upgrades
 - 14:3 : 89% of Enterprise GenAI Usage Is Invisible to Organizations Exposing Critical Security Risks, New Report Reveals
 - 14:3 : Space Pirates Targets Russian IT Firms With New LuckyStrike Agent Malware
 - 14:2 : LibreOffice: Windows vulnerability affects links in documents, patch available
 - 13:32 : Google’s SafetyCore App Secretly Scans All Photos on Android Devices
 - 13:32 : Networking in DevOps: Your Beginner Guide
 - 13:32 : What is quantum in physics and computing?
 - 13:32 : Sites of Major Orgs Abused in Spam Campaign Exploiting Virtual Tour Software Flaw
 - 13:32 : The 2025 State of Application Risk Report: Understanding Toxic Combinations in Application Security
 - 13:6 : [UPDATE] [mittel] Golang Go (x/net/html): Schwachstelle ermöglicht Denial of Service
 - 13:6 : [UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service
 - 13:6 : [UPDATE] [mittel] libsndfile: Mehrere Schwachstellen ermöglichen Denial of Service
 - 13:6 : [UPDATE] [kritisch] PHP: Mehrere Schwachstellen
 - 13:6 : [UPDATE] [hoch] docker: Mehrere Schwachstellen
 - 13:5 : New “nRootTag” Attack Turns 1.5 Billion iPhones as Free Tracking Agents for Attacker
 - 13:5 : Cisco Nexus Vulnerability Let Attackers Inject Malicious Commands
 - 13:5 : Software Vulnerabilities Take Almost Nine Months to Patch
 - 13:5 : GitHub repos exposed, HaveIBeenPwned adds 244M stolen passwords, Anagram gamifies cybersecurity training