25 posts were published in the last hour
- 12:36 : [UPDATE] [mittel] Apache Tomcat: Mehrere Schwachstellen
 - 12:35 : Researchers demonstrate the UK’s first long-distance ultra-secure communication over a quantum network
 - 12:35 : ESET Vulnerability Exploited for Stealthy Malware Execution
 - 12:35 : Netskope One DLP On Demand enhances data security capabilities
 - 12:16 : GIMP: Mehrere Schwachstellen ermöglichen Codeausführung
 - 12:16 : ESET NOD32 Antivirus: Schwachstelle ermöglicht Codeausführung
 - 12:16 : HCL: Sicherheitslücken in BigFix, DevOps und mehr Produkten
 - 12:16 : Nebenbei kriminell: Doppelleben eines Sicherheitsforschers enttarnt
 - 12:16 : [UPDATE] [mittel] Python: Mehrere Schwachstellen ermöglichen Manipulation von Dateien und Umgehung von Sicherheitsmaßnahmen
 - 12:16 : [UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service und unspezifischen Angriff
 - 12:16 : [UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service
 - 12:16 : [UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen
 - 12:16 : [UPDATE] [mittel] GIMP: Mehrere Schwachstellen ermöglichen Codeausführung
 - 12:15 : NIST Declares Pre-2018 CVEs Will Be Labeled as ‘Deferred’
 - 12:15 : Google to Patch 23-Year-Old Chrome Bug That Leaked Browsing History
 - 12:15 : SAP April 2025 Update Fixes Critical Code Injection Vulnerabilities
 - 12:14 : Oracle Confirms Breach: Hackers Stole Client Login Credentials
 - 12:14 : How to Use a VPN: 4 Easy Steps to Get Started
 - 12:14 : Google Patched Android 0-Day Vulnerability Exploited in the Wild
 - 12:14 : Linux 6.15-rc1 Released With Major Driver Update & Perfomance Boost
 - 12:14 : Nissan Leaf Vulnerability Exploited to Gain Control Over the Car Remotely
 - 12:14 : Subwiz – New AI-powered Recon Tool to Hunt for Hidden Subdomains
 - 12:14 : Google fixes two actively exploited zero-day vulnerabilities in Android
 - 12:14 : Corsha Raises $18 Million to Enhance and Extend Machine-to-Machine Security
 - 12:14 : Half of Firms Stall Digital Projects as Cyber Warfare Risk Surges