Das Surfen mit Chrome soll sicherer werden. Dabei spielt KI die zentrale Rolle. Der Schutz ist standardmäßig aber nicht aktiv. Dieser Artikel wurde indexiert von heise Security Lesen Sie den originalen Artikel: Google Chrome: KI-Schutz vor Phishing-Websites & Co. ab…
[NEU] [mittel] Mattermost Desktop: Schwachstelle ermöglicht nicht spezifizierten Angriff
Ein entfernter, anonymer Angreifer kann eine Schwachstelle in Mattermost Desktop ausnutzen, um einen nicht näher spezifizierten Angriff durchzuführen. Dieser Artikel wurde indexiert von BSI Warn- und Informationsdienst (WID): Schwachstellen-Informationen (Security Advisories) Lesen Sie den originalen Artikel: [NEU] [mittel] Mattermost Desktop:…
Linux Kernel 6.14 rc3 Released With The Fixes for Critical Issues
Linus Torvalds has announced the release of Linux Kernel 6.14-rc3, marking a critical milestone in stabilizing the upcoming 6.14 kernel version. This release candidate addresses architectural vulnerabilities and introduces the lightweight “Faux Bus” framework to streamline driver development. The update…
Pro-Russia collective NoName057(16) launched a new wave of DDoS attacks on Italian sites
Pro-Russia collective NoName057(16) launched DDoS attacks on Italian sites, targeting airports, the Transport Authority, major ports, and banks. The pro-Russia hacker group NoName057(16) launched a new wave of DDoS attacks this morning against multiple Italian entities. The group targeted the…
Industry Moves for the week of February 17, 2025 – SecurityWeek
Explore industry moves and significant changes in the industry for the week of February 17, 2025. Stay updated with the latest industry trends and shifts. This article has been indexed from SecurityWeek Read the original article: Industry Moves for the…
Xerox Versalink Printer Vulnerabilities Enable Lateral Movement
Xerox released security updates to resolve pass-back attack vulnerabilities in Versalink multifunction printers. The post Xerox Versalink Printer Vulnerabilities Enable Lateral Movement appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article: Xerox Versalink Printer…
⚡ THN Weekly Recap: Google Secrets Stolen, Windows Hack, New Crypto Scams and More
Welcome to this week’s Cybersecurity News Recap. Discover how cyber attackers are using clever tricks like fake codes and sneaky emails to gain access to sensitive data. We cover everything from device code phishing to cloud exploits, breaking down the…
IT Security News Hourly Summary 2025-02-17 12h : 11 posts
11 posts were published in the last hour 10:33 : [NEU] [niedrig] Microsoft Edge: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen 10:32 : New Golang-Based Backdoor Uses Telegram Bot API for Evasive C2 Operations 10:32 : ⚡ THN Weekly Recap: Google Secrets…
[NEU] [niedrig] Microsoft Edge: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen
Ein entfernter, anonymer Angreifer kann eine Schwachstelle in Microsoft Edge ausnutzen, um Sicherheitsvorkehrungen zu umgehen. Dieser Artikel wurde indexiert von BSI Warn- und Informationsdienst (WID): Schwachstellen-Informationen (Security Advisories) Lesen Sie den originalen Artikel: [NEU] [niedrig] Microsoft Edge: Schwachstelle ermöglicht Umgehen…
New Golang-Based Backdoor Uses Telegram Bot API for Evasive C2 Operations
Cybersecurity researchers have shed light on a new Golang-based backdoor that uses Telegram as a mechanism for command-and-control (C2) communications. Netskope Threat Labs, which detailed the functions of the malware, described it as possibly of Russian origin. “The malware is…
⚡ THN Weekly Recap: Google Secrets Stolen, Windows Hack, New Crypto Scams and More
Welcome to this week’s Cybersecurity News Recap. Discover how cyber attackers are using clever tricks like fake codes and sneaky emails to gain access to sensitive data. We cover everything from device code phishing to cloud exploits, breaking down the…
Estonian Duo Plead Guilty to $577m Crypto Ponzi Scheme
Two Estonian nationals have pleaded guilty to running a cryptocurrency-related Ponzi scheme This article has been indexed from www.infosecurity-magazine.com Read the original article: Estonian Duo Plead Guilty to $577m Crypto Ponzi Scheme
Microsoft Edge: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen
Es existiert eine Schwachstelle in Microsoft Edge. Ein Angreifer kann diese Schwachstelle ausnutzen um einen Benutzer unbemerkt auf eine nicht vertrauenswürdige Seite umzuleiten. Dieser Artikel wurde indexiert von BSI Warn- und Informationsdienst (WID): Schwachstellen-Informationen (Bürger Cert) Lesen Sie den originalen…
Whatsapp: So kannst du jetzt das Aussehen deiner Chats nach deinen Wünschen gestalten
Bei Whatsapp gibt es jetzt die Möglichkeit, die optische Gestaltung noch stärker individuell anzupassen. In den Chatfenstern lässt sich nicht mehr nur der Hintergrund ändern. Dieser Artikel wurde indexiert von t3n.de – Software & Entwicklung Lesen Sie den originalen Artikel:…
whoAMI attack could allow remote code execution within AWS account
Researchers warn that the whoAMI attack lets attackers publish an AMI with a specific name to execute code in an AWS account. Cybersecurity researchers at Datadog Security Labs devised a new name confusion attack technique, called whoAMI, that allows threat…
New Android Security Feature that Blocks Changing Sensitive Setting During Calls
Google has unveiled a groundbreaking security feature in Android 16 Beta 2 aimed at combating phone scams by blocking users from altering sensitive settings during active phone calls. This feature, currently live in the beta version, prevents enabling permissions like…
Indian Post Office Portal Exposed Thousands of KYC Records With Username & Mobile Number
The Indian Post Office portal was found vulnerable to an Insecure Direct Object Reference (IDOR) attack, exposing sensitive Know Your Customer (KYC) data of thousands of users. This breach highlights the critical need for robust security measures in government-operated digital…
Multiple Russian Actors Attacking Orgs To Hack Microsoft 365 Accounts via Device Code Authentication
Security researchers at Volexity have uncovered multiple Russian threat actors conducting sophisticated social engineering and spear-phishing campaigns targeting Microsoft 365 accounts through Device Code Authentication exploitation. The attacks, observed since mid-January 2025, involve three distinct groups: “CozyLarch (APT29),” “UTA0304,” and…
Palo Alto Networks and SonicWall Firewalls Under Attack
Vulnerabilities in firewalls from Palo Alto Networks and SonicWall are currently under active exploitation This article has been indexed from www.infosecurity-magazine.com Read the original article: Palo Alto Networks and SonicWall Firewalls Under Attack
Google Chrome und Microsoft Edge: Mehrere Schwachstellen
Es bestehen mehrere Schwachstellen in Google Chrome und Microsoft Edge. Ein Angreifer kann diese Schwachstellen ausnutzen, um Systeme zum Absturz zu bringen, Schadcode auszuführen, Daten zu ändern, Nutzer zu täuschen oder Informationen zu stehlen. Einige der Schwachstellen erfordern die Interaktion…
USB-C bei iPhone und Mac absichern: MDM-Admins dürfen Sicherheit reduzieren
Eigentlich sorgt der sogenannte USB-Restricted-Mode dafür, dass sich Apple-Geräte nur schwer über den USB-C-Port angreifen lassen. Admins können das verhindern. Dieser Artikel wurde indexiert von heise Security Lesen Sie den originalen Artikel: USB-C bei iPhone und Mac absichern: MDM-Admins dürfen…
Baidu Shifts Ernie AI Model To Open Source
Chinese tech giant Baidu to switch Ernie LLM to open source, make it chatbot for free as start-up DeepSeek reshapes AI market This article has been indexed from Silicon UK Read the original article: Baidu Shifts Ernie AI Model To…
US To Renegotiate Chips Act Awards
New US administration seeks to renegotiate some existing Chips Act contracts over companies’ links to China, social requirements This article has been indexed from Silicon UK Read the original article: US To Renegotiate Chips Act Awards
#TripwireBookClub – Black Hat Bash: Creative Scripting for Hackers and Pentesters
Up Next from #TripwireBookClub is Black Hat Bash: Creative Scripting for Hackers and Pentesters by Dolev Farhi and Nick Aleks. This duo previously published Black Hat GraphQL, which we reviewed in March 2024. This book did not disappoint. I think…