Gianni Lazzari, einer der Gründungspartner von Comelit, ist in der Nacht des 6. Januar 2025 im Alter von 83 Jahren verstorben. Dieser Artikel wurde indexiert von Newsfeed Lesen Sie den originalen Artikel: Nachruf: Comelit-Gründer verstorben
[NEU] [mittel] FreeBSD Project FreeBSD OS: Mehrere Schwachstellen
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen im FreeBSD Project FreeBSD OS ausnutzen, um eine Denial-of-Service-Attacke durchzuführen oder Informationen auszuspähen. Dieser Artikel wurde indexiert von BSI Warn- und Informationsdienst (WID): Schwachstellen-Informationen (Security Advisories) Lesen Sie den originalen Artikel: [NEU] [mittel]…
[UPDATE] [mittel] Oracle MySQL: Mehrere Schwachstellen
Ein Angreifer kann mehrere Schwachstellen in Oracle MySQL ausnutzen, um die Vertraulichkeit, Integrität und Verfügbarkeit zu gefährden. Dieser Artikel wurde indexiert von BSI Warn- und Informationsdienst (WID): Schwachstellen-Informationen (Security Advisories) Lesen Sie den originalen Artikel: [UPDATE] [mittel] Oracle MySQL: Mehrere…
[UPDATE] [hoch] Oracle MySQL: Mehrere Schwachstellen
Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Oracle MySQL ausnutzen, um die Vertraulichkeit, Integrität und Verfügbarkeit zu gefährden. Dieser Artikel wurde indexiert von BSI Warn- und Informationsdienst (WID): Schwachstellen-Informationen (Security Advisories) Lesen Sie den originalen Artikel: [UPDATE]…
[UPDATE] [hoch] bzip2: Schwachstelle ermöglicht Ausführen von beliebigem Programmcode mit den Rechten des Dienstes
Ein entfernter, anonymer Angreifer kann eine Schwachstelle in bzip2 ausnutzen, um beliebigen Programmcode mit den Rechten des Dienstes auszuführen. Dieser Artikel wurde indexiert von BSI Warn- und Informationsdienst (WID): Schwachstellen-Informationen (Security Advisories) Lesen Sie den originalen Artikel: [UPDATE] [hoch] bzip2:…
SquareX Discloses “Browser Syncjacking” , a New Attack Technique that Provides Full Browser and Device Control, Putting Millions at Risk
Palo Alto, USA, 30th January 2025, CyberNewsWire The post SquareX Discloses “Browser Syncjacking” , a New Attack Technique that Provides Full Browser and Device Control, Putting Millions at Risk appeared first on Cybersecurity Insiders. This article has been indexed from…
CISA Releases Seven ICS Advisories to Strengthen Cybersecurity Posture
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued seven Industrial Control Systems (ICS) advisories, highlighting critical vulnerabilities in systems vital to industrial and operational processes. These advisories aim to enhance awareness and encourage mitigation strategies to maintain the…
The DeepSeek controversy: Authorities ask where does the data come from and how safe is it?
The sudden rise of DeepSeek has raised questions of data origin, data destination, and the security of the new AI model. This article has been indexed from Malwarebytes Read the original article: The DeepSeek controversy: Authorities ask where does the…
These Yale and Berkeley dropouts just raised $2 million to build an AI assistant that could rival OpenAI
Y Combinator-backed startup Martin AI secures $2M seed funding to challenge Siri and Google with its innovative personal AI assistant, built by 19-year-old founders to revolutionize how consumers interact with AI through custom memory architecture and multi-channel accessibility. This article…
Ransomware attack at New York blood services provider – donors turned away during shortage crisis
400 hospitals and med centers across 15 states rely on its products New York Blood Center Enterprises (NYBCe) is currently in its fifth day of handling a ransomware attack that has led to system disruption.… This article has been indexed…
US Cyber Agency’s Future Role in Elections Remains Murky Under the Trump Administration
President Donald Trump has yet to name anyone to lead the U.S. Cybersecurity and Infrastructure Security. The post US Cyber Agency’s Future Role in Elections Remains Murky Under the Trump Administration appeared first on SecurityWeek. This article has been indexed…
Legit Security unveils root cause remediation capabilities to reduce AppSec risk
Legit Security announced new root cause remediation capabilities, allowing teams to address multiple software vulnerabilities with one practical step. By pinpointing the choke points where remediation actions can address multiple issues at once, security teams accelerate risk reduction and reduce…
Syncjacking Attack Enables Full Browser and Device Takeover
SquareX researchers warn that browser syncjacking could lead to full browser and device hijacking This article has been indexed from www.infosecurity-magazine.com Read the original article: Syncjacking Attack Enables Full Browser and Device Takeover
Tenable acquires Vulcan Cyber, Chinese and Iranian hackers are using U.S. AI, US Navy bans use of DeepSeek
Tenable acquiring Israel’s Vulcan Cyber in $150 million deal Chinese and Iranian Hackers Are Using U.S. AI Products to Bolster Cyberattacks U.S. Navy bans use of DeepSeek due to ‘security and ethical concerns’ Huge thanks to our sponsor, Conveyor…
IT Security News Hourly Summary 2025-01-30 15h : 17 posts
17 posts were published in the last hour 13:37 : The DeepSeek controversy: Authorities ask where the data comes from and where it goes 13:37 : Lightning AI Studio Vulnerability Allowed RCE via Hidden URL Parameter 13:37 : Authorities Seize…
The DeepSeek controversy: Authorities ask where the data comes from and where it goes
Authorities and users are asking questions about the new AI model DeepSeek. Where did the data come from and how safe is it? This article has been indexed from Malwarebytes Read the original article: The DeepSeek controversy: Authorities ask where…
Lightning AI Studio Vulnerability Allowed RCE via Hidden URL Parameter
Cybersecurity researchers have disclosed a critical security flaw in the Lightning AI Studio development platform that, if successfully exploited, could allow for remote code execution. The vulnerability, rated a CVSS score of 9.4, enables “attackers to potentially execute arbitrary commands…
Authorities Seize Domains of Popular Hacking Forums in Major Cybercrime Crackdown
An international law enforcement operation has dismantled the domains associated with various online platforms linked to cybercrime such as Cracked, Nulled, Sellix, and StarkRDP. The effort has targeted the following domains – www.cracked.io www.nulled.to www.mysellix.io www.sellix.io www.starkrdp.io Visitors to these…
DeepSeek exposed internal database containing chat histories and sensitive data
The internal DeepSeek database was exposed to the internet without a password. © 2024 TechCrunch. All rights reserved. For personal use only. This article has been indexed from Security News | TechCrunch Read the original article: DeepSeek exposed internal database…
North Korean APT Lazarus Compromises Developers via Malicious NPM Packages
The North Korean state-sponsored hacking group Lazarus has been implicated in a sophisticated supply chain attack targeting developers through malicious Node Package Manager (NPM) packages. Security researchers have identified the package, postcss-optimizer, as a key vector for delivering malware to…
Hackers Use 10,000 WordPress Sites To Deliver Malware To macOS and Microsoft Systems
A sophisticated cyberattack has compromised over 10,000 WordPress websites, delivering cross-platform malware to unsuspecting users. The campaign exploits outdated WordPress versions and plugins, redirecting visitors to fake browser update pages that deploy malicious software targeting both macOS and Windows systems.…
TeamViewer Patches High-Severity Vulnerability in Windows Applications
TeamViewer has released patches for a high-severity elevation of privilege vulnerability in its client and host applications for Windows. The post TeamViewer Patches High-Severity Vulnerability in Windows Applications appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…
Datenleck in Reha-Kliniken: Hunderttausende Patienten betroffen
Ein Datenleck betrifft potenziell hunderttausende Patienten der ZAR-Reha-Kliniken in ganz Deutschland. Abrufbar waren unter anderem hochsensible Patientendaten. Dieser Artikel wurde indexiert von heise Security Lesen Sie den originalen Artikel: Datenleck in Reha-Kliniken: Hunderttausende Patienten betroffen
PCAPs or It Didn?t Happen: Exposing an Old Netgear Vulnerability Still Active in 2025 [Guest Diary], (Thu, Jan 30th)
[This is a Guest Diary by David Watson, an ISC intern as part of the SANS.edu BACS program] This article has been indexed from SANS Internet Storm Center, InfoCON: green Read the original article: PCAPs or It Didn?t Happen: Exposing…