20 posts were published in the last hour 10:3 : Anubis Ransomware Introduces Irreversible File Destruction Feature 10:3 : Microsoft Purview DLP Now Controls Copilot’s Access to Sensitive Email Data 10:3 : Over 20 Malicious Google Play Apps Steal Users’…
5 Dinge, die du diese Woche wissen musst: Rückschau auf die WWDC – wo hat Apple wirklich überzeugt?
Jeden Montagmorgen berichten wir über fünf Dinge, die zum Wochenstart wichtig sind. Diesmal geht es um die WWDC, Android 16, die Rechenleistung bei DeepL, Steve Jobs und die Frage, warum Menschen eine hohe Wechselbereitschaft für ihren Job zeigen. Dieser Artikel…
Nie wieder schädliche Links: Diese Android-App schützt euch vor versteckter Malware
Unbekannte Links stellen ein großes Sicherheitsrisiko für Smartphone-User:innen dar. Denn dahinter können sich schädliche Webseiten und Malware-Downloads verstecken. Eine Android-App möchte euch davor schützen, indem sie als Schutzschild fungiert. Dieser Artikel wurde indexiert von t3n.de – Software & Entwicklung Lesen…
"Höchste Priorität": Mark Zuckerberg sucht 50 Experten für sein KI-Team – wir hätten da ein paar Vorschläge
Meta will bei der Entwicklung einer menschenähnlichen Intelligenz jetzt richtig Gas geben und sucht 50 Expert:innen. Wir hätten da mal ein paar Vorschläge. Dieser Artikel wurde indexiert von t3n.de – Software & Entwicklung Lesen Sie den originalen Artikel: "Höchste Priorität":…
Hackers Compromise Discord Invite to Inject Malicious Links Delivering AsyncRAT
Threat actors have exploited Discord’s invite system to distribute malicious links, ultimately delivering AsyncRAT and other harmful payloads. Discord, a widely trusted platform for gamers, developers, and communities, has become a target for cybercriminals who abuse its infrastructure particularly the…
Hackers Can Hide Images in Text Data and Embeds Directly into DNS TXT Records
A novel method has emerged that demonstrates how digital images can be seamlessly embedded within DNS TXT records, effectively transforming domain name infrastructure into an unconventional image storage system. This innovative technique, dubbed “dnsimg,” represents a novel approach to data…
North Korean APT Hackers Attacking Ukrainian Government Agencies to Steal Login Credentials
North Korean advanced persistent threat (APT) groups have launched a sophisticated cyber campaign against Ukrainian government agencies, marking a significant departure from their traditional targeting patterns. This shift in focus represents a potentially strategic alignment with Russian interests, as North…
Threat Actors Using Fake Travel Websites to Infect Users’ PCs with XWorm Malware
A sophisticated cybercrime campaign has emerged targeting holiday travelers through meticulously crafted fake travel booking websites designed to mimic legitimate platforms like Booking.com. The operation, which gained significant momentum in the first quarter of 2025, represents an alarming evolution in…
Spy school dropout: GCHQ intern jailed for swiping classified data
Student ‘believed he could finish’ software dev ‘project alone and therefore that the rules did not apply to him’ A former GCHQ intern was jailed for seven-and-a-half years for stealing top-secret files during a year-long placement at the British intelligence…
Carsenal: Neues Kali Linux enthält Tools zum Hacken von Autos
Kali Linux 2025.2 liefert nicht nur eine optimierte Menüstruktur. Es enthält auch ein aktualisiertes Toolset, mit dem sich Fahrzeuge hacken lassen. (Linux, Open Source) Dieser Artikel wurde indexiert von Golem.de – Security Lesen Sie den originalen Artikel: Carsenal: Neues Kali…
[UPDATE] [mittel] OWASP ModSecurity: Schwachstelle ermöglicht Denial of Service
Ein entfernter, anonymer Angreifer kann eine Schwachstelle in OWASP ModSecurity ausnutzen, um einen Denial of Service Angriff durchzuführen. Dieser Artikel wurde indexiert von BSI Warn- und Informationsdienst (WID): Schwachstellen-Informationen (Security Advisories) Lesen Sie den originalen Artikel: [UPDATE] [mittel] OWASP ModSecurity:…
[NEU] [hoch] PostgreSQL JDBC Treiber: Schwachstelle ermöglicht Offenlegung von Informationen
Ein entfernter, anonymer Angreifer kann eine Schwachstelle im PostgreSQL JDBC Treiber ausnutzen, um Informationen offenzulegen. Dieser Artikel wurde indexiert von BSI Warn- und Informationsdienst (WID): Schwachstellen-Informationen (Security Advisories) Lesen Sie den originalen Artikel: [NEU] [hoch] PostgreSQL JDBC Treiber: Schwachstelle ermöglicht…
US ‘Reviews’ Google’s $32bn Wiz Buy Over Competition Concerns
US Justice Department reportedly investigating whether Google’s largest-ever deal for cloud security firm Wiz would harm competition This article has been indexed from Silicon UK Read the original article: US ‘Reviews’ Google’s $32bn Wiz Buy Over Competition Concerns
China Postpones Approval Of $35bn Synopsys-Ansys Merger
Chinese regulators reportedly delay approval of $35bn Synopsys-Ansys deal as chip design sector roiled by new US export controls This article has been indexed from Silicon UK Read the original article: China Postpones Approval Of $35bn Synopsys-Ansys Merger
GrayAlpha Hackers Group Exploits Browser Updates to Deploy PowerNet Loader and NetSupport RAT
A new infrastructure linked to GrayAlpha, a cybercriminal entity overlapping with the notorious FIN7 group, has been exposed. This financially motivated threat actor, active since at least 2013, is known for its sophisticated attacks targeting retail, hospitality, and financial sectors.…
Why We Made a Guide to Winning a Fight
Right now, everyone seems ready to throw down. More than ever, it’s important to fight smart—and not give up until you land a decisive blow. This article has been indexed from Security Latest Read the original article: Why We Made…
The WIRED Guide to Protecting Yourself From Government Surveillance
Donald Trump has vowed to deport millions and jail his enemies. To carry out that agenda, his administration will exploit America’s digital surveillance machine. Here are some steps you can take to evade it. This article has been indexed from…
6 Tools for Tracking the Trump Administration’s Attacks on Civil Liberties
The White House has undertaken initiatives to crack down on immigration, suppress speech, and curtail US public health efforts. These online tools are tracking the rapidly changing US landscape. This article has been indexed from Security Latest Read the original…
How to Protect Yourself From Phone Searches at the US Border
Customs and Border Protection has broad authority to search travelers’ devices when they cross into the United States. Here’s what you can do to protect your digital life while at the US border. This article has been indexed from Security…
Anubis Ransomware Packs a Wiper to Permanently Delete Files
The emerging Anubis ransomware becomes a major threat, permanently deleting user files and making recovery impossible. The post Anubis Ransomware Packs a Wiper to Permanently Delete Files appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…
Anubis Ransomware Introduces Irreversible File Destruction Feature
A new and menacing player has emerged in the cybercrime landscape with the introduction of Anubis, a Ransomware-as-a-Service (RaaS) operation that blends traditional file encryption with a devastating file destruction capability. Active since December 2024, Anubis has quickly gained notoriety…
Microsoft Purview DLP Now Controls Copilot’s Access to Sensitive Email Data
Microsoft is set to enhance data security in Microsoft 365 by extending Purview Data Loss Prevention (DLP) controls to Copilot’s handling of sensitive email data. Starting January 1, 2025, Microsoft 365 Copilot will be prevented from processing emails that carry…
Over 20 Malicious Google Play Apps Steal Users’ Login Credentials
A major security alert has been issued for Android users after cybersecurity researchers uncovered more than 20 malicious applications on the Google Play Store designed to steal users’ login credentials, specifically targeting cryptocurrency wallet holders. The campaign, identified by Cyble…
New Predator spyware infrastructure revealed activity in Mozambique for the first time
Insik Group analyzed the new Predator spyware infrastructure and discovered it’s still gaining users despite U.S. sanctions since July 2023. Despite earlier declines in activity due to U.S. sanctions and public exposure, Predator spyware has resurged. Insikt Group analyzed a…