Die Raumfahrtagentur ESA verstärkt ihre IT-Sicherheitsbemühungen. Dazu eröffnete sie nun das Cyber Security Operations Center. Dieser Artikel wurde indexiert von heise security News Lesen Sie den originalen Artikel: Cyber Security Operations Center: ESA will mehr IT-Sicherheit
Text-to-Malware: How Cybercriminals Weaponize Fake AI-Themed Websites
Written by: Diana Ion, Rommel Joven, Yash Gupta < div class=”block-paragraph_advanced”>Since November 2024, Mandiant Threat Defense has been investigating an UNC6032 campaign that weaponizes the interest around AI tools, in particular those tools which can be used to generate videos…
Mozilla Quickly Fixes Firefox Vulnerabilities from Pwn2Own 2025 with Urgent Patches
At this year’s Pwn2Own Berlin, security researchers successfully demonstrated two new zero-day exploits against Mozilla Firefox, targeting the browser’s content process. The vulnerabilities—CVE-2025-4918 and CVE-2025-4919—were both found in Firefox’s JavaScript engine and allowed out-of-bounds memory access, raising the risk of…
#Infosec2025: Rory Stewart and Paul Chichester to Headline at Infosecurity Europe 2025
Former UK government minister Rory Stewart and NCSC Director of Operations Paul Chichester will explore the growing link between geopolitics and cybersecurity This article has been indexed from www.infosecurity-magazine.com Read the original article: #Infosec2025: Rory Stewart and Paul Chichester to…
Adidas Customer Information Compromised Through Third-Party Vendor
German sportswear giant Adidas has confirmed a data breach after cybercriminals accessed customer data through a third-party customer service provider. The breach, disclosed on May 23, 2025, did not involve sensitive information such as passwords or payment details but did…
Chinese-Owned VPNs
One one my biggest worries about VPNs is the amount of trust users need to place in them, and how opaque most of them are about who owns them and what sorts of data they retain. A new study found…
New Russia-affiliated actor Void Blizzard targets critical sectors for espionage
Microsoft Threat Intelligence has discovered a cluster of worldwide cloud abuse activity conducted by a threat actor we track as Void Blizzard, who we assess with high confidence is Russia-affiliated and has been active since at least April 2024. Void…
Employees Searching Payroll Portals on Google Tricked Into Sending Paychecks to Hackers
Threat hunters have exposed a novel campaign that makes use of search engine optimization (SEO) poisoning techniques to target employee mobile devices and facilitate payroll fraud. The activity, first detected by ReliaQuest in May 2025 targeting an unnamed customer in…
US Government Launches Audit of NIST’s National Vulnerability Database
The audit of the NVD will be conducted by the US Department of Commerce’s Office of Inspector General This article has been indexed from www.infosecurity-magazine.com Read the original article: US Government Launches Audit of NIST’s National Vulnerability Database
IT Security News Hourly Summary 2025-05-27 12h : 4 posts
4 posts were published in the last hour 9:32 : Everest Ransomware Leaks Coca-Cola Employee Data Online 9:32 : Red Hat and AMD Team Up to Boost AI Processing Power and Performance 9:5 : [NEU] [mittel] Linux Kernel: Schwachstelle ermöglicht…
Datenleck – und jetzt? So erfährst du, ob du betroffen bist
Regelmäßig landen durch Hacks Millionen Nutzer:innendaten wie Mailadressen, Passwörter und Adressen im Netz. Im besten Fall führt das nur zu Spam-Mails, im schlimmsten Fall zum Identitätsdiebstahl. Diese Tools zeigen euch, ob ihr euch Sorgen machen müsst. Dieser Artikel wurde indexiert…
Whatsapp Web bekommt einen Media-Hub: Wie er euch wertvolle Zeit sparen soll
Whatsapp arbeitet an einer neuen Funktion für die Web-Version des Browsers. Dieser soll einen Media-Hub bekommen. Was damit möglich ist und wie ihr dadurch Zeit spart. Dieser Artikel wurde indexiert von t3n.de – Software & Entwicklung Lesen Sie den originalen…
ChatGPT und Co.: Diese 6 Geheimnisse solltet ihr besser für euch behalten!
Immer häufiger interagieren Menschen mit Chatbots wie ChatGPT. Dabei geben wir auch Daten und Fakten über uns preis, die die KI-Tools besser nicht wissen sollten. Welche Dinge ihr lieber geheim halten solltet. Dieser Artikel wurde indexiert von t3n.de – Software…
Als die Bilder lügen lernten: Der nächste große Schritt in der Video-KI betrifft uns alle
Nur wenige Tage nach der Veröffentlichung ist das Netz voll von Clips aus Googles neuer Video-KI Veo 3. Was technisch beeindruckend ist, wirft ernste Fragen auf. Dieser Artikel wurde indexiert von t3n.de – Software & Entwicklung Lesen Sie den originalen…
Kein Patch verfügbar: BSI warnt vor kritischer AD-Lücke in Windows Server 2025
Admins, die einen auf Windows Server 2025 basierenden Domain Controller betreiben, sollten handeln. Angreifer können sich Adminrechte verschaffen. (Sicherheitslücke, Microsoft) Dieser Artikel wurde indexiert von Golem.de – Security Lesen Sie den originalen Artikel: Kein Patch verfügbar: BSI warnt vor kritischer…
Angriff über GitHub MCP Server: Zugriff auf private Daten
Die offizielle Integration des Model Contet Protocol in GitHub kann bei unvorsichtiger Anwendung private Informationen offenlegen. Dieser Artikel wurde indexiert von heise security News Lesen Sie den originalen Artikel: Angriff über GitHub MCP Server: Zugriff auf private Daten
OpenAI Plans Seoul Office Amidst Strong Demand
OpenAI to open next international office in Seoul, says South Korea has second highest level of paid ChatGPT subscribers after US This article has been indexed from Silicon UK Read the original article: OpenAI Plans Seoul Office Amidst Strong Demand
Capgemini, SAP Work With Mistral On AI For Regulated Industries
Mistral to work with Capgemini, SAP to tailor AI models for use in highly regulated industries such as finance, defence and energy This article has been indexed from Silicon UK Read the original article: Capgemini, SAP Work With Mistral On…
Alibaba ‘Instant’ Commerce Platform Crosses 40 Million Daily Orders
Alibaba’s Taobao Instant Commerce offering surpasses 40 million daily orders less than a month after launch, as e-commerce battle turns ugly This article has been indexed from Silicon UK Read the original article: Alibaba ‘Instant’ Commerce Platform Crosses 40 Million…
Foxconn ‘Interested’ In Buying Singapore’s UTAC
Apple assembler Foxconn reportedly a potential bidder for Singapore-based chip assembler and tester UTAC as Chinese owner looks to sell This article has been indexed from Silicon UK Read the original article: Foxconn ‘Interested’ In Buying Singapore’s UTAC
Silver RAT Malware Employs New Anti-Virus Bypass Techniques to Execute Malicious Activities
A newly identified strain of malware, dubbed Silver RAT, has emerged as a significant threat to cybersecurity, leveraging sophisticated anti-virus bypass techniques to infiltrate and compromise Windows-based systems. This remote access trojan (RAT), believed to be crafted by a highly…
Multiple Vulnerabilities in Hardy Barth EV Station Allow Unauthenticated Network Access
Critical security flaws have been identified in the eCharge Hardy Barth cPH2 and cPP2 charging stations, specifically affecting firmware version 2.2.0. These vulnerabilities, discovered by Stefan Viehböck of SEC Consult Vulnerability Lab, expose electric vehicle (EV) charging infrastructure to severe…
The Privacy-Friendly Tech to Replace Your US-Based Email, Browser, and Search
Thanks to drastic policy changes in the US and Big Tech’s embrace of the second Trump administration, many people are moving their digital lives abroad. Here are a few options to get you started. This article has been indexed from…
GIMP Image Editor Vulnerability Let Remote Attackers Arbitrary Code
Two critical security vulnerabilities discovered in the popular GIMP image editing software have been disclosed. These vulnerabilities allow remote attackers to execute arbitrary code on affected systems. The vulnerabilities, identified as CVE-2025-2760 and CVE-2025-2761, were publicly disclosed on April 7th,…