📰 Alle News

← Command Center
Wormable XMRig Campaign Uses BYOVD Exploit and Time-Based Logic Bomb

Cybersecurity researchers have disclosed details of a new cryptojacking campaign that uses pirated software bundles as lures to deploy a bespoke XMRig miner program on compromised hosts. "Analysis of ...

Data center builders thought farmers would willingly sell land, learn otherwise

Even in a fragile farm economy, million-dollar offers can't sway dedicated farmers.

⚡ Weekly Recap: Double-Tap Skimmers, PromptSpy AI, 30Tbps DDoS, Docker Malware & More

Security news rarely moves in a straight line. This week, it feels more like a series of sharp turns, some happening quietly in the background, others playing out in public view. The details are diffe...

New Microsoft gaming chief has "no tolerance for bad AI"

But Asha Sharma faces scrutiny for lack of gaming experience.

How Exposed Endpoints Increase Risk Across LLM Infrastructure

As more organizations run their own Large Language Models (LLMs), they are also deploying more internal services and Application Programming Interfaces (APIs) to support those models. Modern security ...

OpenClaw Alternatives That You Can Run on Raspberry Pi Like Devices

You don't need a MacMini for running OpenClaw. These alternative projects can run on SBCs and ESP32 microcontrollers.

Malicious npm Packages Harvest Crypto Keys, CI Secrets, and API Tokens

Cybersecurity researchers have disclosed what they say is an active "Shai-Hulud-like" supply chain worm campaign that has leveraged a cluster of at least 19 malicious npm packages to enable credential...

AIs can generate near-verbatim copies of novels from training data

LLMs memorize more training data than previously thought.

US State Colorado Wants Operating Systems (Including Linux) to Tell Every App How Old You Are

A bill with a goal and vague language on how to achieve it.

Linux: Torvalds startet Entwicklung von Kernel 7.0

Linus Torvalds hat zwei Wochen nach Release von Kernel 6.19 jetzt den RC1 von Kernel 7.0 veröffentlicht. Der soll stabil werden.

MuddyWater Targets MENA Organizations with GhostFetch, CHAR, and HTTP_VIP

The Iranian hacking group known as MuddyWater (aka Earth Vetala, Mango Sandstorm, and MUDDYCOAST) has targeted several organizations and individuals mainly located across the Middle East and North Afr...

On the Security of Password Managers

Good article on password managers that secretly have a backdoor. New research shows that these claims aren’t true in all cases, particularly when account recovery is in place or password managers are ...

Nextcloud Hub 26 macht Schluss mit dem Vendor-Lock-in

Nextcloud Hub 26 Winter erweitert Federation auf Deck und Kalender, bringt standardmäßig aktivierte Migrationstools und beschleunigt die Performance.

Sicherheitsupdate: Schadcode-Attacken auf GIMP möglich

Angreifer können PCs, auf denen das Grafikprogramm GIMP installiert ist, attackieren. Dafür müssen Opfer aber mitspielen.

A Designer’s Guide To Eco-Friendly Interfaces

Every high-resolution hero image, autoplay video, and complex JavaScript animation carries a cost. Sustainable UX challenges the era of “unlimited pixels” and reframes performance as responsibility. I...

iX-Workshop: Linux-Server absichern – effektiv und umfassend

Linux-Server und Netzwerkdienste effektiv und umfassend vor Angriffen schützen – von physischer Sicherheit über Verschlüsselung und 2FA bis hin zu SELinux.

Roundcube Webmail: Angriffe auf Sicherheitslücken laufen

Die IT-Sicherheitsbehörde CISA warnt vor aktuell beobachteten Angriffen auf Roundcube-Webmail-Schwachstellen. Admins sollten updaten.

Late-night patch panics are so 2023 🥱 (Sponsor)

You've been there: code's ready to ship, everyone's excited—then someone spots a vulnerability. Suddenly it's an all-hands emergency and time to cancel your evening plans.Microsoft Azure bakes securit...

DigitalOcean Gradient™ AI GPU Droplets Optimized for Inference: Increasing Throughput at Lower the Cost (11 minute read)

DigitalOcean launched its Inference Optimized Image that achieved 143% higher throughput (2,000 vs. 823 tokens/second) and 75% lower costs ($1.47 vs. $5.80 per million tokens) while running Meta's Lla...

Cloudflare outage on February 20, 2026 (10 minute read)

Cloudflare experienced a 6-hour outage on February 20 when a buggy API query in an automated cleanup task unintentionally withdrew 1,100 BYOIP (Bring Your Own IP) prefixes—about 25% of all BYOIP route...

Lots of AI SRE, no AI incident management (5 minute read)

Emerging AI SRE tools from vendors like PagerDuty, Datadog, Microsoft, and startups focus on diagnosis and mitigation but overlook incident management and coordination. Effective incident response req...

State of cloud native 2026: CNCF CTO's insights and predictions (3 minute read)

CNCF CTO Chris Aniszczyk predicted that AI-powered systems will become top contributors by volume to many open source projects by the end of 2026, though he warned this will increase the review burden...

State of Agentic AI Report: Key Findings (3 minute read)

Docker's new survey of 800+ developers reveals that while 60% of organizations already have AI agents in production and 94% consider them a strategic priority, security remains the top scaling challen...

Automate repository tasks with GitHub Agentic Workflows (6 minute read)

GitHub Agentic Workflows enable AI-driven, intent-based automation in GitHub Actions using plain Markdown, allowing teams to continuously triage issues, update documentation, improve tests, and mainta...

Amazon EKS Auto Mode Announces Enhanced Logging for its Managed Kubernetes Capabilities (2 minute read)

Amazon Elastic Kubernetes Service Auto Mode now supports Amazon CloudWatch Vended Logs as delivery sources, enabling automated logging for autoscaling, storage, load balancing, and networking componen...

Metrics that matter: Measuring platform success and maturity (5 minute read)

A new industry report reveals that nearly 30% of platform engineering teams don't measure success at all, and another 24% can't determine if their metrics are improving.

Agentic cloud operations: A new way to run the cloud (4 minute read)

Azure Copilot introduces agentic cloud operations, embedding coordinated AI agents across migration, deployment, observability, optimization, resiliency, and troubleshooting to translate telemetry int...

Ubuntu 26.04 LTS will default to OpenJDK 25

Ubuntu 26.04 LTS ‘Resolute Raccoon’ will use OpenJDK 25 as its default Java version. An expected change as OpenJDK 25 is a long-term support release, as Ubuntu 26.04 is, the bump brings va...

AWS won't discuss my bill, suspended my account, took $1,600, still no human

AWS has been charging me $1,500/month for near-zero usage. For over a year. That is more than $18,000 for infrastructure I barely use.I tried multiple times to get a human on the phone to discuss it. ...

Serious About Learning Linux? Get 15 O'Reilly Linux and DevOps eBooks for Under $25

From command line to Kubernetes and Terraform, this bundle covers a lot!

AI-Assisted Threat Actor Compromises 600+ FortiGate Devices in 55 Countries

A Russian-speaking, financially motivated threat actor has been observed taking advantage of commercial generative artificial intelligence (AI) services to compromise over 600 FortiGate devices locate...

Anthropic Launches Claude Code Security for AI-Powered Vulnerability Scanning

Artificial intelligence (AI) company Anthropic has begun to roll out a new security feature for Claude Code that can scan a user's software codebase for vulnerabilities and suggest patches. The capabi...

CISA Adds Two Actively Exploited Roundcube Flaws to KEV Catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added two security flaws impacting Roundcube webmail software to its Known Exploited Vulnerabilities (KEV) catalog, citing ev...

EC-Council Expands AI Certification Portfolio to Strengthen U.S. AI Workforce Readiness and Security

With $5.5 trillion in global AI risk exposure and 700,000 U.S. workers needing reskilling, four new AI certifications and Certified CISO v4 help close the gap between AI adoption and workforce readine...

A Powerful To-Do App for Android That Collects Absolutely None of Your Data

It handles time tracking, Jira sync, and Pomodoro timers without going after its users' data.

Ghostty terminal is finally adding scrollbar support

Ghostty's most-thumbed feature request is finally being answered. Yup, scrollbar support is finally coming in Ghostty 1.3 for Linux and macOS. You're reading Ghostty terminal is finally adding scrollb...

Friday Squid Blogging: Squid Cartoon

I like this one. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Blog moderation policy.

BeyondTrust Flaw Used for Web Shells, Backdoors, and Data Exfiltration

Threat actors have been observed exploiting a recently disclosed critical security flaw impacting BeyondTrust Remote Support (RS) and Privileged Remote Access (PRA) products to conduct a wide range of...

‘Starkiller’ Phishing Service Proxies Real Login Pages, MFA

Most phishing websites are little more than static copies of login pages for popular online destinations, and they are often quickly taken down by anti-abuse activists and security firms. But a stealt...

Cline CLI 2.3.0 Supply Chain Attack Installed OpenClaw on Developer Systems

In yet another software supply chain attack, the open-source, artificial intelligence (AI)-powered coding assistant Cline CLI was updated to stealthily install OpenClaw, a self-hosted autonomous AI ag...

Rudra is a new keyboard-driven launcher for GNOME Shell

The world isn’t short on keyboard-based Linux launchers. Albert, Ulauncher, rofi and GNOME Do (if you’re old enough to remember that one) are among those I’ve written about in the pa...

ClickFix Campaign Abuses Compromised Sites to Deploy MIMICRAT Malware

Cybersecurity researchers have disclosed details of a new ClickFix campaign that abuses compromised legitimate sites to deliver a previously undocumented remote access trojan (RAT) called MIMICRAT (ak...

Identity Cyber Scores: The New Metric Shaping Cyber Insurance in 2026

With one in three cyber-attacks now involving compromised employee accounts, insurers and regulators are placing far greater emphasis on identity posture when assessing cyber risk.  For many orga...

Ukrainian National Sentenced to 5 Years in North Korea IT Worker Fraud Case

A 29-year-old Ukrainian national has been sentenced to five years in prison in the U.S. for his role in facilitating North Korea's fraudulent information technology (IT) worker scheme. In November 202...

An AI coding bot took down Amazon Web Services

Blames "user error, not AI error" for incident in December involving its Kiro tool.

FBI Reports 1,900 ATM Jackpotting Incidents Since 2020, $20M Lost in 2025

The U.S. Federal Bureau of Investigation (FBI) has warned of an increase in ATM jackpotting incidents across the country, leading to losses of more than $20 million in 2025. The agency said 1,900 ATM ...

AI Slop verstopft Open Source: GitHub kündigt Maßnahmen an

Immer mehr Open-Source-Projekte leiden unter der Flut oft wertloser KI-Beiträge über GitHub. Der Betreiber hat nun erste Maßnahmen dagegen angekündigt.

Zahlreiche Kernel-Lücken in Dell PowerProtect Data Manager geschlossen

Dells Backuplösung PowerProtect Data Manager ist unter anderem für Schadcode-Attacken anfällig. Sicherheitspatches stehen zum Download bereit.

Microsoft deletes blog telling users to train AI on pirated Harry Potter books

The now-deleted Harry Potter dataset was "mistakenly" marked public domain.

Ring Cancels Its Partnership with Flock

It’s a demonstration of how toxic the surveillance-tech company Flock has become when Amazon’s Ring cancels the partnership between the two companies. As Hamilton Nolan advises, remove you...

← Neuere Seite 18 Ältere →