Key Market Indicator:
F&G: 49
25.199,75 NASDAQ · 50.323,01 DOW · 6.959,05 S&P · 5.052,67 Gold · 68,90 BRENT

Proteo Defence 365/24/7 
Security Audits · CyberCrime Forensics · R/G/W Teaming
Powerful app-Suite for Admins, Website operators, Research

Switch View
Source: Dark Reading Filter zurücksetzen
© Sector News
23.01.2026
Exploited Zero-Day Flaw in Cisco UC Could Affect Millions
News Preview
Mass scanning is underway for CVE-2026-20045, which Cisco tagged as critical because successful exploitation could lead to a complete system takeover.
© Dark Reading 2026
© Sector News
23.01.2026
Europe's GCVE Raises Concerns Over Fragmentation in Vulnerability Databases
News Preview
GCVE would enhance global collaboration, flexibility, and efficiency in tracking security flaws. Duplicate entries and a decentralization policy may create more chaos for defenders.
© Dark Reading 2026
© Sector News
23.01.2026
Healthy Security Cultures Want People to Report Risks
News Preview
The signs of an effective security culture are shifting as companies call on CISOs and security teams to raise their hands unabashedly.
© Dark Reading 2026
Worth to know
20.10.2025
Short Selling Radar

USA, Europe, Asia
Track Short Selling Activities worldwide
Knowing what matters
Leerverkaufsstatistiken, Hedge-Fund Aktivitäten und viele weitere nutzerwertige Informationen benutzerfreundlich aufbereitet
© Sector News
22.01.2026
Risky Chinese Electric Buses Spark Aussie Gov't Review
News Preview
Deployed across Australia and Europe, China's electric buses are vulnerable to cybercriminals and sport remote connectivity some worry the Chinese state could exploit.
© Dark Reading 2026
Swarmalpha i/o · The Event Futures Prediction X
23.01.2026
© Sector News
22.01.2026
Fortinet Firewalls Hit With Malicious Configuration Changes
News Preview
Automated infections of potentially fully patched FortiGate devices are allowing threat actors to steal firewall configuration files.
© Dark Reading 2026
© Sector News
22.01.2026
From a Whisper to a Scream: Europe Frets About Overreliance on US Tech
News Preview
Concern is growing across Europe about relying on US cybersecurity companies, and Greenland takeover talk is eroding trust across the EU even further.
© Dark Reading 2026
© Sector News
22.01.2026
Latin American Orgs Lack Confidence in Cyber Defenses, Skills
News Preview
Cybersecurity professionals in Latin America are least likely to have faith in their countries' preparedness for cyberattacks on critical infrastructure, the World Economic Forum says.
© Dark Reading 2026
© Sector News
22.01.2026
DPRK Actors Deploy VS Code Tunnels for Remote Hacking
News Preview
A spear-phishing campaign tied to the Democratic People's Republic of Korea (DPRK) uses trusted Microsoft infrastructure to avoid detection.
© Dark Reading 2026
© Sector News
22.01.2026
Dark Reading Confidential: Reviving the Hacker Ethos That Built Cybersecurity
News Preview
Dark Reading Confidential Episode 14: How curious, ethical problem-solving can continue to serve as a guiding principle for an evolving cybersecurity sector.
© Dark Reading 2026
© Sector News
22.01.2026
Dark Reading Confidential: Reviving the Hacker Ethos That Built Cybersecurity
News Preview
Dark Reading Confidential Episode 14: How curious, ethical problem-solving can continue to serve as a guiding principle for an evolving cybersecurity sector.
© Dark Reading 2026
© Sector News
22.01.2026
AI Agents Undermine Progress in Browser Security
News Preview
Web browser companies have put in substantial effort over the past three decades to strengthen the browser security stack against abuses. Agentic browsers are undoing all that work.
© Dark Reading 2026
© Sector News
21.01.2026
'Contagious Interview' Attack Now Delivers Backdoor Via VS Code
News Preview
Once trust is granted to the repository's author, a malicious app executes arbitrary commands on the victim's system with no other user interaction.
© Dark Reading 2026
Advertisment
20.10.2025
© Sector News
21.01.2026
Phishing Campaign Zeroes in on LastPass Customers
News Preview
The bait incudes plausible subject lines and credible messages, most likely thanks to attackers' use of large language models to craft them.
© Dark Reading 2026
© Sector News
21.01.2026
Complex VoidLink Linux Malware Created by AI
News Preview
Researchers say the advanced framework was built almost entirely by agents, marking a significant evolution in the use of AI to develop wholly original malware.
© Dark Reading 2026
© Sector News
21.01.2026
'Damn Vulnerable' Training Apps Leave Vendors' Clouds Exposed
News Preview
Hackers are already leveraging these over-permissioned programs to access the IT systems of major security vendors.
© Dark Reading 2026
© Sector News
20.01.2026
'CrashFix' Scam Crashes Browsers, Delivers Malware
News Preview
The attack consists of a NexShield malicious browser extension, a social engineering technique to crash the browser, and a Python-based RAT.
© Dark Reading 2026
© Sector News
20.01.2026
Mass Spam Attacks Leverage Zendesk Instances
News Preview
The CRM vendor advised ignoring or deleting suspicious emails and said the attacks were not tied to any breach or software vulnerability.
© Dark Reading 2026
© Sector News
20.01.2026
Vulnerabilities Threaten to Break Chainlit AI Framework
News Preview
Familiar bugs in a popular open source framework for AI chatbots could give attackers dangerous powers in the cloud.
© Dark Reading 2026
© Sector News
20.01.2026
Google Gemini Flaw Turns Calendar Invites Into Attack Vector
News Preview
The indirect prompt injection vulnerability allows an attacker to weaponize invites to circumvent Google's privacy controls and access private data.
© Dark Reading 2026
© Sector News
20.01.2026
Microsoft & Anthropic MCP Servers at Risk of RCE, Cloud Takeovers
News Preview
Researchers found the popular model context protocol (MCP) servers, which are integral components of AI services, carry serious vulnerabilities.
© Dark Reading 2026
© Sector News
19.01.2026
ChatGPT Health Raises Big Security, Safety Concerns
News Preview
ChatGPT Health promises robust data protection, but elements of the rollout raise big questions regarding user security and safety.
© Dark Reading 2026
© Sector News
16.01.2026
More Problems for Fortinet: Critical FortiSIEM Flaw Exploited
News Preview
CVE-2025-64155, a command injection vulnerability, was disclosed earlier this week and quickly came under attack from a variety of IP addresses.
© Dark Reading 2026
© Sector News
16.01.2026
CISOs Rise to Prominence: Security Leaders Join the Executive Suite
News Preview
Security professionals are moving up the executive ranks as enterprises face rising regulatory and compliance standards.
© Dark Reading 2026
© Sector News
16.01.2026
AI System Reduces Attack Reconstruction Time From Weeks to Hours
News Preview
Pacific Northwest National Labs' expert cybersecurity system, ALOHA, can recreate attacks and test them against organizations' infrastructure to bolster defense.
© Dark Reading 2026
© Sector News
15.01.2026
Predator Spyware Sample Indicates 'Vendor-Controlled' C2
News Preview
Researchers detailed how Intellexa, Predator's owner, uses failed deployments and thwarted infections to strengthen its commercial spyware and generate more effective attacks.
© Dark Reading 2026
© Sector News
15.01.2026
Winter Olympics Could Share Podium With Cyberattackers
News Preview
The upcoming Winter Games in the Italian Alps are attracting both hacktivists looking to reach billions of people and state-sponsored cyber-spies targeting the attending glitterati.
© Dark Reading 2026
© Sector News
15.01.2026
Vulnerabilities Surge, But Messy Reporting Blurs Picture
News Preview
MITRE loses its lead as the top reporter of vulnerabilities, while new organizations pump out CVEs and reported bugs in WordPress plug-ins surge.
© Dark Reading 2026
© Sector News
15.01.2026
Trio of Critical Bugs Spotted in Delta Industrial PLCs
News Preview
Experts disagree on whether the vulnerabilities in a programmable logic controller from Delta are a five-alarm fire or not much to worry over.
© Dark Reading 2026
© Sector News
14.01.2026
Retail, Services Industries Under Fire in Oceania
News Preview
Last year in Australia, New Zealand, and the South Pacific, Main Street businesses like retail and construction suffered more cyberattacks than their critical sector counterparts.
© Dark Reading 2026
© Sector News
14.01.2026
Microsoft Disrupts Cybercrime Service RedVDS
News Preview
RedVDS, a cybercrime-as-a-service operation that has stolen millions from victims, lost two domains to a law enforcement operation.
© Dark Reading 2026
© Sector News
14.01.2026
'VoidLink' Malware Poses Advanced Threat to Linux Systems
News Preview
Researchers discovered a modular, "cloud-first" framework that is feature-rich and designed to maintain stealthy, long-term access to Linux environments.
© Dark Reading 2026
© Sector News
14.01.2026
Taiwan Endures Greater Cyber Pressure From China
News Preview
Chinese cyberattacks on Taiwan's critical infrastructure — including energy utilities and hospitals — rose 6% in 2025, averaging 2.63 million attacks a day.
© Dark Reading 2026
© Sector News
14.01.2026
CrowdStrike to Buy Seraphic Security in Bid to Boost Browser Security
News Preview
The browser protection and detection technology will be integrated into CrowdStrike's Falcon platform to protect endpoints, browser sessions, and cloud applications.
© Dark Reading 2026
© Sector News
14.01.2026
CISO Succession Crisis Highlights How Turnover Amplifies Security Risks
News Preview
When cybersecurity leadership turns over too fast, risk does not reset. It compounds.
© Dark Reading 2026
© Sector News
13.01.2026
'Most Severe AI Vulnerability to Date' Hits ServiceNow
News Preview
The ITSM giant tacked agentic AI onto a largely unguarded legacy chatbot, exposing customers' data and connected systems.
© Dark Reading 2026
© Sector News
13.01.2026
Microsoft Starts 2026 With a Bang: A Freshly Exploited Zero-Day
News Preview
The vendor's first Patch Tuesday of the year also contains fixes for 112 CVEs, nearly double the amount from last month.
© Dark Reading 2026
© Sector News
13.01.2026
Shadow#Reactor Uses Text Files to Deliver Remcos RAT
News Preview
Attackers use a sophisticated delivery mechanism of text-only files for RAT deployment, showcasing a clever way to bypass defensive tools and rely on the target's own utilities.
© Dark Reading 2026
© Sector News
13.01.2026
AsyncRAT Malware Infests Orgs via Python & Cloudflare
News Preview
The phishing campaign shows how attackers continue to weaponize legitimate cloud services and open source tools to evade detection and gain trust.
© Dark Reading 2026
© Sector News
12.01.2026
BreachForums Breached, Exposing 324K Cybercriminals
News Preview
A massive data dump reveals real identities and details of administrators and members of the notorious hacker forum.
© Dark Reading 2026
© Sector News
12.01.2026
Multipurpose GoBruteforcer Botnet Targets 50K+ Linux Servers
News Preview
Researchers detailed a souped-up version of the GoBruteforcer botnet that preys on servers with weak credentials and AI-generated configurations.
© Dark Reading 2026
© Sector News
12.01.2026
Navigating Privacy and Cybersecurity Laws in 2026 Will Prove Difficult
News Preview
No matter what new laws or regulations make the cut for 2026, it's clear that compliance challenges will persist and federal legislation will be limited.
© Dark Reading 2026
© Sector News
12.01.2026
FBI Flags Quishing Attacks From North Korean APT
News Preview
A state-sponsored threat group tracked as "Kimsuky" sent QR-code-filled phishing emails to US and foreign government agencies, NGOs, and academic institutions.
© Dark Reading 2026
© Sector News
12.01.2026
Hexnode Moves into Endpoint Security With Hexnode XDR
News Preview
© Dark Reading 2026
© Sector News
12.01.2026
2 Separate Campaigns Probe Corporate LLMs for Secrets
News Preview
A total of 91,403 sessions targeted public LLM endpoints to find leaks in organizations' use of AI and map an expanding attack surface.
© Dark Reading 2026
© Sector News
09.01.2026
Deepfake Fraud Tools Are Lagging Behind Expectations
News Preview
Deepfakes are becoming more realistic and more popular. Luckily, defenders are still ahead in the arms race.
© Dark Reading 2026
© Sector News
09.01.2026
Illicit Crypto Economy Surges Amid Increased Nation-State Activity
News Preview
Cybercriminal cryptocurrency transactions totaled billions in 2025, with activity from sanctioned countries like Russia and Iran causing the largest jump.
© Dark Reading 2026
© Sector News
09.01.2026
Russia’s Fancy Bear APT Doubles Down on Global Secrets Theft
News Preview
The notorious state-sponsored group relies on basic techniques that are highly effective, often delivering greater ROI than more complex malware-heavy operations.
© Dark Reading 2026
© Sector News
09.01.2026
CrowdStrike to Buy SGNL to Expand Identity Security Capabilities
News Preview
The CrowdStrike-SGNL deal underscores how identity security has become a critical component of enterprise cybersecurity as companies add cloud services and deploy AI-driven tools.
© Dark Reading 2026
© Sector News
08.01.2026
Maximum Severity HPE OneView Flaw Exploited in the Wild
News Preview
Exploitation of CVE-2025-37164 can enable remote code execution on HPE's IT infrastructure management platform, leading to devastating consequences.
© Dark Reading 2026
© Sector News
08.01.2026
Fake AI Chrome Extensions Steal 900K Users' Data
News Preview
Threat actors ripped off a legitimate AI-powered Chrome extension in order to harvest ChatGPT and DeepSeek data before sending it to a C2 server.
© Dark Reading 2026
© Sector News
08.01.2026
ChatGPT's Memory Feature Supercharges Prompt Injection
News Preview
The "ZombieAgent" exploit makes use of ChatGPT's long-term memory and advanced capabilities.
© Dark Reading 2026
© Sector News
08.01.2026
Here's What Cloud Security's Future Holds for the Year Ahead
News Preview
Here are the top cloud security trends I'm seeing in my crystal ball for the New Year — particularly arming us for AI adoption.
© Dark Reading 2026
© Sector News
07.01.2026
Attackers Exploit Zero-Day in End-of-Life D-Link Routers
News Preview
Hackers are attacking a critical zero-day flaw in unsupported D-Link DSL routers to run arbitrary commands.
© Dark Reading 2026
© Sector News
07.01.2026
Phishers Exploit Office 365 Users Who Let Their Guard Down
News Preview
Microsoft said that Office 365 tenants with weak configurations and who don't have strict anti-spoofing protection enabled are especially vulnerable.
© Dark Reading 2026
© Sector News
07.01.2026
DDoSia Powers Affiliate-Driven Hacktivist Attacks
News Preview
Pro-Russian group NoName057(16) uses a custom denial-of-service tool to mobilize volunteers and disrupt government, media, and institutional sites tied to Ukraine and the West.
© Dark Reading 2026
© Sector News
07.01.2026
Cyberattacks Likely Part of Military Operation in Venezuela
News Preview
Cyber's role in the US raid on Venezuela remains a question, though President Trump alluded to "certain expertise" in shutting down the power grid in Caracas.
© Dark Reading 2026
© Sector News
07.01.2026
Lack of MFA Is Common Thread in Vast Cloud Credential Heist
News Preview
An emerging threat actor that goes by "Zestix" used an assortment of infostealers to obtain credentials and breach file-sharing instances of approximately 50 enterprises.
© Dark Reading 2026
© Sector News
06.01.2026
Scattered Lapsus$ Hunters Snared in Cyber Researcher Honeypot
News Preview
Scattered Lapsus$ Hunters, also known as ShinyHunters, were drawn in using a realistic, yet mostly fake, dataset.
© Dark Reading 2026
© Sector News
06.01.2026
ClickFix Campaign Serves Up Fake Blue Screen of Death
News Preview
Threat actors are using the social engineering technique and a legitimate Microsoft tool to deploy the DCRat remote access Trojan against targets in the hospitality sector.
© Dark Reading 2026
© Sector News
06.01.2026
Startup Trends Shaking Up Browsers, SOC Automation, AppSec
News Preview
These startups reimagined browser security, pioneered application security for AI-generated code, and are building consensus on agentic vs. human costs.
© Dark Reading 2026

Gamechanger im Online Marketing · Innovation as a service · Werden Sie schneller unabhängig. · Werten Sie Ihren eigenen Internetauftritt auf.

© 2026 Select Sector SPDRs

* * *

More Sector related Investment Ideas
© 2026 WEBs Investments ETFs
Über GICS Technologies
GICS Technologies ist Teil des Informationsportfolios GICS Eleven, dass sich primär auf Informationen börsennotierter Unternehmen aus dem Bereich der Informationstechnologie fokussiert.
Über GICS Eleven

GICS Eleven (G11, GICS11) bündelt themenspezifische Inhalte und ermöglicht durch seine Gate-Funktion den schnellen Zugriff auf relevante Informationen. Das Projekt orientiert sich dabei maßgeblich am Global Industry Classification Standard (GICS®), der von MSCI und Standard & Poor’s entwickelt wurde und der eine Gliederung in Sektoren ermöglicht. GICS® besteht aus 11 Sektoren, 24 Industrie-Zweigen, 69 Industrien and 158 Subindustrien.

GICS® ist eine eingetragene Marke von MSCI Inc. und S&P Dow Jones Indices.

Member of 3R/RSQ Network
Digital Content
Network Alliance
Transparency - Reliability - Credibility
Information regarding Product Information
Mittwoch, 11.02.2026, Calendar Week 07, 42. day of the year, 323 days remaining until EoY.