Key Market Indicator:
F&G: 49
25.199,75 NASDAQ · 50.295,00 DOW · 6.947,75 S&P · 5.062,82 Gold · 68,90 BRENT

Proteo Defence 365/24/7 
Security Audits · CyberCrime Forensics · R/G/W Teaming
Powerful app-Suite for Admins, Website operators, Research

Switch View
© Sector News
11.02.2026
[Virtual Event] Shields Up: Key Technologies Reshaping Cybersecurity Defenses
News Preview
© Dark Reading 2026
© Sector News
11.02.2026
CVE-2025-26399
News Preview
Currently trending CVE - Hype Score: 1 - SolarWinds Web Help Desk was found to be susceptible to an unauthenticated AjaxProxy deserialization remote code execution vulnerability that, if exploited, would allow an attacker to run commands on the host machine. This vulnerability is a patch bypass of CVE-2024-28988, which ...
© CVE Monitor 2026
© Sector News
11.02.2026
CVE-2025-68947
News Preview
Currently trending CVE - Hype Score: 34 - NSecsoft 'NSecKrnl' is a Windows driver that allows a local, authenticated attacker to terminate processes owned by other users, including SYSTEM and Protected Processes by issuing crafted IOCTL requests to the driver.
© CVE Monitor 2026
Worth to know
20.10.2025
Short Selling Radar

USA, Europe, Asia
Track Short Selling Activities worldwide
Knowing what matters
Leerverkaufsstatistiken, Hedge-Fund Aktivitäten und viele weitere nutzerwertige Informationen benutzerfreundlich aufbereitet
© Sector News
11.02.2026
CVE-2025-54068
News Preview
Currently trending CVE - Hype Score: 15 - Livewire is a full-stack framework for Laravel. In Livewire v3 up to and including v3.6.3, a vulnerability allows unauthenticated attackers to achieve remote command execution in specific scenarios. The issue stems from how certain component property updates are hydrated. This ...
© CVE Monitor 2026
Swarmalpha i/o · The Event Futures Prediction X
23.01.2026
© Sector News
11.02.2026
CVE-2025-34164
News Preview
Currently trending CVE - Hype Score: 1 - A heap-based buffer overflow vulnerability in NetSupport Manager 14.x versions prior to 14.12.0000 allows a remote, unauthenticated attacker to cause a denial of service (DoS) or potentially result in arbitrary code execution.
© CVE Monitor 2026
© Sector News
11.02.2026
CVE-2025-8088
News Preview
Currently trending CVE - Hype Score: 13 - A path traversal vulnerability affecting the Windows version of WinRAR allows the attackers to execute arbitrary code by crafting malicious archive files. This vulnerability was exploited in the wild and was discovered by Anton Cherepanov, Peter Košinár, and Peter Strýček ...
© CVE Monitor 2026
© Sector News
11.02.2026
CVE-2025-43300
News Preview
Currently trending CVE - Hype Score: 1 - An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in iOS 15.8.5 and iPadOS 15.8.5, iOS 16.7.12 and iPadOS 16.7.12. Processing a malicious image file may result in memory corruption. Apple is aware of a report that this issue may have ...
© CVE Monitor 2026
© Sector News
11.02.2026
CVE-2025-1974
News Preview
Currently trending CVE - Hype Score: 15 - A security issue was discovered in Kubernetes where under certain conditions, an unauthenticated attacker with access to the pod network can achieve arbitrary code execution in the context of the ingress-nginx controller. This can lead to disclosure of Secrets accessible to the ...
© CVE Monitor 2026
© Sector News
11.02.2026
CVE-2024-12356
News Preview
Currently trending CVE - Hype Score: 12 - A critical vulnerability has been discovered in Privileged Remote Access (PRA) and Remote Support (RS) products which can allow an unauthenticated attacker to inject commands that are run as a site user.
© CVE Monitor 2026
© Sector News
11.02.2026
CVE-2026-1731
News Preview
Currently trending CVE - Hype Score: 12 - BeyondTrust Remote Support (RS) and certain older versions of Privileged Remote Access (PRA) contain a critical pre-authentication remote code execution vulnerability. By sending specially crafted requests, an unauthenticated remote attacker may be able to execute operating ...
© CVE Monitor 2026
© Sector News
11.02.2026
CVE-2025-55182
News Preview
Currently trending CVE - Hype Score: 36 - A pre-authentication remote code execution vulnerability exists in React Server Components versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0 including the following packages: react-server-dom-parcel, react-server-dom-turbopack, and react-server-dom-webpack. The vulnerable code ...
© CVE Monitor 2026
© Sector News
11.02.2026
So bereiten sich Hersteller jetzt auf den Cyber Resilience Act vor
News Preview
Ab 11. Dezember 2027 verlangt der Cyber Resilience Act von Herstellern vernetzter Produkte Security by Design, verschlüsselte OTA-Updates, vollständige SBOMs und Incident-Meldungen binnen 24 Stunden. Wer jetzt die Updatefähigkeit professionalisiert, seine Lieferketten transparent macht und Incident-Response-Prozesse etabliert, vermeidet Marktaussch...
Cyber Security Insider year}
Advertisment
20.10.2025
© Sector News
11.02.2026
EU-Kommission will ENISA stärken
News Preview
Cyberbedrohungen werden immer ausgefeilter, Cybersecurity daher immer wichtiger. Die EU-Kommission hat einen Entwurf des überarbeiteten Cybersecurity Act (CSA) zur Beratung vorgelegt. Wird Cybersicherheit nun einfacher umzusetzen sein?
Cyber Security Insider year}
© Sector News
11.02.2026
Unter Exploit-Druck: Sechs aktiv ausgenutzte Schwachstellen
News Preview
Der Microsoft Patchday im Februar 2026 steht unter hohem An­grei­fer­in­ter­esse. Fünf Schwachstellen gelten als kritisch, der überwiegende Teil als wich­tig. Sechs Sicherheitslücken stehen zum Zeitpunkt der Veröffentlichung unter aktiver Ausnutzung, drei sind öffentlich bekannt. Diese Konstellation markiert eine deutliche Eskalation gegenüber dem ...
Cyber Security Insider year}
© Sector News
11.02.2026
Drei Kriterien für die Auswahl des passenden KI-Security-Tools
News Preview
Viele Unternehmen wählen KI-Security-Tools nach Funktionalität statt nach Kontext. Die Folge: Redundante Systeme erhöhen die Alarmmüdigkeit und Security-Teams verlieren den Überblick. Wer keine klaren Erfolgsmetriken definiert und AI-Governance-Anforderungen nicht prüft, riskiert ineffiziente Tool-Stacks ohne messbaren ROI.
Cyber Security Insider year}
© Sector News
11.02.2026
North Korea-Linked UNC1069 Uses AI Lures to Attack Cryptocurrency Organizations
News Preview
The North Korea-linked threat actor known as UNC1069 has been observed targeting the cryptocurrency sector to steal sensitive data from Windows and macOS systems with the ultimate goal of facilitating financial theft. "The intrusion relied on a social engineering scheme involving a compromised Telegram account, a fake Zoom meeting, a ClickFix infec...
© HackerNews 2026
© Sector News
11.02.2026
Rechtsstreit zwischen BSI und Kaspersky – Was steckt dahinter?
News Preview
BSI versus Kaspersky: Wer hat recht? Kaspersky könnte klagen, wenn das BSI weiterhin an seiner Warnung aus dem Jahr 2022 vor den Lösungen des Herstellers festhält. Ist die Warnung wirklich anfechtbar? Prof. Dr. Den­nis-Kenji Kipker beleuchtet die rechtlichen Aspekte und die Hin­ter­gründe im Kontext geopolitischer Spannungen.
Cyber Security Insider year}
© Sector News
11.02.2026
Microsoft releases Windows 11 26H1 for select and upcoming CPUs
News Preview
Microsoft has announced Windows 11 26H1, but it's not for existing PCs. Instead, it will ship on devices with Snapdragon X2 processors and possibly other rumored ARM chips.w [...]
© BleepingComputer 2026
© Sector News
11.02.2026
Asia Fumbles With Throttling Back Telnet Traffic in Region
News Preview
Only Taiwan made the top 10 list of governments, effectively blocking the threat-ridden protocol, but overall the region lagged in curbing Telnet traffic.
© Dark Reading 2026
© Sector News
11.02.2026
New Linux botnet SSHStalker uses old-school IRC for C2 comms
News Preview
A newly documented Linux botnet named SSHStalker is using the IRC (Internet Relay Chat) communication protocol for command-and-control (C2) operations. [...]
© BleepingComputer 2026
© Sector News
10.02.2026
North Korean hackers use new macOS malware in crypto-theft attacks
News Preview
North Korean hackers are running tailored campaigns using AI-generated video and the ClickFix technique to deliver malware for macOS and Windows to targets in the cryptocurrency sector. [...]
© BleepingComputer 2026
© Sector News
10.02.2026
SolarWinds WHD Attacks Highlight Risks of Exposed Apps
News Preview
Organizations that have exposed their instances of Web Help Desk to the public Internet have inadvertently made them prime targets for attackers.
© Dark Reading 2026
© Sector News
10.02.2026
Patch Tuesday, February 2026 Edition
News Preview
Microsoft today released updates to fix more than 50 security holes in its Windows operating systems and other software, including patches for a whopping six "zero-day" vulnerabilities that attackers are already exploiting in the wild.
© Krebs on Security 2026
© Sector News
10.02.2026
In Bypassing MFA, ZeroDayRAT Is 'Textbook Stalkerware'
News Preview
With access to SIM, location data, and a preview of recent SMSes, attackers have everything they need for account takeover or targeted social engineering.
© Dark Reading 2026
© Sector News
10.02.2026
Microsoft Patches 6 Actively Exploited Zero-Days
News Preview
Three of those zero-days are security feature bypass flaws, which give attackers a way to slip past built-in protections in multiple Microsoft products.
© Dark Reading 2026

Gamechanger im Online Marketing · Innovation as a service · Werden Sie schneller unabhängig. · Werten Sie Ihren eigenen Internetauftritt auf.

© 2026 Select Sector SPDRs

* * *

More Sector related Investment Ideas
© 2026 WEBs Investments ETFs
Über GICS Technologies
GICS Technologies ist Teil des Informationsportfolios GICS Eleven, dass sich primär auf Informationen börsennotierter Unternehmen aus dem Bereich der Informationstechnologie fokussiert.
Über GICS Eleven

GICS Eleven (G11, GICS11) bündelt themenspezifische Inhalte und ermöglicht durch seine Gate-Funktion den schnellen Zugriff auf relevante Informationen. Das Projekt orientiert sich dabei maßgeblich am Global Industry Classification Standard (GICS®), der von MSCI und Standard & Poor’s entwickelt wurde und der eine Gliederung in Sektoren ermöglicht. GICS® besteht aus 11 Sektoren, 24 Industrie-Zweigen, 69 Industrien and 158 Subindustrien.

GICS® ist eine eingetragene Marke von MSCI Inc. und S&P Dow Jones Indices.

Member of 3R/RSQ Network
Digital Content
Network Alliance
Transparency - Reliability - Credibility
Information regarding Product Information
Mittwoch, 11.02.2026, Calendar Week 07, 42. day of the year, 323 days remaining until EoY.