210 posts were published in the last hour
- 22:10 : Schon über 280 Millionen Angriffe: Diese Malware zielt auf Windows-User ab
- 22:9 : Kai Cenat Swatted on Live Twitch Stream
- 22:9 : AI Cybersecurity Firm Raises $100 Million to Strengthen National Security
- 22:9 : Your Android phone could have stalkerware — here’s how to remove it
- 21:32 : Penetration testing vs. vulnerability scanning: What’s the difference?
- 21:32 : What is Transport Layer Security (TLS)?
- 21:32 : Risk & Repeat: Salt Typhoon hasn’t stopped hacking
- 21:32 : How DataDome Automated Post-Mortem Creation with DomeScribe AI Agent
- 21:32 : How Page Protect Enabled Seamless PCI DSS 4.0 Compliance for a Leading Beverage Retailer
- 21:3 : New NailaoLocker Ransomware Attacking European Healthcare
- 21:3 : Ivanti Endpoint Manager Vulnerabilities Proof-of-Concept (PoC) Exploit Released
- 21:3 : SecTopRAT bundled in Chrome installer distributed via Google Ads
- 20:32 : The National Institute of Standards and Technology Braces for Mass Firings
- 20:32 : Stalkerware apps Cocospy and Spyic are exposing phone data of millions of people
- 20:32 : Hacked, leaked, exposed: Why you should never use stalkerware apps
- 20:32 : Your Android phone could have stalkerware. Here’s how to remove it
- 20:11 : Brazilian Judge Who Clashed With Elon Musk, Sued By Trump Firm
- 20:11 : Kata Containers: From Kubernetes Pods to Secure VMs
- 20:11 : Beware of North Korean Job Interview Process Delivers Malware Via Fake Chrome Update
- 20:5 : IT Security News Hourly Summary 2025-02-20 21h : 4 posts
- 19:9 : Efficiency? Security? When the quest for one grants neither.
- 19:9 : Nigeria Sues Binance For $81.5bn For Economic Losses, Back Tax
- 19:9 : OpenAI’s ChatGPT explodes to 400M weekly users, with GPT-5 on the way
- 19:9 : 9 ways to delete yourself from the internet (and hide your identity online)
- 18:32 : New FrigidStealer Malware Infects macOS via Fake Browser Updates
- 18:32 : PAN-PAN-PAN-OS: Palo Alto Firewalls Under Attack (Again)
- 18:5 : Bridging the Confidence Gap: Why Businesses Must Align Leadership and Cybersecurity for 2025
- 18:5 : EU Approves Germany’s €920m Aid For Infineon Plant
- 18:5 : Chinese Hackers Exploiting Check Point Firewall Vulnerability To Deploy Ransomware
- 18:4 : Microsoft is named a Leader in the 2025 Gartner® Magic Quadrant™ for cyber-physical systems protection platforms
- 17:32 : Quantum-Safe Encryption: Safeguarding Data for the Quantum Era
- 17:32 : Chinese APT Tools Found in Ransomware Schemes, Blurring Attribution Lines
- 17:32 : Zacks Investment Research Faces Another Data Breach Impacting 12 Million Accounts
- 17:32 : Vulnerability Summary for the Week of February 10, 2025
- 17:32 : Microsoft is named a Leader in the 2025 Gartner® Magic Quadrant™ for cyber-physical systems protection platforms
- 17:32 : Microsoft at Legalweek: Help safeguard your AI future with Microsoft Purview
- 17:13 : Locked Doors, Stolen Keys: How Infostealers Are Robbing iGaming Operators
- 17:13 : New Bookworm Malware Using SLL Sideloading Technique To Windows
- 17:13 : Hackers Delivering Malware Bundled with Fake Job Interview Challenges
- 17:13 : Ransomware Trends 2025 – What’s new
- 17:13 : PoC Exploit Released for Ivanti EPM Vulnerabilities
- 17:12 : Check Point Software to Open First Asia-Pacific R&D Centre in Bengaluru, India
- 17:12 : The cyber insurance reckoning: Why AI-powered attacks are breaking coverage (and what comes next)
- 17:12 : How Cisco’s AI defense stacks up against the cyber threats you never see
- 17:12 : AI vs. endpoint attacks: What security leaders must know to stay ahead
- 17:12 : Milliseconds to breach: How patch automation closes attackers’ fastest loophole
- 17:12 : Identity is the breaking point — get it right or zero trust fails
- 17:12 : FortiSandbox 5.0 Detects Evolving Snake Keylogger Variant
- 17:12 : US minerals company says crooks broke into email and helped themselves to $500K
- 17:12 : Microsoft is named a Leader in the 2025 Gartner® Magic Quadrant™ for cyber-physical systems protection platforms
- 17:5 : IT Security News Hourly Summary 2025-02-20 18h : 23 posts
- 16:34 : Elseta Vinci Protocol Analyzer
- 16:34 : Carrier Block Load
- 16:34 : ABB FLXEON Controllers
- 16:34 : Medixant RadiAnt DICOM Viewer
- 16:34 : ABB ASPECT-Enterprise, NEXUS, and MATRIX Series
- 16:34 : IBM OpenPages Vulnerability Let Attackers Steal Authentication Credentials
- 16:34 : Rhadamanthys Infostealer Exploiting Microsoft Management Console to Execute Malicious Script
- 16:34 : Free SOC Webinar – Better SOC with Interactive Malware Sandbox, Practical Use Cases 2025
- 16:34 : Mining Company NioCorp Loses $500,000 in BEC Hack
- 16:34 : TRAI Enforces Stricter Regulations to Combat Telemarketing Spam Calls
- 16:34 : Hackers Leak 8,500 Files from Lexipol, Exposing U.S. Police Training Manuals
- 16:34 : Android Latest Security Feature Protects Users from Cyber Scams
- 16:34 : Microsoft is named a Leader in the 2025 Gartner® Magic Quadrant™ for cyber-physical systems protection platforms
- 16:34 : Cybersecurity jobs available right now in the USA: February 20, 2025
- 16:33 : Malicious Ads Target Freelance Developers via GitHub
- 16:8 : Career Dreamer: Google bietet Berufsberatung mit KI-Support
- 16:8 : Algorithmen von Tiktok und X bevorzugen rechte Inhalte: Was die Plattformen dazu sagen
- 16:7 : Zero Day on Netflix explains well about the repercussions of a Cyber Attack
- 16:7 : Can’t quit Windows 10? You can pay Microsoft for updates after October, or try these alternatives
- 16:7 : California privacy regulator seeks to fine Florida data broker after huge breach of Social Security numbers
- 16:7 : NailaoLocker ransomware targets EU healthcare-related entities
- 16:7 : Google Docs used by infostealer ACRStealer as part of attack
- 16:7 : Microsoft is named a Leader in the 2025 Gartner® Magic Quadrant™ for cyber-physical systems protection platforms
- 15:33 : Wordfence Intelligence Weekly WordPress Vulnerability Report (February 10, 2025 to February 16 2025)
- 15:33 : Clinical Research Firm Exposes 1.6 Million US Medical Survey Records
- 15:33 : How CTEM Impacts Cyber Security Insurance Premiums?
- 15:32 : Microsoft is named a Leader in the 2025 Gartner® Magic Quadrant™ for cyber-physical systems protection platforms
- 15:32 : Mobile Phishing Attacks Surge with 16% of Incidents in US
- 15:32 : West Coast Cybersecurity Salaries Outshine Rest of Country
- 15:12 : Accelerate Your Business Success with Akamai Enhanced Partner Portal
- 15:12 : Responsible AI: The Critical Competitive Advantage of 2025
- 15:12 : Google Debuts AI Agent To Aid Scientists, Researchers
- 15:12 : What is a checksum?
- 15:12 : How Secure Are Gaming Transactions: Crypto, Credit Cards, and Wallet Apps Compared
- 15:12 : Critical flaws in Mongoose library expose MongoDB to data thieves, code execution
- 15:12 : Microsoft is named a Leader in the 2025 Gartner® Magic Quadrant™ for cyber-physical systems protection platforms
- 15:12 : PRevent: Open-source tool to detect malicious code in pull requests
- 15:12 : Runa Assure provides end-to-end fraud protection
- 14:33 : UK healthcare giant HCRG confirms hack after ransomware gang claims theft of sensitive data
- 14:33 : Sophisticated Phishing Attacks Targeting Decision-Makers Including CEOs and CTOs
- 14:33 : DeepSeek found to be sharing user data with TikTok parent company ByteDance
- 14:32 : AI Can Supercharge Productivity, But we Still Need a Human-in-the-Loop
- 14:32 : Cybersecurity Salaries Stay Competitive, Retention Challenges Persist
- 14:32 : Microsoft is named a Leader in the 2025 Gartner® Magic Quadrant™ for cyber-physical systems protection platforms
- 14:32 : China-Linked Attackers Exploit Check Point Flaw to Deploy ShadowPad and Ransomware
- 14:32 : North Korean Hackers Target Freelance Developers in Job Scam to Deploy Malware
- 14:6 : Golem Karrierewelt: Heute Webinar: Microsoft 365 Top-Security-Empfehlungen
- 14:5 : AI vs. AI – How Cybercriminals Are Weaponizing Generative AI, and What Security Leaders Must Do
- 14:5 : Voltron Data just partnered with Accenture to solve one of AI’s biggest headaches
- 14:5 : How Q-Day and Security Demands Are Fuelling Cloud Modernisation
- 14:5 : Atlassian Patches Critical Vulnerabilities in Confluence, Crowd
- 14:5 : CrowdStrike Charlotte AI Detection Triage Aims to Boost SOC Efficiency
- 14:5 : Microsoft is named a Leader in the 2025 Gartner® Magic Quadrant™ for cyber-physical systems protection platforms
- 14:5 : Over 330 Million Credentials Compromised by Infostealers
- 14:5 : IT Security News Hourly Summary 2025-02-20 15h : 15 posts
- 13:33 : [UPDATE] [hoch] Google Chrome: Mehrere Schwachstellen
- 13:32 : The Human Factor: How Eliminating Human Vulnerabilities Can Stop Social Engineering Fraud
- 13:32 : Rhadamanthys Infostealer Uses Microsoft Management Console to Spread Malware
- 13:32 : The Future of Sustainability | Bacteria, Meet the Internet of Things
- 13:32 : CISA, FBI Warn of China-Linked Ghost Ransomware Attacks
- 13:32 : Versa Networks’ Sovereign SASE Targets Nation-State Threats With On-Prem Architecture
- 13:32 : Microsoft is named a Leader in the 2025 Gartner® Magic Quadrant™ for cyber-physical systems protection platforms
- 13:8 : Weathering the storm: In the midst of a Typhoon
- 13:8 : Microsoft’s Quantum Chip Utilises New Matter State
- 13:8 : NVIDIA CUDA Toolkit Vulnerabilities Expose Systems to Potential DoS Attacks
- 13:7 : Hackers Drop NetSupport RAT & StealC Malware on Your Windows Via Fake Browser Updates
- 13:7 : Phishing Attack Exploit CEOs, CTOs, and Top Decision-Makers
- 13:7 : ShadowPad Malware Upgraded to Deliver Ransomware in Targeted Attacks
- 13:7 : Microsoft is named a Leader in the 2025 Gartner® Magic Quadrant™ for cyber-physical systems protection platforms
- 13:7 : Hackers Chain Exploits of Three Palo Alto Networks Firewall Flaws
- 12:32 : State of Secure Network Access 2025
- 12:32 : FBI and CISA Warn of Ghost Ransomware: A Threat to Firms Worldwide
- 12:32 : Google Ad-Tech Users Can Target National Security ‘Decision Makers’ and People With Chronic Diseases
- 12:32 : An LLM Trained to Create Backdoors in Code
- 12:32 : CyberStrong February Product Update
- 12:32 : Microsoft is named a Leader in the 2025 Gartner® Magic Quadrant™ for cyber-physical systems protection platforms
- 12:7 : CYBERSNACS # Folge 31: Wie cybersicher ist die Bundestagswahl 2025?
- 12:7 : Cisco Live 2025: AI Defense für sichere KI-Nutzung
- 12:7 : Verschlüsselte Chats: Russische Hacker bei Spionage über Signal erwischt
- 12:6 : Fedora Linux Kernel Flaw Exposed Sensitive Data to Attackers
- 12:6 : Microsoft fixed actively exploited flaw in Power Pages
- 12:6 : 8 Essential Steps for DORA Compliance and Effective Reporting
- 12:6 : New Zhong Malware Exploit AnyDesk Tool To Attack Fintech & Cryptocurrency
- 12:5 : Two arrested after pensioner scammed out of six-figure crypto nest egg
- 12:5 : PoC Exploit Published for Critical Ivanti EPM Vulnerabilities
- 12:5 : Microsoft is named a Leader in the 2025 Gartner® Magic Quadrant™ for cyber-physical systems protection platforms
- 12:5 : Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- 12:5 : Cybercriminals Use Eclipse Jarsigner to Deploy XLoader Malware via ZIP Archives
- 12:5 : Chinese-Linked Attackers Exploit Check Point Flaw to Deploy ShadowPad and Ransomware
- 12:5 : PCI DSS 4.0 Mandates DMARC By 31st March 2025
- 11:33 : Signal: Gefährliche Gruppeneinladungen vom Gegner
- 11:33 : Apple Touts ‘Most Affordable’ iPhone 16e
- 11:33 : IBM OpenPages Flaw Exposed Authentication Credentials to Attackers
- 11:33 : Multiple NVIDIA CUDA Toolkit Vulnerabilities Let Attackers Trigger DoS
- 11:32 : Fedora Linux Kernel Vulnerability Let Attackers Gain Access to Sensitive Data
- 11:32 : US Military Health Provider HNFS Pays $11M in Settlement Over Cybersecurity Failures
- 11:32 : Microsoft is named a Leader in the 2025 Gartner® Magic Quadrant™ for cyber-physical systems protection platforms
- 11:12 : Microsoft: Attacken auf Power Pages, Bing abgesichert
- 11:11 : Privacy-Tablet: Murena bietet Pixel-Tablet ohne Google an
- 11:9 : Stately Taurus Activity in Southeast Asia Links to Bookworm Malware
- 11:9 : AWS Key Hunter: An Automated Solution for Exposed Key Detection
- 11:9 : The Bleeding Edge of Phishing: darcula-suite 3.0 Enables DIY Phishing of Any Brand
- 11:9 : How One AI Startup Founder Cornered Microsoft Into Finally Taking Down Explicit Videos of Her
- 11:9 : Citrix addressed NetScaler console privilege escalation flaw
- 11:9 : Microsoft Patches Exploited Power Pages Vulnerability
- 11:9 : Microsoft is named a Leader in the 2025 Gartner® Magic Quadrant™ for cyber-physical systems protection platforms
- 11:5 : IT Security News Hourly Summary 2025-02-20 12h : 16 posts
- 10:34 : Surf ausprobiert: Flipboards neue App macht Mastodon und Bluesky zum Vergnügen
- 10:34 : Mobilfunkempfang im Zug: Wie die Deutsche Bahn das Problem endgültig lösen will
- 10:33 : Verdächtige 15 bis 20 Jahre alt: Razzia in Köln nach SMS-Betrug und Geldwäsche
- 10:33 : NSA Adds Innovative Features to Ghidra 11.3 Release
- 10:33 : Cybersecurity for Electricity Distribution [2025 Update]
- 10:32 : AWS Key Hunter – A Free Automated Tool to Detect Exposed AWS keys
- 10:32 : Microsoft Admin Technical Guide to Block & Remove Apps on Endpoints
- 10:32 : APT-C-28 Group Launched New Cyber Attack With Fileless RokRat Malware
- 10:32 : Microsoft Power Pages 0-Day Vulnerability Exploited in the Wild
- 10:32 : Microsoft is named a Leader in the 2025 Gartner® Magic Quadrant™ for cyber-physical systems protection platforms
- 10:32 : Microsoft’s End of Support for Exchange 2016 and 2019: What IT Teams Must Do Now
- 10:6 : ISO-Schreibprogramm: Tails warnt vor balenaEtcher
- 10:6 : [NEU] [mittel] Cisco AsyncOS für Secure Email Gateway : Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen
- 10:6 : [NEU] [mittel] Wireshark: Schwachstelle ermöglicht Denial of Service
- 10:5 : Microsoft is named a Leader in the 2025 Gartner® Magic Quadrant™ for cyber-physical systems protection platforms
- 10:5 : Hackers pose as employers to steal crypto, login credentials
- 10:5 : CISA and FBI Warn of Global Threat from Ghost Ransomware
- 9:33 : Cyber threats impacting the financial sector in 2024 – focus on the main actors
- 9:33 : Updated Shadowpad Malware Leads to Ransomware Deployment
- 9:33 : Microsoft is named a Leader in the 2025 Gartner® Magic Quadrant™ for cyber-physical systems protection platforms
- 9:33 : Privacera enables enterprises to identify, assess, and remediate AI-related risks
- 9:10 : Marktübersicht Perimeter: Schutz beginnt am Zaun
- 9:9 : Ghost Ransomware Compromised Organisations Across 70+ Countries – CISA & FBI Warns
- 9:9 : NSA Added New Features to Supercharge Ghidra 11.3
- 9:9 : Symantec Diagnostic Tool Vulnerability Let Attackers Escalate Privileges
- 9:9 : Ghost ransomware crew continues to haunt IT depts with scarily bad infosec
- 9:9 : Microsoft is named a Leader in the 2025 Gartner® Magic Quadrant™ for cyber-physical systems protection platforms
- 9:9 : Norton’s AI-powered features defend against scams and social engineering threats
- 8:33 : Betrug im Supermarkt: Angreifer klauen Rewe-Kunden ihre Bonuspunkte
- 8:32 : CISA & FBI Warns that Ghost Ransomware Hits Over 70 Organizations
- 8:32 : Microsoft is named a Leader in the 2025 Gartner® Magic Quadrant™ for cyber-physical systems protection platforms
- 8:32 : 1Password helps MSPs boost security and streamline their operations
- 8:32 : Signal conversations hacked, Ransomware group hits infrastructure, Patch Palo Alto flaw
- 8:32 : Two Vulnerabilities Compromised OpenSSH Safety: Cyber Security Today for February 20, 2025
- 8:11 : Symantec Diagnostic Tool Flaw Enables Unauthorized Privilege Escalation
- 8:11 : Aqara’s first outdoor camera is this smart home enthusiast’s dream device – here’s why
- 8:11 : Managed detection and response in 2024
- 8:11 : Medusa ransomware gang demands $2M from UK private health services provider
- 8:11 : AI is Making the Dark Web Even Darker
- 8:11 : Microsoft is named a Leader in the 2025 Gartner® Magic Quadrant™ for cyber-physical systems protection platforms
- 8:5 : IT Security News Hourly Summary 2025-02-20 09h : 6 posts
- 7:32 : CISA and FBI Issue Alert as Ghost Ransomware Targets 70+ Organizations
- 7:32 : Microsoft is named a Leader in the 2025 Gartner® Magic Quadrant™ for cyber-physical systems protection platforms
- 7:32 : Lumu Playback strengthens threat detection
- 7:8 : Citrix Netscaler ermöglicht Rechteausweitung
- 7:7 : Palo Alto Networks warns that CVE-2025-0111 flaw is actively exploited in attacks
- 7:7 : Microsoft is named a Leader in the 2025 Gartner® Magic Quadrant™ for cyber-physical systems protection platforms
- 6:32 : Windows Disk Cleanup Tool Exploit Allows SYSTEM Privilege Escalation
- 6:32 : Inside a LockBit Ransomware Attack: A Firsthand Account of Financial and Security Fallout
- 6:32 : Microsoft is named a Leader in the 2025 Gartner® Magic Quadrant™ for cyber-physical systems protection platforms
- 6:7 : Citrix NetScaler Vulnerability Exposes Systems to Unauthorized Commands
- 6:7 : Microsoft is named a Leader in the 2025 Gartner® Magic Quadrant™ for cyber-physical systems protection platforms