210 posts were published in the last hour
- 22:32 : Black Basta ransomware gang hit BT Group
- 22:32 : Location Tracking Tools Endanger Abortion Access. Lawmakers Must Act Now.
- 22:5 : Jobangebot am Telefon? Das LKA Niedersachen warnt vor neuer Whatsapp-Masche
- 22:5 : Google nimmt Änderung an Android-Sicherheitsmaßnahme vor: Warum das einige Nutzer verärgern dürfte
- 22:5 : IT Security News Hourly Summary 2024-12-04 23h : 7 posts
- 22:4 : OpenAI inks deal to upgrade Anduril’s anti-drone tech
- 22:4 : It’s the Senate’s last chance to pass the PRESS Act
- 21:32 : Microsoft Announces Security Update with Windows Resiliency Initiative
- 21:32 : Authorities shut down Crimenetwork, the Germany’s largest crime marketplace
- 21:7 : API Security in Open Banking: Balancing Innovation with Risk Management
- 21:7 : Sharing your Max password? That’s about to get more difficult
- 21:5 : IT Security News Hourly Summary 2024-12-04 22h : 2 posts
- 20:34 : National Public Data Shuts Down Months After Massive Breach
- 20:5 : IT Security News Hourly Summary 2024-12-04 21h : 4 posts
- 19:36 : Meta Looks To Nuclear Energy For US Data Centres
- 19:36 : Are We on the Brink of Saying Goodbye to Passwords?
- 19:36 : Deloitte UK Hacked – Brain Cipher Group Claim to Have Stolen 1 TB of Data
- 19:36 : Nikesh Arora on Mad Money
- 19:5 : IT Security News Hourly Summary 2024-12-04 20h : 12 posts
- 19:2 : Senators say US military is failing to secure its phones from foreign spies
- 19:2 : Fortinet’s Secure-by-Design Commitments: Making Measurable Progress in Cybersecurity
- 19:2 : Veeam Warns of Critical Vulnerability in Service Provider Console
- 18:41 : Critical Veeam Vulnerabilities Allow Remote Code Execution – Update Now
- 18:41 : Video: Salt Typhoon Hacks Major Telecom Giants Using Malware
- 18:41 : CISA Releases New Public Version of CDM Data Model Document
- 18:41 : Printer Problems? Don’t Fall for These Dangerous Scams
- 18:7 : CMA Delays Cloud Computing Report Until 2025
- 18:7 : How to protect against malware as a service
- 18:7 : Spy v Spy: Russian APT Turla Caught Stealing From Pakistani APT
- 18:7 : Russia-Linked Turla Exploits Pakistani Hackers’ Servers to Target Afghan and Indian Entities
- 18:7 : Ransomware Costs Manufacturing Sector $17bn in Downtime
- 18:5 : IT Security News Hourly Summary 2024-12-04 19h : 15 posts
- 17:34 : Resilient by Design: Akamai?s Data-Driven Path to Climate Adaptation
- 17:34 : FBI, CISA urge Americans to use secure messaging apps in wake of massive cyberattack
- 17:34 : Senators say U.S. military is failing to secure its phones from foreign spies
- 17:34 : Wirral Hospital Recovery Continues One Week After Cyber Incident
- 17:34 : FTC Safeguards US Consumers from Location Data Misuse
- 17:10 : Vorsicht vor Whatsapp-Phishing mit gespoofter Rufnummer
- 17:9 : (QR) Coding My Way Out of Here: C2 in Browser Isolation Environments
- 17:9 : NHS Ransomware Attack: Russian INC Ransom Gang Steals Patient Data
- 17:9 : Are Long-Lived Credentials the New Achilles’ Heel for Cloud Security?
- 17:9 : Senators Warn the Pentagon: Get a Handle on China’s Telecom Hacking
- 17:9 : CISA, FBI urge Americans to use encrypted messaging apps to combat Chinese telco hackers
- 17:9 : Preparing for 2025 Cybersecurity Warnings
- 17:9 : Spy v Spy: Russian APT Turla Caught Stealing from Pakistani APT
- 17:9 : China is Still Inside US Networks — It’s Been SIX Months
- 17:5 : IT Security News Hourly Summary 2024-12-04 18h : 18 posts
- 16:37 : Intel Approaches Ex Board Member Lip-Bu Tan, Others As CEO Replacement
- 16:37 : Weaponized Word Documents Attacking Windows Users to Deliver NetSupport & BurnsRAT
- 16:37 : Hackers Exploit Docker Remote API Servers To Inject Gafgyt Malware
- 16:37 : Cloudflare Developer Domains Abused For Cyber Attacks
- 16:37 : CISA Adds One Known Exploited Vulnerability to Catalog
- 16:37 : US government says Chinese hackers are still lurking in American phone networks
- 16:37 : Veeam addressed critical Service Provider Console (VSPC) bug
- 16:37 : How to Become the Company Top Cyber Talent Wants to Join
- 16:37 : Poor mobile security practices rife at SMEs, CyberSmart survey finds
- 16:37 : Crypto’s rising value likely to bring new wave of scams
- 16:36 : Liverpool Children’s Hospital Confirms Cyber-Attack
- 16:8 : Cybersicherheitstrends im Finanzsektor
- 16:7 : Crypto and Cybersecurity: How to Keep Your Cryptocurrency Safe in 2025
- 16:7 : How to recover from a DDoS attack
- 16:7 : She Was a Russian Socialite and Influencer. Cops Say She’s a Crypto Laundering Kingpin
- 16:7 : UnitedHealthcare CEO Brian Thompson shot and killed in New York
- 16:7 : How CSPs are Adapting to the Threat Landscape and Meeting new Cybersecurity Challenges
- 16:7 : Solana’s popular web3.js library backdoored in supply chain compromise
- 16:5 : IT Security News Hourly Summary 2024-12-04 17h : 10 posts
- 15:36 : Für den Mac braucht man kein Virenprogramm? Dieser Sicherheitsheitsreport sagt etwas anderes
- 15:36 : Studie zeigt: Ein einziger Parameter kann KI-Modelle komplett lahmlegen
- 15:36 : Whatsapp: Neue Funktion soll Facebook- und Instagram-Nutzern die Arbeit erleichtern
- 15:36 : Amazon stellt gleich 6 neue KI-Modelle vor: Was ihr jetzt zu Nova wissen müsst
- 15:36 : Gemini bringt Sprachbefehle zu Spotify: So funktioniert die Integration
- 15:34 : Satellite receivers enriched with DDoS Attack functionality led to CEO Arrests
- 15:34 : The Road to Agentic AI: Exposed Foundations
- 15:34 : Celsius Founder Alex Mashinsky Pleads Guilty To Fraud
- 15:34 : Cops arrest suspected admin of German-language crime bazaar
- 15:5 : IT Security News Hourly Summary 2024-12-04 16h : 61 posts
- 15:0 : Podcast ‘Update verfügbar’: #49 – Alarmstufe Rot für private Daten – Schutz vor Identitätsdiebstahl
- 15:0 : Williams Racing schützt Daten mit Zero-Trust-Sicherheitslösung
- 15:0 : Schutzschirm: Secure Access Hub, Gateway, Micro-Gateway und IAM
- 15:0 : Forescout: Bedrohungslandschaft wird komplexer und vielschichtiger
- 15:0 : Cequence: Hacker nehmen APIs zunehmend ins Visier
- 15:0 : Samsung Android: Mehrere Schwachstellen
- 15:0 : Android Patchday Dezember 2024: Mehrere Schwachstellen
- 15:0 : Google Chrome: Schwachstelle ermöglicht Codeausführung
- 15:0 : Synology Router Manager: Schwachstelle ermöglicht Manipulation von Dateien
- 15:0 : Whatsapp-Aus für ältere iPhones: Erfahre, ob du betroffen bist
- 15:0 : PDF-to-Brainrot und Sludge-Content: Funktioniert das Lernen im Tiktok-Format?
- 15:0 : Schluss mit Daten-Showdown: Warum Wrapped, Recap & Co. nerven – ein Rant
- 15:0 : Das sind die besten WordPress-Plugins – laut Analyse von 140.000 Websites
- 15:0 : Windows 11 auf nicht unterstützen Computern installieren: Microsoft gibt jetzt selbst Tipps
- 14:59 : Alter Schatz unter neuem Schutz
- 14:59 : Übersicht: Die aktuellen Tarifverträge in der Sicherheitsbranche
- 14:59 : Quantum Readiness: Cybersicherheit 2025 im Fokus
- 14:59 : Advancis stärkt Marktposition mit Keensight
- 14:59 : Divers identifziert
- 14:59 : Bekannter Cyberkrimineller angeklagt, Darknet-Händler müssen ins Arbeitslager
- 14:59 : Jetzt patchen! Exploit für kritische Lücke in Whatsup Gold in Umlauf
- 14:59 : Malware auf dem Mac: Sicherheitsforscher warnen vor neuen Trends
- 14:59 : l+f: Ransomware legt Wodka-Hersteller trocken
- 14:59 : Veeam Service Provider Console: Kritische Lücke gefährdet Kunden-Backups
- 14:59 : Darknet-Marktplatz: Betreiber von Hydra Market erhält in Russland lebenslänglich
- 14:59 : BKA gegen Crimenetwork: Schlag gegen große illegale Internetplattform
- 14:59 : Anzeige: Profi-VPN mit Split-Tunneling zum Sparpreis
- 14:59 : Von Kriminellen genutzt: Behörden zerschlagen verschlüsselten Chat-Dienst Matrix
- 14:59 : Nach Zwist mit Russland: Cyberangriff drängt Wodkahersteller in die Insolvenz
- 14:59 : [NEU] [mittel] Dell BSAFE: Schwachstelle ermöglicht nicht spezifizierten Angriff
- 14:59 : [NEU] [mittel] Aruba ClearPass Policy Manager: Mehrere Schwachstellen
- 14:59 : [UPDATE] [hoch] PostgreSQL: Mehrere Schwachstellen
- 14:59 : [UPDATE] [hoch] X.Org X11 und Xming: Schwachstelle ermöglicht Privilegieneskalation
- 14:59 : [UPDATE] [mittel] IBM App Connect Enterprise: Schwachstelle ermöglicht Denial of Service
- 14:58 : The Dark Side of Viral Content: How Negative Reviews Can Snowball
- 14:57 : US Chips ‘No Longer Safe’, Chinese Industry Bodies Claim
- 14:57 : Telegram Joins Child Safety Scheme
- 14:57 : Authorities Take Down Criminal Encrypted Messaging Platform MATRIX
- 14:57 : Cisco Urges Immediate Patch for Decade-Old WebVPN Vulnerability
- 14:57 : New TLDs Such as .shop, .top and .xyz Leveraged by Phishers
- 14:57 : Ecosystem Security: The State of Puebla’s Success Story
- 14:57 : From Trust to Technology: The Cyber Security Pillar of Modern Banking
- 14:57 : How to Implement Zero Trust: Best Practices and Guidelines
- 14:57 : CISA, FBI Issue Guidance for Securing Communications Infrastructure
- 14:57 : U.S. Offered $10M for Hacker Just Arrested by Russia
- 14:57 : A New Phone Scanner That Detects Spyware Has Already Found 7 Pegasus Infections
- 14:57 : Tuskira unifies and optimizes disparate cybersecurity tools
- 14:57 : Linux Foundation report highlights the true state of open-source libraries in production apps
- 14:57 : Business leaders among Pegasus spyware victims, says security firm
- 14:57 : Ransomware hackers target NHS hospitals with new cyberattacks
- 14:57 : AI and the 2024 Elections
- 14:57 : How widespread is mercenary spyware?
- 14:57 : Microsoft says premature patch could make Windows Recall forget how to work
- 14:56 : Tuskira Scores $28.5M for AI-Powered Security Mesh
- 14:56 : Chinese-Made LiDAR Systems a National Security Risk, Think Tank Says
- 14:56 : DeepMind Pushes AI Frontiers with Human-Like Tech
- 14:56 : Orbit Under Siege: The Cybersecurity Challenges of Space Missions
- 14:56 : Understanding Mimic Ransomware: Features, Threats, and Noteworthy Exploits
- 14:56 : Meet Chameleon: An AI-Powered Privacy Solution for Face Recognition
- 14:56 : How widespread is mercenary spyware? More than you think
- 14:56 : Security Risks Persist in Open Source Ecosystem
- 13:5 : IT Security News Hourly Summary 2024-12-04 14h : 5 posts
- 13:2 : Product showcase: Securing Active Directory passwords with Specops Password Policy
- 13:2 : ENISA Launches First State of EU Cybersecurity Report
- 12:53 : 7 PAM Best Practices to Secure Hybrid and Multi-Cloud Environments
- 12:53 : Europol Dismantles Criminal Messaging Service MATRIX in Major Global Takedown
- 12:5 : IT Security News Hourly Summary 2024-12-04 13h : 155 posts
- 11:37 : PoC exploit for critical WhatsUp Gold RCE vulnerability released (CVE-2024-8785)
- 11:18 : Credential Guard and Kerberos delegation, (Mon, Dec 2nd)
- 11:18 : ISC Stormcast For Tuesday, December 3rd, 2024 https://isc.sans.edu/podcastdetail/9238, (Tue, Dec 3rd)
- 11:18 : Extracting Files Embedded Inside Word Documents, (Tue, Dec 3rd)
- 11:18 : Data Analysis: The Unsung Hero of Cybersecurity Expertise [Guest Diary], (Wed, Dec 4th)
- 11:18 : ISC Stormcast For Wednesday, December 4th, 2024 https://isc.sans.edu/podcastdetail/9240, (Wed, Dec 4th)
- 11:18 : Implementing blocklists in the Sekoia SOC platform
- 11:18 : The Curious Case of an Egg-Cellent Resume
- 11:18 : The Shift to the Edge Continues to Accelerate
- 11:18 : Battling the Emotional Toxicity Within Games: How to Digitally Thrive
- 11:18 : The Year in Review 2024: Today?s Insights, Tomorrow?s Outlook
- 11:18 : Threat Assessment: Howling Scorpius (Akira Ransomware)
- 11:18 : CISA, NSA, FBI and International Partners Publish Guide for Protecting Communications Infrastructure
- 11:18 : UK Ministry of Defense MoD passwords leaked on Dark Web
- 11:18 : How Data Backups Turn Vital in Ransomware Scenarios
- 11:18 : Apple espionage on its employees iPhones and iCloud accounts
- 11:17 : Stoli bankruptcy with ransomware, malware distribution via resume and Kash Patel Trump Cyber Attack
- 11:17 : Can Failing to Log Out from Online Accounts Pose a Cybersecurity Threat?
- 11:17 : What Is a Security Operations Center (SOC)?
- 11:17 : Zero Trust Architecture
- 11:17 : Top Christmas Gifts: Must-Have Devices and Protection Accessories!
- 11:17 : RomCom Exploits Zero Days In Recent Backdoor Campaigns
- 11:17 : Anti-Spam WordPress Plugin Vulnerabilities Risked 200K+ Websites
- 11:17 : Sweet Security Introduces Evolutionary Leap in Cloud Detection and Response, Releasing First Unified Detection & Response Platform
- 11:17 : NachoVPN Attack Risks Corporate VPN Clients
- 11:17 : Gafgyt Malware Broadens Its Scope in Recent Attacks
- 11:17 : Gafgyt Malware Targeting Docker Remote API Servers
- 11:17 : US Announces New Export Controls On China’s Chip Sector
- 11:17 : China Bans Exports Of Gallium, Germanium, Antimony
- 11:17 : Elon Musk $56 Billion Pay Deal Rejected, Again
- 11:17 : Microsoft Faces £1 Billion Lawsuit For Alleged Overcharging
- 11:17 : UK Underestimates Threat Of Cyber-Attacks, Says NCSC Head
- 11:17 : The Ultimate Guide to Designing a Logo Online: Tools, Tips, and Tricks
- 11:17 : Data Vigilante Leaks 772K Employee Records from Top Firms and 12.3M-Row Database
- 11:16 : Dark Web Hydra Market Mastermind Sentenced to Life by Russia
- 11:16 : The Role of Salesforce Implementation in Digital Transformation
- 11:16 : 15 SpyLoan Apps Found on Play Store Targeting Millions
- 11:16 : PEFT-As-An-Attack, Jailbreaking Language Models For Malicious Prompts
- 11:16 : CISA Releases Advisory to Monitor Networks to Detect Malicious Cyber Actors
- 11:16 : MobSF XSS Vulnerability Let Attackers Inject Malicious Scripts
- 11:16 : Progress WhatsUp Gold RCE Vulnerability – PoC Exploit Released
- 11:16 : Google Chrome Security Update, Patch for High-severity Vulnerability
- 11:16 : Updated TIC 3.0 Security Capabilities Catalog (SCC) to v3.2
- 11:16 : ESET Flags UEFI Bootkit Targeting Linux Systems
- 11:16 : SpyLoan Malware Infects 8 Million Android Users
- 11:16 : Why Cloudways is Perfect Hosting Solution for Your Businesses
- 11:16 : Cyber Risk – How to effectively manage fourth-party risks
- 11:16 : Cohere’s Rerank 3.5 is here, and it’s about to change enterprise search forever
- 11:16 : I recommend the Blink Mini 2 security camera over the Wyze Cam (and it’s only $30 right now)
- 11:16 : LastPass adds passkey support for free and premium users
- 11:16 : Flipper Zero goes retro with this cool limited-edition transparent version
- 11:15 : I deleted thousands of tweets from X with this new tool – for free
- 11:15 : FTC says AI company Evolv ‘falsely hyped’ its security scanners
- 11:15 : Diversity Can Be a Powerful Tool in Combating Increasing Cybersecurity Threats
- 11:15 : Avoiding Pitfalls in Vulnerability Management: Key Insights and Best Practices
- 11:15 : CIS Control 10: Malware Defenses
- 11:15 : Tripwire Patch Priority Index for November 2024
- 11:14 : Tech Support Scams Exploit Google Ads to Target Users
- 11:14 : TechRepublic Premium Editorial Calendar: Policies, Hiring Kits, and Glossaries for Download
- 11:14 : Top 5 Cyber Security Trends for 2025
- 11:14 : Bitwarden Review (2024): Is It a Secure Password Manager?
- 11:14 : TorGuard VPN Review: The Good, the Bad, and the Ugly
- 11:14 : Over 600,000 Personal Records Exposed by Data Broker
- 11:14 : How to monitor network traffic in 7 steps
- 11:14 : What is Cisco Certified Internetwork Expert (CCIE) certification?
- 11:14 : Ransomware attacks on critical sectors ramped up in November
- 11:14 : Why Phishers Love New TLDs Like .shop, .top and .xyz