184 posts were published in the last hour
- 21:32 : Slack is becoming an AI workplace: Here’s what that means for your job
- 21:32 : How to use the Hydra password-cracking tool
- 21:32 : Threat actors are attempting to exploit Apache Struts vulnerability CVE-2024-53677
- 21:32 : Ground Rule of Cyber Hygiene: Keep Your Password Policy Up to Date
- 21:5 : Hackers stole the details of 58,000 people from a Bitcoin ATM operator
- 21:5 : US may ban world’s most popular routers and modems – what that means for you
- 21:5 : Congress Again Fails to Limit Scope of Spy Powers in New Defense Bill
- 21:5 : US reportedly mulls TP-Link router ban over national security risk
- 21:5 : AWS named Leader in the 2024 ISG Provider Lens report for Sovereign Cloud Infrastructure Services (EU)
- 20:32 : Detection engineering at scale: one step closer (part one)
- 20:32 : Salesforce drops Agentforce 2.0, brings reasoning AI to enterprise
- 20:32 : Tracker firm Hapn spilling names of thousands of GPS tracking customers
- 20:32 : Managing Risks: Executive Protection in the Digital Age
- 20:6 : Wie weit KI-Tools wirklich gehen: Studie enthüllt die Strategien von OpenAI und Co.
- 20:6 : Neue Preise für Lightroom und Photoshop: Wer für Adobes Foto-Abo bald mehr zahlen muss
- 20:5 : FBI Warns of HiatusRAT Malware Targeting Webcams and DVRs
- 20:5 : IT Security News Hourly Summary 2024-12-18 21h : 2 posts
- 19:5 : Maximizing Productivity with Online Document Solutions
- 19:5 : What You Should Know When Joining Bluesky
- 18:32 : 5 Signs You’ve Built a Secretly Bad Architecture (And How to Fix It)
- 18:8 : EFF Statement on U.S. Supreme Court’s Decision to Consider TikTok Ban
- 18:8 : Australia Banning Kids from Social Media Does More Harm Than Good
- 18:8 : Microsoft won’t let customers opt out of passkey push
- 17:32 : This $1 phone scanner app can detect Pegasus spyware. Here’s how
- 17:32 : Speaking Freely: Winnie Kabintie
- 17:32 : DEF CON 32 – Feet Feud (Another Fascinating DEF CON Game Show)
- 17:8 : A Path to Enhanced Security and NIS2 Compliance
- 17:8 : The Birth of Zero Trust: A Paradigm Shift in Security
- 17:8 : QRadar vs Splunk (2024): SIEM Tool Comparison
- 17:8 : How the ransomware attack at Change Healthcare went down: A timeline
- 17:8 : New Advances in the Understanding of Prime Numbers
- 17:8 : “Can the Government Read My Text Messages?”
- 17:7 : Bureau Raises $30M to Tackle Deepfakes, Payment Fraud
- 17:5 : IT Security News Hourly Summary 2024-12-18 18h : 11 posts
- 16:33 : Anzeige: Smarte Sicherheitskamera bei Amazon zum halben Preis
- 16:32 : Securing Remote OT Operations: Building a Resilient Framework for the Connected Age
- 16:32 : Silicon UK: AI for Your Business Podcast: Enhancing Your Workforce with AI
- 16:32 : Nebraska sues Change Healthcare over security failings that led to medical data breach of over 100 million Americans
- 16:32 : Pallet liquidation scams and how to recognize them
- 16:5 : Cloud Security Report 2024
- 16:5 : Hackers Exploiting Linux eBPF to Spread Malware in Ongoing Campaign
- 16:5 : CISA Adds Four Known Exploited Vulnerabilities to Catalog
- 16:5 : CISA Releases Best Practice Guidance for Mobile Communications
- 16:5 : Boffins trick AI model into giving up its secrets
- 16:5 : HubPhish Exploits HubSpot Tools to Target 20,000 European Users for Credential Theft
- 15:32 : IntelBroker released data related to Cisco stolen from Cloud Instance
- 15:32 : Hackers Exploit Linux eBPF Tech to Host Malware on GitHub and Blogs
- 15:32 : Recorded Future Tagged as ‘Undesirable’ in Russia
- 15:32 : US Government Issues Cloud Security Requirements for Federal Agencies
- 15:8 : Phishing-Masche nimmt Nutzer von Google-Kalender ins Visier
- 15:7 : The open-source tools that could disrupt the entire IT incident management market
- 15:7 : Video: Hackers Bypass TSA Security with SQL Injection
- 15:7 : Rhode Island Residents Warned of Cyberattack Targeting State Government
- 15:7 : Ymir Ransomware: A Rising Threat in the Cybersecurity Landscape
- 15:7 : Malware Found Preinstalled on 30,000 Android Devices in Germany
- 15:7 : Google Warns Users About Privacy Risks Posed by Certain Android Apps
- 14:33 : DSGVO-Verstoß: Netflix soll 4,75 Millionen Euro Strafe zahlen
- 14:32 : The Benefits of Serverless Computing Architecture
- 14:32 : AI-generated malvertising “white pages” are fooling detection engines
- 14:32 : Phishing Attacks Double in 2024
- 14:5 : IT Security News Hourly Summary 2024-12-18 15h : 24 posts
- 14:4 : Apple gibt Look-Around auch für alle ohne iPhone frei: Wie gut ist die Alternative zu Google Street View?
- 14:4 : Outlook nervt Windows-User mit Login-Fehler: Wie ihr das Problem bis zu einem Fix umgehen könnt
- 14:4 : Der Traum vom Ganzkörper-Avatar: Die Technologie ist beeindruckend, wirft aber auch Fragen auf
- 14:4 : Fürs papierlose Büro: Diese Funktion in Google Drive kann dir jetzt besser helfen
- 14:4 : Welchen verschlüsselte Cloud-Speicher soll ich wählen? | Offizieller Blog von Kaspersky
- 14:3 : Cybersecurity Trends on the Horizon Across APAC for 2025 and Beyond
- 14:3 : A new playground: Malicious campaigns proliferate from VSCode to npm
- 14:3 : New Attacks Exploit VSCode Extensions and npm Packages
- 13:32 : The Need for Specialized AI Models in Today’s Transforming Industry Challenges
- 13:32 : New VIPKeyLogger Via Weaponized Office Documenrs Steals Login Credentials
- 13:32 : How to Lose a Fortune with Just One Bad Click
- 13:32 : Top 7 Patch Management Alternatives for Action1
- 13:9 : Weiterer Krypto-Diebstahl: Lastpass-Hacker erbeuten an nur zwei Tagen Millionen
- 13:9 : [UPDATE] [hoch] bluez: Schwachstelle ermöglicht Codeausführung
- 13:8 : [UPDATE] [hoch] Splunk Enterprise: Mehrere Schwachstellen
- 13:8 : [UPDATE] [mittel] Red Hat Enterprise Linux (BlueZ): Schwachstelle ermöglicht Denial of Service
- 13:8 : Androxgh0st Botnet Targets IoT Devices, Exploiting 27 Vulnerabilities
- 13:8 : How SASE Addresses Enterprise Network Challenges
- 13:7 : Cybersecurity At the Crossroads: The Role Of Private Companies In Safeguarding U.S. Critical Infrastructure
- 13:7 : Regional Care Data Breach Impacts 225,000 People
- 13:7 : Bitcoin Hits $100,000 for the First Time Amid Market Volatility
- 13:7 : ONLY Cynet Delivers 100% Protection and 100% Detection Visibility in the 2024 MITRE ATT&CK Evaluation
- 13:7 : APT29 Hackers Target High-Value Victims Using Rogue RDP Servers and PyRDP
- 13:7 : Not Your Old ActiveState: Introducing our End-to-End OS Platform
- 12:33 : Sonicwall: Zehntausende Firewalls haben kritische Sicherheitslücken
- 12:33 : Nach Facebook-Hack: Meta muss 251 Millionen Euro Bußgeld zahlen
- 12:33 : INTERPOL Urges to End ‘Pig Butchering’ & Replaces With “Romance Baiting”
- 12:32 : Attacker Distributes DarkGate Using MS Teams Vishing Technique
- 12:6 : [NEU] [mittel] Keycloak: Schwachstelle ermöglicht Offenlegung von Informationen
- 12:6 : [NEU] [niedrig] HCL BigFix: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen
- 12:6 : [NEU] [mittel] Liferay Liferay DXP: Mehrere Schwachstellen ermöglichen Cross-Site Scripting
- 12:6 : [NEU] [hoch] Apache Tomcat: Mehrere Schwachstellen
- 12:6 : [UPDATE] [mittel] GStreamer: Mehrere Schwachstellen ermöglichen Denial of Service
- 12:5 : Salt Security and CrowdStrike Extend Partnership for enhanced API Security
- 12:5 : CISA Issues Binding Operational Directive for Improved Cloud Security
- 12:5 : European companies hit with effective DocuSign-themed phishing emails
- 11:34 : Forscher warnen: Zehntausende von Sonicwall-Firewalls sind angreifbar
- 11:34 : [NEU] [mittel] Xen: Mehrere Schwachstellen
- 11:34 : [NEU] [mittel] Linux Kernel: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen
- 11:34 : [NEU] [niedrig] IBM Security Guardium: Mehrere Schwachstellen ermöglichen die Offenlegung von Informationen
- 11:33 : [NEU] [mittel] IBM FileNet und Content Manager: Mehrere Schwachstellen
- 11:33 : [NEU] [mittel] Elasticsearch: Schwachstelle ermöglicht Offenlegung von Informationen
- 11:32 : Synopsys, SiMa.ai To Collaborate On AI Car Chips
- 11:32 : SoftBank Promises To Invest $100bn In US
- 11:32 : New I2PRAT Malware Using encrypted peer-to-peer communication to Evade Detections
- 11:32 : BeyondTrust Patches Critical Vulnerability Discovered During Security Incident Probe
- 11:32 : Nigeria Cracks Down on Cryptocurrency Investment Fraud and Romance Scams
- 11:5 : IT Security News Hourly Summary 2024-12-18 12h : 11 posts
- 11:3 : AI Regulation Gets Serious in 2025 – Is Your Organization Ready?
- 10:34 : Jetzt patchen! Angreifer nutzen kritische Sicherheitslücke in Apache Struts aus
- 10:34 : Windows-Sicherheitslösung Trend Micro Apex One als Einfallstor für Angreifer
- 10:34 : [UPDATE] [mittel] IBM Java: Mehrere Schwachstellen
- 10:33 : Databricks Raises $10bn In Huge AI Funding Round
- 10:33 : AI Start-Up Basis Raises $34m For Accountancy Agent
- 10:33 : Earth Koshchei Employs RDP Relay, Rogue RDP server in Server Attacks
- 10:33 : Irish Data Protection Commission (DPC) fined Meta €251 million for a 2018 data breach
- 10:33 : Analysis of Cyber Anarchy Squad attacks targeting Russian and Belarusian organizations
- 10:33 : The Biggest Data Breaches of 2024
- 10:32 : Meta Hit with Massive $263m GDPR Fine
- 10:3 : 1-Click RCE Attack In Kerio Control UTM Allow Attackers Gain Firewall Root Access Remotely
- 10:3 : RiseLoader Attack Windows By Employed A VMProtect To Drop Multiple Malware Families
- 10:3 : Careto – A legendary Threat Group Targets Windows By Deploy Microphone Recorder And Steal Files
- 10:3 : BeyondTrust fixes critical vulnerability in remote access, support solutions (CVE-2024-12356)
- 10:3 : INTERPOL Pushes for “Romance Baiting” to Replace “Pig Butchering” in Scam Discourse
- 9:34 : China Chip Growth Slows As US Targets Legacy Chips
- 9:34 : EU Opens TikTok Probe Over Election Interference Claims
- 9:33 : Congo Files Complaints Against Apple Over Conflict Minerals
- 9:33 : Cybercriminals Exploit Google Calendar and Drawings in Phishing Campaigns
- 9:33 : Google’s New XRefer Tool To Analyze More Complex Malware Samples
- 9:33 : Azure Data Factory And Apache Airflow Integration Flaws Let Attackers Gain Write Access
- 9:33 : CIS Control 08: Audit Log Management
- 9:33 : Managing NERC CIP Patching Process With Tripwire Enterprise and Tripwire State Analyzer
- 9:33 : The Mask APT is back after 10 years of silence
- 9:33 : Hacker Leaks Cisco Data
- 9:33 : The Biggest Risks of AI Apps, Agents and Copilots – and How to Combat Them
- 9:33 : Appdome protects applications running on mobile-enabled platforms
- 9:33 : European Commission Opens TikTok Election Integrity Probe
- 9:6 : Foxit PDF Editor und Reader: Attacken über präparierte PDF-Dateien möglich
- 9:6 : Messaging-Dienst greift durch: Telegram sperrt 15 Millionen Gruppen und Kanäle
- 9:6 : [UPDATE] [mittel] VMware Tanzu Spring Framework: Mehrere Schwachstellen
- 8:33 : Effective Phishing Campaign Targeting European Companies and Institutions
- 8:33 : 5 Reasons to Create a Certificate Lifecycle Management Policy for the New Year
- 8:33 : 4 Ways To Unleash Speed and Efficiency in the SOC
- 8:33 : GitGuardian launches multi-vault integration to combat secrets sprawl
- 8:33 : Stairwell Core boosts threat intelligence for security teams
- 8:33 : CISA cloud directive, Texas Tech breach, Meta GDPR fine
- 8:33 : Blackberry Sells Cylance To Arctic Wolf At Huge Loss: Cyber Security Today for Wednesday, December 18, 2024
- 8:8 : Apples gibt Look Around auch für alle ohne iPhone frei: Wie gut ist die Alternative zu Google Street View?
- 8:8 : PROTECTOR-Jahresrückblick 2024
- 8:8 : “Passwort” Folge 21: Von Zug(p)ferden, Cyber-Gangstern und Passwort-Policies
- 8:7 : Spring Framework Path Traversal Vulnerability (CVE-2024-38819) PoC Exploit Released
- 8:7 : Multiple SHARP Routers Vulnerabilities Let Attackers Execute Arbitrary Code
- 8:7 : The Complete Guide: How to Create an Endpoint Detection and Response (EDR) Strategy
- 8:7 : CrowdStrike Allies With Salt Security to Improve API Security
- 8:5 : IT Security News Hourly Summary 2024-12-18 09h : 2 posts
- 7:33 : Synology stopft hochriskantes Leck im Media Server
- 7:32 : Hackers Attacking Linux SSH Servers DDoS Bot cShell Using Screen & hping3 Tools
- 7:2 : How to Prevent Cyber Threats in the Chemical Sector
- 6:32 : Ransomware attacks on Texas University and Namibia Telecom
- 6:32 : CISA Releases Secure Practices for Microsoft 365 Cloud Services
- 6:32 : Data Sovereignty in a Cloud-Driven World is not a Given
- 6:32 : Patch Alert: Critical Apache Struts Flaw Found, Exploitation Attempts Detected
- 6:32 : Meta Fined €251 Million for 2018 Data Breach Impacting 29 Million Accounts
- 6:8 : Digitaler Geldverkehr: Tipps für die eigene Sicherheit
- 6:8 : Anzeige: Microsoft Copilot für mehr Effizienz in Unternehmensabläufen
- 6:7 : These Six Innovations Have the Potential to Transform Cybersecurity in 2025
- 6:7 : CISO accountability: Navigating a landscape of responsibility
- 5:32 : Key steps to scaling automated compliance while maintaining security
- 5:5 : Securing Your SaaS: How AppOmni Mitigates SaaS Risks and Protects Data
- 5:5 : Securing SaaS – Lessons, Trends, and Strategies for 2025 with Guest Forrester
- 5:5 : IT Security News Hourly Summary 2024-12-18 06h : 1 posts
- 4:32 : Vanir: Open-source security patch validation for Android
- 4:4 : Consumers wrongly attribute all data breaches to cybercriminals
- 2:5 : IT Security News Hourly Summary 2024-12-18 03h : 2 posts
- 2:2 : ISC Stormcast For Wednesday, December 18th, 2024 https://isc.sans.edu/podcastdetail/9260, (Wed, Dec 18th)
- 1:32 : Liebe und Kryptoreichtum: 800 Betrüger in Lagos verhaftet
- 1:4 : Phishers cast wide net with spoofed Google Calendar invites
- 1:4 : DEF CON 32 – HookChain A New Perspective For Bypassing EDR Solutions
- 0:7 : [Guest Diary] A Deep Dive into TeamTNT and Spinning YARN, (Wed, Dec 18th)
- 0:7 : Interpol wants everyone to stop saying ‘pig butchering’
- 0:7 : Facebook Owner Hit With 251 Million Euros in Fines for 2018 Data Breach
- 23:32 : LDAP Enumeration: Unveiling the Double-Edged Sword of Active Directory
- 23:5 : IT Security News Hourly Summary 2024-12-18 00h : 4 posts