210 posts were published in the last hour
- 22:55 : IT Security News Daily Summary 2025-01-19
- 22:36 : Hackers Claim Breach of Hewlett Packard Enterprise, Lists Data for Sale
- 22:13 : Security Affairs newsletter Round 507 by Pierluigi Paganini – INTERNATIONAL EDITION
- 22:13 : SECURITY AFFAIRS MALWARE NEWSLETTER – ROUND 29
- 21:32 : Allianz Risk Barometer Cites “Cyber Risk” as Most Important Business Risk Globally
- 21:7 : Breaking Down Biden’s Latest Executive Order: Expert Analysis and Perspectives
- 20:38 : Quorum Cyber Continues Expansion in North America with Kivu Consulting Acquisition
- 20:18 : The Bouncer at the Door: Protecting Your Network from Within
- 20:18 : A flaw in the W3 Total Cache plugin exposes hundreds of thousands of WordPress sites to attacks
- 20:5 : IT Security News Hourly Summary 2025-01-19 21h : 1 posts
- 19:11 : OpenAI’s ChatGPT crawler can be tricked into DDoSing sites, answering your queries
- 17:7 : Legends of Music: Celebrating the Greatest Artists Across Generations Compilation
- 17:7 : DEF CON 32 – Exposing The Occultations In Large Off-Grid Solar Systems
- 17:5 : IT Security News Hourly Summary 2025-01-19 18h : 1 posts
- 16:7 : Employees of failed startups are at special risk of stolen personal data through old Google logins
- 15:18 : How to Use AI in Cyber Deception
- 15:18 : Emerging Allegations of Chinese Espionage Targeting US Treasury
- 15:18 : Hackers Breach Telefónica’s internal Ticketing System, Stealing 2.3GB of Sensitive Data
- 15:18 : Privacy Expert Urges Policy Overhaul to Combat Data Brokers’ Practices
- 14:35 : KI statt Kanzler? Drei Zukunftsszenarien für künstliche Intelligenz in der Politik
- 14:35 : Donald Trump und die Techbranche: Warum es eine klare europäische Antwort braucht
- 14:5 : IT Security News Hourly Summary 2025-01-19 15h : 1 posts
- 13:15 : How To Privacy-Proof the Coming AI Wave
- 9:33 : Behörde stärkt Sicherheitssysteme: Hohe Hürden gegen Hacker bei Bundestagswahl
- 9:18 : Week in review: AWS S3 data encrypted without ransomware, data of 15k Fortinet firewalls leaked
- 8:18 : Keine Bewegung, kein Social Media: Diese App entsperrt deine Profile erst nach Aktivität
- 8:18 : Computing und KI: Die Trends in 2025
- 8:5 : IT Security News Hourly Summary 2025-01-19 09h : 3 posts
- 7:36 : How Secure Is Your PAM Strategy?
- 7:36 : Proactively Managing Cloud Identities to Prevent Breaches
- 7:36 : Confident Cybersecurity: Essentials for Every Business
- 6:37 : Anzeige: Microsoft-365-Administration einfach erklärt
- 6:16 : How to Get Around the US TikTok Ban
- 6:15 : TikTok Goes Dark in the U.S. as Federal Ban Takes Effect January 19, 2025
- 3:13 : Zero Trust and Entra ID Conditional Access, (Sun, Jan 19th)
- 23:5 : IT Security News Hourly Summary 2025-01-19 00h : 1 posts
- 22:55 : IT Security News Daily Summary 2025-01-18
- 21:22 : You need a router-based VPN in 2025. Here’s why and how to set one up
- 20:16 : Ingenieur baut KI-Waffe mit ChatGPT – OpenAI greift sofort durch
- 20:16 : Apple Intelligence: Eigene KI-Ingenieure hatten vor Fehlern gewarnt
- 20:16 : Star Blizzard: Russische Hackergruppe greift Whatsapp-Konten von Regierungsbeamten an
- 20:15 : U.S. Treasury Sanctions Chinese cybersecurity firm and actor over federal agency breach tied to Salt Typhoon
- 17:39 : DEF CON 32 – Breaking Boundaries: Popping Shells In The Airgap With $10 & Arduino Magic
- 17:39 : Encryption Key Breach Sparks Concerns Over Cybersecurity
- 17:39 : Cyberattack Disrupts NCLT Virtual Hearings Twice in One Week
- 17:11 : Hackers Exploit Microsoft Teams for Phishing and Malware Attacks
- 17:11 : Understanding Dark Web Data Risks and Protecting Your Information
- 15:34 : You need a router-based VPN in 2025. How why and how to set one up
- 15:34 : DOJ confirms arrested US Army soldier is linked to AT&T and Verizon hacks
- 15:13 : How To Fight Scattered Spider Impersonating Calls to The IT Help Desk
- 14:37 : Sicher und günstig: Scrypted macht deine Überwachungskamera Apple Home kompatibel
- 14:5 : IT Security News Hourly Summary 2025-01-18 15h : 1 posts
- 13:11 : How Government Agencies Can Level the Cybersecurity Playing Field With AI/ML
- 12:35 : Deutschland auf Platz 5: 17.000 Linux-Server anfällig für kritische Rsync-Lücke
- 12:11 : US Names One of the Hackers Allegedly Behind Massive Salt Typhoon Breaches
- 12:11 : How victims of PowerSchool’s data breach helped each other investigate ‘massive’ hack
- 12:11 : Treasury Levels Sanctions Tied to a Massive Hack of Telecom Companies and Breach of Its Own Network
- 11:37 : Suchmaschine: Google-Suche funktioniert nur noch mit Javascript
- 11:12 : 24H2: Microsoft drängt Nutzern Update auf neues Windows 11 auf
- 11:11 : TikTok Says It Will ‘Go Dark’ Unless It Gets Clarity From Biden Following Supreme Court Ruling
- 11:5 : IT Security News Hourly Summary 2025-01-18 12h : 1 posts
- 10:11 : Trump’s Digital Footprint: Unveiling Malicious Campaigns Amid Political Milestones
- 9:12 : heise-Angebot: iX-Workshop: Webanwendungen absichern mit OWASP® Top 10
- 9:11 : Otelier – 436,855 breached accounts
- 9:11 : Social Media Fraud Targets Truth Social: Cyber Security Today Weekend with Netcraft’s Robert Duncan – Jan 18, 2025
- 8:39 : Whatsapp: Diese 4 neuen Funktionen müsst ihr unbedingt kennen
- 8:39 : KI-Nostalgie: Llama 2 Sprachmodell meistert den Betrieb auf einem Windows 98 Rechner
- 8:11 : Paxton: Vertriebsleiter Bernd Rehorn geht in den Ruhestand
- 6:33 : Anzeige: IT-Sicherheitsbewusstsein stärken für Sysadmins
- 6:32 : How Imperva Protects the Arts Industry from Ticketing Abuse by Carding Bots
- 6:32 : U.S. Sanctions Chinese Cybersecurity Firm Over Treasury Hack Tied to Silk Typhoon
- 6:11 : Hackers Easily Bypass Active Directory Group Policy to Allow Vulnerable NTLMv1 Auth Protocol
- 6:11 : A Brief Guide for Dealing with ‘Humanless SOC’ Idiots
- 5:36 : Under the cloak of UEFI Secure Boot: Introducing CVE-2024-7344
- 5:36 : UEFI Secure Boot: Not so secure?
- 5:11 : New tool: immutable.py, (Sat, Jan 18th)
- 5:5 : IT Security News Hourly Summary 2025-01-18 06h : 1 posts
- 4:11 : How Can Generative AI be Used in Cybersecurity
- 2:11 : Bitcoin’s Prospects in 2025: Exploring Opportunities and Mitigate Risks
- 23:32 : The Comprehensive Guide to Understanding Grok AI: Architecture, Applications, and Implications
- 23:32 : DEF CON 32 – Bypass 101
- 23:32 : GUEST ESSAY: President Biden’s cybersecurity executive order is an issue of national security
- 23:11 : FCC to telcos: By law you must secure your networks from foreign spies. Get on it
- 23:5 : IT Security News Hourly Summary 2025-01-18 00h : 5 posts
- 22:55 : IT Security News Daily Summary 2025-01-17
- 22:36 : EU privacy non-profit group filed complaints against TikTok, SHEIN, AliExpress, and other Chinese companies
- 22:36 : FCC to telcos: Did you know you must by law secure your networks from foreign spies?
- 22:11 : FCC to telcos: Did you know by law you must secure your networks from foreign spies?
- 22:11 : Week in Review: IRS PIN available, AI ransomware group, UK ransomware ban
- 21:11 : Securing DOT Infrastructure
- 20:35 : US-Gericht bestätigt Tiktok-Verbot – was das bedeutet
- 20:35 : Freie ChatGPT-Alternative ausprobiert: Diese App bringt eine lokale KI auf euer iPhone
- 20:35 : MatterGen: Microsofts neue KI soll Materialien der Zukunft erschaffen
- 20:34 : Biden signs sweeping cybersecurity order, just in time for Trump to gut it
- 20:5 : IT Security News Hourly Summary 2025-01-17 21h : 5 posts
- 19:12 : Adopt passkeys over passwords to improve UX, drive revenue
- 19:12 : The FCC’s Jessica Rosenworcel Isn’t Leaving Without a Fight
- 19:12 : VPNs Are Not a Solution to Age Verification Laws
- 19:12 : Fortinet: FortiGate config leaks are genuine but misleading
- 19:11 : The Good, the Bad, and the Politics of Biden’s Cybersecurity Order
- 18:34 : This is HUGE: Biden’s Cybersecurity Exec. Order — Big Parting Gift to Trump
- 18:11 : Defending Democracy: The #PROTECT2024 Chapter in Election Infrastructure Security
- 18:11 : CISA and FBI Release Updated Guidance on Product Security Bad Practices
- 18:11 : Best 8 Endpoint Protection Software
- 17:37 : Malware stole internal PowerSchool passwords from engineer’s hacked computer
- 17:37 : Treasury sanctions Salt Typhoon hacking group behind breaches of major US telecom firms
- 17:36 : Clock ticking for TikTok as US Supreme Court upholds ban
- 17:36 : US Government Agencies Call for Closing the Software Understanding Gap
- 17:36 : Cohesity Extends Services Reach to Incident Response Platforms
- 17:11 : EU Deepens Investigation Into Elon Musk’s X
- 17:11 : Why Clearing Cache and Cookies Matters for Safe Browsing
- 17:11 : Introducing Jon Ericson
- 17:5 : IT Security News Hourly Summary 2025-01-17 18h : 10 posts
- 16:36 : Open Banking Shortcomings Threaten UK Global Leadership Position Research Finds
- 16:36 : WhatsApp spear phishing campaign uses QR codes to add device
- 16:36 : Wolf Haldenstein Data Breach Impacts 3.4 Million People
- 16:36 : US Supreme Court Gives Green Light to TikTok Ban
- 16:12 : Microsoft exposes WhatsApp Spear Phishing Campaign of Star Blizzard
- 16:12 : Supreme Court Rules TikTok Can Be Banned in US
- 16:12 : EFF Statement on U.S. Supreme Court’s Decision to Uphold TikTok Ban
- 16:12 : Mad at Meta? Don’t Let Them Collect and Monetize Your Personal Data
- 16:12 : Six vulnerabilities in ubiquitous rsync tool announced and fixed in a day
- 16:12 : Tarbomb Denial of Service via Path Traversal
- 15:33 : Check Point Heads to Davos 2025 to Discuss Advancing Cyber Security and Digital Trust in an Era of GenAI and Disinformation
- 15:33 : U.S. CISA adds Aviatrix Controllers vulnerability to its Known Exploited Vulnerabilities catalog
- 15:33 : Global Apps Exploited to Harvest Sensitive Location Data
- 15:33 : Three Russian Nationals Charged with Money Laundering via Crypto-Mixing Services
- 15:32 : Play Ransomware Threat Intensifies with State-Sponsored Links and Advanced Tactics
- 15:32 : Malicious GitHub PoC Exploit Spreads Infostealer Malware
- 15:32 : How Russian hackers went after NGOs’ WhatsApp accounts
- 15:32 : Lazarus Group Targets Developers in New Data Theft Campaign
- 15:11 : Growing Enterprise Data is Creating Big Cybersecurity Risk
- 15:11 : Critical Flaws in WGS-804HPT Switches Enable RCE and Network Exploitation
- 14:40 : Apple stellt KI-generierte Nachrichtenzusammenfassungen vorerst ein
- 14:39 : Wie Film-KI lernt, mit dem Nichtsichtbaren umzugehen
- 14:39 : In diesen vier Punkten werden KI-Agenten 2025 noch besser – laut Anthropic-Mitgründer Kaplan
- 14:39 : Selfie-Sticker und Kamera-Effekte: Neue Features sollen Whatsapp noch kreativer machen
- 14:39 : X: EU-Kommission fordert interne Dokumente von Elon Musks Kurznachrichtendienst
- 14:39 : Bitwarden als native App für Android verfügbar
- 14:38 : Threat Brief: CVE-2025-0282 and CVE-2025-0283 (Updated Jan. 17)
- 14:38 : California Wildfires Spark Phishing Scams Exploiting Chaos
- 14:11 : DNS Silently Powers the Internet
- 14:11 : Apple Suspends AI-Generated News Notifications After Errors
- 14:11 : Python-Based Bots Exploiting PHP Servers Fuel Gambling Platform Proliferation
- 14:5 : IT Security News Hourly Summary 2025-01-17 15h : 8 posts
- 13:33 : AWS Warns of Multiple Vulnerabilities in Amazon WorkSpaces, Amazon AppStream 2.0, & Amazon DCV
- 13:33 : MikroTik Botnet Exploits SPF Misconfigurations to Spread Malware
- 13:33 : Yahoo Japan Enforces DMARC Adoption for Users in 2025
- 13:12 : Vertrauensdiensteanbieter D-Trust informiert über Datenschutzvorfall
- 13:12 : heise-Angebot: iX-Workshop: E-Rechnungspflicht – Anpassung von Faktura- und ERP-Software
- 13:12 : Forscher warnen vor UEFI-Bootkits: Mit sieben Tools an Secure Boot vorbei
- 13:12 : [UPDATE] [hoch] Rsync: Mehrere Schwachstellen
- 13:11 : Exploring the Vishing Threat Landscape
- 12:37 : Why Many New AI Tools Aren’t Available In Europe – And How To Access Them
- 12:37 : Social Engineering to Disable iMessage Protections
- 12:37 : Google Releases Open Source Library for Software Composition Analysis
- 12:37 : Star Blizzard Targets WhatsApp in New Campaign
- 12:11 : How to Negotiate Your NIS2 Fine or Completely Avoid the Risk
- 12:11 : U.S. Sanctions North Korean IT Worker Network Supporting WMD Programs
- 12:11 : New ‘Sneaky 2FA’ Phishing Kit Targets Microsoft 365 Accounts with 2FA Code Bypass
- 12:11 : How to Bring Zero Trust to Wi-Fi Security with a Cloud-based Captive Portal?
- 11:37 : Partnerangebot: KonzeptAcht GmbH – „Risikomanagement mit dem Tool MONARC“
- 11:36 : ESET detailed a flaw that could allow a bypass of the Secure Boot in UEFI systems
- 11:36 : US Announces Sanctions Against North Korean Fake IT Worker Network
- 11:13 : Daten von rund 250.000 MSI-Kunden bei Have I Been Pwned
- 11:12 : (g+) Brandolinis Gesetz: Bullshit ist schwerer widerlegt als gesagt
- 11:12 : [NEU] [niedrig] ffmpeg: Schwachstelle ermöglicht Offenlegung von Informationen
- 11:12 : New Tool Unveiled to Scan Hacking Content on Telegram
- 11:12 : FlowerStorm PaaS Platform Attacking Microsoft Users With Fake Login Pages
- 11:11 : Industry Reactions to Biden’s Cybersecurity Executive Order: Feedback Friday
- 11:11 : 1touch.io’s SaaS offering delivers enterprise-grade security
- 11:11 : Noyb Files GDPR Complaints Against TikTok and Five Chinese Tech Giants
- 11:5 : IT Security News Hourly Summary 2025-01-17 12h : 13 posts
- 10:35 : [NEU] [mittel] IBM InfoSphere Information Server: Schwachstelle ermöglicht Offenlegung von Informationen
- 10:34 : Medusa ransomware group claims attack on UK’s Gateshead Council
- 10:34 : How Much of Your Business is Exposed on the Dark Web?
- 10:13 : Nvidia Treiber: Mehrere Schwachstellen
- 10:13 : D-Trust: Cyberangriff trifft Trustcenter der Bundesdruckerei
- 10:13 : [NEU] [mittel] Golang Go: Mehrere Schwachstellen
- 10:13 : [NEU] [mittel] Nvidia Treiber: Mehrere Schwachstellen
- 10:13 : [NEU] [niedrig] Canonical Snap: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen
- 10:12 : Researchers Warn of NTLMv1 Bypass in Active Directory Policy
- 10:12 : Mercedes-Benz Head Unit security research report
- 10:12 : Security Concerns Complicate Multi-Cloud Adoption Strategies
- 10:11 : Dynatrace reduces time-consuming compliance configuration checks associated with DORA
- 10:11 : DORA Takes Effect: Financial Firms Still Navigating Compliance Headwinds
- 9:36 : [UPDATE] [mittel] Linux Kernel: Schwachstelle ermöglicht Privilegieneskalation
- 9:36 : [UPDATE] [hoch] Python: Schwachstelle ermöglicht Denial of Service
- 9:36 : [UPDATE] [hoch] Apache Commons: Schwachstelle ermöglicht Codeausführung
- 9:36 : [UPDATE] [mittel] GIMP: Schwachstelle ermöglicht Denial of Service
- 9:36 : [UPDATE] [hoch] GIMP: Schwachstelle ermöglicht Denial of Service
- 9:34 : State of Network Threat Detection 2024 Report
- 9:34 : IoT Botnet Linked to Large-scale DDoS Attacks Since the End of 2024
- 9:34 : Cybersecurity Breaches Degrade Consumer Trust, but Apathy Rises
- 9:34 : Bitwarden unveils native mobile applications for iOS and Android
- 9:12 : Krypto-Betrug: Seed-Phrasen, die öffentlich geteilt werden | Offizieller Blog von Kaspersky
- 9:12 : Microsoft löscht Beitrag: Upgrade auf Windows 11 bleibt doch kostenlos
- 9:11 : PoC Exploit Released for Ivanti Connect Secure RCE Vulnerability
- 8:33 : Tiktok-Verbot in den USA: Gnadenfrist könnte für Aufschub sorgen
- 8:33 : 3D-LiDAR gegen Falschalarme
- 8:33 : Online-Kriminalität: 2024 wieder Millionenschäden in Niedersachsen
- 8:32 : Microsoft eggheads say AI can never be made secure – after testing Redmond’s own products
- 8:32 : Biden EO, Star Blizzard Using WhatsApp, Healthcare Breaches
- 8:32 : Hackers Target Microsoft 365 With Hight Speed Attack: Cyber Security Today for January 17, 2025
- 8:5 : IT Security News Hourly Summary 2025-01-17 09h : 4 posts
- 8:0 : WordPress-Plug-in W3 Total Cache: Potenziell 1 Millionen Websites attackierbar
- 7:38 : Bug Bounty Bonanza: $40,000 Reward for Escalating Limited Path Traversal to RCE
- 7:38 : Let’s Encrypt Unveils Six-Day Certificate and IP Address Options for 2025
- 7:38 : DORA Comes into Force: Experts Weigh In on Its Impact and Opportunities
- 6:39 : Anzeige: CEH-Zertifizierung für umfassendes Wissen in Ethical Hacking