62 posts were published in the last hour
- 21:32 : What are the cost implications of maintaining NHI compliance?
- 21:32 : What best practices ensure long-term compliance for NHIs?
- 21:32 : How can technology simplify the process of NHI compliance?
- 20:5 : IT Security News Hourly Summary 2025-03-29 21h : 4 posts
- 19:13 : Twitter (X) Hit by 2.8 Billion Profile Data Leak in Alleged Insider Job
- 19:13 : “Crocodilus” A New Malware Targeting Android Devices for Full Takeover
- 19:13 : Gamaredon Hackers Weaponize LNK Files to Deliver Remcos Backdoor
- 19:13 : BSidesLV24 – IATC – Time Is Up. You Have Three Years, 3 Months, 3 Weeks, To Protect Your Stuff. What Do You Do?
- 18:39 : Künstliche Intelligenz auf dem Prüfstand: AGI-Test deckt Schwächen aktueller KI-Modelle auf
- 18:39 : Google Maps-Zeitachse gelöscht: Dieser Trick könnte eure verlorenen Daten retten
- 18:39 : Dr. Google im Wandel: Sind KI-Tools tatsächlich nützlich für Gesundheitsberatung?
- 18:38 : FBI and DOJ seize $8.2 Million in romance baiting crypto fraud scheme
- 18:38 : CISA Warns of ESURGE Malware Exploiting Ivanti RCE Vulnerability
- 18:38 : Lotus Blossom APT Exploits WMI for Post-Exploitation Activities
- 17:33 : Datenleck: 1,5 Millionen private Fotos von Dating-Apps für LGBTQ+ enthüllt
- 17:32 : Experts warn of the new sophisticate Crocodilus mobile banking Trojan
- 17:7 : Don’t make this USB mistake! Protect your data with this discounted encrypted gadget
- 17:6 : Frankenstein Scam: Here’s How to Safeguard Yourself Against Synthetic Identity Fraud
- 17:5 : IT Security News Hourly Summary 2025-03-29 18h : 2 posts
- 16:7 : BSI-Studie: Zahlreiche Schwachstellen in Krankenhausinformationssystemen
- 16:6 : Ransomware Found in VSCode Extensions Raises Concerns Over Microsoft’s Security Review
- 15:32 : Twitter (X) Hit by Data Leak of 2.8 Billion Users; Allegedly an Insider Job
- 15:32 : Babuk Locker 2.0 vs Seceon Platform: MITRE ATT&CK Mapping and Early-Stage Detection & Remediation
- 15:9 : Evolution Of Cyber Threats: Why Attack Surface Management Is Critical Today
- 15:9 : X (Twitter) Largest Data Breach Ever? 2.8 Billion User Info Leaked
- 14:32 : Beware the “Dream Vacation” Nightmare: Unmasking Travel Package Spam and Protecting Yourself
- 14:5 : IT Security News Hourly Summary 2025-03-29 15h : 7 posts
- 13:39 : Cybersicherheit: Kriminelle wollten Arbeitslosengeld erbeuten
- 13:38 : News alert: SquareX discloses nasty browser-native ransomware that’s undetectable by antivirus
- 13:5 : ChatGPT wird höflicher: OpenAI optimiert KI-Konversationen für bessere User-Erfahrung
- 13:5 : „Unsere GPUs schmelzen“: OpenAI bremst Bildgenerierung in ChatGPT
- 13:5 : Installation aus der Hölle: Wie ich Linux auf meinem Mac einrichten wollte – und dazu Windows brauchte
- 13:5 : E-Mails verfassen leichtgemacht: Gmails Gemini lernt Deutsch, Italienisch und Französisch
- 13:5 : WWDC 2025: Apple verspricht spannende Software-Neuheiten – iOS 19 und macOS 16 im Fokus
- 13:4 : Why Eliminating the Cyber Safety Review Board Weakens Critical Infrastructure and Cyber Resilience
- 11:34 : Executive Perspectives: Pierre Noel on Cybersecurity Leadership, Risk, and Resilience
- 11:9 : Top Trump Officials’ Passwords and Personal Phone Numbers Discovered Online
- 11:9 : Malware in Lisp? Now you’re just being cruel
- 11:5 : IT Security News Hourly Summary 2025-03-29 12h : 2 posts
- 10:32 : Kriminelle wollten Leistungen der Bundesagentur ergaunern
- 10:32 : RamiGPT – AI Tool To Escalate Privilege & Gain Root Access Within a Minute
- 10:2 : 46 New Vulnerabilities in Solar Inverters Systems Let Attackers Tamper Inverter Settings
- 10:2 : Gamaredon Hacker Group Using Weaponize LNK Files To Drop Remcos Backdoor on Windows
- 10:2 : ClickFix Captcha – A Creative Technique That Allow Attackers Deliver Malware and Ransomware on Windows
- 10:2 : Attackers Exploit Click Tolerance to Deliver Malware to Users
- 8:36 : Neues Torsystem für Bäckerei
- 8:35 : 4 Tips For Crypto Wallet Security
- 8:35 : Top 5 Web Application Penetration Testing Companies UK
- 8:35 : DeBackdoor – Framework to Detect Backdoor Attacks on Deep Models
- 8:35 : New Android Trojan Crocodilus Abuses Accessibility to Steal Banking and Crypto Credentials
- 8:10 : PCI DSS 4.0.1 and Non-Human Identity Management: What You Need to Know
- 8:10 : Cyber Security Today Profile Series: Dr. Priscilla Johnson on Environmental Engineering, Water Strategy, and Cyber Intelligence
- 8:5 : IT Security News Hourly Summary 2025-03-29 09h : 2 posts
- 7:13 : Personal Data Exposure: The Silent Cybersecurity Threat That You Need to Address
- 7:13 : Red Team Activities Turns More Sophisticated With The Progress of Artificial Intelligence
- 6:6 : Congress Must Reject Transparent Efforts to Undermine the Courts
- 5:5 : IT Security News Hourly Summary 2025-03-29 06h : 1 posts
- 4:6 : BlackLock Ransomware Exposed After Researchers Exploit Leak Site Vulnerability
- 2:5 : IT Security News Hourly Summary 2025-03-29 03h : 1 posts
- 1:38 : Researchers find a way to shield quantum information from ‘noise’
- 0:32 : PCI DSS 4.0: Achieve Compliance with Feroot Before March 31
- 23:5 : IT Security News Hourly Summary 2025-03-29 00h : 3 posts