IT Security News
Cybersecurity news and articles about information security, vulnerabilities, exploits, hacks, laws, spam, viruses, malware, breaches.

Main menu

Skip to content
  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Apps
    • Telegram Channel
DE, heise security News

Nach Bericht: Weitere Datenlecks bei Lübecker IT-Unternehmen gefunden

2025-04-15 13:04

Ein Lübecker IT-Unternehmen wurde vergangenes Jahr Opfer einer Ransomware-Attacke. Das Datenleck besteht jedoch weiter.

Dieser Artikel wurde indexiert von heise security News

Lesen Sie den originalen Artikel:

Nach Bericht: Weitere Datenlecks bei Lübecker IT-Unternehmen gefunden

Tags: DE heise security News

Post navigation

← [UPDATE] [mittel] Golang Go: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen
Majority of Browser Extensions Can Access Sensitive Enterprise Data, New Report Finds →

Pages

  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Apps
    • Telegram Channel

Recent Posts

  • Saas Security Best Practices August 8, 2025
  • Columbia University Data Breach Exposes Personal and Financial Data of 870,000 August 8, 2025
  • 5 ways business leaders can transform workplace culture – and it starts by listening August 8, 2025
  • PyPI Released Advisory to Prevent ZIP Parser Confusion Attacks on Python Package Installers August 8, 2025
  • US Confirms Shutdown of BlackSuit Ransomware That Hacked Over 450 Organizations August 8, 2025
  • Passwords, Resilience, And Being Human: Working Together For A Brighter Future At BSides Las Vegas 2025 August 8, 2025
  • Survey: AI Agents Are Now Biggest Threat to Cybersecurity August 8, 2025
  • Australian Regulator Sues Optus Over 2022 Data Breach August 8, 2025
  • VexTrio TDS Deploys Malicious VPN Apps on Google Play and App Store August 8, 2025
  • How to prevent DoS attacks and what to do if they happen August 8, 2025
  • In Other News: Nvidia Says No to Backdoors, Satellite Hacking, Energy Sector Assessment August 8, 2025
  • How Age Verification Measures Are Endangering Digital Privacy in the UK August 8, 2025
  • GreedyBear: 40 Fake Crypto Wallet Extensions Found on Firefox Marketplace August 8, 2025
  • Record-Breaking GreedyBear Attack Uses 650 Hacking Tools to Steal $1M from Victims August 8, 2025
  • Microsoft rolls out GPT-5 across its Copilot suite – here’s where you’ll find it August 8, 2025
  • Infosec hounds spot prompt injection vuln in Google Gemini apps August 8, 2025
  • PyPI Issues Advisory to Prevent ZIP Parser Confusion Attacks on Python Package Installers August 8, 2025
  • Windows UAC Bypass Exploits Character Map Tool for Privilege Escalation August 8, 2025
  • Multiple Security Vulnerabilities Found in WWBN AVideo, MedDream, and Eclipse ThreadX August 8, 2025
  • Google Project Zero Changes Its Disclosure Policy August 8, 2025

Copyright © 2025 IT Security News. All Rights Reserved. The Magazine Basic Theme by bavotasan.com.

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}