165 posts were published in the last hour
- 22:32 : Sophos fixed critical vulnerabilities in its Firewall product
- 20:32 : Third member of LockBit ransomware gang has been arrested
- 20:7 : Identity and access management tools and features for 2025
- 20:5 : IT Security News Hourly Summary 2024-12-20 21h : 1 posts
- 19:32 : Ninth Circuit Gets It: Interoperability Isn’t an Automatic First Step to Liability
- 19:3 : What Payroll Documents Do You Need to Pay Employees?
- 19:2 : Customs & Border Protection Fails Baseline Privacy Requirements for Surveillance Technology
- 18:32 : LockBit Developer Rostislav Panev, a Dual Russian-Israeli Citizen, Arrested
- 18:32 : How to Test PATCH Requests for API Testing With Playwright Java
- 18:2 : Our Santa wishlist: Stronger identity security for kids
- 17:5 : IT Security News Hourly Summary 2024-12-20 18h : 10 posts
- 16:32 : Tibbo AggreGate Network Manager
- 16:32 : Fortinet Releases Security Updates for FortiManager
- 16:32 : DEF CON 32 – Measuring the Tor Network
- 16:5 : How to delete your X/Twitter account for good (and protect your data)
- 16:5 : How to Prevent DDoS Attacks: 5 Steps for DDoS Prevention
- 16:5 : Video: Brain Cipher Ransomware Hacks Deloitte
- 16:5 : Is There a DDoS Attack Ceiling?
- 16:5 : Ditch The Cloud Security Labels to Nail Detection and Response
- 16:5 : North Korean Hackers Stole $1.34 Billion in Crypto in 2024
- 16:5 : Italy’s Data Protection Watchdog Issues €15m Fine to OpenAI Over ChatGPT Probe
- 15:33 : Russia targets Ukraine sensitive data servers with Cyber Attacks
- 15:33 : Builder.ai Database Misconfiguration Exposes 1.29 TB of Unsecured Records
- 15:33 : Ransomware attack on health giant Ascension hits 5.6 million patients
- 15:33 : Security Serious Unsung Heroes 2024 – Winner’s Spotlight: Best Security Awareness Campaign
- 15:33 : Cybersecurity Snapshot: CISA Hands Down Cloud Security Directive, While Threat from North Korean IT Workers Gets the Spotlight
- 15:33 : How to Handle Secrets in Configuration Management Tools
- 15:33 : Rising Tactics of Winnti Hackers Include Deploying Glutton PHP Backdoors
- 15:33 : CISA Issues Mobile Security Guidelines Amid Cyber Espionage Threats
- 15:33 : Colorado Faces Growing Financial Losses from AI-Powered Scams in 2024
- 15:33 : Bitcoin Security Concerns Amid Quantum Computing Advancements
- 15:3 : Protecting Unmanaged Devices with Armis and Akamai
- 15:3 : Major Enhancements to Akamai API Security, Q4 2024
- 15:3 : TP-Link routers may be banned in the US next year – what that means for you
- 15:3 : New Microsoft guidance for the CISA Zero Trust Maturity Model
- 14:33 : Passkeys: Microsoft kämpft weiter gegen das traditionelle Passwort
- 14:32 : Top AI Trends Every Software Development Company to Follow in 2025
- 14:32 : Why Apple sends spyware victims to this nonprofit security lab
- 14:32 : How Public-Private Collaborations Contribute to Cybercrime Disruption
- 14:5 : IT Security News Hourly Summary 2024-12-20 15h : 8 posts
- 14:3 : Weihnachtsüberraschung: Whatsapp verbessert Anrufqualität und bringt lustige Effekte
- 14:3 : Mit KI gegen Online-Betrug: Mit diesem Tool soll der Chrome-Browser sicherer werden
- 14:3 : EU-Datenschützer wollen gemeinsame Linie für KI-Modelle: Was bedeutet das für ChatGPT?
- 14:3 : ChatGPT: Diese Funktionen für die Desktop-App sind neu
- 14:3 : Neue Farben zum Jahreswechsel: Google Maps bekommt einen neuen Look
- 13:32 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 13:32 : Config Chaos | How IoT and Cloud misconfigurations undermine security
- 13:32 : Getting to Know Katya Pikkarainen
- 13:3 : 20 Jahre Haft: Ransomware-Hacker muss Luxusresort auf Bali aufgeben
- 13:3 : [UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen
- 13:3 : [UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service und unspezifische Angriffe
- 13:2 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 13:2 : In Other News: McDonald’s API Hacking, Netflix Fine, Malware Kills ICS Process
- 12:33 : heise meets … Strafverteidiger spart mit KI bis zu 60 Minuten täglich
- 12:32 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 12:32 : OPSWAT Acquires Fend to Extend Cybersecurity Reach Into OT Platforms
- 12:32 : CISA: Use Signal or other secure communications app
- 12:32 : LockBit Admins Tease a New Ransomware Version
- 12:32 : Ukraine’s Security Service Probes GRU-Linked Cyber-Attack on State Registers
- 12:3 : 20 Jahre Haft: Ransomware-Hacker muss Luxusresort auf Bali abgeben
- 12:3 : Threat Actors Selling Nunu Stealer On Hacker Forums
- 12:3 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 12:2 : Black Duck Expands Leadership Team
- 12:2 : Botnet of 190,000 BadBox-Infected Android Devices Discovered
- 11:34 : Verurteilt: Ransomware-Hacker erhält Millionenstrafe und 20 Jahre Haft
- 11:33 : Christmas “Gift” Delivered Through SSH, (Fri, Dec 20th)
- 11:33 : Now You See Me, Now You Don’t: Using LLMs to Obfuscate Malicious JavaScript
- 11:33 : UK’s ICO Labels Google ‘Irresponsible’ For Tracking Change
- 11:33 : El Salvador To Sell Or Discontinue Bitcoin Wallet, After IMF Deal
- 11:33 : Craig Wright Sentenced For Contempt Of Court
- 11:33 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 11:33 : U.S. CISA adds BeyondTrust software flaw to its Known Exploited Vulnerabilities catalog
- 11:33 : BellaCPP: Discovering a new BellaCiao variant written in C++
- 11:33 : CISA Urges Immediate Patching of Exploited BeyondTrust Vulnerability
- 11:33 : Lazarus Group Spotted Targeting Nuclear Engineers with CookiePlus Malware
- 11:33 : Webcams and DVRs Vulnerable to HiatusRAT, FBI Warns
- 11:6 : Partnerangebot: SerNet GmbH – Konferenz „verinice.XP 2025 – Die Konferenz für Informationssicherheit und Datenschutz“ inkl. Workshops
- 11:6 : [UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service
- 11:5 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 11:5 : French Citizens – 28,445,106 breached accounts
- 11:5 : Rockwell PowerMonitor Vulnerabilities Allow Remote Hacking of Industrial Systems
- 11:5 : Another NetWalker affiliate sentenced to 20 years in prison
- 11:5 : CISA Urges Encrypted Messaging After Salt Typhoon Hack
- 11:5 : IT Security News Hourly Summary 2024-12-20 12h : 5 posts
- 10:33 : Partnerangebot: CyberCompare, A Bosch Business – „Zielkonzept bei der Auswahl eines SOC/MDR-Services“
- 10:33 : Auslaufmodell NTLM: Aus Windows 11 24H2 und Server 2025 teils entfernt
- 10:33 : Fortinet Wireless Manager: Informationen zu kritischer Lücke zurückgehalten
- 10:32 : Siemens UMC Vulnerability Allows Arbitrary Remote Code Execution
- 10:32 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 10:4 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 9:34 : Google Chrome und Microsoft Edge: Mehrere Schwachstellen ermöglichen Codeausführung
- 9:34 : [UPDATE] [mittel] Linux Kernel (ATA over Ethernet): Schwachstelle ermöglicht Denial of Service und Code-Ausführung
- 9:33 : [UPDATE] [mittel] Lenovo BIOS: Mehrere Schwachstellen ermöglichen Codeausführung
- 9:33 : [UPDATE] [hoch] Red Hat Enterprise Linux: Mehrere Schwachstellen
- 9:33 : [UPDATE] [mittel] PostgreSQL: Mehrere Schwachstellen
- 9:33 : Task scams cost Americans almost quarter of a billion dollars
- 9:33 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 9:33 : Unwrapping Christmas scams | Unlocked 403 cybersecurity podcast (ep. 9)
- 9:32 : Raccoon Infostealer operator sentenced to 60 months in prison
- 9:32 : Insider Threat Indicators
- 9:32 : Sophos Issues Hotfixes for Critical Firewall Flaws: Update to Prevent Exploitation
- 9:32 : Rspack npm Packages Compromised with Crypto Mining Malware in Supply Chain Attack
- 9:32 : Ransomware Attackers Target Industries with Low Downtime Tolerance
- 9:4 : Foxit PDF Editor Vulnerabilities Allows Remote Code Execution
- 9:4 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 8:33 : Sicherheitsmanagement: Als Werkstudentin im Profifußball
- 8:32 : Windows 11 Privilege Escalation Vulnerability Lets Attackers Execute Code to Gain Access
- 8:32 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 8:32 : Ransomware Attacks Expose Gaps in Backup Practices: The Case for Modern Solutions
- 8:32 : Amazon health malware, BeyondTrust suffers cyberattack, FortiNet wireless vulnerability
- 8:5 : IT Security News Hourly Summary 2024-12-20 09h : 15 posts
- 8:4 : Nutzerbeschwerden: Zahlreiche Discord-Accounts über Nacht unerwartet gesperrt
- 8:4 : Elektronische Patientenakte: Soll ich widersprechen – oder soll ich nicht?
- 8:3 : NetWalker Ransomware Operator Sentenced to 20 Years in Prison
- 8:3 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 8:3 : Human Risk Management: The “Weakest Link” Emerges as Key to Cybersecurity
- 8:3 : How Data Classification Reduces Insider Threats
- 8:3 : Last Pass Hack Impact Continues: Cyber Security Today for Friday, December 20, 2024
- 7:32 : Silicon In Focus Podcast: Tech in 2025
- 7:32 : CISA Warns of BeyondTrust Privileged Remote Access Exploited in Wild
- 7:32 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 7:32 : Zero-Trust in Web3: Redefining Security for Decentralized Systems
- 7:5 : Rising wave of cyber-attacks targeting YouTube content creators
- 7:5 : The Avast Phishing Awards: Trickiest email headlines of 2024
- 7:5 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 7:5 : Hackers Exploiting Critical Fortinet EMS Vulnerability to Deploy Remote Access Tools
- 6:33 : Ex-BSI-Chef: Schönbohm gewinnt Klage gegen Böhmermann
- 6:32 : CISA Releases Eight New ICS Advisories to Defend Cyber Attacks
- 6:32 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 6:32 : CISA and EPA Warn Water Facilities to Secure Exposed HMIs
- 6:5 : NotLockBit – Previously Unknown Ransomware Attack Windows & macOS
- 6:5 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 6:5 : CISA Adds Critical Flaw in BeyondTrust Software to Exploited Vulnerabilities List
- 5:32 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 5:32 : AI is becoming the weapon of choice for cybercriminals
- 5:32 : Why cybersecurity is critical to energy modernization
- 5:5 : IT Security News Hourly Summary 2024-12-20 06h : 5 posts
- 5:4 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 4:32 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 4:32 : India’s Rapido exposed user and driver data through leaky website feedback form
- 4:32 : New infosec products of the week: December 20, 2024
- 4:32 : 46% of financial institutions had a data breach in the past 24 months
- 4:2 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 3:32 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 3:32 : Infosec experts divided on AI’s potential to assist red teams
- 3:32 : CISO Challenges for 2025: Overcoming Cybersecurity Complexities
- 3:4 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 2:32 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 2:7 : ISC Stormcast For Friday, December 20th, 2024 https://isc.sans.edu/podcastdetail/9264, (Fri, Dec 20th)
- 2:7 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 2:5 : IT Security News Hourly Summary 2024-12-20 03h : 3 posts
- 1:32 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 1:5 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 1:5 : Navigating the New Era of AI Traffic: How to Identify and Block AI Scrapers
- 1:5 : DEF CON 32 – Exploiting Cloud Provider Vulnerabilities for Initial Access
- 0:32 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 0:32 : BeyondTrust SaaS instances breached in cyberattack
- 0:7 : Play Ransomware Claims Krispy Kreme Breach, Threatens Data Leak
- 0:7 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 23:32 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 23:5 : IT Security News Hourly Summary 2024-12-20 00h : 7 posts
- 23:3 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 23:3 : The Breachies 2024: The Worst, Weirdest, Most Impactful Data Breaches of the Year
- 23:3 : ‘Fix It’ social-engineering scheme impersonates several brands
- 22:55 : IT Security News Daily Summary 2024-12-19