154 posts were published in the last hour
- 22:2 : Week in Review: Tik Tok’s return, Noem’s CISA plans, failed startup risks
- 21:4 : Unpatched Vulnerabilities Exist In RealHome Theme And Plugin
- 21:4 : U.S. CISA adds SonicWall SMA1000 flaw to its Known Exploited Vulnerabilities catalog
- 20:32 : Je nach Kamerawinkel schickt euch dieser QR-Code zu einer anderen Website – das steckt dahinter
- 20:32 : Youtube ohne Algorithmus genießen: Dieses Tool findet spannende Videos für euch
- 20:32 : 3 neue Features für Apples Bildschirmaufnahmen entdeckt – das sollen sie verbessern
- 20:32 : Humanity‘s Last Exam: Daran scheitern die besten KI-Modelle
- 20:32 : Zur Not mit Kohle: Donald Trump verspricht Kraftwerke für KI-Datencenter
- 20:5 : IT Security News Hourly Summary 2025-01-24 21h : 6 posts
- 20:2 : Balancing Security and UX With Iterative Experimentation
- 20:2 : J-magic malware campaign targets Juniper routers
- 19:34 : Data sovereignty compliance challenges and best practices
- 19:13 : AMD processor vulnerability inadvertently leaked early
- 19:13 : Continuous Monitoring Guide: FedRAMP Meets Zero Trust
- 19:13 : Randall Munroe’s XKCD ‘Unit Circle’
- 18:32 : US Charges Five in North Korean IT Worker Hiring Scam
- 18:32 : Cybercriminals Exploit Cloud Services to Steal Login Information
- 18:10 : Über Adminportal von Subaru: Hacker konnten unzählige Autos orten und knacken
- 18:9 : Three UK Investigates After Outage Impacted Some 999 Calls
- 18:9 : CISA Adds One Known Exploited Vulnerability to Catalog
- 17:32 : A Student Mentor’s TH-200 and OSTH Learning Experience
- 17:32 : My Journey with IR-200: Becoming an OffSec Certified Incident Responder (OSIR)
- 17:32 : How bots and fraudsters exploit video games with credential stuffing
- 17:9 : Texas scrutinizes four more car manufacturers on privacy issues
- 17:5 : IT Security News Hourly Summary 2025-01-24 18h : 6 posts
- 16:36 : CMA Secures Google Commitment To Tackle Fake Reviews
- 16:36 : Hackers Use XWorm RAT to Exploit Script Kiddies, Pwning 18,000 Devices
- 16:36 : The top 10 brands exploited in phishing attacks – and how to protect yourself
- 16:36 : Solving WAFs biggest challenge | Impart Security
- 16:16 : Uhlmann & Zacher gehört nun zu Assa Abloy
- 16:15 : The best password managers for businesses in 2025: Expert tested
- 15:36 : Exploit Me, Baby, One More Time: Command Injection in Kubernetes Log Query
- 15:36 : Ransomware attacks surged in December 2024
- 15:36 : The best password managers for business in 2025: Expert tested
- 15:9 : Trump Signs AI ‘Free From Idealogical Bias’ Executive Order
- 15:9 : Don’t want your Kubernetes Windows nodes hijacked? Patch this hole now
- 15:9 : The Age of Unseen Truths And Deceptive Lies
- 15:9 : The Rise of Agentic AI: How Autonomous Intelligence Is Redefining the Future
- 15:9 : North Korean IT workers are extorting employers, FBI warns
- 14:33 : KI für 3D-Modelle – und die Folgen für die Gaming-Branche
- 14:33 : Perplexity bringt KI-Assistenten aufs Smartphone: Wir haben ihn ausprobiert
- 14:33 : Wo bleibt Next-Gen-Carplay? Apple äußert sich zu den Plänen mit der Software
- 14:33 : Quantenresistente Cybersicherheit: Die Zukunft des Datenschutzes
- 14:32 : Subaru’s STARLINK Connected Car’s Vulnerability Let Attackers Gain Restricted Access
- 14:32 : Palo Alto Networks Makes Post Quantum Cryptography API Available
- 14:32 : AWS Announces £5m Grant for Cyber Education in the UK
- 14:8 : Malvertising: Mac-Homebrew-User im Visier
- 14:8 : Seasoning email threats with hidden text salting
- 14:8 : Android Kiosk Tablets Vulnerability Let Attackers Control AC & Lights
- 14:8 : Hackers Earn $886,000 at Pwn2Own Automotive 2025, Targeting Charging Infrastructure
- 14:7 : North Korean dev who renamed himself ‘Bane’ accused of IT worker fraud scheme
- 14:7 : Subaru Starlink Vulnerability Exposed Cars to Remote Hacking
- 14:7 : GhostGPT: A Malicious AI Chatbot for Hackers
- 14:7 : Public Holidays And Weekends Make Companies More Vulnerable to Cyberattacks
- 14:7 : FortiGate Vulnerability Exposes 15,000 Devices to Risks
- 14:7 : Protect Your Tax Return from Fraud: Here’s What You Need to Know
- 14:7 : RANsacked: Over 100 Security Flaws Found in LTE and 5G Network Implementations
- 14:5 : IT Security News Hourly Summary 2025-01-24 15h : 6 posts
- 13:32 : North Korean Fake IT Workers More Aggressively Extorting Enterprises
- 13:14 : Adminportal gehackt: Hacker orten und knacken Subaru aus der Ferne
- 13:13 : Android Kisok Tablets Vulnerability Let Attackers Control AC & Lights
- 13:13 : The 8 Things You Should Know About Cyber Attacks on the Education Sector and How to Prevent Them
- 13:13 : Tagged Files as a Road to Insider Threats
- 13:13 : US Charges Five People Over North Korean IT Worker Scheme
- 12:35 : elektronischen Patientenakte in Deutschland
- 12:35 : Adminportal gehackt: Forscher orten und knacken Subaru aus der Ferne
- 12:35 : [UPDATE] [kritisch] Microsoft Windows: Mehrere Schwachstellen
- 12:34 : CISA Warns of Old jQuery Vulnerability Linked to Chinese APT
- 12:34 : The Role of Data Governance in Strengthening Enterprise Cybersecurity
- 12:34 : Russian Scammers Target Crypto Influencers with Infostealers
- 12:34 : North America Faced Majority of Ransomware Incidents in December 2024
- 12:5 : CISA Releases Six ICS Advisories Details Security Issues
- 12:5 : The evolving landscape of data privacy: Key trends to shape 2025
- 12:5 : Cyber Insights 2025: Social Engineering Gets AI Wings
- 12:5 : “Always Verify”: Integrating Zero-Trust Security for Good Governance
- 11:35 : Google: Android bekommt Identitäts-Check als Sicherheitsfunktion
- 11:34 : New Law Could Mean Prison for Reporting Data Leaks
- 11:34 : Palo Alto Networks Addresses Impact of BIOS, Bootloader Vulnerabilities on Its Firewalls
- 11:34 : Building Secure Multi-Cloud Architectures: A Framework for Modern Enterprise Applications
- 11:34 : 2025 State of SaaS Backup and Recovery Report
- 11:34 : North Korean IT Workers Holding Data Hostage for Extortion, FBI Warns
- 11:10 : Bitdefender: Hype versus Realität
- 11:10 : heise-Angebot: iX-Workshop: AWS-Sicherheit – Angriffe erkennen und abwehren
- 11:9 : PayPal Fined $2 Million Fine For Violating Cybersecurity Regulations
- 11:9 : KEYPLUG Infrastructure Exposed: Server Configurations and TLS Certificates Revealed
- 11:9 : Beware of Fake Captcha Verifications Spreading Lumma Malware
- 11:9 : Juniper Routers Exploited via Magic Packet Vulnerability to Deploy Custom Backdoor
- 11:9 : Cybersecurity Alert: Users Deceived By Fake Google CAPTCHA Pages
- 11:5 : IT Security News Hourly Summary 2025-01-24 12h : 10 posts
- 10:35 : “KI wird die Cybersicherheit maßgeblich prägen – für Verteidiger und Angreifer”
- 10:35 : D-Trust: Hinter “Angriff” auf Antragsportal steckte wohl White-Hat-Hacker
- 10:35 : Hacking-Wettbewerb: Pwn2Own-Teilnehmer knacken Tesla-Ladestation
- 10:34 : Apono’s 2024 Achievements Set the Stage for Innovative Cloud Access Management in 2025
- 10:34 : Salt Typhoon Hacked Nine U.S. Telecoms, Tactics and Techniques Revealed
- 10:34 : DoJ Indicts 5 Individuals for $866K North Korean IT Worker Scheme Violations
- 10:10 : [NEU] [kritisch] Cambium Networks cnPilot und cnMaestro: Schwachstelle ermöglicht Codeausführung
- 10:9 : HellCat and Morpheus Ransomware Share Identical Payloads for Attacks
- 10:9 : SonicWall warns of a critical CVE-2025-23006 zero-day likely exploited in the wild
- 10:9 : Conduent Confirms Cyberattack After Government Agencies Report Outages
- 9:32 : Adapting fraud prevention for the hybrid working world
- 9:32 : US indicts five individuals in crackdown on North Korea’s illicit IT workforce
- 9:32 : Ransomware Gangs Linked by Shared Code and Ransom Notes
- 9:14 : [UPDATE] [kritisch] Cacti: Schwachstelle ermöglicht Codeausführung
- 9:14 : [UPDATE] [mittel] cyrus imapd: Schwachstelle ermöglicht Denial of Service
- 9:14 : [UPDATE] [mittel] jQuery: Mehrere Schwachstellen ermöglichen Cross-Site Scripting
- 9:14 : [UPDATE] [mittel] cyrus imapd: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen
- 8:37 : OpenAI stellt Operator vor: Welche Aufgaben euch der KI-Agent abnimmt – und welche nicht
- 8:37 : GI-Forderung nach modernem Computerstrafrecht
- 8:37 : Trustcenter der Bundesdruckerei: Angriff auf D-Trust wohl von White-Hat-Hacker
- 8:36 : Aviat Networks enhances software cybersecurity offering
- 8:36 : TSA’s Pekoske ousted, CISOs’ boardroom gain, Cisco vulnerability fix
- 8:36 : Stolen Credentials From Leading Cyber Security Vendors Selling For $10: Cyber Security Today, Friday, Jan 24, 2025
- 8:10 : Logindaten und ChatGPT-Keys im Visier: Details zu Attacke auf Chrome-Extensions
- 8:10 : Jetzt patchen: Cross-Site-Scripting und Denial of Service in GitLab möglich
- 8:10 : Cyberangriff auf Schulen in Rheinland-Pfalz: Steckt Lockbit dahinter?
- 8:9 : Safeguarding Vital Sectors: The Need for Enhanced Security Practices in Critical Infrastructure Amid Rising Cyberattacks
- 8:9 : Android’s New Identity Check Feature Locks Device Settings Outside Trusted Locations
- 8:5 : IT Security News Hourly Summary 2025-01-24 09h : 6 posts
- 7:33 : Angriffe auf alte jQuery-Bibliotheken beobachtet
- 7:32 : 370+ Ivanti Connect Secure Exploited Using 0-Day Vulnerability
- 7:32 : Fear of Blame in Cybersecurity: Irish Workers Hesitant to Report Breaches
- 7:12 : Partnerangebot: mITSM – Munich Institute for IT Service Management GmbH – ISO 27001 Foundation Schulung
- 7:11 : BASHE Ransomware Allegedly Leaked ICICI Bank Customers Data
- 7:11 : The Unchanging Nature of Human Nature
- 6:37 : Anzeige: Cyberangriffe durch sichere Webentwicklung verhindern
- 6:34 : BCR Cyber and Maryland Association of Community Colleges Allocated $1.5 Million State Investment as Part of Maryland Governor’s Proposed Economic Growth Agenda
- 6:34 : Only 7 percent of organizations recover data after paying a ransom in malware attacks
- 6:34 : VPN Usage Surges Amid Age Verification Laws on Adult Websites
- 6:34 : CISA Adds Five-Year-Old jQuery XSS Flaw to Exploited Vulnerabilities List
- 6:7 : How is the world preparing for the future of AI?
- 6:7 : North Korean IT Workers Steal Companies Source Codes to Demand Ransomware
- 6:7 : China and friends claim success in push to stamp out tech support cyber-scam slave camps
- 5:34 : Zero-Click Outlook RCE Vulnerability (CVE-2025-21298), PoC Released
- 5:34 : GUI frontends for GnuPG, the free implementation of the OpenPGP standard
- 5:34 : Nearly half of CISOs now report to CEOs, showing their rising influence
- 5:9 : Court rules FISA Section 702 surveillance of US resident was unconstitutional
- 5:9 : Deepfakes force a new era in fraud detection, identity verification
- 5:5 : IT Security News Hourly Summary 2025-01-24 06h : 1 posts
- 4:32 : New infosec products of the week: January 24, 2025
- 3:34 : A K-12 Guide to the Digital Classroom
- 2:32 : Understanding the 3-Layers of Non-Human Identity (NHI) Security in TrustFour’s Posture and Attack Surface Management Framework
- 1:4 : [Guest Diary] How Access Brokers Maintain Persistence, (Fri, Jan 24th)
- 1:4 : Face Scans to Estimate Our Age: Harmful and Creepy AF
- 0:32 : ISC Stormcast For Friday, January 24th, 2025 https://isc.sans.edu/podcastdetail/9294, (Fri, Jan 24th)
- 0:13 : Trend Micro and CISA Secure-By-Design Pledge
- 0:13 : U.S. CISA adds JQuery flaw to its Known Exploited Vulnerabilities catalog
- 0:13 : Face Scans to Estimate Our Age: Creepy AF and Harmful
- 23:36 : One of Salt Typhoon’s favorite flaws still wide open on 91% of at-risk Exchange Servers
- 23:36 : Second Circuit Rejects Record Labels’ Attempt to Rewrite the DMCA
- 23:36 : Patch now: Cisco fixes critical 9.9-rated, make-me-admin bug in Meeting Management
- 23:12 : Bessere Datensicherheit für Android-Handys
- 23:11 : Insurance companies can reduce risk with Attack Path Management
- 23:5 : IT Security News Hourly Summary 2025-01-24 00h : 4 posts
- 22:55 : IT Security News Daily Summary 2025-01-23