193 posts were published in the last hour
- 22:32 : DeepSeek’s Popular AI App Is Explicitly Sending US Data to China
- 22:32 : US freezes foreign aid, halting cybersecurity defense and policy funds for allies
- 21:32 : Fast-track generative AI security with Microsoft Purview
- 21:11 : TalkTalk confirms data breach involving a third-party platform
- 21:11 : DeepSeek Hit by Large-Scale Cyber Attack, Temporarily Limits Registrations
- 20:35 : Operator von OpenAI: Welche Aufgaben der KI-Agent übernehmen soll – und wer darauf zugreifen kann
- 20:35 : Ein Instagram ohne Zuckerberg? Das kann Pixelfed
- 20:35 : Cyberkriminalität: Anklage gegen mutmaßlichen Cybererpresser
- 20:34 : Low-Cost Chinese AI Chatbot Roils Tech Stocks
- 20:11 : Inexpensive Chinese AI Chatbot Roils Tech Stocks
- 20:11 : TikTok bans explained: Everything you need to know
- 20:11 : Hackers Use Malicious PDFs, pose as USPS in Mobile Phishing Scam
- 20:11 : Building a culture of security: AWS partners with the BBC
- 20:5 : IT Security News Hourly Summary 2025-01-27 21h : 3 posts
- 19:32 : 6 ways to get the most from Data Privacy Week
- 19:7 : DeepSeek limits new accounts amid cyberattack
- 19:7 : Critical Flaws in VPN Protocols Leave Millions Vulnerable
- 18:36 : Hidden in Plain Sight: PDF Mishing Attack
- 18:36 : News alert: INE Security announces new initiative to help companies accelerate CMMC 2.0 compliance
- 18:36 : Vulnerability Summary for the Week of January 20, 2025
- 18:13 : DeepSeek Faces Large-scale Cyberattack, Halts New User Registrations
- 18:13 : It’s Copyright Week 2025: Join Us in the Fight for Better Copyright Law and Policy
- 17:34 : Managed Detection and Response: Key trends MSPs can’t afford to ignore
- 17:34 : DeepSeek suspends new registrations amid cyberattack
- 17:34 : Best Tor Browser Substitute for Risk-Free Web Surfing
- 17:34 : 2024 C5 Type 2 attestation report available with 179 services in scope
- 17:14 : Brave Desktop Browser Vulnerability Lets Malicious Sites Appear Trusted
- 17:14 : Critical Apache Solr Vulnerability Grants Write Access to Attackers on Windows
- 17:14 : Critical Vulnerability in IBM Security Directory Enables Session Cookie Theft
- 17:13 : White House Considers Oracle-Led Takeover of TikTok with U.S. Investors
- 17:13 : Google takes action after coder reports ‘most sophisticated attack I’ve ever seen’
- 17:13 : TalkTalk Confirms Data Breach, Downplays Impact
- 17:5 : IT Security News Hourly Summary 2025-01-27 18h : 1 posts
- 16:39 : Hidden Text Salting Disrupts Brand Name Detection Systems
- 16:3 : Google launches new Identity Check feature for data security
- 16:3 : Critical Isolation Vulnerability in Intel Trust Domain Extensions Exposes Sensitive Data
- 16:3 : GitHub Vulnerability Exposes User Credentials via Malicious Repositories
- 16:3 : How the ransomware attack at Change Healthcare went down: A timeline
- 16:3 : New Phishing Attack Using zero-width Characters to Bypass Security Filters
- 16:3 : Xerox Workplace Suite Vulnerability Let Attackers Bypass API Security
- 16:3 : New Attack Abusing Multicast Poisoning for PreAuthenticated Kerberos Relay
- 16:3 : Cyber Insights 2025: Cybersecurity Regulatory Mayhem
- 16:3 : Vulnerability Summary for the Week of January 13, 2025
- 16:3 : ⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [27 January]
- 16:3 : GitHub Desktop Vulnerability Risks Credential Leaks via Malicious Remote URLs
- 15:35 : Royal Mail SMS Phishing Scam Targets Victims with Fake Delivery Fee Requests
- 15:35 : Endor Labs and Allies Launch Opengrep, Reviving True OSS for SAST
- 15:35 : 5,000+ SonicWall firewalls still open to attack (CVE-2024-53704)
- 15:35 : ⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [27 January]
- 15:14 : Multiple Git flaws led to credentials compromise
- 15:14 : Burp Suite 2025.1 With New Intruder Options & Bug Fixes
- 15:13 : New Malware Campaign Using 7z & UltraVNC Tool To Deploy Malware
- 15:13 : Three Big Reasons Ransomware Payments Are Up More Than 5X Over Last Year
- 15:13 : ⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [27 January]
- 14:35 : Wie Rechenzentren mit einer minimalen Code-Anpassung 30 Prozent Strom sparen sollen
- 14:35 : Whatsapp fürs iPhone: Neue Funktion könnte den Umgang mit mehreren Accounts deutlich erleichtern
- 14:35 : Deepseek überholt OpenAI und schickt Chipaktien auf Talfahrt: Das steckt dahinter
- 14:35 : Bis zu 50.000 Dollar: Smartphones mit Tiktok werden in den USA zur Goldgrube
- 14:35 : KI-Auskunft per Fax: Diese deutsche Firma verschickt ChatGPT-Antworten
- 14:35 : VdS-Fachtagung „Brandschutz in Recyclinganlagen“
- 14:34 : The Role of Identity Verification in Financial Institutions
- 14:34 : UnitedHealth almost doubles victim numbers from massive Change Healthcare data breach
- 14:34 : Building Automation Protocols Increasingly Targeted in OT Attacks: Report
- 14:34 : ⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [27 January]
- 14:34 : Cybersecurity Experts Warn of Privacy Risks in Modern Automobiles
- 14:9 : Continuing the Sustainability Conversation
- 14:9 : World Economic Forum Annual Meeting 2025: Collectively Disrupting Cybercrime
- 14:9 : Exabeam Extends Generative AI Reach to LogRhythm SIEM
- 14:9 : A Closer Look at Torrenting and Its Applications
- 14:9 : ⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [27 January]
- 14:9 : SaaS Breaches Skyrocket 300% as Traditional Defenses Fall Short
- 14:9 : New Phishing Campaign Targets Mobile Devices with Malicious PDFs
- 14:5 : IT Security News Hourly Summary 2025-01-27 15h : 21 posts
- 13:38 : [UPDATE] [hoch] Mozilla Firefox, Firefox ESR und Thunderbird: Mehrere Schwachstellen
- 13:37 : The Evolution of User Authentication With Generative AI
- 13:37 : 1Password Review: Features, Pricing & Security
- 13:37 : Threat Actors Weaponized XWorm RAT Builder To Attack Script Kiddies
- 13:37 : Chrome Security Update – Memory Corruption & Access Vulnerabilities Patched
- 13:37 : New Phishing Framework Attacking Multiple Brands To Steal Customer Logins
- 13:37 : Sweden seizes cargo ship after another undersea cable hit in suspected sabotage
- 13:37 : T-Mobile Enhances Cybersecurity with Yubikey Security Keys
- 13:37 : Silobreaker Tickets empowers intelligence teams with AI-augmented tools
- 13:37 : ⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [27 January]
- 13:13 : Microsoft Edge: Schwachstelle ermöglicht Darstellen falscher Informationen
- 13:13 : Gdata Security Client und Management Server erlauben Rechteausweitung
- 13:13 : Telefónica im Kampf gegen Betrugsanrufe: So verwickelt KI-Oma Telefonbetrüger in lange Gespräche
- 13:13 : [NEU] [mittel] Apache Wicket: Schwachstelle ermöglicht Denial of Service
- 13:13 : [NEU] [mittel] Microsoft Edge: Schwachstelle ermöglicht Darstellen falscher Informationen
- 13:11 : Introducing HT-ML Guard to Automatically Analyze and Secure HTML Files
- 13:11 : Industry Optimism Grows as TSA Proposes Balanced Cybersecurity Measures
- 13:11 : Best Practices for Securing Your SaaS Environment
- 13:11 : GamaCopy targets Russia mimicking Russia-linked Gamaredon APT
- 13:11 : The Rise in Phishing Scams
- 13:11 : Git Vulnerabilities Led to Credentials Exposure
- 12:36 : Auch in Deutschland: Tausende Scriptkiddies fallen auf Fake-Malware-Builder rein
- 12:36 : [NEU] [hoch] libxml2: Schwachstelle ermöglicht remote Code Execution
- 12:34 : New VPN Backdoor
- 12:34 : SCAVY – Framework to Detect Memory Corruption in Linux Kernel for Privilege Escalation
- 12:34 : Apache Solr For Windows Vulnerability Allows Arbitrary Path write-access
- 12:34 : Humans are the Beating Heart of the Autonomous SOC
- 12:10 : [NEU] [mittel] OTRS: Mehrere Schwachstellen
- 12:9 : Burp Suite 2025.1 Released, What’s New!
- 12:9 : Scammers Are Creating Fake News Videos to Blackmail Victims
- 12:9 : CDNs: Great for speeding up the internet, bad for location privacy
- 12:9 : Do You Know What Your Assets Are?
- 12:9 : Do We Really Need The OWASP NHI Top 10?
- 12:9 : CISOs Boost Crisis Simulation Budgets Amid High-Profile Cyber-Attacks
- 11:36 : Mehr Cybersicherheitsvorfälle gegen kritische Infrastruktur
- 11:36 : l+f: Scriptkiddies verbrennen sich an verseuchtem Trojaner-Baukasten
- 11:36 : Silicon Labs: Software- und Treiber-Installer mit DLL-Injection-Lücken
- 11:36 : [NEU] [UNGEPATCHT] [mittel] Wind River VxWorks: Schwachstelle ermöglicht Offenlegung von Informationen
- 11:35 : Meta Tests Advertising On Threads In US, Japan
- 11:35 : X Refused To Remove Video Viewed By Southport Killer
- 11:35 : SonicWall SMA Appliances Exploited in Zero-Day Attacks
- 11:35 : Industry Moves for the week of January 27, 2025 – SecurityWeek
- 11:35 : Change Healthcare Data Breach Impact Grows to 190 Million Individuals
- 11:10 : Magility 2025: Rückblick, Highlights und Ausblick
- 11:10 : heise-Angebot: heise security Webinar: Wie sag ich’s meinem Chef? – Gesprachsführung für ITler
- 11:10 : (g+) OpenWrt: Das Funkorchester spielt auch ohne Cloud
- 11:10 : [NEU] [hoch] Vaultwarden: Mehrere Schwachstellen
- 11:9 : An unusual “shy z-wasp” phishing, (Mon, Jan 27th)
- 11:9 : New Phishing Framework Attack Multiple Brands Login Pages To Steal Credentials
- 11:9 : Chrome Security Update – Patch for 3 High-Severity Vulnerabilities
- 11:9 : ESXi ransomware attacks use SSH tunnels to avoid detection
- 11:8 : Critical Intel Trust Domain Extensions Isolation Vulnerability Exposes Sensitive Data
- 11:8 : Are Third-Party Risk Management Solutions Effective Enough?
- 11:8 : Subaru Bug Enabled Remote Vehicle Tracking and Hijacking
- 11:5 : IT Security News Hourly Summary 2025-01-27 12h : 20 posts
- 10:36 : Was zuerst? Priorisierung von Patches
- 10:36 : [NEU] [hoch] Cacti: Mehrere Schwachstellen
- 10:35 : Hackers stole sensitive information belonging to 62 million kids and almost 10 million teachers
- 10:35 : Meta To Spend Up To $65bn On AI This Year
- 10:35 : Banks Look To Sell Twitter Takeover Debt
- 10:35 : Silicon UK In Focus Podcast: Disruptive Trends Shaping Our Future
- 10:35 : Apache Solr For Windows instances Vulnerability Allows Arbitrary Path Write-Access
- 10:35 : LockBit Ransomware: 11-Day Timeline from Initial Compromise to Deployment
- 10:35 : Weaponised XWorm RAT Builder Attacking Script Kiddies To Hack 18,000 Devices
- 10:35 : Change Healthcare Breach Almost Doubles in Size to 190 Million Victims
- 10:11 : Apples USB-C-Controller aus dem iPhone entschlüsselt
- 10:11 : Falsche Bankdaten: Betrug mit rund einer Million Deutschlandtickets
- 10:11 : [UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen
- 10:11 : [UPDATE] [mittel] Linux Kernel: Schwachstelle ermöglicht Privilegieneskalation
- 10:11 : [UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service
- 10:11 : [UPDATE] [hoch] Linux Kernel: Schwachstelle ermöglicht nicht spezifizierten Angriff
- 10:10 : [UPDATE] [hoch] git: Schwachstelle ermöglicht Offenlegung von Informationen
- 10:10 : TalkTalk investigating data breach after hacker claims theft of customer data
- 10:10 : Attackers allegedly stole $69 million from cryptocurrency platform Phemex
- 10:9 : British Museum says ex-contractor ‘shut down’ IT systems, wreaked havoc
- 9:32 : ByteDance In Talks With US Over Non-Sale Options For TikTok
- 9:32 : Crypto Firms Sign Up To Trump-Linked Lobby Group
- 9:13 : heise-Angebot: Online-Konferenz zu NIS2-Regulierung: Was Unternehmen jetzt tun müssen
- 9:13 : [UPDATE] [hoch] Google Chrome/Microsoft Edge: Mehrere Schwachstellen
- 9:12 : New SCAVY Framework to Detect Memory Corruption Privilege Escalation in Linux Kernel
- 9:12 : Windows Charset Conversion Feature Exploited to Execute Remote Code
- 9:12 : Critical Fleet Server Vulnerability Exposes Sensitive Information
- 9:12 : GamaCopy Mimics Gamaredon Tactics in Cyber Espionage Targeting Russian Entities
- 9:11 : When Hackers Get Hacked: Cyber Security Today for January 27, 2025
- 8:38 : Cybersecurity: Wie Tabletop-Übungen dein Team auf den Ernstfall vorbereiten
- 8:38 : Future Days – Partnerschaft und Austausch auf Augenhöhe
- 8:38 : Palo-Alto: Sicherheitslücken in Firmware und Bootloadern von Firewalls
- 8:37 : Trump Executive Order Sets Out Pro-Crypto Policy Shift
- 8:37 : Hackers Using RID Hijacking Technique To Create Secret Windows Admin Account
- 8:37 : Hackers Tool 11 Days To Deploy LockBit Ransomware From Initial Compromise
- 8:37 : GitLab Security Update – Patch for XSS Vulnerability in File Rendering
- 8:37 : A week in security (January 20 – January 26)
- 8:37 : CISA Board closed, UnitedHealth numbers rise, Llama’s LLM vulnerability
- 8:5 : LKA Niedersachsen warnt vor gefälschten “eister.de”-Steuerrückzahlungsmails
- 8:5 : IT Security News Hourly Summary 2025-01-27 09h : 3 posts
- 8:4 : A Strategic Approach to Container Security
- 7:32 : Researchers Exploited Windows Charset Conversion Feature to Execute Remote Code
- 7:32 : MintsLoader Delivers StealC Malware and BOINC in Targeted Cyber Attacks
- 7:2 : Gravy Analytics Breach, Subaru Starlink Vulnerability Exposed
- 6:32 : Protection Against Deepfake Cyber Threats: Navigating the Future of Digital Security
- 6:32 : GitLab Security Update – Patch for Multiple Vulnerabilities
- 6:32 : GitHub Vulnerability Let Malicious Repos To Leaks Users Credentials
- 6:12 : Anzeige: KI im Unternehmen – Chancen erkennen, Risiken managen
- 6:11 : Generative AI fuels more Cyber Crime
- 6:11 : AI security posture management will be needed before agentic AI takes hold
- 5:32 : Critical Vulnerability in Meta Llama Framework Let Remote Attackers Execute Arbitrary Code
- 5:32 : Don’t let these open-source cybersecurity tools slip under your radar
- 5:5 : IT Security News Hourly Summary 2025-01-27 06h : 5 posts
- 5:4 : Three privacy rules for 2025 (Lock and Code S06E02)
- 5:4 : Cyber trends set to influence business strategies
- 4:32 : How to use Apple’s App Privacy Report to monitor data tracking
- 4:9 : Critical Vulnerability in Meta’s Llama Framework Exposes AI Systems to Remote Attacks
- 4:9 : UnitedHealth Ransomware Attack Exposes 190 Million Users’ Personal & Healthcare Data
- 2:15 : Cobalt Strike and a Pair of SOCKS Lead to LockBit Ransomware
- 0:34 : ISC Stormcast For Monday, January 27th, 2025 https://isc.sans.edu/podcastdetail/9296, (Mon, Jan 27th)
- 0:13 : Innovative Approaches to Secrets Scanning
- 0:13 : Scaling Security with Automated Identity Management
- 0:13 : Empowering Cloud Compliance with Seamless Security
- 23:5 : IT Security News Hourly Summary 2025-01-27 00h : 2 posts
- 22:58 : IT Security News Weekly Summary 04