210 posts were published in the last hour
- 22:55 : IT Security News Daily Summary 2025-01-26
- 21:31 : The Small Business Guide to Everyday Access Management and Secure Off-boarding
- 21:13 : DEF CON 32 – Attacks On GenAI Data & Using Vector Encryption To Stop Them
- 20:35 : Weltweite Kampagne: Google scheint Adblocker-Nutzer mit stundenlanger Youtube-Werbung zu bestrafen
- 20:35 : Google-Trick: So schaltet ihr KI-Features einfach ab
- 20:5 : IT Security News Hourly Summary 2025-01-26 21h : 1 posts
- 19:39 : Top 10 Best Open Source Firewall in 2025
- 18:34 : Cyber Threats in Hong Kong Hit Five-Year Peak with AI’s Growing Influence
- 17:15 : Change Healthcare data breach exposed the private data of over half the U.S.
- 17:15 : Weekly Cybersecurity Update: Recent Cyber Attacks, Vulnerabilities, and Data Breaches
- 17:15 : VPN Services May Not Be as Secure as They Seem, Recent Research Finds
- 15:7 : Security Affairs newsletter Round 508 by Pierluigi Paganini – INTERNATIONAL EDITION
- 15:7 : SECURITY AFFAIRS MALWARE NEWSLETTER – ROUND 30
- 15:7 : The Relationship Between Network and Security: Why They’re Ditching the “It’s Your Fault” Game
- 14:34 : Outlook-User aufgepasst: BSI warnt vor Schadsoftware, die beim Öffnen von E-Mails zuschlägt
- 14:34 : OpenAIs neues Ziel: KI-Modell soll Proteine finden – damit wir länger leben
- 14:34 : Weltweite Kampagne: Google bestraft Adblocker-Nutzer mit stundenlanger Youtube-Werbung
- 14:10 : INE Security Alert: Expediting CMMC 2.0 Compliance
- 14:10 : Hackers Employ Fake Mac Homebrew Google Ads in Novel Malicious Campaign
- 14:10 : AI Use Linked to Decline in Critical Thinking Skills Among Students, Study Finds
- 14:5 : IT Security News Hourly Summary 2025-01-26 15h : 1 posts
- 13:15 : Revolutionizing Investigations: The Impact of AI in Digital Forensics
- 12:32 : London: IT-Sabotage stört den Betrieb des British Museum
- 11:34 : Meta’s Llama Framework Flaw Exposes AI Systems to Remote Code Execution Risks
- 11:5 : IT Security News Hourly Summary 2025-01-26 12h : 1 posts
- 10:13 : Fake IT Support Used by Ransomware Gangs in Microsoft Teams Breaches
- 9:38 : Week in review: 48k Fortinet firewalls open to attack, attackers “vishing” orgs via Microsoft Teams
- 8:39 : Apple Mail-App Update: KI-gestützte Sortierung für Mac und iPad kommt endlich
- 8:39 : Stölting übernimmt Emdener-Sicherheitsunternehmen
- 8:8 : Cisco warns of a ClamAV bug with PoC exploit
- 5:5 : IT Security News Hourly Summary 2025-01-26 06h : 5 posts
- 4:7 : CISA Warns of SonicWall 0-day RCE Vulnerability Exploited in Wild
- 4:7 : Kubernetes Cluster RCE Vulnerability Let Attacker Takeover All Windows Nodes
- 4:7 : IntelBroker Resigned as a BreachForums Owner
- 4:7 : Microsoft Entra ID Bug Allow Unprivileged Users to Change Their User Principal Names
- 4:7 : 10 Best Vulnerability Assessment and Penetration Testing (VAPT) Tools in 2025
- 2:36 : Empower Your DevOps with Robust Secrets Security
- 2:36 : Building Trust with Effective IAM Solutions
- 2:36 : Ensuring Data Safety with Comprehensive NHIDR
- 23:5 : IT Security News Hourly Summary 2025-01-26 00h : 1 posts
- 22:55 : IT Security News Daily Summary 2025-01-25
- 20:36 : Neuer Video-Feed auf X: Hier ist das neue Feature bereits verfügbar
- 20:36 : Tiktok-Mutter Bytedance will 2025 20 Milliarden Dollar vorwiegend in KI investieren
- 20:13 : Subaru Starlink flaw allowed experts to remotely hack cars
- 20:13 : Why AI-Driven Cybercrime Is the Biggest Threat of 2025
- 18:32 : DEF CON 32 – Access Control Done Right The First Time
- 17:9 : UnitedHealth Group’s Massive Data Breach Impacts 190 Million Americans
- 17:9 : Participants in the Pwn2Own Automotive 2025 earned $886,250
- 17:9 : Why MFA Failures Signal Greater Cybersecurity Challenges
- 17:5 : IT Security News Hourly Summary 2025-01-25 18h : 1 posts
- 16:11 : ChatGPT Outage in the UK: OpenAI Faces Reliability Concerns Amid Growing AI Dependence
- 15:4 : The Frontier of Security: Safeguarding Non-Human Identities
- 14:35 : Eliza erwacht: Forscher beleben den 60 Jahre alten Chatbot-Code wieder
- 14:34 : Bluesky: Der Aufstieg eines dezentralen Social-Media-Netzwerks und warum wir es schützen müssen
- 14:34 : ChatGPT als Operator: Steuert Künstliche Intelligenz bald deinen PC?
- 14:11 : TRIPLESTRENGTH Targets Cloud for Cryptojacking, On-Premises Systems for Ransomware Attacks
- 14:11 : A Looming Threat to Crypto Keys: The Risk of a Quantum Hack
- 13:38 : Quantum: Calculating error-free more easily with two codes
- 13:9 : American National Insurance Company (ANICO) Data Leaked in MOVEit Breach
- 13:9 : The Cybersecurity Checklist: Top Methods and Tools for Protection And Mitigation
- 12:6 : US Privacy Snags a Win as Judge Limits Warrantless FBI Searches
- 11:31 : Someone is slipping a hidden backdoor into Juniper routers across the globe, activated by a magic packet
- 11:5 : IT Security News Hourly Summary 2025-01-25 12h : 2 posts
- 10:6 : Nach Sicherheitslücke bei D-Trust: CCC spricht von “Cyber-Augenwischerei”
- 10:5 : UK telco TalkTalk confirms probe into alleged data grab underway
- 9:9 : Data Privacy and Security: Protecting Patient Data and Ensuring HIPAA Compliance
- 8:32 : Neue Partnerschaft: Coredinate und Nomadia fusionieren
- 8:31 : Streamlining Payment Processing for High-Risk Businesses in 2025
- 8:6 : A Hacker’s View of Civic Infrastructure: Cyber Security Today Weekend January 25, 2025
- 8:5 : IT Security News Hourly Summary 2025-01-25 09h : 2 posts
- 7:9 : How Effective Data Center Security Starts at the Perimeter with Advanced Physical Security Solutions
- 7:9 : UnitedHealth Confirms 190 Million Americans Data Affected by Hack on Tech Unit
- 6:18 : Anzeige: Cybersecurity mit Zero Trust, Pentesting und Grundschutz
- 2:5 : IT Security News Hourly Summary 2025-01-25 03h : 1 posts
- 1:34 : The Cybersecurity Vault Podcast 2024 Recap
- 0:34 : EFF to Michigan Supreme Court: Cell Phone Search Warrants Must Strictly Follow The Fourth Amendment’s Particularity and Probable Cause Requirements
- 23:38 : UnitedHealth confirms 190 million Americans affected by Change Healthcare data breach
- 23:38 : AI chatbot startup founder, lawyer wife accused of ripping off investors in $60M fraud
- 23:5 : IT Security News Hourly Summary 2025-01-25 00h : 2 posts
- 23:4 : DEF CON 32 – Anyone Can Hack IoT- Beginner’s Guide To Hacking Your First IoT Device
- 22:55 : IT Security News Daily Summary 2025-01-24
- 22:2 : Week in Review: Tik Tok’s return, Noem’s CISA plans, failed startup risks
- 21:4 : Unpatched Vulnerabilities Exist In RealHome Theme And Plugin
- 21:4 : U.S. CISA adds SonicWall SMA1000 flaw to its Known Exploited Vulnerabilities catalog
- 20:32 : Je nach Kamerawinkel schickt euch dieser QR-Code zu einer anderen Website – das steckt dahinter
- 20:32 : Youtube ohne Algorithmus genießen: Dieses Tool findet spannende Videos für euch
- 20:32 : 3 neue Features für Apples Bildschirmaufnahmen entdeckt – das sollen sie verbessern
- 20:32 : Humanity‘s Last Exam: Daran scheitern die besten KI-Modelle
- 20:32 : Zur Not mit Kohle: Donald Trump verspricht Kraftwerke für KI-Datencenter
- 20:5 : IT Security News Hourly Summary 2025-01-24 21h : 6 posts
- 20:2 : Balancing Security and UX With Iterative Experimentation
- 20:2 : J-magic malware campaign targets Juniper routers
- 19:34 : Data sovereignty compliance challenges and best practices
- 19:13 : AMD processor vulnerability inadvertently leaked early
- 19:13 : Continuous Monitoring Guide: FedRAMP Meets Zero Trust
- 19:13 : Randall Munroe’s XKCD ‘Unit Circle’
- 18:32 : US Charges Five in North Korean IT Worker Hiring Scam
- 18:32 : Cybercriminals Exploit Cloud Services to Steal Login Information
- 18:10 : Über Adminportal von Subaru: Hacker konnten unzählige Autos orten und knacken
- 18:9 : Three UK Investigates After Outage Impacted Some 999 Calls
- 18:9 : CISA Adds One Known Exploited Vulnerability to Catalog
- 17:32 : A Student Mentor’s TH-200 and OSTH Learning Experience
- 17:32 : My Journey with IR-200: Becoming an OffSec Certified Incident Responder (OSIR)
- 17:32 : How bots and fraudsters exploit video games with credential stuffing
- 17:9 : Texas scrutinizes four more car manufacturers on privacy issues
- 17:5 : IT Security News Hourly Summary 2025-01-24 18h : 6 posts
- 16:36 : CMA Secures Google Commitment To Tackle Fake Reviews
- 16:36 : Hackers Use XWorm RAT to Exploit Script Kiddies, Pwning 18,000 Devices
- 16:36 : The top 10 brands exploited in phishing attacks – and how to protect yourself
- 16:36 : Solving WAFs biggest challenge | Impart Security
- 16:16 : Uhlmann & Zacher gehört nun zu Assa Abloy
- 16:15 : The best password managers for businesses in 2025: Expert tested
- 15:36 : Exploit Me, Baby, One More Time: Command Injection in Kubernetes Log Query
- 15:36 : Ransomware attacks surged in December 2024
- 15:36 : The best password managers for business in 2025: Expert tested
- 15:9 : Trump Signs AI ‘Free From Idealogical Bias’ Executive Order
- 15:9 : Don’t want your Kubernetes Windows nodes hijacked? Patch this hole now
- 15:9 : The Age of Unseen Truths And Deceptive Lies
- 15:9 : The Rise of Agentic AI: How Autonomous Intelligence Is Redefining the Future
- 15:9 : North Korean IT workers are extorting employers, FBI warns
- 14:33 : KI für 3D-Modelle – und die Folgen für die Gaming-Branche
- 14:33 : Perplexity bringt KI-Assistenten aufs Smartphone: Wir haben ihn ausprobiert
- 14:33 : Wo bleibt Next-Gen-Carplay? Apple äußert sich zu den Plänen mit der Software
- 14:33 : Quantenresistente Cybersicherheit: Die Zukunft des Datenschutzes
- 14:32 : Subaru’s STARLINK Connected Car’s Vulnerability Let Attackers Gain Restricted Access
- 14:32 : Palo Alto Networks Makes Post Quantum Cryptography API Available
- 14:32 : AWS Announces £5m Grant for Cyber Education in the UK
- 14:8 : Malvertising: Mac-Homebrew-User im Visier
- 14:8 : Seasoning email threats with hidden text salting
- 14:8 : Android Kiosk Tablets Vulnerability Let Attackers Control AC & Lights
- 14:8 : Hackers Earn $886,000 at Pwn2Own Automotive 2025, Targeting Charging Infrastructure
- 14:7 : North Korean dev who renamed himself ‘Bane’ accused of IT worker fraud scheme
- 14:7 : Subaru Starlink Vulnerability Exposed Cars to Remote Hacking
- 14:7 : GhostGPT: A Malicious AI Chatbot for Hackers
- 14:7 : Public Holidays And Weekends Make Companies More Vulnerable to Cyberattacks
- 14:7 : FortiGate Vulnerability Exposes 15,000 Devices to Risks
- 14:7 : Protect Your Tax Return from Fraud: Here’s What You Need to Know
- 14:7 : RANsacked: Over 100 Security Flaws Found in LTE and 5G Network Implementations
- 14:5 : IT Security News Hourly Summary 2025-01-24 15h : 6 posts
- 13:32 : North Korean Fake IT Workers More Aggressively Extorting Enterprises
- 13:14 : Adminportal gehackt: Hacker orten und knacken Subaru aus der Ferne
- 13:13 : Android Kisok Tablets Vulnerability Let Attackers Control AC & Lights
- 13:13 : The 8 Things You Should Know About Cyber Attacks on the Education Sector and How to Prevent Them
- 13:13 : Tagged Files as a Road to Insider Threats
- 13:13 : US Charges Five People Over North Korean IT Worker Scheme
- 12:35 : elektronischen Patientenakte in Deutschland
- 12:35 : Adminportal gehackt: Forscher orten und knacken Subaru aus der Ferne
- 12:35 : [UPDATE] [kritisch] Microsoft Windows: Mehrere Schwachstellen
- 12:34 : CISA Warns of Old jQuery Vulnerability Linked to Chinese APT
- 12:34 : The Role of Data Governance in Strengthening Enterprise Cybersecurity
- 12:34 : Russian Scammers Target Crypto Influencers with Infostealers
- 12:34 : North America Faced Majority of Ransomware Incidents in December 2024
- 12:5 : CISA Releases Six ICS Advisories Details Security Issues
- 12:5 : The evolving landscape of data privacy: Key trends to shape 2025
- 12:5 : Cyber Insights 2025: Social Engineering Gets AI Wings
- 12:5 : “Always Verify”: Integrating Zero-Trust Security for Good Governance
- 11:35 : Google: Android bekommt Identitäts-Check als Sicherheitsfunktion
- 11:34 : New Law Could Mean Prison for Reporting Data Leaks
- 11:34 : Palo Alto Networks Addresses Impact of BIOS, Bootloader Vulnerabilities on Its Firewalls
- 11:34 : Building Secure Multi-Cloud Architectures: A Framework for Modern Enterprise Applications
- 11:34 : 2025 State of SaaS Backup and Recovery Report
- 11:34 : North Korean IT Workers Holding Data Hostage for Extortion, FBI Warns
- 11:10 : Bitdefender: Hype versus Realität
- 11:10 : heise-Angebot: iX-Workshop: AWS-Sicherheit – Angriffe erkennen und abwehren
- 11:9 : PayPal Fined $2 Million Fine For Violating Cybersecurity Regulations
- 11:9 : KEYPLUG Infrastructure Exposed: Server Configurations and TLS Certificates Revealed
- 11:9 : Beware of Fake Captcha Verifications Spreading Lumma Malware
- 11:9 : Juniper Routers Exploited via Magic Packet Vulnerability to Deploy Custom Backdoor
- 11:9 : Cybersecurity Alert: Users Deceived By Fake Google CAPTCHA Pages
- 11:5 : IT Security News Hourly Summary 2025-01-24 12h : 10 posts
- 10:35 : “KI wird die Cybersicherheit maßgeblich prägen – für Verteidiger und Angreifer”
- 10:35 : D-Trust: Hinter “Angriff” auf Antragsportal steckte wohl White-Hat-Hacker
- 10:35 : Hacking-Wettbewerb: Pwn2Own-Teilnehmer knacken Tesla-Ladestation
- 10:34 : Apono’s 2024 Achievements Set the Stage for Innovative Cloud Access Management in 2025
- 10:34 : Salt Typhoon Hacked Nine U.S. Telecoms, Tactics and Techniques Revealed
- 10:34 : DoJ Indicts 5 Individuals for $866K North Korean IT Worker Scheme Violations
- 10:10 : [NEU] [kritisch] Cambium Networks cnPilot und cnMaestro: Schwachstelle ermöglicht Codeausführung
- 10:9 : HellCat and Morpheus Ransomware Share Identical Payloads for Attacks
- 10:9 : SonicWall warns of a critical CVE-2025-23006 zero-day likely exploited in the wild
- 10:9 : Conduent Confirms Cyberattack After Government Agencies Report Outages
- 9:32 : Adapting fraud prevention for the hybrid working world
- 9:32 : US indicts five individuals in crackdown on North Korea’s illicit IT workforce
- 9:32 : Ransomware Gangs Linked by Shared Code and Ransom Notes
- 9:14 : [UPDATE] [kritisch] Cacti: Schwachstelle ermöglicht Codeausführung
- 9:14 : [UPDATE] [mittel] cyrus imapd: Schwachstelle ermöglicht Denial of Service
- 9:14 : [UPDATE] [mittel] jQuery: Mehrere Schwachstellen ermöglichen Cross-Site Scripting
- 9:14 : [UPDATE] [mittel] cyrus imapd: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen
- 8:37 : OpenAI stellt Operator vor: Welche Aufgaben euch der KI-Agent abnimmt – und welche nicht
- 8:37 : GI-Forderung nach modernem Computerstrafrecht
- 8:37 : Trustcenter der Bundesdruckerei: Angriff auf D-Trust wohl von White-Hat-Hacker
- 8:36 : Aviat Networks enhances software cybersecurity offering
- 8:36 : TSA’s Pekoske ousted, CISOs’ boardroom gain, Cisco vulnerability fix
- 8:36 : Stolen Credentials From Leading Cyber Security Vendors Selling For $10: Cyber Security Today, Friday, Jan 24, 2025
- 8:10 : Logindaten und ChatGPT-Keys im Visier: Details zu Attacke auf Chrome-Extensions
- 8:10 : Jetzt patchen: Cross-Site-Scripting und Denial of Service in GitLab möglich
- 8:10 : Cyberangriff auf Schulen in Rheinland-Pfalz: Steckt Lockbit dahinter?
- 8:9 : Safeguarding Vital Sectors: The Need for Enhanced Security Practices in Critical Infrastructure Amid Rising Cyberattacks
- 8:9 : Android’s New Identity Check Feature Locks Device Settings Outside Trusted Locations
- 8:5 : IT Security News Hourly Summary 2025-01-24 09h : 6 posts
- 7:33 : Angriffe auf alte jQuery-Bibliotheken beobachtet
- 7:32 : 370+ Ivanti Connect Secure Exploited Using 0-Day Vulnerability
- 7:32 : Fear of Blame in Cybersecurity: Irish Workers Hesitant to Report Breaches
- 7:12 : Partnerangebot: mITSM – Munich Institute for IT Service Management GmbH – ISO 27001 Foundation Schulung
- 7:11 : BASHE Ransomware Allegedly Leaked ICICI Bank Customers Data
- 7:11 : The Unchanging Nature of Human Nature
- 6:37 : Anzeige: Cyberangriffe durch sichere Webentwicklung verhindern
- 6:34 : BCR Cyber and Maryland Association of Community Colleges Allocated $1.5 Million State Investment as Part of Maryland Governor’s Proposed Economic Growth Agenda
- 6:34 : Only 7 percent of organizations recover data after paying a ransom in malware attacks
- 6:34 : VPN Usage Surges Amid Age Verification Laws on Adult Websites
- 6:34 : CISA Adds Five-Year-Old jQuery XSS Flaw to Exploited Vulnerabilities List