210 posts were published in the last hour
- 22:55 : IT Security News Daily Summary 2025-06-01
- 21:32 : Threat Hunting 101 Proactive Strategies for Technical Teams
- 21:32 : Securing IoT Devices in the Enterprise Challenges and Solutions
- 21:4 : OffensiveCon25 – Pwn20wn Winners Announcement
- 20:5 : IT Security News Hourly Summary 2025-06-01 21h : 1 posts
- 20:2 : CISOs Playbook for Managing Boardroom Cybersecurity Concerns
- 18:32 : Supply Chain Security Mitigating Third-Party Risks
- 18:4 : Automating Patch Management Reducing Vulnerabilities at Scale
- 18:4 : Governments Release New Regulatory AI Policy
- 17:5 : Technology Meets Therapy as AI Enters the Conversation
- 17:5 : Coinbase Offers $20m Bounty to Take Down Perpetrators Behind Social Engineering Attack
- 17:5 : IT Security News Hourly Summary 2025-06-01 18h : 2 posts
- 16:2 : Cost of a Breach Calculating ROI for Cybersecurity Investments
- 15:6 : Building a Cyber-Resilient Organization CISOs Roadmap
- 14:32 : Addressing Our ‘Age of Insecurity’ — in Cyber Too
- 14:5 : IT Security News Hourly Summary 2025-06-01 15h : 2 posts
- 14:2 : Two flaws in vBulletin forum software are under attack
- 13:9 : SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 47
- 12:32 : Endpoint Security Reimagined EDR vs XDR Comparison
- 12:5 : Falsch konfigurierte DNS-Einträge: URLs von Bose und Co mit Malware verseucht
- 11:32 : From SOC to SOAR Automating Security Operations
- 11:32 : Insider Threats in 2025 Detection and Prevention Strategies
- 11:32 : Achieving Continuous Compliance in Dynamic Threat Environments
- 11:17 : Lügt Claude seltener als du? Anthropic-CEO behauptet, KI sei zuverlässiger als Menschen
- 11:16 : When your LLM calls the cops: Claude 4’s whistle-blow and the new agentic AI risk stack
- 10:9 : Security Affairs newsletter Round 526 by Pierluigi Paganini – INTERNATIONAL EDITION
- 8:32 : Quantum Threats Preparing Your Encryption Strategy
- 8:32 : Securing the Cloud Best Practices for Multi-Cloud Environments
- 8:32 : Week in review: NIST proposes new vulnerabilities metric, flaws in NASA’s open source software
- 8:5 : YARA 4.5.3 Release, (Sun, Jun 1st)
- 7:8 : OPEN 2025: Axis-Event zu Zukunftstrends in der Sicherheitsbranche
- 5:33 : Anzeige: Cybersecurity-Jobs für IT-Profis mit Verantwortung
- 5:32 : CISOs Guide to Navigating the 2025 Threat Landscape
- 5:32 : Implementing NIST CSF 2.0 A Technical Blueprint
- 5:5 : IT Security News Hourly Summary 2025-06-01 06h : 2 posts
- 3:32 : Zero Trust Architecture Building Resilient Defenses for 2025
- 3:32 : Ransomware 2.0 How AI-Powered Attacks Are Evolving
- 2:4 : Network Intrusion Detection for Emerging 2025 Cyber Threats
- 23:33 : Fotos, Videos und Links auf einen Blick: Whatsapp Web bekommt endlich praktischen Media-Hub
- 23:33 : Mit dieser neuen Google-App kannst du KI-Tools auch offline nutzen
- 23:32 : Scalable Strategies for Managing Cloud Machine Identities
- 23:32 : Ensuring Safety in Your Secrets Vaulting Techniques
- 23:32 : Is Innovation Driving Better NHI Management?
- 23:32 : How Secrets Scanning is Evolving for Better Security
- 23:5 : IT Security News Hourly Summary 2025-06-01 00h : 2 posts
- 23:1 : IT Security News Weekly Summary June
- 22:55 : IT Security News Daily Summary 2025-05-31
- 22:32 : Mitigating Malware Threats on Unmanaged Endpoint Devices
- 22:32 : Behavioral Monitoring for Real-Time Endpoint Threat Detection
- 21:4 : Streamlined Patch Management for Endpoint Device Security
- 20:5 : IT Security News Hourly Summary 2025-05-31 21h : 3 posts
- 20:2 : This month in security with Tony Anscombe – May 2025 edition
- 19:31 : Securing Remote Endpoints in Distributed Enterprise Systems
- 18:32 : Managing Data Subject Access Requests in Compliance Programs
- 18:32 : Advanced Endpoint Threat Detection in 2025 Network Environments
- 18:32 : CBI Uncovers Tech Support Scam Targeting Japanese Nationals in Multi-State Operation
- 17:11 : Meta überrascht: Whatsapp gibt es jetzt auch fürs iPad – so nutzt du die Tablet-Version optimal
- 17:11 : Apple iOS 19: Was das nächste iPhone-Update bieten soll – und wer es bekommt
- 17:11 : Adobe Firefly: KI-Bilder ohne Urheberrechts-Angst – aber wie gut sind sie wirklich?
- 17:10 : Encrypting Data to Meet Global Privacy Law Requirements
- 17:10 : Post-Quantum Cryptography What CISOs Need to Know
- 17:5 : IT Security News Hourly Summary 2025-05-31 18h : 3 posts
- 16:32 : SK Telecom Malware Breach Exposes 27 Million Phone Numbers
- 16:32 : Hackers Are Fooling IT Help Desks — Here’s How You Can Stay Protected
- 16:4 : Two Linux flaws can lead to the disclosure of sensitive data
- 16:4 : Auditing Data Access Controls for Privacy Regulation Adherence
- 15:32 : BSidesLV24 – Keynotes: Closing Ceremony
- 14:32 : Interlock Ransomware Deploys New NodeSnake RAT in UK Attacks
- 14:5 : Achieving Data Privacy Regulation Compliance in 2025 Frameworks
- 14:5 : IT Security News Hourly Summary 2025-05-31 15h : 1 posts
- 14:4 : Protecting Sensitive Data in Enterprise Systems for Privacy Compliance
- 13:32 : Unlock sensitive data for AI with Cloudera on Red Hat OpenShift
- 12:32 : Phishing-as-a-Service: The Rise of Subscription-Based Cybercrime
- 11:6 : Notfallpass auf dem Smartphone: Dieses Feature nutzt fast niemand – dabei kann es Leben retten
- 11:6 : Maschinen-Psychologie: KI-Modelle wehren sich gegen Abschaltung – Was hinter dem Verhalten steckt
- 11:5 : IT Security News Hourly Summary 2025-05-31 12h : 3 posts
- 11:4 : The Human Element: Why AI-Generated Content Is Killing Authenticity
- 10:34 : Keeper Security Introduces Bidirectional One-Time Sharing Feature to Its Password Manager Platform
- 10:34 : Mysterious leaker GangExposed outs Conti kingpins in massive ransomware data dump
- 10:34 : New Linux Flaws Allow Password Hash Theft via Core Dumps in Ubuntu, RHEL, Fedora
- 10:2 : Remote Work and AI Scams Are Making Companies Easier Targets for Hackers
- 10:2 : ESXi Environment Infiltrated Through Malicious KeePass Installer
- 10:2 : Foxconn’s Chairman Warns AI and Robotics Will Replace Low-End Manufacturing Jobs
- 8:32 : U.S. DoJ Seizes 4 Domains Supporting Cybercrime Crypting Services in Global Operation
- 8:5 : IT Security News Hourly Summary 2025-05-31 09h : 2 posts
- 7:32 : IT-Lösungen für Einsatzkräfte der Feuerwehr
- 7:32 : Pig Butchering: Operation Shamrock Fights Back
- 7:32 : Guide for delivering frequently software features that matter (series) #1/2: the Pillars of successful frequent delivery
- 7:6 : Schwachstellen betrafen Corplife, hunderttausende Lieferdienst-Logins & mehr
- 7:5 : Threat Actors Leverage Google Apps Script To Host Phishing Websites
- 7:5 : Are You Anticipating NHIDR Threats Effectively?
- 7:5 : Empowering Your Team with Strong IAM Practices
- 7:5 : Can We Rely on Current Secrets Management Solutions?
- 7:5 : How Secure Are Your Non-Human Identities in the Cloud?
- 6:3 : A PNG Image With an Embedded Gift, (Sat, May 31st)
- 6:2 : LexisNexis Risk Solutions Data Breach Exposes 364,000 individuals personal Data
- 6:2 : Authorities Dismantled AVCheck, a Tool For Testing Malware Against Antivirus Detection
- 5:7 : Anzeige: Hacking verstehen, Systeme schützen – im E-Learning-Format
- 5:5 : IT Security News Hourly Summary 2025-05-31 06h : 1 posts
- 4:32 : Tycoon2FA Infra Used by Dadsec Hacker Group to Steal Office365 Credentials
- 3:32 : Beware of Weaponized AI Tool Installers That Infect Your Devices With Ransomware
- 2:5 : IT Security News Hourly Summary 2025-05-31 03h : 4 posts
- 1:2 : Pure Crypter Employs Multiple Evasion Techniques To Bypass Windows 11 24H2 Security Features
- 0:33 : Weaponized PyPI Package Steals Solana Private Keys Via Supply Chain Attack
- 0:33 : Hackers Drop Info-Stealing Malware On TikTok Users Device Using AI-Generated Videos
- 0:33 : Microsoft Reveals Techniques To Defending Against Advancing AiTM Attacks
- 23:5 : IT Security News Hourly Summary 2025-05-31 00h : 5 posts
- 22:55 : IT Security News Daily Summary 2025-05-30
- 22:2 : New ChatGPT Scam Infects Users With Ransomware: ‘Exercise Extreme Caution’
- 22:2 : USDA Worker, 5 Others Charged in Food Stamp Fraud Operation
- 22:2 : Week in Review: Chrome password replacer, Luna Moth exploits, ChatGPT declines shutdown command
- 21:32 : LOLCLOUD – Azure Arc – C2aaS
- 21:4 : Meta stopped covert operations from Iran, China, and Romania spreading propaganda
- 20:5 : IT Security News Hourly Summary 2025-05-30 21h : 5 posts
- 19:33 : D-LINK Access Point (AP): Schwachstelle ermöglicht Codeausführung
- 19:33 : Google Chrome: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff
- 19:33 : Mozilla Firefox und Thunderbird: Mehrere Schwachstellen
- 19:32 : Countering Spear Phishing with Advanced Email Security Solutions
- 19:32 : Uber’s Secret Management Platform – Scaling Secrets Security Across Multi-Cloud
- 19:32 : SentinelOne Outage Leaves Security Teams Hanging for Six Hours
- 19:7 : ConnectWise customers get mysterious warning about ‘sophisticated’ nation-state hack
- 19:7 : A Hacker May Have Deepfaked Trump’s Chief of Staff in a Phishing Campaign
- 19:7 : She Got an Abortion. So A Texas Cop Used 83,000 Cameras to Track Her Down.
- 19:7 : Deadline Extended: More Time to Submit Your Proposal for the OpenSSL Conference 2025
- 18:33 : Feds arrest DoD techie, claim he dumped top secret files in park for foreign spies to find
- 18:33 : Detecting Evolving Phishing Campaigns in 2025 Cyber Environments
- 18:33 : Million-dollar Salaries, Board Influence Mark the CISO’s Rise
- 18:33 : Ransomware Attack Disrupts Kettering Health Network, Elective Procedures Canceled Across 14 Ohio Facilities
- 18:5 : Datensparsamkeit war gestern: Datenlecks bei Corplife und Lieferdiensten
- 18:5 : US medical org pays $50M+ to settle case after crims raided data and threatened to swat cancer patients
- 18:4 : BSidesLV24 – PasswordsCon – Cloud Attack: Dissecting Attack Paths With Graph-Mode
- 17:5 : IT Security News Hourly Summary 2025-05-30 18h : 20 posts
- 17:4 : KI als Waffe
- 17:4 : Google Lens trifft Youtube Shorts: Was euch die Bildsuche bei den kurzen Clips bringt
- 17:4 : Mehr KI und ein neuer Editor: Google Fotos bekommt großes Update
- 17:4 : KI schlägt bald Bitcoing-Mining als Stromfresser: Warum ein Experte dabei nicht nur den Energieverbrauch kritisiert
- 17:4 : Office-Dateien mit Android-Smartphones teilen: So geht es jetzt auch ohne Microsoft-Account
- 17:4 : Diese neue Gmail-Funktion spart euch viel Zeit – doch es gibt einen Haken
- 17:4 : Datensparsamkeit Fehlanzeige: Datenleck bei Corplife, Lieferdiensten & Webshops
- 17:2 : Attackers Exploit Microsoft Entra Billing Roles to Escalate Privileges in Organizational Environments
- 17:2 : Meta – yep, Facebook Meta – is now a defense contractor
- 17:2 : British supermarkets’ Supplier of Refrigerated Goods Hit by a Ransomware Attack
- 16:33 : Cybersecurity Workforce Research Report: Cybersecurity wird zum Teamsport
- 16:32 : Cops in Germany Claim They’ve ID’d the Mysterious Trickbot Ransomware Kingpin
- 16:32 : Eight things we learned from WhatsApp vs. NSO Group spyware lawsuit
- 16:32 : Sustaining Digital Certificate Security – Upcoming Changes to the Chrome Root Store
- 16:4 : Microsoft Unit In Russia To File For Bankruptcy
- 16:4 : Threat Actors Exploit Google Apps Script to Host Phishing Sites
- 16:4 : White House investigating how Trump’s chief of staff’s phone was hacked
- 16:4 : Detecting Deepfake Threats in Authentication and Verification Systems
- 15:35 : Cybersicherheit in der Supply Chain: Vertrauen ist gut, Kontrolle ist Pflicht
- 15:31 : Dadsec Hacker Group Uses Tycoon2FA Infrastructure to Steal Office365 Credentials
- 15:10 : Beware: Weaponized AI Tool Installers Infect Devices with Ransomware
- 15:10 : Is T-Mobile secretly recording your phone’s screen? How to check and turn it off
- 15:10 : Guide for delivering frequently software features that matter (series) #1/2
- 15:10 : Guide for delivering frequently software features that matter (series) #2/2: Challenges and the path forward
- 15:10 : CVE-2025-0655 – Remote Code Execution in D-Tale via Unprotected Custom Filters
- 15:10 : OffSec’s Take on the Global Generative AI Adoption Index
- 15:10 : New Malware Compromise Microsoft Windows Without PE Header
- 15:10 : Critical Icinga 2 Vulnerability Allows Attackers to Bypass Validation and Obtain Certificates
- 15:9 : Implementing Post-Quantum Cryptography for Future-Proof Security
- 15:9 : Deloitte Data Breach: Alleged Leak of Source Code & GitHub Credentials
- 15:9 : US Sanctions Philippine Company for Supporting Crypto Scams
- 15:9 : Firebase, Google Apps Script Abused in Fresh Phishing Campaigns
- 15:9 : New EDDIESTEALER Malware Bypasses Chrome’s App-Bound Encryption to Steal Browser Data
- 15:9 : Mandatory Ransomware Payment Disclosure Begins in Australia
- 14:32 : Texas Lawmakers Fail In Bid To Ban Social Media For Under 18s
- 14:32 : Attackers Exploit Microsoft Entra Billing Roles to Escalate Privileges
- 14:32 : Pure Crypter Uses Multiple Evasion Methods to Bypass Windows 11 24H2 Security Features
- 14:32 : Google Unveils AI With Deep Reasoning and Creative Video Capabilities
- 14:32 : Google’s AI Virtual Try-On Tool Redefines Online Shopping Experience
- 14:8 : Krieg: Nokia und Rheinmetall-Tochter bauen 5G-Militärnetze
- 14:7 : The Akamai Innovation Tour: A Journey in Perspective and Partnership
- 14:7 : Critical Icinga 2 Vulnerability Allows Attackers to Obtain Valid Certificates
- 14:7 : Microsoft Reveals Techniques for Defending Against Evolving AiTM Attacks
- 14:7 : IT Security Guru picks for Infosecurity Europe 2025
- 14:7 : Smarter Defenses: How AI Improves Security for Low/No-Code and Vibe Coded Applications
- 14:7 : Zero Trust Architecture Adoption for Enterprise Security in 2025
- 14:5 : IT Security News Hourly Summary 2025-05-30 15h : 13 posts
- 13:33 : Sicherheitsexpo 2025: KRITIS im Fokus
- 13:32 : INE Security and RedTeam Hacker Academy Announce Partnership to Advance Cybersecurity Skills in the Middle East
- 13:32 : Threat Actor Claims TikTok Breach, Puts 428 Million Records Up for Sale
- 13:32 : Hackers Use Gh0st RAT to Hijack Internet Café Systems for Crypto Mining
- 13:32 : Cops in Germany Claim They’ve ID’d the Mysterious Trickbot Ransomware Kingpin
- 13:32 : Watch Now: Why Context is a Secret Weapon in Application Security Posture Management
- 13:7 : New Study Uncovers Multiple Vulnerabilities in WeChat and IM Apps
- 13:7 : Windows 11 Security Update for 22H2 & 23H2 May Cause Recovery Errors
- 13:7 : How AI coding agents could destroy open source software
- 13:7 : What is security?
- 13:7 : Quantum Computing Threats to Traditional Cryptographic Systems
- 13:7 : US Banks Urge SEC to Repeal Cyber Disclosure Rule
- 12:32 : Exploits and vulnerabilities in Q1 2025
- 12:32 : Zscaler Moves to Acquire Red Canary MDR Service
- 12:8 : Schadcode-Attacken auf IBM Db2 und Tivoli Monitoring möglich
- 12:8 : Sicherheitslücke: Warum ChatGPT oft den gesamten Onedrive-Ordner lesen kann
- 12:8 : [NEU] [mittel] Linux Kernel: Mehrere Schwachstellen
- 12:7 : US SEC Drops Lawsuit Against Binance Crypto Exchange
- 12:7 : Victoria’s Secret US Website Restored After Security Incident
- 12:7 : MICI NetFax Server Flaws Allow Attackers to Execute Remote Code
- 12:7 : Generative AI Exploitation in Advanced Cyber Attacks of 2025
- 12:7 : Critical Cisco IOS XE Vulnerability Allows Arbitrary File Upload – PoC Released
- 12:7 : North Korean IT Workers Leverages Legitimate Software & Network Behaviors To Bypass EDR
- 12:7 : New BitM Attack Exploits Safari Vulnerability to Steal Login Credentials
- 12:7 : Windows 11 Security Update for Version 22H2 & 23H2 May Lead to Recovery Error
- 11:34 : [NEU] [mittel] Acronis Cyber Protect: Mehrere Schwachstellen
- 11:33 : [NEU] [hoch] VMware Tanzu Spring Cloud Gateway Server: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen
- 11:33 : Victoria’s Secret Website Down Following Security Incident
- 11:33 : Why Take9 Won’t Improve Cybersecurity
- 11:32 : MITRE Publishes Post-Quantum Cryptography Migration Roadmap
- 11:32 : Chinese Hacking Group APT41 Exploits Google Calendar to Target Governments