210 posts were published in the last hour
- 22:55 : IT Security News Daily Summary 2024-12-22
- 21:5 : How to craft a comprehensive data cleanliness policy
- 20:5 : IT Security News Hourly Summary 2024-12-22 21h : 4 posts
- 20:3 : Veo 2 im Test: Darum bevorzugen 67% der User Googles Video-KI gegenüber OpenAI
- 20:3 : Googles Whisk: So einfach kombiniert die KI Bilder und erschafft einzigartige Kunstwerke
- 19:32 : DEF CON 32 – NTLM: The Last Ride
- 19:5 : Cybersecurity Essentials : Key to Success for All Businesses to Navigate Security
- 17:7 : Apple might be working on a smart doorbell
- 15:32 : Security Affairs newsletter Round 503 by Pierluigi Paganini – INTERNATIONAL EDITION
- 15:32 : SECURITY AFFAIRS MALWARE NEWSLETTER – ROUND 25
- 15:9 : Beware of Fake Delivery Text Scams During Holiday Shopping
- 15:9 : Thousands of SonicWall Devices Vulnerable to Critical Security Threats
- 14:32 : Phishing Scams Target YouTubers: Malware Hidden in Fake Brand Deals
- 14:32 : AMD Systems Vulnerability Could Threaten Encrypted Data Protection
- 14:6 : KI-Agenten als Arbeitsunterstützung: Mit diesem Tool geht es ganz einfach
- 14:6 : 500.000 Dollar Preisgeld: Verstehen wir bald, was Bello uns sagt?
- 14:5 : IT Security News Hourly Summary 2024-12-22 15h : 1 posts
- 13:7 : The Urgent Need for Data Minimization Standards
- 12:4 : Ransomware: USA machen LockBit-Entwickler den Prozess
- 9:33 : US charged Dual Russian and Israeli National as LockBit Ransomware developer
- 9:33 : Week in review: MUT-1244 targets both security workers and threat actors, Kali Linux 2024.4 released
- 8:40 : Comelit Group mit neuem Vorstandsmitglied
- 8:5 : IT Security News Hourly Summary 2024-12-22 09h : 1 posts
- 7:9 : RIIG Announces Two New Board Members to Guide Strategy and Accelerate Growth
- 6:32 : The UK’s Cybersecurity Landscape: Key Trends and Challenges for 2025
- 6:8 : Anzeige: 50 Prozent Rabatt auf IT-Sicherheit und Linux-Administration
- 23:5 : IT Security News Hourly Summary 2024-12-22 00h : 2 posts
- 22:55 : IT Security News Daily Summary 2024-12-21
- 22:32 : BadBox rapidly grows, 190,000 Android devices infected
- 20:32 : DEF CON 32 – Grand Theft Actions Abusing Self Hosted GitHub Runners
- 20:5 : IT Security News Hourly Summary 2024-12-21 21h : 1 posts
- 20:3 : Apples Homekit für alle: So verbessert die quelloffene Homebridge euer Smarthome
- 17:32 : EFF Tells Appeals Court To Keep Copyright’s Fair Use Rules Broad And Flexible
- 15:32 : Novel Android NoviSpy Spyware Linked to Qualcomm Zero-Day Flaws
- 15:32 : Hackers Infect Security Researchers with Malware to Steal WordPress Credentials
- 14:5 : IT Security News Hourly Summary 2024-12-21 15h : 2 posts
- 14:3 : Weihnachtliche Inspiration: Die 5 besten Bücher über KI als Geschenkidee
- 14:3 : KI außer Kontrolle? Ex-Google-Chef Schmidt warnt: „Müssen irgendwann den Stecker ziehen"
- 13:4 : Four Ways to Harden Your Code Against Security Vulnerabilities and Weaknesses
- 12:5 : PCI DSS 4.0: A Comprehensive Guide to Enhanced Payment Data Security
- 12:5 : The Rise of Agentic AI: How Hyper-Automation is Reshaping Cybersecurity and the Workforce
- 12:5 : Navigating the Future of Secure Code Signing and Cryptography
- 11:36 : Mystery Drone Sightings Lead to FAA Ban Despite No Detected Threats
- 11:36 : Romanian national was sentenced to 20 years in prison for his role in NetWalker ransomware attacks
- 11:5 : IT Security News Hourly Summary 2024-12-21 12h : 1 posts
- 10:32 : Salt Typhoon Hack: A Grave Threat to U.S. Telecommunications
- 10:3 : FBI Warns of Security Risks in RCS Messaging
- 10:3 : LockBit Developer Rostislav Panev Charged for Billions in Global Ransomware Damages
- 8:32 : Salto-Stiftung für benachteiligte Menschen
- 8:5 : Sozial im Internet: Wir müssen die großen Plattformen hinter uns lassen
- 8:5 : IT Security News Hourly Summary 2024-12-21 09h : 2 posts
- 8:5 : How Fraudsters Are Adopting Cybersecurity Techniques to Bypass Detection
- 8:4 : Cyber Security Today: Year End Panel Discussion. Saturday, December 21, 2024
- 7:5 : Combatting phantom secrets: have you heard of historical secrets scanning?
- 7:4 : Maryland Association of Community Colleges and BCR Cyber Receive TEDCO Grant
- 6:32 : New Report Shows That The U.S. Leads in Anonymous Open-Source Contributions
- 6:5 : Navigating AI Risks: Best Practices for Compliance and Security
- 6:4 : HackerOne Cybersecurity Platform Joins AWS Marketplace
- 5:5 : IT Security News Hourly Summary 2024-12-21 06h : 3 posts
- 5:2 : How to Increase Your Cyber Resilience – and Customer Trust
- 4:5 : 2025 Cybersecurity Predictions
- 4:5 : Could better backups reduce cyber insurance premiums?
- 4:5 : How to Implement a Balanced Approach to Cybersecurity: Prioritizing Mission, Safety, and Compliance
- 3:32 : Fenix24 Debuts Argos99 to Fortify Cyber Resilience and Streamline Incident Recovery
- 2:5 : Nahe an AGI? OpenAI zeigt neue KI-Modelle o3 und o3 Mini über „menschlichem Niveau“
- 0:4 : DEF CON 32 – Laundering Money
- 23:32 : Will AI Drive Efficiency and Budget Growth? Risks, Rewards & Reality
- 23:5 : IT Security News Hourly Summary 2024-12-21 00h : 3 posts
- 23:2 : Week in Review: Data breach impact study, US weighs TP-Link ban, BeyondTrust cyberattack
- 22:55 : IT Security News Daily Summary 2024-12-20
- 22:32 : Sophos fixed critical vulnerabilities in its Firewall product
- 20:32 : Third member of LockBit ransomware gang has been arrested
- 20:7 : Identity and access management tools and features for 2025
- 20:5 : IT Security News Hourly Summary 2024-12-20 21h : 1 posts
- 19:32 : Ninth Circuit Gets It: Interoperability Isn’t an Automatic First Step to Liability
- 19:3 : What Payroll Documents Do You Need to Pay Employees?
- 19:2 : Customs & Border Protection Fails Baseline Privacy Requirements for Surveillance Technology
- 18:32 : LockBit Developer Rostislav Panev, a Dual Russian-Israeli Citizen, Arrested
- 18:32 : How to Test PATCH Requests for API Testing With Playwright Java
- 18:2 : Our Santa wishlist: Stronger identity security for kids
- 17:5 : IT Security News Hourly Summary 2024-12-20 18h : 10 posts
- 16:32 : Tibbo AggreGate Network Manager
- 16:32 : Fortinet Releases Security Updates for FortiManager
- 16:32 : DEF CON 32 – Measuring the Tor Network
- 16:5 : How to delete your X/Twitter account for good (and protect your data)
- 16:5 : How to Prevent DDoS Attacks: 5 Steps for DDoS Prevention
- 16:5 : Video: Brain Cipher Ransomware Hacks Deloitte
- 16:5 : Is There a DDoS Attack Ceiling?
- 16:5 : Ditch The Cloud Security Labels to Nail Detection and Response
- 16:5 : North Korean Hackers Stole $1.34 Billion in Crypto in 2024
- 16:5 : Italy’s Data Protection Watchdog Issues €15m Fine to OpenAI Over ChatGPT Probe
- 15:33 : Russia targets Ukraine sensitive data servers with Cyber Attacks
- 15:33 : Builder.ai Database Misconfiguration Exposes 1.29 TB of Unsecured Records
- 15:33 : Ransomware attack on health giant Ascension hits 5.6 million patients
- 15:33 : Security Serious Unsung Heroes 2024 – Winner’s Spotlight: Best Security Awareness Campaign
- 15:33 : Cybersecurity Snapshot: CISA Hands Down Cloud Security Directive, While Threat from North Korean IT Workers Gets the Spotlight
- 15:33 : How to Handle Secrets in Configuration Management Tools
- 15:33 : Rising Tactics of Winnti Hackers Include Deploying Glutton PHP Backdoors
- 15:33 : CISA Issues Mobile Security Guidelines Amid Cyber Espionage Threats
- 15:33 : Colorado Faces Growing Financial Losses from AI-Powered Scams in 2024
- 15:33 : Bitcoin Security Concerns Amid Quantum Computing Advancements
- 15:3 : Protecting Unmanaged Devices with Armis and Akamai
- 15:3 : Major Enhancements to Akamai API Security, Q4 2024
- 15:3 : TP-Link routers may be banned in the US next year – what that means for you
- 15:3 : New Microsoft guidance for the CISA Zero Trust Maturity Model
- 14:33 : Passkeys: Microsoft kämpft weiter gegen das traditionelle Passwort
- 14:32 : Top AI Trends Every Software Development Company to Follow in 2025
- 14:32 : Why Apple sends spyware victims to this nonprofit security lab
- 14:32 : How Public-Private Collaborations Contribute to Cybercrime Disruption
- 14:5 : IT Security News Hourly Summary 2024-12-20 15h : 8 posts
- 14:3 : Weihnachtsüberraschung: Whatsapp verbessert Anrufqualität und bringt lustige Effekte
- 14:3 : Mit KI gegen Online-Betrug: Mit diesem Tool soll der Chrome-Browser sicherer werden
- 14:3 : EU-Datenschützer wollen gemeinsame Linie für KI-Modelle: Was bedeutet das für ChatGPT?
- 14:3 : ChatGPT: Diese Funktionen für die Desktop-App sind neu
- 14:3 : Neue Farben zum Jahreswechsel: Google Maps bekommt einen neuen Look
- 13:32 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 13:32 : Config Chaos | How IoT and Cloud misconfigurations undermine security
- 13:32 : Getting to Know Katya Pikkarainen
- 13:3 : 20 Jahre Haft: Ransomware-Hacker muss Luxusresort auf Bali aufgeben
- 13:3 : [UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen
- 13:3 : [UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service und unspezifische Angriffe
- 13:2 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 13:2 : In Other News: McDonald’s API Hacking, Netflix Fine, Malware Kills ICS Process
- 12:33 : heise meets … Strafverteidiger spart mit KI bis zu 60 Minuten täglich
- 12:32 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 12:32 : OPSWAT Acquires Fend to Extend Cybersecurity Reach Into OT Platforms
- 12:32 : CISA: Use Signal or other secure communications app
- 12:32 : LockBit Admins Tease a New Ransomware Version
- 12:32 : Ukraine’s Security Service Probes GRU-Linked Cyber-Attack on State Registers
- 12:3 : 20 Jahre Haft: Ransomware-Hacker muss Luxusresort auf Bali abgeben
- 12:3 : Threat Actors Selling Nunu Stealer On Hacker Forums
- 12:3 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 12:2 : Black Duck Expands Leadership Team
- 12:2 : Botnet of 190,000 BadBox-Infected Android Devices Discovered
- 11:34 : Verurteilt: Ransomware-Hacker erhält Millionenstrafe und 20 Jahre Haft
- 11:33 : Christmas “Gift” Delivered Through SSH, (Fri, Dec 20th)
- 11:33 : Now You See Me, Now You Don’t: Using LLMs to Obfuscate Malicious JavaScript
- 11:33 : UK’s ICO Labels Google ‘Irresponsible’ For Tracking Change
- 11:33 : El Salvador To Sell Or Discontinue Bitcoin Wallet, After IMF Deal
- 11:33 : Craig Wright Sentenced For Contempt Of Court
- 11:33 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 11:33 : U.S. CISA adds BeyondTrust software flaw to its Known Exploited Vulnerabilities catalog
- 11:33 : BellaCPP: Discovering a new BellaCiao variant written in C++
- 11:33 : CISA Urges Immediate Patching of Exploited BeyondTrust Vulnerability
- 11:33 : Lazarus Group Spotted Targeting Nuclear Engineers with CookiePlus Malware
- 11:33 : Webcams and DVRs Vulnerable to HiatusRAT, FBI Warns
- 11:6 : Partnerangebot: SerNet GmbH – Konferenz „verinice.XP 2025 – Die Konferenz für Informationssicherheit und Datenschutz“ inkl. Workshops
- 11:6 : [UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service
- 11:5 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 11:5 : French Citizens – 28,445,106 breached accounts
- 11:5 : Rockwell PowerMonitor Vulnerabilities Allow Remote Hacking of Industrial Systems
- 11:5 : Another NetWalker affiliate sentenced to 20 years in prison
- 11:5 : CISA Urges Encrypted Messaging After Salt Typhoon Hack
- 11:5 : IT Security News Hourly Summary 2024-12-20 12h : 5 posts
- 10:33 : Partnerangebot: CyberCompare, A Bosch Business – „Zielkonzept bei der Auswahl eines SOC/MDR-Services“
- 10:33 : Auslaufmodell NTLM: Aus Windows 11 24H2 und Server 2025 teils entfernt
- 10:33 : Fortinet Wireless Manager: Informationen zu kritischer Lücke zurückgehalten
- 10:32 : Siemens UMC Vulnerability Allows Arbitrary Remote Code Execution
- 10:32 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 10:4 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 9:34 : Google Chrome und Microsoft Edge: Mehrere Schwachstellen ermöglichen Codeausführung
- 9:34 : [UPDATE] [mittel] Linux Kernel (ATA over Ethernet): Schwachstelle ermöglicht Denial of Service und Code-Ausführung
- 9:33 : [UPDATE] [mittel] Lenovo BIOS: Mehrere Schwachstellen ermöglichen Codeausführung
- 9:33 : [UPDATE] [hoch] Red Hat Enterprise Linux: Mehrere Schwachstellen
- 9:33 : [UPDATE] [mittel] PostgreSQL: Mehrere Schwachstellen
- 9:33 : Task scams cost Americans almost quarter of a billion dollars
- 9:33 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 9:33 : Unwrapping Christmas scams | Unlocked 403 cybersecurity podcast (ep. 9)
- 9:32 : Raccoon Infostealer operator sentenced to 60 months in prison
- 9:32 : Insider Threat Indicators
- 9:32 : Sophos Issues Hotfixes for Critical Firewall Flaws: Update to Prevent Exploitation
- 9:32 : Rspack npm Packages Compromised with Crypto Mining Malware in Supply Chain Attack
- 9:32 : Ransomware Attackers Target Industries with Low Downtime Tolerance
- 9:4 : Foxit PDF Editor Vulnerabilities Allows Remote Code Execution
- 9:4 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 8:33 : Sicherheitsmanagement: Als Werkstudentin im Profifußball
- 8:32 : Windows 11 Privilege Escalation Vulnerability Lets Attackers Execute Code to Gain Access
- 8:32 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 8:32 : Ransomware Attacks Expose Gaps in Backup Practices: The Case for Modern Solutions
- 8:32 : Amazon health malware, BeyondTrust suffers cyberattack, FortiNet wireless vulnerability
- 8:5 : IT Security News Hourly Summary 2024-12-20 09h : 15 posts
- 8:4 : Nutzerbeschwerden: Zahlreiche Discord-Accounts über Nacht unerwartet gesperrt
- 8:4 : Elektronische Patientenakte: Soll ich widersprechen – oder soll ich nicht?
- 8:3 : NetWalker Ransomware Operator Sentenced to 20 Years in Prison
- 8:3 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 8:3 : Human Risk Management: The “Weakest Link” Emerges as Key to Cybersecurity
- 8:3 : How Data Classification Reduces Insider Threats
- 8:3 : Last Pass Hack Impact Continues: Cyber Security Today for Friday, December 20, 2024
- 7:32 : Silicon In Focus Podcast: Tech in 2025
- 7:32 : CISA Warns of BeyondTrust Privileged Remote Access Exploited in Wild
- 7:32 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 7:32 : Zero-Trust in Web3: Redefining Security for Decentralized Systems
- 7:5 : Rising wave of cyber-attacks targeting YouTube content creators
- 7:5 : The Avast Phishing Awards: Trickiest email headlines of 2024
- 7:5 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 7:5 : Hackers Exploiting Critical Fortinet EMS Vulnerability to Deploy Remote Access Tools
- 6:33 : Ex-BSI-Chef: Schönbohm gewinnt Klage gegen Böhmermann
- 6:32 : CISA Releases Eight New ICS Advisories to Defend Cyber Attacks
- 6:32 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 6:32 : CISA and EPA Warn Water Facilities to Secure Exposed HMIs
- 6:5 : NotLockBit – Previously Unknown Ransomware Attack Windows & macOS
- 6:5 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 6:5 : CISA Adds Critical Flaw in BeyondTrust Software to Exploited Vulnerabilities List
- 5:32 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 5:32 : AI is becoming the weapon of choice for cybercriminals
- 5:32 : Why cybersecurity is critical to energy modernization
- 5:5 : IT Security News Hourly Summary 2024-12-20 06h : 5 posts
- 5:4 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 4:32 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
- 4:32 : India’s Rapido exposed user and driver data through leaky website feedback form