210 posts were published in the last hour
- 22:58 : IT Security News Weekly Summary 47
- 22:55 : IT Security News Daily Summary 2024-11-24
- 0:5 : IT Security News Hourly Summary 2024-11-24 01h : 1 posts
- 23:5 : IT Security News Hourly Summary 2024-11-24 00h : 1 posts
- 22:55 : IT Security News Daily Summary 2024-11-23
- 23:5 : IT Security News Hourly Summary 2024-11-23 00h : 1 posts
- 22:55 : IT Security News Daily Summary 2024-11-22
- 0:5 : IT Security News Hourly Summary 2024-11-22 01h : 1 posts
- 23:7 : IT Security News Hourly Summary 2024-11-22 00h : 1 posts
- 22:55 : IT Security News Daily Summary 2024-11-21
- 19:5 : IT Security News Hourly Summary 2024-11-21 20h : 32 posts
- 18:43 : Put your usernames and passwords in your will, advises Japan’s government
- 18:43 : Now Online Safety Act is law, UK has ‘priorities’ – but still won’t explain ‘spy clause’
- 18:43 : ‘Alarming’ security bugs lay low in Linux’s needrestart server utility for 10 years
- 18:43 : Chinese ship casts shadow over Baltic subsea cable snipfest
- 18:43 : 2,000 Palo Alto Firewalls Compromised via New Vulnerabilities
- 18:43 : API (In)security: The Hidden Risk of Black Friday
- 18:43 : Let’s Build A Dashboard!
- 18:43 : AI in Cybercrime: Hackers Exploiting OpenAI
- 18:43 : Why RBAC is Still a Big Deal in 2024
- 18:43 : Here’s Yet Another D-Link RCE That Won’t be Fixed
- 18:43 : US Exposes Major Chinese Cyber-Espionage Targeting Telecom Networks
- 18:43 : New Ghost Tap Assault Exploits NFC Mobile Payments to Steal Funds
- 18:43 : Creating a Strong Cybersecurity Culture: The Key to Business Resilience
- 18:43 : How Agentic AI Will Change the Way You Work
- 18:43 : The Hidden Dangers of Compromised Wi-Fi Routers
- 18:43 : North Korean Front Companies Impersonate U.S. IT Firms to Fund Missile Programs
- 18:43 : 10 Most Impactful PAM Use Cases for Enhancing Organizational Security
- 18:43 : Chinese APT Gelsemium Targets Linux Systems with New WolfsBane Backdoor
- 18:42 : Warning: Over 2,000 Palo Alto Networks Devices Hacked in Ongoing Attack Campaign
- 18:42 : Securing AI and Cloud with the Zero Day Quest
- 18:6 : AI innovations for a more secure future unveiled at Microsoft Ignite
- 18:6 : US charges five alleged members of Scattered Spider gang
- 18:6 : Cyber Story Time: The Boy Who Cried “Secure!”
- 18:6 : Google OSS-Fuzz Harnesses AI to Expose 26 Hidden Security Vulnerabilities
- 18:6 : Vietnam’s Infostealer Crackdown Reveals VietCredCare and DuckTail
- 18:6 : Linux Malware WolfsBane and FireWood Linked to Gelsemium APT
- 18:5 : EPA warns of critical risks, Four million WordPress sites exposed, Sextortion scams bypass filters
- 18:5 : Easterly to step down, Maxar discloses breach, Microsoft hacking event
- 18:5 : Scattered Spider arrest, telcos attacked, Apple exploit
- 18:5 : Microsoft Unveils New Cybersecurity Features at Ignite Conference: Cyber Security Today for November 20, 2024
- 18:5 : Important changes to CloudTrail events for AWS IAM Identity Center
- 18:5 : Securing the RAG ingestion pipeline: Filtering mechanisms
- 17:14 : Malicious QR codes sent in the mail deliver malware
- 17:14 : C-Level Fireside Chat Uncovers the Truth About Data Security’s Hardest Battles
- 17:14 : DEF CON 32 – Spies And Bytes: Victory In The Digital Age
- 17:14 : Amazon Employee Data Leaked in MOVEit Attack Fallout
- 17:14 : Reimagining Healthcare with Synthetic Data
- 16:12 : Akamai?s Perspective on November?s Patch Tuesday 2024
- 16:12 : The Rising Threat of Cloud Ransomware: A Global Concern for Businesses of All Sizes
- 16:12 : Northvolt Mulls US Bankruptcy Protection – Report
- 16:12 : Microsoft Power Pages Misconfigurations Expose Millions of Records Globally
- 16:12 : Critical TP-Link DHCP Vulnerability Let Attackers Execute Arbitrary Code Remotely
- 16:12 : CISA’s Vulnerability Management goes “Big” on Interns and the Results are Staggering!
- 16:12 : Surfshark VPN review: One of our favorite budget VPNs with unlimited connections
- 16:11 : Simplifying endpoint security
- 16:11 : Palo Alto Networks Confirms New Zero-Day Being Exploited by Threat Actors
- 15:5 : Important Update: IP Address Change for VirusTotal
- 15:5 : Critical TP-Link DHCP Vulnerability Let Attackers Execute Arbitary Code Remotely
- 15:5 : Cybersecurity dominates concerns among the C-suite, small businesses and the nation
- 15:5 : Talking to the C-Suite About Cybersecurity
- 15:5 : Bitfinex burglar bags 5 years behind bars for Bitcoin heist
- 15:5 : Gmail Alert: Massive Phishing Campaign Spreads Rhadamanthys Malware
- 15:5 : Updated whitepaper: Architecting for PCI DSS Segmentation and Scoping on AWS
- 14:8 : Whatsapp erinnert euch jetzt an unfertige Nachrichten – so funktioniert es
- 14:8 : Wie KI räumliche Vorstellungskraft erhalten soll
- 14:8 : ChatGPT-App bekommt nützliche Updates: Was Windows- und macOS-Nutzer ab sofort erwartet
- 14:8 : Das erste Remote-Meeting fand schon vor 108 Jahren statt – und so hat es damals funktioniert
- 14:8 : Gegen den Trend: Diese Foto-App verzichtet ganz bewusst auf KI
- 14:8 : SaaS für Standards digitaler Identitäten
- 14:7 : FTC Plans Investigation Into Microsoft Cloud Business – Report
- 14:7 : 5G network AI models: Threats and Mitigations
- 14:7 : [Free & Downloadable] Cloud Security Policy Template
- 14:7 : SurePath AI Raises $5.2 Million for Gen-AI Governance Solution
- 14:7 : Cyber crooks push Android malware via letter
- 14:7 : Cybercriminals hijack DNS to build stealth attack networks
- 14:7 : Master Certificate Management: Join This Webinar on Crypto Agility and Best Practices
- 14:7 : Researchers Warn of Privilege Escalation Risks in Google’s Vertex AI ML Platform
- 14:7 : Bitfinex Hacker Jailed for Five Years Over Billion Dollar Crypto Heist
- 13:10 : MacOS 15.1: Apple patcht Drittanbieter-Firewalls kaputt
- 13:10 : Onlinebetrug: Netzwerk nutzt Fake-Shops, um Kreditkartendaten zu stehlen
- 13:10 : [UPDATE] [mittel] Linux Kernel: Schwachstelle ermöglicht nicht spezifizierten Angriff
- 13:10 : [UPDATE] [mittel] expat: Schwachstelle ermöglicht Denial of Service
- 13:9 : Microsoft Released November 2024 Patch Tuesday With ~90 Fixes
- 13:9 : The Importance of Data Security Posture Management (DSPM) in Today’s Digital Landscape
- 13:9 : The Role of Proxies in Modern Cybersecurity & Protecting Data
- 13:9 : Halliburton Cyberattack Update: Losses Worth $35 Million Hit The Firm
- 13:9 : Good Essay on the History of Bad Password Policies
- 13:9 : Interconnectivity and cyber risk: A double-edged sword
- 13:9 : Guarding the Games: Cybersecurity and the 2024 Summer Olympics
- 13:9 : API Security Day – powered by APIDays & Escape
- 13:9 : watchTowr Finds New Zero-Day Vulnerability in Fortinet Products
- 12:12 : Sicherheitsfunktionen: Android soll Scam-Anrufe und Malware-Apps besser erkennen
- 12:12 : Beute teils in Gold vergraben: Bitcoin-Dieb zu fünf Jahren Haft verurteilt
- 12:12 : Programmer Sentenced To Five Years In Prison For Bitcoin Laundering
- 12:12 : Cybercriminals Launch SEO Poisoning Attack to Lure Shoppers to Fake Online Stores
- 12:12 : Chinese SilkSpecter Hackers Attacking Black Friday Shoppers
- 12:12 : Iranian “Dream Job” Cyber Campaign Targets Aerospace Sector
- 12:12 : Google Debuts Online Fraud and Scams Advisory
- 12:12 : Ransomware Attacks on Healthcare Sector Surge in 2024
- 12:12 : Known Brand, Government Domains Hijacked via Sitting Ducks Attacks
- 12:11 : Palo Alto Networks firewalls, Expedition under attack (CVE-2024-9463, CVE-2024-9465)
- 12:11 : Vietnamese Hacker Group Deploys New PXA Stealer Targeting Europe and Asia
- 11:30 : [UPDATE] [UNGEPATCHT] [kritisch] PaloAlto Networks PAN-OS: Schwachstelle ermöglicht Codeausführung
- 11:8 : WordPress-Plug-in Really Simple Security gefährdet 4 Millionen Websites
- 11:8 : [UPDATE] [kritisch] PaloAlto Networks Expedition: Mehrere Schwachstellen
- 11:7 : Black Basta Ransomware Leveraging Social Engineering For Malware Deployment
- 11:7 : Research Highlights SHA256 Password Security Strengths and Risks
- 11:7 : CISA Warns of Two More Palo Alto Expedition Flaws Exploited in Attacks
- 11:7 : Oscilar Cognitive Identity Intelligence Platform combats AI-powered fraud
- 11:7 : How AI Is Transforming IAM and Identity Security
- 10:30 : [NEU] [mittel] VMware Tanzu Spring Framework: Schwachstelle ermöglicht Denial of Service
- 10:8 : Microsoft Edge: Schwachstelle ermöglicht Offenlegung von Informationen
- 10:8 : Google Chrome / Microsoft Edge: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff
- 10:8 : CISA warnt vor Angriffen auf Palo-Alto-Software
- 10:8 : Cyberangriff auf Destatis: Hacker erbeuten Firmendaten des Statistischen Bundesamtes
- 10:8 : Scambaiting: KI-Großmutter verschwendet Zeit von Telefonbetrügern
- 10:8 : [NEU] [UNGEPATCHT] [mittel] mutt: Mehrere Schwachstellen
- 10:7 : British Students Warned of Smishing Scams
- 10:7 : Critical Laravel Vulnerability CVE-2024-52301 Allows Unauthorized Access
- 10:7 : U.S. CISA adds Palo Alto Networks Expedition bugs to its Known Exploited Vulnerabilities catalog
- 10:7 : Palo Alto Networks Confirms New Firewall Zero-Day Exploitation
- 10:7 : Zero-Day Exploits Surge in 2023, Cisco, Fortinet Vulnerabilities Targeted
- 10:7 : USX Cyber strengthens phishing defense in GUARDIENT XDR
- 10:7 : Bitsight acquires Cybersixgill to help organizations manage cyber exposure
- 10:7 : IBM announces Autonomous Security for Cloud
- 10:7 : Ransomware Groups Use Cloud Services For Data Exfiltration
- 9:12 : Fehlerhafte Patches: Microsoft stoppt Exchange-Server-Updates
- 9:12 : Sicherheitspatches: Apache Traffic Server über mehrere Lücken angreifbar
- 9:11 : ViperSoftX: Tracking And Countering a Persistent Threat
- 9:11 : O2’s AI Granny Outsmarts Scam Callers with Knitting Tales
- 9:11 : NordPass popular passwords, Healthcare extortion sentence, China breached telecoms
- 8:10 : Warum KI den Quantencomputer-Hype beenden könnte – zumindest theoretisch
- 8:10 : Elektronische Zutrittslösung für Münchens Werksviertel-Mitte
- 8:10 : Gegen Enkeltrickbetrug: KI-Omi soll Kriminelle in endlose Gespräche verwickeln
- 8:10 : Wegen Nebenwirkungen: Microsoft stoppt Exchange-Server-Updates
- 8:10 : Sicherheitsupdates: Angreifer können Apache Traffic Server crashen lassen
- 8:9 : CISA Warns of Actors Exploiting Two Palo Alto Networks Vulnerabilities
- 8:9 : 4M+ WordPress Websites to Attacks, Following Plugin Vulnerability
- 8:9 : High-Severity Flaw in PostgreSQL Allows Hackers to Exploit Environment Variables
- 8:9 : New Report Details Cyber Security Scams For Retailers At Christmas: Cyber Security Today for Friday, November 15, 2024
- 7:6 : heise-Angebot: iX-Workshop: Nach dem Einbruch – Digital Forensics & Incident Response (DFIR)
- 7:5 : Top industries facing cyber threats
- 7:5 : Bitsight acquires Cybersixgill for $115 Million
- 7:5 : The invisible cyber shield that combats morphing threats
- 7:5 : Microsoft Power Pages misconfigurations exposing sensitive data
- 7:5 : CISA Flags Two Actively Exploited Palo Alto Flaws; New RCE Attack Confirmed
- 7:5 : Bitfinex Hacker Sentenced to 5 Years, Guilty of Laundering $10.5 Billion in Bitcoin
- 6:11 : For Today’s Enterprise, Modern IGA Helps Control Your Acceleration
- 6:11 : Enhancing security posture through advanced offensive security testing
- 6:11 : ESET APT Activity Report Q2 2024–Q3 2024: Key findings
- 6:11 : AI’s impact on the future of web application security
- 6:11 : CISA Flags Critical Palo Alto Network Flaws Actively Exploited in the Wild
- 5:11 : An Interview With the Target & Home Depot Hacker
- 5:11 : Critical vulnerabilities persist in high-risk sectors
- 5:11 : Using AI to drive cybersecurity risk scoring systems
- 4:8 : Chinas Cyberspione greifen Telefondaten und -gespräche von US-Netzbetreibern ab
- 4:7 : NIST report on hardware security risks reveals 98 failure scenarios
- 4:7 : New infosec products of the week: November 15, 2024
- 3:11 : 2024-11-14 – Raspberry Robin infection using WebDAV server
- 3:11 : Examining the Role of Asset Recovery in Safeguarding Data: Ten Points IT Professionals Should Know
- 3:11 : Palo Alto Networks Issues AI Red Alert
- 1:9 : Hackers target critical flaw CVE-2024-10914 in EOL D-Link NAS Devices
- 23:7 : Kein Ausschluss: EU lobt wohl heimlich die deutsche Huawei-Regelung
- 23:7 : Fake North Korean IT Worker Linked to BeaverTail Video Conference App Phishing Attack
- 23:7 : 122 million people’s business contact info leaked by data broker
- 23:7 : Fortinet patches VPN app flaw that could give rogue users, malware a privilege boost
- 23:7 : DEF CON 32 – Redefining V2G: How To Use Your Vehicle As Game Controller
- 22:4 : What is identity governance and administration (IGA)?
- 21:9 : Is your iPhone rebooting after being inactive? It’s a feature, not a bug
- 21:9 : Meet Andy Zollo, SVP of APJ Sales
- 21:9 : Business Logic Attacks Target Election-Related Sites on Election Day
- 21:9 : Cybercriminal devoid of boundaries gets 10-year prison sentence
- 21:9 : Blinded by Silence
- 20:3 : Gefälschte QR-Codes am Parkautomaten – LKA warnt vor Betrugsmasche
- 20:3 : Mal wieder: EU-Kommission verhängt hohe Strafe gegen Meta
- 20:3 : Google Maps: Dieses Feature macht eure Reisen länger – aber auch schöner
- 20:3 : Warum dieses Startup Menschen Kameras auf den Rücken schnallt – und was das mit generativer KI zu tun hat
- 20:3 : Google bringt Gemini-App jetzt auch fürs iPhone nach Deutschland
- 20:2 : Wordfence Intelligence Weekly WordPress Vulnerability Report (November 4, 2024 to November 10, 2024)
- 20:2 : Pirates in the Data Sea: AI Enhancing Your Adversarial Emulation
- 20:2 : Hate Speech Watchdog CCDH To Quit Musk’s X
- 20:2 : These 8 Apps on Google Play Store Contain Android/FakeApp Trojan
- 20:2 : Black Friday bots are coming—is your e-commerce site prepared?
- 19:9 : Building complex gen AI models? This data platform wants to be your one-stop shop
- 19:9 : The 10 most popular passwords of 2024 are also the worst: 5 easy ways to do better
- 19:9 : “Why Is It So Expensive To Repair My Devices?”
- 19:9 : Phishing Scams use Microsoft Visio Files to Steal Information
- 19:9 : Experts Uncover 70,000 Hijacked Domains in Widespread ‘Sitting Ducks’ Attack Scheme
- 18:9 : Elon Musk Rebuked By Italian President Over Migration Tweets
- 18:9 : Meta Fined €798m Over Alleged Facebook Marketplace Violations
- 18:9 : Bitsight buys dark web security specialist Cybersixgill for $115M
- 18:9 : New Apple security feature reboots iPhones after 3 days, researchers confirm
- 18:9 : Iranian Hackers Target Aerospace Industry in ‘Dream Job’ Campaign
- 17:17 : The CrowdStrike Incident: The Devil is in the Details, and Chaos is in the Code
- 17:16 : Silverfort Expands Cloud Identity Security with Acquisition of Rezonate, Creating First Comprehensive Identity Security Platform
- 17:16 : CISA and FBI: Chinese Hackers Compromised US Telecom Networks
- 17:16 : Anthropic’s new AI tools promise to simplify prompt writing and boost accuracy by 30%
- 17:16 : Securing the AI frontier: Protecting enterprise systems against AI-driven threats
- 17:16 : ShrinkLocker Ransomware: What You Need To Know
- 17:16 : Infoblox: 800,000 domains vulnerable to hijacking attack
- 17:16 : China-linked threat actors compromised multiple telecos and spied on a limited number of U.S. government officials
- 17:16 : The Intersection of Marketing and Technology
- 17:16 : Fortifying the Future: AI Security Is The Cornerstone Of The AI And GenAI Ecosystem
- 17:16 : Bitsight to Acquire Cybersixgill for $115 Million
- 17:16 : NIST Clears Backlog of Known Security Flaws but Not All Vulnerabilities
- 17:16 : Microsoft Power Pages Misconfiguration Leads to Data Exposure
- 17:16 : Sitting Ducks DNS Attacks Put Global Domains at Risk
- 17:16 : World’s Top 200 Common Passwords continue to be incredibly weak
- 16:12 : 4,000,000 WordPress Sites Using Really Simple Security Free and Pro Versions Affected by Critical Authentication Bypass Vulnerability