210 posts were published in the last hour
- 22:32 : Zukunft der europäischen Cybersicherheit ist automatisiert
 - 22:32 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
 - 22:9 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
 - 21:32 : Docker Security Best Practices for Enterprise Applications: From Development to Production
 - 21:32 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
 - 21:32 : Small model, big impact: Patronus AI’s Glider outperforms GPT-4 in key AI evaluation tasks
 - 21:32 : Protecting Your Heart and Wallet: A Guide to Safe Charitable Giving
 - 21:3 : 2024-12-18 – One week of server scans and probes and web traffic
 - 21:3 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
 - 21:2 : Traveling soon? You can share your luggage’s location with these airlines now, thanks to Apple AirTags
 - 20:33 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
 - 20:5 : IT Security News Hourly Summary 2024-12-19 21h : 20 posts
 - 20:4 : Spotify-Scam: Mit dieser fiesen Masche wollen Betrüger euer Geld stehlen
 - 20:3 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
 - 20:3 : Ossur Mobile Logic Application
 - 20:3 : Hitachi Energy SDM600
 - 20:3 : Schneider Electric Modicon Controllers
 - 20:3 : 2024 ISO and CSA STAR certificates now available with two additional services
 - 20:3 : AWS completes the CCCS PBHVA assessment with 149 services and features in scope
 - 19:32 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
 - 19:32 : We’re Creating a Better Future for the Internet 🧑🏭
 - 19:32 : Saving the Internet in Europe: Defending Free Expression
 - 19:32 : Kubernetes Secrets: How to Create and Use Them
 - 19:32 : Detection as Code: Key Components, Tools, and More
 - 19:32 : What Is Privilege Escalation? Types, Examples, and Prevention
 - 19:7 : Acrobat out-of-bounds and Foxit use-after-free PDF reader vulnerabilities found
 - 19:7 : Welcome to the party, pal!
 - 19:7 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
 - 19:7 : 10 cybersecurity predictions for 2025
 - 19:7 : Free & Downloadable Vendor Risk Assessment Template
 - 19:7 : We’re Creating a Better Future for the Internet 🧑🏭
 - 19:7 : CVE-2024-50379: A Critical Race Condition in Apache Tomcat
 - 18:32 : Effective Phishing Campaign Targeting European Companies and Organizations
 - 18:32 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
 - 18:32 : 3 holiday email scams to watch for – and how to stay safe
 - 18:32 : We’re Creating a Better Future for the Internet 🧑🏭
 - 18:3 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
 - 18:3 : How bad is generative AI data leakage and how can you stop it?
 - 18:3 : Add gamification learning to your pen testing training playbook
 - 18:3 : SandboxAQ Announces Over $300 Million of Funding, Valued at $5.3bn
 - 18:3 : Inaugural Gartner Magic Quadrant for Email Security Platforms Names Leading Cyber Orgs
 - 18:3 : We’re Creating a Better Future for the Internet 🧑🏭
 - 18:3 : TP-Link faces US national security probe, potential ban on devices
 - 17:33 : Wordfence Intelligence Weekly WordPress Vulnerability Report (December 9, 2024 to December 15, 2024)
 - 17:33 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
 - 17:32 : Why Windows 11 requires a TPM – and how to get around it
 - 17:32 : Web Hacking Service ‘Araneida’ Tied to Turkish IT Firm
 - 17:32 : We’re Creating a Better Future for the Internet 🧑🏭
 - 17:32 : Data Security in 2025: Five Steps to Strategic Success in 2025
 - 17:32 : Fall 2024 SOC 1, 2, and 3 reports now available with 183 services in scope
 - 17:32 : Updated PCI DSS and PCI PIN compliance packages now available
 - 17:7 : From Naturalization to Cyber Advocacy: CISA Region 3’s Chris Ramos Inspires New U.S. Citizens
 - 17:7 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
 - 17:7 : How to Implement Impactful Security Benchmarks for Software Development Teams
 - 17:5 : IT Security News Hourly Summary 2024-12-19 18h : 12 posts
 - 16:33 : DigiEver Fix That IoT Thing!
 - 16:32 : Check Point Recognized in the 2024 Gartner® Magic Quadrant™ for Vision and Execution
 - 16:32 : Mirai botnet targets SSR devices, Juniper Networks warns
 - 16:32 : There’s No Copyright Exception to First Amendment Protections for Anonymous Speech
 - 16:32 : US Organizations Still Using Kaspersky Products Despite Ban
 - 16:5 : Russia imposes official ban on Cybersecurity firm Recorded Future
 - 16:5 : 2024-12-17 – SmartApeSG injected script leads to NetSupport RAT
 - 16:5 : What is a public key certificate?
 - 16:5 : Germany Warns of Pre-Installed Malware on 30,000 Devices
 - 16:5 : Blue Yonder Recovers from Ransomware Attack, Focuses on Resilience
 - 16:5 : EU Opens Door for AI Training Using Personal Data
 - 16:5 : Foundation BAC Distributions seat
 - 15:32 : FakeCaptcha scams—When the “I’m not a robot” button is a trap
 - 15:32 : Is Shein safe? Cybersecurity tips for fashion lovers
 - 15:32 : Mailbox Insecurity
 - 15:32 : Machine Identity Was the Focus at Gartner’s IAM Summit
 - 15:32 : Dubai Police Impersonation Scam: A Sophisticated Cybercrime Targeting UAE Residents
 - 15:32 : Cryptocurrency hackers stole $2.2 billion from platforms in 2024
 - 15:32 : Thousands Download Malicious npm Libraries Impersonating Legitimate Tools
 - 15:6 : AVANT and Akamai: Solving Security Challenges for Financial Services
 - 15:6 : Sonic and Injective Team Up to Build Industry’s First Cross-Chain Smart Agent Hub with Solana
 - 15:5 : December 2024 Web Server Survey
 - 15:5 : Mask APT Resurfaces with Zero-Day Exploits and Malware
 - 15:5 : Siemens User Management Component
 - 15:5 : Delta Electronics DTM Soft
 - 15:5 : CISA Releases Eight Industrial Control Systems Advisories
 - 15:5 : Hitachi Energy RTU500 series CMU
 - 15:5 : Schneider Electric Accutech Manager
 - 15:5 : Young Living Essential Oils – 1,128,951 breached accounts
 - 14:33 : Medion-Hack? BlackBasta-Ransomware hat angeblich 1,5 TB an Daten kopiert
 - 14:32 : Fortinet warns about Critical flaw in Wireless LAN Manager FortiWLM
 - 14:32 : The year in ransomware: Security lessons to help you stay one step ahead
 - 14:5 : IT Security News Hourly Summary 2024-12-19 15h : 24 posts
 - 14:4 : Google warnt vor Spam zur Weihnachtszeit: Wie sich Gmail-Nutzer schützen können
 - 14:4 : Satya Nadella: Warum Google mehr mit Windows verdient als Microsoft
 - 14:3 : Google Calendar Phishing Scam Targets Users with Malicious Invites
 - 14:3 : Small model, big impact: Patronus AI’s Glider outperforms GPT-4 in key AI benchmarks
 - 14:3 : US government urges high-ranking officials to lock down mobile devices following telecom breaches
 - 14:3 : CISA Releases Mobile Security Guidance After Chinese Telecom Hacking
 - 14:3 : Juniper Warns of Mirai Botnet Targeting SSR Devices with Default Passwords
 - 14:3 : New Malware Can Kill Engineering Processes in ICS Environments
 - 13:33 : [NEU] [mittel] Trend Micro Deep Security Agent: Schwachstelle ermöglicht Privilegieneskalation
 - 13:33 : [UPDATE] [kritisch] Fortinet FortiClientEMS: Mehrere Schwachstellen ermöglichen Codeausführung
 - 13:32 : Innovators – Join us to compete and win at Check Point’s Innovation Sandbox Competitions in Vienna and Vegas!
 - 13:32 : McAfee vs Norton: Which Antivirus Software Is Best?
 - 13:32 : schenkYOU – 237,349 breached accounts
 - 13:32 : Ukrainian Raccoon Infostealer Operator Sentenced to Prison in US
 - 13:32 : NETSCOUT uses AI/ML technology to secure critical IT infrastructure
 - 13:6 : New Mobile Phishing Targets Executives with Fake DocuSign Links
 - 13:6 : North Korea-linked hackers accounted for 61% of all crypto stolen in 2024
 - 13:6 : A Sysadmin’s Holiday Checklist: Keep Your Company Safe This Festive Season
 - 13:6 : Cisco to Acquire Threat Detection Company SnapAttack
 - 13:6 : Anatomy of a 6-day Credential Stuffing Attack From 2.2M Residential IPs
 - 13:6 : SASE Market Hits $2.4 Billion, Top Vendors Tighten Market Share Grip
 - 13:6 : CISA Mandates Federal Agencies Secure Their Cloud Environments
 - 13:6 : CISA orders federal agencies to secure their Microsoft cloud environments
 - 13:6 : Crypto-Hackers Steal $2.2bn as North Koreans Dominate
 - 12:33 : [UPDATE] [hoch] Apache Tomcat: Mehrere Schwachstellen
 - 12:33 : BADBOX Botnet Hacked 74,000 Android Devices With Customizable Remote Codes
 - 12:33 : Hackers Weaponizing LNK Files To Create Scheduled Task And Deliver Malware Payload
 - 12:33 : Malicious Supply Chain Attacking Moving From npm Community To VSCode Marketplace
 - 12:33 : Beware Of Malicious SharePoint Notifications That Delivers Xloader Malware
 - 12:33 : Attackers exploiting a patched FortiClient EMS vulnerability in the wild
 - 12:32 : UK Politicians Join Organizations in Calling for Immediate Release of Alaa Abd El-Fattah
 - 12:32 : Fortinet Patches Critical FortiWLM Vulnerability
 - 12:32 : Legit Security provides insights into the enterprise’s secrets posture
 - 12:8 : Leiche im Kofferraum: Mordfall per Google Street View aufgeklärt
 - 12:8 : Command Injection Exploit For PHPUnit before 4.8.28 and 5.x before 5.6.3 [Guest Diary], (Tue, Dec 17th)
 - 12:8 : Europol Details on How Cyber Criminals Exploit legal businesses for their Economy
 - 12:7 : Fortinet Warns of Critical FortiWLM Flaw That Could Lead to Admin Access Exploits
 - 12:7 : Bugs in a major McDonald’s India delivery system exposed sensitive customer data
 - 12:7 : What could the API Landscape look like in 2025?
 - 12:7 : SandboxAQ Raises $300 Million at $5.3 Billion Valuation
 - 12:7 : Turning Insights into Action: The Importance of Vulnerability Remediation after VAPT
 - 12:7 : The Best Mimecast DMARC Analyzer Alternatives and Competitors
 - 12:7 : Recorded Future CEO Calls Russia’s “Undesirable” Listing a “Compliment”
 - 11:33 : Exploring vulnerable Windows drivers
 - 11:33 : Japanese Space Start-Up Destroys Second Rocket After Launch
 - 11:33 : US Supreme Court Agrees To Hear TikTok Appeal
 - 11:33 : Momeni Convicted In Bob Lee Murder
 - 11:33 : EU Publishes iOS Interoperability Plans
 - 11:33 : Silent Heists: The Danger of Insider Threats
 - 11:32 : This VPN Lets Anyone Use Your Internet Connection. What Could Go Wrong?
 - 11:32 : CERT-UA: Russia-linked UAC-0125 abuses Cloudflare Workers to target Ukrainian army
 - 11:32 : September 2024 Cyber Attacks Statistics
 - 11:5 : IT Security News Hourly Summary 2024-12-19 12h : 14 posts
 - 11:3 : Golem Karrierewelt: Heute: Kostenloses Live-Webinar zu Intune App Protection
 - 11:2 : CISA Proposes National Cyber Incident Response Plan
 - 11:2 : Juniper Warns of Mirai Botnet Targeting Session Smart Routers
 - 10:34 : Kritische Lücke in BeyondTrust Privileged Remote Access und Remote Support
 - 10:34 : Gefahr für nationale Sicherheit: TP-Link droht ein Verkaufsverbot in den USA
 - 10:34 : [NEU] [mittel] IBM Sterling Connect: Direct Web Service: Mehrere Schwachstellen
 - 10:34 : [NEU] [mittel] IBM MQ: Mehrere Schwachstellen
 - 10:33 : [NEU] [mittel] Red Hat Advanced Cluster Management: Mehrere Schwachstellen
 - 10:33 : 2025 Predictions for the Cyberwarfare Landscape
 - 10:32 : Lazarus group evolves its infection chain with old and new malware
 - 10:32 : UAC-0125 Abuses Cloudflare Workers to Distribute Malware Disguised as Army+ App
 - 10:32 : Dutch DPA Fines Netflix €4.75 Million for GDPR Violations Over Data Transparency
 - 10:32 : CISA Mandates Cloud Security for Federal Agencies by 2025 Under Binding Directive 25-01
 - 10:32 : Vulnerability Exploit Assessment Tool EPSS Exposed to Adversarial Attack
 - 10:3 : Google Chrome: Mehrere Schwachstellen ermöglichen Codeausführung
 - 10:3 : Happy YARA Christmas!
 - 10:3 : What 2025 May Hold for Cybersecurity
 - 10:3 : Ukrainian hacker gets prison for infostealer operations
 - 10:2 : Interpol Calls for an End to “Pig Butchering” Terminology
 - 9:33 : DMA: EU drängt Apple auf weitere Öffnung von iOS
 - 9:33 : [UPDATE] [hoch] http/2 Implementierungen: Schwachstelle ermöglicht Denial of Service
 - 9:33 : [UPDATE] [hoch] Red Hat Enterprise Linux (libvpx): Mehrere Schwachstellen
 - 9:33 : [UPDATE] [hoch] PHP: Mehrere Schwachstellen
 - 9:33 : [UPDATE] [kritisch] VMware Tanzu Spring Framework: Schwachstelle ermöglicht Ausführen von beliebigem Programmcode
 - 9:33 : [UPDATE] [mittel] Red Hat OpenShift: Mehrere Schwachstellen
 - 9:32 : Facebook ‘Restricted’ Palestinian News Content
 - 9:32 : CATL Aims To Massively Expand EV Battery-Swap Infrastructure
 - 9:32 : Iranian Hackers Launched A Massive Attack to Exploit Global ICS Infrastructure
 - 9:32 : Netwrix 1Secure enhances protection against data and identity access risks
 - 9:3 : Digital Trust Is Declining. Businesses Must Respond
 - 9:3 : Next.js Vulnerability Let Attackers Bypass Authentication
 - 9:3 : BitView – 63,127 breached accounts
 - 9:3 : Ataccama ONE platform enhancements accelerate enterprise data quality initiatives
 - 9:3 : NetSPI introduces external attack surface management solutions
 - 8:34 : Cyberangriff: Hacker machen Medion ein Weihnachtsgeschenk
 - 8:33 : Microsoft: Windows 11 nervt mit weiteren Werbebannern
 - 8:33 : Amazon Faces Strike Action In US Ahead Of Christmas
 - 8:33 : CISA Issues Secure Practices for Cloud Services To Strengthen U.S Federal Agencies
 - 8:33 : Enpass simplifies compliance and security controls for password management
 - 8:32 : Interpol romance baiting, TikTok at court, TP-Link investigation
 - 8:6 : Malware über Fake-Captchas: So schützt ihr euch vor den gefährlichen Cyberangriffen
 - 8:5 : What SAP Security Can Learn From Successful European Football (Soccer) Teams
 - 8:5 : Python-Based NodeStealer Version Targets Facebook Ads Manager
 - 8:5 : Critical Chrome Vulnerabilities Lets Attackers Execute Arbitrary Code Remotely
 - 8:5 : Fortinet Critical Vulnerabilitiy Let Attackers Inject Commands Remotely
 - 8:5 : 2025 Cybersecurity Predictions: A Strategic Roadmap for the C-Suite
 - 8:5 : AI Models at Risk from TPUXtract Exploit
 - 8:5 : IT Security News Hourly Summary 2024-12-19 09h : 5 posts
 - 7:33 : Chance und Risiko: KI in der Cybersicherheit
 - 7:32 : The AI Threat: It’s Real, and It’s Here
 - 7:32 : US considers banning TP-Link routers over cybersecurity concerns
 - 7:32 : Acumen Threat Analysis: Preparing for 2025
 - 7:32 : Understanding Virtual Skimmers: A Threat to E-Commerce Security
 - 7:3 : The 2025 cyber security threat landscape
 - 7:3 : Chrome Security Update, Patch for Multiple Security Flaws
 - 6:33 : Anzeige: KI-Grundlagen und Chancen für die Unternehmensstrategie
 - 6:32 : Arctic Wolf Acquires Cylance Endpoint Security Platform to Further AI Ambitions
 - 6:32 : HubPhish Abuses HubSpot Tools to Target 20,000 European Users for Credential Theft
 - 6:6 : TP Link routers to be banned for data security concerns
 - 6:5 : CISA Released Secure Mobile Communication Best Practices – 2025
 - 6:5 : Don’t fall for a mail asking for rapid Docusign action – it may be an Azure account hijack phish
 - 6:5 : Are threat feeds masking your biggest security blind spot?
 - 5:32 : Leadership skills for managing cybersecurity during digital transformation
 - 5:5 : IT Security News Hourly Summary 2024-12-19 06h : 1 posts
 - 4:32 : Ransomware in 2024: New players, bigger payouts, and smarter tactics
 - 4:3 : How Does Enhanced Access Control Bolster Your Security?
 - 4:3 : How Secure Automation Saves Your Cloud Operations
 - 4:2 : Scaling Secrets Security in High-Growth Environments
 - 2:5 : 1-800-ChatGPT ist seine Nummer: Du kannst den KI-Chatbot jetzt anrufen oder ihm schreiben