3 posts were published in the last hour 13:31 : [UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service 13:30 : [UPDATE] [mittel] zlib: Schwachstelle ermöglicht nicht spezifizierten Angriff 13:30 : [UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen ermöglichen Privilegieneskalation
Category: hourly summary
IT Security News Hourly Summary 2025-02-21 12h : 18 posts
18 posts were published in the last hour 11:3 : CISA und FBI warnen vor Ransomware-Bande Ghost 11:2 : U.S. CISA adds Craft CMS and Palo Alto Networks PAN-OS flaws to its Known Exploited Vulnerabilities catalog 10:32 : New Darcula 3.0…
IT Security News Hourly Summary 2025-02-21 09h : 7 posts
7 posts were published in the last hour 7:33 : Angriffe auf KI-gestützte Software abwehren – Secure by Design 7:32 : CISA Issues Seven ICS Advisories Highlighting Critical Vulnerabilities 7:32 : Chinese Hackers Using New Bookworm Malware In Attacks Targeting…
IT Security News Hourly Summary 2025-02-21 06h : 3 posts
3 posts were published in the last hour 4:31 : New infosec products of the week: February 21, 2025 4:9 : New Active Directory Pentesting Tool For KeyCredentialLink Management 4:9 : Thailand ready to welcome 7,000 trafficked scam call center…
IT Security News Hourly Summary 2025-02-21 03h : 4 posts
4 posts were published in the last hour 1:32 : Life in the Swimlane with Gabriella Lopez, Senior Sales Development Representative 1:9 : ISC Stormcast For Friday, February 21st, 2025 https://isc.sans.edu/podcastdetail/9334, (Fri, Feb 21st) 1:9 : CISA Adds Two Known…
IT Security News Hourly Summary 2025-02-21 00h : 5 posts
5 posts were published in the last hour 22:55 : IT Security News Daily Summary 2025-02-20 22:10 : Schon über 280 Millionen Angriffe: Diese Malware zielt auf Windows-User ab 22:9 : Kai Cenat Swatted on Live Twitch Stream 22:9 :…
IT Security News Hourly Summary 2025-02-20 21h : 4 posts
4 posts were published in the last hour 19:9 : Efficiency? Security? When the quest for one grants neither. 19:9 : Nigeria Sues Binance For $81.5bn For Economic Losses, Back Tax 19:9 : OpenAI’s ChatGPT explodes to 400M weekly users, with…
IT Security News Hourly Summary 2025-02-20 18h : 23 posts
23 posts were published in the last hour 16:34 : Elseta Vinci Protocol Analyzer 16:34 : Carrier Block Load 16:34 : ABB FLXEON Controllers 16:34 : Medixant RadiAnt DICOM Viewer 16:34 : ABB ASPECT-Enterprise, NEXUS, and MATRIX Series 16:34 :…
IT Security News Hourly Summary 2025-02-20 15h : 15 posts
15 posts were published in the last hour 13:33 : [UPDATE] [hoch] Google Chrome: Mehrere Schwachstellen 13:32 : The Human Factor: How Eliminating Human Vulnerabilities Can Stop Social Engineering Fraud 13:32 : Rhadamanthys Infostealer Uses Microsoft Management Console to Spread…
IT Security News Hourly Summary 2025-02-20 12h : 16 posts
16 posts were published in the last hour 10:34 : Surf ausprobiert: Flipboards neue App macht Mastodon und Bluesky zum Vergnügen 10:34 : Mobilfunkempfang im Zug: Wie die Deutsche Bahn das Problem endgültig lösen will 10:33 : Verdächtige 15 bis…
IT Security News Hourly Summary 2025-02-20 09h : 6 posts
6 posts were published in the last hour 7:32 : CISA and FBI Issue Alert as Ghost Ransomware Targets 70+ Organizations 7:32 : Microsoft is named a Leader in the 2025 Gartner® Magic Quadrant™ for cyber-physical systems protection platforms 7:32…
IT Security News Hourly Summary 2025-02-20 06h : 3 posts
3 posts were published in the last hour 4:32 : Windows Disk Cleanup Tool Vulnerability Exploited to Gain SYSTEM Privileges 4:32 : Microsoft is named a Leader in the 2025 Gartner® Magic Quadrant™ for cyber-physical systems protection platforms 4:9 :…
IT Security News Hourly Summary 2025-02-20 03h : 2 posts
2 posts were published in the last hour 1:32 : The best password managers for businesses in 2025: Expert tested 1:32 : Microsoft is named a Leader in the 2025 Gartner® Magic Quadrant™ for cyber-physical systems protection platforms
IT Security News Hourly Summary 2025-02-20 00h : 5 posts
5 posts were published in the last hour 22:55 : IT Security News Daily Summary 2025-02-19 22:32 : Microsoft is named a Leader in the 2025 Gartner® Magic Quadrant™ for cyber-physical systems protection platforms 22:7 : Trump’s DoD CISO pick…
IT Security News Hourly Summary 2025-02-19 21h : 10 posts
10 posts were published in the last hour 19:32 : MITRE ATT&CK Evaluations — Cortex XDR Among Elite in Endpoint Security 19:32 : Protected: zQA Content Editing Styles 19:32 : Microsoft is named a Leader in the 2025 Gartner® Magic…
IT Security News Hourly Summary 2025-02-19 18h : 23 posts
23 posts were published in the last hour 16:33 : Elon Musk’s xAI Introduces Grok-3 AI Chatbot 16:32 : Google Fixes YouTube Security Flaw That Exposed User Emails 16:32 : Addressing the Security Risks Posed by IoT Devices 16:32 :…
IT Security News Hourly Summary 2025-02-19 15h : 16 posts
16 posts were published in the last hour 13:33 : Sicherheitsupdates: Lernplattform Moodle vielfältig angreifbar 13:33 : [UPDATE] [hoch] Node.js: Mehrere Schwachstellen 13:32 : How Blockchain Games Ensure Transparency and Fairness 13:32 : Duo vs Microsoft Authenticator: Which Tool Is…
IT Security News Hourly Summary 2025-02-19 12h : 15 posts
15 posts were published in the last hour 10:34 : [NEU] [niedrig] Joomla: Schwachstelle ermöglicht SQL Injection 10:34 : [NEU] [mittel] Fluent Bit: Mehrere Schwachstellen ermöglichen Denial of Service 10:34 : [UPDATE] [mittel] Internet Systems Consortium BIND: Mehrere Schwachstellen ermöglichen…
IT Security News Hourly Summary 2025-02-19 09h : 5 posts
5 posts were published in the last hour 7:33 : Juniper Session Smart Router: Sicherheitsleck ermöglicht Übernahme 7:32 : Surge in IRS and Tax-Themed Cyber Attacks Driven by Fresh Domain Registrations 7:13 : Russian Government Proposes Stricter Penalties to Tackle…
IT Security News Hourly Summary 2025-02-19 06h : 3 posts
3 posts were published in the last hour 4:32 : Mustang Panda APT Exploits Windows Utilities to Slip Through Security Nets 4:32 : CISA Warns of Palo Alto PAN-OS Vulnerability Actively Exploited in the Wild 4:6 : Qualys Identifies Critical…