5 posts were published in the last hour 6:31 : Attacken auf Fernwartungslücke in Servern von HPE, Lenovo und Co. 6:31 : [UPDATE] [mittel] Red Hat Enterprise Linux: Schwachstelle ermöglicht Codeausführung 6:7 : Google Chrome / Microsoft Edge: Mehrere Schwachstellen…
Category: hourly summary
IT Security News Hourly Summary 2025-06-27 06h : 2 posts
2 posts were published in the last hour 4:4 : Infosec products of the month: June 2025 3:34 : Mitsubishi Electric AC Systems Vulnerability Allows Remote Control Without User Interaction
IT Security News Hourly Summary 2025-06-27 03h : 2 posts
2 posts were published in the last hour 1:4 : AI vs. AI: How Deepfake Attacks Are Changing Authentication Forever 0:34 : AI Bug Hunter Sets Milestone By Claiming Top Spot on HackerOne’s Leaderboard
IT Security News Hourly Summary 2025-06-27 00h : 5 posts
5 posts were published in the last hour 22:55 : IT Security News Daily Summary 2025-06-26 22:2 : Program Execution, follow-up pt II 21:5 : Threat Brief: Escalation of Cyber Risk Related to Iran (Updated June 26) 21:5 : AI…
IT Security News Hourly Summary 2025-06-26 21h : 6 posts
6 posts were published in the last hour 18:32 : nOAuth Exploit Enables Full Account Takeover of Entra Cross-Tenant SaaS Applications 18:32 : Randall Munroe’s XKCD ‘Interoperability’ 18:32 : Who is Hero? 18:32 : Critical Open VSX Registry Flaw Exposes…
IT Security News Hourly Summary 2025-06-26 18h : 19 posts
19 posts were published in the last hour 16:4 : The Toxic Cloud Trilogy: Why Your Workloads Are a Ticking Time Bomb 16:4 : Security Without Guesswork: Calculating and Reducing Residual Risk 16:4 : Massive Data Leak Exposes 16 Billion…
IT Security News Hourly Summary 2025-06-26 15h : 23 posts
23 posts were published in the last hour 13:4 : The 3 Hidden Dangers of Avoiding SOC 2 Compliance 13:4 : Man Who Hacked Organizations to Advertise Security Services Pleads Guilty 13:4 : N. Korean Group BlueNoroff Uses Deepfake Zoom…
IT Security News Hourly Summary 2025-06-26 12h : 18 posts
18 posts were published in the last hour 9:35 : Gemini CLI: Entwickler können die Google-KI jetzt kostenlos direkt im Terminal nutzen 9:35 : Die wahren Kosten der Open-Source-Unterstützung für Unternehmen | Offizieller Blog von Kaspersky 9:34 : BreachForums: ShinyHunters…
IT Security News Hourly Summary 2025-06-26 09h : 6 posts
6 posts were published in the last hour 6:36 : Building cyber resilience in always-on industrial environments 6:9 : Nach Datenlecks bei Hunderten Restaurant-Websites: Datenschutzbehörde prüft Fall 6:8 : MOVEit Transfer Systems Hit by Wave of Attacks Using Over 100…
IT Security News Hourly Summary 2025-06-26 06h : 1 posts
1 posts were published in the last hour 3:34 : Firefox 140 Released With Fix for Code Execution Vulnerability – Update Now
IT Security News Hourly Summary 2025-06-26 03h : 2 posts
2 posts were published in the last hour 0:33 : Bridewell report indicates rise in lone wolf ransomware actors 0:33 : Is Container OS Insecurity Making Your K8s Infrastructure Less Secure?
IT Security News Hourly Summary 2025-06-26 00h : 6 posts
6 posts were published in the last hour 22:55 : IT Security News Daily Summary 2025-06-25 22:5 : Exploit Kits vs. Patch Cycles: Closing the 48-Hour Exposure Gap 21:35 : ‘They’re Not Breathing’: Inside the Chaos of ICE Detention Center…
IT Security News Hourly Summary 2025-06-25 21h : 20 posts
20 posts were published in the last hour 19:3 : North Korean Hackers Pose as Recruiters, Target Developers with 35 New Malicious npm Packages 19:3 : How Avast’s free AI-powered Scam Guardian protects you from online con artists 19:3 :…
IT Security News Hourly Summary 2025-06-25 18h : 17 posts
17 posts were published in the last hour 15:36 : ispace Blames Laser for Moon Crash Landing 15:35 : Threat Actors Distribute Compromised SonicWall SSL VPN NetExtender to Steal Sensitive Data 15:35 : Enterprises must rethink IAM as AI agents…
IT Security News Hourly Summary 2025-06-25 15h : 11 posts
11 posts were published in the last hour 12:35 : ChatGPT bringt KI-Bilder direkt in euren Whatsapp-Chat 12:34 : Realtek Bluetooth Flaw Allows Attackers to Launch DoS Attacks During Pairing 12:33 : Authorization sprawl: Attacking modern access models 12:33 :…
IT Security News Hourly Summary 2025-06-25 12h : 17 posts
17 posts were published in the last hour 10:5 : Cybercriminal abuse of large language models 10:5 : Akamai Shares New Techniques for Defenders to Shutdown Cryptominer Attacks 10:4 : New U.S. Visa Rule Requires Applicants to Change Social Media…
IT Security News Hourly Summary 2025-06-25 09h : 12 posts
12 posts were published in the last hour 6:41 : [UPDATE] [niedrig] Python: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen 6:38 : NVIDIA Megatron LM Flaw Allows Attackers to Inject Malicious Code 6:38 : You may qualify for AT&T’s $177 million data…
IT Security News Hourly Summary 2025-06-25 06h : 2 posts
2 posts were published in the last hour 4:4 : Microsoft is named a Leader in The Forrester Wave™: Security Analytics Platforms, 2025 3:32 : Microsoft is named a Leader in The Forrester Wave™: Security Analytics Platforms, 2025
IT Security News Hourly Summary 2025-06-25 03h : 2 posts
2 posts were published in the last hour 0:34 : Microsoft is named a Leader in The Forrester Wave™: Security Analytics Platforms, 2025 0:5 : Microsoft is named a Leader in The Forrester Wave™: Security Analytics Platforms, 2025
IT Security News Hourly Summary 2025-06-25 00h : 5 posts
5 posts were published in the last hour 22:55 : IT Security News Daily Summary 2025-06-24 21:34 : Microsoft is named a Leader in The Forrester Wave™: Security Analytics Platforms, 2025 21:7 : Don’t panic, but it’s only a matter…