23 posts were published in the last hour 13:36 : [UPDATE] [hoch] VLC: mehrere Schwachstellen 13:36 : [UPDATE] [hoch] Perl: Mehrere Schwachstellen 13:36 : [UPDATE] [niedrig] Perl: Schwachstelle ermöglicht Manipulation von Dateien 13:36 : [UPDATE] [mittel] PostgreSQL: Mehrere Schwachstellen 13:36…
Category: hourly summary
IT Security News Hourly Summary 2025-01-29 12h : 24 posts
24 posts were published in the last hour 10:42 : [NEU] [mittel] Rockwell Automation FactoryTalk (View SE): Mehrere Schwachstellen 10:42 : [NEU] [hoch] Rockwell Automation FactoryTalk (View ME): Mehrere Schwachstellen ermöglichen Privilegieneskalation 10:42 : [NEU] [UNGEPATCHT] [mittel] Red Hat OpenShift…
IT Security News Hourly Summary 2025-01-29 09h : 3 posts
3 posts were published in the last hour 7:36 : Fake DeepSeek Campaign Attacking macOS Users to Deliver Poseidon Malware 7:36 : Spending watchdog blasts UK govt over sloth-like cyber resilience progress 7:20 : Attackers exploit SimpleHelp RMM Software flaws…
IT Security News Hourly Summary 2025-01-29 06h : 2 posts
2 posts were published in the last hour 4:36 : Only 13% of organizations fully recover data after a ransomware attack 4:9 : PowerSchool Starts Notifying Students Following Massive Breach
IT Security News Hourly Summary 2025-01-29 03h : 1 posts
1 posts were published in the last hour 1:9 : SLAP, Apple, and FLOP: Safari, Chrome at risk of data theft on iPhone, Mac, iPad Silicon
IT Security News Hourly Summary 2025-01-29 00h : 6 posts
6 posts were published in the last hour 22:55 : IT Security News Daily Summary 2025-01-28 22:34 : Baguette bandits strike again with ransomware and a side of mockery 22:34 : Updated whitepaper available: Aligning to the NIST Cybersecurity Framework…
IT Security News Hourly Summary 2025-01-28 21h : 2 posts
2 posts were published in the last hour 19:7 : Hackers Claim 2nd Breach at HP Enterprise, Plan to Sell Access 19:7 : What Proponents of Digital Replica Laws Can Learn from the Digital Millennium Copyright Act
IT Security News Hourly Summary 2025-01-28 18h : 17 posts
17 posts were published in the last hour 17:5 : Outsmarting AI-powered cyber attacks: A 2025 playbook for real-time endpoint defense 17:5 : Ransomware attack on ENGlobal compromised personal information 17:4 : ENGlobal Cyber-Attack Exposes Sensitive Data 16:35 : Signal:…
IT Security News Hourly Summary 2025-01-28 15h : 17 posts
17 posts were published in the last hour 13:37 : heise-Angebot: iX-Workshop IT-Sicherheit: Penetrationstests verstehen, ausschreiben, auswerten 13:36 : How to Use 1Password: A Guide for Beginners 13:36 : ENGlobal says hackers accessed ‘sensitive personal’ data during cyberattack 13:36 :…
IT Security News Hourly Summary 2025-01-28 12h : 23 posts
23 posts were published in the last hour 10:36 : Apple macOS, iPadOS und iOS: : Mehrere Schwachstellen 10:36 : Juniper-Router: Maßgeschneiderte Backdoors warten auf Magic Packets 10:36 : Fix nur vor Ort möglich: Zyxel schickt Firewalls per Update in…
IT Security News Hourly Summary 2025-01-28 09h : 14 posts
14 posts were published in the last hour 8:3 : Apple Security Update Fixed Actively Exploited Zero-day Vulnerability Affected iOS, macOS and More 8:3 : Apple Zero-day Vulnerability Actively Exploited to Attack iPhone Users 8:3 : Stratoshark – Wireshark Has…
IT Security News Hourly Summary 2025-01-28 06h : 2 posts
2 posts were published in the last hour 4:34 : Cybersecurity jobs available right now: January 28, 2025 4:34 : Apple Patches Actively Exploited Zero-Day Affecting iPhones, Macs, and More
IT Security News Hourly Summary 2025-01-28 03h : 1 posts
1 posts were published in the last hour 1:9 : 2025-01-23: Fake installer leads to Koi Loader/Koi Stealer
IT Security News Hourly Summary 2025-01-28 00h : 3 posts
3 posts were published in the last hour 22:55 : IT Security News Daily Summary 2025-01-27 22:32 : DeepSeek’s Popular AI App Is Explicitly Sending US Data to China 22:32 : US freezes foreign aid, halting cybersecurity defense and policy…
IT Security News Hourly Summary 2025-01-27 21h : 3 posts
3 posts were published in the last hour 19:32 : 6 ways to get the most from Data Privacy Week 19:7 : DeepSeek limits new accounts amid cyberattack 19:7 : Critical Flaws in VPN Protocols Leave Millions Vulnerable
IT Security News Hourly Summary 2025-01-27 18h : 1 posts
1 posts were published in the last hour 16:39 : Hidden Text Salting Disrupts Brand Name Detection Systems
IT Security News Hourly Summary 2025-01-27 15h : 21 posts
21 posts were published in the last hour 13:38 : [UPDATE] [hoch] Mozilla Firefox, Firefox ESR und Thunderbird: Mehrere Schwachstellen 13:37 : The Evolution of User Authentication With Generative AI 13:37 : 1Password Review: Features, Pricing & Security 13:37 :…
IT Security News Hourly Summary 2025-01-27 12h : 20 posts
20 posts were published in the last hour 10:36 : Was zuerst? Priorisierung von Patches 10:36 : [NEU] [hoch] Cacti: Mehrere Schwachstellen 10:35 : Hackers stole sensitive information belonging to 62 million kids and almost 10 million teachers 10:35 :…
IT Security News Hourly Summary 2025-01-27 09h : 3 posts
3 posts were published in the last hour 8:4 : A Strategic Approach to Container Security 7:32 : Researchers Exploited Windows Charset Conversion Feature to Execute Remote Code 7:32 : MintsLoader Delivers StealC Malware and BOINC in Targeted Cyber Attacks
IT Security News Hourly Summary 2025-01-27 06h : 5 posts
5 posts were published in the last hour 5:4 : Three privacy rules for 2025 (Lock and Code S06E02) 5:4 : Cyber trends set to influence business strategies 4:32 : How to use Apple’s App Privacy Report to monitor data…