American car rental company Hertz has suffered a data breach linked to last year’s exploitation of Cleo zero-day vulnerabilities by a ransomware gang. The breach resulted in information of an unknown number of customers of Hertz and Hertz’s subsidiaries Dollar…
Critical Apache Roller Vulnerability (CVSS 10.0) Enables Unauthorized Session Persistence
A critical security vulnerability has been disclosed in the Apache Roller open-source, Java-based blogging server software that could allow malicious actors to retain unauthorized access even after a password change. The flaw, assigned the CVE identifier CVE-2025-24859, carries a CVSS…
Chinese Hackers Target Linux Systems Using SNOWLIGHT Malware and VShell Tool
The China-linked threat actor known as UNC5174 has been attributed to a new campaign that leverages a variant of a known malware dubbed SNOWLIGHT and a new open-source tool called VShell to infect Linux systems. “Threat actors are increasingly using…
North Korean Hackers Exploit LinkedIn to Infect Crypto Developers with Infostealers
Posing as potential employers, Slow Pisces hackers conceal malware in coding challenges sent to cryptocurrency developers on LinkedIn This article has been indexed from www.infosecurity-magazine.com Read the original article: North Korean Hackers Exploit LinkedIn to Infect Crypto Developers with Infostealers
IT Security News Hourly Summary 2025-04-15 15h : 13 posts
13 posts were published in the last hour 12:36 : Lübecker IT-Unternehmen: Nach Medienbericht weitere Datenlecks entdeckt 12:35 : New “Slopsquatting” Threat Emerges from AI-Generated Code Hallucinations 12:35 : PasivRobber Malware Emerges, Targeting macOS to Steal Data From Systems and…
What Are the Benefits of a Microservices Architecture?
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: What Are the Benefits of a Microservices Architecture?
How to Blur Your House on Google Maps and Why You Should Do It [6 Easy Steps]
Imagine your home, laid bare for anyone with an internet connection — that’s the reality of unblurred Street View. If you’re concerned about privacy or… The post How to Blur Your House on Google Maps and Why You Should Do…
Check Point and Fuse to Deliver First Real-Time Blockchain Firewall
The rise of blockchain promises a more open, decentralized internet. But with that promise comes new risks—and so far, the security landscape hasn’t kept pace. In 2024 alone, crypto platforms lost over $2.2 billion to cyber attacks, with sophisticated exploits…
Unmasking APT29: The Sophisticated Phishing Campaign Targeting European Diplomacy
Executive Summary Check Point Research has been observing a sophisticated phishing campaign conducted by Advanced Persistent Threat (APT) 29, a Russian-linked threat group. The operation targeted diplomatic organizations throughout Europe. The campaign appears to continue a previous operation called Wineloader,…
PlexTrac for CTEM helps security teams centralize security data
PlexTrac launched PlexTrac for CTEM, expanding the platform’s capabilities with a proactive and continuous threat exposure management solution designed to help security teams centralize security data, prioritize risk based on business impact, and automate validation and remediation workflows. PlexTrac for…
Vorsicht: Verblitzte Augen durch Schweißarbeiten
Lichtbögen sind ernsthafte Risiken für Schweißer und können zu verblitzten Augen führen. Wie sollten sie reagieren, wenn es sie „getroffen“ hat? Dieser Artikel wurde indexiert von Newsfeed Lesen Sie den originalen Artikel: Vorsicht: Verblitzte Augen durch Schweißarbeiten
Microsoft Teams File Sharing Unavailable Due to Unexpected Outage
Microsoft Teams users across the globe are experiencing significant disruptions in file-sharing capabilities due to an unexpected outage, impacting workplace communication and collaboration. A wave of reports began surfacing from organizations and individuals unable to share files within Microsoft Teams—the…
Meta will use public EU user data to train its AI models
Meta announced that it will use public EU user data to train AI, resuming plans paused last year over Irish data protection concerns. Meta will start training its AI models using public data from adults in the EU, after pausing…
Prophylactic Cybersecurity for Healthcare
How to Be Proactive in a Reactive World In healthcare, preventative medicine is always more effective, less costly, and has better outcomes than waiting until after a serious heart incident occurs. It’s an apt analogy for cybersecurity as well. Prophylactic…
GitGuardian Launches NHI Governance to Secure Non-Human Identities and Their Secrets for Enterprises
Secrets sprawl is a growing cybersecurity challenge, especially with NHIs. GitGuardian’s new NHI Governance product offers centralized inventory and lifecycle management to help enterprises regain control over their secrets and prevent costly breaches. The post GitGuardian Launches NHI Governance to…
DataDome platform enhancements put businesses in control of AI agents
DataDome announced major advancements to its platform and partner ecosystem that put businesses back in control of how AI agents access and interact with their digital assets. These innovations come at a pivotal moment, as enterprises grapple with the rapid…
Polizeiliche Datenanalyse: Mehrere Bundesländer gegen Einsatz von Palantir-Software
Bundesrat und neue Bundesregierung wollen die Möglichkeiten zur polizeilichen Datenanalyse ausbauen. Doch es gibt Bedenken bei einem US-Hersteller. (Polizei, Datenschutz) Dieser Artikel wurde indexiert von Golem.de – Security Lesen Sie den originalen Artikel: Polizeiliche Datenanalyse: Mehrere Bundesländer gegen Einsatz von…
Unified Endpoint Management: One Tool to Rule All
As the number of endpoint devices increases, managing and securing them becomes complex. The traditional way of using separate security tools for desktops, mobile devices, tablets, and other endpoints is… The post Unified Endpoint Management: One Tool to Rule All…
Newly Purchased Android Phones With Pre-installed Malware Mimic as WhatsApp
A sophisticated cryptocurrency theft operation has been uncovered where brand-new Android smartphones arrive with pre-installed malware masquerading as legitimate WhatsApp applications. Threat actors have infiltrated the supply chain of several Chinese smartphone manufacturers, embedding malicious code directly into system applications…
ChatGPT’s Image Generator Leveraged to Create Fake Passport
Researchers have recently discovered that OpenAI’s ChatGPT image generation feature can be manipulated to create convincing fake passports with minimal effort. This capability, introduced on March 25, 2025, for ChatGPT-4o and ChatGPT-4o mini models and made freely available to all…
New Update – Your Android Device To Restart Automatically If You Kept Idle
Google has introduced a significant security enhancement for Android devices that automatically reboots phones and tablets after extended periods of inactivity. This new auto-restart feature, included in the latest Google Play services update (version 25.14), represents an important step forward…
Microsoft Teams File Sharing Outage, Users Unable to Share Files
Microsoft Teams users encountered a significant disruption in file-sharing capabilities on Tuesday, April 15, 2025, as the company confirmed an ongoing investigation into the issue. The problem, which affects the ability to share files within the Teams platform, was first…
Zyxel Networks upgrades USG FLEX H series firewalls
Zyxel Networks announced its USG FLEX H series firewalls have been upgraded to combine both cloud and on-premises network security into a single seamless solution for small- and medium-sized businesses and managed service providers. Unlike most hybrid firewalls that treat…
ConnectSecure empowers MSPs to mitigate risks within their clients’ Google Workspace environments
ConnectSecure announced its new Google Workspace Assessments. This new capability enhances ConnectSecure’s vulnerability platform by empowering MSPs to assess, detect, and mitigate risks within their clients’ Google Workspace environments. With this addition, ConnectSecure expands its cloud assessment capabilities beyond Microsoft…