Play ransomware, also known as Balloonfly or PlayCrypt, has become a significant cybersecurity threat since its emergence in June 2022. Responsible for over 300 global attacks, this ransomware employs a double extortion model — stealing sensitive data before encrypting…
Meta Removes Independent Fact Checkers, Replaces With “Community Notes”
Meta to remove fact-checkers Meta is dumping independent fact-checkers on Instagram and Facebook, similar to what X (earlier Twitter) did, replacing them with “community notes” where users’ comments decide the accuracy of a post. On Tuesday, Mark Zuckerberg in a…
DEF CON 32 – Open Source Hacker V. Government Lawyer
Authors/Presenters: Rebecca Lively, Eddie Zaneski Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel.…
Gravy Analytics Data Breach Exposes Sensitive Location Data of U.S. Consumers
Gravy Analytics, the parent company of data broker Venntel, is facing mounting scrutiny after hackers reportedly infiltrated its systems, accessing an alarming 17 terabytes of sensitive consumer data. This breach includes detailed cellphone behavior and location data of U.S.…
Silent Crow Claims Hack of Russia’s Rosreestr, Leaks Citizens’ Personal Data
The hacking group Silent Crow has claimed responsibility for breaching Russia’s Federal Service for State Registration, Cadastre, and Cartography (Rosreestr), releasing what it describes as a fragment of the agency’s database. The leak reportedly includes sensitive personal information of…
IT Security News Hourly Summary 2025-01-12 18h : 2 posts
2 posts were published in the last hour 16:43 : From Alcatraz to Zero Trust: A Journey to RSA 2025 in San Francisco 16:43 : Predictions for 2025’s biggest attacks from a pentester perspective
From Alcatraz to Zero Trust: A Journey to RSA 2025 in San Francisco
During the winter months, the fog hangs heavy over San Francisco, mirroring the shroud of uncertainty that often accompanies discussions around cybersecurity. As I prepare to attend RSA 2025, the city’s iconic backdrop, Alcatraz, casts a long shadow, offering an…
Predictions for 2025’s biggest attacks from a pentester perspective
What’s Old is New: Network and Web Application Vulnerabilities The first newsworthy AI breach of 2024 didn’t come from a mind bending prompt injection, it came from classic exploit tactics. As we see organizations everywhere testing LLM and AI products…
Phishing in 2024: Navigating the Persistent Threat and AI’s Double-Edged Sword
In 2024, phishing remains one of the most prevalent and dangerous cybersecurity threats. Despite advancements in technology and increased awareness, cybercriminals continue to exploit human vulnerabilities, adapting their tactics to… The post Phishing in 2024: Navigating the Persistent Threat and…
Lesenswert: Top 5 Bücher über Künstliche Intelligenz
Zum Thema KI gibt es mittlerweile eine nahezu unüberschaubare Zahl von Ratgebern und Erklärbüchern. Unsere Empfehlungsliste hilft, den Durchblick zu behalten. Dieser Artikel wurde indexiert von t3n.de – Software & Entwicklung Lesen Sie den originalen Artikel: Lesenswert: Top 5 Bücher…
Entkomme dem Spotify-Algorithmus: Finde neue Musik jenseits deiner Hörgewohnheiten
Spotify liefert Nutzer:innen scheinbar immer das, was sie hören wollen. Doch dabei geht gleichzeitig der Spaß am Entdecken neuer Musik verloren. Aber es gibt Abhilfe. Dieser Artikel wurde indexiert von t3n.de – Software & Entwicklung Lesen Sie den originalen Artikel:…
Forschungsteam trainiert Open-Source-Reasoning-Modell für weniger als 450 Dollar
Forscher:innen der UC Berkeley veröffentlichen mit Sky-T1 ein leistungsfähiges Open-Source-Reasoning-Modell. Dank synthetischer Daten kostete das Training weniger als 450 Dollar. Dieser Artikel wurde indexiert von t3n.de – Software & Entwicklung Lesen Sie den originalen Artikel: Forschungsteam trainiert Open-Source-Reasoning-Modell für weniger…
What is PCI DSS 4.0: Is This Still Applicable For 2024?
In a time when cyber threats continuously evolve, a security standard or framework is essential for protecting digital assets. The Payment Card Industry Data Security Standard (PCI DSS), developed by the PCI Security Standards Council, empowers organisations to safeguard cardholder…
PCI DSS Requirements With v4.0.1 Updates For 2024
PCI DSS refers to the Payment Card Industry Data Security Standard created by the PCI Security Standards Council (PCI SSC), an independent entity founded by major payment card brands, including Visa, JCB International, MasterCard, American Express, and Discover. PCI DSS…
IT Security News Hourly Summary 2025-01-12 15h : 1 posts
1 posts were published in the last hour 13:11 : Elevating Security: The Crucial Role of Effective API Management in Today’s Digital Landscape
Elevating Security: The Crucial Role of Effective API Management in Today’s Digital Landscape
In today’s digital landscape, the increasing reliance on Application Programming Interfaces (APIs) brings significant security challenges that organizations must address. The Salt Labs State of API Security Report, 2024, reveals that… The post Elevating Security: The Crucial Role of Effective API…
Multi-OLE, (Sun, Jan 12th)
VBA macros and embedded files/objects are stored as OLE files inside OOXML files. This article has been indexed from SANS Internet Storm Center, InfoCON: green Read the original article: Multi-OLE, (Sun, Jan 12th)
How a researcher earned $100,000 hacking a Facebook server
Facebook paid $100,000 to a researcher for discovering a bug that granted him command access to an internal server in October 2024. TechCrunch first reported that Facebook awarded security researcher Ben Sadeghipour (@NahamSec) $100,000 for reporting a vulnerability that granted him access…
IT Security News Hourly Summary 2025-01-12 12h : 1 posts
1 posts were published in the last hour 10:35 : Paypal-Phishing: Angebliche monatliche Finanzberichte ködern Opfer
Paypal-Phishing: Angebliche monatliche Finanzberichte ködern Opfer
Derzeit schaffen es Phishing-Mails an Spam-Filtern vorbeizukommen, die einen monatlichen Finanzbericht für Paypal versprechen. Dieser Artikel wurde indexiert von heise Security Lesen Sie den originalen Artikel: Paypal-Phishing: Angebliche monatliche Finanzberichte ködern Opfer
Betrug mit Paket-SMS: Tausende Beschwerden über Abzocke
Angeblich hängt ein Paket im Zoll fest, bis ausstehende Zollgebühren bezahlt werden. Mit dieser Masche versuchen Betrüger an persönliche Daten zu gelangen. (Bundesnetzagentur, Onlineshop) Dieser Artikel wurde indexiert von Golem.de – Security Lesen Sie den originalen Artikel: Betrug mit Paket-SMS:…
Week in review: Exploited Ivanti Connect Secure zero-day, Patch Tuesday forecast
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Ivanti Connect Secure zero-day exploited by attackers (CVE-2025-0282) Ivanti has fixed two vulnerabilities affecting Ivanti Connect Secure, Policy Secure and ZTA gateways, one of which…
heise-Angebot: iX-Workshop: Netzwerkprobleme mit Wireshark analysieren und beheben
Praktische Übungen, Experten-Tipps und fundiertes Wissen: Lernen Sie, wie Sie mit Wireshark Netzwerkprobleme erkennen und beheben. Dieser Artikel wurde indexiert von heise Security Lesen Sie den originalen Artikel: heise-Angebot: iX-Workshop: Netzwerkprobleme mit Wireshark analysieren und beheben
Warum das KI-Modell o3 von OpenAI so hohe Kosten verursacht – und welche Leistungen es verspricht
Das neue Modell o3 von OpenAI hat in ersten Tests spektakuläre Ergebnisse gezeigt. Allerdings könnte es ziemlich teuer werden – von bis zu 1.000 US-Dollar pro Anfrage ist die Rede. Ist es das wirklich wert? Dieser Artikel wurde indexiert von…