IT Security News

Cybersecurity news and articles about information security, vulnerabilities, exploits, hacks, laws, spam, viruses, malware, breaches.

Main menu

Skip to content
  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Apps
    • Telegram Channel
DE, t3n.de - Software & Entwicklung

1-800-ChatGPT ist seine Nummer: Du kannst den KI-Chatbot jetzt anrufen oder ihm schreiben

2024-12-19 03:12

OpenAI macht ChatGPT jetzt auf zwei weiteren Kommunikationskanälen verfügbar – der KI-Chatbot kann per Telefon und Whatsapp-Chat kontaktiert werden. Interessant ist auch, wie es zu der Funktion kam. Dieser Artikel wurde indexiert von t3n.de – Software & Entwicklung Lesen Sie den…

Read more →

EN, SANS Internet Storm Center, InfoCON: green

ISC Stormcast For Thursday, December 19th, 2024 https://isc.sans.edu/podcastdetail/9262, (Thu, Dec 19th)

2024-12-19 03:12

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from SANS Internet Storm Center, InfoCON: green Read the original article: ISC Stormcast For Thursday, December 19th, 2024…

Read more →

DE, heise Security

Betrugsmail: Cyberversicherung muss Schaden nicht ersetzen

2024-12-19 00:12

Klassisches Mail-Spoofing kostete eine deutsche Firma 85.000 Euro. Ihre Cyberversicherung deckt den Schaden nicht, sagt das Landgericht Hagen. Dieser Artikel wurde indexiert von heise Security Lesen Sie den originalen Artikel: Betrugsmail: Cyberversicherung muss Schaden nicht ersetzen

Read more →

DZone Security Zone, EN

Zero Trust for AI: Building Security from the Ground Up

2024-12-19 00:12

As artificial intelligence (AI) continues to revolutionize industries, its role in critical applications continues to grow exponentially. With all this innovation comes a growing concern — how do we keep AI systems secure? Unlike traditional applications, AI deals with highly…

Read more →

EN, Security Affairs

Russia-linked APT29 group used red team tools in rogue RDP attacks

2024-12-19 00:12

Russia-linked APT29 group uses malicious RDP configuration files, adapting red teaming methods for cyberattacks to compromise systems. In October 2024, the Russia-linked cyber espionage group APT29 (aka Earth Koshchei, SVR group, Cozy Bear, Nobelium, BlueBravo, Midnight Blizzard, and The Dukes) used rogue RDP attacks via phishing…

Read more →

hourly summary

IT Security News Hourly Summary 2024-12-19 00h : 4 posts

2024-12-19 00:12

4 posts were published in the last hour 23:4 : Biggest Crypto Scam Tactics in 2024 and How to Avoid Them 23:4 : Microsoft Defender for Cloud named a Leader in Frost Radar™ for CNAPP for the second year in…

Read more →

EN, Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News

Biggest Crypto Scam Tactics in 2024 and How to Avoid Them

2024-12-19 00:12

Stay alert to crypto scams with our guide to 2024’s top threats, including phishing, malware, Ponzi schemes, and… This article has been indexed from Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News Read the original article: Biggest Crypto Scam…

Read more →

EN, Microsoft Security Blog

Microsoft Defender for Cloud named a Leader in Frost Radar™ for CNAPP for the second year in a row!

2024-12-19 00:12

In the ever-evolving landscape of cloud security, Microsoft continues to assert its dominance with its comprehensive and innovative solutions. The Frost Radar™: Cloud-Native Application Protection Platforms, 2024 report underscores Microsoft’s leadership in both – the innovation and growth index, highlighting…

Read more →

EN, Microsoft Security Blog

Foundry study highlights the benefits of a unified security platform in new e-book

2024-12-19 00:12

Microsoft commissioned Foundry to conduct a study to understand the current state of threat protection. Read the new e-book for research-driven insights into a unified security platform. The post Foundry study highlights the benefits of a unified security platform in…

Read more →

daily summary

IT Security News Daily Summary 2024-12-18

2024-12-18 23:12

184 posts were published in the last hour 21:32 : Slack is becoming an AI workplace: Here’s what that means for your job 21:32 : How to use the Hydra password-cracking tool 21:32 : Threat actors are attempting to exploit…

Read more →

EN, Security News | VentureBeat

Slack is becoming an AI workplace: Here’s what that means for your job

2024-12-18 22:12

Slack is evolving from a simple messaging app into an AI-powered workplace platform where digital agents work alongside humans, promising to transform how office work gets done — here’s what that means for your job. This article has been indexed…

Read more →

EN, Search Security Resources and Information from TechTarget

How to use the Hydra password-cracking tool

2024-12-18 22:12

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Search Security Resources and Information from TechTarget Read the original article: How to use the Hydra password-cracking…

Read more →

EN, Security Affairs

Threat actors are attempting to exploit Apache Struts vulnerability CVE-2024-53677

2024-12-18 22:12

Researchers warn that threat actors are attempting to exploit a recently disclosed Apache Struts vulnerability CVE-2024-53677. Researchers warn that threat actors are attempting to exploit the vulnerability CVE-2024-53677 (CVSS score of 9.5) in Apache Struts. A remote attacker could exploit…

Read more →

EN, Security Boulevard

Ground Rule of Cyber Hygiene: Keep Your Password Policy Up to Date

2024-12-18 22:12

Since the earliest incidents of computer break-ins, experts have maintained that making the internet a safe place is going to be an uphill battle. Their reasons, while largely technical, also encompass human complacency. Research shows that most organizations and users…

Read more →

EN, Panda Security Mediacenter

Hackers stole the details of 58,000 people from a Bitcoin ATM operator

2024-12-18 22:12

A popular Bitcoin ATM operator, Byte Federal, filed a report with the Office of Maine’s Attorney General stating that the details of approximately 58 thousand… The post Hackers stole the details of 58,000 people from a Bitcoin ATM operator appeared…

Read more →

EN, Latest stories for ZDNet in Security

US may ban world’s most popular routers and modems – what that means for you

2024-12-18 22:12

TP-Link products have been connected to several high-profile hacking incidents. (Also, they’re made in China.) This article has been indexed from Latest stories for ZDNET in Security Read the original article: US may ban world’s most popular routers and modems…

Read more →

EN, Security Latest

Congress Again Fails to Limit Scope of Spy Powers in New Defense Bill

2024-12-18 22:12

The National Defense Authorization Act passed today, but lawmakers stripped language that would keep the Trump administration from wielding unprecedented authority to surveil Americans. This article has been indexed from Security Latest Read the original article: Congress Again Fails to…

Read more →

EN, The Register - Security

US reportedly mulls TP-Link router ban over national security risk

2024-12-18 22:12

It could end up like Huawei -Trump’s gonna get ya, get ya, get ya The Feds may ban the sale of TP-Link routers in the US over ongoing national security concerns about Chinese-made devices being used in cyberattacks.… This article…

Read more →

AWS Security Blog, EN

AWS named Leader in the 2024 ISG Provider Lens report for Sovereign Cloud Infrastructure Services (EU)

2024-12-18 22:12

For the second year in a row, Amazon Web Services (AWS) is named as a Leader in the Information Services Group (ISG) Provider Lens Quadrant report for Sovereign Cloud Infrastructure Services (EU), published on December 18, 2024. ISG is a…

Read more →

EN, Sekoia.io Blog

Detection engineering at scale: one step closer (part one)

2024-12-18 21:12

Security Operations Center (SOC) and Detection Engineering teams frequently encounter challenges in both creating and maintaining detection rules, along with their associated documentation, over time. These difficulties stem largely from the sheer number of detection rules required to address a…

Read more →

EN, Security News | VentureBeat

Salesforce drops Agentforce 2.0, brings reasoning AI to enterprise

2024-12-18 21:12

Salesforce has unveiled Agentforce 2.0, introducing AI agents with human-like reasoning abilities that can autonomously handle complex business tasks, marking a major push into the emerging ‘digital labor’ market. This article has been indexed from Security News | VentureBeat Read…

Read more →

EN, Security News | TechCrunch

Tracker firm Hapn spilling names of thousands of GPS tracking customers

2024-12-18 21:12

A security researcher found customer names and workplace affiliations spilling directly from Hapn’s servers. © 2024 TechCrunch. All rights reserved. For personal use only. This article has been indexed from Security News | TechCrunch Read the original article: Tracker firm…

Read more →

EN, Security Boulevard

Managing Risks: Executive Protection in the Digital Age

2024-12-18 21:12

The recent incident involving the United Healthcare CEO has sparked critical conversations in corporate boardrooms about the evolving threat landscape and the importance of robust security measures centered around executive protection. The incident has illuminated a stark and unsettling reality:…

Read more →

DE, t3n.de - Software & Entwicklung

Wie weit KI-Tools wirklich gehen: Studie enthüllt die Strategien von OpenAI und Co.

2024-12-18 21:12

KI-Modelle greifen laut einer etwas beunruhigenden Untersuchung zu Lügen oder Täuschung, um eigene Ziele zu verfolgen oder etwa einer Abschaltung zu entgehen. Ein Modell stach dabei besonders – negativ – hervor. Dieser Artikel wurde indexiert von t3n.de – Software & Entwicklung Lesen…

Read more →

Page 2092 of 4571
« 1 … 2,090 2,091 2,092 2,093 2,094 … 4,571 »

Pages

  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Apps
    • Telegram Channel

Recent Posts

  • IT Security News Hourly Summary 2025-12-03 15h : 9 posts December 3, 2025
  • Researchers spotted Lazarus’s remote IT workers in action December 3, 2025
  • Fileless protection explained: Blocking the invisible threat others miss December 3, 2025
  • Critical King Addons Vulnerability Exploited to Hack WordPress Sites December 3, 2025
  • MuddyWater Attacks Critical Infrastructure With Custom Malware and Improved Tactics December 3, 2025
  • CISA Warns of Android 0-Day Vulnerability Exploited in Attacks December 3, 2025
  • The Digital Trail That Led Scammers to Her Personal and Financial Information December 3, 2025
  • CISA Warns of Spyware Gangs Targeting Signal and WhatsApp Users December 3, 2025
  • Massive gambling network doubles as hidden C2 and anonymity infrastructure, researchers say December 3, 2025
  • UK Ransomware Payment Ban to Come with Exemptions, Security Minster Say December 3, 2025
  • Longwatch RCE Flaw Allows Attackers to Run Remote Code with Elevated Privileges December 3, 2025
  • Malicious Rust “evm-units” Impersonator Deploys OS-Specific Payloads December 3, 2025
  • Shai-Hulud 2.0 Cyberattack Compromises 30,000 Repos and Exposes 500 GitHub Accounts December 3, 2025
  • Let’s Encrypt Cutting Certificate Lifespan from 90 Days to 45 Days December 3, 2025
  • New Calendly-Inspired Phishing Attack Aims to Steal Google Workspace Credentials December 3, 2025
  • Discover the AI Tools Fueling the Next Cybercrime Wave — Watch the Webinar December 3, 2025
  • After intense backlash, India pulls mandate to pre-install government app on smartphones December 3, 2025
  • ServiceNow to Acquire Identity Security Firm Veza in Reported $1 Billion Deal December 3, 2025
  • Arizona Attorney General Sues Chinese Online Retailer Temu Over Data Theft Claims December 3, 2025
  • Disinformation and Cyber-Threats Among Top Global Exec Concerns December 3, 2025

Copyright © 2025 IT Security News. All Rights Reserved. The Magazine Basic Theme by bavotasan.com.

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}