IT Security News

Cybersecurity news and articles about information security, vulnerabilities, exploits, hacks, laws, spam, viruses, malware, breaches.

Main menu

Skip to content
  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Apps
    • Telegram Channel
DE, t3n.de - Software & Entwicklung

Wisst ihr noch? Als die Bahn einen Administrator für das 30 Jahre alte Windows 3.11 suchte

2024-12-31 15:12

Frei nach dem Motto „Repariere nichts, was nicht kaputt ist“ hält die Deutsche Bahn offenbar noch immer an Windows 3.11 fest. Anfang 2024 wurde zumindest ein:e Administrator:in für das 30 Jahre alte Betriebssystem gesucht. Dieser Artikel wurde indexiert von t3n.de…

Read more →

DE, t3n.de - Software & Entwicklung

Orca, Posaune und Lawine: Diese neuen Emojis sollen 2025 kommen

2024-12-31 15:12

Emojis gibt es viele, aber einige fehlen eben doch. Eine Posaune zum Beispiel, oder ein Orca – diesen eklatanten Missständen will das zuständige Unicode-Konsortium 2025 Abhilfe schaffen. Auf diese Emojis dürfen wir uns freuen. Dieser Artikel wurde indexiert von t3n.de…

Read more →

DE, t3n.de - Software & Entwicklung

Mehrere Arbeitsplätze übernommen: US-Finanzministerium geht von chinesischem Hackerangeriff aus

2024-12-31 15:12

Immer wieder werfen die USA China Hackerangriffe vor. Dieses Mal meldet das US-Finanzministerium eine Attacke auf seine IT-Systeme. Dieser Artikel wurde indexiert von t3n.de – Software & Entwicklung Lesen Sie den originalen Artikel: Mehrere Arbeitsplätze übernommen: US-Finanzministerium geht von chinesischem…

Read more →

DE, t3n.de - Software & Entwicklung

Wie Griechenland Eltern dabei helfen will, den Smartphone-Konsum ihrer Kinder besser zu managen

2024-12-31 15:12

Die griechische Regierung hat eine App angekündigt, die das möglich machen soll, was vielen unmöglich scheint: Eltern sollen darüber die Kontrolle über das erhalten, was ihre Kinder im Internet sehen – oder eben nicht. Bereits im März soll es losgehen.…

Read more →

DE, t3n.de - Software & Entwicklung

Y2K-Problem: Wie ein paar Dosen Fleisch den Millennium-Bug vorhersagten

2024-12-31 15:12

Börsencrash, Zusammenbruch der Energieversorgung oder Ausfall von Computern und Geldautomaten: Nicht wenige befürchteten am 31. Dezember 1999 den Weltuntergang. Ein paar Dosen Fleisch hatten den Millennium-Bug schon 1987 angekündigt. Dieser Artikel wurde indexiert von t3n.de – Software & Entwicklung Lesen…

Read more →

EN, Latest stories for ZDNet in Security

How to easily use Cloudflare’s secure DNS on your Mac and why it even matters

2024-12-31 15:12

If you want to get a security bump on your Mac, you should switch to secure DNS to encrypt your web traffic. This article has been indexed from Latest stories for ZDNET in Security Read the original article: How to…

Read more →

EN, Security News | TechCrunch

US telco Lumen says its network is now clear of China’s Salt Typhoon hackers

2024-12-31 15:12

Lumen says there is ‘no evidence’ that customer data was accessed during the intrusion © 2024 TechCrunch. All rights reserved. For personal use only. This article has been indexed from Security News | TechCrunch Read the original article: US telco…

Read more →

EN, Malwarebytes

Data breaches in 2024: Could it get any worse?

2024-12-31 15:12

An overview of what the year 2024 had to offer in the realm of data breaches: Big ones, sensitive data and some duds This article has been indexed from Malwarebytes Read the original article: Data breaches in 2024: Could it…

Read more →

EN, Malwarebytes

Connected contraptions cause conniption for 2024

2024-12-31 15:12

From “spying” air fryers to 3 million rogue toothbrushes, here are the strangest stories about internet-connected home goods in 2024. This article has been indexed from Malwarebytes Read the original article: Connected contraptions cause conniption for 2024

Read more →

EN, securityweek

Rhode Islanders’ Data Was Leaked From a Cyberattack on State Health Benefits Website

2024-12-31 15:12

Cybercriminals who hacked Rhode Island’s system for health and benefits programs have released files to a site on the dark web, The post Rhode Islanders’ Data Was Leaked From a Cyberattack on State Health Benefits Website appeared first on SecurityWeek.…

Read more →

EN, Security Boulevard

Why ISMS Policies Are Crucial for Compliance in Cybersecurity?

2024-12-31 15:12

In 2025, the cybersecurity landscape will continue to evolve rapidly, driven by increasing cyber threats and technological advancements. As governments and regulatory bodies implement stricter cybersecurity regulations, businesses will face pressure to ensure compliance. Failing to meet these standards could…

Read more →

hourly summary

IT Security News Hourly Summary 2024-12-31 15h : 8 posts

2024-12-31 15:12

8 posts were published in the last hour 14:5 : Safeguarding Executives in the Digital World 13:32 : New Year’s cybersecurity resolutions that every startup should keep 13:32 : Cyberhaven Chrome Extension Hack Linked to Widening Supply Chain Campaign 13:8…

Read more →

EN, Security Boulevard

Safeguarding Executives in the Digital World

2024-12-31 15:12

Nisos Safeguarding Executives in the Digital World It takes a combination of people and technology to attribute and solve executive protection problems and drive real-world consequences… The post Safeguarding Executives in the Digital World appeared first on Nisos by Nisos…

Read more →

EN, Security News | TechCrunch

New Year’s cybersecurity resolutions that every startup should keep

2024-12-31 14:12

These simple cybersecurity resolutions can help keep your startup protected from most malicious hackers. © 2024 TechCrunch. All rights reserved. For personal use only. This article has been indexed from Security News | TechCrunch Read the original article: New Year’s…

Read more →

EN, securityweek

Cyberhaven Chrome Extension Hack Linked to Widening Supply Chain Campaign

2024-12-31 14:12

The recent compromise of Cyberhaven’s Chrome extension appears to be part of a broad campaign that started over a year ago. The post Cyberhaven Chrome Extension Hack Linked to Widening Supply Chain Campaign appeared first on SecurityWeek. This article has…

Read more →

DE, Golem.de - Security

Anschlag in Magdeburg: Bundesregierung ändert Haltung zur Vorratsdatenspeicherung

2024-12-31 14:12

SPD und Grüne ändern ihre Haltung zur Vorratsdatenspeicherung. Zuvor hatten Bundesländer und Unionsfraktion deren Einführung gefordert. (Vorratsdatenspeicherung, Datenschutz) Dieser Artikel wurde indexiert von Golem.de – Security Lesen Sie den originalen Artikel: Anschlag in Magdeburg: Bundesregierung ändert Haltung zur Vorratsdatenspeicherung

Read more →

EN, ZephrSec - Adventures In Information Security

2024 – The Year of Learning More and More

2024-12-31 14:12

2024 marks 13 years in security, 10 in offensive security, and 8 of blogging. This year has been about growth, learning, and sharing knowledge. From leadership insights to career reflections, this “year in review” celebrates technical contributions, personal achievements, and…

Read more →

EN, GBHackers Security | #1 Globally Trusted Cyber Security News Platform

CISA Warns of Palo Alto Networks PAN-OS Vulnerability Exploited in Wild

2024-12-31 14:12

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a high-priority alert on a critical vulnerability in Palo Alto Networks PAN-OS. Tracked as CVE-2024-3393, this flaw has been observed in active exploitation, putting systems at risk of remote disruption. CVE-2024-3393:…

Read more →

Check Point Blog, EN

DeepDLL– A New Approach to Detect Malicious DLLs

2024-12-31 14:12

Cyber attackers are increasingly using DLL (Dynamic Link Library) files to spread malware. Modern attack chains have complex multi-stage flows and DLL is a common step in all major malware families. Methods like DLL hijacking, sideloading, and reflective DLL injection…

Read more →

Cyber Defense Magazine, EN

Protect SAP Supply Chains by Preventing Cyber Attacks

2024-12-31 14:12

Highly advanced and extremely dangerous cyberattacks are targeting SAP (from the company originally called “System Analysis Program” Development) software supply chains with an alarming increase in frequency. By taking advantage… The post Protect SAP Supply Chains by Preventing Cyber Attacks…

Read more →

EN, Silicon UK

Trump Urges Supreme Court To Delay TikTok Deadline

2024-12-31 13:12

President-elect Trump urges US Supreme Court to delay deadline for TikTok to be banned in United States until after he takes office This article has been indexed from Silicon UK Read the original article: Trump Urges Supreme Court To Delay…

Read more →

EN, Silicon UK

New York Agencies Must Publish AI Assessments Under New Law

2024-12-31 13:12

New York state agencies will have to publish assessments of the AI technologies they use under newly signed law This article has been indexed from Silicon UK Read the original article: New York Agencies Must Publish AI Assessments Under New…

Read more →

EN, Silicon UK

Run:ai To Open Source Software As Nvidia Completes $700m Buy

2024-12-31 13:12

Israeli start-up Run:ai to open source GPU management software as Nvidia completes $700m buyout, following antitrust scrutiny This article has been indexed from Silicon UK Read the original article: Run:ai To Open Source Software As Nvidia Completes $700m Buy

Read more →

EN, Silicon UK

US Treasury Workstations Hacked By China In ‘Major Incident’

2024-12-31 13:12

US Treasury says workstations accessed by China-backed attackers and files accessed after compromise of third-party security provider This article has been indexed from Silicon UK Read the original article: US Treasury Workstations Hacked By China In ‘Major Incident’

Read more →

Page 2092 of 4620
« 1 … 2,090 2,091 2,092 2,093 2,094 … 4,620 »

Pages

  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Apps
    • Telegram Channel

Recent Posts

  • IT Security News Hourly Summary 2025-12-13 03h : 1 posts December 13, 2025
  • The Autonomous MSSP: How to Turn XDR Volume into a Competitive Advantage December 13, 2025
  • Emergency fixes deployed by Google and Apple after targeted attacks December 13, 2025
  • Fake Microsoft Teams and Google Meet Downloads Spread Oyster Backdoor December 13, 2025
  • Fake Microsoft Teams and Google Meet Downloads Spread Oyster Backdoor December 13, 2025
  • Friday Squid Blogging: Giant Squid Eating a Diamondback Squid December 13, 2025
  • IT Security News Hourly Summary 2025-12-13 00h : 6 posts December 13, 2025
  • Development Team Augmentation: A Strategic Approach for High-Performance Teams December 13, 2025
  • Notepad++ fixed updater bugs that allowed malicious update hijacking December 13, 2025
  • IT Security News Daily Summary 2025-12-12 December 13, 2025
  • Microsoft RasMan DoS 0-day gets unofficial patch – and a working exploit December 13, 2025
  • Fake Leonardo DiCaprio Torrent Spreads Agent Tesla Malware December 13, 2025
  • NDSS 2025 – KernelSnitch: Side Channel-Attacks On Kernel Data Structures December 13, 2025
  • Exploitation of Critical Vulnerability in React Server Components (Updated December 12) December 13, 2025
  • Windows Defender Firewall Bug Leaks Sensitive Memory December 13, 2025
  • Implementing HTTP Strict Transport Security (HSTS) across AWS services December 13, 2025
  • News brief: Future of security holds bigger budgets, new threats December 12, 2025
  • Google and Apple roll out emergency security updates after zero-day attacks December 12, 2025
  • Zero Trust in CI/CD Pipelines: A Practical DevSecOps Implementation Guide December 12, 2025
  • Malicious VS Code Extensions Hide Malware in PNG Files December 12, 2025

Copyright © 2025 IT Security News. All Rights Reserved. The Magazine Basic Theme by bavotasan.com.

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}