Updates sollen neue Funktionen bringen und alte Probleme lösen. Windows 11 24H2 sorgte dagegen durch Fehler für Frust bei Nutzer:innen. Jetzt sollen Computer die Version automatisch laden – aber nicht in jedem Fall. Dieser Artikel wurde indexiert von t3n.de –…
Eliza: Der erste Chatbot der Welt ist aus 60 Jahre altem Code wiederauferstanden
Mitte der 1960er-Jahre hatte der MIT-Informatiker Joseph Weizenbaum mit Eliza den ersten Chatbot der Welt entwickelt. 60 Jahre später ist es Forscher:innen gelungen, das Programm wieder auf seinem originalen Betriebssystem zum Laufen zu bringen. Dieser Artikel wurde indexiert von t3n.de…
BSI zertfiziert erste quantensichere Smartcard
Das BSI hat die erste quantensichere Smartcard zertifiziert. Quantencomputer können die Verschlüsselung von Daten damit nicht knacken. Dieser Artikel wurde indexiert von heise Security Lesen Sie den originalen Artikel: BSI zertfiziert erste quantensichere Smartcard
Akamai: Supporting Chinese Enterprises in Global Expansion
China is a cornerstone of Akamai?s operations and we view ourselves as partners with Chinese businesses as they navigate the complexities of a global economy. This article has been indexed from Blog Read the original article: Akamai: Supporting Chinese Enterprises…
AI tool GeoSpy analyzes images and identifies locations in seconds
Forget OSINT, AI-supported tool GeoSpy can determine a person’s location based on their surroundings in a picture. This article has been indexed from Malwarebytes Read the original article: AI tool GeoSpy analyzes images and identifies locations in seconds
Vulnerability Summary for the Week of January 13, 2025
High Vulnerabilities PrimaryVendor — Product Description Published CVSS Score Source Info 1000 Projects–Campaign Management System Platform for Women A vulnerability was found in 1000 Projects Campaign Management System Platform for Women 1.0. It has been declared as critical. Affected by…
Mirai Variant Murdoc_Botnet Exploits AVTECH IP Cameras and Huawei Routers
Cybersecurity researchers have warned of a new large-scale campaign that exploits security flaws in AVTECH IP cameras and Huawei HG532 routers to rope the devices into a Mirai botnet variant dubbed Murdoc_Botnet. The ongoing activity “demonstrates enhanced capabilities, exploiting vulnerabilities…
SIEM am Ende? Was können XDR, SOAR & Co.
Cybersicherheit und Bedrohungserkennung sind essenziell. Warum klassische SIEM-Lösungen an ihre Grenzen stoßen und XDR neue Möglichkeiten bietet. Dieser Artikel wurde indexiert von Newsfeed Lesen Sie den originalen Artikel: SIEM am Ende? Was können XDR, SOAR & Co.
BSI zertifiziert erste Smartcard mit Post-Quanten-kryptografischem Algorithmus
Das BSI hat die erste quantensichere Smartcard zertifiziert. Quantencomputer können die Verschlüsselung von Daten damit nicht knacken. Dieser Artikel wurde indexiert von heise Security Lesen Sie den originalen Artikel: BSI zertifiziert erste Smartcard mit Post-Quanten-kryptografischem Algorithmus
Trump Signs Executive Order To Delay TikTok Ban
TikTok receives executive order from Donald Trump to grant time for a sale to be reach, but will ByteDance agree? This article has been indexed from Silicon UK Read the original article: Trump Signs Executive Order To Delay TikTok Ban
Ransomware Groups Abuse Microsoft Services for Initial Access
Sophos warns of two ransomware groups abusing Microsoft 365 services and default configurations to contact internal enterprise users. The post Ransomware Groups Abuse Microsoft Services for Initial Access appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…
GDPR Fines Total €1.2bn in 2024
Data from DLA Piper showed a 33% year-on-year fall in GDPR fines issued in Europe in 2024, with total penalties reaching €1.2bn This article has been indexed from www.infosecurity-magazine.com Read the original article: GDPR Fines Total €1.2bn in 2024
OpenSSL Position and Plans on Private Key Formats for the ML-KEM and ML-DSA Post-quantum (PQ) Algorithms
The anticipated future arrival of cryptographically relevant quantum computers (CRQCs), that could undermine the algorithms that underlie the currently most widely used public key algorithms (ECDHE, ECDSA, DH and RSA), has led to the development and recent standardisation of new…
IT Security News Hourly Summary 2025-01-21 15h : 12 posts
12 posts were published in the last hour 13:37 : Tunneling Flaws Put VPNs, CDNs and Routers at Risk Globally 13:37 : 5 Best Endpoint Detection & Response Solutions for 2025 13:37 : HPE probes IntelBroker’s bold data theft boasts…
Tunneling Flaws Put VPNs, CDNs and Routers at Risk Globally
Millions of devices, including home routers, VPN servers, and CDNs are vulnerable to exploitation due to critical flaws… This article has been indexed from Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News Read the original article: Tunneling Flaws Put…
5 Best Endpoint Detection & Response Solutions for 2025
Endpoint detection and response (EDR) software is the best way to detect, investigate, and respond to advanced attacks. Endpoint detection and response software is a security solution that protects against malware and other threats. This article has been indexed from…
HPE probes IntelBroker’s bold data theft boasts
Incident response protocols engaged following claims of source code burglary Hewlett Packard Enterprise (HPE) is probing assertions made by prolific Big Tech intruder IntelBroker that they broke into the US corporation’s systems and accessed source code, among other things.… This…
Almost 10% of GenAI Prompts Include Sensitive Data: Study
A study by cybersecurity startup Harmonic Security found that 8.5% of prompts entered into generative AI models like ChatGPT, Copilot, and Gemini last year included sensitive information, putting personal and corporate data at risk of being leaked. The post Almost…
13,000 MikroTik Routers Hijacked by Botnet for Malspam and Cyberattacks
A global network of about 13,000 hijacked Mikrotik routers has been employed as a botnet to propagate malware via spam campaigns, the latest addition to a list of botnets powered by MikroTik devices. The activity “take[s] advantage of misconfigured DNS…
Server verschlüsselt: Cyberangriff trifft zahlreiche Schulen in Rheinland-Pfalz
Der Angriff soll Auswirkungen auf insgesamt 45 Schulen haben. Hacker haben Systeme eines IT-Dienstleisters infiltriert und Ransomware eingeschleust. (Cybercrime, Verschlüsselung) Dieser Artikel wurde indexiert von Golem.de – Security Lesen Sie den originalen Artikel: Server verschlüsselt: Cyberangriff trifft zahlreiche Schulen in…
[NEU] [mittel] Elasticsearch: Schwachstelle ermöglicht Denial of Service
Ein entfernter, authentisierter Angreifer kann eine Schwachstelle in Elasticsearch ausnutzen, um einen Denial of Service Angriff durchzuführen. Dieser Artikel wurde indexiert von BSI Warn- und Informationsdienst (WID): Schwachstellen-Informationen (Security Advisories) Lesen Sie den originalen Artikel: [NEU] [mittel] Elasticsearch: Schwachstelle ermöglicht…
[NEU] [mittel] Kibana: Schwachstelle ermöglicht Denial of Service
Ein entfernter, authentisierter Angreifer kann eine Schwachstelle in Kibana ausnutzen, um einen Denial of Service Angriff durchzuführen. Dieser Artikel wurde indexiert von BSI Warn- und Informationsdienst (WID): Schwachstellen-Informationen (Security Advisories) Lesen Sie den originalen Artikel: [NEU] [mittel] Kibana: Schwachstelle ermöglicht…
CERT-UA warned of scammers impersonating the agency using fake AnyDesk requests
CERT-UA warned of scammers impersonating the agency, using fake AnyDesk requests to conduct fraudulent security audits. The Computer Emergency Response Team of Ukraine (CERT-UA) warned of cyber scams involving threat actors impersonating the agency by sending fraudulent AnyDesk connection requests…
Is Unified Access Control Zero Trust’s Silver Bullet?
With the advent of Zero Trust architecture, where the principle of “never trust, always verify” prevails, the importance of comprehensive access control has never been more pronounced. As cyber threats… The post Is Unified Access Control Zero Trust’s Silver Bullet?…