IT Security News

Cybersecurity news and articles about information security, vulnerabilities, exploits, hacks, laws, spam, viruses, malware, breaches.

Main menu

Skip to content
  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Apps
    • Telegram Channel
EN, Security Boulevard

NDSS 2025 – A Systematic Evaluation Of Novel And Existing Cache Side Channels

2025-12-13 18:12

Session 5D: Side Channels 1 Authors, Creators & Presenters: Fabian Rauscher (Graz University of Technology), Carina Fiedler (Graz University of Technology), Andreas Kogler (Graz University of Technology), Daniel Gruss (Graz University of Technology) PAPER A Systematic Evaluation Of Novel And…

Read more →

EN, Hackread – Cybersecurity News, Data Breaches, AI, and More

UK’s ICO Fine LastPass £1.2 Million Over 2022 Security Breach

2025-12-13 18:12

UK’s ICO fines LastPass £1.2M for the 2022 data breach that exposed 1.6 million users’ data. Learn how a flaw in an employee’s personal PC led to the massive security failure. This article has been indexed from Hackread – Cybersecurity…

Read more →

CySecurity News - Latest Information Security and Hacking Incidents, EN

Fake GitHub OSINT Tools Spread PyStoreRAT Malware

2025-12-13 17:12

  Attackers are using GitHub as part of a campaign to spread a novel JavaScript-based RAT called PyStoreRAT, masquerading as widely used OSINT, GPT, and security utilities targeting developers and analysts. The malware campaign leverages small pieces of Python or…

Read more →

CySecurity News - Latest Information Security and Hacking Incidents, EN

AI Browsers Raise Privacy and Security Risks as Prompt Injection Attacks Grow

2025-12-13 17:12

  A new wave of competition is stirring in the browser market as companies like OpenAI, Perplexity, and The Browser Company aggressively push to redefine how humans interact with the web. Rather than merely displaying pages, these AI browsers will…

Read more →

CySecurity News - Latest Information Security and Hacking Incidents, EN

Apple Addresses Two Actively Exploited Zero-Day Security Flaws

2025-12-13 17:12

Following confirmation that two previously unknown security flaws had been actively exploited in the wild on Friday, Apple rolled out a series of security updates across its entire software ecosystem to address this issue, further demonstrating the continued use of…

Read more →

CySecurity News - Latest Information Security and Hacking Incidents, EN

5 Critical Situations Where You Should Never Rely on ChatGPT

2025-12-13 17:12

  Just a few years after its launch, ChatGPT has evolved into a go-to digital assistant for tasks ranging from quick searches to event planning. While it undeniably offers convenience, treating it as an all-knowing authority can be risky. ChatGPT…

Read more →

Cyber Security News, EN

CISA Warns of Google Chromium 0-Day Vulnerability Exploited in Attacks

2025-12-13 16:12

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical zero-day vulnerability in Google Chromium’s ANGLE graphics engine to its Known Exploited Vulnerabilities (KEV) catalog. Tracked as CVE-2025-14174, the flaw allows remote attackers to trigger out-of-bounds memory access…

Read more →

Cyber Security News, EN

Empire 6.3.0 Launches With New Features for Red Teams and Penetration Testers

2025-12-13 16:12

BC Security has announced the release of Empire 6.3.0, the latest iteration of the widely used post-exploitation and adversary emulation framework. This update reinforces Empire’s position as a premier tool for Red Teams and penetration testers, offering a flexible, modular server…

Read more →

Cyber Security News, EN

Google Warns Multiple Hacker Groups Are Exploiting React2Shell to Spread Malware

2025-12-13 16:12

Google Threat Intelligence Group (GTIG) has issued a warning regarding the widespread exploitation of a critical security flaw in React Server Components. Known as React2Shell (CVE-2025-55182), this vulnerability allows attackers to take control of servers remotely without needing a password. Since…

Read more →

EN, The Hacker News

CISA Adds Actively Exploited Sierra Wireless Router Flaw Enabling RCE Attacks

2025-12-13 15:12

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added a high-severity flaw impacting Sierra Wireless AirLink ALEOS routers to its Known Exploited Vulnerabilities (KEV) catalog, following reports of active exploitation in the wild. CVE-2018-4063 (CVSS score: 8.8/9.9) refers…

Read more →

EN, Security Latest

AI Toys for Kids Talk About Sex, Drugs, and Chinese Propaganda

2025-12-13 14:12

Plus: Travelers to the US may have to hand over five years of social media history, South Korean CEOs are resigning due to cyberattacks, and more. This article has been indexed from Security Latest Read the original article: AI Toys…

Read more →

EN, Security Affairs

U.S. CISA adds Google Chromium and Sierra Wireless AirLink ALEOS flaws to its Known Exploited Vulnerabilities catalog

2025-12-13 14:12

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Google Chromium and Sierra Wireless AirLink ALEOS flaws to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added [1, 2] Microsoft Windows and WinRAR flaws to its Known…

Read more →

Cyber Security News, EN

Rust-Based Luca Stealer Spreads Across Linux and Windows Systems

2025-12-13 11:12

Threat actors are increasingly abandoning traditional languages like C and C++ in favor of modern alternatives such as Golang, Rust, and Nim. This strategic shift enables developers to compile malicious code for both Linux and Windows with minimal modifications. Among…

Read more →

hourly summary

IT Security News Hourly Summary 2025-12-13 09h : 2 posts

2025-12-13 10:12

2 posts were published in the last hour 7:31 : Hackers Target Windows Systems Using Phantom Stealer Hidden in ISO Files 7:31 : New Phantom Stealer Campaign Hits Windows Machines Through ISO Mounting

Read more →

EN, GBHackers Security | #1 Globally Trusted Cyber Security News Platform

Hackers Target Windows Systems Using Phantom Stealer Hidden in ISO Files

2025-12-13 09:12

Seqrite Labs has uncovered an active Russian phishing campaign that delivers Phantom information-stealing malware through malicious ISO files embedded in fake payment confirmation emails. The sophisticated attack primarily targets finance and accounting professionals in Russia, using social engineering tactics to…

Read more →

Cyber Security News, EN

New Phantom Stealer Campaign Hits Windows Machines Through ISO Mounting

2025-12-13 09:12

Researchers have uncovered a sophisticated phishing campaign originating in Russia that deploys the Phantom information-stealing malware via malicious ISO files. The attack, dubbed “Operation MoneyMount-ISO,” targets finance and accounting departments explicitly using fake payment confirmation emails to trick victims into…

Read more →

EN, The Hacker News

Apple Issues Security Updates After Two WebKit Flaws Found Exploited in the Wild

2025-12-13 08:12

Apple on Friday released security updates for iOS, iPadOS, macOS, tvOS, watchOS, visionOS, and its Safari web browser to address two security flaws that it said have been exploited in the wild, one of which is the same flaw that…

Read more →

EN, welivesecurity

Black Hat Europe 2025: Was that device designed to be on the internet at all?

2025-12-13 08:12

Behind the polished exterior of many modern buildings sit outdated systems with vulnerabilities waiting to be found This article has been indexed from WeLiveSecurity Read the original article: Black Hat Europe 2025: Was that device designed to be on the…

Read more →

Cybersecurity Today, EN

The Hidden Danger of Storing Secrets Online | Interview with Jake Knott from Watchtower

2025-12-13 07:12

In this episode of Cybersecurity Today, host Jim Love discusses the shocking discovery of over 80,000 leaked credentials and secrets in online code formatting tools with Jake Knott, a principal security researcher from Watchtower. They delve into the vulnerabilities exposed…

Read more →

Cyber Security News, EN

Apple 0-Day Vulnerabilities Exploited in Sophisticated Attacks Targeting iPhone Users

2025-12-13 06:12

Apple patches two WebKit zero-day flaws actively exploited in sophisticated attacks targeting specific iPhone users running iOS versions prior to 26.​ The iOS 26.2 and iPadOS 26.2 updates, released December 12, 2025, address CVE-2025-43529 and CVE-2025-14174 in WebKit. CVE-2025-43529 involves…

Read more →

EN, Threat Intelligence

Multiple Threat Actors Exploit React2Shell (CVE-2025-55182)

2025-12-13 05:12

Written by: Aragorn Tseng, Robert Weiner, Casey Charrier, Zander Work, Genevieve Stark, Austin Larsen Introduction On Dec. 3, 2025, a critical unauthenticated remote code execution (RCE) vulnerability in React Server Components, tracked as CVE-2025-55182 (aka “React2Shell”), was publicly disclosed. Shortly…

Read more →

hourly summary

IT Security News Hourly Summary 2025-12-13 03h : 1 posts

2025-12-13 04:12

1 posts were published in the last hour 1:32 : The Autonomous MSSP: How to Turn XDR Volume into a Competitive Advantage

Read more →

EN, Security Boulevard

The Autonomous MSSP: How to Turn XDR Volume into a Competitive Advantage

2025-12-13 03:12

Turn XDR volume into revenue. Morpheus investigates 100% of alerts and triages 95% in under 2 minutes, letting MSSPs scale without adding headcount. The post The Autonomous MSSP: How to Turn XDR Volume into a Competitive Advantage appeared first on…

Read more →

EN, Security Affairs

Emergency fixes deployed by Google and Apple after targeted attacks

2025-12-13 03:12

Google and Apple issued emergency updates to address zero-day flaws exploited in attacks targeting an unknown number of users. Apple and Google have both pushed out urgent security updates after uncovering a highly targeted attacks against an unknown number of…

Read more →

Page 1 of 4621
1 2 3 … 4,621 »

Pages

  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Apps
    • Telegram Channel

Recent Posts

  • NDSS 2025 – A Systematic Evaluation Of Novel And Existing Cache Side Channels December 13, 2025
  • UK’s ICO Fine LastPass £1.2 Million Over 2022 Security Breach December 13, 2025
  • Fake GitHub OSINT Tools Spread PyStoreRAT Malware December 13, 2025
  • AI Browsers Raise Privacy and Security Risks as Prompt Injection Attacks Grow December 13, 2025
  • Apple Addresses Two Actively Exploited Zero-Day Security Flaws December 13, 2025
  • 5 Critical Situations Where You Should Never Rely on ChatGPT December 13, 2025
  • CISA Warns of Google Chromium 0-Day Vulnerability Exploited in Attacks December 13, 2025
  • Empire 6.3.0 Launches With New Features for Red Teams and Penetration Testers December 13, 2025
  • Google Warns Multiple Hacker Groups Are Exploiting React2Shell to Spread Malware December 13, 2025
  • CISA Adds Actively Exploited Sierra Wireless Router Flaw Enabling RCE Attacks December 13, 2025
  • AI Toys for Kids Talk About Sex, Drugs, and Chinese Propaganda December 13, 2025
  • U.S. CISA adds Google Chromium and Sierra Wireless AirLink ALEOS flaws to its Known Exploited Vulnerabilities catalog December 13, 2025
  • Rust-Based Luca Stealer Spreads Across Linux and Windows Systems December 13, 2025
  • IT Security News Hourly Summary 2025-12-13 09h : 2 posts December 13, 2025
  • Hackers Target Windows Systems Using Phantom Stealer Hidden in ISO Files December 13, 2025
  • New Phantom Stealer Campaign Hits Windows Machines Through ISO Mounting December 13, 2025
  • Apple Issues Security Updates After Two WebKit Flaws Found Exploited in the Wild December 13, 2025
  • Black Hat Europe 2025: Was that device designed to be on the internet at all? December 13, 2025
  • The Hidden Danger of Storing Secrets Online | Interview with Jake Knott from Watchtower December 13, 2025
  • Apple 0-Day Vulnerabilities Exploited in Sophisticated Attacks Targeting iPhone Users December 13, 2025

Copyright © 2025 IT Security News. All Rights Reserved. The Magazine Basic Theme by bavotasan.com.

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}