IT Security News

Cybersecurity news and articles about information security, vulnerabilities, exploits, hacks, laws, spam, viruses, malware, breaches.

Main menu

Skip to content
  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Apps
    • Telegram Channel
EN, Krebs on Security

Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill

2025-12-06 17:12

A sprawling academic cheating network turbocharged by Google Ads that has generated nearly $25 million in revenue has curious connections to a Kremlin-connected oligarch whose Russian university builds drones for Russia’s war against Ukraine. This article has been indexed from…

Read more →

EN, Trend Micro Research, News and Perspectives

Critical React Server Components Vulnerability CVE-2025-55182: What Security Teams Need to Know

2025-12-06 16:12

CVE-2025-55182 is a critical (CVSS 10.0) pre-authentication remote code execution vulnerability affecting React Server Components used in React.js, Next.js, and related frameworks (see the context section for a more exhaustive list of affected frameworks). This article has been indexed from…

Read more →

hourly summary

IT Security News Hourly Summary 2025-12-06 15h : 4 posts

2025-12-06 16:12

4 posts were published in the last hour 14:3 : The New Content Provenance Report Will Address GenAI Misinformation 13:32 : One Armed Hacker – Accessibility Hacking 13:32 : Chinese State Hackers Use New BRICKSTORM Malware Against VMware Systems 13:32…

Read more →

CySecurity News - Latest Information Security and Hacking Incidents, EN

The New Content Provenance Report Will Address GenAI Misinformation

2025-12-06 16:12

The GenAI problem  Today’s information environment includes a wide range of communication. Social media platforms have enabled reposting, and comments. The platform is useful for both content consumers and creators, but it has its own challenges. The rapid adoption of…

Read more →

EN, ZephrSec - Adventures In Information Security

One Armed Hacker – Accessibility Hacking

2025-12-06 15:12

Learning to work one-handed after shoulder surgery showed me how essential dictation, accessibility tools and AI really are day-to-day. This article has been indexed from ZephrSec – Adventures In Information Security Read the original article: One Armed Hacker – Accessibility…

Read more →

EN, Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More

Chinese State Hackers Use New BRICKSTORM Malware Against VMware Systems

2025-12-06 15:12

CISA, NSA, and Canadian Cyber Centre warn that PRC state-sponsored hackers are using BRICKSTORM, a stealthy Go-based backdoor, for long-term espionage in Government and IT networks. This article has been indexed from Hackread – Cybersecurity News, Data Breaches, Tech, AI,…

Read more →

CySecurity News - Latest Information Security and Hacking Incidents, EN

Balancing Rapid Innovation and Risk in the New Era of SaaS Security

2025-12-06 15:12

  The accelerating pace of technological innovation is leaving a growing number of organizations unwittingly exposing their organization to serious security risks as they expand their reliance on SaaS platforms and experiment with emerging agent-based AI algorithms in an effort…

Read more →

CySecurity News - Latest Information Security and Hacking Incidents, EN

FBI Warns of Cybercriminals Impersonating IC3 to Steal Personal Data

2025-12-06 15:12

  The FBI has issued a public service announcement warning that cybercriminals are impersonating the FBI’s Internet Crime Complaint Center (IC3) and even cloning its website to steal victims’ personal and financial data.Attackers are exploiting public trust in federal law…

Read more →

EN, Security Latest

Security News This Week: Oh Crap, Kohler’s Toilet Cameras Aren’t Really End-to-End Encrypted

2025-12-06 14:12

Plus: The Trump administration declines to issue sanctions over Salt Typhoon’s hacking spree, officials warn of a disturbingly stealthy Chinese malware specimen, and more. This article has been indexed from Security Latest Read the original article: Security News This Week:…

Read more →

EN, The Hacker News

Critical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitation

2025-12-06 14:12

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday formally added a critical security flaw impacting React Server Components (RSC) to its Known Exploited Vulnerabilities (KEV) catalog following reports of active exploitation in the wild. The vulnerability, CVE-2025-55182 (CVSS…

Read more →

Cyber Security News, EN

Researchers Hack Google’s Gemini CLI Through Prompt Injections in GitHub Actions

2025-12-06 13:12

A critical vulnerability class dubbed “PromptPwnd,” affects AI agents integrated into GitHub Actions and GitLab CI/CD pipelines. This flaw allows attackers to inject malicious prompts via untrusted user inputs like issue titles or pull request bodies, tricking AI models into…

Read more →

EN, Have I Been Pwned latest breaches

KinoKong – 817,808 breached accounts

2025-12-06 11:12

In March 2021, the Russian online streaming service KinoKong suffered a data breach that was later redistributed as part of a larger corpus of data. The breach exposed over 800k unique email addresses along with names, usernames, IP addresses and…

Read more →

EN, The Register - Security

Death to one-time text codes: Passkeys are the new hotness in MFA

2025-12-06 11:12

Wanna know a secret? Whether you’re logging into your bank, health insurance, or even your email, most services today do not live by passwords alone. Now commonplace, multifactor authentication (MFA) requires users to enter a second or third proof of…

Read more →

EN, GBHackers Security | #1 Globally Trusted Cyber Security News Platform

FvncBot Android Malware Steals Keystrokes and Injects Harmful Payloads

2025-12-06 10:12

A newly discovered Android banking trojan, FvncBot, has emerged as a sophisticated threat targeting mobile banking users in Poland. Researchers from Intel 471 first identified this malware on November 25, 2025, disguised as a security application from mBank, one of…

Read more →

EN, GBHackers Security | #1 Globally Trusted Cyber Security News Platform

2.15M Next.js Web Services Exposed Online, Active Attacks Reported – Update Immediately

2025-12-06 10:12

Security teams worldwide are rushing to patch systems after the disclosure of a critical React vulnerability, CVE-2025-55182, widely known as “React2Shell.” The flaw affects React Server Components (RSC) and has a maximum CVSS score of 10, the highest possible rating,…

Read more →

Cyber Security News, EN

2.15M Web Services Running Next.js Exposed Over Internet, Active Exploitation Underway – Patch Now

2025-12-06 10:12

A critical unauthenticated remote code execution vulnerability dubbed “React2Shell” is actively being exploited in the wild, putting millions of web services at risk. On December 3, React disclosed CVE-2025-55182, a critical flaw in React Server Components with a CVSS score…

Read more →

Cybersecurity Today, EN

Cybersecurity Today Month In Review – December 5th, 2025

2025-12-06 08:12

Cybersecurity Today: The Rise of Living Off the Land Strategies & More In this episode of Cybersecurity Today’s Month in Review, host Jim Love is joined by Laura Payne from White Tuque and David Shipley from Beauceron Security. They discuss…

Read more →

hourly summary

IT Security News Hourly Summary 2025-12-06 06h : 1 posts

2025-12-06 07:12

1 posts were published in the last hour 4:11 : Avast Antivirus Sandbox Vulnerabilities Let Attackers Escalate Privileges

Read more →

Cyber Security News, EN

Avast Antivirus Sandbox Vulnerabilities Let Attackers Escalate Privileges

2025-12-06 06:12

Security researchers from the SAFA team have uncovered four kernel heap overflow vulnerabilities in Avast Antivirus, all traced to the aswSnx kernel driver. The flaws, now tracked collectively as CVE-2025-13032, could allow a local attacker to escalate privileges to SYSTEM…

Read more →

EN, Security Affairs

Maximum-severity XXE vulnerability discovered in Apache Tika

2025-12-06 03:12

A maximum severity vulnerability in Apache Tika, tracked as CVE-2025-66516 (CVSS score of 10.0), allows XML external entity attacks. CVE-2025-66516 carries a maximum CVSS rating of 10.0 because it lets attackers trigger an XXE injection in Apache Tika’s core, PDF,…

Read more →

EN, Unit 42

New Prompt Injection Attack Vectors Through MCP Sampling

2025-12-06 01:12

Model Context Protocol connects LLM apps to external data sources or tools. We examine its security implications through various attack vectors. The post New Prompt Injection Attack Vectors Through MCP Sampling appeared first on Unit 42. This article has been…

Read more →

EN, eSecurity Planet

Command Execution Risk Found in Cacti’s SNMP Handling

2025-12-06 01:12

A flaw in Cacti’s SNMP handling lets attackers execute arbitrary system commands. The post Command Execution Risk Found in Cacti’s SNMP Handling appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read the original article: Command…

Read more →

EN, The Register - Security

Crims using social media images, videos in ‘virtual kidnapping’ scams

2025-12-06 01:12

Proof of life? Or an active social media presence? Criminals are altering social media and other publicly available images of people to use as fake proof of life photos in “virtual kidnapping” and extortion scams, the FBI warned on Friday. ……

Read more →

EN, Security Boulevard

China Hackers Using Brickstorm Backdoor to Target Government, IT Entities

2025-12-06 01:12

Chinese-sponsored groups are using the popular Brickstorm backdoor to access and gain persistence in government and tech firm networks, part of the ongoing effort by the PRC to establish long-term footholds in agency and critical infrastructure IT environments, according to…

Read more →

Page 1 of 4587
1 2 3 … 4,587 »

Pages

  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Apps
    • Telegram Channel

Recent Posts

  • Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill December 6, 2025
  • Critical React Server Components Vulnerability CVE-2025-55182: What Security Teams Need to Know December 6, 2025
  • IT Security News Hourly Summary 2025-12-06 15h : 4 posts December 6, 2025
  • The New Content Provenance Report Will Address GenAI Misinformation December 6, 2025
  • One Armed Hacker – Accessibility Hacking December 6, 2025
  • Chinese State Hackers Use New BRICKSTORM Malware Against VMware Systems December 6, 2025
  • Balancing Rapid Innovation and Risk in the New Era of SaaS Security December 6, 2025
  • FBI Warns of Cybercriminals Impersonating IC3 to Steal Personal Data December 6, 2025
  • Security News This Week: Oh Crap, Kohler’s Toilet Cameras Aren’t Really End-to-End Encrypted December 6, 2025
  • Critical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitation December 6, 2025
  • Researchers Hack Google’s Gemini CLI Through Prompt Injections in GitHub Actions December 6, 2025
  • KinoKong – 817,808 breached accounts December 6, 2025
  • Death to one-time text codes: Passkeys are the new hotness in MFA December 6, 2025
  • FvncBot Android Malware Steals Keystrokes and Injects Harmful Payloads December 6, 2025
  • 2.15M Next.js Web Services Exposed Online, Active Attacks Reported – Update Immediately December 6, 2025
  • 2.15M Web Services Running Next.js Exposed Over Internet, Active Exploitation Underway – Patch Now December 6, 2025
  • Cybersecurity Today Month In Review – December 5th, 2025 December 6, 2025
  • IT Security News Hourly Summary 2025-12-06 06h : 1 posts December 6, 2025
  • Avast Antivirus Sandbox Vulnerabilities Let Attackers Escalate Privileges December 6, 2025
  • Maximum-severity XXE vulnerability discovered in Apache Tika December 6, 2025

Copyright © 2025 IT Security News. All Rights Reserved. The Magazine Basic Theme by bavotasan.com.

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}