IT Security News

Cybersecurity news and articles about information security, vulnerabilities, exploits, hacks, laws, spam, viruses, malware, breaches.

Main menu

Skip to content
  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Telegram Channel
EN, Unit 42

Paved With Intent: ROADtools and Nation-State Tactics in the Cloud

2026-05-22 12:05

Open-source framework ROADtools is being misused by threat actors for cloud intrusions. Learn how to identify its malicious use. The post Paved With Intent: ROADtools and Nation-State Tactics in the Cloud appeared first on Unit 42. This article has been…

Read more →

EN, GBHackers Security | #1 Globally Trusted Cyber Security News Platform

Hackers Use Six-Layer Persistence on FreePBX Systems

2026-05-22 12:05

Hackers are actively exploiting FreePBX systems using a highly resilient six-layer persistence mechanism. The campaign has been attributed with high confidence to the threat actor INJ3CTOR3, known for targeting VoIP infrastructure for financial gain since 2019. The operation deploys a…

Read more →

EN, Security Affairs

U.S. CISA adds Trend Micro Apex One and Langflow to its Known Exploited Vulnerabilities catalog

2026-05-22 12:05

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Trend Micro Apex One and Langflow flaws to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added Windows Shell and ConnectWise ScreenConnect flaws to its Known Exploited Vulnerabilities…

Read more →

EN, Help Net Security

Keepnet contributes voice and SMS phishing data to the 2026 Verizon DBIR

2026-05-22 12:05

Keepnet, an Extended Human Risk Management (xHRM) platform, today announced that its voice and SMS phishing simulation data contributed to the 2026 Verizon Data Breach Investigations Report (DBIR). The 2026 edition is the first to include voice and SMS phishing…

Read more →

EN, www.infosecurity-magazine.com

Apple Blocked $2.2bn in App Store Fraud in the Last Year

2026-05-22 12:05

Total figure for fraudulent transactions Apple has blocked since 2020 now stands at over $11bn This article has been indexed from www.infosecurity-magazine.com Read the original article: Apple Blocked $2.2bn in App Store Fraud in the Last Year

Read more →

hourly summary

IT Security News Hourly Summary 2026-05-22 12h : 14 posts

2026-05-22 12:05

14 posts were published in the last hour 10:3 : Hackers Weaponize NF-e Invoice Lures to Deploy Banana RAT 10:2 : CISA Issues Alert on Exploited Microsoft Defender Zero-Day Vulnerabilities 10:2 : Cloud Atlas activity in the second half of…

Read more →

EN, GBHackers Security | #1 Globally Trusted Cyber Security News Platform

Hackers Weaponize NF-e Invoice Lures to Deploy Banana RAT

2026-05-22 12:05

Hackers are actively using Brazil’s electronic invoice system (NF-e) as a lure to distribute a sophisticated banking trojan known as Banana RAT. The campaign has been attributed to a financially motivated threat cluster tracked as SHADOW-WATER-063 and appears exclusively focused…

Read more →

EN, GBHackers Security | #1 Globally Trusted Cyber Security News Platform

CISA Issues Alert on Exploited Microsoft Defender Zero-Day Vulnerabilities

2026-05-22 12:05

CISA has issued an urgent alert warning organizations about two newly disclosed zero-day vulnerabilities affecting Microsoft Defender, both added to the Known Exploited Vulnerabilities (KEV) catalog on May 20, 2026. CVE-2026-45498: Microsoft Defender DoS Vulnerability CVE-2026-45498 is a denial-of-service (DoS)…

Read more →

EN, Securelist

Cloud Atlas activity in the second half of 2025 and early 2026: new tools and a new payload

2026-05-22 12:05

The experienced Cloud Atlas group remains active, continuing to target government sectors and diplomatic entities in Russia and Belarus, employing both new and established techniques to maintain persistence in compromised systems. This article has been indexed from Securelist Read the…

Read more →

Cyber Security News, EN

Hackers Use Hugging Face to Host Second-Stage Malware for npm Supply Chain Attack

2026-05-22 12:05

Hackers have found a new and alarming way to weaponize one of the most trusted platforms in the AI world. A threat actor linked to North Korea has embedded second-stage malware inside Hugging Face, the widely used AI and machine…

Read more →

Cyber Security News, EN

FBI Warns of Kali365 Attacking Microsoft 365 Users to Steal Logins and Bypass MFA

2026-05-22 12:05

The FBI has issued a new cybersecurity warning about a rapidly emerging phishing-as-a-service (PhaaS) platform named Kali365, which is actively targeting Microsoft 365 users to steal access tokens and bypass multi-factor authentication (MFA). Kali365 is being distributed primarily through Telegram…

Read more →

Cyber Security News, EN

CISA Warns of Trend Micro Apex One Vulnerability Exploited in Attacks

2026-05-22 12:05

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical vulnerability in Trend Micro Apex One to its Known Exploited Vulnerabilities (KEV) catalog, warning organizations of active exploitation risks. The flaw, tracked as CVE-2026-34926, affects on-premise deployments of…

Read more →

Cyber Security News, EN

Splunk Patches Multiple Vulnerabilities that Enable DOS Attack and Exposes Sensitive Data

2026-05-22 12:05

Splunk has released security updates addressing multiple vulnerabilities across Splunk Enterprise, Splunk Cloud Platform, and the Splunk AI Toolkit that could lead to denial-of-service (DoS) conditions and exposure of sensitive data. The issues, disclosed on May 20, 2026, include three…

Read more →

EN, Help Net Security

CISA’s new KEV nomination form opens reporting to vendors and researchers

2026-05-22 12:05

The Cybersecurity and Infrastructure Security Agency launched a new nomination form that lets researchers, vendors, and industry partners report known exploited vulnerabilities for possible inclusion in its KEV catalog. The form gives outside contributors a direct way to submit vulnerabilities…

Read more →

EN, GBHackers Security | #1 Globally Trusted Cyber Security News Platform

Android Malware Secretly Signs Users Up for Premium Services

2026-05-22 11:05

Android users are being targeted by a large-scale malware campaign that silently subscribes victims to premium mobile services without their knowledge. The malware campaign focuses on carrier billing fraud, abusing premium SMS services to generate revenue for attackers. What makes…

Read more →

EN, securityweek

‘First VPN’ Cybercrime Service Disrupted, Administrator Arrested

2026-05-22 11:05

The FBI says First VPN has been used by dozens of ransomware groups for network reconnaissance and intrusions. The post ‘First VPN’ Cybercrime Service Disrupted, Administrator Arrested appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…

Read more →

EN, Help Net Security

Meet Fractal, an OS made for microarchitecture reverse engineering

2026-05-22 11:05

Probing how a CPU isolates user code from kernel code is messy work. Researchers patch kernels, write drivers, or boot stripped-down bare-metal programs, and any of those choices change variables they were trying to hold still. Fractal, a new operating…

Read more →

EN, Help Net Security

Microsoft 365 users targeted by new phishing threat that bypasses MFA

2026-05-22 11:05

Microsoft 365 access tokens are being targeted by an emerging Phishing-as-a-Service (PhaaS) platform called Kali365, the FBI is warning. First observed in April 2026, Kali365 has been distributed through Telegram, allowing cybercriminals to obtain Microsoft 365 access tokens and bypass…

Read more →

EN, The Hacker News

Kimwolf DDoS Botnet Operator Arrested in Canada Over DDoS-for-Hire Attacks

2026-05-22 11:05

The U.S. Department of Justice (DoJ) on Thursday announced the arrest of a Canadian man in connection with allegedly operating a distributed denial-of-service (DDoS) botnet known as Kimwolf. In tandem, Jacob Butler (aka Dort), 23, Ottawa, Canada, has been charged…

Read more →

Cybersecurity News: Threats, Vulnerabilities & Privacy Updates - gHacks, EN

Microsoft Phasing Out SMS Authentication Codes for Personal Accounts in Favor of Passkeys

2026-05-22 11:05

Microsoft has announced that it will discontinue SMS-based authentication and account recovery for personal Microsoft accounts. Thank you for being a Ghacks reader. The post Microsoft Phasing Out SMS Authentication Codes for Personal Accounts in Favor of Passkeys appeared first…

Read more →

Cyber Security News, EN

Hackers Can Weaponize Lenovo Driver to Terminate EDR Processes

2026-05-22 11:05

Hackers can weaponize a legitimately signed Lenovo driver to terminate security processes, highlighting a dangerous Bring Your Own Vulnerable Driver (BYOVD) attack vector that can bypass endpoint protection controls. Security researcher Jehad Abudagga has analyzed a Lenovo driver, BootRepair.sys, originally associated…

Read more →

Cyber Security News, EN

Google Publishes Exploit Code for Unfixed Chromium Bug Exposing Millions of Users

2026-05-22 11:05

Google has publicly released proof-of-concept (PoC) exploit code for a critical, still-unpatched vulnerability in the Chromium codebase, potentially exposing millions of users across Chrome, Microsoft Edge, and other Chromium-based browsers to stealthy botnet-style abuse. The vulnerability, originally reported in late…

Read more →

EN, Help Net Security

Downtime has become a $600 billion business problem

2026-05-22 11:05

The average cost of downtime has reached $600 billion for the Global 2000, a 50% increase in two years. According to Splunk’s The Hidden Costs of Downtime report, unplanned outages and service degradation cost each company an average of $300…

Read more →

EN, GBHackers Security | #1 Globally Trusted Cyber Security News Platform

Splunk Patches Multiple Vulnerabilities Enabling DoS Attacks and Data Exposure

2026-05-22 10:05

Splunk has released security updates to fix three newly disclosed vulnerabilities that could allow low-privileged users to access sensitive data or disrupt Splunk Enterprise deployments through denial-of-service (DoS) conditions. The patches address issues in both Splunk Enterprise and the Splunk…

Read more →

Page 1 of 5444
1 2 3 … 5,444 »

Pages

  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Telegram Channel

Recent Posts

  • Paved With Intent: ROADtools and Nation-State Tactics in the Cloud May 22, 2026
  • Hackers Use Six-Layer Persistence on FreePBX Systems May 22, 2026
  • U.S. CISA adds Trend Micro Apex One and Langflow to its Known Exploited Vulnerabilities catalog May 22, 2026
  • Keepnet contributes voice and SMS phishing data to the 2026 Verizon DBIR May 22, 2026
  • Apple Blocked $2.2bn in App Store Fraud in the Last Year May 22, 2026
  • IT Security News Hourly Summary 2026-05-22 12h : 14 posts May 22, 2026
  • Hackers Weaponize NF-e Invoice Lures to Deploy Banana RAT May 22, 2026
  • CISA Issues Alert on Exploited Microsoft Defender Zero-Day Vulnerabilities May 22, 2026
  • Cloud Atlas activity in the second half of 2025 and early 2026: new tools and a new payload May 22, 2026
  • Hackers Use Hugging Face to Host Second-Stage Malware for npm Supply Chain Attack May 22, 2026
  • FBI Warns of Kali365 Attacking Microsoft 365 Users to Steal Logins and Bypass MFA May 22, 2026
  • CISA Warns of Trend Micro Apex One Vulnerability Exploited in Attacks May 22, 2026
  • Splunk Patches Multiple Vulnerabilities that Enable DOS Attack and Exposes Sensitive Data May 22, 2026
  • CISA’s new KEV nomination form opens reporting to vendors and researchers May 22, 2026
  • Android Malware Secretly Signs Users Up for Premium Services May 22, 2026
  • ‘First VPN’ Cybercrime Service Disrupted, Administrator Arrested May 22, 2026
  • Meet Fractal, an OS made for microarchitecture reverse engineering May 22, 2026
  • Microsoft 365 users targeted by new phishing threat that bypasses MFA May 22, 2026
  • Kimwolf DDoS Botnet Operator Arrested in Canada Over DDoS-for-Hire Attacks May 22, 2026
  • Microsoft Phasing Out SMS Authentication Codes for Personal Accounts in Favor of Passkeys May 22, 2026

Copyright © 2026 IT Security News. All Rights Reserved. The Magazine Basic Theme by bavotasan.com.

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}