IT Security News

Cybersecurity news and articles about information security, vulnerabilities, exploits, hacks, laws, spam, viruses, malware, breaches.

Main menu

Skip to content
  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Telegram Channel
Cyber Security News, EN

macOS Malware Installs Fake Google Software Update LaunchAgent for Persistence

2026-05-20 00:05

macOS users are facing a new and sophisticated threat as a variant of the SHub infostealer malware, dubbed “Reaper,” has been observed deploying a fake Google Software Update LaunchAgent to maintain persistent access on infected machines. The malware stays hidden…

Read more →

Cyber Security News, EN

UAC-0184 Malware Chain Uses bitsadmin and HTA Files for Gated Payload Delivery

2026-05-20 00:05

A newly documented attack chain linked to the threat group UAC-0184 has been observed using Windows’ built-in bitsadmin tool and HTA files to sneak malicious payloads onto targeted systems. The campaign is primarily aimed at Ukraine, with clear indicators pointing…

Read more →

hourly summary

IT Security News Hourly Summary 2026-05-20 00h : 7 posts

2026-05-20 00:05

7 posts were published in the last hour 22:4 : Microsoft shuts down illegal code-signing operation used by ransomware crims to mask their malware 22:4 : CIRT insights: How to help prevent unauthorized account removals from AWS Organizations 21:55 :…

Read more →

EN, www.theregister.com - Articles

Microsoft shuts down illegal code-signing operation used by ransomware crims to mask their malware

2026-05-20 00:05

‘Thousands’ of US victims, including 12+ machines owned and operated by Redmond This article has been indexed from www.theregister.com – Articles Read the original article: Microsoft shuts down illegal code-signing operation used by ransomware crims to mask their malware

Read more →

AWS Security Blog, EN

CIRT insights: How to help prevent unauthorized account removals from AWS Organizations

2026-05-20 00:05

The AWS Customer Incident Response Team works with customers to help them recover from active security incidents. As part of this work, the team often uncovers new or trending tactics used by various threat actors that take advantage of specific…

Read more →

daily summary

IT Security News Daily Summary 2026-05-19

2026-05-19 23:05

158 posts were published in the last hour 21:34 : AI Agent Security: Automating Workflow Without Creating Prompt Injection or Data Leak Risks 21:34 : From teen hacker to Iron Dome researcher, this founder raised $28M to fight AI phishing…

Read more →

EN, Hackread – Cybersecurity News, Data Breaches, AI and More

AI Agent Security: Automating Workflow Without Creating Prompt Injection or Data Leak Risks

2026-05-19 23:05

AI agent security starts with a simple fact: the more authority an agent has, the tighter its access… This article has been indexed from Hackread – Cybersecurity News, Data Breaches, AI and More Read the original article: AI Agent Security:…

Read more →

EN, Security News | TechCrunch

From teen hacker to Iron Dome researcher, this founder raised $28M to fight AI phishing

2026-05-19 23:05

Ocean, an agentic email security platform, raised funding from Lightspeed Venture Partners. This article has been indexed from Security News | TechCrunch Read the original article: From teen hacker to Iron Dome researcher, this founder raised $28M to fight AI…

Read more →

EN, Security News | TechCrunch

Discord enables end-to-end encrypted voice and video calling for every user

2026-05-19 23:05

Good news! Discord’s hundreds of millions of users now have their communications scrambled, so not even Discord can see them. This article has been indexed from Security News | TechCrunch Read the original article: Discord enables end-to-end encrypted voice and…

Read more →

Cyber Security News, EN

The Gentlemen Ransomware Attacks Windows, Linux, NAS, BSD, and ESXi Attacks

2026-05-19 23:05

A ransomware group called The Gentlemen has been quietly building one of the most aggressive cybercriminal operations seen in recent years. Emerging publicly in the second half of 2025, the group rapidly scaled its activity to become one of the…

Read more →

EN, Security News | TechCrunch

Hackers have compromised dozens of popular open source packages in an ongoing supply-chain attack

2026-05-19 23:05

The attacks are part of a wider campaign known as Mini Shai-Hulud, which has already compromised several open source projects and, in turn, developers and companies that use them. This article has been indexed from Security News | TechCrunch Read…

Read more →

EN, Security Affairs

Drupal is rolling out an emergency security update on May 20. You cannot miss it

2026-05-19 22:05

Drupal Is Pushing an Emergency Security Update Tomorrow. If You Run a Drupal Site, This Is Not One to Miss. Something significant is coming out of the Drupal project tomorrow, and the way the announcement is worded should be enough…

Read more →

EN, eSecurity Planet

CISA GitHub Leak Exposes AWS GovCloud Secrets

2026-05-19 22:05

A public GitHub repository tied to a CISA contractor reportedly exposed AWS GovCloud credentials and internal deployment data. The post CISA GitHub Leak Exposes AWS GovCloud Secrets  appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet…

Read more →

EN, OffSec

OffSec Launches Instructor-Led Live Training for Enterprise Security Teams

2026-05-19 22:05

OffSec is excited to announce the launch of Live Training. Booking for instructor-led, in-person training now open. The post OffSec Launches Instructor-Led Live Training for Enterprise Security Teams appeared first on OffSec. This article has been indexed from OffSec Read…

Read more →

Cyber Security News, EN

Kimsuky Hackers Use LNK and JSE Lures to Target Recruiters, Crypto Users, and Defense Officials

2026-05-19 21:05

North Korea-linked hackers are at it again, and this time they are casting a wide net. The Kimsuky threat group, a well-known cyber espionage unit with ties to the DPRK, ran four separate spear-phishing campaigns in the first half of…

Read more →

hourly summary

IT Security News Hourly Summary 2026-05-19 21h : 5 posts

2026-05-19 21:05

5 posts were published in the last hour 18:32 : Microsoft dismantled malware-signing network Fox Tempest 18:32 : Operation Ramz Seizes 53 Servers Linked to Cyber Scams and Malware Threats 18:32 : 3 Tactics Elite SOCs Use to Operationalize Threat…

Read more →

EN, Security Affairs

Microsoft dismantled malware-signing network Fox Tempest

2026-05-19 20:05

Microsoft disrupted Fox Tempest, a malware-signing-as-a-service (MSaaS) that allowed attackers to sign malware with fake trusted certificates. Microsoft said it disrupted a cybercrime operation run by a threat actor named Fox Tempest, which helped threat actors sign malware with short-lived…

Read more →

Cyber Security News, EN

Operation Ramz Seizes 53 Servers Linked to Cyber Scams and Malware Threats

2026-05-19 20:05

A large-scale international cybercrime crackdown dubbed Operation Ramz has led to the seizure of 53 servers, the arrest of 201 individuals, and the identification of 382 additional suspects across the Middle East and North Africa (MENA) region. The coordinated operation, led…

Read more →

Cyber Security News, EN

3 Tactics Elite SOCs Use to Operationalize Threat Intelligence

2026-05-19 20:05

A data breach makes headlines for a day. The damage it leaves behind lasts years. Critical business risk isn’t one catastrophic moment — it’s a slow-motion erosion: dwell time compounding into lateral movement, a compromised supplier becoming your breach, a…

Read more →

Cyber Security News, EN

DirtyDecrypt Linux Kernel Vulnerability PoC Exploit Code Released

2026-05-19 20:05

A working proof-of-concept (PoC) exploit for a high-severity Linux kernel local privilege escalation vulnerability dubbed DirtyDecrypt, also tracked as DirtyCBC, enables local attackers to gain full root access on affected systems. Security analyst Will Dormann technically attributes the flaw to CVE-2026-31635, a…

Read more →

Cyber Security News, EN

Malware Campaign Uses JavaScript, PowerShell, and Shellcode to Deliver Crypto Clipper

2026-05-19 20:05

A wave of well-crafted malware is quietly draining cryptocurrency from users across the globe, and the attackers behind it have gone to great lengths to stay hidden. Researchers have uncovered a large-scale campaign built around a multi-stage loader called CountLoader,…

Read more →

EN, Security Archives - TechRepublic

Grafana Rejects Ransom Demand After GitHub Breach Exposes Codebase Theft

2026-05-19 20:05

Grafana refused an extortion demand after attackers used a stolen GitHub token to download code, with no customer data exposed so far. The post Grafana Rejects Ransom Demand After GitHub Breach Exposes Codebase Theft appeared first on TechRepublic. This article…

Read more →

EN, Security Archives - TechRepublic

AdvancedHEALTH Ransomware Claim Includes 2.3M Patient Data Lines

2026-05-19 20:05

DragonForce claims it stole 390GB from AdvancedHEALTH, including patient data and minors’ records, as breach notices and legal scrutiny begin. The post AdvancedHEALTH Ransomware Claim Includes 2.3M Patient Data Lines appeared first on TechRepublic. This article has been indexed from…

Read more →

EN, Security Archives - TechRepublic

Microsoft Confirms Windows Update Bug Blocking Security Fixes

2026-05-19 20:05

Microsoft confirmed that KB5089549 can fail with error 0x800f0922 on Windows 11 devices with low EFI partition space, and shared workarounds are available. The post Microsoft Confirms Windows Update Bug Blocking Security Fixes appeared first on TechRepublic. This article has…

Read more →

Page 1 of 5428
1 2 3 … 5,428 »

Pages

  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Telegram Channel

Recent Posts

  • macOS Malware Installs Fake Google Software Update LaunchAgent for Persistence May 20, 2026
  • UAC-0184 Malware Chain Uses bitsadmin and HTA Files for Gated Payload Delivery May 20, 2026
  • IT Security News Hourly Summary 2026-05-20 00h : 7 posts May 20, 2026
  • Microsoft shuts down illegal code-signing operation used by ransomware crims to mask their malware May 20, 2026
  • CIRT insights: How to help prevent unauthorized account removals from AWS Organizations May 20, 2026
  • IT Security News Daily Summary 2026-05-19 May 19, 2026
  • AI Agent Security: Automating Workflow Without Creating Prompt Injection or Data Leak Risks May 19, 2026
  • From teen hacker to Iron Dome researcher, this founder raised $28M to fight AI phishing May 19, 2026
  • Discord enables end-to-end encrypted voice and video calling for every user May 19, 2026
  • The Gentlemen Ransomware Attacks Windows, Linux, NAS, BSD, and ESXi Attacks May 19, 2026
  • Hackers have compromised dozens of popular open source packages in an ongoing supply-chain attack May 19, 2026
  • Drupal is rolling out an emergency security update on May 20. You cannot miss it May 19, 2026
  • CISA GitHub Leak Exposes AWS GovCloud Secrets May 19, 2026
  • OffSec Launches Instructor-Led Live Training for Enterprise Security Teams May 19, 2026
  • Kimsuky Hackers Use LNK and JSE Lures to Target Recruiters, Crypto Users, and Defense Officials May 19, 2026
  • IT Security News Hourly Summary 2026-05-19 21h : 5 posts May 19, 2026
  • Microsoft dismantled malware-signing network Fox Tempest May 19, 2026
  • Operation Ramz Seizes 53 Servers Linked to Cyber Scams and Malware Threats May 19, 2026
  • 3 Tactics Elite SOCs Use to Operationalize Threat Intelligence May 19, 2026
  • DirtyDecrypt Linux Kernel Vulnerability PoC Exploit Code Released May 19, 2026

Copyright © 2026 IT Security News. All Rights Reserved. The Magazine Basic Theme by bavotasan.com.

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}