IT Security News
Cybersecurity news and articles about information security, vulnerabilities, exploits, hacks, laws, spam, viruses, malware, breaches.

Main menu

Skip to content
  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Telegram Channel
hourly summary

IT Security News Hourly Summary 2026-03-18 06h : 4 posts

2026-03-18 07:03

4 posts were published in the last hour

  • 4:34 : Cyberattacks Spike 245% in the Two Weeks After the Start of War with Iran
  • 4:34 : Another Medicat Device Firm Hit
  • 4:16 : Linux Foundation kicks off effort to shield FOSS maintainers from AI slop bug reports
  • 4:15 : Microsoft Teams Support Call Leads to Quick Assist Compromise in New Vishing Attack

Share this:

  • Share on Facebook (Opens in new window) Facebook
  • Share on X (Opens in new window) X
  • Share on LinkedIn (Opens in new window) LinkedIn

Like this:

Like Loading...

Related

Tags: 2026-03-18 hourly summary

Post navigation

← Cyberattacks Spike 245% in the Two Weeks After the Start of War with Iran
AWS Bedrock AgentCore Sandbox Bypass Enables Stealthy C2 and Data Exfiltration →

Pages

  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Telegram Channel

Recent Posts

  • Oppo Updates Foldable With ‘Imperceptible’ Crease March 18, 2026
  • Vidar Stealer 2.0 Spreads via Fake Game Cheats Shared on GitHub and Reddit March 18, 2026
  • Delegated Trust Is Becoming the Largest Attack Surface in Modern Security March 18, 2026
  • ManageEngine expands Endpoint Central with EDR and secure access March 18, 2026
  • Virtue AI brings continuous stress testing to enterprise AI agents March 18, 2026
  • Police To Deploy Live Facial Recognition In Norwich March 18, 2026
  • Cyberattacks Soar 245% as War Triggers Global Digital Offensive March 18, 2026
  • UK’s Companies House exposed data linked to millions of firms March 18, 2026
  • IT Security News Hourly Summary 2026-03-18 09h : 12 posts March 18, 2026
  • Boggy Serpens Hits Diplomats, Critical Infrastructure in Espionage Waves March 18, 2026
  • Iran’s cyberattack against med tech firm is ‘just the beginning’ March 18, 2026
  • ‘CrackArmor’ Exposes Nine Vulnerabilities in Linux AppArmor March 18, 2026
  • Aura – 903,080 breached accounts March 18, 2026
  • Ubuntu Desktop Systems Vulnerability Enables Attackers to Gain Full Root Access March 18, 2026
  • Cybercriminals scale up, government sector hit hardest March 18, 2026
  • Tufin introduces AI agents to take on network security work March 18, 2026
  • Apple Fixes WebKit Vulnerability Enabling Same-Origin Policy Bypass on iOS and macOS March 18, 2026
  • Energy strategy, scammer accord, font-rendering attack March 18, 2026
  • Over one billion customer records belonging to IDMerit users left unprotected online March 18, 2026
  • Researchers Disclose ‘RegPwn,’ a Windows Registry Weakness Allowing SYSTEM Access March 18, 2026

Copyright © 2026 IT Security News. All Rights Reserved. The Magazine Basic Theme by bavotasan.com.

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}
%d