IT Security News

Cybersecurity news and articles about information security, vulnerabilities, exploits, hacks, laws, spam, viruses, malware, breaches.

Main menu

Skip to content
  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Telegram Channel
EN, The Register - Security

Cybercriminals swipe 15.8M medical records from French doctors ministry

2026-03-03 13:03

Third-party software supplier breached leading to leak of doctors’ notes Around 15.8 million administrative files were stolen after attackers breached a software supplier to France’s health ministry.… This article has been indexed from The Register – Security Read the original…

Read more →

EN, securityweek

Vulnerability in MS-Agent AI Framework Can Allow Full System Compromise

2026-03-03 13:03

Improper input sanitization in the framework can be exploited through the Shell tool, allowing attackers to modify system files and steal data. The post Vulnerability in MS-Agent AI Framework Can Allow Full System Compromise appeared first on SecurityWeek. This article…

Read more →

EN, www.infosecurity-magazine.com

Huge “Shadow Layer” of Organizations Hit by Supply Chain Attacks

2026-03-03 13:03

Black Kite reveals 26,000 unnamed corporate victims linked to 136 third-party breaches This article has been indexed from www.infosecurity-magazine.com Read the original article: Huge “Shadow Layer” of Organizations Hit by Supply Chain Attacks

Read more →

hourly summary

IT Security News Hourly Summary 2026-03-03 12h : 11 posts

2026-03-03 13:03

11 posts were published in the last hour 10:34 : Judge Blocks Virginia Law Limiting Youth Social Media Time 10:34 : Hackers Exploit Telegram for Initial Access to Corporate VPN, RDP, and Cloud Systems 10:34 : Microsoft Warns OAuth Redirect…

Read more →

EN, Silicon UK

Judge Blocks Virginia Law Limiting Youth Social Media Time

2026-03-03 12:03

US federal judge says Virginia law passed last year likely to infringe on free speech rights of under-16s, as regulators seek protections This article has been indexed from Silicon UK Read the original article: Judge Blocks Virginia Law Limiting Youth…

Read more →

EN, GBHackers Security | #1 Globally Trusted Cyber Security News Platform

Hackers Exploit Telegram for Initial Access to Corporate VPN, RDP, and Cloud Systems

2026-03-03 12:03

Hackers are increasingly abusing Telegram as an initial access marketplace, turning stealer logs and leaked credentials into direct entry points for corporate VPN, RDP, and cloud environments. The platform now acts as a high-speed bridge between compromised credentials and full…

Read more →

EN, The Hacker News

Microsoft Warns OAuth Redirect Abuse Delivers Malware to Government Targets

2026-03-03 12:03

Microsoft on Monday warned of phishing campaigns that employ phishing emails and OAuth URL redirection mechanisms to bypass conventional phishing defenses implemented in email and browsers. The activity, the company said, targets government and public-sector organizations with the end goal…

Read more →

EN, Security Affairs

Android devices hit by exploited Qualcomm flaw CVE-2026-21385

2026-03-03 12:03

Google confirms that the Qualcomm Android vulnerability CVE-2026-21385 was exploited in real-world attacks. Google has confirmed that CVE-2026-21385 (CVSS score of 7.8), a high-severity vulnerability affecting an open-source Qualcomm component used in Android devices, has been actively exploited. “There are…

Read more →

EN, www.infosecurity-magazine.com

Iranian Cyber Threat Actor Targets Iraqi Government Officials in AI-Powered Campaign

2026-03-03 12:03

Zscaler ThreatLabz assessed with medium to high confidence that an Iranian adversary targeted Iraq’s Ministry of Foreign Affairs in a new cyber-attack This article has been indexed from www.infosecurity-magazine.com Read the original article: Iranian Cyber Threat Actor Targets Iraqi Government…

Read more →

EN, Silicon UK

Apple Releases Updated iPhone 17e, iPad Air

2026-03-03 12:03

Lower-cost iPhone 17e boosts storage, CPU, in-house modem, while iPad Air gets M4 update, as low-cost MacBook said to be on the way This article has been indexed from Silicon UK Read the original article: Apple Releases Updated iPhone 17e,…

Read more →

EN, GBHackers Security | #1 Globally Trusted Cyber Security News Platform

Epic Fury Cyber Shock: Iran’s Internet Down, Hacktivists Hit Back

2026-03-03 12:03

On Feb. 28, 2026, the United States and Israel launched coordinated military operations against Iran, codenamed Operation Epic Fury by the U.S. and Operation Roaring Lion by Israel, opening a new phase where cyber operations are tightly coupled with kinetic…

Read more →

EN, Security Latest

How Journalists Are Reporting From Iran With No Internet

2026-03-03 12:03

After strikes killed senior Iranian officials, Iran cut off internet access. Journalists are relying on satellite links, encrypted apps, and smuggled footage to report from inside the country. This article has been indexed from Security Latest Read the original article:…

Read more →

Cyber Security News, EN

Hackerbot-Claw Bot Attacks Microsoft and DataDog via GitHub Actions CI/CD Misconfiguration

2026-03-03 12:03

Between February 21 and February 28, 2026, an autonomous bot named hackerbot-claw launched a week-long attack campaign against major open source repositories. It targeted GitHub Actions CI/CD pipelines belonging to Microsoft, DataDog, the Cloud Native Computing Foundation, and several other…

Read more →

EN, securityweek

Researchers Uncover Method to Track Cars via Tire Sensors

2026-03-03 12:03

Using low-cost receivers deployed along roads, academic researchers tracked drivers and their movement patterns. The post Researchers Uncover Method to Track Cars via Tire Sensors appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article:…

Read more →

EN, Help Net Security

Android’s March 2026 security patch fixes over 100 flaws, one under targeted exploitation

2026-03-03 12:03

The Android March 2026 security patch addresses vulnerabilities across dozens of components and includes one CVE confirmed under active exploitation. Devices running a patch level of 2026-03-05 or later receive fixes for all disclosed issues. Android March 2026 security patch…

Read more →

EN, Silicon UK

US Considers Nvidia Sales Limits For Chinese Firms

2026-03-03 11:03

US officials discuss 75,000 unit cap on sales of Nvidia H200 AI accelerator chips to Chinese companies, as 2025 export deal remains in limbo This article has been indexed from Silicon UK Read the original article: US Considers Nvidia Sales…

Read more →

EN, Security Affairs

Chrome security flaw enabled spying via Gemini Live assistant

2026-03-03 11:03

A Google Chrome vulnerability lets malicious extensions hijack Gemini Live to spy on users and steal sensitive files. Researchers at Palo Alto Networks found a Chrome vulnerability, tracked as CVE-2026-0628, that could let malicious extensions take control of the Gemini…

Read more →

EN, Silicon UK

Burger King AI To Rank Employee Friendliness

2026-03-03 11:03

Burger King to trial OpenAI-powered headsets to observe staff interactions with guests, create ‘friendliness scores’ This article has been indexed from Silicon UK Read the original article: Burger King AI To Rank Employee Friendliness

Read more →

Cyber Security News, EN

New Claude Memory Feature Allow Users to Transfer Data from ChatGPT and Other AI Providers

2026-03-03 11:03

Anthropic has introduced a new memory import tool for Claude that allows users to seamlessly transfer their stored preferences, habits, and context from other AI platforms, including ChatGPT, Google Gemini, and Microsoft Copilot, directly into Claude’s memory system, eliminating the…

Read more →

EN, Security Boulevard

The New Security Reality: When AI Accelerates Both Attack and Defense

2026-03-03 11:03

Discover how the integration of large language models is transforming software security, lowering barriers for attackers, and necessitating autonomous defense platforms to keep pace with emerging threats. The post The New Security Reality: When AI Accelerates Both Attack and Defense …

Read more →

EN, Silicon UK

Users Complain After Australian Supermarket Chatbot Acts Too Human

2026-03-03 10:03

Users complain after AI assistant Olive, deployed by Australian supermarket chain Woolworths, claims to be human and talks about its mother This article has been indexed from Silicon UK Read the original article: Users Complain After Australian Supermarket Chatbot Acts…

Read more →

EN, Silicon UK

Smartphone Market Set For Record Contraction

2026-03-03 10:03

Smartphone market to see average prices rise to record levels, as AI industry uses up all available supply of memory chips This article has been indexed from Silicon UK Read the original article: Smartphone Market Set For Record Contraction

Read more →

EN, GBHackers Security | #1 Globally Trusted Cyber Security News Platform

MS-Agent Vulnerability Exposes AI Agents to Remote Hijacking, Granting Full System Control

2026-03-03 10:03

A critical vulnerability has been discovered in the MS-Agent framework, a lightweight software tool used to build and run autonomous AI agents. Tracked as CVE-2026-2256, this command injection flaw allows remote attackers to hijack these AI agents, potentially granting them…

Read more →

EN, Have I Been Pwned latest breaches

Provecho – 712,904 breached accounts

2026-03-03 10:03

In early 2026, data purportedly sourced from the recipe and meal planning service Provecho was alleged to have been obtained in a breach. The exposed data included 713k unique email address along with username and the creator account holders followed.…

Read more →

Page 131 of 5129
« 1 … 129 130 131 132 133 … 5,129 »

Pages

  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Telegram Channel

Recent Posts

  • OpenSSL 4.0 Beta Release Announcement March 25, 2026
  • The Best AI SOC Platforms 2026: Comprehensive Comparison & Guide March 25, 2026
  • HackerOne, Mazda, Infinite Campus and Dutch Ministry Hit by Data Breaches March 25, 2026
  • IT Security News Hourly Summary 2026-03-25 00h : 5 posts March 25, 2026
  • IT Security News Daily Summary 2026-03-24 March 25, 2026
  • Threat Brief: Recruiting Scheme Impersonating Palo Alto Networks Talent Acquisition Team March 25, 2026
  • How do Non-Human Identities manage access? March 25, 2026
  • What makes Non-Human Identities safe? March 25, 2026
  • Why trust in Agentic AI security is essential? March 25, 2026
  • Tracking Software Weaponized by Criminals March 25, 2026
  • Why Prevention Isn’t Enough: Shifting to True Operational Resilience in 2026 March 24, 2026
  • EFF has a new boss to lead the fight against privacy-sucking forces of doom March 24, 2026
  • Training effective models without the annotation budget March 24, 2026
  • AiStrike Launches Continuous Detection Engineering to Fix Alert Noise at the Source March 24, 2026
  • Sumo Logic Expands Dojo AI With SOC Analyst Agent That Recommends Actions, Not Just Alerts March 24, 2026
  • RSA Conference: UK NCSC Head Urges Industry to Develop Vibe Coding Safeguards March 24, 2026
  • The CVE Program, a bedrock of global cyber defense, is teetering on the brink March 24, 2026
  • 1K+ cloud environments infected following Trivy supply chain attack March 24, 2026
  • US Bans New Foreign-Made Routers, Citing ‘Unacceptable’ Security Risks March 24, 2026
  • Data breach at Dutch Ministry of Finance impacts staff following cyberattack March 24, 2026

Copyright © 2026 IT Security News. All Rights Reserved. The Magazine Basic Theme by bavotasan.com.

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}