IT Security News

Cybersecurity news and articles about information security, vulnerabilities, exploits, hacks, laws, spam, viruses, malware, breaches.

Main menu

Skip to content
  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Apps
    • Telegram Channel
EN, securityweek

MITRE Releases 2025 List of Top 25 Most Dangerous Software Vulnerabilities

2025-12-12 14:12

XSS remains the top software weakness, followed by SQL injection and CSRF. Buffer overflow issues and improper access control make it to top 25. The post MITRE Releases 2025 List of Top 25 Most Dangerous Software Vulnerabilities appeared first on…

Read more →

EN, SANS Internet Storm Center, InfoCON: green

Abusing DLLs EntryPoint for the Fun, (Fri, Dec 12th)

2025-12-12 13:12

In the Microsoft Windows ecosystem, DLLs (Dynamic Load Libraries) are PE files like regular programs. One of the main differences is that they export functions that can be called by programs that load them. By example, to call RegOpenKeyExA(), the…

Read more →

EN, Panda Security Mediacenter

Illegal Streaming and Piracy Are on the Rise

2025-12-12 13:12

Illegal streaming and digital piracy have surged dramatically. Visits to illegal streaming website climbing from 130 billion in 2020 to 216 billion by 2024. That’s… The post Illegal Streaming and Piracy Are on the Rise appeared first on Panda Security…

Read more →

EN, Silicon UK

Apple Wins Concessions In Epic Games Appeal

2025-12-12 13:12

US appeals court orders district judge to allow Apple to charge a commission on purchases made outside App Store This article has been indexed from Silicon UK Read the original article: Apple Wins Concessions In Epic Games Appeal

Read more →

EN, Silicon UK

Nick Clegg Joins VC Firm To Invest In European Start-Ups

2025-12-12 13:12

Former UK deputy prime minister Clegg joins London-based Hiro Capital, which aims to invest in European spatial AI start-ups This article has been indexed from Silicon UK Read the original article: Nick Clegg Joins VC Firm To Invest In European…

Read more →

EN, Silicon UK

Epic Games’ Fortnite Returns To Google Play In US

2025-12-12 13:12

Popular game Fortnite returns to Google Play app store in US as Google complies with US District Court injunction This article has been indexed from Silicon UK Read the original article: Epic Games’ Fortnite Returns To Google Play In US

Read more →

EN, Silicon UK

Silicon UK AI for Your Business Podcast: Trust at Speed: Governing Enterprise AI Without Losing Momentum

2025-12-12 13:12

Explore how enterprises balance rapid AI deployment with trust, governance, and compliance—without slowing innovation. Insights from Silicon UK and Alteryx. This article has been indexed from Silicon UK Read the original article: Silicon UK AI for Your Business Podcast: Trust…

Read more →

EN, Silicon UK

Do Kwon Sentenced To 15 Years In Prison Over Crypto Collapse

2025-12-12 13:12

Do Kwon, creator of Luna and TerraUSD tokens that were worth $50bn at their height, sentenced to 15 years in US prison for ‘epic fraud’ This article has been indexed from Silicon UK Read the original article: Do Kwon Sentenced…

Read more →

EN, GBHackers Security | #1 Globally Trusted Cyber Security News Platform

Severe Flaws in React Server Components Enable DoS Attacks and Code Exposure

2025-12-12 13:12

Security researchers have disclosed two new vulnerabilities in React Server Components that expose servers to Denial-of-Service (DoS) attacks and to source code leaks. These flaws were discovered while experts were analyzing the patches for last week’s critical “React2Shell” vulnerability. While…

Read more →

EN, GBHackers Security | #1 Globally Trusted Cyber Security News Platform

Ashen Lepus Hacker Group Targets Eastern Diplomatic Entities with AshTag Malware Attack

2025-12-12 13:12

An advanced persistent threat (APT) group with ties to Hamas has intensified its espionage operations against government and diplomatic entities across the Middle East, deploying a sophisticated new malware suite dubbed AshTag. The threat actor, tracked as Ashen Lepus (also known as WIRTE),…

Read more →

EN, GBHackers Security | #1 Globally Trusted Cyber Security News Platform

Notepad++ Flaw Allows Attackers to Hijack Update Traffic and Deploy Malware

2025-12-12 13:12

The development team behind the popular text editor Notepad++ has released version 8.8.9 to address a critical security flaw that could allow traffic hijacking. This vulnerability affects the software’s update mechanism, potentially allowing attackers to intercept network traffic and install…

Read more →

EN, GBHackers Security | #1 Globally Trusted Cyber Security News Platform

Gogs 0-Day Actively Exploited to Compromise Over 700 Servers

2025-12-12 13:12

Security researchers have identified an active zero-day vulnerability in Gogs, a widely used self-hosted Git service. The flaw has already resulted in the compromise of more than 700 servers publicly exposed on the internet. As of early December 2025, no…

Read more →

EN, welivesecurity

Locks, SOCs and a cat in a box: What Schrödinger can teach us about cybersecurity

2025-12-12 13:12

If you don’t look inside your environment, you can’t know its true state – and attackers count on that This article has been indexed from WeLiveSecurity Read the original article: Locks, SOCs and a cat in a box: What Schrödinger…

Read more →

EN, welivesecurity

Black Hat Europe 2025: Reputation matters – even in the ransomware economy

2025-12-12 13:12

Being seen as reliable is good for ‘business’ and ransomware groups care about ‘brand reputation’ just as much as their victims This article has been indexed from WeLiveSecurity Read the original article: Black Hat Europe 2025: Reputation matters – even…

Read more →

EN, The Register - Security

Half of exposed React servers remain unpatched amid active exploitation

2025-12-12 13:12

Wiz says React2Shell attacks accelerating, ranging from cryptominers to state-linked crews Half of the internet-facing systems vulnerable to a fast-moving React remote code execution flaw remain unpatched, even as exploitation has exploded into more than a dozen active attack clusters…

Read more →

EN, Security Affairs

U.S. CISA adds an OSGeo GeoServer flaw to its Known Exploited Vulnerabilities catalog

2025-12-12 13:12

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds an OSGeo GeoServer flaw to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added an OSGeo GeoServer flaw, tracked as CVE-2025-58360 (CVSS Score of 8.2), to its Known Exploited Vulnerabilities…

Read more →

EN, Securelist

Turn me on, turn me off: Zigbee assessment in industrial environments

2025-12-12 13:12

Kaspersky expert describes the Zigbee wireless protocol and presents two application-level attack vectors that allow Zigbee endpoints to be turned on and off. This article has been indexed from Securelist Read the original article: Turn me on, turn me off:…

Read more →

EN, Securelist

Following the digital trail: what happens to data stolen in a phishing attack

2025-12-12 13:12

Kaspersky experts detail the journey of the victims’ data after a phishing attack. We break down the use of email-based phishing kits, Telegram bots, and customized administration panels. This article has been indexed from Securelist Read the original article: Following…

Read more →

EN, IT SECURITY GURU

From Breach Fatigue to Brand Loyalty: Winning Customer Confidence in an Era of Constant Threats

2025-12-12 13:12

The Trust Crisis No One’s Talking About Every breach, leak, or phishing attack doesn’t just affect the targeted company—it reverberates across the broader consumer landscape. Each new headline chips away at public trust. As a result, businesses are no longer…

Read more →

Cyber Security News, EN

Apache Struts 2 DoS Vulnerability Let Attackers Crash Server

2025-12-12 13:12

A critical denial-of-service vulnerability has been discovered in Apache Struts 2, affecting multiple versions of the popular web application framework. The vulnerability, identified as CVE-2025-64775, exploits a file leak in multipart request processing that can cause disk exhaustion and server…

Read more →

Cyber Security News, EN

Ashen Lepus Hacker Group Attacks Eastern Diplomatic Entities With New AshTag Malware

2025-12-12 13:12

A Hamas‑affiliated threat group known as Ashen Lepus, also tracked as WIRTE, has launched a new espionage campaign against governmental and diplomatic entities across the Middle East. The group uses realistic Arabic‑language diplomatic lures that reference regional politics and security…

Read more →

Cyber Security News, EN

MITRE Releases Top 25 Most Dangerous Software Weaknesses of 2025

2025-12-12 13:12

MITRE has unveiled its 2025 Common Weakness Enumeration (CWE™) Top 25 Most Dangerous Software Weaknesses list, highlighting the root causes behind 39,080 Common Vulnerability and Exposure (CVE™) records this year. These prevalent flaws, which are often simple to detect and…

Read more →

Cyber Security News, EN

Beware of Fake Leonardo DiCaprio Movie Torrent File Drops Agent Tesla Malware

2025-12-12 13:12

A new threat is targeting movie lovers who search for the latest films online. Cybercriminals are now using the popularity of Leonardo DiCaprio’s new film, One Battle After Another, to spread the dangerous Agent Tesla malware. What appears to be…

Read more →

Cyber Security News, EN

New BlackForce Phishing Kit Lets Attackers Steal Credentials Using MitB Attacks and Bypass MFA

2025-12-12 13:12

A sophisticated phishing tool called BlackForce has emerged as a serious threat to organizations worldwide. First observed in August 2025, this professional-grade kit allows criminals to steal login information and bypass multi-factor authentication using advanced Man-in-the-Browser techniques. The tool is…

Read more →

Page 138 of 4753
« 1 … 136 137 138 139 140 … 4,753 »

Pages

  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Apps
    • Telegram Channel

Recent Posts

  • What innovations do NHIs bring to cloud security January 15, 2026
  • Can Agentic AI keep your data protection strategies ahead January 15, 2026
  • How do you trust a machine with secret management January 15, 2026
  • Are NHIs scalable for growing tech ecosystems January 15, 2026
  • Microsoft, Law Enforcement Disrupt RedVDS Global Cybercrime Service January 15, 2026
  • IT Security News Hourly Summary 2026-01-15 03h : 1 posts January 15, 2026
  • ISC Stormcast For Thursday, January 15th, 2026 https://isc.sans.edu/podcastdetail/9768, (Thu, Jan 15th) January 15, 2026
  • IT Security News Hourly Summary 2026-01-15 00h : 1 posts January 15, 2026
  • IT Security News Daily Summary 2026-01-14 January 15, 2026
  • Stealthy CastleLoader Malware Attacking US Government Agencies and Critical Infrastructure January 15, 2026
  • CVE-2025-64155: Exploit Code Released for Critical Fortinet FortiSIEM Command Injection Vulnerability January 15, 2026
  • Microsoft Copilot Reprompt Attack Enables Stealthy Data Exfiltration January 14, 2026
  • This WhatsApp Link Can Hand Over Your Account in Seconds January 14, 2026
  • New Linux malware targets the cloud, steals creds, and then vanishes January 14, 2026
  • CERT-UA reports PLUGGYAPE cyberattacks on defense forces January 14, 2026
  • IT Security News Hourly Summary 2026-01-14 21h : 6 posts January 14, 2026
  • The multibillion-dollar AI security problem enterprises can’t ignore January 14, 2026
  • Researchers Null-Route Over 550 Kimwolf and Aisuru Botnet Command Servers January 14, 2026
  • The multi-billion AI security problem enterprises can’t ignore January 14, 2026
  • Hacking Wheelchairs over Bluetooth January 14, 2026

Copyright © 2026 IT Security News. All Rights Reserved. The Magazine Basic Theme by bavotasan.com.

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}