IT Security News

Cybersecurity news and articles about information security, vulnerabilities, exploits, hacks, laws, spam, viruses, malware, breaches.

Main menu

Skip to content
  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Telegram Channel
EN, The Register - Security

Socket buys Coana to tell you which security alerts you can ignore

2025-05-15 17:05

Sometimes, less information is more In its latest gambit to reduce the noise of unnecessary security alerts, Socket has acquired Coana, a startup founded in 2022 by researchers from Aarhus University in Denmark that tells users which vulnerabilities they can…

Read more →

EN, Security Boulevard

Warning to US Retail: ‘Scattered Spider’ Targets YOU (with DragonForce Ransomware)

2025-05-15 17:05

Arachnid alarm: Three major British retailers recently attacked, resulting in huge damage. Now we see the self-same scum spotlighting stores in the States. The post Warning to US Retail: ‘Scattered Spider’ Targets YOU (with DragonForce Ransomware) appeared first on Security…

Read more →

EN, www.infosecurity-magazine.com

Coinbase Offers $20m Bounty to Take Down Cybercrime Ring Behind Hack

2025-05-15 17:05

Coinbase is offering a $20m reward to help catch the threat actor behind a cyber-attack that could cost it between $180-$400m This article has been indexed from www.infosecurity-magazine.com Read the original article: Coinbase Offers $20m Bounty to Take Down Cybercrime…

Read more →

DE, heise security News

E-Mail-Sicherheit: Proofpoint kauft Hornetsecurity

2025-05-15 16:05

Proofpoint verspricht sich mehr Expertise im M365-Umfeld und will die Lösungen aus Hannover weltweit vermarkten. Der Gründer und sein Team bleiben an Bord. Dieser Artikel wurde indexiert von heise security News Lesen Sie den originalen Artikel: E-Mail-Sicherheit: Proofpoint kauft Hornetsecurity

Read more →

EN, Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto

Fileless Remcos RAT Attack Evades Antivirus Using PowerShell Scripts

2025-05-15 16:05

A new wave of attacks uses PowerShell and LNK files to secretly install Remcos RAT, enabling full remote… This article has been indexed from Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto Read the original article: Fileless Remcos…

Read more →

EN, GBHackers Security | #1 Globally Trusted Cyber Security News Platform

Hackers Steal Customers Banking Details in Nova Scotia Cyber Attack

2025-05-15 16:05

Nova Scotia Power has confirmed that hackers infiltrated its IT infrastructure and exfiltrated sensitive customer data, including banking details from pre-authorized payment systems, in a cyberattack first detected on March 19, 2025. The energy provider revealed on May 14 that…

Read more →

EN, Security | TechRepublic

Patch Tuesday: Microsoft Patches 78 Vulnerabilities, 5 Zero-Day Flaws

2025-05-15 16:05

Microsoft patched vulnerabilities for the Common Log File System driver, Microsoft Edge, SharePoint, and more. This article has been indexed from Security | TechRepublic Read the original article: Patch Tuesday: Microsoft Patches 78 Vulnerabilities, 5 Zero-Day Flaws

Read more →

Cyber Security News, EN

Microsoft Outlook Down – Millions of Users Affected With This Longest Outage in Microsoft History

2025-05-15 16:05

A widespread outage affecting Microsoft 365 services has left users across the globe unable to access key platforms, including Outlook, Hotmail, and the main Microsoft 365 website, since Wednesday evening. The disruption, which began at 10:30 PM UTC on May…

Read more →

Cyber Security News, EN

Chihuahua Stealer Leverages Google Drive Document to Steal Browser Login Credentials

2025-05-15 16:05

A newly discovered .NET-based infostealer dubbed “Chihuahua Stealer” has emerged as a significant threat, exploiting Google Drive documents to deliver malicious PowerShell scripts and steal sensitive data. First identified by G DATA analysts in April 2025, the malware targets browser…

Read more →

Cyber Security News, EN

New DarkCloud Stealer Uses AutoIt to Evade Detection & Steal Login Credentials

2025-05-15 16:05

A new variant of the DarkCloud information-stealing malware has emerged, leveraging the AutoIt scripting language to bypass security tools and harvest sensitive credentials from infected systems. Dubbed DarkCloud Stealer v4, the malware has targeted financial institutions, healthcare organizations, and e-commerce…

Read more →

Cyber Security News, EN

TransferLoader Malware Allows Attackers to Execute Arbitrary Commands on Compromised System

2025-05-15 16:05

A newly identified malware loader dubbed TransferLoader has emerged as a critical threat, enabling attackers to execute arbitrary commands on compromised systems and deliver payloads such as the Morpheus ransomware. First detected in February 2025 by Zscaler ThreatLabz researchers, this…

Read more →

Cyber Security News, EN

Xerox Issues April 2025 Security Patch Update for FreeFlow Print Server v2

2025-05-15 16:05

Xerox has announced the release of its April 2025 Security Patch Update for the FreeFlow® Print Server v2 running on Windows® 10, reinforcing the company’s commitment to robust cybersecurity for its production print platforms. The update, officially released on May…

Read more →

EN, securityweek

Coinbase Rejects $20M Ransom After Rogue Contractors Bribed to Leak Customer Data

2025-05-15 16:05

Coinbase said a group of rogue contractors were bribed to pull customer data from internal systems, leading to a $20 million ransom demand. The post Coinbase Rejects $20M Ransom After Rogue Contractors Bribed to Leak Customer Data appeared first on…

Read more →

EN, Security Boulevard

BSidesLV24 – GroundFloor – The Road To Developers’ Hearts

2025-05-15 16:05

Author/Presenter: Sing Ambikapathi Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; and via the organizations YouTube channel. Permalink The post BSidesLV24…

Read more →

EN, GBHackers Security | #1 Globally Trusted Cyber Security News Platform

Microsoft Outlook Down – Millions of Business & Personal Users Worldwide Impacted

2025-05-15 16:05

A major outage hit Microsoft Outlook and other Microsoft 365 services on Thursday, May 15, 2025, leaving millions of users around the globe unable to access their email, calendars, and other essential productivity tools. The disruption began in the evening…

Read more →

EN, GBHackers Security | #1 Globally Trusted Cyber Security News Platform

Xerox Launches April 2025 Security Patch for FreeFlow Print Server v2

2025-05-15 16:05

Xerox has launched its April 2025 Security Patch Update for the FreeFlow Print Server v2 running on Windows 10, addressing over 40 critical vulnerabilities while introducing stricter encryption protocols for secure file transfers. The update, detailed in Security Bulletin XRX25-009,…

Read more →

EN, GBHackers Security | #1 Globally Trusted Cyber Security News Platform

New .NET Multi-Stage Loader Targets Windows Systems to Deploy Malicious Payloads

2025-05-15 16:05

A recently discovered .NET-based multi-stage loader has caught the attention of cybersecurity researchers due to its complex architecture and ability to deploy a range of malicious payloads on Windows systems. Tracked since early 2022 by Threatray, this loader employs a…

Read more →

CySecurity News - Latest Information Security and Hacking Incidents, EN

Barclays Introduces New Step-by-Step Model to Tackle Modern Fraud

2025-05-15 16:05

  Banks and shops are facing more advanced types of fraud that mix online tricks with real-world scams. To fight back, experts from Barclays and a security company called Threat Fabric have created a detailed model to understand how these…

Read more →

CySecurity News - Latest Information Security and Hacking Incidents, EN

One Click Is All It Takes: New Mac Malware Steals Your Data

2025-05-15 16:05

  A growing number of Mac users are being tricked into downloading harmful software through fake verification messages. These scams look like normal human checks, such as Google’s “I’m not a robot” box, but are actually part of a malware…

Read more →

CySecurity News - Latest Information Security and Hacking Incidents, EN

Audio and Video Chat Recording Could Be Part of Nintendo Switch 2

2025-05-15 16:05

  Audio and Video Chat Recording Could Be Part of Nintendo Switch 2.    In an official announcement from Nintendo, a new in-game communication system known as GameChat will be included in the Nintendo Switch 2 console, which is due…

Read more →

CySecurity News - Latest Information Security and Hacking Incidents, EN

iHeartMedia Cyberattack Exposes Sensitive Data Across Multiple Radio Stations

2025-05-15 16:05

  iHeartMedia, the largest audio media company in the United States, has confirmed a significant data breach following a cyberattack on several of its local radio stations. In official breach notifications sent to affected individuals and state attorney general offices…

Read more →

EN, The Hacker News

Coinbase Agents Bribed, Data of ~1% Users Leaked; $20M Extortion Attempt Fails

2025-05-15 16:05

Cryptocurrency exchange Coinbase has disclosed that unknown cyber actors broke into its systems and stole account data for a small subset of its customers. “Criminals targeted our customer support agents overseas,” the company said in a statement. “They used cash…

Read more →

EN, www.infosecurity-magazine.com

PowerShell-Based Loader Deploys Remcos RAT in New Fileless Attack

2025-05-15 16:05

A stealthy fileless PowerShell attack using Remcos RAT bypassed antivirus by operating in memory This article has been indexed from www.infosecurity-magazine.com Read the original article: PowerShell-Based Loader Deploys Remcos RAT in New Fileless Attack

Read more →

Blog - Wordfence, EN

Wordfence Intelligence Weekly WordPress Vulnerability Report (May 5, 2025 to May 11, 2025)

2025-05-15 15:05

📢 In case you missed it, Wordfence just published its annual WordPress security report for 2024. Read it now to learn more about the evolving risk landscape of WordPress so you can keep your sites protected in 2025 and beyond.  …

Read more →

Page 1438 of 4869
« 1 … 1,436 1,437 1,438 1,439 1,440 … 4,869 »

Pages

  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Telegram Channel

Recent Posts

  • AI Hijacks AWS Cloud in 8 Minutes via Exposed Keys February 6, 2026
  • Poland’s energy control systems were breached through exposed VPN access February 6, 2026
  • CISA Orders Removal of Unsupported Edge Devices to Reduce Federal Network Risk February 6, 2026
  • Ask Me Anything Cyber : Inside the Mind of a Hacker February 6, 2026
  • Ask Me Anything Cyber: Love, Lies and AI February 6, 2026
  • Cybersecurity Events 2026 February 6, 2026
  • IT Security News Hourly Summary 2026-02-06 15h : 4 posts February 6, 2026
  • Transparent Tribe Hacker Group Targets India’s Startup Ecosystem in Cyber Attack February 6, 2026
  • Threat Actors Leverage Hugging Face to Spread Android Malware at Scale February 6, 2026
  • 17% of 3rd-Party Add-Ons for OpenClaw Used in Crypto Theft and macOS Malware February 6, 2026
  • CISA orders US federal agencies to replace unsupported edge devices February 6, 2026
  • Bulletproof Hosting Providers Exploit Legitimate ISPs to Power Cybercrime Servers February 6, 2026
  • Phishing and OAuth Token Flaws Lead to Full Microsoft 365 Compromise February 6, 2026
  • Flickr Confirms Data Breach – 35 million Users Data at Risk February 6, 2026
  • APT-Q-27 Targeting Corporate Environments in Stealthy Attack Without Triggering Alerts February 6, 2026
  • Asian State-Backed Group TGR-STA-1030 Breaches 70 Government, Infrastructure Entities February 6, 2026
  • Claude Opus 4.6 Launches Enhanced Security Capabilities to Validate 500+ Critical Vulnerabilities February 6, 2026
  • iPhone Lockdown Mode Protects Washington Post Reporter February 6, 2026
  • Living off the AI: The Next Evolution of Attacker Tradecraft February 6, 2026
  • Flickr Security Incident Tied to Third-Party Email System February 6, 2026

Copyright © 2026 IT Security News. All Rights Reserved. The Magazine Basic Theme by bavotasan.com.

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}