IT Security News

Cybersecurity news and articles about information security, vulnerabilities, exploits, hacks, laws, spam, viruses, malware, breaches.

Main menu

Skip to content
  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Apps
    • Telegram Channel
EN, Security Affairs

Fortinet fixed two critical authentication-bypass vulnerabilities

2025-12-11 01:12

Fortinet patched 18 flaws, including two authentication-bypass bugs affecting FortiOS, FortiWeb, FortiProxy, and FortiSwitchManager with FortiCloud SSO enabled. Fortinet addressed 18 vulnerabilities, including two authentication-bypass flaws, tracked as CVE-2025-59718 and CVE-2025-59719 (CVSS score of 9.1), affecting FortiOS, FortiWeb, FortiProxy, and…

Read more →

daily summary

IT Security News Daily Summary 2025-12-10

2025-12-11 00:12

157 posts were published in the last hour 22:2 : 700+ self-hosted Gits battered in 0-day attacks with no fix imminent 21:32 : Releasing Open Source Tools to the Community 21:31 : CEO of South Korean retail giant Coupang resigns…

Read more →

EN, The Register - Security

700+ self-hosted Gits battered in 0-day attacks with no fix imminent

2025-12-11 00:12

More than half of internet-exposed instances already compromised Attackers are actively exploiting a zero-day bug in Gogs, a popular self-hosted Git service, and the open source project doesn’t yet have a fix.… This article has been indexed from The Register…

Read more →

EN, Windows Incident Response

Releasing Open Source Tools to the Community

2025-12-10 23:12

Every now and then, I get contacted by someone who tells me that they used the open source tools I’ve released in either a college course they took, or in a course provided by one of the many training vendors in…

Read more →

EN, Security News | TechCrunch

CEO of South Korean retail giant Coupang resigns after massive data breach

2025-12-10 23:12

The massive data breach at the South Korean retail giant Coupang affects more than half of the country’s population. This article has been indexed from Security News | TechCrunch Read the original article: CEO of South Korean retail giant Coupang…

Read more →

EN, Security Boulevard

SafeSplit: A Novel Defense Against Client-Side Backdoor Attacks In Split Learning

2025-12-10 23:12

Session 5C: Federated Learning 1 Authors, Creators & Presenters: Phillip Rieger (Technical University of Darmstadt), Alessandro Pegoraro (Technical University of Darmstadt), Kavita Kumari (Technical University of Darmstadt), Tigist Abera (Technical University of Darmstadt), Jonathan Knauer (Technical University of Darmstadt), Ahmad-Reza…

Read more →

EN, Google Online Security Blog

HTTPS certificate industry phasing out less secure domain validation methods

2025-12-10 23:12

Posted by Chrome Root Program Team Secure connections are the backbone of the modern web, but a certificate is only as trustworthy as the validation process and issuance practices behind it. Recently, the Chrome Root Program and the CA/Browser Forum…

Read more →

EN, The Hacker News

React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors

2025-12-10 23:12

React2Shell continues to witness heavy exploitation, with threat actors leveraging the maximum-severity security flaw in React Server Components (RSC) to deliver cryptocurrency miners and an array of previously undocumented malware families, according to new findings from Huntress. This includes a…

Read more →

EN, Hackread – Cybersecurity News, Data Breaches, AI, and More

Torrent for DiCaprio’s “One Battle After Another” Movie Drops Agent Tesla

2025-12-10 22:12

Bitdefender researchers warn that the torrent for Leonardo DiCaprio’s One Battle After Another is a trap deploying Agent Tesla malware. Learn how the fileless LOTL attack targets unsuspecting Windows users. This article has been indexed from Hackread – Cybersecurity News,…

Read more →

hourly summary

IT Security News Hourly Summary 2025-12-10 21h : 5 posts

2025-12-10 22:12

5 posts were published in the last hour 20:2 : How Migrating to Hardened Container Images Strengthens the Secure Software Development Lifecycle 20:2 : .NET SOAPwn Flaw Opens Door for File Writes and Remote Code Execution via Rogue WSDL 19:32…

Read more →

DZone Security Zone, EN

How Migrating to Hardened Container Images Strengthens the Secure Software Development Lifecycle

2025-12-10 22:12

Container images are the key components of the software supply chain. If they are vulnerable, the whole chain is at risk. This is why container image security should be at the core of any Secure Software Development Lifecycle (SSDLC) program.…

Read more →

EN, The Hacker News

.NET SOAPwn Flaw Opens Door for File Writes and Remote Code Execution via Rogue WSDL

2025-12-10 22:12

New research has uncovered exploitation primitives in the .NET Framework that could be leveraged against enterprise-grade applications to achieve remote code execution. WatchTowr Labs, which has codenamed the “invalid cast vulnerability” SOAPwn, said the issue impacts Barracuda Service Center RMM,…

Read more →

EN, Security Boulevard

NIST Plans to Build Threat and Mitigation Taxonomy for AI Agents

2025-12-10 21:12

The U.S. National Institute of Standards and Technology (NIST) is building a taxonomy of attack and mitigations for securing artificial intelligence (AI) agents. Speaking at the AI Summit New York conference, Apostol Vassilev, a research team supervisor for NIST, told…

Read more →

EN, Security Boulevard

Response to CISA Advisory (AA25-343A): Pro-Russia Hacktivists Conduct Opportunistic Attacks Against US and Global Critical Infrastructure

2025-12-10 21:12

AttackIQ has issued recommendations in response to the Cybersecurity Advisory (CSA) released by the Cybersecurity and Infrastructure Security Agency (CISA) on December 9, 2025, which details the ongoing targeting of critical infrastructure by pro-Russia hacktivists. The post Response to CISA…

Read more →

EN, Microsoft Security Blog

From awareness to action: Building a security-first culture for the agentic AI era

2025-12-10 21:12

The insights gained from Cybersecurity Awareness Month, right through to Microsoft Ignite 2025, demonstrate that security remains a top priority for business leaders. The post From awareness to action: Building a security-first culture for the agentic AI era appeared first…

Read more →

EN, eSecurity Planet

AISLE Uncovers Traefik Bug That Disabled TLS Verification for Months

2025-12-10 20:12

A Traefik misconfiguration disabled TLS checks across Kubernetes clusters. The post AISLE Uncovers Traefik Bug That Disabled TLS Verification for Months appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read the original article: AISLE Uncovers…

Read more →

Cyber Security News, EN

New Spiderman Phishing Kit Lets Attackers Create Malicious Bank Login Pages in Few Clicks

2025-12-10 20:12

A sophisticated new phishing framework dubbed “Spiderman” has emerged in the cybercrime underground, dramatically lowering the barrier to entry for financial fraud. This toolkit, observed by Varonis, allows threat actors, even those with minimal technical skill, to spin up pixel-perfect…

Read more →

Cyber Security News, EN

Over 644,000 Domains Exposed to Critical React Server Components Vulnerability

2025-12-10 20:12

The Shadowserver Foundation has released alarming new data regarding the exposure of web applications to CVE-2025-55182, a critical vulnerability affecting React Server Components. Following significant improvements to their scanning methodologies, researchers have identified a massive attack surface comprising over 165,000…

Read more →

Cyber Security News, EN

Critical Ivanti EPM Vulnerability Allows Admin Session Hijacking via Stored XSS

2025-12-10 20:12

A critical stored cross-site scripting vulnerability in Ivanti Endpoint Manager (“EPM”) versions 2024 SU4 and below, that could enable attackers to hijack administrator sessions without authentication. The vulnerability, identified as CVE-2025-10573, has been assigned a CVSS score of 9.6 and…

Read more →

EN, The Register - Security

Microsoft won’t fix .NET RCE bug affecting slew of enterprise apps, researchers say

2025-12-10 20:12

Devs and users should know better, Microsoft tells watchTowr Security researchers have revealed a .NET security flaw thought to affect a host of enterprise-grade products that they say Microsoft refuses to fix.… This article has been indexed from The Register…

Read more →

EN, The Register - Security

US extradites Ukrainian woman accused of hacking meat processing plant for Russia

2025-12-10 20:12

The digital intrusion allegedly caused thousands of pounds of meat to spoil and triggered an ammonia leak in the facility A Ukrainian woman accused of hacking US public drinking water systems and a meat processing facility on behalf of Kremlin-backed…

Read more →

EN, Security Boulevard

When Vendors Become the Vulnerability: What the Marquis Software Breach Signals for Financial Institutions

2025-12-10 20:12

In December 2025, a ransomware attack on Marquis Software Solutions, a data analytics and marketing vendor serving the financial sector, compromised sensitive customer information held by multiple banks and credit unions, according to Infosecurity Magazine. The attackers reportedly gained access…

Read more →

EN, eSecurity Planet

Flare Finds 10,000 Docker Hub Images Exposing Sensitive Secrets

2025-12-10 19:12

Flare found over 10,000 Docker Hub images leaking sensitive credentials. The post Flare Finds 10,000 Docker Hub Images Exposing Sensitive Secrets appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read the original article: Flare Finds…

Read more →

EN, Security Latest

2 Men Linked to China’s Salt Typhoon Hacker Group Likely Trained in a Cisco ‘Academy’

2025-12-10 19:12

The names of two partial owners of firms linked to the Salt Typhoon hacker group also appeared in records for a Cisco training program—years before the group targeted Cisco’s devices in a spy campaign. This article has been indexed from…

Read more →

Page 151 of 4758
« 1 … 149 150 151 152 153 … 4,758 »

Pages

  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Apps
    • Telegram Channel

Recent Posts

  • A simple CodeBuild flaw put every AWS environment at risk – and pwned ‘the central nervous system of the cloud’ January 15, 2026
  • We’re Moving Too Fast: Why AI’s Race to Market Is a Security Disaster January 15, 2026
  • Cyber Briefing: 2026.01.15 January 15, 2026
  • Microsoft Patch Tuesday Fixes 112 Flaws, Includes SharePoint and Windows January 15, 2026
  • Zorin OS Hits 2 Million Downloads as Windows 10 Support Ends January 15, 2026
  • AppGuard Critiques AI Hyped Defenses; Expands its Insider Release for its Next-Generation Platform January 15, 2026
  • Sensitive data of Eurail, Interrail travelers compromised in data breach January 15, 2026
  • ThreatsDay Bulletin: AI Voice Cloning Exploit, Wi-Fi Kill Switch, PLC Vulns, and 14 More Stories January 15, 2026
  • Cyber Threat Actors Ramp Up Attacks on Industrial Environments January 15, 2026
  • CodeBuild Flaw Put AWS Console Supply Chain At Risk January 15, 2026
  • Microsoft Disrupts RedVDS Cybercrime January 15, 2026
  • Google Personal Intelligence Links Gemini January 15, 2026
  • France Fines Free Mobile Over Breach January 15, 2026
  • Palo Alto Networks Firewall Vulnerability Allows Attackers To Trigger Denial Of Service January 15, 2026
  • Microsoft and Authorities Dismatles BEC Attack Chain Powered By RedVDS Fraud Engine January 15, 2026
  • Windows Remote Assistance Vulnerability Allow attacker To bypass Security Features January 15, 2026
  • Critical Cal.com Vulnerability Let Attackers Bypass Authentication and Hijack Any User Account January 15, 2026
  • Promptware Kill Chain – Five-step Kill Chain Model For Analyzing Cyberthreats January 15, 2026
  • Microsoft Remains the Most Imitated Brand in Phishing Attacks in Q4 2025 January 15, 2026
  • Former CISA Director Jen Easterly Will Lead RSAC Conference January 15, 2026

Copyright © 2026 IT Security News. All Rights Reserved. The Magazine Basic Theme by bavotasan.com.

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}