IT Security News

Cybersecurity news and articles about information security, vulnerabilities, exploits, hacks, laws, spam, viruses, malware, breaches.

Main menu

Skip to content
  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Apps
    • Telegram Channel
Cyber Security News, EN

North Korean Hackers Make History with $2 Billion Crypto Heist in 2025

2025-12-19 13:12

North Korean hackers reached a dangerous milestone in 2025, stealing a record-breaking $2.02 billion in cryptocurrency throughout the year. This represents a 51% increase from 2024, pushing their total theft since 2016 to $6.75 billion. The alarming trend shows that…

Read more →

EN, The Register - Security

Faith in the internet is fading among young Brits

2025-12-19 13:12

Ofcom survey finds 18-34s increasingly see life online as bad for society and their mental health Young Brits are souring on the internet, with increasing numbers seeing it as damaging to society and their mental health, according to latest research…

Read more →

EN, The Hacker News

Nigeria Arrests RaccoonO365 Phishing Developer Linked to Microsoft 365 Attacks

2025-12-19 13:12

Authorities in Nigeria have announced the arrest of three “high-profile internet fraud suspects” who are alleged to have been involved in phishing attacks targeting major corporations, including the main developer behind the RaccoonO365 phishing-as-a-service (PhaaS) scheme. The Nigeria Police Force…

Read more →

CyberMaterial, EN

Ask Me Anything Cyber: Telethon Edition with Shadè Alcine

2025-12-19 13:12

Watch the Ask Me Anything Cyber Telethon to support diversity, mental health, and community impact across cybersecurity. Donate live and give back. This article has been indexed from CyberMaterial Read the original article: Ask Me Anything Cyber: Telethon Edition with…

Read more →

EN, securityweek

North Korea’s Digital Surge: $2B Stolen in Crypto as Amazon Blocks 1,800 Fake IT Workers

2025-12-19 12:12

Data from Chainalysis and Amazon offers a glimpse into North Korea’s cyber activities surrounding cryptocurrency theft and fake IT workers. The post North Korea’s Digital Surge: $2B Stolen in Crypto as Amazon Blocks 1,800 Fake IT Workers appeared first on…

Read more →

EN, Security Boulevard

Why NetSuite Customer Portals Fall Short and How to Build Better User Experiences

2025-12-19 12:12

NetSuite is one of the most widely used cloud ERP platforms in the world. It offers core features for finance, CRM, order management and commerce,…Read More The post Why NetSuite Customer Portals Fall Short and How to Build Better User…

Read more →

EN, Security Affairs

China-linked APT UAT-9686 is targeting Cisco Secure Email Gateway and Secure Email and Web Manager

2025-12-19 12:12

Cisco disclosed a critical zero-day (CVE-2025-20393) in Secure Email Gateway and Secure Email and Web Manager, actively exploited by a China-linked group. Cisco disclosed a critical zero-day, tracked as CVE-2025-20393, in Secure Email Gateway and Secure Email/Web Manager, which is…

Read more →

EN, Securelist

Cloud Atlas activity in the first half of 2025: what changed

2025-12-19 12:12

Kaspersky expert describes new malicious tools employed by the Cloud Atlas APT, including implants of their signature backdoors VBShower, VBCloud, PowerShower, and CloudAtlas. This article has been indexed from Securelist Read the original article: Cloud Atlas activity in the first…

Read more →

EN, Silicon UK

LG To Allow Users To Remove Copilot From TVs After Complaints

2025-12-19 11:12

LG to roll out software update for TVs allowing removal of Microsoft Copilot AI tool, after thousands of consumers complain of unwanted tool This article has been indexed from Silicon UK Read the original article: LG To Allow Users To…

Read more →

EN, Silicon UK

TikTok Signs Deal To Hand Over US Assets

2025-12-19 11:12

US operation to fall under control of joint venture with Oracle, Silver Lake, MGX as biggest investors, says memo This article has been indexed from Silicon UK Read the original article: TikTok Signs Deal To Hand Over US Assets

Read more →

EN, Security Archives - TechRepublic

Italian Ferry Malware Attack Sparks International Probe

2025-12-19 11:12

French intelligence agencies uncovered what appears to be a coordinated foreign interference operation targeting the GNV Fantastic. The post Italian Ferry Malware Attack Sparks International Probe appeared first on TechRepublic. This article has been indexed from Security Archives – TechRepublic…

Read more →

EN, The Register - Security

AI and cybersecurity: Two sides of the same coin

2025-12-19 11:12

Practical lessons on securing AI and using AI to strengthen defence Sponsored Post  AI is moving from experimentation to everyday use inside the enterprise. That shift brings new opportunities, but it also changes the security equation. Attacks are becoming faster…

Read more →

EN, GBHackers Security | #1 Globally Trusted Cyber Security News Platform

Roundcube Flaws Let Attackers Execute Malicious Scripts

2025-12-19 11:12

Roundcube, the widely used open-source webmail software, has officially released critical security updates to address two significant vulnerabilities in its 1.6 and 1.5 LTS (Long-Term Support) versions. These flaws could allow attackers to execute malicious scripts or expose sensitive information,…

Read more →

EN, GBHackers Security | #1 Globally Trusted Cyber Security News Platform

Microsoft Patches MSMQ Flaw That Affects IIS Web Servers

2025-12-19 11:12

Microsoft has released an out-of-band security update to address a significant vulnerability in Message Queuing (MSMQ) functionality that impacts Windows 10 systems running IIS web servers and enterprise environments. The flaw, discovered and documented in the December 9, 2025 update…

Read more →

EN, GBHackers Security | #1 Globally Trusted Cyber Security News Platform

Targeted Phishing Attack Strikes HubSpot Users

2025-12-19 11:12

Evalian’s Security Operations Centre has uncovered an active, sophisticated phishing campaign targeting HubSpot customers, combining business email compromise (BEC) tactics with website compromise to distribute a credential-stealing malware to unsuspecting users. The multi-layered attack demonstrates how modern threat actors are…

Read more →

EN, GBHackers Security | #1 Globally Trusted Cyber Security News Platform

Amazon Identified North Korean IT Worker by Tracking Keystroke Activity

2025-12-19 11:12

Amazon has uncovered a North Korean imposter posing as a U.S.-based systems administrator. The discovery was made not through traditional background checks but by analyzing the subtle timing of the worker’s typing. According to a report from Bloomberg, Amazon security specialists…

Read more →

EN, GBHackers Security | #1 Globally Trusted Cyber Security News Platform

New Linux Kernel Rust Vulnerability Triggers System Crashes

2025-12-19 11:12

A critical race condition vulnerability has been discovered in the Linux kernel’s Rust Binder module, potentially causing system crashes and memory corruption. Assigned CVE-2025-68260, this issue affects the kernel’s inter-process communication mechanism and requires immediate attention from system administrators and…

Read more →

Cyber Security News, EN

University of Sydney Hacked – Students and Staff Data Exposed

2025-12-19 11:12

The University of Sydney has confirmed a significant data breach affecting thousands of current and former staff members, as well as students and alums. In a message to the university community, Vice-President (Operations) Nicole Gower revealed that suspicious activity was…

Read more →

Cyber Security News, EN

Clop Ransomware Group Exploiting Gladinet CentreStack Servers to Steal Data

2025-12-19 11:12

The Clop ransomware group has launched a new data extortion campaign targeting Internet-facing Gladinet CentreStack file servers, marking another chapter in the threat actor’s pattern of exploiting file transfer solutions. The campaign appears to leverage multiple security weaknesses in CentreStack…

Read more →

Cyber Security News, EN

WatchGuard 0-day Vulnerability Exploited in the Wild to Hijack Firewalls

2025-12-19 11:12

An urgent security update has been released to fix a critical zero-day vulnerability in WatchGuard Firebox firewalls. With warnings that hackers are already actively exploiting the flaw in the wild to take control of affected devices. The vulnerability, tracked as CVE-2025-14733,…

Read more →

EN, The Hacker News

New UEFI Flaw Enables Early-Boot DMA Attacks on ASRock, ASUS, GIGABYTE, MSI Motherboards

2025-12-19 11:12

Certain motherboard models from vendors like ASRock, ASUSTeK Computer, GIGABYTE, and MSI are affected by a security vulnerability that leaves them susceptible to early-boot direct memory access (DMA) attacks across architectures that implement a Unified Extensible Firmware Interface (UEFI) and…

Read more →

EN, www.infosecurity-magazine.com

FBI Disrupts Russian Crypto Laundering Hub Enabling Cybercrime

2025-12-19 11:12

A 39-year-old Russian national is accused of working with cybercriminals to convert criminal proceeds from cryptocurrency into various cash currencies This article has been indexed from www.infosecurity-magazine.com Read the original article: FBI Disrupts Russian Crypto Laundering Hub Enabling Cybercrime

Read more →

EN, Silicon UK

Council Calls For Phone Ban In All Primary Schools

2025-12-19 10:12

West Sussex County Council calls on government to institute nationwide ban on mobile phones in primary schools to protect well-being This article has been indexed from Silicon UK Read the original article: Council Calls For Phone Ban In All Primary…

Read more →

EN, Silicon UK

One In Three UK Adults Use AI For Emotional Support

2025-12-19 10:12

Government study finds one-third of UK adults use AI chatbots for emotional support or social interaction, as capabilities rise quickly This article has been indexed from Silicon UK Read the original article: One In Three UK Adults Use AI For…

Read more →

Page 16 of 4665
« 1 … 14 15 16 17 18 … 4,665 »

Pages

  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Apps
    • Telegram Channel

Recent Posts

  • ServiceNow to Acquire Armis for $7.75 Billion in Cash December 23, 2025
  • Building Secure User Portals for Content-Heavy SaaS Applications December 23, 2025
  • IT Security News Hourly Summary 2025-12-23 15h : 3 posts December 23, 2025
  • Ransomware Hits Romanian Water Authority, 1000 Systems Knocked Offline December 23, 2025
  • Cyber Threat Actors Escalate Impersonation of Senior US Government Officials December 23, 2025
  • SEC Targets Crypto Platforms in Social Media Scam Crackdown December 23, 2025
  • PoC Exploit Released HPE OneView Vulnerability that Enables Remote Code Execution December 23, 2025
  • New MacSync Stealer Malware Attacking macOS Users Using Digitally Signed Apps December 23, 2025
  • Windows Imaging Component Vulnerability Can Lead to RCE Attacks Under Complex Attack Scenarios December 23, 2025
  • Threat Actors Poses as Korean TV Programs’ Writer to Trick Victims and Install Malware December 23, 2025
  • Critical n8n Automation Platform Vulnerability Enables RCE Attacks – 103,000+ Instances Exposed December 23, 2025
  • Hacktivists claim near-total Spotify music scrape December 23, 2025
  • Budding infosec pros and aspiring cyber crooks targeted with fake PoC exploits December 23, 2025
  • Top Ransomware Trends of 2025 December 23, 2025
  • Spotify Music Library Targeted as Hacktivists Scrape 86 Million Files December 23, 2025
  • MacSync Stealer Malware Targets macOS Users Through Digitally Signed Apps December 23, 2025
  • Threat Actors Impersonate Korean TV Writers to Deliver Malware December 23, 2025
  • Critical n8n Vulnerability Exposes 103,000+ Automation Instances to RCE Attacks December 23, 2025
  • Indian Income Tax–Lure Campaign Deploying Multi-Stage Malware Against Businesses December 23, 2025
  • Denmark Accuses Russia of Conducting Two Cyberattacks December 23, 2025

Copyright © 2025 IT Security News. All Rights Reserved. The Magazine Basic Theme by bavotasan.com.

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}