IT Security News

Cybersecurity news and articles about information security, vulnerabilities, exploits, hacks, laws, spam, viruses, malware, breaches.

Main menu

Skip to content
  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Telegram Channel
EN, The Hacker News

OpenAI Patches ChatGPT Data Exfiltration Flaw and Codex GitHub Token Vulnerability

2026-03-30 21:03

A previously unknown vulnerability in OpenAI ChatGPT allowed sensitive conversation data to be exfiltrated without user knowledge or consent, according to new findings from Check Point. “A single malicious prompt could turn an otherwise ordinary conversation into a covert exfiltration…

Read more →

EN, Security Affairs

China-Linked groups target Southeast Asian government with advanced malware in 2025

2026-03-30 21:03

China-linked groups hit a Southeast Asian government in 2025, deploying multiple malware families in a sophisticated cyber campaign. In 2025, three China-linked threat clusters targeted a Southeast Asian government in a complex, well-funded cyber operation. Threat actors deployed numerous malware…

Read more →

CySecurity News - Latest Information Security and Hacking Incidents, EN

Europol Takes Down Large Dark Web Scam Network

2026-03-30 21:03

European law enforcement has dismantled an extensive Dark Web operation that was built to deceive users seeking illegal content and cybercrime services. According to Europol, a 35-year-old man based in China is suspected of creating a network of 373,000 Dark…

Read more →

hourly summary

IT Security News Hourly Summary 2026-03-30 21h : 6 posts

2026-03-30 21:03

6 posts were published in the last hour 18:34 : Breach Readiness in the Age of Mythos: When Your AI Thinks, Learns, and Defends 18:12 : Wave Browser Brings Gaming Tools and Ocean Cleanup into the Same Tab 18:11 :…

Read more →

EN, Security Boulevard

Breach Readiness in the Age of Mythos: When Your AI Thinks, Learns, and Defends

2026-03-30 20:03

Anthropic left details of an unreleased model, an invite-only CEO retreat, sitting in an unsecured data trove in a significant security lapse. Leaked reports suggest this next-generation model from Anthropic is a major advancement in reasoning, coding, and cyber offense.…

Read more →

EN, Hackread – Cybersecurity News, Data Breaches, AI and More

Wave Browser Brings Gaming Tools and Ocean Cleanup into the Same Tab

2026-03-30 20:03

Wave Browser for gaming: built for multitasking, streaming, and tabs, with tools for gamers plus ocean cleanup support tied to everyday browsing activity. This article has been indexed from Hackread – Cybersecurity News, Data Breaches, AI and More Read the…

Read more →

EN, eSecurity Planet

RSAC 2026: Fraud Becomes a CISO-Level Security Threat

2026-03-30 20:03

I sat down with the CEO of Bolster AI at RSAC 2026 to talk about the changing fraud landscape. The post RSAC 2026: Fraud Becomes a CISO-Level Security Threat appeared first on eSecurity Planet. This article has been indexed from…

Read more →

Cyber Security News, EN

North Korean IT Worker Allegedly Used Stolen Identity and AI Resume in Job Application Scam

2026-03-30 20:03

A suspected North Korean operative tried to sneak into a remote job at a cybersecurity firm by using a stolen identity, a fake AI-generated resume, and a VoIP phone number. The case, uncovered in June 2025, shows how North Korea’s…

Read more →

Cyber Security News, EN

Exposed Server Reveals TheGentlemen Ransomware Toolkit, Victim Credentials, and Ngrok Tokens

2026-03-30 20:03

A misconfigured server hosted on a Russian bulletproof hosting provider has exposed the complete operational toolkit of a TheGentlemen ransomware affiliate, including harvested victim credentials and plaintext authentication tokens used to establish hidden remote access tunnels. TheGentlemen ransomware group operates…

Read more →

EN, The Register - Security

Telnyx joins LiteLLM in latest PyPI package poisoning tied to Trivy breach

2026-03-30 20:03

Also, EU probes Snapchat, RedLine suspect extradited, AstraZeneca leak claim surfaces, and more infosec in brief  The cybercrime crew linked to the Trivy supply-chain attack has struck again, this time pushing malicious Telnyx package versions to PyPI in an effort…

Read more →

EN, Hackread – Cybersecurity News, Data Breaches, AI and More

15-Year-Old strongSwan Flaw Lets Attackers Crash VPNs via Integer Underflow

2026-03-30 19:03

15-year-old strongSwan flaw allows attackers to crash VPNs via integer underflow bug, affecting EAP-TTLS plugin and multiple versions worldwide. This article has been indexed from Hackread – Cybersecurity News, Data Breaches, AI and More Read the original article: 15-Year-Old strongSwan…

Read more →

Cyber Security News, EN

TA446 Hackers Deploying DarkSword Exploit Kit to Attack iOS Users

2026-03-30 19:03

A known threat group called TA446 has been caught using a newly discovered exploit kit called DarkSword to target iOS users. This development marks a significant shift in the group’s tactics, as previous activity from TA446 showed no signs of…

Read more →

Cyber Security News, EN

New ClickFix Variant Uses Rundll32 and WebDAV to Evade PowerShell Detection

2026-03-30 19:03

A new and more dangerous version of the ClickFix attack technique has been found actively targeting Windows users. Unlike older versions that used PowerShell or mshta to run malicious commands, this new variant takes a different path. It uses rundll32.exe…

Read more →

Cyber Security News, EN

CrySome RAT Emerges as Advanced .NET Malware With AV Killer and HVNC Capabilities

2026-03-30 19:03

A new and dangerous piece of malware has surfaced in the threat landscape, and it is built to stay hidden, stay running, and stay in control of any system it infects. CrySome RAT is written in C# and targets the…

Read more →

EN, Security Boulevard

What the FBI Director Breach Reveals About Executive Digital Exposure

2026-03-30 19:03

Iranian state-linked hackers published emails stolen from FBI Director Kash Patel’s personal account. The lesson for every security leader: no title protects you from an exposed digital footprint. On March 27, 2026, the Handala Hack Team, a group U.S. prosecutors…

Read more →

CySecurity News - Latest Information Security and Hacking Incidents, EN

Trivy Scanner Hit by Major Supply Chain Attack

2026-03-30 19:03

  Aqua Security’s popular open-source vulnerability scanner, Trivy, has been compromised in an ongoing supply chain attack that began in late February 2026 and escalated dramatically by mid-March. Threat actors exploited misconfigurations in Trivy’s GitHub Actions workflows, stealing privileged tokens…

Read more →

EN, Microsoft Security Blog

Addressing the OWASP Top 10 Risks in Agentic AI with Microsoft Copilot Studio

2026-03-30 19:03

Agentic AI introduces new security risks. Learn how the OWASP Top 10 Risks for Agentic Applications maps to real mitigations in Microsoft Copilot Studio. The post Addressing the OWASP Top 10 Risks in Agentic AI with Microsoft Copilot Studio appeared…

Read more →

EN, Help Net Security

RSAC 2026 is back, and the certificate automation gap is impossible to ignore

2026-03-30 19:03

RSAC 2026 Conference marked a return to form, more vibrant and better attended than any show I can recall over the past decade. The audience was distinctly international, with strong representation from North America, Europe and Latin America, and it…

Read more →

EN, The Hacker News

DeepLoad Malware Uses ClickFix and WMI Persistence to Steal Browser Credentials

2026-03-30 19:03

A new campaign has leveraged the ClickFix social engineering tactic as a way to distribute a previously undocumented malware loader referred to as DeepLoad. “It likely uses AI-assisted obfuscation and process injection to evade static scanning, while credential theft starts…

Read more →

EN, Hackread – Cybersecurity News, Data Breaches, AI and More

24/7 Payments for 24/7 Agents: The Case for Crypto in the Machine Economy

2026-03-30 18:03

Crypto enables 24/7 payments for AI agents, replacing fiat limits with scalable machine-to-machine transactions and powering the emerging machine economy. This article has been indexed from Hackread – Cybersecurity News, Data Breaches, AI and More Read the original article: 24/7…

Read more →

EN, Trend Micro Research, News and Perspectives

TeamPCP’s Telnyx Attack Marks a Shift in Tactics Beyond LiteLLM

2026-03-30 18:03

Moving beyond their LiteLLM campaign, TeamPCP weaponizes the Telnyx Python SDK with stealthy WAV‑based payloads to steal credentials across Linux, macOS, and Windows. This article has been indexed from Trend Micro Research, News and Perspectives Read the original article: TeamPCP’s…

Read more →

DZone Security Zone, EN

Beyond Static Checks: Designing CI/CD Pipelines That Respond to Live Security Signals

2026-03-30 18:03

Most CI/CD pipelines are built around a simple idea: if your code passes tests and security scans before deployment, you’re good to go. That used to be enough. It isn’t anymore. This article has been indexed from DZone Security Zone…

Read more →

EN, Security News | TechCrunch

Apple will hide your email address from apps and websites, but not cops

2026-03-30 18:03

Demands for Apple customer records by federal agents in recent months underscore the privacy limitations of email. This article has been indexed from Security News | TechCrunch Read the original article: Apple will hide your email address from apps and…

Read more →

EN, Google Online Security Blog

Security for the Quantum Era: Implementing Post-Quantum Cryptography in Android

2026-03-30 18:03

Posted by Eric Lynch, Product Manager, Android and Dom Elliott, Group Product Manager, Google Play Modern digital security is at a turning point. We are on the threshold of using quantum computers to solve “impossible” problems in drug discovery, materials…

Read more →

Page 16 of 5176
« 1 … 14 15 16 17 18 … 5,176 »

Pages

  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Telegram Channel

Recent Posts

  • Apple releases security fix for older iPhones and iPads to protect against DarkSword attacks April 1, 2026
  • BSidesSLC 2025 – Closing Ceremonies — Highlights, Prizes & Sponsor Shoutouts April 1, 2026
  • Survey Surfaces Greater CISO Appreciation for Scope of AI Threat April 1, 2026
  • Cyberattack hits Hasbro, impacting orders and shipping April 1, 2026
  • Threat Brief: Widespread Impact of the Axios Supply Chain Attack April 1, 2026
  • Magecart Hackers Uses 100+ Domains to Hijack eStores Checkouts and Steal Card Data April 1, 2026
  • The AI Intelligence Layer for SIEM, Explained: What It Does, Why It Matters, and How to Evaluate One April 1, 2026
  • Google Rolls Out Android Developer Verification to Curb Anonymous App Distribution April 1, 2026
  • IT Security News Hourly Summary 2026-04-01 21h : 1 posts April 1, 2026
  • CERT-UA Impersonation Campaign Spread AGEWHEEZE Malware to 1 Million Emails April 1, 2026
  • Secure Access Tokens in Web Applications: A Practical Guide From the Field April 1, 2026
  • Planning a spring break trip? Don’t fall for these 7 travel scams April 1, 2026
  • Agentic AI Governance: How to Approach It April 1, 2026
  • LinkedIn Phishing Scam Uses Fake Notifications to Hijack Accounts April 1, 2026
  • WhatsApp notifies hundreds of users who installed a fake app made by government spyware maker April 1, 2026
  • 200,000 WordPress Sites Affected by Arbitrary File Move Vulnerability in MW WP Form WordPress Plugin April 1, 2026
  • WhatsApp notifies hundreds of users who installed a fake app that was actually government spyware April 1, 2026
  • Is “Hackback” Official US Cybersecurity Strategy? April 1, 2026
  • Depthfirst Raises $80 Million in Series B Funding April 1, 2026
  • Key Leaks, Vault Failures, and TEE Attacks: Highlights from RWC 2026 April 1, 2026

Copyright © 2026 IT Security News. All Rights Reserved. The Magazine Basic Theme by bavotasan.com.

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}