IT Security News

Cybersecurity news and articles about information security, vulnerabilities, exploits, hacks, laws, spam, viruses, malware, breaches.

Main menu

Skip to content
  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Telegram Channel
DZone Security Zone, EN

From On-Call to On-Guard: Hardening Incident Response Against Security-Driven Outages

2026-02-18 20:02

The pager doesn’t care why production is burning. A compromised credential chain triggering mass file encryption demands the same midnight scramble as a misconfigured load balancer taking down the payment gateway. Yet most organizations still maintain separate playbooks, separate escalation…

Read more →

EN, The Register - Security

Deutsche Bahn back on track after DDoS yanks the brakes

2026-02-18 20:02

National rail bookings and timetables disrupted for nearly 24 hours If you wanted to book a train trip in Germany recently, you would have been out of luck. The country’s national rail company says that its services were disrupted for…

Read more →

EN, eSecurity Planet

Booking.com Phishing Campaign Hijacks Hotel Accounts to Defraud Guests

2026-02-18 20:02

A multi-stage Booking.com phishing campaign is hijacking hotel accounts to defraud guests through convincing payment scams. The post Booking.com Phishing Campaign Hijacks Hotel Accounts to Defraud Guests appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet…

Read more →

EN, IT SECURITY GURU

Cybercrime Goes Corporate: Huntress Report Reveals Rise of Scalable, Stealth-First Attacks

2026-02-18 20:02

Cybercriminals are no longer lone hackers exploiting flashy zero-days; they are running streamlined, profit-driven operations that mirror legitimate businesses. That’s the key takeaway from the newly released Huntress 2026 Cyber Threat Report, which exposes how organised cybercrime groups are standardising…

Read more →

EN, The Register - Security

Texas sues TP-Link over China links and security vulnerabilities

2026-02-18 20:02

State disputes the company’s claim that its routers are made in Vietnam TP-Link is facing legal action from the state of Texas for allegedly misleading consumers with “Made in Vietnam” claims despite China-dominated manufacturing and supply chains, and for marketing…

Read more →

EN, Security Boulevard

Engineering for the Inevitable: Managing Downstream Failures in Security Data Pipelines

2026-02-18 20:02

Learn how to prevent 50% of detection failures caused by log delivery chain issues. Master persistent queuing, schema drift mitigation, and automated recovery for zero data loss SOC operations. The post Engineering for the Inevitable: Managing Downstream Failures in Security…

Read more →

EN, The Hacker News

Citizen Lab Finds Cellebrite Tool Used on Kenyan Activist’s Phone in Police Custody

2026-02-18 20:02

New research from the Citizen Lab has found signs that Kenyan authorities used a commercial forensic extraction tool manufactured by Israeli company Cellebrite to break into a prominent dissident’s phone, making it the latest case of abuse of the technology…

Read more →

EN, Security Latest

A Vast Trove of Exposed Social Security Numbers May Put Millions at Risk of Identity Theft

2026-02-18 19:02

A database left accessible to anyone online contained billions of records, including sensitive personal data that criminals appear to have not yet exploited. This article has been indexed from Security Latest Read the original article: A Vast Trove of Exposed…

Read more →

CySecurity News - Latest Information Security and Hacking Incidents, EN

Conduent Data Breach Expands to Tens of Millions of Americans

2026-02-18 19:02

  A massive data breach at Conduent, a leading government technology contractor, has escalated dramatically, now affecting tens of millions of Americans across multiple states. Initially detected in January 2025, the intrusion originated from an unauthorized access on October 21,…

Read more →

Blog, EN

Zero Trust Switching: Why Firewalls Alone Can’t Secure AI Workloads

2026-02-18 19:02

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Zero Trust Switching: Why Firewalls Alone Can’t Secure AI Workloads

Read more →

DZone Security Zone, EN

How to Build Permission-Aware Retrieval That Doesn’t Leak Across Teams

2026-02-18 19:02

LLM assistants or chatbots are very good at connecting the dots, which is exactly why they can be dangerous in multi-team organizations. A PM from team A asks, ‘Why did the churn rate spike last Wednesday?’ The assistant retrieves and…

Read more →

EN, Malwarebytes

Betterment data breach might be worse than we thought

2026-02-18 19:02

This breach now appears far more serious. The leaked data includes rich personal and financial details that phishers could use. This article has been indexed from Malwarebytes Read the original article: Betterment data breach might be worse than we thought

Read more →

EN, Security Archives - TechRepublic

Substack Breach May Have Leaked Nearly 700,000 User Details Online

2026-02-18 19:02

Substack says hackers accessed user emails, phone numbers, and internal metadata in October 2025, with a database of 697,313 records later posted online. The post Substack Breach May Have Leaked Nearly 700,000 User Details Online appeared first on TechRepublic. This…

Read more →

EN, The Register - Security

German train line back on track after DDoS yanks the brakes

2026-02-18 19:02

National rail bookings and timetables disrupted for nearly 24 hours If you wanted to book a train trip in Germany recently, you would have been out of luck. The country’s national rail company says that its services were disrupted for…

Read more →

CySecurity News - Latest Information Security and Hacking Incidents, EN

London Boroughs Struggle to Restore Services After November Cyber Attack

2026-02-18 19:02

A cyber intrusion identified on November 24, 2025 has disrupted essential local authority services in two central London boroughs, freezing parts of the property market and delaying administrative functions. The Royal Borough of Kensington and Chelsea and Westminster City Council…

Read more →

CySecurity News - Latest Information Security and Hacking Incidents, EN

ISPsystem VMs Hijacked for Silent Ransomware Distribution

2026-02-18 19:02

  The evolution of cybercrime has led to infrastructure becoming less of a matter of ownership and more of a convenience issue. As opposed to investing time and resources in the construction and maintenance of dedicated command-and-control servers, ransomware operators…

Read more →

EN, The Hacker News

Grandstream GXP1600 VoIP Phones Exposed to Unauthenticated Remote Code Execution

2026-02-18 19:02

Cybersecurity researchers have disclosed a critical security flaw in the Grandstream GXP1600 series of VoIP phones that could allow an attacker to seize control of susceptible devices. The vulnerability, tracked as CVE-2026-2329, carries a CVSS score of 9.3 out of…

Read more →

Cybersecurity Dive - Latest News, EN

Identity and supply chain need more attention, risk intelligence firm says

2026-02-18 19:02

Roughly a third of attacks now use stolen credentials, according to the company’s latest report. This article has been indexed from Cybersecurity Dive – Latest News Read the original article: Identity and supply chain need more attention, risk intelligence firm…

Read more →

hourly summary

IT Security News Hourly Summary 2026-02-18 18h : 11 posts

2026-02-18 19:02

11 posts were published in the last hour 16:36 : Cyber Risk Is a Board Responsibility and Training Is the Missing Link 16:36 : ClawHavoc Poisoned OpenClaw’s ClawHub with 1,184 Malicious Skills, Enabling Data Theft and Backdoor Access 16:36 :…

Read more →

EN, Industry Trends & Insights

Cyber Risk Is a Board Responsibility and Training Is the Missing Link

2026-02-18 18:02

Boards now view cybersecurity as a business and financial priority, yet many lack the training to govern cyber risk effectively. Here’s why board-level education matters more than ever.        This article has been indexed from Industry Trends & Insights Read…

Read more →

Cyber Security News, EN

ClawHavoc Poisoned OpenClaw’s ClawHub with 1,184 Malicious Skills, Enabling Data Theft and Backdoor Access

2026-02-18 18:02

A large-scale supply chain poisoning campaign that targeted OpenClaw’s official marketplace, ClawHub, distributing 1,184 malicious “Skills” designed to steal data and establish backdoor access on compromised systems. OpenClaw, a fast-growing open-source AI agent platform, enables users to install plugin-like Skills…

Read more →

Cyber Security News, EN

OpenClaw AI Framework v2026.2.17 Released with Anthropic Model Support and Security Fixes

2026-02-18 18:02

OpenClaw has released version 2026.2.17 with significant enhancements, including support for Anthropic’s Claude Sonnet 4.6 model. Expanded context windows, though the update arrives as the AI agent framework continues facing scrutiny over critical security vulnerabilities involving credential theft and remote…

Read more →

Cyber Security News, EN

New SysUpdate Variant Malware Discovered and Tool Developed to Decrypt Encrypted Linux C2 Traffic

2026-02-18 18:02

A new variant of the SysUpdate malware has emerged as a sophisticated threat targeting Linux systems with advanced command-and-control (C2) encryption capabilities. The malware was discovered during a Digital Forensics and Incident Response (DFIR) engagement when security teams detected the…

Read more →

EN, Security Boulevard

How synthetic data can help solve AI’s data crisis

2026-02-18 18:02

As AI demand outpaces the availability of high-quality training data, synthetic data offers a path forward. We unpack how synthetic datasets help teams overcome data scarcity to build production-ready AI. The post How synthetic data can help solve AI’s data…

Read more →

Page 16 of 4947
« 1 … 14 15 16 17 18 … 4,947 »

Pages

  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Telegram Channel

Recent Posts

  • University of Mississippi Medical Center Closes Clinics After Ransomware Attack February 21, 2026
  • IT Security News Hourly Summary 2026-02-21 00h : 7 posts February 21, 2026
  • IT Security News Daily Summary 2026-02-20 February 21, 2026
  • PayPal discloses extended data leak linked to Loan App glitch February 21, 2026
  • PayPal app code error leaked personal info and a ‘few’ unauthorized transactions February 21, 2026
  • How does NHI impact innovation in cloud-native security solutions February 21, 2026
  • How does Agentic AI enforce cloud compliance in real-time February 21, 2026
  • How assured is your data with NHIs in place February 21, 2026
  • Can Agentic AI improve scalability in secrets management February 21, 2026
  • PayPal Flaw Exposed Sensitive Data in Lending App for Six Months February 20, 2026
  • Apache Tomcat Vulnerability Circumvents Access Rules February 20, 2026
  • DHS Wants a Single Search Engine to Flag Faces and Fingerprints Across Agencies February 20, 2026
  • NDSS 2025 – NodeMedic-FINE: Automatic Detection And Exploit Synthesis For Node.js Vulnerabilities February 20, 2026
  • Lasso Security Adds Ability to Track AI Agent Behavior February 20, 2026
  • AI-augmented threat actor accesses FortiGate devices at scale February 20, 2026
  • AI coding assistant Cline compromised to create more OpenClaw chaos February 20, 2026
  • ‘Starkiller’ Phishing Service Proxies Real Login Pages, MFA February 20, 2026
  • Ukrainian man jailed for identity theft that helped North Koreans get jobs at US companies February 20, 2026
  • Check Point Software Earns Leader & Fast Mover Position in GigaOm Radar for Cloud Network Security February 20, 2026
  • TDL 016 | Speed, Risk, and Responsibility in the Age of AI | Rafael Ramirez February 20, 2026

Copyright © 2026 IT Security News. All Rights Reserved. The Magazine Basic Theme by bavotasan.com.

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}