IT Security News

Cybersecurity news and articles about information security, vulnerabilities, exploits, hacks, laws, spam, viruses, malware, breaches.

Main menu

Skip to content
  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Telegram Channel
EN, GBHackers Security | #1 Globally Trusted Cyber Security News Platform

Okta Under Attack as Hackers Skip Phishing for Identity Systems

2026-04-14 09:04

Hackers are shifting away from email phishing and are directly targeting Okta and other identity providers using voice‑based social engineering, or “Okta vishing.” This trend turns what used to be a single account compromise into an immediate, organization‑wide cloud data…

Read more →

hourly summary

IT Security News Hourly Summary 2026-04-14 09h : 7 posts

2026-04-14 09:04

7 posts were published in the last hour 6:9 : CISA Warns Fortinet SQL Injection Flaw Is Being Actively Exploited 6:9 : APT41 Targets Linux Cloud Servers With New Winnti Backdoor 6:9 : Synology SSL VPN Client Vulnerability Enabled Remote…

Read more →

EN, GBHackers Security | #1 Globally Trusted Cyber Security News Platform

CISA Warns Fortinet SQL Injection Flaw Is Being Actively Exploited

2026-04-14 08:04

The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent warning regarding a critical security flaw in Fortinet software. On April 13, 2026, CISA added CVE-2026-21643 to its Known Exploited Vulnerabilities (KEV) catalog. This action confirms that threat actors…

Read more →

EN, GBHackers Security | #1 Globally Trusted Cyber Security News Platform

APT41 Targets Linux Cloud Servers With New Winnti Backdoor

2026-04-14 08:04

A previously undocumented Linux backdoor attributed to China-linked threat group APT41 (Winnti) has been uncovered, targeting cloud workloads across AWS, GCP, Azure, and Alibaba Cloud. The ELF-based implant, currently showing zero detections on VirusTotal, transforms Linux servers into stealthy credential theft nodes using a…

Read more →

EN, GBHackers Security | #1 Globally Trusted Cyber Security News Platform

Synology SSL VPN Client Vulnerability Enabled Remote Access to Sensitive Files

2026-04-14 08:04

Synology has recently released a crucial security update to fix two notable vulnerabilities in its SSL VPN Client utility. Tracked under the security advisory Synology-SA-26:05, these flaws could allow remote attackers to access sensitive system files and intercept secure network…

Read more →

Cyber Security News, EN

Hackers Use Fake Proxifier Installer on GitHub to Spread ClipBanker Crypto-Stealing Malware

2026-04-14 08:04

A dangerous malware campaign has been silently targeting cryptocurrency users by hiding inside a fake version of Proxifier, a popular proxy software tool. Threat actors set up a GitHub repository designed to look like a legitimate Proxifier download, but the…

Read more →

EN, Help Net Security

Agentic AI memory attacks spread across sessions and users, and most organizations aren’t ready

2026-04-14 08:04

In this Help Net Security interview, Idan Habler, AI Security Researcher at Cisco, breaks down a threat most security teams haven’t named yet: agentic memory as an attack surface. Habler walks through MemoryTrap, a disclosed and remediated method to compromise…

Read more →

EN, The Hacker News

CISA Adds 6 Known Exploited Flaws in Fortinet, Microsoft, and Adobe Software

2026-04-14 08:04

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added half a dozen security flaws to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The list of vulnerabilities is as follows – CVE-2026-21643 (CVSS score: 9.1) –  An SQL…

Read more →

EN, The Hacker News

ShowDoc RCE Flaw CVE-2025-0520 Actively Exploited on Unpatched Servers

2026-04-14 08:04

A critical security vulnerability impacting ShowDoc, a document management and collaboration service popular in China, has come under active exploitation in the wild. The vulnerability in question is CVE-2025-0520 (aka CNVD-2020-26585), which carries a CVSS score of 9.4 out of 10.0. It relates to a…

Read more →

EN, Security Boulevard

Enterprise Security for Your Brand’s YouTube Channel

2026-04-14 07:04

Learn how to secure your brand’s YouTube channel with enterprise-level security, protecting content, access, and your digital presence. The post Enterprise Security for Your Brand’s YouTube Channel appeared first on Security Boulevard. This article has been indexed from Security Boulevard…

Read more →

EN, Help Net Security

29 million leaked secrets in 2025: Why AI agents credentials are out of control

2026-04-14 07:04

AI agents need credentials to work. They authenticate with LLM platforms, connect to databases, call SaaS APIs, access cloud resources, and orchestrate across dozens of external services. Every integration point requires an identity. Most organizations are handling this badly, and…

Read more →

EN, Help Net Security

Review: The Psychology of Information Security

2026-04-14 07:04

Security controls fail when they are designed without regard for the people who must use them. That is the central argument of Leron Zinatullin’s second edition, and it is an argument he builds methodically across 17 chapters that draw from…

Read more →

EN, GBHackers Security | #1 Globally Trusted Cyber Security News Platform

Fake Proxifier GitHub Installer Spreads ClipBanker Crypto Malware

2026-04-14 07:04

Hackers are abusing a fake Proxifier installer hosted on GitHub to deliver a multi‑stage ClipBanker malware that silently hijacks cryptocurrency transactions from infected systems. The campaign combines search‑engine poisoning, trojanized installers, and fileless techniques to stay under the radar while…

Read more →

EN, GBHackers Security | #1 Globally Trusted Cyber Security News Platform

Rockstar’s GTA Game Hacked, 78.6 Million Records Published Online

2026-04-14 07:04

Rockstar Games has suffered a significant data breach after the infamous threat group ShinyHunters leaked over 78.6 million internal records on April 14, 2026. The incident did not involve a direct attack on Rockstar’s primary network infrastructure. Instead, the hackers…

Read more →

CySecurity News - Latest Information Security and Hacking Incidents, EN

FBI Warns Smartphone Users About Risks Linked to Foreign Apps, Especially Chinese Platforms

2026-04-14 07:04

  The Federal Bureau of Investigation has issued a fresh alert cautioning users about potential security and privacy threats posed by mobile applications developed outside the United States, particularly those linked to China. The advisory emphasizes that while the concern…

Read more →

EN, Security Boulevard

NSFOCUS Threat Intelligence Interviewed in The Top Trends Shaping Threat Intelligence in Asia Pacific Report by International Authority

2026-04-14 06:04

Forrester, an international authoritative consulting firm, released “The Top Trends Shaping Threat Intelligence in Asia Pacific”. With its deep technical accumulation, product system and mature solutions in the field of threat intelligence, NSFOCUS was interviewed for the report. As enterprises…

Read more →

EN, Help Net Security

Cybersecurity jobs available right now: April 14, 2026

2026-04-14 06:04

Cyber Security Engineer/Application Security Specialist Tecnots | India | On-site – View job details As a Cyber Security Engineer/Application Security Specialist, you will integrate security into the SDLC, perform application security reviews, and support secure APIs, authentication, and data protection.…

Read more →

EN, Help Net Security

Zero trust at year two: What nobody planned for

2026-04-14 06:04

In this Help Net Security video, Jim Alkove, CEO of Oleria, walks through where zero trust programs typically stand one to two years in. Most organizations have made gains in endpoint security and network segmentation, but identity remains the stubborn…

Read more →

EN, GBHackers Security | #1 Globally Trusted Cyber Security News Platform

Top 10 Best Single Sign-On (SSO) Vendors For Enterprises in 2026

2026-04-14 06:04

In the fast-evolving digital landscape of 2026, enterprises grapple with an ever-growing number of applications and services. Employees, partners, and customers interact with a multitude of platforms daily, often leading to “password fatigue” a phenomenon where users juggle countless credentials,…

Read more →

hourly summary

IT Security News Hourly Summary 2026-04-14 06h : 1 posts

2026-04-14 06:04

1 posts were published in the last hour 3:34 : Rockstar’s GTA Game Hacked – Attackers published 78.6 Million Records Online

Read more →

Cyber Security News, EN

Rockstar’s GTA Game Hacked – Attackers published 78.6 Million Records Online

2026-04-14 05:04

Rockstar Games has confirmed a data breach after the notorious hacking group ShinyHunters exploited a third-party integration to access the company’s internal Snowflake data warehouse, ultimately leaking over 78.6 million records on April 14, 2026. The breach did not stem…

Read more →

EN, SANS Internet Storm Center, InfoCON: green

ISC Stormcast For Tuesday, April 14th, 2026 https://isc.sans.edu/podcastdetail/9890, (Tue, Apr 14th)

2026-04-14 04:04

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from SANS Internet Storm Center, InfoCON: green Read the original article: ISC Stormcast For Tuesday, April 14th, 2026…

Read more →

EN, Security Boulevard

Post-Quantum Decentralized Policy Enforcement for Large Language Models

2026-04-14 04:04

Learn how to implement post-quantum decentralized policy enforcement for Large Language Models and secure MCP infrastructure against future threats. The post Post-Quantum Decentralized Policy Enforcement for Large Language Models appeared first on Security Boulevard. This article has been indexed from…

Read more →

EN, The Register - Security

Zombie Microsoft bugs rise from the dead, pave way for crims and ransomware scum

2026-04-14 00:04

One was patched almost 14 years ago Crooks are exploiting four Microsoft vulnerabilities – one patched 14 years ago and another tied to ransomware activity – according to America’s lead cyber-defense agency, which on Monday gave federal agencies two weeks…

Read more →

Page 16 of 5253
« 1 … 14 15 16 17 18 … 5,253 »

Pages

  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Telegram Channel

Recent Posts

  • Command integrity breaks in the LLM routing layer April 16, 2026
  • Nginx-UI Flaw Actively Exploited to Enable Full Server Takeover April 16, 2026
  • Russian Hosting Tied to 1,250+ C2 Servers Across 165 Providers April 16, 2026
  • Hackers Abuse Google Discover With AI-Generated Content to Push Malicious Notifications April 16, 2026
  • Web Supply Chain Risk in ANZ: Why the Browser is the New Front Line April 16, 2026
  • What the EU AI Act requires for AI agent logging April 16, 2026
  • Why Using a Burner Email Can Strengthen Your Online Privacy April 16, 2026
  • Product showcase: Ente Auth encrypts, backs up, and syncs 2FA April 16, 2026
  • Critical Chrome Flaws Allow Arbitrary Code Execution – Patch Immediately April 16, 2026
  • AI Content Hijacks Google Discover to Deliver Malicious Alerts April 16, 2026
  • Splunk Enterprise and Cloud Platform Exposed to Dangerous RCE Vulnerability April 16, 2026
  • Wi-Fi roaming security practices for access network providers and identity providers April 16, 2026
  • IT Security News Hourly Summary 2026-04-16 06h : 1 posts April 16, 2026
  • European AI spending set to hit $290 billion by 2029 April 16, 2026
  • ISC Stormcast For Thursday, April 16th, 2026 https://isc.sans.edu/podcastdetail/9894, (Thu, Apr 16th) April 16, 2026
  • McGraw Hill – 13,500,136 breached accounts April 16, 2026
  • Lattice-based Cryptographic Integration for MCP Host-Client Communication April 16, 2026
  • IT Security News Hourly Summary 2026-04-16 03h : 2 posts April 16, 2026
  • Google Chrome lacks protection against one of the most basic and common ways to track users online April 16, 2026
  • [Guest Diary] Compromised DVRs and Finding Them in the Wild, (Thu, Apr 16th) April 16, 2026

Copyright © 2026 IT Security News. All Rights Reserved. The Magazine Basic Theme by bavotasan.com.

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}