IT Security News

Cybersecurity news and articles about information security, vulnerabilities, exploits, hacks, laws, spam, viruses, malware, breaches.

Main menu

Skip to content
  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Telegram Channel
EN, Latest stories for ZDNet in Security

Did your Google Maps Timeline disappear? Here’s the fix to get yours back

2025-03-24 18:03

Google has admitted a technical issue caused timeline data to vanish. But you might be able to get yours back. Here’s how. This article has been indexed from Latest stories for ZDNET in Security Read the original article: Did your…

Read more →

Cyber Security News, EN

Hackers Using Fake Semrush Ads to Steal Google Accounts Login Credentials

2025-03-24 17:03

A sophisticated phishing campaign targeting Google account credentials through fake Semrush advertisements has emerged, posing a significant threat to digital marketers and SEO professionals. Cybercriminals have deployed numerous malicious advertisements that appear legitimate in Google search results, leveraging Semrush’s growing…

Read more →

EN, securityweek

NIST Still Struggling to Clear Vulnerability Submissions Backlog in NVD

2025-03-24 17:03

The effects of the backlog is already being felt in vulnerability management circles where NVD data promises an enriched source of truth. The post NIST Still Struggling to Clear Vulnerability Submissions Backlog in NVD appeared first on SecurityWeek. This article…

Read more →

EN, Help Net Security

Protecting your personal information from data brokers

2025-03-24 17:03

How aware are you that your personal information could be bought and sold without your consent—and that there are companies whose entire business model revolves around this? So, these companies, called data brokers, collect everything they can about you –…

Read more →

EN, www.infosecurity-magazine.com

Ukraine Railway Systems Hit by Targeted Cyber-Attack

2025-03-24 17:03

Ukraine’s national railway company has suffered a “large-scale” cyber-attack, disrupting online services and operations This article has been indexed from www.infosecurity-magazine.com Read the original article: Ukraine Railway Systems Hit by Targeted Cyber-Attack

Read more →

AWS Security Blog, EN

Use AWS service reference information to automate policy management workflows

2025-03-24 17:03

Amazon Web Services (AWS) provides service reference information in JSON format to help you automate policy management workflows. With the service reference information, you can access available actions across AWS services from machine-readable files. The service reference information helps to…

Read more →

Cybersecurity Insiders, EN

North Korea establish Military Cyber Center to conduct espionage

2025-03-24 17:03

In recent years, intelligence agencies in Western countries have reached a troubling conclusion: North Korea, led by Kim Jong Un, has been orchestrating cyber-attacks to steal cryptocurrency in order to fund its nuclear weapons program. Now, an alarming new development…

Read more →

EN, Hackers Online Club

Authorization Bypass in Next.js Middleware Found

2025-03-24 17:03

A critical vulnerability, CVE-2025-29927, has been discovered in Next.js middleware, affecting versions starting from 11.1.4. The security researchers… The post Authorization Bypass in Next.js Middleware Found appeared first on Hackers Online Club. This article has been indexed from Hackers Online…

Read more →

EN, The Register - Security

AI agents swarm Microsoft Security Copilot

2025-03-24 17:03

Looking to sort through large volumes of security info? Redmond has your backend Microsoft’s Security Copilot is getting some degree of agency, allowing the underlying AI model to interact more broadly with the company’s security software to automate various tasks.……

Read more →

EN, Security News | TechCrunch

Cyberattack disrupts train ticket sales in Ukraine

2025-03-24 17:03

Ukrzaliznytsia, Ukraine’s state-owned railway operator, has been hit by a cyberattack that disrupted online ticket sales. This article has been indexed from Security News | TechCrunch Read the original article: Cyberattack disrupts train ticket sales in Ukraine

Read more →

EN, Heimdal Security Blog

Top 10+ Open-Source SOAR Tools to Enhance Your SecOps Experience

2025-03-24 17:03

SOAR tools automate security workflows, enhancing threat detection, response speed, and efficiency while reducing manual effort. In this article, we’re going to present the best open-source tools on the market. 10+ Best Open-Source SOAR Tools This list includes tools designed…

Read more →

EN, securityweek

Oracle Denies Cloud Breach After Hacker Offers to Sell Data

2025-03-24 17:03

Oracle has denied that Cloud systems have been breached after a hacker claimed to have stolen millions of records. The post Oracle Denies Cloud Breach After Hacker Offers to Sell Data  appeared first on SecurityWeek. This article has been indexed…

Read more →

Check Point Blog, EN

The Rise of VanHelsing RaaS: A New Player in the Ransomware Landscape

2025-03-24 16:03

VanHelsing RaaS is a burgeoning ransomware-as-a-service (RaaS) platform that launched on March 7, 2025. Participants, from seasoned hackers to beginners, can join with a $5,000 deposit. Affiliates retain 80% of ransom payments, while core operators take 20%. The only stipulation…

Read more →

EN, Security Affairs

Medusa ransomware uses malicious Windows driver ABYSSWORKER to disable security tools

2025-03-24 16:03

Medusa ransomware uses a malicious Windows driver ABYSSWORKER to disable security tools, making detection and mitigation more difficult. Elastic Security Labs tracked a financially driven MEDUSA ransomware campaign using a HEARTCRYPT-packed loader and a revoked certificate-signed driver, ABYSSWORKER, to disable…

Read more →

Cyber Security News, EN

New Linux Kernel Rust Module Unveiled to Detect Rootkits

2025-03-24 16:03

A groundbreaking security tool has emerged in the ongoing battle against sophisticated Linux malware. A new Rust-based kernel module designed specifically for detecting rootkits has been released, offering enhanced capabilities to identify these particularly elusive threats. The module represents a…

Read more →

Cyber Security News, EN

Hackers Could Drop Teams Malware via Browser’s Cache Smuggling

2025-03-24 16:03

A novel attack vector combining browser cache exploitation and DLL proxying has emerged as a significant threat to organizations using Microsoft Teams and OneDrive. Dubbed Browser Cache Smuggling, this technique allows attackers to bypass traditional security defenses by leveraging browsers’ caching…

Read more →

Cyber Security News, EN

Operation Red Card – 300+ Cyber Criminals Arrested Linking to Multiple Hacking Activities

2025-03-24 16:03

INTERPOL led a multi-national law enforcement operation dubbed “Operation Red Card,” which has resulted in the arrest of over 300 suspected cyber criminals.  Operation Red Card, conducted from November 2024 to February 2025, targeted cross-border criminal syndicates responsible for mobile…

Read more →

Cyber Security News, EN

Pocket Card Users Under Attack Via Sophisticated Phishing Campaign

2025-03-24 16:03

A highly targeted phishing campaign is currently exploiting Pocket Card users through elaborately crafted emails that appear to originate from the legitimate financial service provider. The campaign, active since early March 2025, has already compromised an estimated 3,000 accounts, resulting…

Read more →

EN, Security Boulevard

Keeping Secrets Out of Logs: Strategies That Work

2025-03-24 16:03

tl;dr: There’s no silver bullet for keeping secrets out of logs, but if we put several “lead bullets” in the right places, we have a good chance of success. The post Keeping Secrets Out of Logs: Strategies That Work appeared…

Read more →

CySecurity News - Latest Information Security and Hacking Incidents, EN

Why Unencrypted Files Pose a Serious Security Risk

2025-03-24 16:03

  It is becoming increasingly common for digital communication to involve sharing files, whether for professional or personal reasons. Some file exchanges are trivial, such as sending humorous images by email, while others contain highly sensitive information that needs to…

Read more →

CySecurity News - Latest Information Security and Hacking Incidents, EN

The Growing Threat of Infostealer Malware: What You Need to Know

2025-03-24 16:03

  Infostealer malware is becoming one of the most alarming cybersecurity threats, silently stealing sensitive data from individuals and organizations. This type of malware operates stealthily, often going undetected for long periods while extracting valuable information such as login credentials,…

Read more →

CySecurity News - Latest Information Security and Hacking Incidents, EN

Microsoft Warns of Malvertising Campaign Impacting Over 1 Million Devices Worldwide

2025-03-24 16:03

  Microsoft has revealed details of a large-scale malvertising campaign that is believed to have impacted over one million devices worldwide as part of an opportunistic attack aimed at stealing sensitive information.  The tech giant, which discovered the activity in…

Read more →

CySecurity News - Latest Information Security and Hacking Incidents, EN

Huge Spike in Social Media and Email Hacks – Simple Ways to Protect Yourself

2025-03-24 16:03

  There has been a worrying rise in the number of people losing control of their social media and email accounts this year. According to recent data from Action Fraud, the UK’s national cybercrime reporting center, over 35,000 cases were…

Read more →

EN, The Hacker News

⚡ THN Weekly Recap: GitHub Supply Chain Attack, AI Malware, BYOVD Tactics, and More

2025-03-24 16:03

A quiet tweak in a popular open-source tool opened the door to a supply chain breach—what started as a targeted attack quickly spiraled, exposing secrets across countless projects. That wasn’t the only stealth move. A new all-in-one malware is silently…

Read more →

Page 1817 of 4872
« 1 … 1,815 1,816 1,817 1,818 1,819 … 4,872 »

Pages

  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Telegram Channel

Recent Posts

  • Unsecured Database Exposes 149 Million Logins Linked to Infostealer Malware Operations February 7, 2026
  • ACF Plugin Flaw Exposes 50,000 WordPress Sites to Admin Takeover February 7, 2026
  • BridgePay Payment Gateway Hit by Ransomware, Causing Nationwide Outages February 7, 2026
  • IT Security News Hourly Summary 2026-02-07 15h : 3 posts February 7, 2026
  • Hackers Linked to State Actors Target Signal Messages of Military Officials and Journalists February 7, 2026
  • Organizations Urged to Replace Discontinued Edge Devices February 7, 2026
  • China-Linked DKnife Threat Underscores Risks to Network Edge Devices February 7, 2026
  • Apple Pay Users Targeted by Phishing Attack Aimed at Stealing Payment Details February 7, 2026
  • Study confirms experience beats youthful enthusiasm February 7, 2026
  • German Agencies Warn of Signal Phishing Targeting Politicians, Military, Journalists February 7, 2026
  • State-Backed Hackers Target Military Officials and Journalists on Signal in Latest Cyberattack February 7, 2026
  • Moltbook, the Social Network for AI Agents, Exposed Real Humans’ Data February 7, 2026
  • CISA pushes Federal agencies to retire end-of-support edge devices February 7, 2026
  • BeyondTrust Remote Access Products 0-Day Vulnerability Allows Remote Code Execution February 7, 2026
  • OpenClaw Partners with VirusTotal to Secure AI Agent Skill Marketplace February 7, 2026
  • OpenClaw v2026.2.6 Released With Support for Opus 4.6, GPT-5.3-Codex and Safety Scanner February 7, 2026
  • IT Security News Hourly Summary 2026-02-07 09h : 2 posts February 7, 2026
  • Cybercriminals Use Malicious Cybersquatting Attacks to Distribute Malware and Hijack Data February 7, 2026
  • nmapUnleashed Makes Nmap Scanning More Comfortable and Effective February 7, 2026
  • Hackers Exploit Free Firebase Accounts to Launch Phishing Campaigns February 7, 2026

Copyright © 2026 IT Security News. All Rights Reserved. The Magazine Basic Theme by bavotasan.com.

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}