IT Security News

Cybersecurity news and articles about information security, vulnerabilities, exploits, hacks, laws, spam, viruses, malware, breaches.

Main menu

Skip to content
  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Apps
    • Telegram Channel
Cyber Security News, EN

Nike Investigating Data Breach Following WorldLeaks Ransomware Group Claim

2026-01-28 14:01

Sportswear giant Nike is actively investigating a potential cybersecurity incident after WorldLeaks, a financially motivated ransomware group, claimed responsibility for a significant data breach affecting the company. The group announced the breach on its darknet leak site on January 22,…

Read more →

Cyber Security News, EN

Fortinet Confirms Critical FortiCloud SSO Vulnerability(CVE-2026-24858) Actively Exploited in the Wild

2026-01-28 14:01

Fortinet has confirmed a critical authentication bypass vulnerability in its FortiCloud SSO feature, actively exploited in the wild under CVE-2026-24858. According to an advisory published on January 27, 2026, the flaw affects FortiOS, FortiManager, FortiAnalyzer, and FortiProxy. With a CVSSv3…

Read more →

Cyber Security News, EN

Chrome Security Update Patches Background Fetch API Vulnerability

2026-01-28 14:01

Chrome versions 144.0.7559.109 and 144.0.7559.110 have been released to the stable channel, addressing a critical security vulnerability in the Background Fetch API. The update is rolling out across Windows, Mac, and Linux systems over the coming days and weeks, making…

Read more →

EN, Hackread – Cybersecurity News, Data Breaches, AI, and More

Phantom Malware in Android Game Mods Hijacks Devices for Ad Fraud

2026-01-28 13:01

Another day, another Android malware strain. This time, Phantom malware (aka Android.Phantom) is targeting users who install third-party gaming apps from unofficial sources. This article has been indexed from Hackread – Cybersecurity News, Data Breaches, AI, and More Read the…

Read more →

EN, Hackread – Cybersecurity News, Data Breaches, AI, and More

Best IT Managed Services for Large Enterprises

2026-01-28 13:01

Learn what defines top-tier enterprise managed IT services, why they matter, and how Mindcore Technologies meets large-scale business demands. This article has been indexed from Hackread – Cybersecurity News, Data Breaches, AI, and More Read the original article: Best IT…

Read more →

EN, The Hacker News

Fake Python Spellchecker Packages on PyPI Delivered Hidden Remote Access Trojan

2026-01-28 13:01

Cybersecurity researchers have discovered two malicious packages in the Python Package Index (PyPI) repository that masquerade as spellcheckers but contain functionality to deliver a remote access trojan (RAT). The packages, named spellcheckerpy and spellcheckpy, are no longer available for download,…

Read more →

EN, The Hacker News

Google Warns of Active Exploitation of WinRAR Vulnerability CVE-2025-8088

2026-01-28 13:01

Google on Tuesday revealed that multiple threat actors, including nation-state adversaries and financially motivated groups, are exploiting a now-patched critical security flaw in RARLAB WinRAR to establish initial access and deploy a diverse array of payloads. “Discovered and patched in…

Read more →

EN, The Hacker News

Password Reuse in Disguise: An Often-Missed Risky Workaround

2026-01-28 13:01

When security teams discuss credential-related risk, the focus typically falls on threats such as phishing, malware, or ransomware. These attack methods continue to evolve and rightly command attention. However, one of the most persistent and underestimated risks to organizational security…

Read more →

EN, www.infosecurity-magazine.com

Chinese Money Launderers Drive Global Ecosystem Worth $82bn

2026-01-28 13:01

Chainalysis claims Chinese money launderers now account for 20% of global activity This article has been indexed from www.infosecurity-magazine.com Read the original article: Chinese Money Launderers Drive Global Ecosystem Worth $82bn

Read more →

EN, www.infosecurity-magazine.com

Researchers Uncover 454,000+ Malicious Open Source Packages

2026-01-28 13:01

Sonatype warns that open source threats became industrialized with a surge in malicious packages in 2025 This article has been indexed from www.infosecurity-magazine.com Read the original article: Researchers Uncover 454,000+ Malicious Open Source Packages

Read more →

hourly summary

IT Security News Hourly Summary 2026-01-28 12h : 7 posts

2026-01-28 13:01

7 posts were published in the last hour 10:36 : Anthropic Raising $20bn At $350bn Valuation 10:36 : WhatsApp Boosts Account Security for At-Risk Individuals 10:36 : French government abandons Zoom and Microsoft Teams over security concerns 10:36 : n8n…

Read more →

EN, Silicon UK

Anthropic Raising $20bn At $350bn Valuation

2026-01-28 12:01

AI start-up Anthropic reportedly targeting $20bn for latest funding round, nearly double initial target, on strong investor demand This article has been indexed from Silicon UK Read the original article: Anthropic Raising $20bn At $350bn Valuation

Read more →

EN, securityweek

WhatsApp Boosts Account Security for At-Risk Individuals

2026-01-28 12:01

New Strict Account Settings allow users to block attachments and media and silence calls from unknown people. The post WhatsApp Boosts Account Security for At-Risk Individuals appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original…

Read more →

EN, Help Net Security

French government abandons Zoom and Microsoft Teams over security concerns

2026-01-28 12:01

France intends to phase out non-European videoconferencing platforms such as Zoom and Microsoft Teams from its public administration, opting instead for a nationally developed solution due to security considerations. Ending the use of paid software licenses is expected to generate…

Read more →

EN, Help Net Security

n8n adds Chat Hub to centralize AI access inside automation workflows

2026-01-28 12:01

Teams using automation platforms are starting to treat conversational AI as another operational interface. That change is reflected in a new feature from n8n, which has introduced a built-in Chat Hub designed to let users interact with AI models and…

Read more →

EN, Silicon UK

Samsung TriFold Comes To US Market, At A Cost

2026-01-28 12:01

Samsung Galaxy Z TriFold double-hinged smartphone/tablet is a pioneer in US market in more ways than one, with price tag of nearly $3,000 This article has been indexed from Silicon UK Read the original article: Samsung TriFold Comes To US…

Read more →

EN, Security Archives - TechRepublic

Android Phones Get AI-Powered Anti-Theft Features

2026-01-28 12:01

Enhanced lockouts and stronger remote locking aim to make stolen devices far harder—and less profitable—for criminals. The post Android Phones Get AI-Powered Anti-Theft Features appeared first on TechRepublic. This article has been indexed from Security Archives – TechRepublic Read the…

Read more →

EN, Help Net Security

McAfee upgrades Scam Detector to spot QR code scams and suspicious messages

2026-01-28 12:01

McAfee announced upgrades to Scam Detector that improve protection across common scam channels. The enhanced tool helps users check QR code safety and identify suspicious direct messages across apps. In 2025, according to McAfee’s 2026 State of the Scamiverse report,…

Read more →

EN, Silicon UK

UK To Spend £36m For AI Supercomputer Upgrade

2026-01-28 11:01

AIRR supercomputing centre to see Dawn system upgraded with AMD AI chips, new high-performance system, under UK’s AI strategy This article has been indexed from Silicon UK Read the original article: UK To Spend £36m For AI Supercomputer Upgrade

Read more →

EN, Security Affairs

PackageGate bugs let attackers bypass protections in NPM, PNPM, VLT, and Bun

2026-01-28 11:01

Koi researchers found “PackageGate” flaws in NPM, PNPM, VLT, and Bun that let attackers perform supply chain attacks and run malicious code. Security firm Koi uncovered a set of vulnerabilities collectively tracked as “PackageGate” affecting major JavaScript package managers like…

Read more →

Cyber Security News, EN

Fake CAPTCHA Attack Leverages Microsoft Application Virtualization (App-V) to Deploy Malware

2026-01-28 11:01

A newly discovered campaign demonstrates a sophisticated approach to delivering information-stealing malware through a combination of social engineering and legitimate Windows components. The attack begins with a deceptive CAPTCHA prompt that tricks users into executing commands manually through the Windows…

Read more →

Cyber Security News, EN

Chinese National Jailed to 46 Months for Laundering Millions of Dollars Stolen from American Investors

2026-01-28 11:01

A Chinese national named Jingliang Su has been sentenced to 46 months in prison for his involvement in a major cryptocurrency fraud scheme targeting American investors. On January 27, 2026, federal courts ordered Su to serve his sentence and pay…

Read more →

Cyber Security News, EN

WhatsApp Denies Lawsuit Claim and Confirms Messages are Device-encrypted and Private

2026-01-28 11:01

WhatsApp has strongly denied a new class-action lawsuit accusing Meta of secretly accessing users’ end-to-end encrypted messages, labeling the claims as false and baseless. The messaging giant reiterated that messages remain private through device-based encryption via the open-source Signal protocol.…

Read more →

EN, securityweek

APTs, Cybercriminals Widely Exploiting WinRAR Vulnerability

2026-01-28 11:01

Russian and Chinese state-sponsored threat actors have been exploiting CVE-2025-8088 since July 2025. The post APTs, Cybercriminals Widely Exploiting WinRAR Vulnerability appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article: APTs, Cybercriminals Widely Exploiting…

Read more →

Page 19 of 4836
« 1 … 17 18 19 20 21 … 4,836 »

Pages

  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Apps
    • Telegram Channel

Recent Posts

  • IT Security News Hourly Summary 2026-01-31 03h : 3 posts January 31, 2026
  • DynoWiper update: Technical analysis and attribution January 31, 2026
  • This month in security with Tony Anscombe – January 2026 edition January 31, 2026
  • Friday Squid Blogging: New Squid Species Discovered January 31, 2026
  • How is Agentic AI changing healthcare security January 31, 2026
  • What future trends will define Agentic AI governance January 31, 2026
  • Can Agentic AI ensure full IAM compliance January 31, 2026
  • How secure are secrets vaults in cloud environments January 31, 2026
  • Guidance from the Frontlines: Proactive Defense Against ShinyHunters-Branded Data Theft Targeting SaaS January 31, 2026
  • Vishing for Access: Tracking the Expansion of ShinyHunters-Branded SaaS Data Theft January 31, 2026
  • Privileged File System Vulnerability Present in a SCADA System January 31, 2026
  • News brief: Patch critical and high-severity vulnerabilities now January 31, 2026
  • IT Security News Hourly Summary 2026-01-31 00h : 4 posts January 31, 2026
  • IT Security News Daily Summary 2026-01-30 January 31, 2026
  • Informant told FBI that Jeffrey Epstein had a ‘personal hacker’ January 31, 2026
  • January blues return as Ivanti coughs up exploited EPMM zero-days January 31, 2026
  • NDSS 2025 – Silence False Alarms January 31, 2026
  • DevSecOps Aware in Healthcare: SBOM-Driven Supply-Chain Assurance with Policy-Based Cost Guardrails and Continuous Security Validation January 30, 2026
  • More AI security noise – chatbots going rogue January 30, 2026
  • Cybersecurity 2026: AI, CISA, manufacturing sector all in the hot seat January 30, 2026

Copyright © 2026 IT Security News. All Rights Reserved. The Magazine Basic Theme by bavotasan.com.

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}