IT Security News

Cybersecurity news and articles about information security, vulnerabilities, exploits, hacks, laws, spam, viruses, malware, breaches.

Main menu

Skip to content
  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Apps
    • Telegram Channel
Cyber Security News, EN

Hackers Leverage Evilginx to Undermine MFA Security Mimicking Legitimate SSO Sites

2025-12-02 23:12

Hackers are turning to Evilginx, a powerful adversary-in-the-middle tool, to get around multi-factor authentication and take over cloud accounts. The framework acts as a reverse proxy between the victim and real single sign-on pages, so the login screen looks and…

Read more →

Cyber Security News, EN

Ukraine Hackers Attacking Russian Aerospace Companies and Other Defence-Related Sectors

2025-12-02 23:12

Ukraine-linked hackers are stepping up cyberattacks against Russian aerospace and wider defence-related companies, using new custom malware to steal designs, schedules, and internal emails. The campaign targets both prime contractors and smaller suppliers, aiming to map production chains and expose…

Read more →

Cyber Security News, EN

Nisos Details Earlier Signs of Insider Detection via Authentication and Access Controls

2025-12-02 23:12

Insider threats remain one of the most challenging security problems that organizations face today. These threats typically do not show obvious warning signs at first. Instead, they reveal themselves through small, unusual activities that often blend into normal daily operations.…

Read more →

EN, eSecurity Planet

Rapidly Evolving Arkanix Stealer Hits Credentials and Wallets

2025-12-02 22:12

Arkanix Stealer is a fast-evolving infostealer spreading through Discord to harvest credentials, wallets, and system data. The post Rapidly Evolving Arkanix Stealer Hits Credentials and Wallets appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read…

Read more →

hourly summary

IT Security News Hourly Summary 2025-12-02 21h : 7 posts

2025-12-02 22:12

7 posts were published in the last hour 20:2 : 100,000 WordPress Sites Affected by Remote Code Execution Vulnerability in Advanced Custom Fields: Extended WordPress Plugin 19:32 : 2025-11-10: Ten days of scans and probes and web traffic hitting my…

Read more →

Blog - Wordfence, EN

100,000 WordPress Sites Affected by Remote Code Execution Vulnerability in Advanced Custom Fields: Extended WordPress Plugin

2025-12-02 22:12

On November 18th, 2025, we received a submission for an unauthenticated Remote Code Execution vulnerability in Advanced Custom Fields: Extended, a WordPress plugin with more than 100,000 active installations. This vulnerability can be leveraged to execute code remotely. The post…

Read more →

EN, Malware-Traffic-Analysis.net - Blog Entries

2025-11-10: Ten days of scans and probes and web traffic hitting my web server

2025-12-02 21:12

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Malware-Traffic-Analysis.net – Blog Entries Read the original article: 2025-11-10: Ten days of scans and probes and web…

Read more →

EN, Malware-Traffic-Analysis.net - Blog Entries

2025-11-23: Ten days of scans and probes and web traffic hitting my web server

2025-12-02 21:12

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Malware-Traffic-Analysis.net – Blog Entries Read the original article: 2025-11-23: Ten days of scans and probes and web…

Read more →

EN, Security Latest

Your Data Might Determine How Much You Pay for Eggs

2025-12-02 21:12

A newly enacted New York law requires retailers to say whether your data influences the price of basic goods like a dozen eggs or toilet paper, but not how. This article has been indexed from Security Latest Read the original…

Read more →

Cyber Security News, EN

Researchers Expose Lazarus Recruitment Pipeline Live on Camera Through Honeypot Operation

2025-12-02 21:12

A collaborative investigation by Mauro Eldritch of BCA LTD, ANYRUN, and NorthScan has provided unprecedented visibility into how North Korean threat actors from the Lazarus Group recruit and operate against Western companies. Researchers documented the complete attack cycle in real-time,…

Read more →

Cyber Security News, EN

Water Saci Hackers Leveraging AI Tools to Attack WhatsApp Web Users

2025-12-02 21:12

Cybercriminals targeting Brazilian users have aggressively escalated their tactics, launching a highly sophisticated campaign dubbed “Water Saci.” This new wave of attacks weaponizes WhatsApp Web, a platform implicitly trusted by millions, to deliver banking trojans and steal sensitive financial data.…

Read more →

Cyber Security News, EN

Salty2FA and Tycoon2FA Phishing Kits Attacking Enterprise Users to Steal Login Credentials

2025-12-02 21:12

A new type of phishing attack that combines two different phishing kits: Salty2FA and Tycoon2FA. This marks a significant change in the Phishing-as-a-Service (PhaaS) landscape. While phishing kits typically maintain unique signatures in their code and delivery mechanisms, recent campaigns…

Read more →

EN, The Register - Security

Two Android 0-day bugs disclosed and fixed, plus 105 more to patch

2025-12-02 21:12

Christmas comes early for attackers this year Two high-severity Android bugs were exploited as zero-days before Google issued a fix, according to its December Android security bulletin. … This article has been indexed from The Register – Security Read the original…

Read more →

EN, Security Boulevard

Undetected Firefox WebAssembly Flaw Put 180 Million Users at Risk

2025-12-02 21:12

Cybersecurity startup Aisle discovered a subtle but dangerous coding error in a Firefox WebAssembly implementation sat undetected for six months despite being shipped with a regression testing capability created by Mozilla to find such a problem. The post Undetected Firefox…

Read more →

EN, The Hacker News

India Orders Messaging Apps to Work Only With Active SIM Cards to Prevent Fraud and Misuse

2025-12-02 21:12

India’s Department of Telecommunications (DoT) has issued directions to app-based communication service providers to ensure that the platforms cannot be used without an active SIM card linked to the user’s mobile number. To that end, messaging apps like WhatsApp, Telegram,…

Read more →

EN, Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More

Everest Ransomware Claims ASUS Breach and 1TB Data Theft

2025-12-02 20:12

Everest ransomware group claims it breached ASUS, stealing over 1TB of data including camera source code. ASUS has been given 21 hours to respond via Qtox. This article has been indexed from Hackread – Cybersecurity News, Data Breaches, Tech, AI,…

Read more →

EN, Microsoft Security Blog

How to build forward-thinking cybersecurity teams for tomorrow

2025-12-02 20:12

To secure the future, we must future-proof our cybersecurity talent and develop teams that are agile, innovative, and perpetually learning. The post How to build forward-thinking cybersecurity teams for tomorrow appeared first on Microsoft Security Blog. This article has been…

Read more →

EN, Malwarebytes

“Sleeper” browser extensions woke up as spyware on 4 million devices

2025-12-02 20:12

After seven years of acting like normal add-ons, five popular Chrome and Edge extensions with millions of installs suddenly turned malicious. This article has been indexed from Malwarebytes Read the original article: “Sleeper” browser extensions woke up as spyware on…

Read more →

EN, eSecurity Planet

Stealth RCE in Codex Exposes Developer Workflows

2025-12-02 20:12

A Codex CLI flaw lets attackers turn simple repo files into hidden execution triggers. The post Stealth RCE in Codex Exposes Developer Workflows appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read the original article:…

Read more →

EN, The Register - Security

University of Pennsylvania joins list of victims from Clop’s Oracle EBS raid

2025-12-02 20:12

Ivy League school warns more than 1,400 people after attackers siphon data via zero-day The University of Pennsylvania has become the latest victim of Clop’s smash-and-grab spree against Oracle’s E-Business Suite (EBS) customers, with the Ivy League school now warning…

Read more →

EN, Security Boulevard

How Financial Institutions Can Future-Proof Their Security Against a New Breed of Cyber Attackers

2025-12-02 20:12

As we look at the remainder of 2025 and beyond, the pace and sophistication of cyber attacks targeting the financial sector show no signs of slowing. In fact, based on research from Check Point’s Q2 Ransomware Report, the financial cybersecurity…

Read more →

EN, Security Boulevard

Closing the Document Security Gap: Why Document Workflows Must Be Part of Cybersecurity

2025-12-02 20:12

Organizations are spending more than ever on cybersecurity, layering defenses around networks, endpoints, and applications. Yet a company’s documents, one of the most fundamental business assets, remains an overlooked weak spot. Documents flow across every department, cross company boundaries, and…

Read more →

EN, Security Boulevard

ServiceNow to Acquire Identity Security Firm Veza

2025-12-02 20:12

ServiceNow Inc. announced on Tuesday plans to acquire Veza in a move aimed at fortifying security for identity and access management. The acquisition will integrate Veza’s technology into ServiceNow’s Security and Risk portfolios, helping organizations monitor and control access to…

Read more →

EN, Security Boulevard

Security’s Next Control Plane: The Rise of Pipeline-First Architecture

2025-12-02 20:12

For years, security operations have relied on monolithic architectures built around centralized collectors, rigid forwarding chains, and a single “system of record” where all data must land before action can be taken. On paper, that design promised simplicity and control.…

Read more →

Page 19 of 4585
« 1 … 17 18 19 20 21 … 4,585 »

Pages

  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Apps
    • Telegram Channel

Recent Posts

  • IT Security News Hourly Summary 2025-12-05 18h : 11 posts December 5, 2025
  • One-Person Production: Wondershare Filmora V15 Empowers Solo Creators With AI December 5, 2025
  • The Largest Telecommunications Attack in U.S. History: What Really Happened—And How We Fight Back December 5, 2025
  • China-nexus actor targets multiple US entities with Brickstorm malware December 5, 2025
  • Project View: A New Era of Prioritized and Actionable Cloud Security December 5, 2025
  • From vision to reality: A 5-step playbook for unified automation and AI December 5, 2025
  • AI ambitions meet automation reality: The case for a unified automation platform December 5, 2025
  • CIS publishes hardening guidance for Red Hat OpenShift Virtualization December 5, 2025
  • Red Hat OpenShift sandboxed containers 1.11 and Red Hat build of Trustee 1.0 accelerate confidential computing across the hybrid cloud December 5, 2025
  • Solving tool overload, one automation step at a time December 5, 2025
  • Cultural Lag Leaves Security as the Weakest Link December 5, 2025
  • Intellexa Spyware Activity Appears to Slow in 2025, but New Research Suggests Broader Global Footprint December 5, 2025
  • CrowdStrike Identifies New China-Nexus Espionage Actor December 5, 2025
  • AWS Execution Roles Enable Subtle Privilege Escalation in SageMaker and EC2 December 5, 2025
  • In Other News: X Fined €120 Million, Array Flaw Exploited, New Iranian Backdoor December 5, 2025
  • React.js Hit by Maximum-Severity ‘React2Shell’ Vulnerability December 5, 2025
  • New Variant of ClayRat Android Spyware Seize Full Device Control December 5, 2025
  • Sprocket Security Earns Repeat Recognition in G2’s Winter 2025 Relationship Index for Penetration Testing December 5, 2025
  • Apache Tika Core Flaw Allows Attackers to Exploit Systems with Malicious PDF Uploads December 5, 2025
  • MuddyWater Hackers Use UDPGangster Backdoor to Bypass Network Defenses on Windows December 5, 2025

Copyright © 2025 IT Security News. All Rights Reserved. The Magazine Basic Theme by bavotasan.com.

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}