IT Security News

Cybersecurity news and articles about information security, vulnerabilities, exploits, hacks, laws, spam, viruses, malware, breaches.

Main menu

Skip to content
  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Telegram Channel
Cyber Security News, EN

87,000+ MongoDB Instances Vulnerable to MongoBleed Flaw Exposed Online – PoC Exploit Released

2025-12-28 06:12

A high-severity vulnerability in MongoDB Server that allows unauthenticated remote attackers to siphon sensitive data from database memory. Dubbed “MongoBleed” due to its automated similarities to the infamous Heartbleed bug, the flaw tracks as CVE-2025-14847 and carries a CVSS score…

Read more →

EN, Have I Been Pwned latest breaches

WIRED – 2,364,431 breached accounts

2025-12-28 05:12

In December 2025, 2.3M records of WIRED magazine users allegedly obtained from parent company Condé Nast were published online. The most recent data dated back to the previous September and exposed email addresses and display names, as well as, for…

Read more →

hourly summary

IT Security News Hourly Summary 2025-12-28 03h : 1 posts

2025-12-28 04:12

1 posts were published in the last hour 2:2 : ISC Stormcast For Sunday, December 28th, 2025 https://isc.sans.edu/podcastdetail/9750, (Sun, Dec 28th)

Read more →

EN, SANS Internet Storm Center, InfoCON: green

ISC Stormcast For Sunday, December 28th, 2025 https://isc.sans.edu/podcastdetail/9750, (Sun, Dec 28th)

2025-12-28 04:12

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from SANS Internet Storm Center, InfoCON: green Read the original article: ISC Stormcast For Sunday, December 28th, 2025…

Read more →

EN, Security Boulevard

How impenetrable are secrets vaulting solutions

2025-12-28 01:12

How Are Non-Human Identities Changing the Cybersecurity Landscape? What if the biggest vulnerability in your cybersecurity strategy was not a human error but a machine identity left unchecked? Secrets vaulting solutions are increasingly seen as critical components of impenetrable security…

Read more →

EN, Security Boulevard

Are current PAM solutions capable of handling NHIs

2025-12-28 01:12

How Secure Are Your Non-Human Identities? Have you ever wondered how well your organization handles Non-Human Identities (NHIs) within your cybersecurity framework? With technology progresses, so does the complexity of managing machine identities and their associated secrets. These NHIs are…

Read more →

EN, Security Boulevard

What does a free to implement AI compliance strategy look like

2025-12-28 01:12

How Can Organizations Implement a Free AI Compliance Strategy Effectively? Are you fully prepared to leverage AI while remaining compliant with regulations? Where enterprises increasingly rely on artificial intelligence, maintaining compliance with regulatory standards is not just essential but also…

Read more →

hourly summary

IT Security News Hourly Summary 2025-12-28 00h : 1 posts

2025-12-28 01:12

1 posts were published in the last hour 22:55 : IT Security News Daily Summary 2025-12-27

Read more →

daily summary

IT Security News Daily Summary 2025-12-27

2025-12-28 00:12

23 posts were published in the last hour 20:5 : IT Security News Hourly Summary 2025-12-27 21h : 1 posts 19:31 : Meet the team that investigates when journalists and activists get hacked with government spyware 19:2 : LangChain core…

Read more →

hourly summary

IT Security News Hourly Summary 2025-12-27 21h : 1 posts

2025-12-27 22:12

1 posts were published in the last hour 19:31 : Meet the team that investigates when journalists and activists get hacked with government spyware

Read more →

EN, Security News | TechCrunch

Meet the team that investigates when journalists and activists get hacked with government spyware

2025-12-27 21:12

For years, Access Now’s Digital Security Helpline has been aiding journalists and dissidents who have been targeted with government spyware. This is how they operate. This article has been indexed from Security News | TechCrunch Read the original article: Meet…

Read more →

EN, Security Affairs

LangChain core vulnerability allows prompt injection and data exposure

2025-12-27 21:12

A critical flaw in LangChain Core could allow attackers to steal sensitive secrets and manipulate LLM responses via prompt injection. LangChain Core (langchain-core) is a key Python package in the LangChain ecosystem that provides core interfaces and model-agnostic tools for…

Read more →

EN, Hackread – Cybersecurity News, Data Breaches, AI, and More

Hacker Leaks 2.3M Wired.com Records, Claims 40M-User Condé Nast Breach

2025-12-27 20:12

A hacker using the alias “Lovely” has leaked what they claim is the personal data of over 2.3… This article has been indexed from Hackread – Cybersecurity News, Data Breaches, AI, and More Read the original article: Hacker Leaks 2.3M…

Read more →

EN, GBHackers Security | #1 Globally Trusted Cyber Security News Platform

Hackers Compromise Trust Wallet Chrome Extension, Users Claim Millions Stolen

2025-12-27 20:12

Trust Wallet users suffered devastating losses exceeding $7 million after cybercriminals compromised the Chrome browser extension version 2.68.0, released on December 24, 2025. The breach, which targeted desktop users exclusively, left hundreds of wallets completely drained within hours of the…

Read more →

EN, Security Boulevard

NDSS 2025 – CounterSEVeillance: Performance-Counter Attacks On AMD SEV-SNP

2025-12-27 20:12

Session 7B: Trusted Hardware and Execution Authors, Creators & Presenters: Stefan Gast (Graz University of Technology), Hannes Weissteiner (Graz University of Technology), Robin Leander Schröder (Fraunhofer SIT, Darmstadt, Germany and Fraunhofer Austria, Vienna, Austria), Daniel Gruss (Graz University of Technology)…

Read more →

CySecurity News - Latest Information Security and Hacking Incidents, EN

FCC Tightens Rules on Foreign-Made Drones to Address U.S. Security Risks

2025-12-27 20:12

The U.S. Federal Communications Commission has introduced new restrictions targeting drones and essential drone-related equipment manufactured outside the United States, citing concerns that such technology could pose serious national security and public safety risks. Under this decision, the FCC has…

Read more →

CySecurity News - Latest Information Security and Hacking Incidents, EN

700Credit Data Breach Exposes Personal Information of Over 5.6 Million Consumers

2025-12-27 17:12

  A massive breach at the credit reporting firm 700Credit has led to the leakage of private details of over 5.6 million people, throwing a new set of concerns on the risk of third-party security in the financial services value…

Read more →

hourly summary

IT Security News Hourly Summary 2025-12-27 15h : 4 posts

2025-12-27 16:12

4 posts were published in the last hour 14:2 : What “Verified Identity Data” Means for APIs — and How to Evaluate a Data Partner 13:32 : GhostPairing Attack Puts Millions of WhatsApp Users at Risk 13:31 : Askul Confirms…

Read more →

EN, Security Boulevard

What “Verified Identity Data” Means for APIs — and How to Evaluate a Data Partner

2025-12-27 16:12

If you’re building fraud prevention, risk scoring, or identity enrichment into a product, your outcomes depend on one thing: the quality of your identity data. A lot of identity data on the market is broad but unverified: raw broker feeds,…

Read more →

CySecurity News - Latest Information Security and Hacking Incidents, EN

GhostPairing Attack Puts Millions of WhatsApp Users at Risk

2025-12-27 15:12

  An ongoing campaign that aims to seize control of WhatsApp accounts by manipulating WhatsApp’s own multi-device architecture has been revealed by cybersecurity experts in the wake of an ongoing, highly targeted attack designed to illustrate the increasing complexity of…

Read more →

CySecurity News - Latest Information Security and Hacking Incidents, EN

Askul Confirms RansomHouse Ransomware Breach Exposed 740,000 Records

2025-12-27 15:12

  Japanese e-commerce giant Askul Corporation confirmed that a ransomware attack carried out by the RansomHouse group led to the theft of about 740,000 customer records in October 2025. Askul, which is a major supplier of office supplies and logistics…

Read more →

CySecurity News - Latest Information Security and Hacking Incidents, EN

Inside the Hidden Market Where Your ChatGPT and Gemini Chats Are Sold for Profit

2025-12-27 15:12

  Millions of users may have unknowingly exposed their most private conversations with AI tools after cybersecurity researchers uncovered a network of browser extensions quietly harvesting and selling chat data.Here’s a reminder many people forget: an AI assistant is not…

Read more →

Cyber Security News, EN

Mongobleed PoC Exploit Tool Released for MongoDB Flaw that Exposes Sensitive Data

2025-12-27 15:12

A proof-of-concept (PoC) exploit dubbed “mongobleed” for CVE-2025-14847, a critical unauthenticated memory leak vulnerability in MongoDB’s zlib decompression handling. Dubbed by its creator Joe Desimone as a way to bleed sensitive server memory, the flaw lets attackers remotely extract uninitialized…

Read more →

EN, Security Latest

The US Must Stop Underestimating Drone Warfare

2025-12-27 12:12

The future of conflict is cheap, rapidly manufactured, and tough to defend against. This article has been indexed from Security Latest Read the original article: The US Must Stop Underestimating Drone Warfare

Read more →

Page 197 of 4873
« 1 … 195 196 197 198 199 … 4,873 »

Pages

  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Telegram Channel

Recent Posts

  • IT Security News Hourly Summary 2026-02-08 12h : 1 posts February 8, 2026
  • DKnife toolkit abuses routers to spy and deliver malware since 2019 February 8, 2026
  • Week in review: Notepad++ supply chain attack details and targets, Patch Tuesday forecast February 8, 2026
  • OpenClaw Integrates VirusTotal Scanning to Detect Malicious ClawHub Skills February 8, 2026
  • LocalGPT – A Secure Local Device Focused AI Assistant Built in Rust February 8, 2026
  • Microsoft Data Center Power Outage Disrupts Windows 11 Updates and Store Functionality February 8, 2026
  • IT Security News Hourly Summary 2026-02-08 00h : 1 posts February 8, 2026
  • IT Security News Daily Summary 2026-02-07 February 8, 2026
  • Bithumb Mistakenly Sends 620,000 Bitcoin ($40B) to Customer Accounts February 7, 2026
  • IT Security News Hourly Summary 2026-02-07 21h : 1 posts February 7, 2026
  • How to Suppress Negative Content Without Triggering the Streisand Effect February 7, 2026
  • Italian university La Sapienza still offline to mitigate recent cyber attack February 7, 2026
  • Dozens of Government and Infrastructure Networks Breached in Global Espionage Campaign February 7, 2026
  • Firefox Will Give Users an AI Kill Switch for Better Privacy February 7, 2026
  • IT Security News Hourly Summary 2026-02-07 18h : 2 posts February 7, 2026
  • Security Architecture Part I: Introduction to Security Architecture Concepts, CIA, and Rules February 7, 2026
  • Threat Actors Exploit Fortinet Devices and Steal Firewall Configurations February 7, 2026
  • Unsecured Database Exposes 149 Million Logins Linked to Infostealer Malware Operations February 7, 2026
  • ACF Plugin Flaw Exposes 50,000 WordPress Sites to Admin Takeover February 7, 2026
  • BridgePay Payment Gateway Hit by Ransomware, Causing Nationwide Outages February 7, 2026

Copyright © 2026 IT Security News. All Rights Reserved. The Magazine Basic Theme by bavotasan.com.

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}