IT Security News

Cybersecurity news and articles about information security, vulnerabilities, exploits, hacks, laws, spam, viruses, malware, breaches.

Main menu

Skip to content
  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Apps
    • Telegram Channel
EN, GBHackers Security | #1 Globally Trusted Cyber Security News Platform

US Charged Chinese Hackers for Exploiting Thousands of Firewall

2024-12-11 17:12

The US Treasury Department’s Office of Foreign Assets Control (OFAC) has sanctioned Sichuan Silence Information Technology Company and its employee Guan Tianfeng for their involvement in the April 2020 global firewall compromise, which targeted numerous US critical infrastructure companies.  The…

Read more →

EN, GBHackers Security | #1 Globally Trusted Cyber Security News Platform

Reserachers Uncovered Zloader DNS Tunneling Tactics For Stealthy C2 Communication

2024-12-11 17:12

Zloader, a sophisticated Trojan, has recently evolved with features that enhance its stealth and destructive potential, as the latest version, 2.9.4.0, introduces a custom DNS tunnel for covert C2 communications, bypassing traditional network security measures.  An interactive shell empowers attackers…

Read more →

EN, Securelist

Story of the Year: global IT outages and supply chain attacks

2024-12-11 17:12

While the CrowdStrike incident is still fresh in our minds, Kaspersky experts look back on similar IT outages that happened in 2024 and predict potential threats for 2025. This article has been indexed from Securelist Read the original article: Story…

Read more →

EN, Palo Alto Networks Blog

Cortex XDR Delivers Unmatched 100% Detection in MITRE ATT&CK Round 6

2024-12-11 17:12

Cortex XDR achieves 100% technique-level detection in the 2024 MITRE ATT&CK evaluation. The post Cortex XDR Delivers Unmatched 100% Detection in MITRE ATT&CK Round 6 appeared first on Palo Alto Networks Blog. This article has been indexed from Palo Alto…

Read more →

EN, securityweek

BadRAM Attack Uses $10 Equipment to Break AMD Processor Protections

2024-12-11 17:12

Academic researchers devise BadRAM, a new attack that uses $10 equipment to break AMD’s latest trusted execution environment protections. The post BadRAM Attack Uses $10 Equipment to Break AMD Processor Protections appeared first on SecurityWeek. This article has been indexed…

Read more →

CySecurity News - Latest Information Security and Hacking Incidents, EN

Brain Cipher Ransomware Group Claims Deloitte UK Data Breach

2024-12-11 17:12

  Brain Cipher, a ransomware group that emerged in June 2024, has claimed responsibility for breaching Deloitte UK, alleging the exfiltration of over 1 terabyte of sensitive data from the global professional services firm. This claim has raised significant concerns…

Read more →

EN, The Hacker News

New Malware Technique Could Exploit Windows UI Framework to Evade EDR Tools

2024-12-11 17:12

A newly devised technique leverages a Windows accessibility framework called UI Automation (UIA) to perform a wide range of malicious activities without tipping off endpoint detection and response (EDR) solutions. “To exploit this technique, a user must be convinced to…

Read more →

EN, www.infosecurity-magazine.com

Cyber Incident Disrupting Krispy Kreme Online Orders

2024-12-11 17:12

Krispy Kreme said the incident is likely to materially affect operations and short-term financial performance This article has been indexed from www.infosecurity-magazine.com Read the original article: Cyber Incident Disrupting Krispy Kreme Online Orders

Read more →

Check Point Blog, EN

MITRE ATT&CK® Evaluations Highlights Check Point Detection

2024-12-11 16:12

In the 2024 MITRE ATT&CK® Evaluations, Check Point demonstrated what world-class detection looks like. The results speak for themselves: detection of all 57 applicable tested attack steps, with an impressive 56 detections at technique level. This isn’t just about catching…

Read more →

EN, Security News | VentureBeat

Google unveils AI coding assistant ‘Jules,’ promising autonomous bug fixes and faster development cycles

2024-12-11 16:12

Google launches Jules, an AI coding assistant powered by Gemini 2.0, automating bug fixes and code changes while integrating with GitHub – promising to revolutionize software development by 2025. This article has been indexed from Security News | VentureBeat Read…

Read more →

EN, Security News | VentureBeat

Google’s new Trillium AI chip delivers 4X speed and powers Gemini 2.0

2024-12-11 16:12

Google unveils Trillium, its breakthrough AI chip powering Gemini 2.0, delivering 4x performance boost and reshaping AI economics with unprecedented 100,000-chip network deployment. This article has been indexed from Security News | VentureBeat Read the original article: Google’s new Trillium…

Read more →

EN, Security News | VentureBeat

Google Gemini 2.0: Could this be the beginning of truly autonomous AI?

2024-12-11 16:12

Google launches Gemini 2.0 with autonomous AI agents, native image generation, and multilingual capabilities, doubling performance while introducing Projects Astra, Mariner, and Jules for enhanced task automation and digital assistance. This article has been indexed from Security News | VentureBeat…

Read more →

EN, Security Affairs

Ivanti fixed a maximum severity vulnerability in its CSA solution

2024-12-11 16:12

Ivanti addressed a critical authentication bypass vulnerability impacting its Cloud Services Appliance (CSA) solution. Ivanti addressed a critical authentication bypass vulnerability, tracked as CVE-2024-11639 (CVSS score of 10), in its Cloud Services Appliance (CSA) solution. A remote unauthenticated attacker can…

Read more →

EN, securityweek

Google Pays $55,000 for High-Severity Chrome Browser Bug

2024-12-11 16:12

Google pushes out major Chrome browser updates to fix multiple serious security defects. The post Google Pays $55,000 for High-Severity Chrome Browser Bug appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article: Google Pays…

Read more →

CySecurity News - Latest Information Security and Hacking Incidents, EN

BT Group Confirms Cyberattack by Black Basta Ransomware Group

2024-12-11 16:12

British telecommunications giant BT Group has confirmed it was targeted by the notorious ransomware group Black Basta in a cyberattack on its Conferencing division. The breach forced BT to isolate and shut down parts of its infrastructure to limit the…

Read more →

DE, heise Security

Europol vereitelt weihnachtliche Attacken von 27 DDoS-Bootern

2024-12-11 16:12

Die Europol-Operation PowerOFF hat 27 weitere DDoS-Booter vom Netz genommen. Drei Admins wurden verhaftet, 300 Nutzer identifiziert. Dieser Artikel wurde indexiert von heise Security Lesen Sie den originalen Artikel: Europol vereitelt weihnachtliche Attacken von 27 DDoS-Bootern

Read more →

EN, Security | TechRepublic

CrowdStrike vs Wiz: Which Offers Better Cloud Security and Value?

2024-12-11 16:12

Compare CrowdStrike and Wiz on cloud security, features, pricing, and performance to find the best cybersecurity solution for your business needs. This article has been indexed from Security | TechRepublic Read the original article: CrowdStrike vs Wiz: Which Offers Better…

Read more →

EN, Security News | TechCrunch

Researchers uncover Chinese spyware used to target Android devices

2024-12-11 16:12

The spyware, called EagleMsgSpy, has been used by Chinese law enforcement, according to cybersecurity firm Lookout. © 2024 TechCrunch. All rights reserved. For personal use only. This article has been indexed from Security News | TechCrunch Read the original article:…

Read more →

EN, Security Boulevard

Oasis Security Details MFA Security Flaw Found in Microsoft Cloud Services

2024-12-11 16:12

Oasis Security today revealed that it worked with Microsoft to fix a flaw in its implementation of multi-factor authentication (MFA) that could have been used by cybercriminals to gain access to every major Microsoft cloud service The post Oasis Security…

Read more →

EN, The Hacker News

ZLoader Malware Returns With DNS Tunneling to Stealthily Mask C2 Comms

2024-12-11 16:12

Cybersecurity researchers have discovered a new version of the ZLoader malware that employs a Domain Name System (DNS) tunnel for command-and-control (C2) communications, indicating that the threat actors are continuing to refine the tool after resurfacing a year ago. “Zloader…

Read more →

EN, The Hacker News

Microsoft MFA AuthQuake Flaw Enabled Unlimited Brute-Force Attempts Without Alerts

2024-12-11 16:12

Cybersecurity researchers have flagged a “critical” security vulnerability in Microsoft’s multi-factor authentication (MFA) implementation that allows an attacker to trivially sidestep the protection and gain unauthorized access to a victim’s account. “The bypass was simple: it took around an hour…

Read more →

EN, www.infosecurity-magazine.com

South Korea Takes Down Fraudulent Online Trading Network Used to Extort $6.3M

2024-12-11 16:12

The Korean Financial Security Institute (K-FSI) disrupted a fraudulent network that made $6.3m by stealing money from fake personal trading platforms This article has been indexed from www.infosecurity-magazine.com Read the original article: South Korea Takes Down Fraudulent Online Trading Network…

Read more →

DE, IT-News Cybersicherheit - silicon.de

Thales: Verlagerung von reaktiven zu proaktiven Maßnahmen

2024-12-11 15:12

Trends 2025: Kontinuierliche Überwachung und Früherkennung potenzieller Bedrohungen werden zum Standard, ebenso wie robustere Authentifizierungsmaßnahmen. Dieser Artikel wurde indexiert von IT-News Cybersicherheit – silicon.de Lesen Sie den originalen Artikel: Thales: Verlagerung von reaktiven zu proaktiven Maßnahmen

Read more →

DE, IT-News Cybersicherheit - silicon.de

Zimperium: „Mishing“-Bedrohungen nehmen deutlich zu

2024-12-11 15:12

Trends 2025: Mobile Risiken, Phishing-Techniken und Sideloading-Angriffe. Dieser Artikel wurde indexiert von IT-News Cybersicherheit – silicon.de Lesen Sie den originalen Artikel: Zimperium: „Mishing“-Bedrohungen nehmen deutlich zu

Read more →

Page 2029 of 4465
« 1 … 2,027 2,028 2,029 2,030 2,031 … 4,465 »

Pages

  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Apps
    • Telegram Channel

Recent Posts

  • EU Said To Consider Forced Huawei Ban November 11, 2025
  • Apple Said To Delay iPhone Air Upgrade Amid Weak Demand November 11, 2025
  • WatchGuard Firebox Flaw Allows Attackers to Gain Unauthorized SSH Access November 11, 2025
  • U.S. CISA adds Samsung mobile devices flaw to its Known Exploited Vulnerabilities catalog November 11, 2025
  • Zoom Vulnerabilities Let Attackers Bypass Access Controls to Access Session Data November 11, 2025
  • AI Agents Rewriting Fraud Rules November 11, 2025
  • Hackers Exploiting Triofox 0-Day Vulnerability to Execute Malicious Payload Abusing Anti-Virus Feature November 11, 2025
  • SAP Security Update – Patch for Critical Vulnerabilities Allowing Code Execution and Injection Attacks November 11, 2025
  • China Resumes Export Of Nexperia Chips November 11, 2025
  • EU Proposes Stripping Back Privacy Rules To Boost AI November 11, 2025
  • Critical Triofox bug exploited to run malicious payloads via AV configuration November 11, 2025
  • Firewalla unveils MSP 2.9 to simplify multi-device network management November 11, 2025
  • Reauthorizing CISA, Electric bus kill switches, GDPR for AI November 11, 2025
  • Researchers Expose Deep Connections Between Maverick and Coyote Banking Malware November 11, 2025
  • IT Security News Hourly Summary 2025-11-11 09h : 2 posts November 11, 2025
  • Beware of Security Alert-Themed Malicious Emails that Steal Your Email Logins November 11, 2025
  • 65% of Top AI Firms Found Exposing Verified API Keys and Tokens on GitHub November 11, 2025
  • Danabot Malware Reemerges with Version 669 After Operation Endgame November 11, 2025
  • CISA Issues Alert on Samsung 0-Day RCE Flaw Actively Exploited in Attacks November 11, 2025
  • Threat Actors Leverage RMM Tools to Deploy Medusa & DragonForce Ransomware November 11, 2025

Copyright © 2025 IT Security News. All Rights Reserved. The Magazine Basic Theme by bavotasan.com.

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}