IT Security News

Cybersecurity news and articles about information security, vulnerabilities, exploits, hacks, laws, spam, viruses, malware, breaches.

Main menu

Skip to content
  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Apps
    • Telegram Channel
EN, securityweek

Google Pays $55,000 for High-Severity Chrome Browser Bug

2024-12-11 16:12

Google pushes out major Chrome browser updates to fix multiple serious security defects. The post Google Pays $55,000 for High-Severity Chrome Browser Bug appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article: Google Pays…

Read more →

CySecurity News - Latest Information Security and Hacking Incidents, EN

BT Group Confirms Cyberattack by Black Basta Ransomware Group

2024-12-11 16:12

British telecommunications giant BT Group has confirmed it was targeted by the notorious ransomware group Black Basta in a cyberattack on its Conferencing division. The breach forced BT to isolate and shut down parts of its infrastructure to limit the…

Read more →

DE, heise Security

Europol vereitelt weihnachtliche Attacken von 27 DDoS-Bootern

2024-12-11 16:12

Die Europol-Operation PowerOFF hat 27 weitere DDoS-Booter vom Netz genommen. Drei Admins wurden verhaftet, 300 Nutzer identifiziert. Dieser Artikel wurde indexiert von heise Security Lesen Sie den originalen Artikel: Europol vereitelt weihnachtliche Attacken von 27 DDoS-Bootern

Read more →

EN, Security | TechRepublic

CrowdStrike vs Wiz: Which Offers Better Cloud Security and Value?

2024-12-11 16:12

Compare CrowdStrike and Wiz on cloud security, features, pricing, and performance to find the best cybersecurity solution for your business needs. This article has been indexed from Security | TechRepublic Read the original article: CrowdStrike vs Wiz: Which Offers Better…

Read more →

EN, Security News | TechCrunch

Researchers uncover Chinese spyware used to target Android devices

2024-12-11 16:12

The spyware, called EagleMsgSpy, has been used by Chinese law enforcement, according to cybersecurity firm Lookout. © 2024 TechCrunch. All rights reserved. For personal use only. This article has been indexed from Security News | TechCrunch Read the original article:…

Read more →

EN, Security Boulevard

Oasis Security Details MFA Security Flaw Found in Microsoft Cloud Services

2024-12-11 16:12

Oasis Security today revealed that it worked with Microsoft to fix a flaw in its implementation of multi-factor authentication (MFA) that could have been used by cybercriminals to gain access to every major Microsoft cloud service The post Oasis Security…

Read more →

EN, The Hacker News

ZLoader Malware Returns With DNS Tunneling to Stealthily Mask C2 Comms

2024-12-11 16:12

Cybersecurity researchers have discovered a new version of the ZLoader malware that employs a Domain Name System (DNS) tunnel for command-and-control (C2) communications, indicating that the threat actors are continuing to refine the tool after resurfacing a year ago. “Zloader…

Read more →

EN, The Hacker News

Microsoft MFA AuthQuake Flaw Enabled Unlimited Brute-Force Attempts Without Alerts

2024-12-11 16:12

Cybersecurity researchers have flagged a “critical” security vulnerability in Microsoft’s multi-factor authentication (MFA) implementation that allows an attacker to trivially sidestep the protection and gain unauthorized access to a victim’s account. “The bypass was simple: it took around an hour…

Read more →

EN, www.infosecurity-magazine.com

South Korea Takes Down Fraudulent Online Trading Network Used to Extort $6.3M

2024-12-11 16:12

The Korean Financial Security Institute (K-FSI) disrupted a fraudulent network that made $6.3m by stealing money from fake personal trading platforms This article has been indexed from www.infosecurity-magazine.com Read the original article: South Korea Takes Down Fraudulent Online Trading Network…

Read more →

DE, IT-News Cybersicherheit - silicon.de

Thales: Verlagerung von reaktiven zu proaktiven Maßnahmen

2024-12-11 15:12

Trends 2025: Kontinuierliche Überwachung und Früherkennung potenzieller Bedrohungen werden zum Standard, ebenso wie robustere Authentifizierungsmaßnahmen. Dieser Artikel wurde indexiert von IT-News Cybersicherheit – silicon.de Lesen Sie den originalen Artikel: Thales: Verlagerung von reaktiven zu proaktiven Maßnahmen

Read more →

DE, IT-News Cybersicherheit - silicon.de

Zimperium: „Mishing“-Bedrohungen nehmen deutlich zu

2024-12-11 15:12

Trends 2025: Mobile Risiken, Phishing-Techniken und Sideloading-Angriffe. Dieser Artikel wurde indexiert von IT-News Cybersicherheit – silicon.de Lesen Sie den originalen Artikel: Zimperium: „Mishing“-Bedrohungen nehmen deutlich zu

Read more →

DE, heise Security

Europol: 27 DDoS-Booter vor weihnachtlichen Angriffen abgeschaltet

2024-12-11 15:12

Die Europol-Operation PowerOFF hat 27 weitere DDoS-Booter vom Netz genommen. Drei Admins wurden verhaftet, 300 Nutzer identifiziert. Dieser Artikel wurde indexiert von heise Security Lesen Sie den originalen Artikel: Europol: 27 DDoS-Booter vor weihnachtlichen Angriffen abgeschaltet

Read more →

EN, GBHackers Security | #1 Globally Trusted Cyber Security News Platform

APT-C-60 Hackers Penetrate Org’s Network Using a Weapanized Google Drive link

2024-12-11 15:12

The Japan Computer Emergency Response Team Coordination Center (JPCERT/CC) has confirmed an advanced cyber attack against organizations in Japan, believed to have been conducted by the cyber espionage group APT-C-60. The attackers used phishing techniques, masquerading as a job applicant…

Read more →

EN, securityweek

Now on Demand: Inside a Hacker’s Playbook – How Cybercriminals Use Deepfakes

2024-12-11 15:12

This eye-opening session that pulls back the curtain on how bad actors exploit social engineering tactics, like deepfake technology and Business Email Compromise (BEC). The post Now on Demand: Inside a Hacker’s Playbook – How Cybercriminals Use Deepfakes appeared first…

Read more →

EN, www.infosecurity-magazine.com

Microsoft Azure MFA Flaw Allowed Easy Access Bypass

2024-12-11 15:12

Microsoft MFA flaw exposed that allowed attackers to bypass security within an hour, putting 400m Office 365 accounts at risk This article has been indexed from www.infosecurity-magazine.com Read the original article: Microsoft Azure MFA Flaw Allowed Easy Access Bypass

Read more →

DE, t3n.de - Software & Entwicklung

Privacy Reclaim: Warum ein Unternehmen Klageansprüche gegen Google kauft

2024-12-11 15:12

40 Euro für Android-User: Diesen Deal bewirbt das Legal-Tech-Unternehmen Privacy Reclaim derzeit. Wir klären, was dahintersteckt und warum Privacy Reclaim gegen Google klagen will. Dieser Artikel wurde indexiert von t3n.de – Software & Entwicklung Lesen Sie den originalen Artikel: Privacy…

Read more →

DE, t3n.de - Software & Entwicklung

Firefox: Mozilla entfernt die Do-Not-Track-Funktion – diese Alternative gibt es

2024-12-11 15:12

Firefox-Nutzer:innen müssen ab sofort ohne die Do-Not-Track-Funktion auskommen, welche die Privatsphäre verbessern sollte. Das gelang aber nicht flächendeckend. Wie es jetzt möglich werden soll. Dieser Artikel wurde indexiert von t3n.de – Software & Entwicklung Lesen Sie den originalen Artikel: Firefox:…

Read more →

DE, t3n.de - Software & Entwicklung

ChatGPT bekommt ein Upgrade: Was OpenAIs Canvas für dich tun kann

2024-12-11 15:12

OpenAI rollt Canvas für alle GPT-4o-Nutzer:innen aus und sorgt so für Euphorie. Frei verfügbar soll Canvas nach der Betaphase werden. Dieser Artikel wurde indexiert von t3n.de – Software & Entwicklung Lesen Sie den originalen Artikel: ChatGPT bekommt ein Upgrade: Was…

Read more →

DE, t3n.de - Software & Entwicklung

Spotify Wrapped, Playstation Wrap-Up und Co.: Warum mich digitale Jahresrückblicke nerven

2024-12-11 15:12

Es geht wieder los: Unter Namen wie Wrapped, Wrap-Up, Recap oder Replay liefert mittlerweile fast jede Plattform einen persönlichen Jahresrückblick. Das nervt! Dieser Artikel wurde indexiert von t3n.de – Software & Entwicklung Lesen Sie den originalen Artikel: Spotify Wrapped, Playstation…

Read more →

DE, t3n.de - Software & Entwicklung

Bluesky plant Abomodell: Was sich hinter der Bezahlschranke verbergen könnte

2024-12-11 15:12

Auf Github sind Mockups von Bluesky Plus aufgetaucht, die einen ersten Einblick in mögliche Funktionen eines Abomodells geben. Auch ein vorläufiger Preis wird genannt. So teuer könnte es werden. Dieser Artikel wurde indexiert von t3n.de – Software & Entwicklung Lesen…

Read more →

hourly summary

IT Security News Hourly Summary 2024-12-11 15h : 11 posts

2024-12-11 15:12

11 posts were published in the last hour 14:4 : AMD Chip VM Memory Protections Broken by BadRAM 14:4 : DMD Diamond Launches Open Beta for v4 Blockchain Ahead of 2025 Mainnet 13:35 : Operation Digital Eye: China-linked relies on…

Read more →

EN, Security Boulevard

AMD Chip VM Memory Protections Broken by BadRAM

2024-12-11 15:12

Researchers in Europe unveil a vulnerability dubbed “BadRAM” that hackers can easily exploit using $10 hardware to bypass protections in AMD’s Eypc server processors used in cloud environments and expose sensitive data stored in memory. The post AMD Chip VM…

Read more →

Cybersecurity Insiders, EN

DMD Diamond Launches Open Beta for v4 Blockchain Ahead of 2025 Mainnet

2024-12-11 15:12

Vienna, Austria, 11th December 2024, CyberNewsWire The post DMD Diamond Launches Open Beta for v4 Blockchain Ahead of 2025 Mainnet appeared first on Cybersecurity Insiders. This article has been indexed from Cybersecurity Insiders Read the original article: DMD Diamond Launches…

Read more →

EN, Security Affairs

Operation Digital Eye: China-linked relies on Visual Studio Code Remote Tunnels to spy on Europen entities

2024-12-11 14:12

An alleged China-linked APT group targeted large business-to-business IT service providers in Southern Europe as part of Operation Digital Eye campaign. Between late June and mid-July 2024, a China-linked threat actor targeted major IT service providers in Southern Europe in…

Read more →

Page 2092 of 4528
« 1 … 2,090 2,091 2,092 2,093 2,094 … 4,528 »

Pages

  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Apps
    • Telegram Channel

Recent Posts

  • Week in review: Stealth-patched FortiWeb vulnerability under active exploitation, Logitech data breach November 23, 2025
  • IT Security News Hourly Summary 2025-11-23 09h : 2 posts November 23, 2025
  • CodeStepByStep – 17,351 breached accounts November 23, 2025
  • Microsoft Confirms Windows 11 24H2 Update Broken Multiple Core Features November 23, 2025
  • U.S., International Partners Target Bulletproof Hosting Services November 23, 2025
  • ADDA – 1,829,314 breached accounts November 23, 2025
  • IT Security News Hourly Summary 2025-11-23 00h : 1 posts November 23, 2025
  • IT Security News Daily Summary 2025-11-22 November 23, 2025
  • BadAudio malware: how APT24 scaled its cyberespionage through supply chain attacks November 22, 2025
  • Salesforce: Some Customer Data Accessed via Gainsight Breach November 22, 2025
  • IT Security News Hourly Summary 2025-11-22 18h : 8 posts November 22, 2025
  • Quantum Computing Moves Closer to Real-World Use as Researchers Push Past Major Technical Limits November 22, 2025
  • China-Linked APT31 Launches Stealthy Cyberattacks on Russian IT Using Cloud Services November 22, 2025
  • CrowdStrike Fires Worker Over Insider Leak to Scattered Lapsus Hunters November 22, 2025
  • How to Block Ads Across Your Entire Home Network and Reduce Online Threats November 22, 2025
  • Metasploit Releases New Exploit for Fresh FortiWeb 0-Day Vulnerabilities November 22, 2025
  • CrowdStrike Fires Employee for Leaking Internal System Info to Hackers November 22, 2025
  • Hackers Use Salesforce Gainsight Breach to Access Data from More Than 200 Companies November 22, 2025
  • CISA Issues Warning as Hackers Target Oracle Identity Manager RCE Flaw November 22, 2025
  • GlobalLogic Moves to Protect Workforce After Oracle-related Data Theft November 22, 2025

Copyright © 2025 IT Security News. All Rights Reserved. The Magazine Basic Theme by bavotasan.com.

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}