IT Security News

Cybersecurity news and articles about information security, vulnerabilities, exploits, hacks, laws, spam, viruses, malware, breaches.

Main menu

Skip to content
  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Apps
    • Telegram Channel
EN, securityweek

Tenable Disables Nessus Agents Over Faulty Updates

2025-01-06 14:01

Tenable has disabled two Nessus scanner agent versions after a differential plugin update caused the agents to go offline. The post Tenable Disables Nessus Agents Over Faulty Updates appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…

Read more →

EN, Security Boulevard

Torq Adds Bevy of AI Agents to Automate Cybersecurity Workflows

2025-01-06 14:01

Torq has extended the reach of the generative artificial intelligence (AI) capabilities spanning its security operations center (SOC) platform to now include multiple agents. The post Torq Adds Bevy of AI Agents to Automate Cybersecurity Workflows appeared first on Security…

Read more →

EN, The Hacker News

⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [6 Jan]

2025-01-06 14:01

Every tap, click, and swipe we make online shapes our digital lives, but it also opens doors—some we never meant to unlock. Extensions we trust, assistants we rely on, and even the codes we scan are turning into tools for…

Read more →

DE, Golem.de - Security

Altersverifikation in Florida: Pornhub-Sperre lässt VPN-Nachfrage explodieren

2025-01-06 14:01

Seit dem 1. Januar müssen Pornoportale das Alter ihrer Nutzer aus Florida prüfen. Pornhub protestiert mit einer Sperre – und Anwender umgehen sie. (pornhub, Google) Dieser Artikel wurde indexiert von Golem.de – Security Lesen Sie den originalen Artikel: Altersverifikation in…

Read more →

EN, The Hacker News

⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [6 Jan]

2025-01-06 14:01

Every tap, click, and swipe we make online shapes our digital lives, but it also opens doors—some we never meant to unlock. Extensions we trust, assistants we rely on, and even the codes we scan are turning into tools for…

Read more →

EN, GBHackers Security | #1 Globally Trusted Cyber Security News Platform

PoC Exploit Released for Critical OpenSSH Vulnerability (CVE-2024-6387)

2025-01-06 13:01

An alarming new development emerged in the cybersecurity landscape with the release of a proof-of-concept (PoC) exploit targeting the critical vulnerability identified as CVE-2024-6387. This vulnerability, discovered by researchers at Qualys, allows remote unauthenticated attackers to execute arbitrary code on…

Read more →

EN, Schneier on Security

Privacy of Photos.app’s Enhanced Visual Search

2025-01-06 13:01

Initial speculation about a new Apple feature. This article has been indexed from Schneier on Security Read the original article: Privacy of Photos.app’s Enhanced Visual Search

Read more →

EN, securityweek

Is Your Car Spying on You? What It Means That Tesla Shared Data in the Las Vegas Explosion

2025-01-06 13:01

Many cars know where you’ve been and where you are going, and also often have access to your contacts, call logs, texts and other sensitive information thanks to cell phone syncing. The post Is Your Car Spying on You? What…

Read more →

EN, The Hacker News

Cybercriminals Target Ethereum Developers with Fake Hardhat npm Packages

2025-01-06 13:01

Cybersecurity researchers have revealed several malicious packages on the npm registry that have been found impersonating the Nomic Foundation’s Hardhat tool in order to steal sensitive data from developer systems. “By exploiting trust in open source plugins, attackers have infiltrated…

Read more →

EN, The Hacker News

FireScam Android Malware Poses as Telegram Premium to Steal Data and Control Devices

2025-01-06 13:01

An Android information stealing malware named FireScam has been found masquerading as a premium version of the Telegram messaging app to steal data and maintain persistent remote control over compromised devices. “Disguised as a fake ‘Telegram Premium’ app, it is…

Read more →

EN, The Hacker News

From $22M in Ransom to +100M Stolen Records: 2025’s All-Star SaaS Threat Actors to Watch

2025-01-06 13:01

In 2024, cyber threats targeting SaaS surged, with 7,000 password attacks blocked per second (just in Entra ID)—a 75% increase from last year—and phishing attempts up by 58%, causing $3.5 billion in losses (source: Microsoft Digital Defense Report 2024). SaaS…

Read more →

EN, The Hacker News

⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [6 Jan]

2025-01-06 13:01

Every tap, click, and swipe we make online shapes our digital lives, but it also opens doors—some we never meant to unlock. Extensions we trust, assistants we rely on, and even the codes we scan are turning into tools for…

Read more →

EN, www.infosecurity-magazine.com

Chinese Hackers Double Cyber-Attacks on Taiwan

2025-01-06 13:01

Taiwan’s security service said government networks faced 2.4 million attacks in 2024, most of which are attributed to Chinese state actors This article has been indexed from www.infosecurity-magazine.com Read the original article: Chinese Hackers Double Cyber-Attacks on Taiwan

Read more →

EN, Silicon UK

US Sanctions Chinese Tech Company Over Infrastructure Hacks

2025-01-06 12:01

US Treasury sanctions Beijing-based Integrity Tech over alleged links to state-backed hacking group ‘Flax Typhoon’ This article has been indexed from Silicon UK Read the original article: US Sanctions Chinese Tech Company Over Infrastructure Hacks

Read more →

EN, Silicon UK

China’s BYD Regains Top EV Spot Amidst Tesla Decline

2025-01-06 12:01

China EV giant BYD surpasses Tesla on worldwide EV deliveries in fourth quarter of 2024 as Tesla shows first full-year decline This article has been indexed from Silicon UK Read the original article: China’s BYD Regains Top EV Spot Amidst…

Read more →

EN, Silicon UK

Microsoft To Spend $80bn On AI Infrastructure This Year

2025-01-06 12:01

Microsoft planning to spend $80bn on data centres for AI and other cloud applications this fiscal year, as AI race heats up This article has been indexed from Silicon UK Read the original article: Microsoft To Spend $80bn On AI…

Read more →

EN, Silicon UK

TikTok ‘Aware’ Livestream Feature Exploited Minors

2025-01-06 12:01

Less-redacted Utah lawsuit says TikTok internal reviews found Live feature effectively incentivised abuse of minors for profit This article has been indexed from Silicon UK Read the original article: TikTok ‘Aware’ Livestream Feature Exploited Minors

Read more →

EN, Silicon UK

Nick Clegg To Leave Meta, Hand Over Post To Republican

2025-01-06 12:01

Former UK deputy prime minister Nick Clegg to leave global affairs post at Meta ahead of Donald Trump’s return to presidency This article has been indexed from Silicon UK Read the original article: Nick Clegg To Leave Meta, Hand Over…

Read more →

EN, securityweek

US Sanctions Chinese Firm Linked to Flax Typhoon Attacks on Critical Infrastructure

2025-01-06 12:01

The US Treasury has sanctioned Chinese company Integrity Technology for supporting state-sponsored group Flax Typhoon in hacking US critical infrastructure. The post US Sanctions Chinese Firm Linked to Flax Typhoon Attacks on Critical Infrastructure appeared first on SecurityWeek. This article…

Read more →

EN, Security Boulevard

DigiCert Open Sources Domain Control Validation Software

2025-01-06 12:01

DigiCert has made available a Domain Control Validation (DCV) library under an open-source software license as part of a larger effort to enable certificate authorities (CAs) to reduce total costs. The post DigiCert Open Sources Domain Control Validation Software appeared…

Read more →

EN, www.infosecurity-magazine.com

New Infostealer Campaign Uses Discord Videogame Lure

2025-01-06 12:01

Threat actors are tricking victims into downloading malware with the promise of testing a new videogame This article has been indexed from www.infosecurity-magazine.com Read the original article: New Infostealer Campaign Uses Discord Videogame Lure

Read more →

hourly summary

IT Security News Hourly Summary 2025-01-06 12h : 11 posts

2025-01-06 12:01

11 posts were published in the last hour 11:4 : Stimmen die Voraussetzungen, kann Schadcode auf Asus-Router gelangen 11:4 : Ransomware: Cyberangriff trifft Fraunhofer-Institut in Stuttgart 11:4 : [NEU] [hoch] ffmpeg: Mehrere Schwachstellen ermöglichen Denial of Service 11:3 : 6…

Read more →

DE, heise Security

Stimmen die Voraussetzungen, kann Schadcode auf Asus-Router gelangen

2025-01-06 12:01

Angreifer können Router von Asus ins Visier nehmen und attackieren. Dagegen sind abgesicherte Firmwares erschienen. Dieser Artikel wurde indexiert von heise Security Lesen Sie den originalen Artikel: Stimmen die Voraussetzungen, kann Schadcode auf Asus-Router gelangen

Read more →

DE, Golem.de - Security

Ransomware: Cyberangriff trifft Fraunhofer-Institut in Stuttgart

2025-01-06 12:01

Hacker haben das Fraunhofer-Institut für Arbeitswirtschaft und Organisation attackiert. Ein Datenabfluss kann nicht ausgeschlossen werden. (Ransomware, Datenschutz) Dieser Artikel wurde indexiert von Golem.de – Security Lesen Sie den originalen Artikel: Ransomware: Cyberangriff trifft Fraunhofer-Institut in Stuttgart

Read more →

Page 2125 of 4673
« 1 … 2,123 2,124 2,125 2,126 2,127 … 4,673 »

Pages

  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Apps
    • Telegram Channel

Recent Posts

  • IT Security News Hourly Summary 2025-12-26 00h : 1 posts December 26, 2025
  • IT Security News Daily Summary 2025-12-25 December 26, 2025
  • IT Security News Hourly Summary 2025-12-25 21h : 1 posts December 25, 2025
  • Five-year-old Fortinet FortiOS SSL VPN vulnerability actively exploited December 25, 2025
  • Google Now Allows Users to Change Their @gmail.com Email Address December 25, 2025
  • Unpatched FortiGate Security Flaw Allows Attackers to Bypass 2FA Controls December 25, 2025
  • IT Security News Hourly Summary 2025-12-25 18h : 1 posts December 25, 2025
  • Shinhan Card Faces Regulatory Review Over Internal Data Sharing Incident December 25, 2025
  • US Justice Department Seizes Web Domain Linked to Large-Scale Bank Account Takeover Fraud December 25, 2025
  • Best of 2025: New Akira Ransomware Decryptor Leans on Nvidia GPU Power December 25, 2025
  • Cookies Explained: Accept or Reject for Online Privacy December 25, 2025
  • ThreatsDay Bulletin: Stealth Loaders, AI Chatbot Flaws AI Exploits, Docker Hack, and 15 More Stories December 25, 2025
  • Best of 2025: UNC6395 and the Salesloft Drift Attack: Why Salesforce OAuth Integrations are a Growing Risk December 25, 2025
  • IT Security News Hourly Summary 2025-12-25 15h : 2 posts December 25, 2025
  • 100+ Cybersecurity Predictions 2026 for Industry Experts as the AI Adapted in the Wild December 25, 2025
  • Jaguar Land Rover Confirms Employee Data Theft After August 2025 Cyberattack December 25, 2025
  • The Complete Developer’s Guide to Essential Hackathon Software: 10 Categories That Separate Winners from Participants December 25, 2025
  • LastPass 2022 Breach Led to Years-Long Cryptocurrency Thefts, TRM Labs Finds December 25, 2025
  • Net-SNMP Vulnerability Enables Buffer Overflow and the Daemon to Crash December 25, 2025
  • IT Security News Hourly Summary 2025-12-25 12h : 1 posts December 25, 2025

Copyright © 2025 IT Security News. All Rights Reserved. The Magazine Basic Theme by bavotasan.com.

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}