IT Security News

Cybersecurity news and articles about information security, vulnerabilities, exploits, hacks, laws, spam, viruses, malware, breaches.

Main menu

Skip to content
  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Apps
    • Telegram Channel
EN, Security News | TechCrunch

The TechCrunch Cyber Glossary

2024-12-23 15:12

This glossary includes the most common terms and expressions TechCrunch uses in our security reporting, and explanations of how — and why — we use them. © 2024 TechCrunch. All rights reserved. For personal use only. This article has been…

Read more →

EN, The Register - Security

Suspected LockBit dev, facing US extradition, ‘did it for the money’

2024-12-23 15:12

Dual Russian-Israeli national arrested in August An alleged LockBit ransomware developer is in custody in Israel and awaiting extradition to the United States.… This article has been indexed from The Register – Security Read the original article: Suspected LockBit dev,…

Read more →

EN, Security Boulevard

Reflections on a Tumultuous 2024: How Cybersecurity and DevSecOps Took Center Stage

2024-12-23 15:12

As we near the end of 2024, one fact is clear: It’s been another bang up year with an unprecedented amount of security incidents. All the usual suspects and some new ones have thrown things around. Resiliency is the name…

Read more →

EN, Security Boulevard

Best of 2024: Massive Online Shopping Scam Racks Up 850,000 Victims

2024-12-23 15:12

Chinese crooks are running a global network of more than 75,000 fake online shops to steal credit card data and process fraudulent payments. The post Best of 2024: Massive Online Shopping Scam Racks Up 850,000 Victims appeared first on Security…

Read more →

EN, Security Boulevard

Best of 2024: National Public Data Sued for Hack that Exposed Data of 2.9 Billion People

2024-12-23 15:12

National Public Data, a background check company that collects sensitive personal information, is facing a class-action legal complaint for allowing the data from 2.9 billion people to be stolen in a breach and later sold on the dark web for…

Read more →

EN, The Hacker News

⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips

2024-12-23 15:12

The online world never takes a break, and this week shows why. From ransomware creators being caught to hackers backed by governments trying new tricks, the message is clear: cybercriminals are always changing how they attack, and we need to…

Read more →

EN, The Hacker News

AI Could Generate 10,000 Malware Variants, Evading Detection in 88% of Case

2024-12-23 15:12

Cybersecurity researchers have found that it’s possible to use large language models (LLMs) to generate new variants of malicious JavaScript code at scale in a manner that can better evade detection. “Although LLMs struggle to create malware from scratch, criminals…

Read more →

Check Point Blog, EN

New Opportunities for Communication Service Providers

2024-12-23 14:12

The internet is the ‘new’ corporate network, and Communication Service Providers (CSPs) are well-positioned to enable their clients’ ongoing digital transformations. The emergence of 5G and the standardization of work from anywhere are only reinforcing this shift. CSPs have the…

Read more →

EN, Security | TechRepublic

Best Patch Management Software (2024): Compare Features & Pricing

2024-12-23 14:12

Patch management software ensures that known vulnerabilities are patched efficiently to prevent breaches while streamlining IT workflows. Find the best patch management solution for your business. This article has been indexed from Security | TechRepublic Read the original article: Best…

Read more →

EN, Security | TechRepublic

Navigating the Cyber Threat Landscape: Lessons Learned & What’s Ahead

2024-12-23 14:12

A look at the cyber threat landscape of 2024, including major breaches and trends. An expert weighs in on key lessons and what to expect in 2025. This article has been indexed from Security | TechRepublic Read the original article:…

Read more →

DE, heise Security

Webbrowser: Neuer Spam-Schutz auf KI-Basis in Chrome und Edge gesichtet

2024-12-23 14:12

Um Nutzer vor betrügerischen Websites zu warnen, haben Chrome und Edge neuerdings einen KI-Schutz an Bord. Noch ist das Feature aber nicht standardmäßig aktiv. Dieser Artikel wurde indexiert von heise Security Lesen Sie den originalen Artikel: Webbrowser: Neuer Spam-Schutz auf…

Read more →

DE, Golem.de - Security

Millionenschaden: Pastor bestiehlt Kirchgänger mit Krypto-Scam

2024-12-23 14:12

Der Mann soll über 1.500 Personen mit einem Krypto-Schneeballsystem um mindestens 5,9 Millionen US-Dollar betrogen haben. Nun geht der Fall vor Gericht. (Kryptowährung, Börse) Dieser Artikel wurde indexiert von Golem.de – Security Lesen Sie den originalen Artikel: Millionenschaden: Pastor bestiehlt…

Read more →

EN, Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News

Why Ethereum Will Be a Key Platform for Businesses in the Future

2024-12-23 14:12

Explore how Ethereum revolutionizes industries with smart contracts, DeFi, NFTs, gaming, DAOs, and sustainability, shaping the future of… This article has been indexed from Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News Read the original article: Why Ethereum Will…

Read more →

Cyber Defense Magazine, EN

Securing the OT Stage: NIS2, CRA, and IEC62443 Take Center Spotlight

2024-12-23 14:12

In the dynamic landscape of Operational Technology (OT), robust cybersecurity measures are paramount. As the digital transformation accelerates, protecting critical infrastructure becomes more challenging. Fortunately, three key standards—NIS2, CRA, and… The post Securing the OT Stage: NIS2, CRA, and IEC62443…

Read more →

EN, Help Net Security

NFT scammers charged for stealing $22 million through “rug pulls”

2024-12-23 14:12

A six-count indictment was unsealed on Friday in Los Angeles charging two California men with defrauding investors of more than $22 million in cryptocurrency through a series of digital asset project “rug pulls,” a type of fraud scheme in which…

Read more →

DE, heise Security

Webbrowser: Chrome und Edge sollen mittels KI vor Spam-Seiten warnen

2024-12-23 13:12

Um Nutzer vor betrügerischen Websites zu warnen, haben Chrome und Edge neuerdings einen KI-Schutz an Bord. Noch ist das Feature aber nicht standardmäßig aktiv. Dieser Artikel wurde indexiert von heise Security Lesen Sie den originalen Artikel: Webbrowser: Chrome und Edge…

Read more →

EN, Silicon UK

OpenAI Starts Testing New ‘Reasoning’ AI Model

2024-12-23 13:12

OpenAI begins safety testing of new model o3 that uses ‘reasoning’ process to ensure reliability in complex programming, maths tasks This article has been indexed from Silicon UK Read the original article: OpenAI Starts Testing New ‘Reasoning’ AI Model

Read more →

EN, Silicon UK

US Finalises Billions In Awards To Samsung, Texas Instruments

2024-12-23 13:12

US finalises $4.7bn award to Samsung Electronics, $1.6bn to Texas Instruments to boost domestic chip manufacturing This article has been indexed from Silicon UK Read the original article: US Finalises Billions In Awards To Samsung, Texas Instruments

Read more →

EN, securityweek

5.6 Million Impacted by Ransomware Attack on Healthcare Giant Ascension

2024-12-23 13:12

Ascension Health says the personal, medical, and payment information of 5.6 million people was stolen in a May 2024 ransomware attack. The post 5.6 Million Impacted by Ransomware Attack on Healthcare Giant Ascension appeared first on SecurityWeek. This article has…

Read more →

DE, Golem.de - Security

Dune Prophecy: Enttäuschend bis zum Schluss

2024-12-23 13:12

In Dune: Prophecy passiert erst kaum Spannendes, dann in der letzten Folge alles Wichtige auf einmal. Doch auch das Staffelfinale enttäuscht. (Dune, Streaming) Dieser Artikel wurde indexiert von Golem.de – Security Lesen Sie den originalen Artikel: Dune Prophecy: Enttäuschend bis…

Read more →

DE, Golem.de - Security

Eurofighter Typhoon: Erneut geheime Daten im War-Thunder-Forum

2024-12-23 13:12

Um seinen Standpunkt in einer Diskussion um Radarfähigkeiten zu beweisen, veröffentlichte ein Nutzer eingeschränkt zugängliches Material. (Militär, Politik) Dieser Artikel wurde indexiert von Golem.de – Security Lesen Sie den originalen Artikel: Eurofighter Typhoon: Erneut geheime Daten im War-Thunder-Forum

Read more →

EN, Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News

Supply Chain Attack Hits Rspack, Vant npm Packages with Monero Miner

2024-12-23 13:12

Popular npm packages, Rspack and Vant, were recently compromised with malicious code. Learn about the attack, the impact, and how to protect your projects from similar threats. This article has been indexed from Hackread – Latest Cybersecurity, Tech, Crypto &…

Read more →

EN, Security News | TechCrunch

WhatsApp scores historic victory against NSO Group in long-running spyware hacking case

2024-12-23 13:12

A US judge ruled that the Israeli spyware maker breached hacking laws by using WhatsApp to infect devices with Pegasus © 2024 TechCrunch. All rights reserved. For personal use only. This article has been indexed from Security News | TechCrunch…

Read more →

EN, The Hacker News

Rockstar2FA Collapse Fuels Expansion of FlowerStorm Phishing-as-a-Service

2024-12-23 13:12

An interruption to the phishing-as-a-service (PhaaS) toolkit called Rockstar 2FA has led to a rapid uptick in activity from another nascent offering named FlowerStorm. “It appears that the [Rockstar2FA] group running the service experienced at least a partial collapse of…

Read more →

Page 2175 of 4677
« 1 … 2,173 2,174 2,175 2,176 2,177 … 4,677 »

Pages

  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Apps
    • Telegram Channel

Recent Posts

  • WIRED – 2,364,431 breached accounts December 28, 2025
  • IT Security News Hourly Summary 2025-12-28 03h : 1 posts December 28, 2025
  • ISC Stormcast For Sunday, December 28th, 2025 https://isc.sans.edu/podcastdetail/9750, (Sun, Dec 28th) December 28, 2025
  • How impenetrable are secrets vaulting solutions December 28, 2025
  • Are current PAM solutions capable of handling NHIs December 28, 2025
  • What does a free to implement AI compliance strategy look like December 28, 2025
  • IT Security News Hourly Summary 2025-12-28 00h : 1 posts December 28, 2025
  • IT Security News Daily Summary 2025-12-27 December 28, 2025
  • IT Security News Hourly Summary 2025-12-27 21h : 1 posts December 27, 2025
  • Meet the team that investigates when journalists and activists get hacked with government spyware December 27, 2025
  • LangChain core vulnerability allows prompt injection and data exposure December 27, 2025
  • Hacker Leaks 2.3M Wired.com Records, Claims 40M-User Condé Nast Breach December 27, 2025
  • Hackers Compromise Trust Wallet Chrome Extension, Users Claim Millions Stolen December 27, 2025
  • NDSS 2025 – CounterSEVeillance: Performance-Counter Attacks On AMD SEV-SNP December 27, 2025
  • FCC Tightens Rules on Foreign-Made Drones to Address U.S. Security Risks December 27, 2025
  • 700Credit Data Breach Exposes Personal Information of Over 5.6 Million Consumers December 27, 2025
  • IT Security News Hourly Summary 2025-12-27 15h : 4 posts December 27, 2025
  • What “Verified Identity Data” Means for APIs — and How to Evaluate a Data Partner December 27, 2025
  • GhostPairing Attack Puts Millions of WhatsApp Users at Risk December 27, 2025
  • Askul Confirms RansomHouse Ransomware Breach Exposed 740,000 Records December 27, 2025

Copyright © 2025 IT Security News. All Rights Reserved. The Magazine Basic Theme by bavotasan.com.

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}