IT Security News

Cybersecurity news and articles about information security, vulnerabilities, exploits, hacks, laws, spam, viruses, malware, breaches.

Main menu

Skip to content
  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Telegram Channel
EN, Malwarebytes

The DeepSeek controversy: Authorities ask where does the data come from and how safe is it?

2025-01-30 15:01

The sudden rise of DeepSeek has raised questions of data origin, data destination, and the security of the new AI model. This article has been indexed from Malwarebytes Read the original article: The DeepSeek controversy: Authorities ask where does the…

Read more →

EN, Security News | VentureBeat

These Yale and Berkeley dropouts just raised $2 million to build an AI assistant that could rival OpenAI

2025-01-30 15:01

Y Combinator-backed startup Martin AI secures $2M seed funding to challenge Siri and Google with its innovative personal AI assistant, built by 19-year-old founders to revolutionize how consumers interact with AI through custom memory architecture and multi-channel accessibility. This article…

Read more →

EN, The Register - Security

Ransomware attack at New York blood services provider – donors turned away during shortage crisis

2025-01-30 15:01

400 hospitals and med centers across 15 states rely on its products New York Blood Center Enterprises (NYBCe) is currently in its fifth day of handling a ransomware attack that has led to system disruption.… This article has been indexed…

Read more →

EN, securityweek

US Cyber Agency’s Future Role in Elections Remains Murky Under the Trump Administration

2025-01-30 15:01

President Donald Trump has yet to name anyone to lead the U.S. Cybersecurity and Infrastructure Security. The post US Cyber Agency’s Future Role in Elections Remains Murky Under the Trump Administration appeared first on SecurityWeek. This article has been indexed…

Read more →

EN, Help Net Security

Legit Security unveils root cause remediation capabilities to reduce AppSec risk

2025-01-30 15:01

Legit Security announced new root cause remediation capabilities, allowing teams to address multiple software vulnerabilities with one practical step. By pinpointing the choke points where remediation actions can address multiple issues at once, security teams accelerate risk reduction and reduce…

Read more →

EN, www.infosecurity-magazine.com

Syncjacking Attack Enables Full Browser and Device Takeover

2025-01-30 15:01

SquareX researchers warn that browser syncjacking could lead to full browser and device hijacking This article has been indexed from www.infosecurity-magazine.com Read the original article: Syncjacking Attack Enables Full Browser and Device Takeover

Read more →

Cyber Security Headlines, EN

Tenable acquires Vulcan Cyber, Chinese and Iranian hackers are using U.S. AI, US Navy bans use of DeepSeek

2025-01-30 15:01

Tenable acquiring Israel’s Vulcan Cyber in $150 million deal Chinese and Iranian Hackers Are Using U.S. AI Products to Bolster Cyberattacks U.S. Navy bans use of DeepSeek due to ‘security and ethical concerns’   Huge thanks to our sponsor, Conveyor…

Read more →

hourly summary

IT Security News Hourly Summary 2025-01-30 15h : 17 posts

2025-01-30 15:01

17 posts were published in the last hour 13:37 : The DeepSeek controversy: Authorities ask where the data comes from and where it goes 13:37 : Lightning AI Studio Vulnerability Allowed RCE via Hidden URL Parameter 13:37 : Authorities Seize…

Read more →

EN, Malwarebytes

The DeepSeek controversy: Authorities ask where the data comes from and where it goes

2025-01-30 14:01

Authorities and users are asking questions about the new AI model DeepSeek. Where did the data come from and how safe is it? This article has been indexed from Malwarebytes Read the original article: The DeepSeek controversy: Authorities ask where…

Read more →

EN, The Hacker News

Lightning AI Studio Vulnerability Allowed RCE via Hidden URL Parameter

2025-01-30 14:01

Cybersecurity researchers have disclosed a critical security flaw in the Lightning AI Studio development platform that, if successfully exploited, could allow for remote code execution. The vulnerability, rated a CVSS score of 9.4, enables “attackers to potentially execute arbitrary commands…

Read more →

EN, The Hacker News

Authorities Seize Domains of Popular Hacking Forums in Major Cybercrime Crackdown

2025-01-30 14:01

An international law enforcement operation has dismantled the domains associated with various online platforms linked to cybercrime such as Cracked, Nulled, Sellix, and StarkRDP. The effort has targeted the following domains – www.cracked.io www.nulled.to www.mysellix.io www.sellix.io www.starkrdp.io Visitors to these…

Read more →

EN, Security News | TechCrunch

DeepSeek exposed internal database containing chat histories and sensitive data

2025-01-30 14:01

The internal DeepSeek database was exposed to the internet without a password. © 2024 TechCrunch. All rights reserved. For personal use only. This article has been indexed from Security News | TechCrunch Read the original article: DeepSeek exposed internal database…

Read more →

Cyber Security News, EN

North Korean APT Lazarus Compromises Developers via Malicious NPM Packages

2025-01-30 14:01

The North Korean state-sponsored hacking group Lazarus has been implicated in a sophisticated supply chain attack targeting developers through malicious Node Package Manager (NPM) packages. Security researchers have identified the package, postcss-optimizer, as a key vector for delivering malware to…

Read more →

Cyber Security News, EN

Hackers Use 10,000 WordPress Sites To Deliver Malware To macOS and Microsoft Systems

2025-01-30 14:01

A sophisticated cyberattack has compromised over 10,000 WordPress websites, delivering cross-platform malware to unsuspecting users. The campaign exploits outdated WordPress versions and plugins, redirecting visitors to fake browser update pages that deploy malicious software targeting both macOS and Windows systems.…

Read more →

EN, securityweek

TeamViewer Patches High-Severity Vulnerability in Windows Applications

2025-01-30 14:01

TeamViewer has released patches for a high-severity elevation of privilege vulnerability in its client and host applications for Windows. The post TeamViewer Patches High-Severity Vulnerability in Windows Applications appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…

Read more →

DE, heise Security

Datenleck in Reha-Kliniken: Hunderttausende Patienten betroffen

2025-01-30 14:01

Ein Datenleck betrifft potenziell hunderttausende Patienten der ZAR-Reha-Kliniken in ganz Deutschland. Abrufbar waren unter anderem hochsensible Patientendaten. Dieser Artikel wurde indexiert von heise Security Lesen Sie den originalen Artikel: Datenleck in Reha-Kliniken: Hunderttausende Patienten betroffen

Read more →

EN, SANS Internet Storm Center, InfoCON: green

PCAPs or It Didn?t Happen: Exposing an Old Netgear Vulnerability Still Active in 2025 [Guest Diary], (Thu, Jan 30th)

2025-01-30 14:01

[This is a Guest Diary by David Watson, an ISC intern as part of the SANS.edu BACS program] This article has been indexed from SANS Internet Storm Center, InfoCON: green Read the original article: PCAPs or It Didn?t Happen: Exposing…

Read more →

Cyber Defense Magazine, EN

Bridging The Manufacturing Security “Air Gap”

2025-01-30 14:01

In the world of manufacturing, one security measure has stood out above all others: the “air gap.” This technique, which isolates technology from the outside world, once provided a reasonable… The post Bridging The Manufacturing Security “Air Gap” appeared first…

Read more →

EN, GBHackers Security | #1 Globally Trusted Cyber Security News Platform

Lazarus Group Drop Malicious NPM Packages in Developers Systems Remotely

2025-01-30 14:01

In a recent discovery by Socket researchers, a malicious npm package named postcss-optimizer has been identified as an operation spearheaded by the North Korean state-sponsored group, Lazarus Advanced Persistent Threat (APT). Tied to past campaigns and employing code-level similarities, the…

Read more →

EN, Security | TechRepublic

How to Use Keeper Password Manager: A Comprehensive Guide

2025-01-30 14:01

This step-by-step guide shows you how to set up Keeper Password Manager and use it to secure and organize your passwords. This article has been indexed from Security | TechRepublic Read the original article: How to Use Keeper Password Manager:…

Read more →

EN, Security News | TechCrunch

US blood donation giant warns of disruption after ransomware attack

2025-01-30 14:01

New York Blood Center said it does not have a “specific timetable for system restoration” following the attack, which has led to canceled appointments and delays © 2024 TechCrunch. All rights reserved. For personal use only. This article has been…

Read more →

EN, Security Affairs

PHP package Voyager flaws expose to one-click RCE exploits

2025-01-30 14:01

The open-source PHP package Voyager is affected by three vulnerabilities that could be exploited to achieve one-click remote code execution on affected instances. Voyager is a popular open-source PHP package for managing Laravel applications, offering an admin interface, BREAD operations, media, and…

Read more →

EN, Schneier on Security

Fake Reddit and WeTransfer Sites are Pushing Malware

2025-01-30 14:01

There are thousands of fake Reddit and WeTransfer webpages that are pushing malware. They exploit people who are using search engines to search sites like Reddit. Unsuspecting victims clicking on the link are taken to a fake WeTransfer site that…

Read more →

EN, Palo Alto Networks Blog

Cortex Is the First SOC Platform to Achieve FedRAMP High Authorization

2025-01-30 14:01

Cortex achieves FedRAMP High Authorization, becoming the first AI-driven SOC platform to meet the highest government security standards. The post Cortex Is the First SOC Platform to Achieve FedRAMP High Authorization appeared first on Palo Alto Networks Blog. This article…

Read more →

Page 2175 of 4871
« 1 … 2,173 2,174 2,175 2,176 2,177 … 4,871 »

Pages

  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Telegram Channel

Recent Posts

  • Cybercriminals Use Malicious Cybersquatting Attacks to Distribute Malware and Hijack Data February 7, 2026
  • nmapUnleashed Makes Nmap Scanning More Comfortable and Effective February 7, 2026
  • Hackers Exploit Free Firebase Accounts to Launch Phishing Campaigns February 7, 2026
  • Hackers Exploit Cybersquatting Tactics to Spread Malware and Steal Sensitive Information February 7, 2026
  • Cybersecurity Today: Month In Review – Microsoft Patch Fails, Fortinet Issues, and AI Risks February 7, 2026
  • Claude Opus 4.6 Released with Improved Cybersecurity, Validating 500+ high-severity Vulnerabilities February 7, 2026
  • Analysis of active exploitation of SolarWinds Web Help Desk February 7, 2026
  • IT Security News Hourly Summary 2026-02-07 03h : 1 posts February 7, 2026
  • Substack – 663,121 breached accounts February 7, 2026
  • Novel Technique to Detect Cloud Threat Actor Operations February 7, 2026
  • Secure MCP servers to safeguard AI and corporate data February 7, 2026
  • ICE Agent’s ‘Dragging’ Case May Help Expose Evidence in Renee Good Shooting February 7, 2026
  • IT Security News Hourly Summary 2026-02-07 00h : 3 posts February 7, 2026
  • IT Security News Daily Summary 2026-02-06 February 7, 2026
  • ICE Agent’s ‘Dragging’ Case May Help Expose Evidence in Renee Good Shooting February 7, 2026
  • Asian Cyber Espionage Campaign Breached 37 Countries February 7, 2026
  • Why organizations need cloud attack surface management February 6, 2026
  • TeamPCP and the Rise of Cloud-Native Cybercrime February 6, 2026
  • I Am in the Epstein Files February 6, 2026
  • Transparent Tribe Hacker Group Attacking India’s Startup Ecosystem February 6, 2026

Copyright © 2026 IT Security News. All Rights Reserved. The Magazine Basic Theme by bavotasan.com.

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}