IT Security News

Cybersecurity news and articles about information security, vulnerabilities, exploits, hacks, laws, spam, viruses, malware, breaches.

Main menu

Skip to content
  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Apps
    • Telegram Channel
EN, The Hacker News

HubPhish Exploits HubSpot Tools to Target 20,000 European Users for Credential Theft

2024-12-18 17:12

Cybersecurity researchers have disclosed a new phishing campaign that has targeted European companies with an aim to harvest account credentials and take control of the victims’ Microsoft Azure cloud infrastructure. The campaign has been codenamed HubPhish by Palo Alto Networks…

Read more →

Cybersecurity Insiders, EN

IntelBroker released data related to Cisco stolen from Cloud Instance

2024-12-18 16:12

IntelBroker, a notorious hacker group based in Serbia, has a history of breaching the servers of major companies like Apple Inc., Facebook Marketplace, AMD, and Zscaler. Recently, they released approximately 2.9 GB of data, claiming it to be from Cisco’s…

Read more →

EN, Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News

Hackers Exploit Linux eBPF Tech to Host Malware on GitHub and Blogs

2024-12-18 16:12

KEY SUMMARY POINTS Cybersecurity researchers Dr. Web have uncovered a new and active Linux malware campaign aimed at… This article has been indexed from Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News Read the original article: Hackers Exploit Linux…

Read more →

EN, securityweek

Recorded Future Tagged as ‘Undesirable’ in Russia

2024-12-18 16:12

The Russian government accuses the Mastercard-owned firm of participating in the collection and analysis of data on the actions of the Russia’s armed forces.  The post Recorded Future Tagged as ‘Undesirable’ in Russia appeared first on SecurityWeek. This article has…

Read more →

EN, www.infosecurity-magazine.com

US Government Issues Cloud Security Requirements for Federal Agencies

2024-12-18 16:12

A CISA Directive sets out actions all US federal agencies must take to identify and secure cloud tenants in their environments This article has been indexed from www.infosecurity-magazine.com Read the original article: US Government Issues Cloud Security Requirements for Federal…

Read more →

DE, heise Security

Phishing-Masche nimmt Nutzer von Google-Kalender ins Visier

2024-12-18 16:12

Cyberkriminelle nutzen laut einer Analyse von Sicherheitsforschern offenbar verstärkt Google-Kalender-Invites, um Internetnutzer auf Phishingseiten zu locken. Dieser Artikel wurde indexiert von heise Security Lesen Sie den originalen Artikel: Phishing-Masche nimmt Nutzer von Google-Kalender ins Visier

Read more →

EN, Latest stories for ZDNet in Security

The open-source tools that could disrupt the entire IT incident management market

2024-12-18 16:12

Open-source tools like Grafana Labs and AI-driven AIOps are shaking up incident management, challenging PagerDuty and streamlining IT problem-solving and code fixes. Here’s why it matters. This article has been indexed from Latest stories for ZDNET in Security Read the…

Read more →

EN, eSecurity Planet

Video: Hackers Bypass TSA Security with SQL Injection

2024-12-18 16:12

We reveal a TSA security flaw that allowed hackers to bypass protocols and access cockpits. Explore the implications of this breach and what can be done. The post Video: Hackers Bypass TSA Security with SQL Injection appeared first on eSecurity…

Read more →

CySecurity News - Latest Information Security and Hacking Incidents, EN

Rhode Island Residents Warned of Cyberattack Targeting State Government

2024-12-18 16:12

  Rhode Island officials have issued an urgent advisory for residents to take immediate precautions following a significant cyberattack on the state government. Authorities are warning that private data, including Social Security and bank account details, may soon be exposed…

Read more →

CySecurity News - Latest Information Security and Hacking Incidents, EN

Ymir Ransomware: A Rising Threat in the Cybersecurity Landscape

2024-12-18 16:12

  < p style=”text-align: justify;”>The evolving threat landscape continues to present new challenges, with NCC Group’s latest Threat Pulse report uncovering the emergence of Ymir ransomware. This new ransomware strain showcases the growing collaboration among cybercriminals to execute highly sophisticated…

Read more →

CySecurity News - Latest Information Security and Hacking Incidents, EN

Malware Found Preinstalled on 30,000 Android Devices in Germany

2024-12-18 16:12

  A concerning cybersecurity issue has surfaced in Germany, where investigators uncovered that nearly 30,000 Android devices were sold with preinstalled malware. The malware, dubbed “BadBox,” resides in the device firmware and affects various internet-enabled devices, including digital picture frames…

Read more →

CySecurity News - Latest Information Security and Hacking Incidents, EN

Google Warns Users About Privacy Risks Posed by Certain Android Apps

2024-12-18 16:12

  It has recently been reported by a leading media outlet that more than 11 million Android devices have been infected with malicious software known as the Necro Trojan, which has crept into phones and tablets through unofficially modified applications,…

Read more →

DE, Golem.de - Security

DSGVO-Verstoß: Netflix soll 4,75 Millionen Euro Strafe zahlen

2024-12-18 15:12

Weil Netflix nicht ausreichend über die Verwendung der gesammelten Kundendaten informiert habe, soll der Streaminganbieter nun eine Strafe zahlen. (Netflix, Datenschutz) Dieser Artikel wurde indexiert von Golem.de – Security Lesen Sie den originalen Artikel: DSGVO-Verstoß: Netflix soll 4,75 Millionen Euro…

Read more →

Blog, EN

The Benefits of Serverless Computing Architecture

2024-12-18 15:12

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: The Benefits of Serverless Computing Architecture

Read more →

EN, Malwarebytes

AI-generated malvertising “white pages” are fooling detection engines

2024-12-18 15:12

With AI, it’s not only the sky that’s the limit, it’s the entire universe. This article has been indexed from Malwarebytes Read the original article: AI-generated malvertising “white pages” are fooling detection engines

Read more →

EN, www.infosecurity-magazine.com

Phishing Attacks Double in 2024

2024-12-18 15:12

SlashNext reports a 202% increase in overall phishing messages and a 703% surge in credential-based phishing attacks in 2024 This article has been indexed from www.infosecurity-magazine.com Read the original article: Phishing Attacks Double in 2024

Read more →

hourly summary

IT Security News Hourly Summary 2024-12-18 15h : 24 posts

2024-12-18 15:12

24 posts were published in the last hour 14:4 : Apple gibt Look-Around auch für alle ohne iPhone frei: Wie gut ist die Alternative zu Google Street View? 14:4 : Outlook nervt Windows-User mit Login-Fehler: Wie ihr das Problem bis…

Read more →

DE, t3n.de - Software & Entwicklung

Apple gibt Look-Around auch für alle ohne iPhone frei: Wie gut ist die Alternative zu Google Street View?

2024-12-18 15:12

Apple arbeitet schon seit geraumer Zeit an einem Konkurrenzprodukt zu Googles Street View. Jetzt könnt ihr Look Around in der Web-Version nutzen – unabhängig von iPhone, iPad und Mac. Was damit möglich ist, erfahrt ihr hier. Dieser Artikel wurde indexiert…

Read more →

DE, t3n.de - Software & Entwicklung

Outlook nervt Windows-User mit Login-Fehler: Wie ihr das Problem bis zu einem Fix umgehen könnt

2024-12-18 15:12

Einige Outlook-Nutzer:innen berichten von einem ärgerlichen Problem. Unter Windows fordert sie das Mail-Programm immer wieder zur Neuanmeldung auf. Jetzt reagiert Microsoft auf das Problem – zum zweiten Mal. Dieser Artikel wurde indexiert von t3n.de – Software & Entwicklung Lesen Sie…

Read more →

DE, t3n.de - Software & Entwicklung

Der Traum vom Ganzkörper-Avatar: Die Technologie ist beeindruckend, wirft aber auch Fragen auf

2024-12-18 15:12

Mit der neuen Technologie von Synthesia kann man von sich einen digitalen Klon erstellen lassen. Sie übernehmen Gestik, Mimik und die Stimme des menschlichen Vorbilds. Doch von Deepfakes möchte das Startup nicht sprechen. Dieser Artikel wurde indexiert von t3n.de –…

Read more →

DE, t3n.de - Software & Entwicklung

Fürs papierlose Büro: Diese Funktion in Google Drive kann dir jetzt besser helfen

2024-12-18 15:12

Der Dokumentenscanner von Google Drive ist eine Alternative zu herkömmlichen Scannern. Allerdings treten dabei häufiger Schattierungen auf. Ein Update soll dieses und andere Probleme beheben. Dieser Artikel wurde indexiert von t3n.de – Software & Entwicklung Lesen Sie den originalen Artikel:…

Read more →

DE, Offizieller Blog von Kaspersky

Welchen verschlüsselte Cloud-Speicher soll ich wählen? | Offizieller Blog von Kaspersky

2024-12-18 15:12

Angriffe auf einen verschlüsselten Cloud-Speicher: So wählst Du eine sichere Alternative zu Dropbox oder OneDrive Dieser Artikel wurde indexiert von Offizieller Blog von Kaspersky Lesen Sie den originalen Artikel: Welchen verschlüsselte Cloud-Speicher soll ich wählen? | Offizieller Blog von Kaspersky

Read more →

EN, Palo Alto Networks Blog

Cybersecurity Trends on the Horizon Across APAC for 2025 and Beyond

2024-12-18 15:12

As we look ahead to 2025, businesses across APAC are expected to accelerate their adoption of AI in cybersecurity to combat evolving AI-powered threats. The post Cybersecurity Trends on the Horizon Across APAC for 2025 and Beyond appeared first on…

Read more →

EN, Security Boulevard

A new playground: Malicious campaigns proliferate from VSCode to npm

2024-12-18 15:12

ReversingLabs researchers have been monitoring multiple public repositories over the past few years. Recently, our team has expanded its threat hunting efforts to VSCode Marketplace — and the researchers started to see an increasing amount of malicious activity.  In the…

Read more →

Page 2201 of 4678
« 1 … 2,199 2,200 2,201 2,202 2,203 … 4,678 »

Pages

  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Apps
    • Telegram Channel

Recent Posts

  • Accused data thief threw MacBook into a river to destroy evidence December 29, 2025
  • Hackers Claim Breach of WIRED Database Containing 2.3 million Subscriber Records December 29, 2025
  • Sauron, the high-end home security startup for “super premium” customers, plucks a new CEO out of Sonos December 29, 2025
  • IT Security News Hourly Summary 2025-12-29 03h : 1 posts December 29, 2025
  • What are Auth Tokens? Complete Guide to Token-Based Authentication & Implementation December 29, 2025
  • How can businesses trust AI to handle sensitive data December 29, 2025
  • Can AI-driven cloud security assure full data protection December 29, 2025
  • What support is available for implementing Agentic AI systems December 29, 2025
  • Is the security for Non-Human Identities getting better December 29, 2025
  • IT Security News Hourly Summary 2025-12-29 00h : 2 posts December 29, 2025
  • IT Security News Weekly Summary 52 December 29, 2025
  • IT Security News Daily Summary 2025-12-28 December 29, 2025
  • NDSS 2025 – Automated Data Protection For Embedded Systems Via Data Flow Based Compartmentalization December 28, 2025
  • IT Security News Hourly Summary 2025-12-28 21h : 1 posts December 28, 2025
  • Condé Nast faces major data breach: 2.3M WIRED records leaked, 40M more at risk December 28, 2025
  • Amazon Says It Has Disrupted GRU-Linked Cyber Operations Targeting Cloud Customers December 28, 2025
  • IT Security News Hourly Summary 2025-12-28 18h : 1 posts December 28, 2025
  • MongoBleed (CVE-2025-14847) Now Exploited in the Wild: MongoDB Servers at Critical Risk December 28, 2025
  • Hypervisor Ransomware Attacks Surge as Threat Actors Shift Focus to Virtual Infrastructure December 28, 2025
  • Death, torture, and amputation: How cybercrime shook the world in 2025 December 28, 2025

Copyright © 2025 IT Security News. All Rights Reserved. The Magazine Basic Theme by bavotasan.com.

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}