IT Security News

Cybersecurity news and articles about information security, vulnerabilities, exploits, hacks, laws, spam, viruses, malware, breaches.

Main menu

Skip to content
  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Telegram Channel
CySecurity News - Latest Information Security and Hacking Incidents, EN

Malicious Software Compromises 26000 Devices Across New Zealand

2025-12-18 16:12

Thousands of devices have been infected with malware through New Zealand’s National Cyber Security Center, showing the persistent risk posed by credential-stealing cybercrime, which has been causing New Zealand’s National Cyber Security Center to notify individuals after an exposure.  About…

Read more →

CySecurity News - Latest Information Security and Hacking Incidents, EN

India Witnesses Sharp Surge in Cybercrime, Fraud Dominates NCRB 2023 Report

2025-12-18 16:12

  The cybercrime landscape in India has witnessed a drastic increase with NCRB data indicating cases jacking up from above 52,000 in 2021 to over 86,000 by 2023 led by fraud and online financial crime. Concurrently, threat intelligence shows that India is…

Read more →

EN, Help Net Security

Clipping Scripted Sparrow’s wings: Tracking a global phishing ring

2025-12-18 16:12

Between June 2024 and December 2025, Fortra analysts tracked a persistent business email compromise (BEC) operation that we have now classified as Scripted Sparrow. The group carries out well-crafted highly targeted phishing campaigns that masquerade as professional services firms to…

Read more →

EN, Help Net Security

Apiiro unveils AI SAST built on deep code analysis to eliminate false positives

2025-12-18 16:12

Apiiro introduced Apiiro AI SAST, a new approach to static application security testing (SAST) that automates code risk detection, validation and fixes with the precision and cognitive process of an expert application security engineer. Grounded in Apiiro’s patented Deep Code…

Read more →

hourly summary

IT Security News Hourly Summary 2025-12-18 15h : 12 posts

2025-12-18 16:12

12 posts were published in the last hour 14:2 : From the Hill: The AI-Cybersecurity Imperative in Financial Services 14:2 : Researchers Uncovered New Lazarus and Kimsuky Infrastructure with Active Tools and Tunnelling Nodes 14:2 : The ghosts of WhatsApp:…

Read more →

EN, Palo Alto Networks Blog

From the Hill: The AI-Cybersecurity Imperative in Financial Services

2025-12-18 16:12

Financial institutions face a dual mandate: embrace AI for cyber defense and secure AI with Secure AI by Design. Discover the path forward. The post From the Hill: The AI-Cybersecurity Imperative in Financial Services appeared first on Palo Alto Networks…

Read more →

Cyber Security News, EN

Researchers Uncovered New Lazarus and Kimsuky Infrastructure with Active Tools and Tunnelling Nodes

2025-12-18 16:12

A joint investigation by Hunt.io and the Acronis Threat Research Unit has exposed an extensive network of North Korean state-sponsored infrastructure, revealing fresh connections between Lazarus and Kimsuky operations across global campaigns. The research uncovered active tool-staging servers, credential-theft environments,…

Read more →

EN, Malwarebytes

The ghosts of WhatsApp: How GhostPairing hijacks accounts

2025-12-18 16:12

Criminals are tricking WhatsApp users into linking an attacker’s browser to their account using fake login pages and routine-looking prompts. This article has been indexed from Malwarebytes Read the original article: The ghosts of WhatsApp: How GhostPairing hijacks accounts

Read more →

EN, The Register - Security

FBI dismantles alleged $70M crypto laundering operation

2025-12-18 16:12

Justice Department claims unlicensed exchange funneled ransomware profits US feds have dismantled a crypto laundering service that they say helped cybercrooks wash tens of millions of dollars in dirty digital cash, seizing its servers and unsealing charges against an alleged…

Read more →

EN, Security Boulevard

What the Latest OpenAI Security Breach Reveals About the State of AI Protection

2025-12-18 16:12

A recent OpenAI-related breach via third-party provider Mixpanel exposes how AI supply chain vulnerabilities enable phishing, impersonation, and regulatory risk—even without direct system compromise. The post What the Latest OpenAI Security Breach Reveals About the State of AI Protection  appeared first on…

Read more →

EN, Help Net Security

Microsoft 365 users targeted in device code phishing attacks

2025-12-18 16:12

Attackers are targeting Microsoft 365 users with device code authorization phishing, a technique that fools users into approving access tokens, Proofpoint warns. The method abuses Microsoft’s OAuth 2.0 device authorization grant flow by presenting users with device codes that, when…

Read more →

EN, Help Net Security

AppGate extends zero trust to secure AI workloads with Agentic AI Core Protection

2025-12-18 16:12

AppGate announced the launch of Agentic AI Core Protection, a new capability within AppGate ZTNA designed to secure AI workloads deployed in enterprise core environments across on-prem and cloud venues. This innovation enables organizations to embrace AI-driven transformation while maintaining…

Read more →

EN, Malwarebytes

Chrome extension slurps up AI chats after users installed it for privacy

2025-12-18 15:12

The extension disclosed its AI data collection, but not in a way most users would recognize—or knowingly agree to. This article has been indexed from Malwarebytes Read the original article: Chrome extension slurps up AI chats after users installed it…

Read more →

EN, The Register - Security

NHS tech supplier probes cyberattack on internal systems

2025-12-18 15:12

Around 2,000 GP practices use its products An NHS tech supplier is investigating a cyberattack that affected its systems in the early hours of Sunday.… This article has been indexed from The Register – Security Read the original article: NHS…

Read more →

EN, securityweek

CISA Warns of Exploited Flaw in Asus Update Tool

2025-12-18 15:12

Tracked as CVE-2025-59374, the issue is a software backdoor implanted in Asus Live Update in a supply chain attack. The post CISA Warns of Exploited Flaw in Asus Update Tool appeared first on SecurityWeek. This article has been indexed from…

Read more →

EN, The Hacker News

North Korea-Linked Hackers Steal $2.02 Billion in 2025, Leading Global Crypto Theft

2025-12-18 15:12

Threat actors with ties to the Democratic People’s Republic of Korea (DPRK or North Korea) have been instrumental in driving a surge in global cryptocurrency theft in 2025, accounting for at least $2.02 billion out of more than $3.4 billion…

Read more →

EN, The Hacker News

ThreatsDay Bulletin: WhatsApp Hijacks, MCP Leaks, AI Recon, React2Shell Exploit and 15 More Stories

2025-12-18 15:12

This week’s ThreatsDay Bulletin tracks how attackers keep reshaping old tools and finding new angles in familiar systems. Small changes in tactics are stacking up fast, and each one hints at where the next big breach could come from. From…

Read more →

EN, Hackread – Cybersecurity News, Data Breaches, AI, and More

Why Organizations Need to Modify Their Cybersecurity Strategy for 2026

2025-12-18 15:12

Cybersecurity planning continues to advance as organisations integrate new software, cloud platforms, and digital tools into nearly every… This article has been indexed from Hackread – Cybersecurity News, Data Breaches, AI, and More Read the original article: Why Organizations Need…

Read more →

EN, Hackers Online Club

GhostPairing Attack: How Hackers Secretly Hijack WhatsApp

2025-12-18 15:12

A recent investigation by cybersecurity firm Gen Digital has uncovered a social engineering campaign known as “GhostPairing Attack.”… The post GhostPairing Attack: How Hackers Secretly Hijack WhatsApp appeared first on Hackers Online Club. This article has been indexed from Hackers…

Read more →

EN, www.infosecurity-magazine.com

North Korea Steals Over $2bn in Crypto in 2025

2025-12-18 15:12

Chainalysis warns North Korea continues to steal billions in crypto for its weapons program This article has been indexed from www.infosecurity-magazine.com Read the original article: North Korea Steals Over $2bn in Crypto in 2025

Read more →

DZone Security Zone, EN

Agentic AI in Cloud-Native Systems: Security and Architecture Patterns

2025-12-18 14:12

AI has long progressed past statistical models that generate forecasts or probabilities. The next generation of AI systems is agents, autonomous cloud-native systems capable of acting and intervening in an environment without human intervention or approval. Agents can provision infrastructure,…

Read more →

EN, The Hacker News

The Case for Dynamic AI-SaaS Security as Copilots Scale

2025-12-18 14:12

Within the past year, artificial intelligence copilots and agents have quietly permeated the SaaS applications businesses use every day. Tools like Zoom, Slack, Microsoft 365, Salesforce, and ServiceNow now come with built-in AI assistants or agent-like features. Virtually every major…

Read more →

EN, Hackread – Cybersecurity News, Data Breaches, AI, and More

FBI Seizes Crypto Laundering Hub E-Note Linked to Russian Admin

2025-12-18 14:12

The FBI and international police have shut down E-Note, a cryptocurrency exchange that laundered over $70 million for cybercriminals. Read about the indictment of a Russian and how the global task force ended his decade-long operation. This article has been…

Read more →

Cyber Security News, EN

Chinese-based Ink Dragon Compromises Asia and South America into European Government Networks

2025-12-18 14:12

Ink Dragon, a Chinese espionage group, has significantly expanded its operations from Southeast Asia and South America into European government networks. This advancement marks a notable shift in the threat actor’s strategic focus, utilizing a blend of well-engineered tools combined…

Read more →

Page 227 of 4871
« 1 … 225 226 227 228 229 … 4,871 »

Pages

  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Telegram Channel

Recent Posts

  • CISA pushes Federal agencies to retire end-of-support edge devices February 7, 2026
  • BeyondTrust Remote Access Products 0-Day Vulnerability Allows Remote Code Execution February 7, 2026
  • OpenClaw Partners with VirusTotal to Secure AI Agent Skill Marketplace February 7, 2026
  • OpenClaw v2026.2.6 Released With Support for Opus 4.6, GPT-5.3-Codex and Safety Scanner February 7, 2026
  • IT Security News Hourly Summary 2026-02-07 09h : 2 posts February 7, 2026
  • Cybercriminals Use Malicious Cybersquatting Attacks to Distribute Malware and Hijack Data February 7, 2026
  • nmapUnleashed Makes Nmap Scanning More Comfortable and Effective February 7, 2026
  • Hackers Exploit Free Firebase Accounts to Launch Phishing Campaigns February 7, 2026
  • Hackers Exploit Cybersquatting Tactics to Spread Malware and Steal Sensitive Information February 7, 2026
  • Cybersecurity Today: Month In Review – Microsoft Patch Fails, Fortinet Issues, and AI Risks February 7, 2026
  • Claude Opus 4.6 Released with Improved Cybersecurity, Validating 500+ high-severity Vulnerabilities February 7, 2026
  • Analysis of active exploitation of SolarWinds Web Help Desk February 7, 2026
  • IT Security News Hourly Summary 2026-02-07 03h : 1 posts February 7, 2026
  • Substack – 663,121 breached accounts February 7, 2026
  • Novel Technique to Detect Cloud Threat Actor Operations February 7, 2026
  • Secure MCP servers to safeguard AI and corporate data February 7, 2026
  • ICE Agent’s ‘Dragging’ Case May Help Expose Evidence in Renee Good Shooting February 7, 2026
  • IT Security News Hourly Summary 2026-02-07 00h : 3 posts February 7, 2026
  • IT Security News Daily Summary 2026-02-06 February 7, 2026
  • ICE Agent’s ‘Dragging’ Case May Help Expose Evidence in Renee Good Shooting February 7, 2026

Copyright © 2026 IT Security News. All Rights Reserved. The Magazine Basic Theme by bavotasan.com.

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}