IT Security News

Cybersecurity news and articles about information security, vulnerabilities, exploits, hacks, laws, spam, viruses, malware, breaches.

Main menu

Skip to content
  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Telegram Channel
DE, t3n.de - Software & Entwicklung

Sam Altman: OpenAI bewegt sich Richtung Superintelligenz

2025-01-06 15:01

Zum Jahreswechsel sinniert OpenAI-Chef Sam Altman über die Zukunft künstlicher Intelligenz. Das nächste große Ziel: Eine KI, die menschliche Denkkapazitäten übersteigt. Dieser Artikel wurde indexiert von t3n.de – Software & Entwicklung Lesen Sie den originalen Artikel: Sam Altman: OpenAI bewegt…

Read more →

DE, t3n.de - Software & Entwicklung

Genervt von Whatsapp-Animationen? Warum der Messenger für euch bald deutlich angenehmer wird

2025-01-06 15:01

Nutzt ihr gern Whatsapp, seid aber von den zahlreichen Animationen im Messenger genervt? Offenbar gibt es mehrere Nutzer:innen, denen es so geht. Denn die Verantwortlichen hinter Whatsapp arbeiten daran, das Problem für euch zu beheben. Dieser Artikel wurde indexiert von…

Read more →

DE, t3n.de - Software & Entwicklung

32 Millionen Rechner in Gefahr: Warum der Umstieg auf Windows 11 nicht warten kann

2025-01-06 15:01

Mit dem 15. Oktober 2025 stellt Microsoft den Support von Windows 10 endgültig ein. Auch wenn bis dahin noch etwas Zeit ist, warnen Sicherheitsexperten davor, zu spät aktiv zu werden. Sonst drohe ein „Security-Fiasko“. Dieser Artikel wurde indexiert von t3n.de…

Read more →

DE, heise Security

Im geleakten Source Code von GTA San Andreas soll sich ein Trojaner verschanzen

2025-01-06 15:01

Sicherheitsforscher warnen vor dem Download des geleakten Source Codes von GTA San Andreas. Dabei handele es sich um einen gefährlichen Fake. Dieser Artikel wurde indexiert von heise Security Lesen Sie den originalen Artikel: Im geleakten Source Code von GTA San…

Read more →

EN, The Register - Security

MediaTek rings in the new year with a parade of chipset vulns

2025-01-06 15:01

Manufacturers should have had ample time to apply the fixes MediaTek kicked off the first full working week of the new year by disclosing a bevy of security vulnerabilities, including a critical remote code execution bug affecting 51 chipsets.… This…

Read more →

EN, securityweek

Wallet Drainer Malware Used to Steal $500 Million in Cryptocurrency in 2024

2025-01-06 15:01

Close to $500 million in cryptocurrency from over 332,000 addresses was stolen in 2024 using wallet drainer malware. The post Wallet Drainer Malware Used to Steal $500 Million in Cryptocurrency in 2024 appeared first on SecurityWeek. This article has been…

Read more →

EN, The Hacker News

⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [6 Jan]

2025-01-06 15:01

Every tap, click, and swipe we make online shapes our digital lives, but it also opens doors—some we never meant to unlock. Extensions we trust, assistants we rely on, and even the codes we scan are turning into tools for…

Read more →

DE, heise Security

Geleakter Source Code des Videospiels GTA San Andreas soll Ransomware enthalten

2025-01-06 15:01

Sicherheitsforscher warnen vor dem Download des geleakten Source Codes von GTA San Andreas. Dabei handele es sich um einen gefährlichen Fake. Dieser Artikel wurde indexiert von heise Security Lesen Sie den originalen Artikel: Geleakter Source Code des Videospiels GTA San…

Read more →

EN, Security | TechRepublic

The 5 Fastest VPNs for 2025

2025-01-06 15:01

Looking for a VPN that delivers speed and security? We’ve rounded up the best of the best — take a look and see which one’s perfect for you! This article has been indexed from Security | TechRepublic Read the original…

Read more →

EN, securityweek

Code Execution Flaw Found in Nuclei Vulnerability Scanner

2025-01-06 15:01

A vulnerability in Nuclei’s template signature verification system could have allowed attackers to execute arbitrary code. The post Code Execution Flaw Found in Nuclei Vulnerability Scanner appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original…

Read more →

EN, Security Boulevard

China’s Salt Typhoon Attacks Guam entity; US Sanctions Chinese Company

2025-01-06 15:01

China is continuing to target U.S. entities in its efforts regarding Taiwan, including using state-sponsored Flax Typhoon to compromise Guam infrastructure. U.S. are pushing back, with the Treasury Department sanctioning a Chinse cybersecurity firm accused of aiding in some of…

Read more →

EN, The Hacker News

⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [6 Jan]

2025-01-06 15:01

Every tap, click, and swipe we make online shapes our digital lives, but it also opens doors—some we never meant to unlock. Extensions we trust, assistants we rely on, and even the codes we scan are turning into tools for…

Read more →

EN, www.infosecurity-magazine.com

New PhishWP Plugin Enables Sophisticated Payment Page Scams

2025-01-06 15:01

The PhishWP plugin enables scammers to create fake payment pages, stealing sensitive data via Telegram This article has been indexed from www.infosecurity-magazine.com Read the original article: New PhishWP Plugin Enables Sophisticated Payment Page Scams

Read more →

hourly summary

IT Security News Hourly Summary 2025-01-06 15h : 4 posts

2025-01-06 15:01

4 posts were published in the last hour 13:34 : Tenable Disables Nessus Agents Over Faulty Updates 13:34 : Torq Adds Bevy of AI Agents to Automate Cybersecurity Workflows 13:34 : ⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and…

Read more →

EN, securityweek

Tenable Disables Nessus Agents Over Faulty Updates

2025-01-06 14:01

Tenable has disabled two Nessus scanner agent versions after a differential plugin update caused the agents to go offline. The post Tenable Disables Nessus Agents Over Faulty Updates appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…

Read more →

EN, Security Boulevard

Torq Adds Bevy of AI Agents to Automate Cybersecurity Workflows

2025-01-06 14:01

Torq has extended the reach of the generative artificial intelligence (AI) capabilities spanning its security operations center (SOC) platform to now include multiple agents. The post Torq Adds Bevy of AI Agents to Automate Cybersecurity Workflows appeared first on Security…

Read more →

EN, The Hacker News

⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [6 Jan]

2025-01-06 14:01

Every tap, click, and swipe we make online shapes our digital lives, but it also opens doors—some we never meant to unlock. Extensions we trust, assistants we rely on, and even the codes we scan are turning into tools for…

Read more →

DE, Golem.de - Security

Altersverifikation in Florida: Pornhub-Sperre lässt VPN-Nachfrage explodieren

2025-01-06 14:01

Seit dem 1. Januar müssen Pornoportale das Alter ihrer Nutzer aus Florida prüfen. Pornhub protestiert mit einer Sperre – und Anwender umgehen sie. (pornhub, Google) Dieser Artikel wurde indexiert von Golem.de – Security Lesen Sie den originalen Artikel: Altersverifikation in…

Read more →

EN, The Hacker News

⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [6 Jan]

2025-01-06 14:01

Every tap, click, and swipe we make online shapes our digital lives, but it also opens doors—some we never meant to unlock. Extensions we trust, assistants we rely on, and even the codes we scan are turning into tools for…

Read more →

EN, GBHackers Security | #1 Globally Trusted Cyber Security News Platform

PoC Exploit Released for Critical OpenSSH Vulnerability (CVE-2024-6387)

2025-01-06 13:01

An alarming new development emerged in the cybersecurity landscape with the release of a proof-of-concept (PoC) exploit targeting the critical vulnerability identified as CVE-2024-6387. This vulnerability, discovered by researchers at Qualys, allows remote unauthenticated attackers to execute arbitrary code on…

Read more →

EN, Schneier on Security

Privacy of Photos.app’s Enhanced Visual Search

2025-01-06 13:01

Initial speculation about a new Apple feature. This article has been indexed from Schneier on Security Read the original article: Privacy of Photos.app’s Enhanced Visual Search

Read more →

EN, securityweek

Is Your Car Spying on You? What It Means That Tesla Shared Data in the Las Vegas Explosion

2025-01-06 13:01

Many cars know where you’ve been and where you are going, and also often have access to your contacts, call logs, texts and other sensitive information thanks to cell phone syncing. The post Is Your Car Spying on You? What…

Read more →

EN, The Hacker News

Cybercriminals Target Ethereum Developers with Fake Hardhat npm Packages

2025-01-06 13:01

Cybersecurity researchers have revealed several malicious packages on the npm registry that have been found impersonating the Nomic Foundation’s Hardhat tool in order to steal sensitive data from developer systems. “By exploiting trust in open source plugins, attackers have infiltrated…

Read more →

EN, The Hacker News

FireScam Android Malware Poses as Telegram Premium to Steal Data and Control Devices

2025-01-06 13:01

An Android information stealing malware named FireScam has been found masquerading as a premium version of the Telegram messaging app to steal data and maintain persistent remote control over compromised devices. “Disguised as a fake ‘Telegram Premium’ app, it is…

Read more →

Page 2323 of 4871
« 1 … 2,321 2,322 2,323 2,324 2,325 … 4,871 »

Pages

  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Telegram Channel

Recent Posts

  • Cybercriminals Use Malicious Cybersquatting Attacks to Distribute Malware and Hijack Data February 7, 2026
  • nmapUnleashed Makes Nmap Scanning More Comfortable and Effective February 7, 2026
  • Hackers Exploit Free Firebase Accounts to Launch Phishing Campaigns February 7, 2026
  • Hackers Exploit Cybersquatting Tactics to Spread Malware and Steal Sensitive Information February 7, 2026
  • Cybersecurity Today: Month In Review – Microsoft Patch Fails, Fortinet Issues, and AI Risks February 7, 2026
  • Claude Opus 4.6 Released with Improved Cybersecurity, Validating 500+ high-severity Vulnerabilities February 7, 2026
  • Analysis of active exploitation of SolarWinds Web Help Desk February 7, 2026
  • IT Security News Hourly Summary 2026-02-07 03h : 1 posts February 7, 2026
  • Substack – 663,121 breached accounts February 7, 2026
  • Novel Technique to Detect Cloud Threat Actor Operations February 7, 2026
  • Secure MCP servers to safeguard AI and corporate data February 7, 2026
  • ICE Agent’s ‘Dragging’ Case May Help Expose Evidence in Renee Good Shooting February 7, 2026
  • IT Security News Hourly Summary 2026-02-07 00h : 3 posts February 7, 2026
  • IT Security News Daily Summary 2026-02-06 February 7, 2026
  • ICE Agent’s ‘Dragging’ Case May Help Expose Evidence in Renee Good Shooting February 7, 2026
  • Asian Cyber Espionage Campaign Breached 37 Countries February 7, 2026
  • Why organizations need cloud attack surface management February 6, 2026
  • TeamPCP and the Rise of Cloud-Native Cybercrime February 6, 2026
  • I Am in the Epstein Files February 6, 2026
  • Transparent Tribe Hacker Group Attacking India’s Startup Ecosystem February 6, 2026

Copyright © 2026 IT Security News. All Rights Reserved. The Magazine Basic Theme by bavotasan.com.

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}