IT Security News

Cybersecurity news and articles about information security, vulnerabilities, exploits, hacks, laws, spam, viruses, malware, breaches.

Main menu

Skip to content
  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Telegram Channel
EN, securityweek

Code Execution Flaw Found in Nuclei Vulnerability Scanner

2025-01-06 15:01

A vulnerability in Nuclei’s template signature verification system could have allowed attackers to execute arbitrary code. The post Code Execution Flaw Found in Nuclei Vulnerability Scanner appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original…

Read more →

EN, Security Boulevard

China’s Salt Typhoon Attacks Guam entity; US Sanctions Chinese Company

2025-01-06 15:01

China is continuing to target U.S. entities in its efforts regarding Taiwan, including using state-sponsored Flax Typhoon to compromise Guam infrastructure. U.S. are pushing back, with the Treasury Department sanctioning a Chinse cybersecurity firm accused of aiding in some of…

Read more →

EN, The Hacker News

⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [6 Jan]

2025-01-06 15:01

Every tap, click, and swipe we make online shapes our digital lives, but it also opens doors—some we never meant to unlock. Extensions we trust, assistants we rely on, and even the codes we scan are turning into tools for…

Read more →

EN, www.infosecurity-magazine.com

New PhishWP Plugin Enables Sophisticated Payment Page Scams

2025-01-06 15:01

The PhishWP plugin enables scammers to create fake payment pages, stealing sensitive data via Telegram This article has been indexed from www.infosecurity-magazine.com Read the original article: New PhishWP Plugin Enables Sophisticated Payment Page Scams

Read more →

hourly summary

IT Security News Hourly Summary 2025-01-06 15h : 4 posts

2025-01-06 15:01

4 posts were published in the last hour 13:34 : Tenable Disables Nessus Agents Over Faulty Updates 13:34 : Torq Adds Bevy of AI Agents to Automate Cybersecurity Workflows 13:34 : ⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and…

Read more →

EN, securityweek

Tenable Disables Nessus Agents Over Faulty Updates

2025-01-06 14:01

Tenable has disabled two Nessus scanner agent versions after a differential plugin update caused the agents to go offline. The post Tenable Disables Nessus Agents Over Faulty Updates appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…

Read more →

EN, Security Boulevard

Torq Adds Bevy of AI Agents to Automate Cybersecurity Workflows

2025-01-06 14:01

Torq has extended the reach of the generative artificial intelligence (AI) capabilities spanning its security operations center (SOC) platform to now include multiple agents. The post Torq Adds Bevy of AI Agents to Automate Cybersecurity Workflows appeared first on Security…

Read more →

EN, The Hacker News

⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [6 Jan]

2025-01-06 14:01

Every tap, click, and swipe we make online shapes our digital lives, but it also opens doors—some we never meant to unlock. Extensions we trust, assistants we rely on, and even the codes we scan are turning into tools for…

Read more →

DE, Golem.de - Security

Altersverifikation in Florida: Pornhub-Sperre lässt VPN-Nachfrage explodieren

2025-01-06 14:01

Seit dem 1. Januar müssen Pornoportale das Alter ihrer Nutzer aus Florida prüfen. Pornhub protestiert mit einer Sperre – und Anwender umgehen sie. (pornhub, Google) Dieser Artikel wurde indexiert von Golem.de – Security Lesen Sie den originalen Artikel: Altersverifikation in…

Read more →

EN, The Hacker News

⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [6 Jan]

2025-01-06 14:01

Every tap, click, and swipe we make online shapes our digital lives, but it also opens doors—some we never meant to unlock. Extensions we trust, assistants we rely on, and even the codes we scan are turning into tools for…

Read more →

EN, GBHackers Security | #1 Globally Trusted Cyber Security News Platform

PoC Exploit Released for Critical OpenSSH Vulnerability (CVE-2024-6387)

2025-01-06 13:01

An alarming new development emerged in the cybersecurity landscape with the release of a proof-of-concept (PoC) exploit targeting the critical vulnerability identified as CVE-2024-6387. This vulnerability, discovered by researchers at Qualys, allows remote unauthenticated attackers to execute arbitrary code on…

Read more →

EN, Schneier on Security

Privacy of Photos.app’s Enhanced Visual Search

2025-01-06 13:01

Initial speculation about a new Apple feature. This article has been indexed from Schneier on Security Read the original article: Privacy of Photos.app’s Enhanced Visual Search

Read more →

EN, securityweek

Is Your Car Spying on You? What It Means That Tesla Shared Data in the Las Vegas Explosion

2025-01-06 13:01

Many cars know where you’ve been and where you are going, and also often have access to your contacts, call logs, texts and other sensitive information thanks to cell phone syncing. The post Is Your Car Spying on You? What…

Read more →

EN, The Hacker News

Cybercriminals Target Ethereum Developers with Fake Hardhat npm Packages

2025-01-06 13:01

Cybersecurity researchers have revealed several malicious packages on the npm registry that have been found impersonating the Nomic Foundation’s Hardhat tool in order to steal sensitive data from developer systems. “By exploiting trust in open source plugins, attackers have infiltrated…

Read more →

EN, The Hacker News

FireScam Android Malware Poses as Telegram Premium to Steal Data and Control Devices

2025-01-06 13:01

An Android information stealing malware named FireScam has been found masquerading as a premium version of the Telegram messaging app to steal data and maintain persistent remote control over compromised devices. “Disguised as a fake ‘Telegram Premium’ app, it is…

Read more →

EN, The Hacker News

From $22M in Ransom to +100M Stolen Records: 2025’s All-Star SaaS Threat Actors to Watch

2025-01-06 13:01

In 2024, cyber threats targeting SaaS surged, with 7,000 password attacks blocked per second (just in Entra ID)—a 75% increase from last year—and phishing attempts up by 58%, causing $3.5 billion in losses (source: Microsoft Digital Defense Report 2024). SaaS…

Read more →

EN, The Hacker News

⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [6 Jan]

2025-01-06 13:01

Every tap, click, and swipe we make online shapes our digital lives, but it also opens doors—some we never meant to unlock. Extensions we trust, assistants we rely on, and even the codes we scan are turning into tools for…

Read more →

EN, www.infosecurity-magazine.com

Chinese Hackers Double Cyber-Attacks on Taiwan

2025-01-06 13:01

Taiwan’s security service said government networks faced 2.4 million attacks in 2024, most of which are attributed to Chinese state actors This article has been indexed from www.infosecurity-magazine.com Read the original article: Chinese Hackers Double Cyber-Attacks on Taiwan

Read more →

EN, Silicon UK

US Sanctions Chinese Tech Company Over Infrastructure Hacks

2025-01-06 12:01

US Treasury sanctions Beijing-based Integrity Tech over alleged links to state-backed hacking group ‘Flax Typhoon’ This article has been indexed from Silicon UK Read the original article: US Sanctions Chinese Tech Company Over Infrastructure Hacks

Read more →

EN, Silicon UK

China’s BYD Regains Top EV Spot Amidst Tesla Decline

2025-01-06 12:01

China EV giant BYD surpasses Tesla on worldwide EV deliveries in fourth quarter of 2024 as Tesla shows first full-year decline This article has been indexed from Silicon UK Read the original article: China’s BYD Regains Top EV Spot Amidst…

Read more →

EN, Silicon UK

Microsoft To Spend $80bn On AI Infrastructure This Year

2025-01-06 12:01

Microsoft planning to spend $80bn on data centres for AI and other cloud applications this fiscal year, as AI race heats up This article has been indexed from Silicon UK Read the original article: Microsoft To Spend $80bn On AI…

Read more →

EN, Silicon UK

TikTok ‘Aware’ Livestream Feature Exploited Minors

2025-01-06 12:01

Less-redacted Utah lawsuit says TikTok internal reviews found Live feature effectively incentivised abuse of minors for profit This article has been indexed from Silicon UK Read the original article: TikTok ‘Aware’ Livestream Feature Exploited Minors

Read more →

EN, Silicon UK

Nick Clegg To Leave Meta, Hand Over Post To Republican

2025-01-06 12:01

Former UK deputy prime minister Nick Clegg to leave global affairs post at Meta ahead of Donald Trump’s return to presidency This article has been indexed from Silicon UK Read the original article: Nick Clegg To Leave Meta, Hand Over…

Read more →

EN, securityweek

US Sanctions Chinese Firm Linked to Flax Typhoon Attacks on Critical Infrastructure

2025-01-06 12:01

The US Treasury has sanctioned Chinese company Integrity Technology for supporting state-sponsored group Flax Typhoon in hacking US critical infrastructure. The post US Sanctions Chinese Firm Linked to Flax Typhoon Attacks on Critical Infrastructure appeared first on SecurityWeek. This article…

Read more →

Page 2324 of 4872
« 1 … 2,322 2,323 2,324 2,325 2,326 … 4,872 »

Pages

  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Telegram Channel

Recent Posts

  • BridgePay Payment Gateway Hit by Ransomware, Causing Nationwide Outages February 7, 2026
  • IT Security News Hourly Summary 2026-02-07 15h : 3 posts February 7, 2026
  • Hackers Linked to State Actors Target Signal Messages of Military Officials and Journalists February 7, 2026
  • Organizations Urged to Replace Discontinued Edge Devices February 7, 2026
  • China-Linked DKnife Threat Underscores Risks to Network Edge Devices February 7, 2026
  • Apple Pay Users Targeted by Phishing Attack Aimed at Stealing Payment Details February 7, 2026
  • Study confirms experience beats youthful enthusiasm February 7, 2026
  • German Agencies Warn of Signal Phishing Targeting Politicians, Military, Journalists February 7, 2026
  • State-Backed Hackers Target Military Officials and Journalists on Signal in Latest Cyberattack February 7, 2026
  • Moltbook, the Social Network for AI Agents, Exposed Real Humans’ Data February 7, 2026
  • CISA pushes Federal agencies to retire end-of-support edge devices February 7, 2026
  • BeyondTrust Remote Access Products 0-Day Vulnerability Allows Remote Code Execution February 7, 2026
  • OpenClaw Partners with VirusTotal to Secure AI Agent Skill Marketplace February 7, 2026
  • OpenClaw v2026.2.6 Released With Support for Opus 4.6, GPT-5.3-Codex and Safety Scanner February 7, 2026
  • IT Security News Hourly Summary 2026-02-07 09h : 2 posts February 7, 2026
  • Cybercriminals Use Malicious Cybersquatting Attacks to Distribute Malware and Hijack Data February 7, 2026
  • nmapUnleashed Makes Nmap Scanning More Comfortable and Effective February 7, 2026
  • Hackers Exploit Free Firebase Accounts to Launch Phishing Campaigns February 7, 2026
  • Hackers Exploit Cybersquatting Tactics to Spread Malware and Steal Sensitive Information February 7, 2026
  • Cybersecurity Today: Month In Review – Microsoft Patch Fails, Fortinet Issues, and AI Risks February 7, 2026

Copyright © 2026 IT Security News. All Rights Reserved. The Magazine Basic Theme by bavotasan.com.

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}