IT Security News

Cybersecurity news and articles about information security, vulnerabilities, exploits, hacks, laws, spam, viruses, malware, breaches.

Main menu

Skip to content
  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Telegram Channel
EN, Security Affairs

Meta warns of actively exploited flaw in FreeType library

2025-03-13 12:03

Meta warned that a vulnerability, tracked as CVE-2025-27363, impacting the FreeType library may have been exploited in the wild. Meta warned that an out-of-bounds write flaw, tracked as CVE-2025-27363 (CVSS score of 8.1), in the FreeType library may have been actively exploited in attacks.…

Read more →

EN, Information Security Buzz

Google Uncovers China-Linked Espionage Campaign Targeting Juniper Routers

2025-03-13 12:03

Google’s Threat Analysis Group (TAG) and Mandiant have uncovered a sophisticated espionage campaign linked to China-nexus threat actors, targeting vulnerable Juniper routers used in enterprise and government networks worldwide. This discovery highlights the ongoing risks posed by state-sponsored attacks against…

Read more →

EN, Information Security Buzz

New Federal Alert Warns U.S. Businesses of Medusa Ransomware Surge

2025-03-13 12:03

In a joint advisory, US federal agencies have issued a cybersecurity warning about a sharp increase in attacks by Medusa ransomware, urging business leaders and IT teams to act immediately to protect their organizations.  The Federal Bureau of Investigation (FBI),…

Read more →

EN, securityweek

Webinar on Demand: Protecting Executives and Enterprises from Digital, Narrative and Physical Attacks

2025-03-13 12:03

How hyper agenda-driven threat actors, cybercriminals, and nation-states integrate digital, narrative, and physical attacks to target organizations through their executives. The post Webinar on Demand: Protecting Executives and Enterprises from Digital, Narrative and Physical Attacks appeared first on SecurityWeek. This…

Read more →

EN, Silicon UK

Intel Appoints Chip Veteran Lip-Bu Tan As CEO

2025-03-13 12:03

Former board member and respected chip industry veteran Lip-Bu Tan appointed to lead troubled US chip giant Intel This article has been indexed from Silicon UK Read the original article: Intel Appoints Chip Veteran Lip-Bu Tan As CEO

Read more →

EN, GBHackers Security | #1 Globally Trusted Cyber Security News Platform

Hackers Exploit Microsoft Copilot for Advanced Phishing Attacks

2025-03-13 12:03

Hackers have been targeting Microsoft Copilot, a newly launched Generative AI assistant, to carry out sophisticated phishing attacks. This campaign highlights the risks associated with the widespread adoption of Microsoft services and the challenges that come with introducing new technologies…

Read more →

EN, GBHackers Security | #1 Globally Trusted Cyber Security News Platform

New DCRat Campaign Uses YouTube Videos to Target Users

2025-03-13 12:03

A new campaign involving the DCRat backdoor has recently been uncovered, leveraging YouTube as a primary distribution channel. Since the beginning of the year, attackers have been using the popular video-sharing platform to target users by creating fake or stolen…

Read more →

EN, GBHackers Security | #1 Globally Trusted Cyber Security News Platform

Bitdefender Identifies Security Vulnerabilities Enabling Man-in-the-Middle Exploits

2025-03-13 12:03

Cybersecurity firm Bitdefender has disclosed two high-severity security vulnerabilities affecting its legacy BOX v1 device, exposing users to potential remote code execution and man-in-the-middle attacks. The vulnerabilities, identified on March 12th, 2025, affect a product that is no longer sold…

Read more →

EN, www.infosecurity-magazine.com

VC Investment in Cyber Startups Surges 35%

2025-03-13 12:03

VC firms invested 35% more in cybersecurity startups in North America and Europe in Q4 2024 than a year previously This article has been indexed from www.infosecurity-magazine.com Read the original article: VC Investment in Cyber Startups Surges 35%

Read more →

hourly summary

IT Security News Hourly Summary 2025-03-13 12h : 11 posts

2025-03-13 12:03

11 posts were published in the last hour 10:34 : Apple To Appeal UK Government Backdoor Order On Friday 10:34 : Head Mare and Twelve join forces to attack Russian entities 10:34 : How to detect Headless Chrome bots instrumented…

Read more →

EN, Silicon UK

Apple To Appeal UK Government Backdoor Order On Friday

2025-03-13 11:03

MPs demand secret High Court hearing be held in public, after government had ordered a backdoor to Apple iCloud This article has been indexed from Silicon UK Read the original article: Apple To Appeal UK Government Backdoor Order On Friday

Read more →

EN, Securelist

Head Mare and Twelve join forces to attack Russian entities

2025-03-13 11:03

We analyze the activities of the Head Mare hacktivist group, which has been attacking Russian companies jointly with Twelve. This article has been indexed from Securelist Read the original article: Head Mare and Twelve join forces to attack Russian entities

Read more →

EN, Security Boulevard

How to detect Headless Chrome bots instrumented with Puppeteer?

2025-03-13 11:03

Headless Chrome bots powered by Puppeteer are a popular choice among bot developers. The Puppeteer API’s ease of use, combined with the lightweight nature of Headless Chrome, makes it a preferred tool over its full-browser counterpart. It is commonly used…

Read more →

Cybersecurity Insiders, EN

INE Security Alert: Using AI-Driven Cybersecurity Training to Counter Emerging Threats

2025-03-13 11:03

Cary, North Carolina, 13th March 2025, CyberNewsWire The post INE Security Alert: Using AI-Driven Cybersecurity Training to Counter Emerging Threats appeared first on Cybersecurity Insiders. This article has been indexed from Cybersecurity Insiders Read the original article: INE Security Alert:…

Read more →

EN, www.infosecurity-magazine.com

UK ICO Fires GDPR “Warning Shot” Over Use of Children’s Data

2025-03-13 11:03

The UK’s information commissioner has warned that all digital firms using children’s data must follow the GDPR This article has been indexed from www.infosecurity-magazine.com Read the original article: UK ICO Fires GDPR “Warning Shot” Over Use of Children’s Data

Read more →

DE, heise security News

Sicherheitsupdates: Root-Sicherheitslücke bedroht Cisco-ASR-Router

2025-03-13 11:03

Der Netzwerkausrüster Cisco hat mehrere Schwachstellen geschlossen, über die Angreifer etwa ASR-Router attackieren können. Dieser Artikel wurde indexiert von heise security News Lesen Sie den originalen Artikel: Sicherheitsupdates: Root-Sicherheitslücke bedroht Cisco-ASR-Router

Read more →

Cisco Talos Blog, EN

Abusing with style: Leveraging cascading style sheets for evasion and tracking

2025-03-13 11:03

Cascading Style Sheets (CSS) are ever present in modern day web browsing, however its far from their own use. This blog will detail the ways adversaries use CSS in email campaigns for evasion and tracking. This article has been indexed…

Read more →

EN, Unit 42

Investigating Scam Crypto Investment Platforms Using Pyramid Schemes to Defraud Victims

2025-03-13 11:03

We identified a campaign spreading thousands of sca crypto investment platforms through websites and mobile apps, possibly through a standardized toolkit. The post Investigating Scam Crypto Investment Platforms Using Pyramid Schemes to Defraud Victims appeared first on Unit 42. This…

Read more →

EN, Latest stories for ZDNet in Security

How to set up Bitwarden for personal and work use – and why you should keep them separate

2025-03-13 11:03

Don’t let work invade your personal life. Separate your passwords with two Bitwarden accounts for better security and peace of mind. This article has been indexed from Latest stories for ZDNET in Security Read the original article: How to set…

Read more →

Blog RSS Feed, EN

6 Potential Security Concerns With the Eventual Rollout of 6G

2025-03-13 11:03

6G could be available by the end of the decade, which should decrease latency and connectivity speeds for users. However, these wireless networks present new cybersecurity challenges. What should industry professionals prepare for? What Is 6G? 6G will be the…

Read more →

EN, Security Latest

‘People Are Scared’: Inside CISA as It Reels From Trump’s Purge

2025-03-13 11:03

Employees at the Cybersecurity and Infrastructure Security Agency tell WIRED they’re struggling to protect the US while the administration dismisses their colleagues and poisons their partnerships. This article has been indexed from Security Latest Read the original article: ‘People Are…

Read more →

DE, Golem.de - Security

Flugticketgroßhändler: Cyberangriff legt Buchungssystem von Aerticket lahm

2025-03-13 10:03

Nach einem Hackerangriff ist das Buchungssystem von Aerticket vorerst unbrauchbar. Eine schnelle Wiederherstellung ist wohl nicht zu erwarten. (Cybercrime, Cyberwar) Dieser Artikel wurde indexiert von Golem.de – Security Lesen Sie den originalen Artikel: Flugticketgroßhändler: Cyberangriff legt Buchungssystem von Aerticket lahm

Read more →

EN, Hackread – Latest Cybersecurity, Tech, AI, Crypto & Hacking News

Modat launches premier product, Modat Magnify for Cybersecurity Professionals

2025-03-13 10:03

The Hague, the Netherlands, 13th March 2025, CyberNewsWire This article has been indexed from Hackread – Latest Cybersecurity, Tech, AI, Crypto & Hacking News Read the original article: Modat launches premier product, Modat Magnify for Cybersecurity Professionals

Read more →

EN, Security Affairs

Medusa ransomware hit over 300 critical infrastructure organizations until February 2025

2025-03-13 10:03

The Medusa ransomware operation hit over 300 organizations in critical infrastructure sectors in the United States until February 2025. The FBI, CISA, and MS-ISAC have issued a joint advisory detailing Medusa ransomware tactics, techniques, and indicators of compromise (IOCs) based…

Read more →

Page 2473 of 5449
« 1 … 2,471 2,472 2,473 2,474 2,475 … 5,449 »

Pages

  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Telegram Channel

Recent Posts

  • IT Security News Hourly Summary 2026-05-24 00h : 1 posts May 24, 2026
  • IT Security News Daily Summary 2026-05-23 May 23, 2026
  • These special phone and app features can help protect you from spyware May 23, 2026
  • CVE-2026-9082: Drupal’s Highly Critical SQL Injection Flaw Is Already Under Active Attack May 23, 2026
  • Packagist Supply Chain Attack Infects 8 Packages Using GitHub-Hosted Linux Malware May 23, 2026
  • npm Adds 2FA-Gated Publishing and Package Install Controls Against Supply Chain Attacks May 23, 2026
  • Millions of Devices at Risk: New Trojan Monitors Smartphones May 23, 2026
  • AI Coding Tools Expose Thousands of Apps With Sensitive Corporate Data Online May 23, 2026
  • Why pure extortion is replacing traditional ransomware May 23, 2026
  • IT Security News Hourly Summary 2026-05-23 15h : 4 posts May 23, 2026
  • Nginx-poolslip Vulnerability Enables DoS and Code Execution Attacks — Patch Now! May 23, 2026
  • Australia Seizes $4.2 Million in Bitcoin in Major Darknet Crackdown May 23, 2026
  • WhatsApp Fixed Two Security Bugs via It’s Bug Bounty Program May 23, 2026
  • Claude Mythos AI Finds 10,000 High-Severity Flaws in Widely Used Software May 23, 2026
  • RondoDox Botnet Exploits Critical 2018 Vulnerability to Hijack ASUS Routers May 23, 2026
  • The FBI Wants ‘Near Real-Time’ Access to US License Plate Readers May 23, 2026
  • Hackers Exploit F5 BIG-IP Appliance to Gain SSH Access and Pivot Into Enterprise Linux Networks May 23, 2026
  • Dirty Frag, Copy Fail, Fragnesia: The start of a worrisome Linux security trend May 23, 2026
  • ‘Underminr’ Vulnerability Lets Attackers Hide Malicious Connections Behind Trusted Domains May 23, 2026
  • Hackers Exploit F5 BIG-IP to Gain SSH Access and Pivot Into Linux Networks May 23, 2026

Copyright © 2026 IT Security News. All Rights Reserved. The Magazine Basic Theme by bavotasan.com.

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}