IT Security News

Cybersecurity news and articles about information security, vulnerabilities, exploits, hacks, laws, spam, viruses, malware, breaches.

Main menu

Skip to content
  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Telegram Channel
CySecurity News - Latest Information Security and Hacking Incidents, EN

AI Browsers Raise Privacy and Security Risks as Prompt Injection Attacks Grow

2025-12-13 17:12

  A new wave of competition is stirring in the browser market as companies like OpenAI, Perplexity, and The Browser Company aggressively push to redefine how humans interact with the web. Rather than merely displaying pages, these AI browsers will…

Read more →

CySecurity News - Latest Information Security and Hacking Incidents, EN

Apple Addresses Two Actively Exploited Zero-Day Security Flaws

2025-12-13 17:12

Following confirmation that two previously unknown security flaws had been actively exploited in the wild on Friday, Apple rolled out a series of security updates across its entire software ecosystem to address this issue, further demonstrating the continued use of…

Read more →

CySecurity News - Latest Information Security and Hacking Incidents, EN

5 Critical Situations Where You Should Never Rely on ChatGPT

2025-12-13 17:12

  Just a few years after its launch, ChatGPT has evolved into a go-to digital assistant for tasks ranging from quick searches to event planning. While it undeniably offers convenience, treating it as an all-knowing authority can be risky. ChatGPT…

Read more →

Cyber Security News, EN

CISA Warns of Google Chromium 0-Day Vulnerability Exploited in Attacks

2025-12-13 16:12

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical zero-day vulnerability in Google Chromium’s ANGLE graphics engine to its Known Exploited Vulnerabilities (KEV) catalog. Tracked as CVE-2025-14174, the flaw allows remote attackers to trigger out-of-bounds memory access…

Read more →

Cyber Security News, EN

Empire 6.3.0 Launches With New Features for Red Teams and Penetration Testers

2025-12-13 16:12

BC Security has announced the release of Empire 6.3.0, the latest iteration of the widely used post-exploitation and adversary emulation framework. This update reinforces Empire’s position as a premier tool for Red Teams and penetration testers, offering a flexible, modular server…

Read more →

Cyber Security News, EN

Google Warns Multiple Hacker Groups Are Exploiting React2Shell to Spread Malware

2025-12-13 16:12

Google Threat Intelligence Group (GTIG) has issued a warning regarding the widespread exploitation of a critical security flaw in React Server Components. Known as React2Shell (CVE-2025-55182), this vulnerability allows attackers to take control of servers remotely without needing a password. Since…

Read more →

EN, The Hacker News

CISA Adds Actively Exploited Sierra Wireless Router Flaw Enabling RCE Attacks

2025-12-13 15:12

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added a high-severity flaw impacting Sierra Wireless AirLink ALEOS routers to its Known Exploited Vulnerabilities (KEV) catalog, following reports of active exploitation in the wild. CVE-2018-4063 (CVSS score: 8.8/9.9) refers…

Read more →

EN, Security Latest

AI Toys for Kids Talk About Sex, Drugs, and Chinese Propaganda

2025-12-13 14:12

Plus: Travelers to the US may have to hand over five years of social media history, South Korean CEOs are resigning due to cyberattacks, and more. This article has been indexed from Security Latest Read the original article: AI Toys…

Read more →

EN, Security Affairs

U.S. CISA adds Google Chromium and Sierra Wireless AirLink ALEOS flaws to its Known Exploited Vulnerabilities catalog

2025-12-13 14:12

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Google Chromium and Sierra Wireless AirLink ALEOS flaws to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added [1, 2] Microsoft Windows and WinRAR flaws to its Known…

Read more →

Cyber Security News, EN

Rust-Based Luca Stealer Spreads Across Linux and Windows Systems

2025-12-13 11:12

Threat actors are increasingly abandoning traditional languages like C and C++ in favor of modern alternatives such as Golang, Rust, and Nim. This strategic shift enables developers to compile malicious code for both Linux and Windows with minimal modifications. Among…

Read more →

hourly summary

IT Security News Hourly Summary 2025-12-13 09h : 2 posts

2025-12-13 10:12

2 posts were published in the last hour 7:31 : Hackers Target Windows Systems Using Phantom Stealer Hidden in ISO Files 7:31 : New Phantom Stealer Campaign Hits Windows Machines Through ISO Mounting

Read more →

EN, GBHackers Security | #1 Globally Trusted Cyber Security News Platform

Hackers Target Windows Systems Using Phantom Stealer Hidden in ISO Files

2025-12-13 09:12

Seqrite Labs has uncovered an active Russian phishing campaign that delivers Phantom information-stealing malware through malicious ISO files embedded in fake payment confirmation emails. The sophisticated attack primarily targets finance and accounting professionals in Russia, using social engineering tactics to…

Read more →

Cyber Security News, EN

New Phantom Stealer Campaign Hits Windows Machines Through ISO Mounting

2025-12-13 09:12

Researchers have uncovered a sophisticated phishing campaign originating in Russia that deploys the Phantom information-stealing malware via malicious ISO files. The attack, dubbed “Operation MoneyMount-ISO,” targets finance and accounting departments explicitly using fake payment confirmation emails to trick victims into…

Read more →

EN, The Hacker News

Apple Issues Security Updates After Two WebKit Flaws Found Exploited in the Wild

2025-12-13 08:12

Apple on Friday released security updates for iOS, iPadOS, macOS, tvOS, watchOS, visionOS, and its Safari web browser to address two security flaws that it said have been exploited in the wild, one of which is the same flaw that…

Read more →

EN, welivesecurity

Black Hat Europe 2025: Was that device designed to be on the internet at all?

2025-12-13 08:12

Behind the polished exterior of many modern buildings sit outdated systems with vulnerabilities waiting to be found This article has been indexed from WeLiveSecurity Read the original article: Black Hat Europe 2025: Was that device designed to be on the…

Read more →

Cybersecurity Today, EN

The Hidden Danger of Storing Secrets Online | Interview with Jake Knott from Watchtower

2025-12-13 07:12

In this episode of Cybersecurity Today, host Jim Love discusses the shocking discovery of over 80,000 leaked credentials and secrets in online code formatting tools with Jake Knott, a principal security researcher from Watchtower. They delve into the vulnerabilities exposed…

Read more →

Cyber Security News, EN

Apple 0-Day Vulnerabilities Exploited in Sophisticated Attacks Targeting iPhone Users

2025-12-13 06:12

Apple patches two WebKit zero-day flaws actively exploited in sophisticated attacks targeting specific iPhone users running iOS versions prior to 26.​ The iOS 26.2 and iPadOS 26.2 updates, released December 12, 2025, address CVE-2025-43529 and CVE-2025-14174 in WebKit. CVE-2025-43529 involves…

Read more →

EN, Threat Intelligence

Multiple Threat Actors Exploit React2Shell (CVE-2025-55182)

2025-12-13 05:12

Written by: Aragorn Tseng, Robert Weiner, Casey Charrier, Zander Work, Genevieve Stark, Austin Larsen Introduction On Dec. 3, 2025, a critical unauthenticated remote code execution (RCE) vulnerability in React Server Components, tracked as CVE-2025-55182 (aka “React2Shell”), was publicly disclosed. Shortly…

Read more →

hourly summary

IT Security News Hourly Summary 2025-12-13 03h : 1 posts

2025-12-13 04:12

1 posts were published in the last hour 1:32 : The Autonomous MSSP: How to Turn XDR Volume into a Competitive Advantage

Read more →

EN, Security Boulevard

The Autonomous MSSP: How to Turn XDR Volume into a Competitive Advantage

2025-12-13 03:12

Turn XDR volume into revenue. Morpheus investigates 100% of alerts and triages 95% in under 2 minutes, letting MSSPs scale without adding headcount. The post The Autonomous MSSP: How to Turn XDR Volume into a Competitive Advantage appeared first on…

Read more →

EN, Security Affairs

Emergency fixes deployed by Google and Apple after targeted attacks

2025-12-13 03:12

Google and Apple issued emergency updates to address zero-day flaws exploited in attacks targeting an unknown number of users. Apple and Google have both pushed out urgent security updates after uncovering a highly targeted attacks against an unknown number of…

Read more →

EN, Hackread – Cybersecurity News, Data Breaches, AI, and More

Fake Microsoft Teams and Google Meet Downloads Spread Oyster Backdoor

2025-12-13 02:12

The Oyster backdoor (also known as Broomstick) is targeting the financial world, using malicious search ads for PuTTY, Teams, and Google Meet. This article has been indexed from Hackread – Cybersecurity News, Data Breaches, AI, and More Read the original…

Read more →

EN, Hackread – Cybersecurity News, Data Breaches, AI, and More

Fake Microsoft Teams and Google Meet Downloads Spread Oyster Backdoor

2025-12-13 02:12

The Oyster backdoor (also known as Broomstick) is targeting the financial world, using malicious search ads for PuTTY, Teams, and Google Meet. This article has been indexed from Hackread – Cybersecurity News, Data Breaches, AI, and More Read the original…

Read more →

EN, Security Boulevard

Friday Squid Blogging: Giant Squid Eating a Diamondback Squid

2025-12-13 01:12

I have no context for this video—it’s from Reddit—but one of the commenters adds some context: Hey everyone, squid biologist here! Wanted to add some stuff you might find interesting. With so many people carrying around cameras, we’re getting more…

Read more →

Page 252 of 4872
« 1 … 250 251 252 253 254 … 4,872 »

Pages

  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Telegram Channel

Recent Posts

  • BridgePay Payment Gateway Hit by Ransomware, Causing Nationwide Outages February 7, 2026
  • IT Security News Hourly Summary 2026-02-07 15h : 3 posts February 7, 2026
  • Hackers Linked to State Actors Target Signal Messages of Military Officials and Journalists February 7, 2026
  • Organizations Urged to Replace Discontinued Edge Devices February 7, 2026
  • China-Linked DKnife Threat Underscores Risks to Network Edge Devices February 7, 2026
  • Apple Pay Users Targeted by Phishing Attack Aimed at Stealing Payment Details February 7, 2026
  • Study confirms experience beats youthful enthusiasm February 7, 2026
  • German Agencies Warn of Signal Phishing Targeting Politicians, Military, Journalists February 7, 2026
  • State-Backed Hackers Target Military Officials and Journalists on Signal in Latest Cyberattack February 7, 2026
  • Moltbook, the Social Network for AI Agents, Exposed Real Humans’ Data February 7, 2026
  • CISA pushes Federal agencies to retire end-of-support edge devices February 7, 2026
  • BeyondTrust Remote Access Products 0-Day Vulnerability Allows Remote Code Execution February 7, 2026
  • OpenClaw Partners with VirusTotal to Secure AI Agent Skill Marketplace February 7, 2026
  • OpenClaw v2026.2.6 Released With Support for Opus 4.6, GPT-5.3-Codex and Safety Scanner February 7, 2026
  • IT Security News Hourly Summary 2026-02-07 09h : 2 posts February 7, 2026
  • Cybercriminals Use Malicious Cybersquatting Attacks to Distribute Malware and Hijack Data February 7, 2026
  • nmapUnleashed Makes Nmap Scanning More Comfortable and Effective February 7, 2026
  • Hackers Exploit Free Firebase Accounts to Launch Phishing Campaigns February 7, 2026
  • Hackers Exploit Cybersquatting Tactics to Spread Malware and Steal Sensitive Information February 7, 2026
  • Cybersecurity Today: Month In Review – Microsoft Patch Fails, Fortinet Issues, and AI Risks February 7, 2026

Copyright © 2026 IT Security News. All Rights Reserved. The Magazine Basic Theme by bavotasan.com.

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}