IT Security News

Cybersecurity news and articles about information security, vulnerabilities, exploits, hacks, laws, spam, viruses, malware, breaches.

Main menu

Skip to content
  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Telegram Channel
CySecurity News - Latest Information Security and Hacking Incidents, EN

Malicious AI Chrome Extensions Steal Users Emails and Passwords

2026-02-14 20:02

30 malicious Chrome extensions used by over 300,000 users are pretending to be AI assistants to steal credentials, browsing information, and email content. Few extensions are still active in the Chrome Web Store and have been downloaded by tens of…

Read more →

EN, Security Affairs

Fintech firm Figure disclosed data breach after employee phishing attack

2026-02-14 19:02

Fintech firm Figure confirmed a data breach after hackers used social engineering to trick an employee and steal a limited number of files. Blockchain-based lending firm Figure confirmed a data breach after an employee fell victim to a social engineering…

Read more →

EN, Schneier on Security

Upcoming Speaking Engagements

2026-02-14 19:02

This is a current list of where and when I am scheduled to speak: I’m speaking at Ontario Tech University in Oshawa, Ontario, Canada, at 2 PM ET on Thursday, February 26, 2026. I’m speaking at the Personal AI Summit…

Read more →

hourly summary

IT Security News Hourly Summary 2026-02-14 18h : 1 posts

2026-02-14 19:02

1 posts were published in the last hour 16:34 : U.S. CISA adds a flaw in BeyondTrust RS and PRA to its Known Exploited Vulnerabilities catalog

Read more →

EN, Security Affairs

U.S. CISA adds a flaw in BeyondTrust RS and PRA to its Known Exploited Vulnerabilities catalog

2026-02-14 18:02

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in BeyondTrust RS and PRA to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added an BeyondTrust RS and PRA vulnerability, tracked as CVE-2026-1731 (CVSS score…

Read more →

EN, Security Boulevard

The Relationship Tax: What Staying With Your SEG Is Really Costing Your MSP

2026-02-14 16:02

Part 3 of a 4-Part Series: The SEG Breakup Guide for MSPs The post The Relationship Tax: What Staying With Your SEG Is Really Costing Your MSP appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read…

Read more →

hourly summary

IT Security News Hourly Summary 2026-02-14 15h : 2 posts

2026-02-14 16:02

2 posts were published in the last hour 13:36 : New Clickfix Attack Uses DNS Hijacking to Spread Malware 13:36 : Tesla Slashes Car Line-Up to Double Down on Robots and AI

Read more →

Cyber Security News, EN

New Clickfix Attack Uses DNS Hijacking to Spread Malware

2026-02-14 15:02

A new evolution in the ClickFix social engineering campaign, which now employs a custom DNS hijacking technique to deliver malware. This attack method tricks users into executing malicious commands that utilize DNS lookups to fetch the next stage of the…

Read more →

CySecurity News - Latest Information Security and Hacking Incidents, EN

Tesla Slashes Car Line-Up to Double Down on Robots and AI

2026-02-14 15:02

  Tesla is cutting several car models and scaling back its electric vehicle ambitions as it shifts focus towards robotics and artificial intelligence, marking a major strategic turning point for the company. The move comes after Tesla reported its first…

Read more →

EN, Security Latest

Ring Kills Flock Safety Deal After Super Bowl Ad Uproar

2026-02-14 14:02

Plus: Meta plans to add face recognition to its smart glasses, Jared Kushner named as part of whistleblower’s mysterious national security complaint, and more. This article has been indexed from Security Latest Read the original article: Ring Kills Flock Safety…

Read more →

EN, securityweek

Over 300 Malicious Chrome Extensions Caught Leaking or Stealing User Data

2026-02-14 14:02

With more than 37 million combined downloads, the extensions expose users to tracking and personal information theft. The post Over 300 Malicious Chrome Extensions Caught Leaking or Stealing User Data appeared first on SecurityWeek. This article has been indexed from…

Read more →

EN, Security Affairs

Suspected Russian hackers deploy CANFAIL malware against Ukraine

2026-02-14 13:02

A new alleged Russia-linked APT group targeted Ukrainian defense, government, and energy groups, with CANFAIL malware. Google Threat Intelligence Group identified a previously undocumented threat actor behind attacks on Ukrainian organizations using CANFAIL malware. The group is possibly linked to…

Read more →

Cybersecurity News: Threats, Vulnerabilities & Privacy Updates - gHacks, EN

260,000 Chrome Users Exposed by Fake AI Extensions Targeting Gmail

2026-02-14 13:02

We have seen our fair share of malicious Chrome extensions in the past 17 or so years since Google released the initial version of its browser. Thank you for being a Ghacks reader. The post 260,000 Chrome Users Exposed by…

Read more →

hourly summary

IT Security News Hourly Summary 2026-02-14 12h : 3 posts

2026-02-14 13:02

3 posts were published in the last hour 11:4 : Threat Actors Exploit Claude Artifacts and Google Ads to Target macOS Users 10:36 : Robot Dogs Are on Going on Patrol at the 2026 World Cup in Mexico 10:24 :…

Read more →

Cyber Security News, EN

Threat Actors Exploit Claude Artifacts and Google Ads to Target macOS Users

2026-02-14 13:02

A sophisticated malware campaign targeting macOS users through Google-sponsored search results and legitimate platforms, including Anthropic’s Claude AI and Medium. The campaign has already reached over 15,000 potential victims through two distinct attack variants that exploit users’ trust in established…

Read more →

EN, Security Latest

Robot Dogs Are on Going on Patrol at the 2026 World Cup in Mexico

2026-02-14 12:02

The Mexican city of Guadalupe, which will host portions of the 2026 World Cup, recently showed off four new robot dogs that will help provide security during matches at BBVA Stadium. This article has been indexed from Security Latest Read…

Read more →

CySecurity News - Latest Information Security and Hacking Incidents, EN

Largest Ever 31.4 Tbps DDoS Attack Attributed to Aisuru Botnet

2026-02-14 12:02

  A surge of traffic unprecedented to the public internet occurred in November 2025 for thirty five seconds. The acceleration was immediate and absolute, peaking at 31.4 terabits per second before dissipating nearly as quickly as it formed. As the…

Read more →

Cyber Security News, EN

Threat Actor Allegedly Selling Critical Severity OpenSea 0-day Exploit Chain on Hacking Forums

2026-02-14 11:02

A threat actor is reportedly selling a purported critical severity zero-day exploit chain targeting OpenSea for $100,000 USD in Bitcoin or Monero. The listing claims the vulnerability remains unpatched and undisclosed, raising alarms in the NFT community. The exploit allegedly…

Read more →

EN, Security Boulevard

Best Penetration Testing Companies in USA

2026-02-14 10:02

Cyber threats are growing at an unprecedented pace. In 2024 alone, global cyber threat losses reached an estimated US$9.5 trillion, and this figure is projected to rise even further in 2025. If threats were a country, it would rank as…

Read more →

EN, GBHackers Security | #1 Globally Trusted Cyber Security News Platform

REMnux v8 Linux Toolkit Released With AI-Powered Malware Analysis Capabilities

2026-02-14 08:02

The landscape of malware analysis has taken a significant leap forward with the official release of REMnux v8. This popular Linux toolkit, which has served the security community for fifteen years, has been updated to address modern threats and integrate…

Read more →

Cybersecurity Today, EN

The Dark Side of Valentine’s Day: AI Romance Scams | Cybersecurity Today

2026-02-14 07:02

This special Valentine’s Day episode of Cybersecurity Today examines romance scams (often called pig butchering) and how fraudsters exploit trust, vulnerability, and loneliness.  Host Jim Love speaks with McAfee Head of Threat Research Abhishek Karnik  about new findings showing the…

Read more →

hourly summary

IT Security News Hourly Summary 2026-02-14 06h : 1 posts

2026-02-14 07:02

1 posts were published in the last hour 4:20 : CISA Warns of Microsoft Configuration Manager SQL Injection Vulnerability Exploited in Attacks

Read more →

Cyber Security News, EN

CISA Warns of Microsoft Configuration Manager SQL Injection Vulnerability Exploited in Attacks

2026-02-14 06:02

CISA has issued an urgent alert about a critical SQL injection vulnerability in Microsoft Configuration Manager (SCCM). Tracked as CVE-2024-43468, this flaw lets unauthenticated attackers run malicious commands on servers and databases. Added to CISA’s Known Exploited Vulnerabilities (KEV) catalog…

Read more →

EN, Security News | TechCrunch

Indian pharmacy chain giant exposed customer data and internal systems

2026-02-14 05:02

A backend flaw in web admin dashboards used by one of India’s largest pharmacy chains, exposed thousands of online pharmacy orders. This article has been indexed from Security News | TechCrunch Read the original article: Indian pharmacy chain giant exposed…

Read more →

Page 267 of 5176
« 1 … 265 266 267 268 269 … 5,176 »

Pages

  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Telegram Channel

Recent Posts

  • Pegasus Spyware: How to Detect, Prevent and Remove It April 1, 2026
  • Google fixes fourth actively exploited Chrome zero-day of 2026 April 1, 2026
  • Autonomous SOC Explained: How Agentic Investigation Solves What Playbooks Couldn’t April 1, 2026
  • Frequently Asked Questions About the Axios npm Supply Chain Attack by North Korea-Nexus Threat Actor UNC1069 April 1, 2026
  • Claude Mythos Wake-Up Call: What AI Vulnerability Discovery Means for Cyber Defense April 1, 2026
  • Amazon security boss: AI makes pentesting 40% more efficient April 1, 2026
  • Apple releases security fix for older iPhones and iPads to protect against DarkSword attacks April 1, 2026
  • BSidesSLC 2025 – Closing Ceremonies — Highlights, Prizes & Sponsor Shoutouts April 1, 2026
  • Survey Surfaces Greater CISO Appreciation for Scope of AI Threat April 1, 2026
  • Cyberattack hits Hasbro, impacting orders and shipping April 1, 2026
  • Threat Brief: Widespread Impact of the Axios Supply Chain Attack April 1, 2026
  • Magecart Hackers Uses 100+ Domains to Hijack eStores Checkouts and Steal Card Data April 1, 2026
  • The AI Intelligence Layer for SIEM, Explained: What It Does, Why It Matters, and How to Evaluate One April 1, 2026
  • Google Rolls Out Android Developer Verification to Curb Anonymous App Distribution April 1, 2026
  • IT Security News Hourly Summary 2026-04-01 21h : 1 posts April 1, 2026
  • CERT-UA Impersonation Campaign Spread AGEWHEEZE Malware to 1 Million Emails April 1, 2026
  • Secure Access Tokens in Web Applications: A Practical Guide From the Field April 1, 2026
  • Planning a spring break trip? Don’t fall for these 7 travel scams April 1, 2026
  • Agentic AI Governance: How to Approach It April 1, 2026
  • LinkedIn Phishing Scam Uses Fake Notifications to Hijack Accounts April 1, 2026

Copyright © 2026 IT Security News. All Rights Reserved. The Magazine Basic Theme by bavotasan.com.

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}