IT Security News

Cybersecurity news and articles about information security, vulnerabilities, exploits, hacks, laws, spam, viruses, malware, breaches.

Main menu

Skip to content
  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Telegram Channel
EN, The Hacker News

Lazarus Campaign Plants Malicious Packages in npm and PyPI Ecosystems

2026-02-12 20:02

Cybersecurity researchers have discovered a fresh set of malicious packages across npm and the Python Package Index (PyPI) repository linked to a fake recruitment-themed campaign orchestrated by the North Korea-linked Lazarus Group. The coordinated campaign has been codenamed graphalgo in…

Read more →

EN, The Hacker News

Google Reports State-Backed Hackers Using Gemini AI for Recon and Attack Support

2026-02-12 20:02

Google on Thursday said it observed the North Korea-linked threat actor known as UNC2970 using its generative artificial intelligence (AI) model Gemini to conduct reconnaissance on its targets, as various hacking groups continue to weaponize the tool for accelerating various…

Read more →

EN, Microsoft Security Blog

Your complete guide to Microsoft experiences at RSAC™ 2026 Conference

2026-02-12 20:02

Microsoft Security returns to RSAC Conference to show how Frontier Firms—organizations that are human-led and agent-operated—can stay ahead. The post Your complete guide to Microsoft experiences at RSAC™ 2026 Conference appeared first on Microsoft Security Blog. This article has been…

Read more →

EN, Security News | TechCrunch

More US investors sue South Korean government over handling of Coupang data breach

2026-02-12 19:02

Coupang’s massive data breach has sparked U.S. investor lawsuits against the South Korean government over alleged discrimination This article has been indexed from Security News | TechCrunch Read the original article: More US investors sue South Korean government over handling…

Read more →

Cyber Security News, EN

Feiniu NAS Devices Infected in Large-Scale Netdragon Botnet Attack Exploiting Unpatched Vulnerabilities

2026-02-12 19:02

A serious security incident has recently emerged involving Feiniu (fnOS) Network Attached Storage devices. These systems are being actively targeted and infected by the Netdragon botnet, a malware strain that first appeared in October 2024. The attackers are leveraging undisclosed…

Read more →

Cyber Security News, EN

DShield Sensor Captures Self-Propagating SSH Worm Exploit Using Credential Stuffing and Multi-Stage Malware

2026-02-12 19:02

A sophisticated self-spreading worm has emerged that can completely compromise Linux systems through SSH brute-force attacks in just four seconds. This new threat combines traditional credential stuffing techniques with modern cryptographic command verification, creating a fast-moving botnet that specifically targets…

Read more →

Cyber Security News, EN

DragonForce Ransomware Group Expands Its Influence with Cartel-like Operations and Targeting 363 Companies Since 2023

2026-02-12 19:02

DragonForce has established itself as a formidable entity in the cybercrime landscape, having been active since December 2023. Operating under a sophisticated Ransomware-as-a-Service (RaaS) model, the group aggressively brands itself as a “cartel” to consolidate power and influence. This strategic…

Read more →

Cyber Security News, EN

ORB Networks Mask Cyberattacks Using Compromised IoT Devices and SOHO Routers

2026-02-12 19:02

Operational Relay Box networks have emerged as one of the most sophisticated tools used by threat actors to hide their cyberattacks from security teams worldwide. These obfuscated mesh networks consist of compromised Internet-of-Things devices, Small Office/Home Office routers, and Virtual…

Read more →

Cyber Security News, EN

287 Chrome Extensions Exfiltrate Browsing History From 37.4 Million Users

2026-02-12 19:02

A massive data exfiltration operation involving 287 Chrome extensions that secretly steal browsing history from approximately 37.4 million users worldwide. According to research with alias qcontinuum1, the discovery represents roughly one percent of the global Chrome user base, highlighting a…

Read more →

EN, Security Boulevard

Constella Intelligence Unveils 2026 Identity Breach Report: The Industrialization of Identity

2026-02-12 19:02

New research reveals a 1-trillion-attribute threat landscape driven by machine speed and scale, and high-density credential consolidation. LOS ALTOS, CA — February 12, 2026 — Constella, the leader in Identity Risk Intelligence, today announced the release of its flagship 2026 Identity Breach…

Read more →

EN, Security Boulevard

NDSS 2025 – Revisiting Concept Drift In Windows Malware Detection

2026-02-12 19:02

Session 12B: Malware Authors, Creators & Presenters: Adrian Shuai Li (Purdue University), Arun Iyengar (Intelligent Data Management and Analytics, LLC), Ashish Kundu (Cisco Research), Elisa Bertino (Purdue University) PAPER Revisiting Concept Drift in Windows Malware Detection: Adaptation to Real Drifted…

Read more →

CySecurity News - Latest Information Security and Hacking Incidents, EN

Model Context Protocol Security Crisis Deepens as Exposed AI Agents Create Massive Attack Surface

2026-02-12 19:02

  The Model Context Protocol (MCP) continues to face mounting security concerns that show no signs of fading. When vulnerabilities were first highlighted last October, early research already pointed to serious risks. Findings from Pynt indicated that installing just 10…

Read more →

CySecurity News - Latest Information Security and Hacking Incidents, EN

Exposed Training Opens the Gap for Crypto Mining in Cloud Enviornments

2026-02-12 19:02

Purposely flawed training apps are largely used for security education, product demonstrations, and internal testing. Tools like bWAPP, OWASP Juice Shop, and DVWA are built to be unsafe by default, making them useful to learn how common attack tactics work…

Read more →

EN, Security News | TechCrunch

More U.S. investors sue South Korean government over handling of Coupang data breach

2026-02-12 19:02

Coupang’s massive data breach has sparked U.S. investor lawsuits against the South Korean government over alleged discrimination This article has been indexed from Security News | TechCrunch Read the original article: More U.S. investors sue South Korean government over handling…

Read more →

Cyber Defense Magazine, EN

The Evolving Role of The CISO In Today’s Security Landscape

2026-02-12 19:02

Introduction Over the past decade, few corporate roles have transformed as rapidly or as profoundly as the Chief Information Security Officer (CISO). Once regarded as a deeply technical position responsible for firewalls,… The post The Evolving Role of The CISO In Today’s…

Read more →

Cyber Defense Magazine, EN

Is Your Small Business Truly Protected from Cybersecurity Threats?

2026-02-12 19:02

Cybersecurity threats are increasing at a sobering rate, with 600 million cyberattacks occurring every day worldwide. It is estimated a cyberattack is taking place against a small business every 11 seconds and average losses… The post Is Your Small Business Truly Protected from Cybersecurity…

Read more →

Cyber Defense Magazine, EN

Israel’s Cybersecurity Machine: Inside the Playbook Powering Tel Aviv’s Exit Factory

2026-02-12 19:02

If you’ve been in cybersecurity for more than five minutes, you already know the script: some ex–Unit 8200 founders spin out of an Israeli startup, raise a monster round from… The post Israel’s Cybersecurity Machine: Inside the Playbook Powering Tel…

Read more →

Cyber Defense Magazine, EN

The Unknown Present: Why Safety Fails the Moment, We Need It Most

2026-02-12 19:02

Modern disasters rarely occur because safety standards were absent. They occur because, at the moment of need, no one could evidence whether safety still existed. This distinction is uncomfortable, because… The post The Unknown Present: Why Safety Fails the Moment,…

Read more →

Cyber Defense Magazine, EN

Prioritizing Control of Unmanaged Identities for The Modern Enterprise

2026-02-12 19:02

As organizations accelerate digital transformation through cloud migration and rapid AI integration, a growing risk is emerging in the form of unmanaged identities. These include both human and machine identities,… The post Prioritizing Control of Unmanaged Identities for The Modern…

Read more →

hourly summary

IT Security News Hourly Summary 2026-02-12 18h : 8 posts

2026-02-12 19:02

8 posts were published in the last hour 16:32 : How to Eliminate the Technical Debt of Insecure AI-Assisted Software Development 16:32 : 42,900 OpenClaw Exposed Control Panels and Why You Should Care 16:31 : Malicious Outlook Add-In Hijack Steals…

Read more →

EN, securityweek

How to Eliminate the Technical Debt of Insecure AI-Assisted Software Development

2026-02-12 18:02

Developers must view AI as a collaborator to be closely monitored, rather than an autonomous entity to be unleashed. Without such a mindset, crippling tech debt is inevitable. The post How to Eliminate the Technical Debt of Insecure AI-Assisted Software…

Read more →

EN, Security Boulevard

42,900 OpenClaw Exposed Control Panels and Why You Should Care

2026-02-12 18:02

Over the past two weeks, most coverage around Moltbot and OpenClaw has chased the flashy angle. One-click exploits, remote code execution, APT chatter, scary screenshots. Meanwhile, security teams are doing… The post 42,900 OpenClaw Exposed Control Panels and Why You…

Read more →

CySecurity News - Latest Information Security and Hacking Incidents, EN

Malicious Outlook Add-In Hijack Steals 4,000 Microsoft Credentials

2026-02-12 18:02

  A breach transformed the AgreeTo plug-in for Microsoft Outlook – once meant for organizing meetings – into a weapon that harvested over four thousand login details. Though built by a third-party developer and offered through the official Office Add-in…

Read more →

Blog - Wordfence, EN

Wordfence Intelligence Weekly WordPress Vulnerability Report (February 2, 2026 to February 8, 2026)

2026-02-12 18:02

📢 Did you know Wordfence runs a Bug Bounty Program for all WordPress plugin and themes at no cost to vendors? Researchers can earn up to $31,200 per vulnerability, for all in-scope vulnerabilities submitted to our Bug Bounty Program! Find…

Read more →

Page 278 of 5178
« 1 … 276 277 278 279 280 … 5,178 »

Pages

  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Telegram Channel

Recent Posts

  • New ZAP PTK Add-On Converts Browser Security Findings Into Native ZAP Alerts April 2, 2026
  • FBI Warns Chinese Mobile Apps Could Expose User Data to Cyberattacks April 2, 2026
  • The European Commission confirms attack on its Europa web platform April 2, 2026
  • Apple Releases iOS 18.7.7 Update to Extend DarkSword Exploit Protection to More iPhones and iPads April 2, 2026
  • New iOS patches over DarkSword, FBI: surveillance hack is major incident, Cisco code stolen in Trivy-linked breach April 2, 2026
  • North Korean Attackers Compromise Popular Web Tool April 2, 2026
  • TA416 Broadens Europe Spy Campaign With Web Bugs and Malware April 2, 2026
  • Critical PX4 Autopilot Vulnerability Let Attackers Gain Control of Drones April 2, 2026
  • Cisco Smart Software Manager Flaw Allowed Arbitrary Command Execution April 2, 2026
  • Enterprise AI security: weighing the benefits and risks in 2026 April 2, 2026
  • Top 20 Best Digital Forensic Tools in 2026 April 2, 2026
  • 10 Best VPN For Privacy In 2026 April 2, 2026
  • Starbucks Breach – Attacks Allegedly Claim 10GB of Stolen Source Code April 2, 2026
  • IT Security News Hourly Summary 2026-04-02 09h : 1 posts April 2, 2026
  • Bank Negara Malaysia RMiT Update: New Authentication Rules for Fintech and Banks April 2, 2026
  • WhatsApp Attack Chain Delivers VBS, Cloud Payloads, MSI Backdoor April 2, 2026
  • Trust, friction, and ROI: A CISO’s take on making security work for the business April 2, 2026
  • Remcos RAT Attack Uses Obfuscated Scripts, Trusted Windows Tools April 2, 2026
  • Cisco Warns of Critical IMC Vulnerability Enabling Authentication Bypass April 2, 2026
  • NSFOCUS Monthly APT Insights – January 2026 April 2, 2026

Copyright © 2026 IT Security News. All Rights Reserved. The Magazine Basic Theme by bavotasan.com.

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}