IT Security News

Cybersecurity news and articles about information security, vulnerabilities, exploits, hacks, laws, spam, viruses, malware, breaches.

Main menu

Skip to content
  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Apps
    • Telegram Channel
hourly summary

IT Security News Hourly Summary 2025-12-08 18h : 5 posts

2025-12-08 19:12

5 posts were published in the last hour 17:3 : Google Confirms Rising ‘Account Takeovers ’— Users Told to Check Chrome Settings 17:3 : Petco’s security lapse affected customers’ SSNs, drivers’ licenses and more 17:3 : New GhostFrame Super Stealthy…

Read more →

EN, Security Archives - TechRepublic

Google Confirms Rising ‘Account Takeovers ’— Users Told to Check Chrome Settings

2025-12-08 19:12

Google warns Chrome users of rising “account takeovers” and urges stronger authentication to keep accounts and synced data safe. The post Google Confirms Rising ‘Account Takeovers ’— Users Told to Check Chrome Settings appeared first on TechRepublic. This article has…

Read more →

EN, Security News | TechCrunch

Petco’s security lapse affected customers’ SSNs, drivers’ licenses and more

2025-12-08 19:12

Petco said the exposure was due to an error in an application, and that it is notifying victims’ whose data was affected. This article has been indexed from Security News | TechCrunch Read the original article: Petco’s security lapse affected…

Read more →

Cyber Security News, EN

New GhostFrame Super Stealthy Phishing Kit Attacks Millions of Users Worldwide

2025-12-08 19:12

A sophisticated new phishing kit called GhostFrame has already been used to launch over 1 million attacks. First discovered in September 2025 by Security researchers at Barracuda, this stealthy tool represents a dangerous evolution in phishing-as-a-service technology. What makes GhostFrame…

Read more →

EN, www.infosecurity-magazine.com

ClayRat Android Spyware Expands Capabilities

2025-12-08 19:12

A new version of ClayRat Android spyware features enhanced surveillance and device-control features This article has been indexed from www.infosecurity-magazine.com Read the original article: ClayRat Android Spyware Expands Capabilities

Read more →

Cybersecurity Dive - Latest News, EN

Ransomware peaked in 2023 prior to law enforcement actions

2025-12-08 19:12

U.S. Treasury report shows drop in threat activity in the wake of aggressive takedown efforts. This article has been indexed from Cybersecurity Dive – Latest News Read the original article: Ransomware peaked in 2023 prior to law enforcement actions

Read more →

EN, Security Affairs

Oracle EBS zero-day used by Clop to breach Barts Health NHS

2025-12-08 18:12

Clop ransomware stole data from Barts Health NHS after exploiting a zero-day in its Oracle E-Business Suite. Barts Health NHS confirmed that Clop ransomware group stole data by exploiting zero-day CVE-2025-61882 in its Oracle E-Business Suite. The cybercrime group added…

Read more →

Cyber Security News, EN

NVIDIA and Lakera AI Propose Unified Framework for Agentic System Safety

2025-12-08 18:12

As artificial intelligence systems become more autonomous, their ability to interact with digital tools and data introduces complex new risks. Recognizing this challenge, researchers from NVIDIA and Lakera AI have collaborated on a new paper proposing a unified framework for…

Read more →

Cyber Security News, EN

QuasarRAT Core Functionalities Along with Encrypted Configuration and Obfuscation Techniques Exposed

2025-12-08 18:12

QuasarRAT, initially surfacing in 2014 under the alias xRAT, began its lifecycle as a legitimate remote administration tool for Windows environments. Over the last decade, however, its open-source nature and accessibility have facilitated its transformation into a potent instrument for…

Read more →

EN, Malwarebytes

How phishers hide banking scams behind free Cloudflare Pages

2025-12-08 18:12

We found a campaign that hosts fake login pages on Cloudflare Pages and sends the stolen info straight to Telegram. This article has been indexed from Malwarebytes Read the original article: How phishers hide banking scams behind free Cloudflare Pages

Read more →

EN, www.infosecurity-magazine.com

Marquis Software Breach Affects Over 780,000 Nationwide

2025-12-08 18:12

A data breach at Marquis Software Solutions due to a firewall flaw has affected over 780,000 people across the US This article has been indexed from www.infosecurity-magazine.com Read the original article: Marquis Software Breach Affects Over 780,000 Nationwide

Read more →

Cybersecurity Dive - Latest News, EN

Major drug research company confirms cyberattack compromised employee and partner data

2025-12-08 18:12

Indiana-based Inotiv said it was still evaluating the hack’s impact on its business. This article has been indexed from Cybersecurity Dive – Latest News Read the original article: Major drug research company confirms cyberattack compromised employee and partner data

Read more →

EN, Latest Hacking News | Cyber Security News, Hacking Tools and Penetration Testing Courses

INE Earns G2 Winter 2026 Badges Across Global Markets

2025-12-08 17:12

Cary, North Carolina, USA, 8th December 2025, CyberNewsWire INE Earns G2 Winter 2026 Badges Across Global Markets on Latest Hacking News | Cyber Security News, Hacking Tools and Penetration Testing Courses. This article has been indexed from Latest Hacking News…

Read more →

CySecurity News - Latest Information Security and Hacking Incidents, EN

Cyberattacks Target Seven Major Indian Airports Through GPS Spoofing

2025-12-08 17:12

  The Indian Ministry of Home Affairs has revealed that seven key airports in the country were hit by GPS spoofing cyber attacks in November 2025, Union Civil Aviation Minister Ram MohanNaidu said. The airports affected are the Indira Gandhi…

Read more →

CySecurity News - Latest Information Security and Hacking Incidents, EN

AI IDE Security Flaws Exposed: Over 30 Vulnerabilities Highlight Risks in Autonomous Coding Tools

2025-12-08 17:12

  More than 30 security weaknesses in various AI-powered IDEs have recently been uncovered, raising concerns as to how emerging automated development tools might unintentionally expose sensitive data or enable remote code execution. A collective set of vulnerabilities, referred to…

Read more →

blog.avast.com EN, EN

Don’t get scammed: Your holiday guide to spotting fake e-shops

2025-12-08 17:12

Holiday shopping is in full swing, and so is the hunt for great deals. As online shopping becomes the default for many, a shadowy industry of fake e-shops is growing right alongside it. This article has been indexed from blog.avast.com…

Read more →

EN, Security Blog G Data Software AG

Lumma Stealer: Danger lurking in fake game updates from itch.io and Patreon

2025-12-08 17:12

After patches on mainstream gaming platforms like Steam, indie game platforms as well as Patreon have become the latest platforms for distributing malware. This article has been indexed from Security Blog G Data Software AG Read the original article: Lumma…

Read more →

Cyber Security News, EN

US Accounts for 44% of Cyber Attacks; Financial Gain Targets Public Administration

2025-12-08 17:12

The United States continues to face an unprecedented surge in cyber threats, accounting for nearly half of all documented cyber attacks globally between 2024 and 2025. Recent data from the Cyber Events Database reveals that the US experienced 646 reported…

Read more →

Cyber Security News, EN

Critical Cal.com Vulnerability Let Attackers Bypass Authentication Via Fake TOTP Codes

2025-12-08 17:12

A severe authentication bypass vulnerability has been discovered in cal.com, the popular open-source scheduling platform. Allowing attackers to gain unauthorized access to user accounts by submitting fake TOTP codes. According to GitHub, flaw tracked as CVE-2025-66489, this critical flaw affects versions…

Read more →

Cyber Security News, EN

CISA Adds Critical React2Shell Vulnerability to KEV Catalog Following Active Exploitation

2025-12-08 17:12

A critical vulnerability affecting Meta React Server Components has been added to the Known Exploited Vulnerabilities catalog, signalling widespread active exploitation by CISA. Tracked as CVE-2025-55182, this remote code execution vulnerability poses an immediate threat to organizations that rely on…

Read more →

Cyber Security News, EN

Hackers Leverage Multiple Ad Networks to Attack Adroid Users With Triada Malware

2025-12-08 17:12

Mobile security continues to face significant challenges as sophisticated malware campaigns evolve to bypass traditional defenses. The Triada Trojan, a persistent threat to Android users for nearly a decade, has resurfaced with a highly coordinated operation targeting advertising networks. This…

Read more →

Cyber Security News, EN

Hackers Can Leverage Delivery Receipts on WhatsApp and Signal to Extract User Private Information

2025-12-08 17:12

Security researchers have exposed a critical privacy flaw dubbed “Careless Whisper” that lets attackers monitor user activity on WhatsApp and Signal through silent delivery receipts, without alerting victims or needing prior contact. By crafting stealthy messages like reactions to nonexistent…

Read more →

EN, securityweek

Resemble AI Raises $13 Million for AI Threat Detection

2025-12-08 17:12

The cybersecurity startup will use the investment to accelerate product development and fuel global expansion. The post Resemble AI Raises $13 Million for AI Threat Detection appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original…

Read more →

EN, securityweek

CISO Conversations: Keith McCammon, CSO and Co-founder at Red Canary

2025-12-08 17:12

From a basement computer lab to the C-Suite: How Keith McCammon built his career and Red Canary with zero formal training. The post CISO Conversations: Keith McCammon, CSO and Co-founder at Red Canary appeared first on SecurityWeek. This article has…

Read more →

Page 28 of 4621
« 1 … 26 27 28 29 30 … 4,621 »

Pages

  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Apps
    • Telegram Channel

Recent Posts

  • Home Renovation Choices That Often Do Not Deliver Real Value December 13, 2025
  • IT Security News Hourly Summary 2025-12-13 18h : 2 posts December 13, 2025
  • IDESaster Report: Severe AI Bugs Found in AI Agents Can Lead to Data Theft and Exploit December 13, 2025
  • NDSS 2025 – A Systematic Evaluation Of Novel And Existing Cache Side Channels December 13, 2025
  • UK’s ICO Fine LastPass £1.2 Million Over 2022 Security Breach December 13, 2025
  • Fake GitHub OSINT Tools Spread PyStoreRAT Malware December 13, 2025
  • AI Browsers Raise Privacy and Security Risks as Prompt Injection Attacks Grow December 13, 2025
  • Apple Addresses Two Actively Exploited Zero-Day Security Flaws December 13, 2025
  • 5 Critical Situations Where You Should Never Rely on ChatGPT December 13, 2025
  • CISA Warns of Google Chromium 0-Day Vulnerability Exploited in Attacks December 13, 2025
  • Empire 6.3.0 Launches With New Features for Red Teams and Penetration Testers December 13, 2025
  • Google Warns Multiple Hacker Groups Are Exploiting React2Shell to Spread Malware December 13, 2025
  • CISA Adds Actively Exploited Sierra Wireless Router Flaw Enabling RCE Attacks December 13, 2025
  • AI Toys for Kids Talk About Sex, Drugs, and Chinese Propaganda December 13, 2025
  • U.S. CISA adds Google Chromium and Sierra Wireless AirLink ALEOS flaws to its Known Exploited Vulnerabilities catalog December 13, 2025
  • Rust-Based Luca Stealer Spreads Across Linux and Windows Systems December 13, 2025
  • IT Security News Hourly Summary 2025-12-13 09h : 2 posts December 13, 2025
  • Hackers Target Windows Systems Using Phantom Stealer Hidden in ISO Files December 13, 2025
  • New Phantom Stealer Campaign Hits Windows Machines Through ISO Mounting December 13, 2025
  • Apple Issues Security Updates After Two WebKit Flaws Found Exploited in the Wild December 13, 2025

Copyright © 2025 IT Security News. All Rights Reserved. The Magazine Basic Theme by bavotasan.com.

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}