IT Security News

Cybersecurity news and articles about information security, vulnerabilities, exploits, hacks, laws, spam, viruses, malware, breaches.

Main menu

Skip to content
  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Telegram Channel
DE, heise Security

Quishing: Zunahme von Phishing-Betrugsmasche mit QR-Codes

2024-08-30 08:08

Das LKA und die Verbraucherzentrale NRW warnen vor zunehmenden Betrug mit Quishing: Phishing mit QR-Codes. Dieser Artikel wurde indexiert von heise Security Lesen Sie den originalen Artikel: Quishing: Zunahme von Phishing-Betrugsmasche mit QR-Codes

Read more →

DE, heise Security

Support ausgelaufen: Attacken auf IP-Kamera von Avtech beobachtet

2024-08-30 08:08

Derzeit attackiert das Corona-Mirai-Botnet die IP-Kamera AVM1203 von Avtech. Die Kamera wird in öffentlichen Einrichtungen und Industrieanlagen verwendet. Dieser Artikel wurde indexiert von heise Security Lesen Sie den originalen Artikel: Support ausgelaufen: Attacken auf IP-Kamera von Avtech beobachtet

Read more →

DE, heise Security

Filmstudios lassen größte illegale Streaming-Seite schließen

2024-08-30 08:08

Die “größte Organisation von illegalem Streaming der Welt” ist nicht mehr erreichbar: Fmovies wurde von vietnamesischen Behörden vom Netz genommen. Dieser Artikel wurde indexiert von heise Security Lesen Sie den originalen Artikel: Filmstudios lassen größte illegale Streaming-Seite schließen

Read more →

DE, Golem.de - Security

Fmovies und mehr: ACE zerschlägt reihenweise illegale Streamingdienste

2024-08-30 08:08

Schon im Juni gab es bei Fmovies plötzlich keine neuen Inhalte mehr. Danach gingen mehrere illegale Streamingdienste vom Netz. Die ACE bekennt sich schuldig. (Streaming, Urheberrecht) Dieser Artikel wurde indexiert von Golem.de – Security Lesen Sie den originalen Artikel: Fmovies…

Read more →

EN, GBHackers on Security | #1 Globally Trusted Cyber Security News Platform

Hackers Repeatedly Using Same iOS & Chrome Exploits to Attack Government Websites

2024-08-30 08:08

Hackers have been exploiting vulnerabilities in iOS and Google Chrome to target government websites, particularly in Mongolia. Google’s Threat Analysis Group (TAG) observed these attacks, which have been linked to the Russian government-backed actor APT29. The hackers have repeatedly used…

Read more →

Cyware News - Latest Cyber News, EN

US Election-Themed Phishing Scams Rely on Fake Donation Sites

2024-08-30 08:08

The domain actsblue[.]com is posing as the legitimate actblue[.]com, a platform for Democratic Party donations. The malicious site is registered anonymously with Namecheap, making it difficult to trace back to the threat actors. This article has been indexed from Cyware…

Read more →

Cyware News - Latest Cyber News, EN

Buffer Overflow Flaw in TP-Link Routers Opens Door to RCE

2024-08-30 08:08

A critical vulnerability, CVE-2024-42815, with a CVSS score of 9.8, has been discovered in TP-Link RE365 V1_180213 series routers, allowing for remote exploitation and potential takeover. This article has been indexed from Cyware News – Latest Cyber News Read the…

Read more →

EN, The Hacker News

Atlassian Confluence Vulnerability Exploited in Crypto Mining Campaigns

2024-08-30 08:08

Threat actors are actively exploiting a now-patched, critical security flaw impacting the Atlassian Confluence Data Center and Confluence Server to conduct illicit cryptocurrency mining on susceptible instances. “The attacks involve threat actors that employ methods such as the deployment of…

Read more →

EN, The Hacker News

New Cyberattack Targets Chinese-Speaking Businesses with Cobalt Strike Payloads

2024-08-30 08:08

Chinese-speaking users are the target of a “highly organized and sophisticated attack” campaign that is likely leveraging phishing emails to infect Windows systems with Cobalt Strike payloads. “The attackers managed to move laterally, establish persistence and remain undetected within the…

Read more →

EN, The Hacker News

SANS Institute Unveils Critical Infrastructure Strategy Guide for 2024: A Call to Action for Securing ICS/OT Environments

2024-08-30 08:08

A comprehensive guide authored by Dean Parsons emphasizes the growing need for specialized ICS security measures in the face of rising cyber threats. With a staggering 50% increase in ransomware attacks targeting industrial control systems (ICS) in 2023, the SANS…

Read more →

EN, The Hacker News

North Korean Hackers Target Developers with Malicious npm Packages

2024-08-30 08:08

Threat actors with ties to North Korea have been observed publishing a set of malicious packages to the npm registry, indicating “coordinated and relentless” efforts to target developers with malware and steal cryptocurrency assets. The latest wave, which was observed…

Read more →

Cybersecurity Today, EN

Deepfake Scams, Fake Global Protect Malware, and Russian Threats:Cybersecurity Today: for Friday, August 30th, 2024

2024-08-30 08:08

In this episode of Cybersecurity Today, host Jim Love dives into the alarming rise of deepfake scams, highlighting how threat actors are using AI-generated videos to lure victims into fraudulent schemes. A notable campaign involves deepfake videos of Elon Musk…

Read more →

Cybersecurity Insiders, EN

Palo Alto Networks found to spread Malware

2024-08-30 07:08

Palo Alto Networks is currently being misused as a cover for malware distribution. Although the California-based cybersecurity company is not involved in these activities, hackers are exploiting the company’s name to propagate malware disguised as the ‘Palo Alto Networks Global…

Read more →

Cybersecurity Insiders, EN

How Ransomware Is Evolving into a Geopolitical Weapon

2024-08-30 07:08

In recent years, ransomware attacks have evolved from mere cyber-criminal activities into sophisticated tools of geopolitical maneuvering. As the digital landscape continues to expand, ransomware has emerged not just as a method of financial extortion but as a potent geopolitical…

Read more →

EN, Security Affairs

Russia-linked APT29 reused iOS and Chrome exploits previously developed by NSO Group and Intellexa

2024-08-30 07:08

Russia-linked APT29 group was spotted reusing iOS and Chrome exploits previously developed by surveillance firms NSO Group and Intellexa. Google TAG (Threat Analysis Group) researchers observed the Russia-linked group APT29 (aka SVR group, BlueBravo, Cozy Bear, Nobelium, Midnight Blizzard, and The Dukes). using exploits previously used…

Read more →

EN, Have I Been Pwned latest breaches

Lookiero – 4,981,760 breached accounts

2024-08-30 07:08

In August 2024, a data breach from the online styling service Lookiero was posted to a popular hacking forum. Dating back to March 2024, the data included 5M unique email addresses, with many of the records also including name, phone…

Read more →

DE, heise Security

Eset-Sicherheitsexperten warnen vor gefälschten Promi-Werbevideos

2024-08-30 06:08

Deepfake-Werbevideos mit Prominenten sollen Menschen zu dubiosen Investitionen bewegen. Die Sicherheitsfirma Eset warnt vor der Betrugsmasche. Dieser Artikel wurde indexiert von heise Security Lesen Sie den originalen Artikel: Eset-Sicherheitsexperten warnen vor gefälschten Promi-Werbevideos

Read more →

EN, Help Net Security

A macro look at the most pressing cybersecurity risks

2024-08-30 06:08

Forescout’s 2024H1 Threat Review is a new report that reviews the current state of vulnerabilities, threat actors, and ransomware attacks in the first half of 2024 and compares them to H1 2023. “Attackers are looking for any weak point to…

Read more →

EN, The Register - Security

Iran hunts down double agents with fake recruiting sites, Mandiant reckons

2024-08-30 05:08

Farsi-language posts target possibly-pro-Israel individuals Government-backed Iranian actors allegedly set up dozens of fake recruiting websites and social media accounts to hunt down double agents and dissidents suspected of collaborating with the nation’s enemies, including Israel.… This article has been…

Read more →

EN, Help Net Security

Sinon: Open-source automatic generative burn-in for Windows deception hosts

2024-08-30 05:08

Sinon is an open-source, modular tool for the automatic burn-in of Windows-based deception hosts. It aims to reduce the difficulty of orchestrating deception hosts at scale while enabling diversity and randomness through generative capabilities. Sinon is designed to automate the…

Read more →

DE, heise Security

Cyberkriminelle nehmen Spyware-Hersteller als Vorbild bei Angriff auf Browser

2024-08-30 04:08

Cyberangriffe auf Besucher von Regierungsseiten zeigen dasselbe Vorgehen wie Intellexa und die NSO Group. Es war wohl eine von Russland unterstützte Gruppe. Dieser Artikel wurde indexiert von heise Security Lesen Sie den originalen Artikel: Cyberkriminelle nehmen Spyware-Hersteller als Vorbild bei…

Read more →

EN, Help Net Security

New infosec products of the week: August 30, 2024

2024-08-30 04:08

Here’s a look at the most interesting products from the past week, featuring releases from Bitwarden, Dragos, Fortinet, HYCU, and Rezonate. Fortinet introduces sovereign SASE and GenAI capabilities Fortinet announced the addition of sovereign SASE and GenAI capabilities to its…

Read more →

EN, Help Net Security

Cyber threats that shaped the first half of 2024

2024-08-30 04:08

Global cybercrime has shown no sign of decline and is expected to grow strong per year over the next five years. To identify the most urgent cybersecurity threats of the first half of 2024, the Critical Start Cyber Research Unit…

Read more →

EN, SANS Internet Storm Center, InfoCON: green

ISC Stormcast For Friday, August 30th, 2024 https://isc.sans.edu/podcastdetail/9120, (Fri, Aug 30th)

2024-08-30 03:08

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from SANS Internet Storm Center, InfoCON: green Read the original article: ISC Stormcast For Friday, August 30th, 2024…

Read more →

Page 2918 of 4872
« 1 … 2,916 2,917 2,918 2,919 2,920 … 4,872 »

Pages

  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Telegram Channel

Recent Posts

  • Unsecured Database Exposes 149 Million Logins Linked to Infostealer Malware Operations February 7, 2026
  • ACF Plugin Flaw Exposes 50,000 WordPress Sites to Admin Takeover February 7, 2026
  • BridgePay Payment Gateway Hit by Ransomware, Causing Nationwide Outages February 7, 2026
  • IT Security News Hourly Summary 2026-02-07 15h : 3 posts February 7, 2026
  • Hackers Linked to State Actors Target Signal Messages of Military Officials and Journalists February 7, 2026
  • Organizations Urged to Replace Discontinued Edge Devices February 7, 2026
  • China-Linked DKnife Threat Underscores Risks to Network Edge Devices February 7, 2026
  • Apple Pay Users Targeted by Phishing Attack Aimed at Stealing Payment Details February 7, 2026
  • Study confirms experience beats youthful enthusiasm February 7, 2026
  • German Agencies Warn of Signal Phishing Targeting Politicians, Military, Journalists February 7, 2026
  • State-Backed Hackers Target Military Officials and Journalists on Signal in Latest Cyberattack February 7, 2026
  • Moltbook, the Social Network for AI Agents, Exposed Real Humans’ Data February 7, 2026
  • CISA pushes Federal agencies to retire end-of-support edge devices February 7, 2026
  • BeyondTrust Remote Access Products 0-Day Vulnerability Allows Remote Code Execution February 7, 2026
  • OpenClaw Partners with VirusTotal to Secure AI Agent Skill Marketplace February 7, 2026
  • OpenClaw v2026.2.6 Released With Support for Opus 4.6, GPT-5.3-Codex and Safety Scanner February 7, 2026
  • IT Security News Hourly Summary 2026-02-07 09h : 2 posts February 7, 2026
  • Cybercriminals Use Malicious Cybersquatting Attacks to Distribute Malware and Hijack Data February 7, 2026
  • nmapUnleashed Makes Nmap Scanning More Comfortable and Effective February 7, 2026
  • Hackers Exploit Free Firebase Accounts to Launch Phishing Campaigns February 7, 2026

Copyright © 2026 IT Security News. All Rights Reserved. The Magazine Basic Theme by bavotasan.com.

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}