IT Security News

Cybersecurity news and articles about information security, vulnerabilities, exploits, hacks, laws, spam, viruses, malware, breaches.

Main menu

Skip to content
  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Telegram Channel
Check Point Blog, EN

The Network Security Problem No One Could Solve – Until Now.

2026-05-19 15:05

Networks used to be simple. A perimeter. A data center. A set of rules a single engineer could hold in their head. That world is long gone. Every wave of enterprise transformation – cloud migration, M&A, hybrid multi-cloud, IoT, remote…

Read more →

Cyber Security News, EN

Nx Console VS Code Extension Compromised to Steal Developer and Cloud Secrets

2026-05-19 15:05

A widely used Visual Studio Code extension was quietly turned into a credential-stealing tool in May 2026, putting millions of developers at serious risk without warning. The Nx Console extension, which has over 2.2 million installations, was compromised when attackers…

Read more →

Cyber Security News, EN

New VoidStealer Malware Bypasses Chrome’s App-Bound Encryption to Steal Passwords and Cookies

2026-05-19 15:05

A newly discovered malware called VoidStealer has emerged as a serious threat to Chrome users on Windows, using a clever technique to bypass one of the browser’s most important security features. The malware targets Chrome’s App-Bound Encryption, a protection layer…

Read more →

EN, Malwarebytes

Facebook scam promises cheap Aldi meat boxes, steals payment info instead

2026-05-19 15:05

A fake Aldi “meat box” offer spreading on Facebook tricks victims into handing over personal and payment info. This article has been indexed from Malwarebytes Read the original article: Facebook scam promises cheap Aldi meat boxes, steals payment info instead

Read more →

EN, Help Net Security

Selector extends AI-driven observability into multi-cloud environments

2026-05-19 15:05

Selector has announced the expansion of its platform with AI-powered multi-cloud observability capabilities. The extension of Selector’s AI-driven observability approach into multi-cloud environments enables organizations to correlate signals across the full hybrid path. By unifying rich telemetry data from cloud,…

Read more →

EN, Help Net Security

PureLogs infostealer is stealing credentials worldwide

2026-05-19 15:05

A phishing campaign is smuggling the powerful PureLogs information stealer onto targets’ Windows machines by hiding encrypted malicious payloads inside cat photos, Fortinet researchers discovered. The attack The attack starts with a phishing email containing a TXZ archive and using…

Read more →

hourly summary

IT Security News Hourly Summary 2026-05-19 15h : 16 posts

2026-05-19 15:05

16 posts were published in the last hour 13:4 : Inside SHADOW-WATER-063’s Banana RAT: From Build Server to Banking Fraud 13:3 : Two-Thirds of Nonhuman Accounts Are Unseen and Unmanaged, According to Orchid Security’s Identity Gap Report 13:3 : UAC-0184…

Read more →

EN, Trend Micro Research, News and Perspectives

Inside SHADOW-WATER-063’s Banana RAT: From Build Server to Banking Fraud

2026-05-19 15:05

In this blog entry, researchers from the TrendAI™ MDR team discuss how they mapped the full end-to-end operation of SHADOW-WATER-063’s Banana RAT banking malware by analyzing server-side artifacts and victim-side data. This article has been indexed from Trend Micro Research,…

Read more →

EN, Hackread – Cybersecurity News, Data Breaches, AI and More

Two-Thirds of Nonhuman Accounts Are Unseen and Unmanaged, According to Orchid Security’s Identity Gap Report

2026-05-19 15:05

New York, United States, 19th May 2026, CyberNewswire This article has been indexed from Hackread – Cybersecurity News, Data Breaches, AI and More Read the original article: Two-Thirds of Nonhuman Accounts Are Unseen and Unmanaged, According to Orchid Security’s Identity…

Read more →

EN, GBHackers Security | #1 Globally Trusted Cyber Security News Platform

UAC-0184 Uses Bitsadmin and HTA Files to Deliver Gated Malware

2026-05-19 15:05

UAC-0184 uses a multi‑stage malware chain that abuses bitsadmin and HTA loaders to reach a heavily obfuscated payload bundle, ultimately hiding behind signed binaries such as VSLauncher.exe and PassMark Endpoint to gain stealthy network access on Ukrainian military networks. CERT‑UA…

Read more →

EN, GBHackers Security | #1 Globally Trusted Cyber Security News Platform

VoidStealer Malware Targets Chrome Data Despite Built-In Browser Protections

2026-05-19 15:05

A newly discovered infostealer called VoidStealer is raising concerns after researchers revealed it can bypass Google Chrome’s App-Bound Encryption (ABE), a security feature designed to protect sensitive browser data. The malware introduces a novel technique that allows attackers to extract encryption keys…

Read more →

EN, Hackers Online Club

Zero Day Microsoft Exchange Servers On Target | CVE-2026-42897

2026-05-19 15:05

A severe zero-day vulnerability in Microsoft Exchange Server is currently being exploited in the wild by threat actors.… The post Zero Day Microsoft Exchange Servers On Target | CVE-2026-42897 appeared first on Hackers Online Club. This article has been indexed…

Read more →

EN, securityweek

Unpatched ChromaDB Vulnerability Can Lead to Server Takeover

2026-05-19 15:05

The security defect can be exploited remotely, without authentication, to execute arbitrary code and leak sensitive information. The post Unpatched ChromaDB Vulnerability Can Lead to Server Takeover appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…

Read more →

EN, securityweek

Legacy Windows Tool MSHTA Fuels Surge in Silent Malware Attacks

2026-05-19 15:05

Attackers are increasingly abusing Microsoft’s decades-old MSHTA utility to stealthily deliver stealers, loaders, and persistent malware through phishing, fake software downloads, and LOLBIN-based attack chains. The post Legacy Windows Tool MSHTA Fuels Surge in Silent Malware Attacks appeared first on…

Read more →

EN, Help Net Security

New macOS infostealer impersonates Apple, Microsoft, and Google in a single attack chain

2026-05-19 15:05

A SHub macOS infostealer variant called Reaper impersonates Apple, Microsoft, and Google to trick users into executing malicious code, then targets browser data, password managers, and cryptocurrency wallets while establishing persistence for continued access, SentinelOne found. ClickFix gives way to…

Read more →

EN, Help Net Security

Canonical ships Ubuntu Core 26 with 15 years of security maintenance

2026-05-19 15:05

Operators of industrial sensors, edge AI controllers, and connected medical equipment now have a refreshed long-term Linux option for fleets that must stay patched for more than a decade. Canonical released Ubuntu Core 26, the latest long-term supported version of…

Read more →

EN, Help Net Security

LaunchDarkly adds real-time controls for AI agents in production

2026-05-19 15:05

LaunchDarkly has launched AgentControl, a new solution that gives software teams real-time control over AI agents in production. With AgentControl, teams can change how an agent behaves at runtime without redeploying the underlying application. As AI agents move into production,…

Read more →

EN, The Hacker News

Drupal to Release Urgent Core Security Updates on May 20, Sites Told to Prepare

2026-05-19 15:05

Drupal has issued an alert stating that it intends to release a “core security release” for all supported branches on May 20, 2026, from 5-9 p.m. UTC. “The Drupal Security Team urges you to reserve time for core updates at…

Read more →

EN, The Hacker News

The New Phishing Click: How OAuth Consent Bypasses MFA

2026-05-19 15:05

In February 2026, a phishing-as-a-service (PhaaS) platform called EvilTokens went live. Within five weeks, it had compromised more than 340 Microsoft 365 organizations across five countries.  The targets of the platform received a message asking them to enter a short…

Read more →

CySecurity News - Latest Information Security and Hacking Incidents, EN

GitHub Token Exposure at Grafana Triggered Codebase Theft Incident

2026-05-19 14:05

  Following the acquisition of a privileged GitHub token tied to Grafana Labs’ development environment, a threat actor quickly escalated the initial credential exposure into a significant source code security incident. It was possible for the attacker to gain access…

Read more →

CySecurity News - Latest Information Security and Hacking Incidents, EN

Crypto at Risk: Experts Believe Quantum Threat Arriving by 2030

2026-05-19 14:05

A recent report has warned that cryptographic foundations that secure trillions of dollars in digital currency can be hacked by quantum computers within the next four to seven years, and the blockchain industry is not prepared for damage control. About…

Read more →

EN, Help Net Security

The end of unencrypted Discord calls is here

2026-05-19 14:05

Discord has protected voice and video calls in DMs, group DMs, voice channels, and Go Live streams with end-to-end encryption (E2EE) by default. The company began experimenting with E2EE for voice and video in 2023, starting a long-term effort. End-to-end…

Read more →

EN, www.infosecurity-magazine.com

AI Raises the Bar on Vulnerability Awareness and Secure-by-Design Software

2026-05-19 14:05

AI-powered vulnerability scanning leaves no excuse for unpatched bugs as the EU Cyber Resilience Act pushes firms toward secure-by-design software This article has been indexed from www.infosecurity-magazine.com Read the original article: AI Raises the Bar on Vulnerability Awareness and Secure-by-Design…

Read more →

Cyber Security News, EN

Critical SEPPmail Gateway Flaws Allow Remote Code Execution and Mail Traffic Theft

2026-05-19 14:05

Critical vulnerabilities in the SEPPmail Secure Email Gateway have exposed organizations to remote code execution (RCE) and potential interception of sensitive email traffic. Researchers uncovered several high-impact flaws affecting SEPPmail appliances, widely deployed across the DACH region. The most severe…

Read more →

Page 3 of 5427
« 1 2 3 4 5 … 5,427 »

Pages

  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Telegram Channel

Recent Posts

  • Kimsuky Hackers Use LNK and JSE Lures to Target Recruiters, Crypto Users, and Defense Officials May 19, 2026
  • IT Security News Hourly Summary 2026-05-19 21h : 5 posts May 19, 2026
  • Microsoft dismantled malware-signing network Fox Tempest May 19, 2026
  • Operation Ramz Seizes 53 Servers Linked to Cyber Scams and Malware Threats May 19, 2026
  • 3 Tactics Elite SOCs Use to Operationalize Threat Intelligence May 19, 2026
  • DirtyDecrypt Linux Kernel Vulnerability PoC Exploit Code Released May 19, 2026
  • Malware Campaign Uses JavaScript, PowerShell, and Shellcode to Deliver Crypto Clipper May 19, 2026
  • Grafana Rejects Ransom Demand After GitHub Breach Exposes Codebase Theft May 19, 2026
  • AdvancedHEALTH Ransomware Claim Includes 2.3M Patient Data Lines May 19, 2026
  • Microsoft Confirms Windows Update Bug Blocking Security Fixes May 19, 2026
  • America’s top cyber-defense agency left a GitHub repo open with with passwords, keys, tokens – and incredibly obvious filenames May 19, 2026
  • The Invisible Workforce: Why Your Household Apps Now Have Their Own Digital IDs May 19, 2026
  • Cyber Agony Aunts: New book Offers Practical Look at Resilience May 19, 2026
  • Trapdoor Android Ad Fraud Scheme Hit 659 Million Daily Bid Requests Using 455 Apps May 19, 2026
  • How Parts Inventory Management Software Fixes Inventory Challenges May 19, 2026
  • Why Commercial Cyber Threat Intelligence is Failing Defence Operations May 19, 2026
  • ZKTeco CCTV Cameras May 19, 2026
  • ScadaBR May 19, 2026
  • ABB CoreSense HM and CoreSense M10 May 19, 2026
  • Siemens RUGGEDCOM APE1808 Devices May 19, 2026

Copyright © 2026 IT Security News. All Rights Reserved. The Magazine Basic Theme by bavotasan.com.

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}