IT Security News

Cybersecurity news and articles about information security, vulnerabilities, exploits, hacks, laws, spam, viruses, malware, breaches.

Main menu

Skip to content
  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Telegram Channel
EN, Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More

Coupang Data Breach Affects All 33.7 Million South Korean Accounts

2025-12-01 20:12

Coupang confirms a data breach affecting 33.7 million users in South Korea, exposing names, contacts and order details. Investigation is ongoing. This article has been indexed from Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More Read the…

Read more →

DZone Security Zone, EN

Building an OWASP 2025 Security Scanner in 48 Hours

2025-12-01 20:12

OWASP dropped its 2025 Top 10 on November 6th with a brand-new category nobody saw coming: “Mishandling of Exceptional Conditions” (A10). I spent a weekend building a scanner to detect these issues and immediately found authentication bypasses in three different…

Read more →

Cyber Security News, EN

Coupang Data Breach Exposed Personal Data of 33.7 Million Customers Personal Records

2025-12-01 20:12

South Korean e-commerce giant Coupang has confirmed a massive security incident affecting approximately 33.7 million customers, nearly the company’s entire user base. The breach, which exposed names, phone numbers, email addresses, shipping addresses, and order histories, has been traced back…

Read more →

Cyber Security News, EN

Bloody Wolf Hackers Mimic as Government Agencies to Deploy NetSupport RAT via Weaponized PDF’s

2025-12-01 20:12

A sophisticated Advanced Persistent Threat group known as Bloody Wolf has intensified its cyber espionage operations across Central Asia, targeting government and private sectors. Since late June 2025, the group has orchestrated spear-phishing campaigns primarily focusing on organizations within Kyrgyzstan…

Read more →

Cyber Security News, EN

Microsoft Confirms New Outlook Bug Blocking Excel Attachments

2025-12-01 20:12

Microsoft has acknowledged a frustrating new issue affecting users of the “new Outlook” for Windows, where Excel attachments fail to open if their filenames contain non-ASCII characters. The technical glitch, tracked under the reference ID EX1189359, triggers a vague error…

Read more →

Cyber Security News, EN

TangleCrypt Windows Packer with Ransomware Payloads Evades EDR Using ABYSSWORKER Driver

2025-12-01 20:12

A newly discovered Windows malware packer named TangleCrypt has emerged as a serious threat in ransomware attacks, specifically designed to evade endpoint detection and response (EDR) solutions. The packer was first observed during a September 2025 ransomware incident involving Qilin…

Read more →

EN, The Hacker News

ShadyPanda Turns Popular Browser Extensions with 4.3 Million Installs Into Spyware

2025-12-01 20:12

A threat actor known as ShadyPanda has been linked to a seven-year-long browser extension campaign that has amassed over 4.3 million installations over time. Five of these extensions started off as legitimate programs before malicious changes were introduced in mid-2024,…

Read more →

EN, The Hacker News

India Orders Phone Makers to Pre-Install Sanchar Saathi App to Tackle Telecom Fraud

2025-12-01 20:12

India’s telecommunications ministry has reportedly asked major mobile device manufacturers to preload a government-backed cybersecurity app named Sanchar Saathi on all new phones within 90 days. According to a report from Reuters, the app cannot be deleted or disabled from…

Read more →

EN, The Register - Security

Four arrested in South Korea over massive IP camera snooping spree

2025-12-01 20:12

Plus: Aussie Wi-Fi phisher and Brit dark web dealer nailed Cybercrime suspects and offenders across three continents have been rounded up this week, with cases spanning hacked IP cameras in South Korea, evil twin Wi-Fi traps in Australia, and a…

Read more →

CySecurity News - Latest Information Security and Hacking Incidents, EN

Your Phone Is Being Tracked in Ways You Can’t See: One Click Shows the Truth

2025-12-01 19:12

  Many people believe they are safe online once they disable cookies, switch on private browsing, or limit app permissions. Yet these steps do not prevent one of the most persistent tracking techniques used today. Modern devices reveal enough technical…

Read more →

CySecurity News - Latest Information Security and Hacking Incidents, EN

Nvidia’s Strong Earnings Ease AI Bubble Fears Despite Market Volatility

2025-12-01 19:12

  Nvidia (NVDA) delivered a highly anticipated earnings report, and the AI semiconductor leader lived up to expectations. “These results and commentary should help steady the ship for the AI trade into the end of the year,” Jefferies analysts wrote…

Read more →

hourly summary

IT Security News Hourly Summary 2025-12-01 18h : 9 posts

2025-12-01 19:12

9 posts were published in the last hour 17:4 : Scientists just found a way to tell if quantum computers are wrong 17:4 : OpenAI Codex CLI Command Injection Vulnerability Let Attackers Execute Arbitrary Commands 17:4 : Hackers are Moving…

Read more →

EN, Hacking News -- ScienceDaily

Scientists just found a way to tell if quantum computers are wrong

2025-12-01 19:12

Researchers unveiled a new technique that validates quantum computer results—especially those from GBS devices—in minutes instead of millennia. Their findings expose unexpected errors in a landmark experiment, offering a crucial step toward truly reliable quantum machines. This article has been…

Read more →

Cyber Security News, EN

OpenAI Codex CLI Command Injection Vulnerability Let Attackers Execute Arbitrary Commands

2025-12-01 19:12

OpenAI has patched a command injection flaw in its Codex CLI tool that allowed attackers to execute arbitrary commands on developers’ machines simply by getting a malicious configuration file into a project repository. The issue, now fixed in Codex CLI…

Read more →

Cyber Security News, EN

Hackers are Moving to “Living Off the Land” Techniques to Attack Windows Systems Bypassing EDR

2025-12-01 19:12

Cybercriminals have found a more effective method to compromise Windows computers while evading detection by security software. Ivan Spiridonov observed that uploading malicious tools, hackers are now using legitimate Windows programs already installed on target systems, a tactic known as…

Read more →

Cyber Security News, EN

4.3 Million Chrome and Edge Users Hacked in 7-Year ShadyPanda Malware Campaign

2025-12-01 19:12

“ShadyPanda,” a sophisticated threat actor responsible for a seven-year campaign that has successfully infected 4.3 million Chrome and Edge users. By exploiting the inherent trust in browser marketplaces, ShadyPanda weaponized “Featured” and “Verified” extensions to deploy remote code execution (RCE)…

Read more →

Cybersecurity Dive - Latest News, EN

European police dismantle cryptocurrency mixer popular with ransomware gangs

2025-12-01 19:12

Authorities have spent years trying to cripple the ecosystem that helps hackers hide their profits. This article has been indexed from Cybersecurity Dive – Latest News Read the original article: European police dismantle cryptocurrency mixer popular with ransomware gangs

Read more →

Cybersecurity Dive - Latest News, EN

Hackers ready threat campaign aimed at Zendesk environments

2025-12-01 19:12

Researchers warn that hackers linked to recent social engineering attacks are targeting customer-service platforms.  This article has been indexed from Cybersecurity Dive – Latest News Read the original article: Hackers ready threat campaign aimed at Zendesk environments

Read more →

EN, Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More

Police Seize Cryptomixer Domains, Infrastructure and 28M Dollars in Bitcoin

2025-12-01 18:12

Swiss and German police shut down Cryptomixer, seizing servers, domains and 28M dollars in Bitcoin during an Europol backed action targeting crypto laundering. This article has been indexed from Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More…

Read more →

DZone Security Zone, EN

Shield Your Nonprofit: How to Tackle Ransomware Attacks

2025-12-01 18:12

Set against the backdrop of accelerated growth of technology over the past several decades, notwithstanding large organizations, nonprofits as well have become overly reliant on technology for their day-to-day operations. New data shows that this reliance often presents opportunities for…

Read more →

EN, www.infosecurity-magazine.com

New Android Albiriox Malware Gains Traction in Dark Web Markets

2025-12-01 18:12

Android malware Albiriox emerged as MaaS, offering device takeover and real-time fraud capabilities This article has been indexed from www.infosecurity-magazine.com Read the original article: New Android Albiriox Malware Gains Traction in Dark Web Markets

Read more →

EN, Security Blog G Data Software AG

Arkanix Stealer: Newly discovered short term profit malware

2025-12-01 18:12

Recently, we stumbled upon a new stealer named Arkanix. This stealer possibly belongs to the short-lived category of stealers which aim for short-term quick financial gains. This article has been indexed from Security Blog G Data Software AG Read the…

Read more →

EN, Malwarebytes

New Android malware lets criminals control your phone and drain your bank account

2025-12-01 18:12

Albiriox now targets over 400 financial apps and lets criminals operate your phone almost exactly as if it were in their hands. This article has been indexed from Malwarebytes Read the original article: New Android malware lets criminals control your…

Read more →

EN, securityweek

$29 Million Worth of Bitcoin Seized in Cryptomixer Takedown

2025-12-01 18:12

Cryptomixer was targeted by law enforcement in Operation Olympia for facilitating cybercrime and money laundering.  The post $29 Million Worth of Bitcoin Seized in Cryptomixer Takedown appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original…

Read more →

Page 313 of 4873
« 1 … 311 312 313 314 315 … 4,873 »

Pages

  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Telegram Channel

Recent Posts

  • IT Security News Hourly Summary 2026-02-08 12h : 1 posts February 8, 2026
  • DKnife toolkit abuses routers to spy and deliver malware since 2019 February 8, 2026
  • Week in review: Notepad++ supply chain attack details and targets, Patch Tuesday forecast February 8, 2026
  • OpenClaw Integrates VirusTotal Scanning to Detect Malicious ClawHub Skills February 8, 2026
  • LocalGPT – A Secure Local Device Focused AI Assistant Built in Rust February 8, 2026
  • Microsoft Data Center Power Outage Disrupts Windows 11 Updates and Store Functionality February 8, 2026
  • IT Security News Hourly Summary 2026-02-08 00h : 1 posts February 8, 2026
  • IT Security News Daily Summary 2026-02-07 February 8, 2026
  • Bithumb Mistakenly Sends 620,000 Bitcoin ($40B) to Customer Accounts February 7, 2026
  • IT Security News Hourly Summary 2026-02-07 21h : 1 posts February 7, 2026
  • How to Suppress Negative Content Without Triggering the Streisand Effect February 7, 2026
  • Italian university La Sapienza still offline to mitigate recent cyber attack February 7, 2026
  • Dozens of Government and Infrastructure Networks Breached in Global Espionage Campaign February 7, 2026
  • Firefox Will Give Users an AI Kill Switch for Better Privacy February 7, 2026
  • IT Security News Hourly Summary 2026-02-07 18h : 2 posts February 7, 2026
  • Security Architecture Part I: Introduction to Security Architecture Concepts, CIA, and Rules February 7, 2026
  • Threat Actors Exploit Fortinet Devices and Steal Firewall Configurations February 7, 2026
  • Unsecured Database Exposes 149 Million Logins Linked to Infostealer Malware Operations February 7, 2026
  • ACF Plugin Flaw Exposes 50,000 WordPress Sites to Admin Takeover February 7, 2026
  • BridgePay Payment Gateway Hit by Ransomware, Causing Nationwide Outages February 7, 2026

Copyright © 2026 IT Security News. All Rights Reserved. The Magazine Basic Theme by bavotasan.com.

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}