IT Security News

Cybersecurity news and articles about information security, vulnerabilities, exploits, hacks, laws, spam, viruses, malware, breaches.

Main menu

Skip to content
  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Telegram Channel
Cyber Security News, EN

Instagram, Facebook, and WhatsApp to Test New Premium Subscriptions

2026-01-27 20:01

Meta is gearing up to roll out premium subscription tiers across its flagship apps, Instagram, Facebook, and WhatsApp, offering users exclusive features to boost productivity, creativity, and AI-driven interactions. The company confirmed the plans to emphasize that core app experiences…

Read more →

Cyber Security News, EN

Attackers Hijacking Official GitHub Desktop Repository to Distribute Malware as Official Installer

2026-01-27 20:01

Cybercriminals have discovered a dangerous way to trick developers into downloading malware by exploiting how GitHub works. The attack involves creating fake versions of the GitHub Desktop installer and making them appear legitimate to unsuspecting users. Between September and October…

Read more →

EN, Malwarebytes

Watch out for AT&T rewards phishing text that wants your personal details

2026-01-27 20:01

Recently, we uncovered a realistic, multi-layered data theft phishing campaign targeting AT&T customers. This article has been indexed from Malwarebytes Read the original article: Watch out for AT&T rewards phishing text that wants your personal details

Read more →

EN, Microsoft Security Blog

Microsoft announces the 2026 Security Excellence Awards winners

2026-01-27 20:01

Congratulations to the winners of the 2026 Microsoft Security Excellence Awards that recognize the innovative defenders who have gone above and beyond. The post Microsoft announces the 2026 Security Excellence Awards winners appeared first on Microsoft Security Blog. This article…

Read more →

EN, The Hacker News

Experts Detect Pakistan-Linked Cyber Campaigns Aimed at Indian Government Entities

2026-01-27 20:01

Indian government entities have been targeted in two campaigns undertaken by a threat actor that operates in Pakistan using previously undocumented tradecraft. The campaigns have been codenamed Gopher Strike and Sheet Attack by Zscaler ThreatLabz, which identified them in September…

Read more →

EN, The Hacker News

WhatsApp Rolls Out Lockdown-Style Security Mode to Protect Targeted Users From Spyware

2026-01-27 20:01

Meta on Tuesday announced it’s adding Strict Account Settings on WhatsApp to secure certain users against advanced cyber attacks because of who they are and what they do. The feature, similar to Lockdown Mode in Apple iOS and Advanced Protection…

Read more →

EN, Hackread – Cybersecurity News, Data Breaches, AI, and More

ShinyHunters Target 100+ Firms Using Phone Calls to Bypass SSO Security

2026-01-27 19:01

ShinyHunters is driving attacks on 100+ organisations, using vishing and fake login pages with allied groups to bypass SSO and steal company data, reports Silent Push. This article has been indexed from Hackread – Cybersecurity News, Data Breaches, AI, and…

Read more →

EN, eSecurity Planet

Lawsuit Claims Meta Can Access WhatsApp Messages Despite Encryption Promises

2026-01-27 19:01

A class-action lawsuit alleges Meta can access WhatsApp messages despite encryption claims, raising new privacy concerns. The post Lawsuit Claims Meta Can Access WhatsApp Messages Despite Encryption Promises appeared first on eSecurity Planet. This article has been indexed from eSecurity…

Read more →

EN, IT SECURITY GURU

Fighting The Next Evolution of Email Threats With Layered, AI-Driven Security

2026-01-27 19:01

For decades, email has been the backbone of corporate communications and for precisely this reason, it remains the attacker’s preferred gateway into organisations. Phishing, Business Email Compromise (BEC), and supply chain attacks continue to increase, with adversaries using AI and…

Read more →

EN, Security Boulevard

Keyfactor Allies with IBM Consulting to Spur PQC Adoption

2026-01-27 19:01

Keyfactor has partnered with IBM Consulting to enable organizations to accelerate adoption of post-quantum cryptography (PQC) before existing legacy encryption schemes might be cracked later this decade. Under the terms of the non-exclusive alliance, the cryptographic discovery, public key infrastructure…

Read more →

EN, Security Archives - TechRepublic

Microsoft’s Patch Fixes Are Breaking Windows, Forcing a Second Emergency Update

2026-01-27 19:01

Microsoft issued a second emergency Windows patch in January after earlier fixes caused new bugs, raising concerns about update quality and reliability. The post Microsoft’s Patch Fixes Are Breaking Windows, Forcing a Second Emergency Update appeared first on TechRepublic. This…

Read more →

EN, www.infosecurity-magazine.com

Pyodide Sandbox Escape Enables Remote Code Execution in Grist-Core

2026-01-27 19:01

Critical sandbox escape vulnerability in Grist-Core enables remote code execution via a malicious formula This article has been indexed from www.infosecurity-magazine.com Read the original article: Pyodide Sandbox Escape Enables Remote Code Execution in Grist-Core

Read more →

hourly summary

IT Security News Hourly Summary 2026-01-27 18h : 6 posts

2026-01-27 19:01

6 posts were published in the last hour 16:34 : Shadowserver finds 6,000+ likely vulnerable SmarterMail servers exposed online 16:34 : APT Attacks Target Indian Government Using SHEETCREEP, FIREPOWER, and MAILCREEP | Part 2 16:34 : Interconnectedness, extortion risk make…

Read more →

EN, Security Affairs

Shadowserver finds 6,000+ likely vulnerable SmarterMail servers exposed online

2026-01-27 18:01

Shadowserver researchers found 6,000+ SmarterMail servers exposed online and likely vulnerable to a critical auth bypass flaw. Nonprofit security organization Shadowserver reported that over 6,000 SmarterMail servers are exposed on the internet and likely vulnerable to attacks exploiting a critical…

Read more →

EN, Security Boulevard

APT Attacks Target Indian Government Using SHEETCREEP, FIREPOWER, and MAILCREEP | Part 2

2026-01-27 18:01

This is Part 2 of our two-part technical analysis on the Gopher Strike and Sheet Attack campaigns. For details on the Gopher Strike campaign, go to Part 1.IntroductionIn September 2025, Zscaler ThreatLabz uncovered three additional backdoors, SHEETCREEP, FIREPOWER, and MAILCREEP,…

Read more →

Cybersecurity Dive - Latest News, EN

Interconnectedness, extortion risk make cybersecurity a healthcare C-suite priority

2026-01-27 18:01

A new report from Trellix reviews the biggest breaches, describes the most effective defenses and profiles the most dangerous attackers. This article has been indexed from Cybersecurity Dive – Latest News Read the original article: Interconnectedness, extortion risk make cybersecurity…

Read more →

Cyber Security News, EN

6000+ Vulnerable SmarterTools SmarterMail Servers Exposed to Actively Exploited RCE Vulnerability

2026-01-27 18:01

Over 6,000 SmarterMail servers exposed on the internet are running vulnerable versions that are at risk of active remote code execution (RCE) attacks. Security researchers identified the flaws through daily HTTP vulnerability scans, and exploitation attempts have already been observed…

Read more →

Cyber Security News, EN

MEDUSA Security Testing Tool With 74 Scanners and 180+ AI Agent Security Rules

2026-01-27 18:01

MEDUSA, an AI-first Static Application Security Testing (SAST) tool boasting 74 specialized scanners and over 180 AI agent security rules. This open-source CLI scanner targets modern development challenges like false positives and multi-language coverage. MEDUSA consolidates security scanning across 42+…

Read more →

Cyber Security News, EN

Hackers are Leveraging SEO Poisoning to Attack Users Looking for Legitimate Tools

2026-01-27 18:01

Cybercriminals have adopted a deceptive strategy to compromise users searching for common software applications online. These attackers are using search engine optimization poisoning techniques to place malicious links at the top of search results. When unsuspecting users click on these…

Read more →

Cyber Security News, EN

Your Tier 1 Analyst at SOC Team Is Failing at Effective Triage. That’s a Business Problem

2026-01-27 18:01

Security Operations Centers live or die by their ability to respond quickly and accurately to alerts. At the heart of this process is alert triage — the initial evaluation that decides whether an alert is a real incident, a false positive, or something that needs immediate…

Read more →

Cyber Security News, EN

Attackers Exploiting React2Shell Vulnerability to Attack IT Sectors

2026-01-27 18:01

Threat actors have started targeting companies in the insurance, e-commerce, and IT sectors through a critical vulnerability tracked as CVE-2025-55182, commonly known as React2Shell. This flaw exists in the Flight protocol that handles client-server communication for React Server Components, allowing…

Read more →

EN, The Register - Security

China-linked group accused of spying on phones of UK prime ministers’ aides – for years

2026-01-27 18:01

Reports say Salt Typhoon attackers accessed handsets of senior govt folk Chinese state-linked hackers are accused of spending years inside the phones of senior Downing Street officials, exposing private communications at the heart of the UK government.… This article has…

Read more →

EN, securityweek

Memcyco Raises $37 Million for Anti-Impersonation Technology

2026-01-27 18:01

The startup will use the investment to fuel global expansion of its agentless platform, including in Latin America. The post Memcyco Raises $37 Million for Anti-Impersonation Technology appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…

Read more →

EN, www.infosecurity-magazine.com

PeckBirdy Framework Tied to China-Aligned Cyber Campaigns

2026-01-27 18:01

PeckBirdy command-and-control framework targeting gambling, government sectors in Asia since 2023 has been linked to China-aligned APTs This article has been indexed from www.infosecurity-magazine.com Read the original article: PeckBirdy Framework Tied to China-Aligned Cyber Campaigns

Read more →

Page 399 of 5212
« 1 … 397 398 399 400 401 … 5,212 »

Pages

  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Telegram Channel

Recent Posts

  • TeamPCP Supply Chain Campaign: Update 007 – Cisco Source Code Stolen via Trivy-Linked Breach, Google GTIG Tracks TeamPCP as UNC6780, and CISA KEV Deadline Arrives with No Standalone Advisory, (Wed, Apr 8th) April 8, 2026
  • Masjesu Botnet Emerges as DDoS-for-Hire Service Targeting Global IoT Devices April 8, 2026
  • Fighting Eventual Consistency-Based Persistence – An Analysis of notyet April 8, 2026
  • Operation Masquerade: FBI Disrupts Russian Router Hacking Campaign April 8, 2026
  • [un]prompted 2026 – FENRIR: Al Hunting For Al Zero-Days At Scale April 8, 2026
  • Iranian Threat Actors Target U.S. Critical Infrastructure April 8, 2026
  • Hackers steal and leak sensitive LAPD police documents April 8, 2026
  • Most Organisations Face an Unsecured API Surge As AI Agents Outpace Security April 8, 2026
  • Anthropic Unveils Claude Mythos Preview With Powerful Zero-Day Detection Capabilities April 8, 2026
  • Hackers Actively Attacking Adobe Reader Users Using Sophisticated 0-Day Exploit April 8, 2026
  • IBM Identity and Verify Access Vulnerabilities Allow Remote Attacker to Access Sensitive Data April 8, 2026
  • Hackers Used EvilTokens, ClickFix Campaign to Attack Claude Code Users with AMOS Stealer April 8, 2026
  • Data Leakage Vulnerability Patched in OpenSSL April 8, 2026
  • Kubernetes Strategy: When It’s a Fit and Who Should Run It April 8, 2026
  • Claude Mythos 5: Trillion-Parameter AI Powerhouse Unveiled April 8, 2026
  • Cyber Attacks Threatening Global Digital Landscape, Affecting Human Lives April 8, 2026
  • Malware Hidden in Blockchain Networks Is Quietly Targeting Developers Worldwide April 8, 2026
  • Infinity Stealer Targets macOS Using ClickFix Trick and Python-Based Malware April 8, 2026
  • IT Security News Hourly Summary 2026-04-08 18h : 9 posts April 8, 2026
  • Developer of VeraCrypt encryption software says Windows users may face boot-up issues after Microsoft locked his account April 8, 2026

Copyright © 2026 IT Security News. All Rights Reserved. The Magazine Basic Theme by bavotasan.com.

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}