IT Security News

Cybersecurity news and articles about information security, vulnerabilities, exploits, hacks, laws, spam, viruses, malware, breaches.

Main menu

Skip to content
  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Apps
    • Telegram Channel
EN, Have I Been Pwned latest breaches

InflateVids – 13,405 breached accounts

2023-12-12 02:12

In December 2023, the inflatable and balloon fetish videos website InflateVids suffered a data breach. The incident exposed over 13k unique email addresses alongside usernames, IP addresses, genders and SHA-1 password hashes. This article has been indexed from Have I…

Read more →

EN, Security Boulevard

KubeCon 2023: Not Your Father’s Tenable

2023-12-12 02:12

This is not your father’s Tenable! Alan Shimel talks with John Tonello from Tenable about the company’s past, present and future. The post KubeCon 2023: Not Your Father’s Tenable appeared first on Security Boulevard. This article has been indexed from…

Read more →

EN, Security Affairs

Toyota Financial Services discloses a data breach

2023-12-12 01:12

Toyota Financial Services (TFS) disclosed a data breach, threat actors had access to sensitive personal and financial data. Toyota Financial Services (TFS) is warning customers it has suffered a data breach that exposed sensitive personal and financial data. “Due to…

Read more →

EN, Security News | VentureBeat

Anthropic leads charge against AI bias and discrimination with new research

2023-12-12 00:12

Anthropic researchers unveil new techniques to proactively detect AI bias, racism and discrimination by evaluating language models across hypothetical real-world scenarios, promoting AI ethics before deployment. This article has been indexed from Security News | VentureBeat Read the original article:…

Read more →

EN, Security Boulevard

Replace broken AppSec tools with an Application Security technology that actually works: Runtime Security

2023-12-12 00:12

Tell us straight, Santa: Where did these old-school Application Security (AppSec) tools come from? Did you get the Security Specialist Elves to cobble them together from toadstool scrapings and cobwebs?  The post Replace broken AppSec tools with an Application Security…

Read more →

EN, Microsoft Security Blog

New Microsoft Incident Response team guide shares best practices for security teams and leaders

2023-12-12 00:12

The Microsoft Incident Response team shares a downloadable, interactive, people-centric, guide to effective incident response. The post New Microsoft Incident Response team guide shares best practices for security teams and leaders appeared first on Microsoft Security Blog. This article has…

Read more →

DE, heise Security

Blackberry findet neuen Chef, storniert Spaltung mit Börsengang

2023-12-11 23:12

Der bisherige Leiter der Blackberry-Abteilung für IT-Sicherheitsprodukte, John J. Giamatteo, übernimmt als Konzernchef. “Project Imperium” wird gestoppt. Dieser Artikel wurde indexiert von heise Security Lesen Sie den originalen Artikel: Blackberry findet neuen Chef, storniert Spaltung mit Börsengang

Read more →

EN, Security News | TechCrunch

23andMe changes to terms of service are ‘cynical’ and ‘self-serving,’ lawyers say

2023-12-11 23:12

Two days before 23andMe disclosed that hackers had accessed the personal and genetic data of almost 7 million customers, the genetic testing giant updated its terms of service. The changes are an effort to make it more difficult for the…

Read more →

EN, SecurityWeek RSS Feed

Apple Ships iOS 17.2 With Urgent Security Patches

2023-12-11 23:12

Cupertino’s flagship mobile OS vulnerable to arbitrary code execution and data exposure security vulnerabilities. The post Apple Ships iOS 17.2 With Urgent Security Patches appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS Feed Read the original…

Read more →

Bulletins, EN

Vulnerability Summary for the Week of December 4, 2023

2023-12-11 23:12

 High Vulnerabilities Primary Vendor — Product Description Published CVSS Score Source & Patch Info arm — bifrost_gpu_kernel_driver Use After Free vulnerability in Arm Ltd Bifrost GPU Kernel Driver, Arm Ltd Valhall GPU Kernel Driver, Arm Ltd Arm 5th Gen GPU…

Read more →

EN, The Register - Security

2.5M patients infected with data loss in Norton Healthcare ransomware outbreak

2023-12-11 23:12

AlphV lays claims to the intrusion Norton Healthcare, which runs eight hospitals and more than 30 clinics in Kentucky and Indiana, has admitted crooks may have stolen 2.5 million people’s most sensitive data during a ransomware attack in May.… This…

Read more →

EN, Security | TechRepublic

Hotspot Shield VPN Review 2023: Features, Pros & Cons

2023-12-11 22:12

Hotspot Shield’s speed-oriented features may not be enough to overcome its lack of testing and questionable data logs. Read more in our full review below. This article has been indexed from Security | TechRepublic Read the original article: Hotspot Shield…

Read more →

EN, Facecrooks

Child Safety Advocates Blast Facebook Encryption Again

2023-12-11 22:12

The post Child Safety Advocates Blast Facebook Encryption Again appeared first on Facecrooks. Last week, Facebook finally made end-to-end encryption the default privacy setting for all Facebook Messenger users after years of promising the technology. And while some civil rights…

Read more →

EN, SecurityWeek RSS Feed

‘5Ghoul’ Vulnerabilities Haunt Qualcomm, MediaTek 5G Modems

2023-12-11 22:12

Researchers call attention to 14 security defects taht can be exploited to drop and freeze 5G connections on smartphones and routers. The post ‘5Ghoul’ Vulnerabilities Haunt Qualcomm, MediaTek 5G Modems appeared first on SecurityWeek. This article has been indexed from…

Read more →

EN, Security Resources and Information from TechTarget

Transmission Control Protocol (TCP)

2023-12-11 22:12

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Security Resources and Information from TechTarget Read the original article: Transmission Control Protocol (TCP)

Read more →

EN, Security Latest

Congress Clashes Over the Future of America’s Section 702 Spy Program

2023-12-11 21:12

Competing bills moving through the House of Representatives both reauthorize Section 702 surveillance—but they pave very different paths forward for Americans’ privacy and civil liberties. This article has been indexed from Security Latest Read the original article: Congress Clashes Over…

Read more →

All CISA Advisories, EN

CISA Adds One Known Exploited Vulnerability to Catalog

2023-12-11 21:12

CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. CVE-2023-6448 Unitronics Vision PLC and HMI Insecure Default Password  These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant…

Read more →

EN, The Register - Security

2.5M patents infected with data loss in Norton Healthcare ransomware outbreak

2023-12-11 21:12

AlphV lays claims to the intrusion Norton Healthcare, which runs eight hospitals and more than 30 clinics in Kentucky and Indiana, has admitted crooks may have stolen 2.5 million people’s most sensitive data during a ransomware attack in May.… This…

Read more →

DE, t3n.de - Software & Entwicklung

Gemini: Entwickler baut Google-Demo in echt nach – allerdings mit GPT-4

2023-12-11 21:12

Die Vorstellung von Googles KI-Modell Gemini sorgte für Begeisterung. Dann kam heraus: Der Konzern hat bei der Demo getrickst. Jetzt zeigt ein Entwickler, dass das Ganze aber durchaus möglich ist – allerdings nutzt er dafür die Konkurrenz-KI von OpenAI. Dieser…

Read more →

DE, t3n.de - Software & Entwicklung

Neue Regeln für KI und Gratis-Glasfaser mit Haken

2023-12-11 21:12

Hallo und willkommen zum t3n Daily vom 11. Dezember. Heute geht es um das umfassende KI-Regulierungspaket der EU, ein verlockendes Glasfaser-Angebot und Schwachstellen, die viele 5G-Smartphones betreffen. Dieser Artikel wurde indexiert von t3n.de – Software & Entwicklung Lesen Sie den…

Read more →

EN, Panda Security Mediacenter

Is TikTok Safe for Kids? What Parents Should Know

2023-12-11 21:12

If your child uses social media, you’ve probably wondered: Is TikTok safe for kids? Here’s what you should know and how you can make TikTok safe for your kids. The post Is TikTok Safe for Kids? What Parents Should Know…

Read more →

EN, Hackread – Latest Cybersecurity News, Press Releases & Technology Today

Gamers Warned of Potential CS2 Exploit That Can Reveal IP Addresses

2023-12-11 21:12

By Waqas Gaming influencers are advising CS2 players to refrain from playing the game at the moment. This is a post from HackRead.com Read the original post: Gamers Warned of Potential CS2 Exploit That Can Reveal IP Addresses This article…

Read more →

EN, Security News | VentureBeat

Meta champions a new era in safe gen AI with Purple Llama

2023-12-11 21:12

Realizing the need for better security in generative AI development, Meta launches Purple Llama: combining offensive and defensive strategies to evaluate and reduce potential risks. This article has been indexed from Security News | VentureBeat Read the original article: Meta…

Read more →

EN, Security Boulevard

The top cyber security news stories of 2023

2023-12-11 21:12

The post The top cyber security news stories of 2023 appeared first on Click Armor. The post The top cyber security news stories of 2023 appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read the…

Read more →

Page 4222 of 4648
« 1 … 4,220 4,221 4,222 4,223 4,224 … 4,648 »

Pages

  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Apps
    • Telegram Channel

Recent Posts

  • HPE OneView Vulnerability Allows Remote Code Execution Attacks December 18, 2025
  • APT35 Leak Reveals Spreadsheets Containing Domains, Payments, and Server Information December 18, 2025
  • Beware of Malicious Scripts in Weaponized PDF Purchase Orders December 18, 2025
  • New Lazarus and Kimsuky Infrastructure Discovered with Active Tools and Tunneling Nodes December 18, 2025
  • RansomHouse RaaS Enhances Double Extortion with Data Theft and Encryption December 18, 2025
  • INE Security Expands Across Middle East and Asia to Accelerate Cybersecurity Upskilling December 18, 2025
  • Your car’s web browser may be on the road to cyber ruin December 18, 2025
  • Client ID Metadata Documents (CIMD): The Future of MCP Authentication December 18, 2025
  • IT Security News Hourly Summary 2025-12-18 21h : 7 posts December 18, 2025
  • FBI Confirms 630 Million Stolen Passwords December 18, 2025
  • Stolen IAM Drives AWS Crypto Mining December 18, 2025
  • 20 Million Hit By Prosper Data Breach December 18, 2025
  • Cyber Briefing: 2025.12.18 December 18, 2025
  • New SantaStealer Malware Targets Data December 18, 2025
  • Cybersecurity Marketing Trends for 2026 December 18, 2025
  • ICE Seeks Cyber Upgrade to Better Surveil and Investigate Its Employees December 18, 2025
  • Adios 2025, you won’t be missed December 18, 2025
  • Lazarus Group Embed New BeaverTail Variant in Developer Tools December 18, 2025
  • DIG AI: Uncensored Darknet AI Assistant at the Service of Criminals and Terrorists December 18, 2025
  • Crypto crooks co-opt stolen AWS creds to mine coins December 18, 2025

Copyright © 2025 IT Security News. All Rights Reserved. The Magazine Basic Theme by bavotasan.com.

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}