IT Security News

Cybersecurity news and articles about information security, vulnerabilities, exploits, hacks, laws, spam, viruses, malware, breaches.

Main menu

Skip to content
  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Telegram Channel
EN, The Register - Security

Proposed US surveillance regime would enlist more businesses

2023-12-12 03:12

Expanded service provider definition could force cafes and hotels to spy for the feds Many US businesses may be required to assist in government-directed surveillance – depending upon which of two reform bills before Congress is approved.… This article has…

Read more →

EN, Have I Been Pwned latest breaches

InflateVids – 13,405 breached accounts

2023-12-12 02:12

In December 2023, the inflatable and balloon fetish videos website InflateVids suffered a data breach. The incident exposed over 13k unique email addresses alongside usernames, IP addresses, genders and SHA-1 password hashes. This article has been indexed from Have I…

Read more →

EN, Security Boulevard

KubeCon 2023: Not Your Father’s Tenable

2023-12-12 02:12

This is not your father’s Tenable! Alan Shimel talks with John Tonello from Tenable about the company’s past, present and future. The post KubeCon 2023: Not Your Father’s Tenable appeared first on Security Boulevard. This article has been indexed from…

Read more →

EN, Security Affairs

Toyota Financial Services discloses a data breach

2023-12-12 01:12

Toyota Financial Services (TFS) disclosed a data breach, threat actors had access to sensitive personal and financial data. Toyota Financial Services (TFS) is warning customers it has suffered a data breach that exposed sensitive personal and financial data. “Due to…

Read more →

EN, Security News | VentureBeat

Anthropic leads charge against AI bias and discrimination with new research

2023-12-12 00:12

Anthropic researchers unveil new techniques to proactively detect AI bias, racism and discrimination by evaluating language models across hypothetical real-world scenarios, promoting AI ethics before deployment. This article has been indexed from Security News | VentureBeat Read the original article:…

Read more →

EN, Security Boulevard

Replace broken AppSec tools with an Application Security technology that actually works: Runtime Security

2023-12-12 00:12

Tell us straight, Santa: Where did these old-school Application Security (AppSec) tools come from? Did you get the Security Specialist Elves to cobble them together from toadstool scrapings and cobwebs?  The post Replace broken AppSec tools with an Application Security…

Read more →

EN, Microsoft Security Blog

New Microsoft Incident Response team guide shares best practices for security teams and leaders

2023-12-12 00:12

The Microsoft Incident Response team shares a downloadable, interactive, people-centric, guide to effective incident response. The post New Microsoft Incident Response team guide shares best practices for security teams and leaders appeared first on Microsoft Security Blog. This article has…

Read more →

DE, heise Security

Blackberry findet neuen Chef, storniert Spaltung mit Börsengang

2023-12-11 23:12

Der bisherige Leiter der Blackberry-Abteilung für IT-Sicherheitsprodukte, John J. Giamatteo, übernimmt als Konzernchef. “Project Imperium” wird gestoppt. Dieser Artikel wurde indexiert von heise Security Lesen Sie den originalen Artikel: Blackberry findet neuen Chef, storniert Spaltung mit Börsengang

Read more →

EN, Security News | TechCrunch

23andMe changes to terms of service are ‘cynical’ and ‘self-serving,’ lawyers say

2023-12-11 23:12

Two days before 23andMe disclosed that hackers had accessed the personal and genetic data of almost 7 million customers, the genetic testing giant updated its terms of service. The changes are an effort to make it more difficult for the…

Read more →

EN, SecurityWeek RSS Feed

Apple Ships iOS 17.2 With Urgent Security Patches

2023-12-11 23:12

Cupertino’s flagship mobile OS vulnerable to arbitrary code execution and data exposure security vulnerabilities. The post Apple Ships iOS 17.2 With Urgent Security Patches appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS Feed Read the original…

Read more →

Bulletins, EN

Vulnerability Summary for the Week of December 4, 2023

2023-12-11 23:12

 High Vulnerabilities Primary Vendor — Product Description Published CVSS Score Source & Patch Info arm — bifrost_gpu_kernel_driver Use After Free vulnerability in Arm Ltd Bifrost GPU Kernel Driver, Arm Ltd Valhall GPU Kernel Driver, Arm Ltd Arm 5th Gen GPU…

Read more →

EN, The Register - Security

2.5M patients infected with data loss in Norton Healthcare ransomware outbreak

2023-12-11 23:12

AlphV lays claims to the intrusion Norton Healthcare, which runs eight hospitals and more than 30 clinics in Kentucky and Indiana, has admitted crooks may have stolen 2.5 million people’s most sensitive data during a ransomware attack in May.… This…

Read more →

EN, Security | TechRepublic

Hotspot Shield VPN Review 2023: Features, Pros & Cons

2023-12-11 22:12

Hotspot Shield’s speed-oriented features may not be enough to overcome its lack of testing and questionable data logs. Read more in our full review below. This article has been indexed from Security | TechRepublic Read the original article: Hotspot Shield…

Read more →

EN, Facecrooks

Child Safety Advocates Blast Facebook Encryption Again

2023-12-11 22:12

The post Child Safety Advocates Blast Facebook Encryption Again appeared first on Facecrooks. Last week, Facebook finally made end-to-end encryption the default privacy setting for all Facebook Messenger users after years of promising the technology. And while some civil rights…

Read more →

EN, SecurityWeek RSS Feed

‘5Ghoul’ Vulnerabilities Haunt Qualcomm, MediaTek 5G Modems

2023-12-11 22:12

Researchers call attention to 14 security defects taht can be exploited to drop and freeze 5G connections on smartphones and routers. The post ‘5Ghoul’ Vulnerabilities Haunt Qualcomm, MediaTek 5G Modems appeared first on SecurityWeek. This article has been indexed from…

Read more →

EN, Security Resources and Information from TechTarget

Transmission Control Protocol (TCP)

2023-12-11 22:12

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Security Resources and Information from TechTarget Read the original article: Transmission Control Protocol (TCP)

Read more →

EN, Security Latest

Congress Clashes Over the Future of America’s Section 702 Spy Program

2023-12-11 21:12

Competing bills moving through the House of Representatives both reauthorize Section 702 surveillance—but they pave very different paths forward for Americans’ privacy and civil liberties. This article has been indexed from Security Latest Read the original article: Congress Clashes Over…

Read more →

All CISA Advisories, EN

CISA Adds One Known Exploited Vulnerability to Catalog

2023-12-11 21:12

CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. CVE-2023-6448 Unitronics Vision PLC and HMI Insecure Default Password  These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant…

Read more →

EN, The Register - Security

2.5M patents infected with data loss in Norton Healthcare ransomware outbreak

2023-12-11 21:12

AlphV lays claims to the intrusion Norton Healthcare, which runs eight hospitals and more than 30 clinics in Kentucky and Indiana, has admitted crooks may have stolen 2.5 million people’s most sensitive data during a ransomware attack in May.… This…

Read more →

DE, t3n.de - Software & Entwicklung

Gemini: Entwickler baut Google-Demo in echt nach – allerdings mit GPT-4

2023-12-11 21:12

Die Vorstellung von Googles KI-Modell Gemini sorgte für Begeisterung. Dann kam heraus: Der Konzern hat bei der Demo getrickst. Jetzt zeigt ein Entwickler, dass das Ganze aber durchaus möglich ist – allerdings nutzt er dafür die Konkurrenz-KI von OpenAI. Dieser…

Read more →

DE, t3n.de - Software & Entwicklung

Neue Regeln für KI und Gratis-Glasfaser mit Haken

2023-12-11 21:12

Hallo und willkommen zum t3n Daily vom 11. Dezember. Heute geht es um das umfassende KI-Regulierungspaket der EU, ein verlockendes Glasfaser-Angebot und Schwachstellen, die viele 5G-Smartphones betreffen. Dieser Artikel wurde indexiert von t3n.de – Software & Entwicklung Lesen Sie den…

Read more →

EN, Panda Security Mediacenter

Is TikTok Safe for Kids? What Parents Should Know

2023-12-11 21:12

If your child uses social media, you’ve probably wondered: Is TikTok safe for kids? Here’s what you should know and how you can make TikTok safe for your kids. The post Is TikTok Safe for Kids? What Parents Should Know…

Read more →

EN, Hackread – Latest Cybersecurity News, Press Releases & Technology Today

Gamers Warned of Potential CS2 Exploit That Can Reveal IP Addresses

2023-12-11 21:12

By Waqas Gaming influencers are advising CS2 players to refrain from playing the game at the moment. This is a post from HackRead.com Read the original post: Gamers Warned of Potential CS2 Exploit That Can Reveal IP Addresses This article…

Read more →

EN, Security News | VentureBeat

Meta champions a new era in safe gen AI with Purple Llama

2023-12-11 21:12

Realizing the need for better security in generative AI development, Meta launches Purple Llama: combining offensive and defensive strategies to evaluate and reduce potential risks. This article has been indexed from Security News | VentureBeat Read the original article: Meta…

Read more →

Page 4446 of 4872
« 1 … 4,444 4,445 4,446 4,447 4,448 … 4,872 »

Pages

  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Telegram Channel

Recent Posts

  • BridgePay Payment Gateway Hit by Ransomware, Causing Nationwide Outages February 7, 2026
  • IT Security News Hourly Summary 2026-02-07 15h : 3 posts February 7, 2026
  • Hackers Linked to State Actors Target Signal Messages of Military Officials and Journalists February 7, 2026
  • Organizations Urged to Replace Discontinued Edge Devices February 7, 2026
  • China-Linked DKnife Threat Underscores Risks to Network Edge Devices February 7, 2026
  • Apple Pay Users Targeted by Phishing Attack Aimed at Stealing Payment Details February 7, 2026
  • Study confirms experience beats youthful enthusiasm February 7, 2026
  • German Agencies Warn of Signal Phishing Targeting Politicians, Military, Journalists February 7, 2026
  • State-Backed Hackers Target Military Officials and Journalists on Signal in Latest Cyberattack February 7, 2026
  • Moltbook, the Social Network for AI Agents, Exposed Real Humans’ Data February 7, 2026
  • CISA pushes Federal agencies to retire end-of-support edge devices February 7, 2026
  • BeyondTrust Remote Access Products 0-Day Vulnerability Allows Remote Code Execution February 7, 2026
  • OpenClaw Partners with VirusTotal to Secure AI Agent Skill Marketplace February 7, 2026
  • OpenClaw v2026.2.6 Released With Support for Opus 4.6, GPT-5.3-Codex and Safety Scanner February 7, 2026
  • IT Security News Hourly Summary 2026-02-07 09h : 2 posts February 7, 2026
  • Cybercriminals Use Malicious Cybersquatting Attacks to Distribute Malware and Hijack Data February 7, 2026
  • nmapUnleashed Makes Nmap Scanning More Comfortable and Effective February 7, 2026
  • Hackers Exploit Free Firebase Accounts to Launch Phishing Campaigns February 7, 2026
  • Hackers Exploit Cybersquatting Tactics to Spread Malware and Steal Sensitive Information February 7, 2026
  • Cybersecurity Today: Month In Review – Microsoft Patch Fails, Fortinet Issues, and AI Risks February 7, 2026

Copyright © 2026 IT Security News. All Rights Reserved. The Magazine Basic Theme by bavotasan.com.

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}