IT Security News

Cybersecurity news and articles about information security, vulnerabilities, exploits, hacks, laws, spam, viruses, malware, breaches.

Main menu

Skip to content
  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Telegram Channel
EN, Threat Intelligence

The Proliferation of DarkSword: iOS Exploit Chain Adopted by Multiple Threat Actors

2026-03-18 16:03

Introduction  Google Threat Intelligence Group (GTIG) has identified a new iOS full-chain exploit that leveraged multiple zero-day vulnerabilities to fully compromise devices. Based on toolmarks in recovered payloads, we believe the exploit chain to be called DarkSword. Since at least…

Read more →

EN, The Register - Security

North Korea’s 100,000-strong fake IT worker army rake in $500M a year for Kim Jong Un

2026-03-18 16:03

Researchers map full org chart of the scam from dodgy recruiters to helpful Western collaborators Researchers at IBM X‑Force and Flare Research have uncovered data that sheds light on how North Korea’s fake IT worker schemes operate and infiltrate companies…

Read more →

EN, securityweek

Manifold Raises $8 Million for AI Detection and Response

2026-03-18 16:03

Focused on securing autonomous AI on endpoints, the startup will invest in product development. The post Manifold Raises $8 Million for AI Detection and Response appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article:…

Read more →

EN, securityweek

Shadow AI Risk: How SaaS Apps Are Quietly Enabling Massive Breaches

2026-03-18 16:03

From Chaos to Control examines the chaos that often comes from shadow AI hidden in SaaS apps and urges better visibility and control over agentic AI. The post Shadow AI Risk: How SaaS Apps Are Quietly Enabling Massive Breaches appeared…

Read more →

EN, Security Boulevard

Threat Detection with MITRE ATT&CK and D3FEND AI Agent

2026-03-18 16:03

The post Threat Detection with MITRE ATT&CK and D3FEND AI Agent appeared first on AI Security Automation. The post Threat Detection with MITRE ATT&CK and D3FEND AI Agent appeared first on Security Boulevard. This article has been indexed from Security…

Read more →

EN, Security Boulevard

Enterprise AI Agent Governance: A Layered Approach (Build, Deployment and Runtime)

2026-03-18 16:03

Emerging Governance Challenges As organizations implement AI agents on a large scale, they are likely to encounter governance challenges. The current focus in AI security primarily centers on several key concerns: prompt injection, model misuse, and unsafe responses. These issues…

Read more →

CySecurity News - Latest Information Security and Hacking Incidents, EN

AkzoNobel Confirms Cyberattack at U.S. Site Following Anubis Ransomware Data Leak

2026-03-18 16:03

  kDutch multinational paints and coatings company AkzoNobel has confirmed that a cyberattack impacted one of its facilities in the United States, according to a statement shared with BleepingComputer. The incident came to light after the Anubis ransomware gang published…

Read more →

CySecurity News - Latest Information Security and Hacking Incidents, EN

Global Crackdown Dismantles LeakBase Data Breach Forum, Dozens Targeted in Europol Operation

2026-03-18 16:03

  A large-scale international law enforcement effort has reportedly led to multiple arrests as authorities moved to shut down a well-known underground data leak marketplace. Europol revealed details of a coordinated operation that successfully dismantled LeakBase, a platform it described…

Read more →

CySecurity News - Latest Information Security and Hacking Incidents, EN

Microsoft Releases Hotpatch to Fix Windows 11 RRAS Remote Code Flaw

2026-03-18 16:03

Microsoft has issued an out-of-band (OOB) security update to remediate critical vulnerabilities affecting a specific subset of Windows 11 Enterprise systems that rely on hotpatch updates instead of the conventional monthly Patch Tuesday cumulative updates. The update, identified as KB5084597,…

Read more →

EN, Help Net Security

Graylog advances explainable AI and automated workflows for faster threat detection

2026-03-18 16:03

Graylog has revealed advances in explainable AI and automated investigation workflows that help small-to-mid-sized security teams detect threats faster, investigate with confidence, and cut the manual documentation work that consumes analyst time. “Lean security teams don’t have the luxury of…

Read more →

hourly summary

IT Security News Hourly Summary 2026-03-18 15h : 21 posts

2026-03-18 16:03

21 posts were published in the last hour 13:38 : Scans for “adminer”, (Wed, Mar 18th) 13:38 : FancyBear Server Leak Exposes Stolen Credentials, 2FA Secrets, NATO Targets 13:38 : Top 6 Network Access Control (NAC) Solutions in 2026 13:38…

Read more →

EN, SANS Internet Storm Center, InfoCON: green

Scans for “adminer”, (Wed, Mar 18th)

2026-03-18 15:03

A very popular target of attackers scanning our honeypots is “phpmyadmin”. phpMyAdmin is a script first released in the late 90s, before many security concepts had been discovered. It's rich history of vulnerabilities made it a favorite target. Its alternative, “adminer”,…

Read more →

EN, GBHackers Security | #1 Globally Trusted Cyber Security News Platform

FancyBear Server Leak Exposes Stolen Credentials, 2FA Secrets, NATO Targets

2026-03-18 15:03

FancyBear’s latest operational security failure has exposed a live Russian espionage server packed with stolen credentials, 2FA secrets, and detailed insight into the ongoing targeting of European government and military networks. The exposed infrastructure, tied to APT28/FancyBear and previously reported…

Read more →

EN, eSecurity Planet

Top 6 Network Access Control (NAC) Solutions in 2026

2026-03-18 15:03

Explore the top NAC solutions of 2026 to ensure your network is only accessed by trusted users and avoid unwanted risks. The post Top 6 Network Access Control (NAC) Solutions in 2026 appeared first on eSecurity Planet. This article has…

Read more →

EN, eSecurity Planet

Top 10 Governance, Risk & Compliance (GRC) Tools in 2026

2026-03-18 15:03

Discover the top governance, risk and compliance (GRC) tools in 2026. The post Top 10 Governance, Risk & Compliance (GRC) Tools in 2026 appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read the original article:…

Read more →

EN, Industry Trends & Insights

From Hot CVEs to the Full Attack Surface: How AI Is Reshaping Threat Intelligence

2026-03-18 15:03

AI is pushing attackers beyond a handful of popular CVEs and toward exploiting the full vulnerability landscape. Fortinet’s Aamir Lakhani explains what that means for patch strategy, threat hunting, and the future of threat intelligence.        This article has been…

Read more →

EN, Help Net Security

Firefox is getting a free built-in VPN

2026-03-18 15:03

Mozilla is adding a free built-in VPN to Firefox, with the feature arriving in Firefox 149 on March 24. Privacy concerns often follow free VPN services, especially when unclear data practices put user information at risk. Mozilla says its version…

Read more →

EN, GBHackers Security | #1 Globally Trusted Cyber Security News Platform

UIDAI Introduces Bug Bounty Program to Strengthen Aadhaar Defenses

2026-03-18 15:03

The Unique Identification Authority of India (UIDAI) has officially launched its first structured bug bounty program to fortify the Aadhaar system. As the foundation of a massive national identity database, securing Aadhaar requires continuous innovation and rigorous testing. This new…

Read more →

Check Point Blog, EN

Telegram’s Crackdown in 2026 and Why Cyber Criminals Are Still Winning

2026-03-18 15:03

If you’ve been following the Telegram crackdown news, then you’ll know that Telegram entered 2026 under significant pressure. After years of being a largely permissive environment, the platform dramatically increased enforcement following the arrest of CEO Pavel Durov in late 2024…

Read more →

Cyber Security News, EN

Iran-Linked Cyber Campaigns Converge With Electronic and Psychological Warfare as Regional Conflict Escalates

2026-03-18 15:03

On February 28, 2026, a joint US-Israeli military operation launched strikes inside Iran, opening a conflict that rapidly extended into cyberspace. Iran responded with ballistic missiles and drone strikes across Bahrain, Kuwait, Iraq, Saudi Arabia, the UAE, Israel, and Qatar.…

Read more →

Cyber Security News, EN

ForceMemo Hijacks GitHub Accounts, Backdoors Hundreds of Python Repos via Force-Push

2026-03-18 15:03

A new malware campaign tracked as ForceMemo is quietly compromising hundreds of GitHub accounts and injecting hidden malicious code into Python repositories, leaving almost no visible trace. The earliest confirmed infections date back to March 8, 2026, and the campaign…

Read more →

Cyber Security News, EN

Critical Telnetd Vulnerability Enables Remote Attacker to Execute Arbitrary Code via Port 23

2026-03-18 15:03

A critical buffer overflow vulnerability in the GNU Inetutils telnetd daemon. Tracked as CVE-2026-32746, this flaw allows an unauthenticated remote attacker to execute arbitrary code and gain root access to affected systems. The vulnerability requires zero user interaction and possesses…

Read more →

EN, The Register - Security

Britain’s satellite-watching gap to be plugged with £17.5M eyeball in Cyprus

2026-03-18 15:03

No 1 Space Operations Squadron will get a persistent stare capability The Ministry of Defence (MoD) plans to spend £17.5 million on a remotely-operated satellite monitoring facility in Cyprus, partly to protect the UK’s secure communications system Skynet.… This article…

Read more →

EN, securityweek

Apple Debuts Background Security Improvements With Fresh WebKit Patches

2026-03-18 15:03

The lightweight updates are meant to deliver security protections between security updates. The post Apple Debuts Background Security Improvements With Fresh WebKit Patches appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article: Apple Debuts…

Read more →

Page 48 of 5138
« 1 … 46 47 48 49 50 … 5,138 »

Pages

  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Telegram Channel

Recent Posts

  • Virtual machines, virtually everywhere – and with real security gaps March 26, 2026
  • Pawn Storm Campaign Deploys PRISMEX, Targets Government and Critical Infrastructure Entities March 26, 2026
  • Indian government probes CCTV espionage operation linked to Pakistan March 26, 2026
  • Entropy-Rich Synthetic Data Generation for PQC Key Material March 26, 2026
  • ISC Stormcast For Thursday, March 26th, 2026 https://isc.sans.edu/podcastdetail/9866, (Thu, Mar 26th) March 26, 2026
  • IT Security News Hourly Summary 2026-03-26 03h : 2 posts March 26, 2026
  • What the UK Cyber Security & Resilience Bill Means for Security Practitioners March 26, 2026
  • Sound Radix – 292,993 breached accounts March 26, 2026
  • Delve did the security compliance on LiteLLM, an AI project hit by malware March 26, 2026
  • How safe is your cloud with Agentic AI? March 26, 2026
  • Is your AI security scalable? March 26, 2026
  • What innovative methods secure Agentic AI? March 26, 2026
  • 5 Best Rootkit Scanners and Removers: Anti-Rootkit Tools in 2026 March 26, 2026
  • Free Antivirus Software Face-Off: Which One Protects Best in 2026? March 26, 2026
  • Top 10 Governance, Risk & Compliance (GRC) Tools in 2026 March 26, 2026
  • IT Security News Hourly Summary 2026-03-26 00h : 1 posts March 26, 2026
  • IT Security News Daily Summary 2026-03-25 March 26, 2026
  • Russian national convicted for running botnet used in attacks on U.S. firms March 26, 2026
  • Apple Patches (almost) everything again. March 2026 edition., (Wed, Mar 25th) March 25, 2026
  • Convicted spyware chief hints that Greece’s government was behind dozens of phone hacks March 25, 2026

Copyright © 2026 IT Security News. All Rights Reserved. The Magazine Basic Theme by bavotasan.com.

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}