IT Security News

Cybersecurity news and articles about information security, vulnerabilities, exploits, hacks, laws, spam, viruses, malware, breaches.

Main menu

Skip to content
  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Apps
    • Telegram Channel
Cyber Security News, EN

Hackers Abuse Microsoft 365’s Direct Send Feature to Deliver Internal Phishing Attacks

2025-08-02 08:08

Cybercriminals have discovered a sophisticated new attack vector by exploiting Microsoft 365’s Direct Send feature to deliver phishing campaigns that masquerade as legitimate internal communications. This emerging threat leverages a legitimate Microsoft service designed for multifunction printers and legacy applications,…

Read more →

Cyber Security News, EN

11,000 Android Devices Hacked by Chinese Threats Actors to Deploy PlayPraetor Malware

2025-08-02 08:08

A sophisticated malware-as-a-service operation orchestrated by Chinese-speaking threat actors has successfully compromised over 11,000 Android devices worldwide through the deployment of PlayPraetor, a powerful Remote Access Trojan designed for on-device fraud. The campaign represents a significant escalation in mobile banking…

Read more →

Cyber Security News, EN

LockBit Operators Using Stealthy DLL Sideloading Technique to Load Malicious App as Legitimate One

2025-08-02 08:08

LockBit ransomware operators have adopted an increasingly sophisticated approach to evade detection by leveraging DLL sideloading techniques that exploit the inherent trust placed in legitimate applications. This stealthy method involves tricking legitimate, digitally signed applications into loading malicious Dynamic Link…

Read more →

Cyber Security News, EN

Qilin Ransomware Surging Following The Fall of dominant RansomHub RaaS

2025-08-02 08:08

The ransomware landscape experienced a significant shift in the second quarter of 2025 as Qilin ransomware emerged as the dominant threat following the unexpected collapse of RansomHub, previously the most prolific ransomware-as-a-service operation. This transition has reshaped the cybercriminal ecosystem,…

Read more →

hourly summary

IT Security News Hourly Summary 2025-08-02 06h : 1 posts

2025-08-02 07:08

1 posts were published in the last hour 4:2 : 15+ Vegas Gems for Black Hat 2025

Read more →

EN, Security Boulevard

15+ Vegas Gems for Black Hat 2025

2025-08-02 06:08

Stop drowning in security alerts. See Morpheus autonomous SOC platform live at booth #1851and discover why analysts are smiling again. The post 15+ Vegas Gems for Black Hat 2025 appeared first on D3 Security. The post 15+ Vegas Gems for…

Read more →

Cyber Security News, EN

Storm-2603 Using Custom Malware That Leverages BYOVD to Tamper with Endpoint Protections

2025-08-02 05:08

A newly identified threat actor designated Storm-2603 has emerged as a sophisticated adversary in the ransomware landscape, leveraging advanced custom malware to circumvent endpoint security protections through innovative techniques. The group first gained attention during Microsoft’s investigation into the “ToolShell”…

Read more →

Darknet – Hacking Tools, Hacker News & Cyber Security, EN

BrainDamage – Payload Generator and Encrypted Shell Stager for Red Teams

2025-08-02 05:08

Generate and stage encrypted payloads with BrainDamage, a flexible toolkit for red teamers focused on stealth, staging, and remote command delivery. This article has been indexed from Darknet – Hacking Tools, Hacker News & Cyber Security Read the original article:…

Read more →

EN, IT SECURITY GURU

One Week of the Online Safety Act: Cyber Experts Weigh In

2025-08-02 01:08

The conversation around the UK’s Online Safety Act has transformed over the past week. Since it came into force last Friday (25th July 2025), there has been a lot of public outcry, including a petition, which was signed by over…

Read more →

hourly summary

IT Security News Hourly Summary 2025-08-02 00h : 8 posts

2025-08-02 01:08

8 posts were published in the last hour 22:55 : IT Security News Daily Summary 2025-08-01 21:33 : DHS Launches Over $100 Million in Funding to Strengthen Communities’ Cyber Defenses 21:33 : NASA Sends International Crew Of Four Into Orbit…

Read more →

daily summary

IT Security News Daily Summary 2025-08-01

2025-08-02 00:08

174 posts were published in the last hour 21:33 : DHS Launches Over $100 Million in Funding to Strengthen Communities’ Cyber Defenses 21:33 : NASA Sends International Crew Of Four Into Orbit 21:33 : Verizon will give you up to…

Read more →

EN, Security Affairs

Malicious AI-generated npm package hits Solana users

2025-08-02 00:08

AI-generated npm package @kodane/patch-manager drained Solana wallets; 1,500+ downloads before takedown on July 28, 2025. AI-generated npm package @kodane/patch-manager was flagged for hiding malicious software to drain Solana wallets. The package was uploaded on July 28, 2025, and it was…

Read more →

CISA News, EN

DHS Launches Over $100 Million in Funding to Strengthen Communities’ Cyber Defenses

2025-08-01 23:08

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from CISA News Read the original article: DHS Launches Over $100 Million in Funding to Strengthen Communities’ Cyber…

Read more →

EN, Silicon UK

NASA Sends International Crew Of Four Into Orbit

2025-08-01 23:08

NASA sends crew of four to ISS, including three whose planned trips were changed due to Boeing Starliner technical troubles This article has been indexed from Silicon UK Read the original article: NASA Sends International Crew Of Four Into Orbit

Read more →

EN, Latest news

Verizon will give you up to four free iPhone 15 Plus phones – here’s how to get yours

2025-08-01 23:08

What’s better than a free phone? Four free phones. Verizon will give you up to four iPhone 15 Plus smartphones free when you sign up for an eligible Unlimited Plan. This article has been indexed from Latest news Read the…

Read more →

EN, Security News | TechCrunch

A backlog at the Commerce Department is reportedly stalling Nvidia’s H20 chip licenses

2025-08-01 23:08

News of a backlog at the U.S. federal department comes less than a week after national security experts urged the Trump administration to reverse its decision that allows Nvidia to export H20 chips to China. This article has been indexed…

Read more →

EN, Schneier on Security

Friday Squid Blogging: A Case of Squid Fossil Misidentification

2025-08-01 23:08

What scientists thought were squid fossils were actually arrow worms. This article has been indexed from Schneier on Security Read the original article: Friday Squid Blogging: A Case of Squid Fossil Misidentification

Read more →

EN, The Register - Security

OpenAI removes ChatGPT self-doxing option

2025-08-01 23:08

Checkbox to make chatbot conversations appear in search engines deemed a footgun OpenAI has removed the option to make ChatGPT interactions indexable by search engines to prevent users from unwittingly exposing sensitive information.… This article has been indexed from The…

Read more →

Cyber Security Headlines, EN

Week in Review: Surveillance camera vulnerabilities, data sovereignty conundrum, French submarine cyberattack

2025-08-01 23:08

Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Derek Fisher, Director of the Cyber Defense and Information Assurance Program, Temple University – also check out Derek’s substack. Thanks…

Read more →

EN, Security News | TechCrunch

A backlog at the Commerce Dept. is reportedly stalling Nvidia’s H20 chip licenses

2025-08-01 22:08

News of a backlog at the U.S. federal department comes less than a week after national security experts urged the Trump administration to reverse its decision that allows Nvidia to export H20 chips to China. This article has been indexed…

Read more →

EN, Unit 42

Threat Actor Groups Tracked by Palo Alto Networks Unit 42 (Updated Aug. 1, 2025)

2025-08-01 22:08

A comprehensive list of threat actor groups tracked by Unit 42, along with information such as summaries and industries typically impacted. The post Threat Actor Groups Tracked by Palo Alto Networks Unit 42 (Updated Aug. 1, 2025) appeared first on…

Read more →

EN, Latest news

Xreal wants you to split with your Meta Ray-Ban specs – here’s how with this trade-in deal

2025-08-01 22:08

Xreal’s trade-in program will help you ditch your old specs and give you a digital MasterCard to spend. Here’s how it works. This article has been indexed from Latest news Read the original article: Xreal wants you to split with…

Read more →

EN, Latest news

The best Apple deals right now: Save on MacBooks, iPhones, and more

2025-08-01 22:08

Whether you’re looking to upgrade your MacBook or your iPhone, there are plenty of great deals on Apple tech and accessories. Here are my favorites. This article has been indexed from Latest news Read the original article: The best Apple…

Read more →

EN, Security Boulevard

BSidesSF 2025: GenAI Application Security: Not Just Prompt Injection

2025-08-01 22:08

Creator/Author/Presenter: Ahmed Abugharbia Our deep appreciation to Security BSides – San Francisco and the Creators/Authors/Presenters for publishing their BSidesSF 2025 video content on YouTube. Originating from the conference’s events held at the lauded CityView / AMC Metreon – certainly a…

Read more →

Page 502 of 4408
« 1 … 500 501 502 503 504 … 4,408 »

Pages

  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Apps
    • Telegram Channel

Recent Posts

  • IT Security News Hourly Summary 2025-10-30 09h : 4 posts October 30, 2025
  • US Senate Proposes AI Companion Ban For Minors October 30, 2025
  • 12 Malicious Extensions in VSCode Marketplace Steal Source Code and Exfiltrate Login Credentials October 30, 2025
  • How neighbors could spy on smart homes October 30, 2025
  • LG Uplus confirms breach, Conduent attack impacts 10M+, hackers exploit tools against Ukraine October 30, 2025
  • How the City of Toronto embeds security across governance and operations October 30, 2025
  • Your photo could be all AI needs to clone your voice October 30, 2025
  • WordPress Plugin Vulnerability Lets Attackers Read Any Server File October 30, 2025
  • CISA Alerts on Active Exploitation of WSUS Vulnerability October 30, 2025
  • PhantomRaven Attack Discovered in 126 Malicious npm Packages, Exceeding 86,000 Downloads October 30, 2025
  • Hottest cybersecurity open-source tools of the month: October 2025 October 30, 2025
  • PolarEdge Botnet Hits 25K IoT Devices in Major Cyber Campaign October 30, 2025
  • CISA Shares New Threat Detections for Actively Exploited WSUS Vulnerability October 30, 2025
  • Email breaches are the silent killers of business growth October 30, 2025
  • IT Security News Hourly Summary 2025-10-30 06h : 1 posts October 30, 2025
  • SUSE Linux Enterprise Server 16 puts AI in the operating system October 30, 2025
  • IT Security News Hourly Summary 2025-10-30 03h : 1 posts October 30, 2025
  • ISC Stormcast For Thursday, October 30th, 2025 https://isc.sans.edu/podcastdetail/9678, (Thu, Oct 30th) October 30, 2025
  • Planning 2026 Managed Services Budget: Approval Strategies That Work October 30, 2025
  • Microsoft Outage Hits Azure, 365, Xbox, Minecraft and More October 30, 2025

Copyright © 2025 IT Security News. All Rights Reserved. The Magazine Basic Theme by bavotasan.com.

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}