IT Security News

Cybersecurity news and articles about information security, vulnerabilities, exploits, hacks, laws, spam, viruses, malware, breaches.

Main menu

Skip to content
  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Telegram Channel
EN, www.theregister.com - Articles

Techie claims Trump Mobile website was leaking thousands of people’s data

2026-05-22 13:05

Customers’ info potentially handed to anyone who could send an HTTP request This article has been indexed from www.theregister.com – Articles Read the original article: Techie claims Trump Mobile website was leaking thousands of people’s data

Read more →

EN, Help Net Security

Proton Pass adds monitored credential sharing for AI agents

2026-05-22 13:05

Proton Pass, a secure, end-to-end encrypted password manager, added credential sharing through AI access tokens, allowing users to give AI agents access to selected items and monitor activity. To gain access, an agent must provide a reason for the request…

Read more →

EN, Help Net Security

GitLab 19.0 adds AI workflows, secrets management, and self-hosted model support

2026-05-22 13:05

GitLab released GitLab 19.0 with expanded secrets management, agentic merge request workflows, improved CI pipeline visibility, support for self-hosted open-source models, and supply chain visibility enhancements. Engineering organizations shipping more code than ever are confronting the AI Paradox firsthand, as…

Read more →

EN, Help Net Security

Versa extends zero trust principles to AI agents and MCP workflows

2026-05-22 13:05

Versa has introduced a patent-pending zero trust architecture for the Model Context Protocol (MCP), applying zero trust principles to AI execution. The company said every AI-generated action is validated against user identity, role-based access controls, and system policies before execution,…

Read more →

EN, Help Net Security

Suspected KimWolf botnet admin arrested over DDoS-for-hire operation

2026-05-22 13:05

U.S. and Canadian authorities arrested and charged a Canadian man accused of operating the KimWolf DDoS botnet, a service linked to attacks that infected more than one million devices worldwide. Jacob Butler, 23, of Ottawa, Canada, also known online as…

Read more →

EN, Unit 42

Paved With Intent: ROADtools and Nation-State Tactics in the Cloud

2026-05-22 12:05

Open-source framework ROADtools is being misused by threat actors for cloud intrusions. Learn how to identify its malicious use. The post Paved With Intent: ROADtools and Nation-State Tactics in the Cloud appeared first on Unit 42. This article has been…

Read more →

EN, GBHackers Security | #1 Globally Trusted Cyber Security News Platform

Hackers Use Six-Layer Persistence on FreePBX Systems

2026-05-22 12:05

Hackers are actively exploiting FreePBX systems using a highly resilient six-layer persistence mechanism. The campaign has been attributed with high confidence to the threat actor INJ3CTOR3, known for targeting VoIP infrastructure for financial gain since 2019. The operation deploys a…

Read more →

EN, Security Affairs

U.S. CISA adds Trend Micro Apex One and Langflow to its Known Exploited Vulnerabilities catalog

2026-05-22 12:05

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Trend Micro Apex One and Langflow flaws to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added Windows Shell and ConnectWise ScreenConnect flaws to its Known Exploited Vulnerabilities…

Read more →

EN, Help Net Security

Keepnet contributes voice and SMS phishing data to the 2026 Verizon DBIR

2026-05-22 12:05

Keepnet, an Extended Human Risk Management (xHRM) platform, today announced that its voice and SMS phishing simulation data contributed to the 2026 Verizon Data Breach Investigations Report (DBIR). The 2026 edition is the first to include voice and SMS phishing…

Read more →

EN, www.infosecurity-magazine.com

Apple Blocked $2.2bn in App Store Fraud in the Last Year

2026-05-22 12:05

Total figure for fraudulent transactions Apple has blocked since 2020 now stands at over $11bn This article has been indexed from www.infosecurity-magazine.com Read the original article: Apple Blocked $2.2bn in App Store Fraud in the Last Year

Read more →

hourly summary

IT Security News Hourly Summary 2026-05-22 12h : 14 posts

2026-05-22 12:05

14 posts were published in the last hour 10:3 : Hackers Weaponize NF-e Invoice Lures to Deploy Banana RAT 10:2 : CISA Issues Alert on Exploited Microsoft Defender Zero-Day Vulnerabilities 10:2 : Cloud Atlas activity in the second half of…

Read more →

EN, GBHackers Security | #1 Globally Trusted Cyber Security News Platform

Hackers Weaponize NF-e Invoice Lures to Deploy Banana RAT

2026-05-22 12:05

Hackers are actively using Brazil’s electronic invoice system (NF-e) as a lure to distribute a sophisticated banking trojan known as Banana RAT. The campaign has been attributed to a financially motivated threat cluster tracked as SHADOW-WATER-063 and appears exclusively focused…

Read more →

EN, GBHackers Security | #1 Globally Trusted Cyber Security News Platform

CISA Issues Alert on Exploited Microsoft Defender Zero-Day Vulnerabilities

2026-05-22 12:05

CISA has issued an urgent alert warning organizations about two newly disclosed zero-day vulnerabilities affecting Microsoft Defender, both added to the Known Exploited Vulnerabilities (KEV) catalog on May 20, 2026. CVE-2026-45498: Microsoft Defender DoS Vulnerability CVE-2026-45498 is a denial-of-service (DoS)…

Read more →

EN, Securelist

Cloud Atlas activity in the second half of 2025 and early 2026: new tools and a new payload

2026-05-22 12:05

The experienced Cloud Atlas group remains active, continuing to target government sectors and diplomatic entities in Russia and Belarus, employing both new and established techniques to maintain persistence in compromised systems. This article has been indexed from Securelist Read the…

Read more →

Cyber Security News, EN

Hackers Use Hugging Face to Host Second-Stage Malware for npm Supply Chain Attack

2026-05-22 12:05

Hackers have found a new and alarming way to weaponize one of the most trusted platforms in the AI world. A threat actor linked to North Korea has embedded second-stage malware inside Hugging Face, the widely used AI and machine…

Read more →

Cyber Security News, EN

FBI Warns of Kali365 Attacking Microsoft 365 Users to Steal Logins and Bypass MFA

2026-05-22 12:05

The FBI has issued a new cybersecurity warning about a rapidly emerging phishing-as-a-service (PhaaS) platform named Kali365, which is actively targeting Microsoft 365 users to steal access tokens and bypass multi-factor authentication (MFA). Kali365 is being distributed primarily through Telegram…

Read more →

Cyber Security News, EN

CISA Warns of Trend Micro Apex One Vulnerability Exploited in Attacks

2026-05-22 12:05

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical vulnerability in Trend Micro Apex One to its Known Exploited Vulnerabilities (KEV) catalog, warning organizations of active exploitation risks. The flaw, tracked as CVE-2026-34926, affects on-premise deployments of…

Read more →

Cyber Security News, EN

Splunk Patches Multiple Vulnerabilities that Enable DOS Attack and Exposes Sensitive Data

2026-05-22 12:05

Splunk has released security updates addressing multiple vulnerabilities across Splunk Enterprise, Splunk Cloud Platform, and the Splunk AI Toolkit that could lead to denial-of-service (DoS) conditions and exposure of sensitive data. The issues, disclosed on May 20, 2026, include three…

Read more →

EN, Help Net Security

CISA’s new KEV nomination form opens reporting to vendors and researchers

2026-05-22 12:05

The Cybersecurity and Infrastructure Security Agency launched a new nomination form that lets researchers, vendors, and industry partners report known exploited vulnerabilities for possible inclusion in its KEV catalog. The form gives outside contributors a direct way to submit vulnerabilities…

Read more →

EN, GBHackers Security | #1 Globally Trusted Cyber Security News Platform

Android Malware Secretly Signs Users Up for Premium Services

2026-05-22 11:05

Android users are being targeted by a large-scale malware campaign that silently subscribes victims to premium mobile services without their knowledge. The malware campaign focuses on carrier billing fraud, abusing premium SMS services to generate revenue for attackers. What makes…

Read more →

EN, securityweek

‘First VPN’ Cybercrime Service Disrupted, Administrator Arrested

2026-05-22 11:05

The FBI says First VPN has been used by dozens of ransomware groups for network reconnaissance and intrusions. The post ‘First VPN’ Cybercrime Service Disrupted, Administrator Arrested appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…

Read more →

EN, Help Net Security

Meet Fractal, an OS made for microarchitecture reverse engineering

2026-05-22 11:05

Probing how a CPU isolates user code from kernel code is messy work. Researchers patch kernels, write drivers, or boot stripped-down bare-metal programs, and any of those choices change variables they were trying to hold still. Fractal, a new operating…

Read more →

EN, Help Net Security

Microsoft 365 users targeted by new phishing threat that bypasses MFA

2026-05-22 11:05

Microsoft 365 access tokens are being targeted by an emerging Phishing-as-a-Service (PhaaS) platform called Kali365, the FBI is warning. First observed in April 2026, Kali365 has been distributed through Telegram, allowing cybercriminals to obtain Microsoft 365 access tokens and bypass…

Read more →

EN, The Hacker News

Kimwolf DDoS Botnet Operator Arrested in Canada Over DDoS-for-Hire Attacks

2026-05-22 11:05

The U.S. Department of Justice (DoJ) on Thursday announced the arrest of a Canadian man in connection with allegedly operating a distributed denial-of-service (DDoS) botnet known as Kimwolf. In tandem, Jacob Butler (aka Dort), 23, Ottawa, Canada, has been charged…

Read more →

Page 6 of 5450
« 1 … 4 5 6 7 8 … 5,450 »

Pages

  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Telegram Channel

Recent Posts

  • Scientists discover atoms suddenly spinning backward in quantum experiment May 24, 2026
  • IT Security News Hourly Summary 2026-05-24 12h : 1 posts May 24, 2026
  • Anthropic’s Project Glasswing: 10,000+ Vulnerabilities Found in One Month, and the Patching Problem Has Never Been More Obvious May 24, 2026
  • Researcher Claims Trump Mobile Website Leaked Data on More Than 27,000 Customers Through Unprotected API May 24, 2026
  • U.S. CISA adds a flaw in Drupal Core to its Known Exploited Vulnerabilities catalog May 24, 2026
  • Week in review: GitHub breached via poisoned VS Code extension, critical NGINX flaw exploited May 24, 2026
  • 7-Eleven – 185,256 breached accounts May 24, 2026
  • IT Security News Hourly Summary 2026-05-24 06h : 1 posts May 24, 2026
  • PyrsistenceSniper – Tool that Detects 117 Persistence Malware Techniques on Windows, Linux, and macOS May 24, 2026
  • IT Security News Hourly Summary 2026-05-24 00h : 1 posts May 24, 2026
  • IT Security News Daily Summary 2026-05-23 May 23, 2026
  • These special phone and app features can help protect you from spyware May 23, 2026
  • CVE-2026-9082: Drupal’s Highly Critical SQL Injection Flaw Is Already Under Active Attack May 23, 2026
  • Packagist Supply Chain Attack Infects 8 Packages Using GitHub-Hosted Linux Malware May 23, 2026
  • npm Adds 2FA-Gated Publishing and Package Install Controls Against Supply Chain Attacks May 23, 2026
  • Millions of Devices at Risk: New Trojan Monitors Smartphones May 23, 2026
  • AI Coding Tools Expose Thousands of Apps With Sensitive Corporate Data Online May 23, 2026
  • Why pure extortion is replacing traditional ransomware May 23, 2026
  • IT Security News Hourly Summary 2026-05-23 15h : 4 posts May 23, 2026
  • Nginx-poolslip Vulnerability Enables DoS and Code Execution Attacks — Patch Now! May 23, 2026

Copyright © 2026 IT Security News. All Rights Reserved. The Magazine Basic Theme by bavotasan.com.

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}