IT Security News

Cybersecurity news and articles about information security, vulnerabilities, exploits, hacks, laws, spam, viruses, malware, breaches.

Main menu

Skip to content
  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Telegram Channel
EN, The Hacker News

Malicious Chrome Extensions Caught Stealing Business Data, Emails, and Browsing History

2026-02-13 14:02

Cybersecurity researchers have discovered a malicious Google Chrome extension that’s designed to steal data associated with Meta Business Suite and Facebook Business Manager. The extension, named CL Suite by @CLMasters (ID: jkphinfhmfkckkcnifhjiplhfoiefffl), is marketed as a way to scrape Meta…

Read more →

EN, www.infosecurity-magazine.com

Munich Security Conference: Cyber Threats Lead G7 Risk Index, Disinformation Ranks Third

2026-02-13 14:02

G7 countries ranked cyber-attacks as the top risk, while BICS members placed cyber threats only as the eighth most pressing risk This article has been indexed from www.infosecurity-magazine.com Read the original article: Munich Security Conference: Cyber Threats Lead G7 Risk…

Read more →

EN, IT SECURITY GURU

KnowBe4 Appoints Kelly Morgan as Chief Customer Officer to Drive Global Customer Lifecycle Strategy

2026-02-13 14:02

KnowBe4 has announced the appointment of Kelly Morgan as its new Chief Customer Officer (CCO), reinforcing the company’s commitment to delivering measurable customer outcomes as it continues to expand in the Human and AI Risk Management market. Morgan will oversee…

Read more →

EN, The Register - Security

Top Dutch telco Odido admits 6.2M customers caught in contact system caper

2026-02-13 14:02

Names, addresses, bank account numbers accessed – but biz insists passwords and call data untouched The Netherlands’ largest mobile network operator (MNO) has admitted that a breach of its customer contact system may have affected around 6.2 million people.… This…

Read more →

EN, Hackread – Cybersecurity News, Data Breaches, AI and More

Static Design to Adaptive Control: How Artificial Intelligence Improves Modern Material Handling Equipment Systems

2026-02-13 13:02

AI enables material handling systems to adapt to demand volatility through predictive design, dynamic control, and smarter maintenance without replacing core engineering. This article has been indexed from Hackread – Cybersecurity News, Data Breaches, AI and More Read the original…

Read more →

EN, Hackread – Cybersecurity News, Data Breaches, AI and More

The $17 Billion Wake-Up Call: Securing Crypto in the Age of AI Scams

2026-02-13 13:02

AI-driven crypto scams surge as cybercrime hits $17B, with deepfakes, fraud kits, and industrial social engineering reshaping digital asset threats and defenses. This article has been indexed from Hackread – Cybersecurity News, Data Breaches, AI and More Read the original…

Read more →

EN, Security Affairs

Google: state-backed hackers exploit Gemini AI for cyber recon and attacks

2026-02-13 13:02

Google says nation-state actors used Gemini AI for reconnaissance and attack support in cyber operations. Google DeepMind and GTIG report a rise in model extraction or “distillation” attacks aimed at stealing AI intellectual property, which Google has detected and blocked.…

Read more →

EN, securityweek

BeyondTrust Vulnerability Targeted by Hackers Within 24 Hours of PoC Release

2026-02-13 13:02

Exploitation attempts target CVE-2026-1731, a critical unauthenticated remote code execution flaw in BeyondTrust Remote Support. The post BeyondTrust Vulnerability Targeted by Hackers Within 24 Hours of PoC Release appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…

Read more →

EN, The Hacker News

npm’s Update to Harden Their Supply Chain, and Points to Consider

2026-02-13 13:02

In December 2025, in response to the Sha1-Hulud incident, npm completed a major authentication overhaul intended to reduce supply-chain attacks. While the overhaul is a solid step forward, the changes don’t make npm projects immune from supply-chain attacks. npm is…

Read more →

EN, www.infosecurity-magazine.com

Fake AI Assistants in Google Chrome Web Store Steal Passwords and Spy on Emails

2026-02-13 13:02

Hundreds of thousands of users have downloaded malicious AI extensions masquerading as ChatGPT, Gemini, Grok and others, warn cybersecurity researchers at LayerX This article has been indexed from www.infosecurity-magazine.com Read the original article: Fake AI Assistants in Google Chrome Web…

Read more →

hourly summary

IT Security News Hourly Summary 2026-02-13 12h : 14 posts

2026-02-13 13:02

14 posts were published in the last hour 11:5 : Chrome Extensions Infect 500K Users to Hijack VKontakte Accounts 11:5 : Surge in AI-Driven Phishing Attacks and QR Code Quishing in 2025 Spam and Phishing Report 11:4 : OysterLoader Multi‑Stage…

Read more →

EN, GBHackers Security | #1 Globally Trusted Cyber Security News Platform

Malicious Chrome AI Extensions Target 260,000 Users with Injected Iframes

2026-02-13 13:02

As AI tools like ChatGPT, Claude, Gemini, and Grok gain mainstream adoption, cybercriminals are weaponizing their popularity to distribute malicious browser extensions. Security researchers have uncovered a coordinated campaign involving 30 Chrome extensions that masquerade as legitimate AI assistants while…

Read more →

EN, GBHackers Security | #1 Globally Trusted Cyber Security News Platform

Chrome Extensions Infect 500K Users to Hijack VKontakte Accounts

2026-02-13 13:02

A long-running Chrome extension malware campaign has silently hijacked more than 500,000 VKontakte (VK) accounts, forcing users into attacker-controlled groups, resetting their settings every 30 days, and abusing VK’s own infrastructure as command-and-control. What appeared to be harmless VK customization…

Read more →

Cyber Security News, EN

Surge in AI-Driven Phishing Attacks and QR Code Quishing in 2025 Spam and Phishing Report

2026-02-13 13:02

The distribution of malicious software through pirated games and cracked applications continues to be a highly effective strategy for cybercriminals. By exploiting the widespread desire for free access to premium content, attackers can easily bypass initial user suspicions and deliver…

Read more →

Cyber Security News, EN

OysterLoader Multi‑Stage Evasion Loader Uncovered with Advanced Obfuscation and Rhysida Ransomware Links

2026-02-13 13:02

A sophisticated malware loader known as OysterLoader has emerged as a significant threat in the cybersecurity landscape, employing multiple layers of obfuscation to evade detection and deliver dangerous payloads. First identified in June 2024 by Rapid7, this C++ malware is…

Read more →

EN, securityweek

CISA Warns of Exploited SolarWinds, Notepad++, Microsoft Vulnerabilities

2026-02-13 13:02

Disclosed at the end of January, the SolarWinds vulnerability was likely exploited as a zero-day since December 2025. The post CISA Warns of Exploited SolarWinds, Notepad++, Microsoft Vulnerabilities appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…

Read more →

EN, Help Net Security

Hackers probe, exploit newly patched BeyondTrust RCE flaw (CVE-2026-1731)

2026-02-13 13:02

Attackers are exploiting a recently patched critical vulnerability (CVE-2026-1731) in internet-facing BeyondTrust Remote Support and Privileged Remote Access instances. “Attackers are abusing get_portal_info to extract the x-ns-company value before establishing a WebSocket channel,” Ryan Dewhurst, Head of Threat Intelligence at…

Read more →

EN, IT SECURITY GURU

Check Point Sets Out Four-Pillar Blueprint for Securing the AI-Driven Enterprise

2026-02-13 12:02

Check Point Software Technologies has unveiled a new AI-focused security strategy alongside three acquisitions aimed at strengthening its platform across AI agent protection, exposure management and managed service provider (MSP) environments. The announcement outlines a four-pillar framework designed to help…

Read more →

EN, Security Boulevard

Post‑Quantum Authentication: How Consumer Apps Can Stay Secure in a Quantum‑Ready World?

2026-02-13 12:02

Post-quantum authentication helps consumer apps stay secure against quantum computing threats with future-proof encryption and identity protection. The post Post‑Quantum Authentication: How Consumer Apps Can Stay Secure in a Quantum‑Ready World? appeared first on Security Boulevard. This article has been…

Read more →

EN, Security Boulevard

The Law of Cyberwar is Pretty Discombobulated

2026-02-13 12:02

This article explores the complexities of cyberwarfare, emphasizing the need to reconsider how we categorize cyber operations within the framework of the Law of Armed Conflict (LOAC). It discusses the challenges posed by AI in transforming traditional warfare notions and…

Read more →

EN, Help Net Security

Proofpoint acquires Acuvity to secure AI and agent-driven workflows

2026-02-13 12:02

Proofpoint has acquired Acuvity, strengthening its platform with AI-native visibility, governance, and runtime protection for AI and agent-driven workflows. As generative AI reshapes how work gets done, organisations are deploying AI copilots, autonomous agents, and model-connected applications across every function,…

Read more →

EN, Security Boulevard

Top Security Incidents of 2025:  The Emergence of the ChainedShark APT Group

2026-02-13 12:02

In 2025, NSFOCUS Fuying Lab disclosed a new APT group targeting China’s scientific research sector, dubbed “ChainedShark” (tracking number: Actor240820). Been active since May 2024, the group’s operations are marked by high strategic coherence and technical sophistication. Its primary targets are…

Read more →

EN, Help Net Security

OpenAI released GPT-5.3-Codex-Spark, a real-time coding model

2026-02-13 12:02

OpenAI has released a research preview of GPT-5.3-Codex-Spark, an ultra-fast model for real-time coding in Codex. It is available to ChatGPT Pro users in the latest versions of the Codex app, the command-line interface, and the VS Code extension. The…

Read more →

EN, Help Net Security

Police arrests distributor of JokerOTP password-stealing bot

2026-02-13 12:02

The Dutch National Police arrested a 21-year-old man from Dordrecht as part of a cybercrime investigation by Team Cybercrime Oost-Brabant. The suspect is believed to have distributed a tool known as JokerOTP, a bot used to intercept one-time passwords (OTPs)…

Read more →

Page 6 of 4911
« 1 … 4 5 6 7 8 … 4,911 »

Pages

  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Telegram Channel

Recent Posts

  • What proactive measures can be taken for NHI lifecycle management? February 15, 2026
  • Are there guaranteed cybersecurity benefits with Agentic AI implementation? February 15, 2026
  • How assured is identity security with the adoption of NHIs? February 15, 2026
  • Why should IT managers feel relieved by advanced secrets management? February 15, 2026
  • IT Security News Hourly Summary 2026-02-15 00h : 3 posts February 15, 2026
  • IT Security News Daily Summary 2026-02-14 February 15, 2026
  • Homeland Security reportedly sent hundreds of subpoenas seeking to unmask anti-ICE accounts February 15, 2026
  • 287 Chrome Extensions Caught Harvesting Browsing Data from 37M Users February 15, 2026
  • Identity Risk Scoring Only Works If Attribution Is Defensible February 14, 2026
  • IT Security News Hourly Summary 2026-02-14 21h : 1 posts February 14, 2026
  • SMS and OTP Bombing Tools Evolve into Scalable, Global Abuse Infrastructure February 14, 2026
  • New Clickfix Exploit Tricks Users into Changing DNS Settings for Malware Installation February 14, 2026
  • NDSS 2025 – Black-Box Membership Inference Attacks Against Fine-Tuned Diffusion Models February 14, 2026
  • UK May Enforce Partial Ransomware Payment Ban as Cyber Reforms Advance February 14, 2026
  • Researchers Identify Previously Undocumented Malware Used in World Leaks Intrusions February 14, 2026
  • Malicious AI Chrome Extensions Steal Users Emails and Passwords February 14, 2026
  • Fintech firm Figure disclosed data breach after employee phishing attack February 14, 2026
  • Upcoming Speaking Engagements February 14, 2026
  • IT Security News Hourly Summary 2026-02-14 18h : 1 posts February 14, 2026
  • U.S. CISA adds a flaw in BeyondTrust RS and PRA to its Known Exploited Vulnerabilities catalog February 14, 2026

Copyright © 2026 IT Security News. All Rights Reserved. The Magazine Basic Theme by bavotasan.com.

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}