IT Security News

Cybersecurity news and articles about information security, vulnerabilities, exploits, hacks, laws, spam, viruses, malware, breaches.

Main menu

Skip to content
  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Telegram Channel
EN, Silicon UK

BYD Adds Fast Charging To International EV Models

2026-05-14 11:05

Tech that can charge battery in 5 minutes comes to Europe, as BYD seeks to pose more direct challenge to petrol vehicles This article has been indexed from Silicon UK Read the original article: BYD Adds Fast Charging To International…

Read more →

EN, GBHackers Security | #1 Globally Trusted Cyber Security News Platform

Hackers Hijack HWMonitor to Sideload Malicious DLL

2026-05-14 11:05

Hackers are once again exploiting user trust in legitimate software, this time abusing the popular CPUID HWMonitor utility to deliver a stealthy remote access trojan. The malicious archive mimics a legitimate installer, highlighting how trusted tools remain a powerful lure…

Read more →

EN, GBHackers Security | #1 Globally Trusted Cyber Security News Platform

GitLab Security Flaw Allows Cross-Site Scripting and Unauthenticated DoS

2026-05-14 11:05

GitLab has issued an urgent security update to neutralise a massive wave of vulnerabilities. Threat actors could exploit these newly disclosed flaws to silently hijack developer sessions or completely paralyze continuous integration pipelines with unauthenticated attacks. GitLab Security Flaw On…

Read more →

EN, Security Affairs

FamousSparrow targets Azerbaijani energy sector in multi-wave espionage campaign

2026-05-14 11:05

Chinese-linked FamousSparrow repeatedly targeted an Azerbaijani oil and gas company, reusing the same entry point in three intrusions from Dec 2025 to Feb 2026. Chinese-linked threat actor FamousSparrow has conducted a sustained intrusion campaign against an Azerbaijani oil and gas…

Read more →

Cyber Security News, EN

Critical 18-Year-Old NGINX Vulnerability Enables Remote Code Execution Attacks

2026-05-14 11:05

A critical heap buffer overflow vulnerability has been discovered in the source code of NGINX, present since 2008. This vulnerability has been publicly disclosed, along with a working proof-of-concept exploit that can enable unauthenticated remote code execution (RCE) against one…

Read more →

Cyber Security News, EN

Windows DNS Client Vulnerability Enables Remote Code Execution Attacks

2026-05-14 11:05

A newly disclosed vulnerability in the Microsoft Windows DNS Client could let attackers silently execute malicious code across enterprise networks, exposing a massive attack surface. Officially designated as CVE-2026-41096, this critical security flaw carries a severe CVSS score of 9.8…

Read more →

Cyber Security News, EN

Seedworm APT Abuses Signed Fortemedia and SentinelOne Binaries for DLL Sideloading

2026-05-14 11:05

Iran-linked hackers have been quietly breaking into networks around the world, and their latest campaign is more calculated than anything we have seen from them before. The group known as Seedworm, also tracked as MuddyWater, spent the first quarter of…

Read more →

Cyber Security News, EN

Packagist Urges Immediate Composer Update After GitHub Actions Token Leak

2026-05-14 11:05

Packagist is sounding the alarm for PHP developers everywhere. A flaw in Composer, the widely used PHP dependency manager, briefly caused GitHub authentication tokens to leak into publicly visible CI logs, raising urgent concerns about credential exposure across thousands of…

Read more →

Cyber Security News, EN

Langflow CVE-2026-33017 Exploited to Steal AWS Keys and Deploy NATS Worker

2026-05-14 11:05

Attackers are now abusing a fresh Langflow vulnerability to quietly steal cloud keys and turn victim systems into workers for a new NATS based botnet. This campaign shows how a single exposed AI workflow tool can become the start of…

Read more →

EN, Malwarebytes

Deepfake sextortion forces schools to remove student photos from websites

2026-05-14 11:05

Experts are urging schools to take down identifiable photos of students, after AI deepfakes have led to sextortion cases at UK schools. This article has been indexed from Malwarebytes Read the original article: Deepfake sextortion forces schools to remove student…

Read more →

EN, www.infosecurity-magazine.com

Most Organizations Now Use AI Agents for Sensitive Security Tasks

2026-05-14 11:05

Semperis study finds 74% of organizations believe AI will increase attacks on identity infrastructure This article has been indexed from www.infosecurity-magazine.com Read the original article: Most Organizations Now Use AI Agents for Sensitive Security Tasks

Read more →

EN, Silicon UK

Mistral Pitches Security-Focused AI As Mythos Alternative

2026-05-14 11:05

French start-up reportedly in talks with European banks to use upcoming model to review security of their systems This article has been indexed from Silicon UK Read the original article: Mistral Pitches Security-Focused AI As Mythos Alternative

Read more →

EN, securityweek

High-Severity Vulnerability Patched in VMware Fusion

2026-05-14 11:05

The patch was announced as Broadcom is attending the Pwn2Own hacking competition in Berlin this week. The post High-Severity Vulnerability Patched in VMware Fusion appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article: High-Severity…

Read more →

EN, Silicon UK

UK AI Chip Start-Up Fractile Raises $220m

2026-05-14 10:05

Fractile completes Series B round valuing it at $1bn as it seeks to ease inference bottleneck for cutting-edge AI models This article has been indexed from Silicon UK Read the original article: UK AI Chip Start-Up Fractile Raises $220m

Read more →

EN, Silicon UK

Met Police Arrest 173 In Live Facial Recognition Trial

2026-05-14 10:05

Six-month live facial recognition trial results in an arrest every 35 minutes, including a woman wanted for more than 20 years This article has been indexed from Silicon UK Read the original article: Met Police Arrest 173 In Live Facial…

Read more →

EN, GBHackers Security | #1 Globally Trusted Cyber Security News Platform

PoC Released for 18-Year-Old NGINX Flaw Allowing Remote Code Execution

2026-05-14 10:05

A critical vulnerability in NGINX’s source code, hidden since 2008, has finally been exposed, and a working exploit is already in the wild. Security researchers at depthfirst have publicly released a proof-of-concept (PoC) exploit demonstrating unauthenticated remote code execution (RCE)…

Read more →

EN, GBHackers Security | #1 Globally Trusted Cyber Security News Platform

Langflow CVE-2026-33017 Exploited to Steal AWS Keys, Deploy NATS Worker

2026-05-14 10:05

Langflow instances left unpatched against CVE-2026-33017 are now being actively abused not just for remote code execution, but as launchpads to steal AWS keys and join a NATS-backed botnet-style worker pool dubbed “KeyHunter.” The vulnerability, now listed in CISA’s Known…

Read more →

EN, Help Net Security

CERN’s open source KiCad library gives the world 17,000 circuit board components

2026-05-14 10:05

CERN has released its complete KiCad component library under an open source license, making it available to hardware designers anywhere in the world. The library, maintained by CERN’s Design Office, contains more than 17,000 electronic components in the form of…

Read more →

EN, The Hacker News

New Fragnesia Linux Kernel LPE Grants Root Access via Page Cache Corruption

2026-05-14 10:05

Details have emerged about a new variant of the recent Dirty Frag Linux local privilege escalation (LPE) vulnerability that allows local attackers to gain root access, making it the third such bug to be identified in the kernel within a…

Read more →

EN, Silicon UK

Waymo Issues Recall After Car Drives Into Flooded Road

2026-05-14 09:05

Google sister company issues ‘voluntary’ software update after empty vehicle swept away in flooded road in San Antonio, Texas This article has been indexed from Silicon UK Read the original article: Waymo Issues Recall After Car Drives Into Flooded Road

Read more →

EN, GBHackers Security | #1 Globally Trusted Cyber Security News Platform

Packagist Warns: Update Composer Now After GitHub Actions Token Leak

2026-05-14 09:05

A sudden change in GitHub’s token format has triggered an unexpected security vulnerability in Composer, exposing sensitive authentication tokens in CI/CD logs and forcing Packagist to issue an urgent warning to PHP developers worldwide. The issue stems from a mismatch…

Read more →

EN, Security Affairs

Nitrogen Ransomware claims massive data theft from Foxconn

2026-05-14 09:05

Foxconn confirmed a cyberattack on some North American factories. The Nitrogen ransomware group claims it stole 8TB of data from the firm. Foxconn confirmed that several of its North American factories were affected by a cyberattack. The manufacturer confirmed it…

Read more →

Cyber Security News, EN

The Gentlemen RaaS Leverages Fortinet and Cisco Edge Devices for Initial Access

2026-05-14 09:05

A ransomware group that only surfaced in mid-2025 has already made a significant mark on the threat landscape. The Gentlemen, a ransomware-as-a-service (RaaS) operation, has quickly risen to become one of the most active ransomware programs in the world, with…

Read more →

Cyber Security News, EN

Critical MongoDB Vulnerability Allow Attackers to Execute Arbitrary Code

2026-05-14 09:05

A newly disclosed critical vulnerability in MongoDB could allow threat actors to execute arbitrary code, potentially handing them complete control over affected servers and exposing millions of records to theft. The vulnerability, officially tracked as CVE-2026-8053, directly impacts MongoDB Server…

Read more →

Page 6 of 5407
« 1 … 4 5 6 7 8 … 5,407 »

Pages

  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Telegram Channel

Recent Posts

  • Nobody believes the ‘criminals and scumbags’ who hacked Canvas really deleted stolen student data May 15, 2026
  • IT Security News Hourly Summary 2026-05-15 00h : 5 posts May 15, 2026
  • IT Security News Daily Summary 2026-05-14 May 14, 2026
  • Chinese APT Hackers Exploit Microsoft Exchange to Breach Energy Sector Network May 14, 2026
  • Sandworm Hackers Pivot From Compromised IT Systems Toward Critical OT Assets May 14, 2026
  • Innovator Spotlight: Radware May 14, 2026
  • Innovator Spotlight: Klever Compliance May 14, 2026
  • Regional routing for AWS access portals: Implementing custom vanity domains for IAM Identity Center May 14, 2026
  • The “Zombie API” Attack: Why Your Old Integrations Are Your Biggest Security Risk May 14, 2026
  • U.S. CISA adds a flaw in Cisco Catalyst SD-WAN  to its Known Exploited Vulnerabilities catalog May 14, 2026
  • Critical Canon MailSuite Vulnerability Enables Remote Code Execution Attacks May 14, 2026
  • Hackers Compromise 170 npm Packages to Steal GitHub, npm, AWS, and Kubernetes Secrets May 14, 2026
  • Anthropic’s Mythos AI Reportedly Found macOS Vulnerabilities that Could Bypass Apple Security May 14, 2026
  • node-ipc npm Package with 822K Weekly Downloads Compromised in Supply Chain Attack May 14, 2026
  • New Malware Framework Enables Screen Control, Browser Artifact Access, and UAC Bypass May 14, 2026
  • IT Security News Hourly Summary 2026-05-14 21h : 4 posts May 14, 2026
  • Stealer Backdoor Found in 3 Node-IPC Versions Targeting Developer Secrets May 14, 2026
  • Cisco Catalyst SD-WAN Controller Auth Bypass Actively Exploited to Gain Admin Access May 14, 2026
  • Wordfence Intelligence Weekly WordPress Vulnerability Report (May 4, 2026 to May 10, 2026) May 14, 2026
  • Linux Kernel bug Fragnesia allows local root access attacks May 14, 2026

Copyright © 2026 IT Security News. All Rights Reserved. The Magazine Basic Theme by bavotasan.com.

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}