IT Security News

Cybersecurity news and articles about information security, vulnerabilities, exploits, hacks, laws, spam, viruses, malware, breaches.

Main menu

Skip to content
  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Telegram Channel
EN, eSecurity Planet

Booking.com Phishing Campaign Hijacks Hotel Accounts to Defraud Guests

2026-02-18 20:02

A multi-stage Booking.com phishing campaign is hijacking hotel accounts to defraud guests through convincing payment scams. The post Booking.com Phishing Campaign Hijacks Hotel Accounts to Defraud Guests appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet…

Read more →

EN, IT SECURITY GURU

Cybercrime Goes Corporate: Huntress Report Reveals Rise of Scalable, Stealth-First Attacks

2026-02-18 20:02

Cybercriminals are no longer lone hackers exploiting flashy zero-days; they are running streamlined, profit-driven operations that mirror legitimate businesses. That’s the key takeaway from the newly released Huntress 2026 Cyber Threat Report, which exposes how organised cybercrime groups are standardising…

Read more →

EN, The Register - Security

Texas sues TP-Link over China links and security vulnerabilities

2026-02-18 20:02

State disputes the company’s claim that its routers are made in Vietnam TP-Link is facing legal action from the state of Texas for allegedly misleading consumers with “Made in Vietnam” claims despite China-dominated manufacturing and supply chains, and for marketing…

Read more →

EN, Security Boulevard

Engineering for the Inevitable: Managing Downstream Failures in Security Data Pipelines

2026-02-18 20:02

Learn how to prevent 50% of detection failures caused by log delivery chain issues. Master persistent queuing, schema drift mitigation, and automated recovery for zero data loss SOC operations. The post Engineering for the Inevitable: Managing Downstream Failures in Security…

Read more →

EN, The Hacker News

Citizen Lab Finds Cellebrite Tool Used on Kenyan Activist’s Phone in Police Custody

2026-02-18 20:02

New research from the Citizen Lab has found signs that Kenyan authorities used a commercial forensic extraction tool manufactured by Israeli company Cellebrite to break into a prominent dissident’s phone, making it the latest case of abuse of the technology…

Read more →

EN, Security Latest

A Vast Trove of Exposed Social Security Numbers May Put Millions at Risk of Identity Theft

2026-02-18 19:02

A database left accessible to anyone online contained billions of records, including sensitive personal data that criminals appear to have not yet exploited. This article has been indexed from Security Latest Read the original article: A Vast Trove of Exposed…

Read more →

CySecurity News - Latest Information Security and Hacking Incidents, EN

Conduent Data Breach Expands to Tens of Millions of Americans

2026-02-18 19:02

  A massive data breach at Conduent, a leading government technology contractor, has escalated dramatically, now affecting tens of millions of Americans across multiple states. Initially detected in January 2025, the intrusion originated from an unauthorized access on October 21,…

Read more →

Blog, EN

Zero Trust Switching: Why Firewalls Alone Can’t Secure AI Workloads

2026-02-18 19:02

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Zero Trust Switching: Why Firewalls Alone Can’t Secure AI Workloads

Read more →

DZone Security Zone, EN

How to Build Permission-Aware Retrieval That Doesn’t Leak Across Teams

2026-02-18 19:02

LLM assistants or chatbots are very good at connecting the dots, which is exactly why they can be dangerous in multi-team organizations. A PM from team A asks, ‘Why did the churn rate spike last Wednesday?’ The assistant retrieves and…

Read more →

EN, Malwarebytes

Betterment data breach might be worse than we thought

2026-02-18 19:02

This breach now appears far more serious. The leaked data includes rich personal and financial details that phishers could use. This article has been indexed from Malwarebytes Read the original article: Betterment data breach might be worse than we thought

Read more →

EN, Security Archives - TechRepublic

Substack Breach May Have Leaked Nearly 700,000 User Details Online

2026-02-18 19:02

Substack says hackers accessed user emails, phone numbers, and internal metadata in October 2025, with a database of 697,313 records later posted online. The post Substack Breach May Have Leaked Nearly 700,000 User Details Online appeared first on TechRepublic. This…

Read more →

EN, The Register - Security

German train line back on track after DDoS yanks the brakes

2026-02-18 19:02

National rail bookings and timetables disrupted for nearly 24 hours If you wanted to book a train trip in Germany recently, you would have been out of luck. The country’s national rail company says that its services were disrupted for…

Read more →

CySecurity News - Latest Information Security and Hacking Incidents, EN

London Boroughs Struggle to Restore Services After November Cyber Attack

2026-02-18 19:02

A cyber intrusion identified on November 24, 2025 has disrupted essential local authority services in two central London boroughs, freezing parts of the property market and delaying administrative functions. The Royal Borough of Kensington and Chelsea and Westminster City Council…

Read more →

CySecurity News - Latest Information Security and Hacking Incidents, EN

ISPsystem VMs Hijacked for Silent Ransomware Distribution

2026-02-18 19:02

  The evolution of cybercrime has led to infrastructure becoming less of a matter of ownership and more of a convenience issue. As opposed to investing time and resources in the construction and maintenance of dedicated command-and-control servers, ransomware operators…

Read more →

EN, The Hacker News

Grandstream GXP1600 VoIP Phones Exposed to Unauthenticated Remote Code Execution

2026-02-18 19:02

Cybersecurity researchers have disclosed a critical security flaw in the Grandstream GXP1600 series of VoIP phones that could allow an attacker to seize control of susceptible devices. The vulnerability, tracked as CVE-2026-2329, carries a CVSS score of 9.3 out of…

Read more →

Cybersecurity Dive - Latest News, EN

Identity and supply chain need more attention, risk intelligence firm says

2026-02-18 19:02

Roughly a third of attacks now use stolen credentials, according to the company’s latest report. This article has been indexed from Cybersecurity Dive – Latest News Read the original article: Identity and supply chain need more attention, risk intelligence firm…

Read more →

hourly summary

IT Security News Hourly Summary 2026-02-18 18h : 11 posts

2026-02-18 19:02

11 posts were published in the last hour 16:36 : Cyber Risk Is a Board Responsibility and Training Is the Missing Link 16:36 : ClawHavoc Poisoned OpenClaw’s ClawHub with 1,184 Malicious Skills, Enabling Data Theft and Backdoor Access 16:36 :…

Read more →

EN, Industry Trends & Insights

Cyber Risk Is a Board Responsibility and Training Is the Missing Link

2026-02-18 18:02

Boards now view cybersecurity as a business and financial priority, yet many lack the training to govern cyber risk effectively. Here’s why board-level education matters more than ever.        This article has been indexed from Industry Trends & Insights Read…

Read more →

Cyber Security News, EN

ClawHavoc Poisoned OpenClaw’s ClawHub with 1,184 Malicious Skills, Enabling Data Theft and Backdoor Access

2026-02-18 18:02

A large-scale supply chain poisoning campaign that targeted OpenClaw’s official marketplace, ClawHub, distributing 1,184 malicious “Skills” designed to steal data and establish backdoor access on compromised systems. OpenClaw, a fast-growing open-source AI agent platform, enables users to install plugin-like Skills…

Read more →

Cyber Security News, EN

OpenClaw AI Framework v2026.2.17 Released with Anthropic Model Support and Security Fixes

2026-02-18 18:02

OpenClaw has released version 2026.2.17 with significant enhancements, including support for Anthropic’s Claude Sonnet 4.6 model. Expanded context windows, though the update arrives as the AI agent framework continues facing scrutiny over critical security vulnerabilities involving credential theft and remote…

Read more →

Cyber Security News, EN

New SysUpdate Variant Malware Discovered and Tool Developed to Decrypt Encrypted Linux C2 Traffic

2026-02-18 18:02

A new variant of the SysUpdate malware has emerged as a sophisticated threat targeting Linux systems with advanced command-and-control (C2) encryption capabilities. The malware was discovered during a Digital Forensics and Incident Response (DFIR) engagement when security teams detected the…

Read more →

EN, Security Boulevard

How synthetic data can help solve AI’s data crisis

2026-02-18 18:02

As AI demand outpaces the availability of high-quality training data, synthetic data offers a path forward. We unpack how synthetic datasets help teams overcome data scarcity to build production-ready AI. The post How synthetic data can help solve AI’s data…

Read more →

EN, Security Boulevard

SRE Playbook: A Guide to Discover and Catalog Non-Human Identities (NHI)

2026-02-18 18:02

Let’s take a closer look at the fragmented NHI inventory from a site reliability engineer’s perspective. The post SRE Playbook: A Guide to Discover and Catalog Non-Human Identities (NHI) appeared first on Security Boulevard. This article has been indexed from…

Read more →

EN, Security Boulevard

NDSS 2025 – CLIBE: Detecting Dynamic Backdoors In Transformer-based NLP Models

2026-02-18 18:02

Session 12D: ML Backdoors Authors, Creators & Presenters: Rui Zeng (Zhejiang University), Xi Chen (Zhejiang University), Yuwen Pu (Zhejiang University), Xuhong Zhang (Zhejiang University), Tianyu Du (Zhejiang University), Shouling Ji (Zhejiang University) PAPER CLIBE: Detecting Dynamic Backdoors in Transformer-based NLP…

Read more →

Page 6 of 4937
« 1 … 4 5 6 7 8 … 4,937 »

Pages

  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Telegram Channel

Recent Posts

  • Hackers Leveraging Emoji Code to Hide Malicious Code and Evade Security Detections February 19, 2026
  • XWorm Malware Delivered via Fake Financial Receipts Targeting Windows Systems to Steal Logins and Sessions February 19, 2026
  • DEF CON bans three Epstein-linked men from future events February 19, 2026
  • Nearly 1 Million User Records Compromised in Figure Data Breach February 19, 2026
  • How Modern Security Platforms Organize Rules February 19, 2026
  • The Growing Threat of DNS Powered Email and Web Attacks February 19, 2026
  • China’s Parallel CVE Systems Expose Alternate Vulnerability Disclosure Timeline February 19, 2026
  • Industrial Control System Vulnerabilities Hit Record Highs February 19, 2026
  • CISA alerts to critical auth bypass CVE-2026-1670 in Honeywell CCTVs February 19, 2026
  • Malicious AI February 19, 2026
  • Venice Security Emerges From Stealth With $33M Funding for Privileged Access Management February 19, 2026
  • How AI Agents Are Transforming Identity Verification and Authentication Systems February 19, 2026
  • PromptSpy: First Android malware to use generative AI in its execution flow February 19, 2026
  • Bug in widely used VoIP phones allows stealthy network footholds, call interception (CVE-2026-2329) February 19, 2026
  • From Exposure to Exploitation: How AI Collapses Your Response Window February 19, 2026
  • Starkiller: New ‘Commercial-Grade’ Phishing Kit Bypasses MFA February 19, 2026
  • Intimate products producer Tenga spilled customer data February 19, 2026
  • Ivanti Exploitation Surges as Zero-Day Attacks Traced Back to July 2025 February 19, 2026
  • SPF Alignment: Why is it Important for Improving DMARC February 19, 2026
  • Citizen Lab Finds Evidence of Mobile Data Extraction from Detained Kenyan Activist February 19, 2026

Copyright © 2026 IT Security News. All Rights Reserved. The Magazine Basic Theme by bavotasan.com.

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}