Cybersecurity threat researchers have uncovered a highly sophisticated malware campaign leveraging a commodity loader being shared across multiple threat actor groups. The operation targets manufacturing and government organizations across Italy, Finland, and Saudi Arabia with precision-engineered attacks designed to extract…
Fake WordPress Domain Renewal Email Targeting Admins to Steal Credit Card Data
A deceptive phishing campaign is actively targeting WordPress administrators with convincing fake domain renewal notices designed to steal credit card information and two-factor authentication codes. The emails, masquerading as legitimate WordPress.com renewal reminders, redirect unsuspecting victims to a fraudulent payment…
New macOS TCC Bypass Vulnerability Allow Attackers to Access Sensitive User Data
A critical security vulnerability in macOS has been discovered that enables attackers to completely bypass Transparency, Consent, and Control (TCC) protections. Apple’s primary defense mechanism for preventing unauthorized access to sensitive user data is the use of the microphone, camera,…
New Critical n8n Vulnerability Allow Attackers to Execute Arbitrary Commands
A critical vulnerability has been discovered in n8n, the popular open-source workflow automation platform, enabling authenticated attackers to execute arbitrary commands on host systems. The vulnerability, tracked as CVE-2025-68668, has been assigned a severe CVSS score of 9.9 out of…
NordVPN Denies Breach After Hacker Leaks Data
The VPN company has conducted an investigation after a threat actor claimed to have hacked its systems. The post NordVPN Denies Breach After Hacker Leaks Data appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original…
Report: Increase Usage of Generative AI Services Creates Cybersecurity Challenge
Ray Canzanese said that increased reliance on managed corporate accounts should provide cybersecurity teams with more visibility. The post Report: Increase Usage of Generative AI Services Creates Cybersecurity Challenge appeared first on Security Boulevard. This article has been indexed from…
Jaguar Land Rover’s Q3 Sales Crash Amid Cyber-Attack Fallout
JLR’s wholesale sales plunged 43% and retail drops 25% in the third quarter of 2025 following the 2025 cyber-attack This article has been indexed from www.infosecurity-magazine.com Read the original article: Jaguar Land Rover’s Q3 Sales Crash Amid Cyber-Attack Fallout
Judge Says Amazon Must Face Covid Price-Gouging Lawsuit
District judge in Amazon hometown Seattle throws out company’s motion to dismiss case, calling its arguments ‘unpersuasive’ This article has been indexed from Silicon UK Read the original article: Judge Says Amazon Must Face Covid Price-Gouging Lawsuit
New VVS Stealer Malware Targets Discord Users via Fake System Errors
Palo Alto Networks’ new report reveals VVS Stealer uses Discord Injection and fake error messages to steal tokens and MFA codes. Protect your account from this new Python-based threat. This article has been indexed from Hackread – Cybersecurity News, Data…
CISA Expands KEV Catalog with 1,484 New Vulnerabilities as Active Exploitation Surges 20% in 2025
The United States Cybersecurity and Infrastructure Security Agency (CISA) has significantly expanded its Known Exploited Vulnerabilities (KEV) Catalog to 1,484 vulnerabilities as of December 2025, marking a critical milestone in the federal government’s efforts to combat actively exploited security flaws.…
UK splashes £210M on cyber plan to stop Whitehall getting pwnd
Central government will supposedly be as secure as energy facilities and datacenters under new proposals The UK today launches its Government Cyber Action Plan, committing £210 million ($282 million) to strengthen defenses across digital public services and hold itself to…
Students bag extended Christmas break after cyber hit on school IT
Phones, email, and core systems knocked out at Higham Lane in Nuneaton Students at a school in Warwickshire, England, have scored an extended Christmas break after a cyberattack crippled its IT systems, forcing classrooms to close and staff to summon…
IT Security News Hourly Summary 2026-01-06 12h : 1 posts
1 posts were published in the last hour 10:31 : Intel Launches Next-Gen ‘Panther Lake’ Chips At CES
Intel Launches Next-Gen ‘Panther Lake’ Chips At CES
Intel launches next-generation chips based on Panther Lake platform, first to use cutting-edge 18A manufacturing tech This article has been indexed from Silicon UK Read the original article: Intel Launches Next-Gen ‘Panther Lake’ Chips At CES
Amsterdam Court To Hear Nexperia Arguments
Amsterdam commercial court to hear arguments on 14 January on whether it should investigate alleged mismanagement, amid tensions This article has been indexed from Silicon UK Read the original article: Amsterdam Court To Hear Nexperia Arguments
Why Business Structure Matters for Cybersecurity Compliance in Remote-First Companies
Remote-first companies are no longer an exception. What began as a temporary response to global disruption has evolved into a long-term operating model for startups, scaleups, and even established enterprises. Distributed teams, cloud-based tools, and borderless hiring have unlocked flexibility…
New ClickFix Attack Uses Fake Windows BSOD Screens to Trick Users into Executing Malicious Code
A sophisticated malware campaign called PHALTBLYX has emerged, combining social engineering deception with advanced evasion techniques to compromise hospitality sector organizations. The attack chain begins with phishing emails impersonating Booking.com, featuring urgent reservation cancellation alerts with large financial charges displayed…
Italian Regulators End DeepSeek ‘Hallucination’ Probe
Italy’s antitrust regulator concludes investigation into China’s DeepSeek over insufficient warnings on false or misleading AI content This article has been indexed from Silicon UK Read the original article: Italian Regulators End DeepSeek ‘Hallucination’ Probe
Cybersecurity M&A Roundup: 30 Deals Announced in December 2025
Significant cybersecurity M&A deals announced by Akamai, Red Hat, Checkmarx, Silent Push, and ServiceNow. The post Cybersecurity M&A Roundup: 30 Deals Announced in December 2025 appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article:…
The Role of Behavioral Analytics in Enhancing Cybersecurity Defense
Behavioral analytics, or BA, is becoming increasingly useful in the world of cybersecurity. With cyberthreats ever-evolving and with businesses of all shapes and sizes striving to keep up, BA is helping companies future-proof their data, networks, and other assets with…
EU Condemns Grok Sexualised Images On X As Illegal
European Commission says sexualised images generated by X’s Grok chatbot in response to user queries ‘has no place in Europe’ This article has been indexed from Silicon UK Read the original article: EU Condemns Grok Sexualised Images On X As…
Top 20 Best Endpoint Management Tools – 2026
Endpoint management has become essential for modern IT, securing and optimizing devices across hybrid and remote environments. With distributed workforces expanding, demand for robust endpoint management tools reaches new heights in 2026. This guide ranks the top 20 endpoint management…
Threat Actors Allegedly Promoting New ‘Brutus’ Brute-Force Tool Targeting Fortinet Services
A threat actor operating under the moniker “RedTeam” has begun advertising a new brute-force attack tool, “Brutus,” designed to target Fortinet services, according to recent dark web intelligence. The tool is priced at $1,500, signaling growing interest in automated credential-stuffing…
New Sophisticated Phishing Attack Mimic as Google Support to Steal Logins
Cybersecurity researchers have uncovered a dangerous new phishing campaign that tricks users into surrendering their credentials by impersonating legitimate Google support and notifications. The attack combines vishing (voice phishing), spoofed domains, and Google’s own trusted infrastructure to achieve exceptional success…