IT Security News

Cybersecurity news and articles about information security, vulnerabilities, exploits, hacks, laws, spam, viruses, malware, breaches.

Main menu

Skip to content
  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Telegram Channel
Cyber Security News, EN

Apple WebKit Vulnerability Enables Malicious Web Content Bypass on iOS and macOS

2026-03-18 18:03

Apple has released critical security patches to address a high-severity WebKit vulnerability that allows maliciously crafted web content to bypass the Same Origin Policy. Released on March 17, 2026, these updates apply to the latest versions of Apple’s mobile and…

Read more →

Cyber Security News, EN

UIDAI Launches Bug Bounty Programme to Strengthen Aadhaar Security

2026-03-18 18:03

The Unique Identification Authority of India (UIDAI) has officially launched its first structured Bug Bounty Programme. This initiative aims to enhance the security posture of the Aadhaar ecosystem, which serves as the foundational digital identity platform for over a billion…

Read more →

Cyber Security News, EN

OpenAI Launches GPT-5.4 Mini and Nano to Provide Answers 2X Faster

2026-03-18 18:03

OpenAI has officially launched GPT-5.4 mini and GPT-5.4 nano, releasing its most capable small models designed to handle high-volume, latency-sensitive workloads. The new mini iteration offers a significant performance upgrade over the previous GPT-5 mini across reasoning, coding, tool use,…

Read more →

EN, Security Boulevard

Everyone Is Deploying AI Agents. Almost Nobody Knows What They’re Doing.

2026-03-18 18:03

One constant I hear from CISOs I speak with is that AI agents are not coming. They are already inside organizations, reasoning through goals, selecting tools, and taking action through the same APIs that connect your most sensitive systems. And…

Read more →

EN, The Hacker News

Interlock Ransomware Exploits Cisco FMC Zero-Day CVE-2026-20131 for Root Access

2026-03-18 18:03

Amazon Threat Intelligence is warning of an active Interlock ransomware campaign that’s exploiting a recently disclosed critical security flaw in Cisco Secure Firewall Management Center (FMC) Software. The vulnerability in question is CVE-2026-20131 (CVSS score: 10.0), a case of insecure…

Read more →

Cybersecurity Dive - Latest News, EN

Threat groups target cyber-physical systems to disrupt critical infrastructure providers

2026-03-18 18:03

The Iran war has raised concerns that key industrial sectors could be the target of hacktivists, state actors and other groups. This article has been indexed from Cybersecurity Dive – Latest News Read the original article: Threat groups target cyber-physical…

Read more →

EN, Malware-Traffic-Analysis.net - Blog Entries

2026-03-12: Files for an ISC diary (SmartApeSG ClickFix pushes Remcos RAT)

2026-03-18 18:03

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Malware-Traffic-Analysis.net – Blog Entries Read the original article: 2026-03-12: Files for an ISC diary (SmartApeSG ClickFix pushes…

Read more →

EN, Search Security Resources and Information from TechTarget

Cloud storage security best practices

2026-03-18 18:03

<p>As organizations expand their use of public cloud storage services, enterprise IT teams are increasingly required to coordinate security, governance and data protection controls across multiple cloud platforms, regions and service tiers. Without intentional coordination, each cloud storage service may…

Read more →

EN, Security Affairs

Researchers warn of unpatched, critical Telnetd flaw affecting all versions

2026-03-18 18:03

CVE-2026-32746 is a critical flaw in GNU InetUtils telnetd that allows remote attackers to execute code with elevated privileges Cybersecurity company Dream disclosed a critical flaw, tracked as CVE-2026-32746 (CVSS score of 9.8), in GNU InetUtils telnetd that lets unauthenticated…

Read more →

EN, securityweek

‘DarkSword’ iOS Exploit Kit Used by State-Sponsored Hackers, Spyware Vendors

2026-03-18 18:03

Targeting six iOS vulnerabilities and leading to full device compromise, the exploit chain is meant for surveillance. The post ‘DarkSword’ iOS Exploit Kit Used by State-Sponsored Hackers, Spyware Vendors appeared first on SecurityWeek. This article has been indexed from SecurityWeek…

Read more →

EN, securityweek

Cloud Security Startup Native Exits Stealth With $42 Million in Funding

2026-03-18 18:03

Phil Venables, former CISO of Google Cloud and now a venture partner at Ballistic Ventures, has joined Native’s board of directors. The post Cloud Security Startup Native Exits Stealth With $42 Million in Funding appeared first on SecurityWeek. This article…

Read more →

EN, www.infosecurity-magazine.com

New Ubuntu Flaw Enables Local Attackers to Gain Root Access

2026-03-18 18:03

CVE-2026-3888 Ubuntu snap flaw lets local users escalate to root via timing-based exploit This article has been indexed from www.infosecurity-magazine.com Read the original article: New Ubuntu Flaw Enables Local Attackers to Gain Root Access

Read more →

AWS Security Blog, EN

Amazon threat intelligence teams identify Interlock ransomware campaign targeting enterprise firewalls

2026-03-18 18:03

Amazon threat intelligence has identified an active Interlock ransomware campaign exploiting CVE-2026-20131, a critical vulnerability in Cisco Secure Firewall Management Center (FMC) Software that could allow an unauthenticated, remote attacker to execute arbitrary Java code as root on an affected…

Read more →

EN, eSecurity Planet

Top 7 Full Disk Encryption Software Solutions in 2026

2026-03-18 17:03

Protect your data with the best disk encryption solutions in 2026. The post Top 7 Full Disk Encryption Software Solutions in 2026 appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read the original article: Top…

Read more →

EN, eSecurity Planet

Protect Your Privacy: Best Secure Messaging Apps in 2026

2026-03-18 17:03

Looking for the safest way to chat in 2026? Explore the best secure messaging apps with end-to-end encryption and zero data tracking. The post Protect Your Privacy: Best Secure Messaging Apps in 2026 appeared first on eSecurity Planet. This article…

Read more →

EN, eSecurity Planet

8 Best Application Firewall (WAF) Solutions for 2026

2026-03-18 17:03

Find the best Web Application Firewall (WAF) solutions in 2026 to protect your apps. Compare top vendors, features, and deployment options. The post 8 Best Application Firewall (WAF) Solutions for 2026 appeared first on eSecurity Planet. This article has been…

Read more →

EN, eSecurity Planet

Free Antivirus Software Face-Off: Which One Protects Best?

2026-03-18 17:03

Find the best free antivirus software of 2026. Compare Bitdefender, Avira, Kaspersky & more for features, speed, and real-time defense. The post Free Antivirus Software Face-Off: Which One Protects Best? appeared first on eSecurity Planet. This article has been indexed…

Read more →

Cyber Security News, EN

LeakNet Scales Ransomware Operations With ClickFix Lures and Stealthy Deno Loader

2026-03-18 17:03

A ransomware group known as LeakNet has been quietly building a more dangerous attack strategy. Until recently, the group averaged about three victims per month — but new evidence shows it is scaling up fast, adding new tools that most…

Read more →

Cyber Security News, EN

ScreenConnect Vulnerability Allows Hackers to Extract Unique Machine Keys and Hijack Sessions

2026-03-18 17:03

ConnectWise has issued an urgent security advisory for its ScreenConnect remote desktop software, disclosing a critical cryptographic vulnerability that could allow unauthenticated attackers to extract server-level machine keys and hijack session authentication. The flaw, tracked as CVE-2026-3564, affects all ScreenConnect…

Read more →

Cyber Security News, EN

FancyBear Server Exposure Reveals Stolen Credentials, 2FA Secrets and NATO-Linked Targets

2026-03-18 17:03

A serious operational security failure by Russian state-linked hacking group FancyBear has given security researchers an unusually clear view into an active espionage campaign targeting government and military organizations across Europe. On March 11, 2026, threat intelligence firm Hunt.io published…

Read more →

Cyber Security News, EN

New Malware Campaigns Turn Network Devices Into DDoS Nodes and Crypto-Mining Bots

2026-03-18 17:03

Network security has taken another hard hit. Two previously unknown malware strains have emerged, quietly turning routers, IoT devices, and enterprise network equipment into weapons for large-scale distributed denial-of-service (DDoS) attacks and cryptocurrency mining operations. These campaigns mark a clear…

Read more →

EN, Security Boulevard

The New Insider Threat: Autonomous Systems With Excessive Permissions

2026-03-18 17:03

Explore how overprivileged AI agents are becoming the “new insider threat” in 2026. Learn about the rise of autonomous machine identities, the “superuser problem,” and real-world breaches like Amazon Q and EchoLeak that are forcing CISOs to rethink cybersecurity governance.…

Read more →

CySecurity News - Latest Information Security and Hacking Incidents, EN

AI Boom Turns Browsers into Enterprise Security’s Biggest Blind Spot

2026-03-18 17:03

  Telemetry data from the 2026 State of Browser Security Report reveals that, while the browser has become the de facto operating system for work in the enterprise, it remains one of the least secured segments in the overall security…

Read more →

CySecurity News - Latest Information Security and Hacking Incidents, EN

Cisco Warns of Actively Exploited SD-WAN Vulnerabilities Affecting Catalyst Network Systems

2026-03-18 17:03

  Cisco warns of several security holes in its Catalyst SD-WAN Manager, noting hackers have begun using at least one in live operations. Updates exist – applying them quickly reduces risk exposure. Exploitation is underway; delayed patching increases danger. Systems…

Read more →

Page 81 of 5173
« 1 … 79 80 81 82 83 … 5,173 »

Pages

  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Telegram Channel

Recent Posts

  • TeamPCP Supply Chain Campaign: Update 005 – First Confirmed Victim Disclosure, Post-Compromise Cloud Enumeration Documented, and Axios Attribution Narrows, (Wed, Apr 1st) April 1, 2026
  • Ransomware Groups Exploit Legit IT Tools to Bypass Antivirus April 1, 2026
  • Google Warns of New Chrome Zero-Day Under Active Exploitation – Users Urged to Update Immediately April 1, 2026
  • Ethereum-Based EtherRAT, EtherHiding Power Stealthy Malware Campaigns April 1, 2026
  • IT Security News Hourly Summary 2026-04-01 15h : 6 posts April 1, 2026
  • Microsoft Teams to Improve Privacy With EXIF Data Removal Feature April 1, 2026
  • AI Due Diligence Checklist 2026: How to Avoid AI Implementation Failures, Security Risks, and Cost Overruns April 1, 2026
  • Chinese Hackers Target European Governments in Espionage Campaigns April 1, 2026
  • Cisco Faces Alleged Data Leak as ShinyHunters Claims Responsibility April 1, 2026
  • CultureAI Launches on Microsoft Marketplace to Accelerate Secure AI Adoption April 1, 2026
  • 3 Reasons Attackers Are Using Your Trusted Tools Against You (And Why You Don’t See It Coming) April 1, 2026
  • Vim Modeline Vulnerability Opens Door to Arbitrary OS Command Execution April 1, 2026
  • Top 10 Best Dynamic Application Security Testing (DAST) Platforms in 2026 April 1, 2026
  • Google fixes Chrome zero-day with in-the-wild exploit (CVE-2026-5281) April 1, 2026
  • Malicious Script That Gets Rid of ADS, (Wed, Apr 1st) April 1, 2026
  • ImageMagick Zero-Day Enables RCE on Linux and WordPress Servers April 1, 2026
  • CrystalX Malware-as-a-Service Spreads via Telegram With Stealer, RAT Tools April 1, 2026
  • Hackers Exploit Hotel Booking Systems to Send Fake Payment Requests to Guests April 1, 2026
  • Google Says North Korea Was Behind the Axios npm Supply Chain Attack April 1, 2026
  • Cybersecurity Firm TAC Security Hits 10,000 Clients, Enters Top 5 in Global VM & AppSec April 1, 2026

Copyright © 2026 IT Security News. All Rights Reserved. The Magazine Basic Theme by bavotasan.com.

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}