IT Security News

Cybersecurity news and articles about information security, vulnerabilities, exploits, hacks, laws, spam, viruses, malware, breaches.

Main menu

Skip to content
  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Telegram Channel
EN, The Hacker News

OFAC Sanctions DPRK IT Worker Network Funding WMD Programs Through Fake Remote Jobs

2026-03-18 19:03

The U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) has sanctioned six individuals and two entities for their involvement in the Democratic People’s Republic of Korea (DPRK) information technology (IT) worker scheme with an aim to defraud…

Read more →

EN, Microsoft Security Blog

Observability for AI Systems: Strengthening visibility for proactive risk detection

2026-03-18 19:03

As AI systems grow more autonomous, observability becomes essential. Learn how visibility into AI behavior helps detect risk and strengthen secure development. The post Observability for AI Systems: Strengthening visibility for proactive risk detection appeared first on Microsoft Security Blog.…

Read more →

hourly summary

IT Security News Hourly Summary 2026-03-18 18h : 14 posts

2026-03-18 19:03

14 posts were published in the last hour 16:33 : Apple Rolls Out Real-Time Security Fixes Across iPhone, iPad, and Mac 16:33 : Apple WebKit Vulnerability Enables Malicious Web Content Bypass on iOS and macOS 16:33 : UIDAI Launches Bug…

Read more →

EN, Security Archives - TechRepublic

Apple Rolls Out Real-Time Security Fixes Across iPhone, iPad, and Mac

2026-03-18 18:03

Apple launches Background Security Improvements to fix vulnerabilities in real time, starting with a WebKit flaw affecting Safari on iPhone, iPad, and Mac. The post Apple Rolls Out Real-Time Security Fixes Across iPhone, iPad, and Mac appeared first on TechRepublic.…

Read more →

Cyber Security News, EN

Apple WebKit Vulnerability Enables Malicious Web Content Bypass on iOS and macOS

2026-03-18 18:03

Apple has released critical security patches to address a high-severity WebKit vulnerability that allows maliciously crafted web content to bypass the Same Origin Policy. Released on March 17, 2026, these updates apply to the latest versions of Apple’s mobile and…

Read more →

Cyber Security News, EN

UIDAI Launches Bug Bounty Programme to Strengthen Aadhaar Security

2026-03-18 18:03

The Unique Identification Authority of India (UIDAI) has officially launched its first structured Bug Bounty Programme. This initiative aims to enhance the security posture of the Aadhaar ecosystem, which serves as the foundational digital identity platform for over a billion…

Read more →

Cyber Security News, EN

OpenAI Launches GPT-5.4 Mini and Nano to Provide Answers 2X Faster

2026-03-18 18:03

OpenAI has officially launched GPT-5.4 mini and GPT-5.4 nano, releasing its most capable small models designed to handle high-volume, latency-sensitive workloads. The new mini iteration offers a significant performance upgrade over the previous GPT-5 mini across reasoning, coding, tool use,…

Read more →

EN, Security Boulevard

Everyone Is Deploying AI Agents. Almost Nobody Knows What They’re Doing.

2026-03-18 18:03

One constant I hear from CISOs I speak with is that AI agents are not coming. They are already inside organizations, reasoning through goals, selecting tools, and taking action through the same APIs that connect your most sensitive systems. And…

Read more →

EN, The Hacker News

Interlock Ransomware Exploits Cisco FMC Zero-Day CVE-2026-20131 for Root Access

2026-03-18 18:03

Amazon Threat Intelligence is warning of an active Interlock ransomware campaign that’s exploiting a recently disclosed critical security flaw in Cisco Secure Firewall Management Center (FMC) Software. The vulnerability in question is CVE-2026-20131 (CVSS score: 10.0), a case of insecure…

Read more →

Cybersecurity Dive - Latest News, EN

Threat groups target cyber-physical systems to disrupt critical infrastructure providers

2026-03-18 18:03

The Iran war has raised concerns that key industrial sectors could be the target of hacktivists, state actors and other groups. This article has been indexed from Cybersecurity Dive – Latest News Read the original article: Threat groups target cyber-physical…

Read more →

EN, Malware-Traffic-Analysis.net - Blog Entries

2026-03-12: Files for an ISC diary (SmartApeSG ClickFix pushes Remcos RAT)

2026-03-18 18:03

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Malware-Traffic-Analysis.net – Blog Entries Read the original article: 2026-03-12: Files for an ISC diary (SmartApeSG ClickFix pushes…

Read more →

EN, Search Security Resources and Information from TechTarget

Cloud storage security best practices

2026-03-18 18:03

<p>As organizations expand their use of public cloud storage services, enterprise IT teams are increasingly required to coordinate security, governance and data protection controls across multiple cloud platforms, regions and service tiers. Without intentional coordination, each cloud storage service may…

Read more →

EN, Security Affairs

Researchers warn of unpatched, critical Telnetd flaw affecting all versions

2026-03-18 18:03

CVE-2026-32746 is a critical flaw in GNU InetUtils telnetd that allows remote attackers to execute code with elevated privileges Cybersecurity company Dream disclosed a critical flaw, tracked as CVE-2026-32746 (CVSS score of 9.8), in GNU InetUtils telnetd that lets unauthenticated…

Read more →

EN, securityweek

‘DarkSword’ iOS Exploit Kit Used by State-Sponsored Hackers, Spyware Vendors

2026-03-18 18:03

Targeting six iOS vulnerabilities and leading to full device compromise, the exploit chain is meant for surveillance. The post ‘DarkSword’ iOS Exploit Kit Used by State-Sponsored Hackers, Spyware Vendors appeared first on SecurityWeek. This article has been indexed from SecurityWeek…

Read more →

EN, securityweek

Cloud Security Startup Native Exits Stealth With $42 Million in Funding

2026-03-18 18:03

Phil Venables, former CISO of Google Cloud and now a venture partner at Ballistic Ventures, has joined Native’s board of directors. The post Cloud Security Startup Native Exits Stealth With $42 Million in Funding appeared first on SecurityWeek. This article…

Read more →

EN, www.infosecurity-magazine.com

New Ubuntu Flaw Enables Local Attackers to Gain Root Access

2026-03-18 18:03

CVE-2026-3888 Ubuntu snap flaw lets local users escalate to root via timing-based exploit This article has been indexed from www.infosecurity-magazine.com Read the original article: New Ubuntu Flaw Enables Local Attackers to Gain Root Access

Read more →

AWS Security Blog, EN

Amazon threat intelligence teams identify Interlock ransomware campaign targeting enterprise firewalls

2026-03-18 18:03

Amazon threat intelligence has identified an active Interlock ransomware campaign exploiting CVE-2026-20131, a critical vulnerability in Cisco Secure Firewall Management Center (FMC) Software that could allow an unauthenticated, remote attacker to execute arbitrary Java code as root on an affected…

Read more →

EN, eSecurity Planet

Top 7 Full Disk Encryption Software Solutions in 2026

2026-03-18 17:03

Protect your data with the best disk encryption solutions in 2026. The post Top 7 Full Disk Encryption Software Solutions in 2026 appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read the original article: Top…

Read more →

EN, eSecurity Planet

Protect Your Privacy: Best Secure Messaging Apps in 2026

2026-03-18 17:03

Looking for the safest way to chat in 2026? Explore the best secure messaging apps with end-to-end encryption and zero data tracking. The post Protect Your Privacy: Best Secure Messaging Apps in 2026 appeared first on eSecurity Planet. This article…

Read more →

EN, eSecurity Planet

8 Best Application Firewall (WAF) Solutions for 2026

2026-03-18 17:03

Find the best Web Application Firewall (WAF) solutions in 2026 to protect your apps. Compare top vendors, features, and deployment options. The post 8 Best Application Firewall (WAF) Solutions for 2026 appeared first on eSecurity Planet. This article has been…

Read more →

EN, eSecurity Planet

Free Antivirus Software Face-Off: Which One Protects Best?

2026-03-18 17:03

Find the best free antivirus software of 2026. Compare Bitdefender, Avira, Kaspersky & more for features, speed, and real-time defense. The post Free Antivirus Software Face-Off: Which One Protects Best? appeared first on eSecurity Planet. This article has been indexed…

Read more →

Cyber Security News, EN

LeakNet Scales Ransomware Operations With ClickFix Lures and Stealthy Deno Loader

2026-03-18 17:03

A ransomware group known as LeakNet has been quietly building a more dangerous attack strategy. Until recently, the group averaged about three victims per month — but new evidence shows it is scaling up fast, adding new tools that most…

Read more →

Cyber Security News, EN

ScreenConnect Vulnerability Allows Hackers to Extract Unique Machine Keys and Hijack Sessions

2026-03-18 17:03

ConnectWise has issued an urgent security advisory for its ScreenConnect remote desktop software, disclosing a critical cryptographic vulnerability that could allow unauthenticated attackers to extract server-level machine keys and hijack session authentication. The flaw, tracked as CVE-2026-3564, affects all ScreenConnect…

Read more →

Cyber Security News, EN

FancyBear Server Exposure Reveals Stolen Credentials, 2FA Secrets and NATO-Linked Targets

2026-03-18 17:03

A serious operational security failure by Russian state-linked hacking group FancyBear has given security researchers an unusually clear view into an active espionage campaign targeting government and military organizations across Europe. On March 11, 2026, threat intelligence firm Hunt.io published…

Read more →

Page 82 of 5174
« 1 … 80 81 82 83 84 … 5,174 »

Pages

  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Telegram Channel

Recent Posts

  • Google Warns Quantum Computers Could Crack Crypto Sooner Than Expected April 1, 2026
  • HSBC India Asks Customers to use All-Uppercase Passwords April 1, 2026
  • New Chrome Zero-Day Vulnerability Actively Exploited in Attacks — Patch Now April 1, 2026
  • Russian Hackers Using Remote Access Toolkit “CTRL” for  RDP Hijacking April 1, 2026
  • Hackers Actively Exploiting Critical WebLogic RCE Vulnerabilities in Attacks April 1, 2026
  • Google Cloud’s Vertex AI platform Vulnerability Allow Attackers to Access Sensitive Data April 1, 2026
  • ‘People’s Panel’ to check if UK wants controversial Digital ID will cost £630K April 1, 2026
  • North Korean hackers linked to Axios npm supply chain compromise April 1, 2026
  • New Venom Stealer MaaS Platform Automates Continuous Data Theft April 1, 2026
  • Cyber Briefing: 2026.04.01 April 1, 2026
  • A 200-year-old light trick just transformed quantum encryption April 1, 2026
  • FBI Warns of Data Security Risks From China-Made Mobile Apps April 1, 2026
  • Gmail Finally Lets You Change Your Email Address Without Losing Anything April 1, 2026
  • Why we’re still not doing April Fools’ Day April 1, 2026
  • Webinar Today: Agentic AI vs. Identity’s Last Mile Problem April 1, 2026
  • US Charges Uranium Crypto Exchange Hacker April 1, 2026
  • Your Next Employee Might Not Exist: LexisNexis Report Exposes the Synthetic Identity Explosion April 1, 2026
  • CIS Benchmarks March 2026 Update April 1, 2026
  • Exabeam expands ABA to detect AI agent threats across ChatGPT, Copilot, and Gemini April 1, 2026
  • New Chrome Zero-Day CVE-2026-5281 Under Active Exploitation — Patch Released April 1, 2026

Copyright © 2026 IT Security News. All Rights Reserved. The Magazine Basic Theme by bavotasan.com.

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}