IT Security News

Cybersecurity news and articles about information security, vulnerabilities, exploits, hacks, laws, spam, viruses, malware, breaches.

Main menu

Skip to content
  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Telegram Channel
hourly summary

IT Security News Hourly Summary 2026-05-14 12h : 17 posts

2026-05-14 12:05

17 posts were published in the last hour 10:3 : US Judge Challenges SEC, Musk Over Twitter Settlement 10:3 : Lyrie.ai Unveils Open Standard for Agent Security and Joins Anthropic’s Cyber Verification Program 10:2 : Amazon Quick Security Flaw Allowed…

Read more →

EN, Silicon UK

US Judge Challenges SEC, Musk Over Twitter Settlement

2026-05-14 12:05

Federal judge says settlement presents string of ‘red flags’, asking them to explain why it appears crafted to avoid personally penalising Musk This article has been indexed from Silicon UK Read the original article: US Judge Challenges SEC, Musk Over…

Read more →

EN, GBHackers Security | #1 Globally Trusted Cyber Security News Platform

Lyrie.ai Unveils Open Standard for Agent Security and Joins Anthropic’s Cyber Verification Program

2026-05-14 12:05

DUBAI, UAE — May 14, 2026 — As autonomous AI agents begin to handle everything from corporate bank transfers to sensitive code deployments, the digital world is facing a new “Wild West” scenario: millions of autonomous entities operating without a…

Read more →

EN, GBHackers Security | #1 Globally Trusted Cyber Security News Platform

Amazon Quick Security Flaw Allowed Restricted Users to Access AI Chat Agents

2026-05-14 12:05

A newly disclosed security flaw in Amazon’s AI-powered business intelligence platform has revealed how restricted users could quietly bypass controls and interact with AI chat agents, despite explicit administrative denial. The issue, discovered by Fog Security researcher Jason Kao, exposes…

Read more →

EN, Security Latest

Your iPhone Gets Stolen. Then the Hacking Begins

2026-05-14 12:05

A bustling underground ecosystem is providing criminals with the tools to unlock iPhones—and wage phishing attacks against their contacts to access bank accounts and more. This article has been indexed from Security Latest Read the original article: Your iPhone Gets…

Read more →

EN, securityweek

Hackers Targeted PraisonAI Vulnerability Hours After Disclosure

2026-05-14 12:05

The first exploitation attempts were observed less than four hours after the authentication bypass was publicly disclosed. The post Hackers Targeted PraisonAI Vulnerability Hours After Disclosure appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original…

Read more →

EN, Help Net Security

AI cyber capability is speeding past earlier projections

2026-05-14 12:05

AI cyber capability is improving faster than expected, with newer models surpassing earlier projections, according to the UK government’s AI Security Institute (AISI). AISI measures AI cyber capability using “time horizon benchmarks”, which estimate how long AI systems can complete…

Read more →

EN, Silicon UK

BYD Adds Fast Charging To International EV Models

2026-05-14 11:05

Tech that can charge battery in 5 minutes comes to Europe, as BYD seeks to pose more direct challenge to petrol vehicles This article has been indexed from Silicon UK Read the original article: BYD Adds Fast Charging To International…

Read more →

EN, GBHackers Security | #1 Globally Trusted Cyber Security News Platform

Hackers Hijack HWMonitor to Sideload Malicious DLL

2026-05-14 11:05

Hackers are once again exploiting user trust in legitimate software, this time abusing the popular CPUID HWMonitor utility to deliver a stealthy remote access trojan. The malicious archive mimics a legitimate installer, highlighting how trusted tools remain a powerful lure…

Read more →

EN, GBHackers Security | #1 Globally Trusted Cyber Security News Platform

GitLab Security Flaw Allows Cross-Site Scripting and Unauthenticated DoS

2026-05-14 11:05

GitLab has issued an urgent security update to neutralise a massive wave of vulnerabilities. Threat actors could exploit these newly disclosed flaws to silently hijack developer sessions or completely paralyze continuous integration pipelines with unauthenticated attacks. GitLab Security Flaw On…

Read more →

EN, Security Affairs

FamousSparrow targets Azerbaijani energy sector in multi-wave espionage campaign

2026-05-14 11:05

Chinese-linked FamousSparrow repeatedly targeted an Azerbaijani oil and gas company, reusing the same entry point in three intrusions from Dec 2025 to Feb 2026. Chinese-linked threat actor FamousSparrow has conducted a sustained intrusion campaign against an Azerbaijani oil and gas…

Read more →

Cyber Security News, EN

Critical 18-Year-Old NGINX Vulnerability Enables Remote Code Execution Attacks

2026-05-14 11:05

A critical heap buffer overflow vulnerability has been discovered in the source code of NGINX, present since 2008. This vulnerability has been publicly disclosed, along with a working proof-of-concept exploit that can enable unauthenticated remote code execution (RCE) against one…

Read more →

Cyber Security News, EN

Windows DNS Client Vulnerability Enables Remote Code Execution Attacks

2026-05-14 11:05

A newly disclosed vulnerability in the Microsoft Windows DNS Client could let attackers silently execute malicious code across enterprise networks, exposing a massive attack surface. Officially designated as CVE-2026-41096, this critical security flaw carries a severe CVSS score of 9.8…

Read more →

Cyber Security News, EN

Seedworm APT Abuses Signed Fortemedia and SentinelOne Binaries for DLL Sideloading

2026-05-14 11:05

Iran-linked hackers have been quietly breaking into networks around the world, and their latest campaign is more calculated than anything we have seen from them before. The group known as Seedworm, also tracked as MuddyWater, spent the first quarter of…

Read more →

Cyber Security News, EN

Packagist Urges Immediate Composer Update After GitHub Actions Token Leak

2026-05-14 11:05

Packagist is sounding the alarm for PHP developers everywhere. A flaw in Composer, the widely used PHP dependency manager, briefly caused GitHub authentication tokens to leak into publicly visible CI logs, raising urgent concerns about credential exposure across thousands of…

Read more →

Cyber Security News, EN

Langflow CVE-2026-33017 Exploited to Steal AWS Keys and Deploy NATS Worker

2026-05-14 11:05

Attackers are now abusing a fresh Langflow vulnerability to quietly steal cloud keys and turn victim systems into workers for a new NATS based botnet. This campaign shows how a single exposed AI workflow tool can become the start of…

Read more →

EN, Malwarebytes

Deepfake sextortion forces schools to remove student photos from websites

2026-05-14 11:05

Experts are urging schools to take down identifiable photos of students, after AI deepfakes have led to sextortion cases at UK schools. This article has been indexed from Malwarebytes Read the original article: Deepfake sextortion forces schools to remove student…

Read more →

EN, www.infosecurity-magazine.com

Most Organizations Now Use AI Agents for Sensitive Security Tasks

2026-05-14 11:05

Semperis study finds 74% of organizations believe AI will increase attacks on identity infrastructure This article has been indexed from www.infosecurity-magazine.com Read the original article: Most Organizations Now Use AI Agents for Sensitive Security Tasks

Read more →

EN, Silicon UK

Mistral Pitches Security-Focused AI As Mythos Alternative

2026-05-14 11:05

French start-up reportedly in talks with European banks to use upcoming model to review security of their systems This article has been indexed from Silicon UK Read the original article: Mistral Pitches Security-Focused AI As Mythos Alternative

Read more →

EN, securityweek

High-Severity Vulnerability Patched in VMware Fusion

2026-05-14 11:05

The patch was announced as Broadcom is attending the Pwn2Own hacking competition in Berlin this week. The post High-Severity Vulnerability Patched in VMware Fusion appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article: High-Severity…

Read more →

EN, Silicon UK

UK AI Chip Start-Up Fractile Raises $220m

2026-05-14 10:05

Fractile completes Series B round valuing it at $1bn as it seeks to ease inference bottleneck for cutting-edge AI models This article has been indexed from Silicon UK Read the original article: UK AI Chip Start-Up Fractile Raises $220m

Read more →

EN, Silicon UK

Met Police Arrest 173 In Live Facial Recognition Trial

2026-05-14 10:05

Six-month live facial recognition trial results in an arrest every 35 minutes, including a woman wanted for more than 20 years This article has been indexed from Silicon UK Read the original article: Met Police Arrest 173 In Live Facial…

Read more →

EN, GBHackers Security | #1 Globally Trusted Cyber Security News Platform

PoC Released for 18-Year-Old NGINX Flaw Allowing Remote Code Execution

2026-05-14 10:05

A critical vulnerability in NGINX’s source code, hidden since 2008, has finally been exposed, and a working exploit is already in the wild. Security researchers at depthfirst have publicly released a proof-of-concept (PoC) exploit demonstrating unauthenticated remote code execution (RCE)…

Read more →

EN, GBHackers Security | #1 Globally Trusted Cyber Security News Platform

Langflow CVE-2026-33017 Exploited to Steal AWS Keys, Deploy NATS Worker

2026-05-14 10:05

Langflow instances left unpatched against CVE-2026-33017 are now being actively abused not just for remote code execution, but as launchpads to steal AWS keys and join a NATS-backed botnet-style worker pool dubbed “KeyHunter.” The vulnerability, now listed in CISA’s Known…

Read more →

Page 1 of 5402
1 2 3 … 5,402 »

Pages

  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Telegram Channel

Recent Posts

  • IT Security News Hourly Summary 2026-05-14 12h : 17 posts May 14, 2026
  • US Judge Challenges SEC, Musk Over Twitter Settlement May 14, 2026
  • Lyrie.ai Unveils Open Standard for Agent Security and Joins Anthropic’s Cyber Verification Program May 14, 2026
  • Amazon Quick Security Flaw Allowed Restricted Users to Access AI Chat Agents May 14, 2026
  • Your iPhone Gets Stolen. Then the Hacking Begins May 14, 2026
  • Hackers Targeted PraisonAI Vulnerability Hours After Disclosure May 14, 2026
  • AI cyber capability is speeding past earlier projections May 14, 2026
  • BYD Adds Fast Charging To International EV Models May 14, 2026
  • Hackers Hijack HWMonitor to Sideload Malicious DLL May 14, 2026
  • GitLab Security Flaw Allows Cross-Site Scripting and Unauthenticated DoS May 14, 2026
  • FamousSparrow targets Azerbaijani energy sector in multi-wave espionage campaign May 14, 2026
  • Critical 18-Year-Old NGINX Vulnerability Enables Remote Code Execution Attacks May 14, 2026
  • Windows DNS Client Vulnerability Enables Remote Code Execution Attacks May 14, 2026
  • Seedworm APT Abuses Signed Fortemedia and SentinelOne Binaries for DLL Sideloading May 14, 2026
  • Packagist Urges Immediate Composer Update After GitHub Actions Token Leak May 14, 2026
  • Langflow CVE-2026-33017 Exploited to Steal AWS Keys and Deploy NATS Worker May 14, 2026
  • Deepfake sextortion forces schools to remove student photos from websites May 14, 2026
  • Most Organizations Now Use AI Agents for Sensitive Security Tasks May 14, 2026
  • Mistral Pitches Security-Focused AI As Mythos Alternative May 14, 2026
  • High-Severity Vulnerability Patched in VMware Fusion May 14, 2026

Copyright © 2026 IT Security News. All Rights Reserved. The Magazine Basic Theme by bavotasan.com.

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}