IT Security News

Cybersecurity news and articles about information security, vulnerabilities, exploits, hacks, laws, spam, viruses, malware, breaches.

Main menu

Skip to content
  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Telegram Channel
hourly summary

IT Security News Hourly Summary 2026-05-12 12h : 11 posts

2026-05-12 12:05

11 posts were published in the last hour 10:3 : State-sponsored actors, better known as the friends you don’t want 10:3 : North Korea Hackers Abuse Git Hooks to Deploy Cross-Platform Malware 10:3 : 1 in 8 employees have sold…

Read more →

Cisco Talos Blog, EN

State-sponsored actors, better known as the friends you don’t want

2026-05-12 12:05

Responding to a state-sponsored threat is nothing like responding to ransomware, and the differences can make or break the outcome. Learn why your IR plan might need revisiting, and the factors you should consider. This article has been indexed from Cisco Talos Blog…

Read more →

EN, GBHackers Security | #1 Globally Trusted Cyber Security News Platform

North Korea Hackers Abuse Git Hooks to Deploy Cross-Platform Malware

2026-05-12 12:05

North Korean threat actors have introduced a stealthy new delivery mechanism in their ongoing “Contagious Interview” campaign, shifting tactics to abuse Git hooks for malware execution. The attack begins with a familiar social engineering lure. Victims, often developers targeted through…

Read more →

EN, Malwarebytes

1 in 8 employees have sold company logins or know someone who has

2026-05-12 12:05

Cifas just published research that should bother anyone who runs a business, or buys from one. This article has been indexed from Malwarebytes Read the original article: 1 in 8 employees have sold company logins or know someone who has

Read more →

EN, www.theregister.com - Articles

Apple, Google drag cross-platform texting into the encrypted age

2026-05-12 12:05

After years of stopping dead at the green bubble border, iPhone and Android users can finally send E2EE messages without relying on third-party apps This article has been indexed from www.theregister.com – Articles Read the original article: Apple, Google drag…

Read more →

EN, GBHackers Security | #1 Globally Trusted Cyber Security News Platform

Cline AI Agent Flaw Allows Attackers to Launch RCE Attacks

2026-05-12 11:05

A critical security vulnerability in the Cline AI coding assistant’s kanban package exposes developers to remote code execution, data theft, and denial-of-service attacks by simply visiting a malicious website. Security researcher Sagilayani disclosed CVE-2026-44211 on GitHub four days ago, revealing…

Read more →

EN, Have I Been Pwned latest breaches

Cushman & Wakefield – 310,431 breached accounts

2026-05-12 11:05

In May 2026, the real estate services firm Cushman & Wakefield was the target of a “pay or leak” extortion campaign by the ShinyHunters group. Following the threat, the group publicly published data they alleged had been obtained from the…

Read more →

Cyber Security News, EN

TeamPCP Compromised Checkmarx Jenkins AST Plugin Following KICS Supply Chain Attack

2026-05-12 11:05

A supply chain attack that started with a relatively obscure open-source scanner has now reached one of the most widely used application security tools in the industry. In May 2026, a malicious version of the Checkmarx Jenkins AST plugin was…

Read more →

Cyber Security News, EN

Magecart Hackers Abuse Google Tag Manager to Inject Credit Card Skimmers

2026-05-12 11:05

Online shoppers have long been targets of digital theft, but a recent wave of attacks has raised the stakes in a troubling new way. Hackers tied to the notorious Magecart group are now hiding credit card skimmers inside Google Tag…

Read more →

Cyber Security News, EN

Critical PHP SOAP Extension Vulnerabilities Enables Remote Code Execution Attacks

2026-05-12 11:05

A serious cluster of vulnerabilities has been uncovered in PHP’s core string processing and ext-soap components, putting numerous web servers at immediate risk of total takeover. While the SOAP extension has a notorious history of memory corruption flaws, this latest…

Read more →

EN, Malwarebytes

Stolen Canvas data was “returned” after hacker agreement, Instructure says

2026-05-12 11:05

Instructure says the stolen Canvas data impacting millions of students and staff was “returned.” That’s not how breaches work. This article has been indexed from Malwarebytes Read the original article: Stolen Canvas data was “returned” after hacker agreement, Instructure says

Read more →

EN, www.infosecurity-magazine.com

Malicious Hugging Face Repository Typosquats OpenAI

2026-05-12 11:05

HiddenLayer reveals infostealer malware in a Hugging Face repository This article has been indexed from www.infosecurity-magazine.com Read the original article: Malicious Hugging Face Repository Typosquats OpenAI

Read more →

EN, Silicon UK

Santa Clara County Sues Meta Over Scam Ads

2026-05-12 11:05

California county in heart of Silicon Valley sues Facebook parent, claiming it knowingly profits from ads tied to fraud schemes This article has been indexed from Silicon UK Read the original article: Santa Clara County Sues Meta Over Scam Ads

Read more →

EN, GBHackers Security | #1 Globally Trusted Cyber Security News Platform

Claude Chrome Extension Flaw Lets Malicious Add-Ons Steal Gmail and Drive Data

2026-05-12 11:05

A critical vulnerability dubbed “ClaudeBleed” has compromised Anthropic’s trusted AI assistant, potentially turning it into a backdoor. This severe design flaw in the Claude Chrome extension allows malicious add-ons to hijack the AI secretly. Even extensions with zero declared permissions…

Read more →

EN, GBHackers Security | #1 Globally Trusted Cyber Security News Platform

Fake TronLink Chrome Extension Steals Crypto Wallet Credentials

2026-05-12 11:05

A newly uncovered phishing campaign is targeting TRON wallet users through a deceptive Chrome extension that mimics the popular TronLink wallet. The campaign highlights how modern browser extension abuse is evolving beyond static code inspection, making detection significantly harder. At…

Read more →

EN, Help Net Security

OpenAI’s Daybreak uses Codex Security to identify risky attack paths

2026-05-12 11:05

OpenAI Daybreak is the company’s cybersecurity initiative focused on building AI-assisted software defense into the development process from the start. It combines OpenAI models, Codex Security, and cyber-focused GPT-5.5 variants to help organizations identify, validate, and prioritize software vulnerabilities. How…

Read more →

EN, The Hacker News

Mini Shai-Hulud Worm Compromises TanStack, Mistral AI, Guardrails AI & More Packages

2026-05-12 11:05

TeamPCP, the threat actor behind the recent supply chain attack spree, has been linked to the compromise of the npm and PyPI packages from TanStack, UiPath, Mistral AI, OpenSearch, and Guardrails AI as part of a fresh Mini Shai-Hulud campaign. The…

Read more →

Cybersecurity Headlines, EN

A.I. software flaw hackers, Forza Horizon 6 leak, Linux kernel hit again

2026-05-12 11:05

A.I. hackers find software flaw Xbox leaks ‘Forza Horizon 6’ Linux kernel hit by 2nd flaw Get the show notes here: Huge thanks to our episode sponsor, Doppel Social engineering attacks look trustworthy — a routine request, an internal email,…

Read more →

EN, Silicon UK

Meta Removes Full Encryption From Instagram

2026-05-12 10:05

End-to-end encryption offering removed for Instagram direct messages, amid criticism over child safety This article has been indexed from Silicon UK Read the original article: Meta Removes Full Encryption From Instagram

Read more →

EN, GBHackers Security | #1 Globally Trusted Cyber Security News Platform

Microsoft Warns: MistralAI PyPI Package Compromised with Malware

2026-05-12 10:05

Mistral’s official Python client on PyPI has been pulled into the ongoing wave of AI supply‑chain attacks, with Microsoft warning that version 2.4.6 of the mistralai package was backdoored to silently deploy a credential‑stealing payload on Linux systems. The logic is designed…

Read more →

EN, www.infosecurity-magazine.com

South Staffordshire Water Fined £1m After Data Breach

2026-05-12 10:05

The ICO has fined South Staffordshire Water nearly £1m for a series of data protection failings This article has been indexed from www.infosecurity-magazine.com Read the original article: South Staffordshire Water Fined £1m After Data Breach

Read more →

EN, Silicon UK

TikTok Scales Back AI Summaries After Bizarre Results

2026-05-12 10:05

TikTok to limit AI summaries of videos after tool creates fanciful descriptions seemingly unrelated to material in question This article has been indexed from Silicon UK Read the original article: TikTok Scales Back AI Summaries After Bizarre Results

Read more →

Cyber Security News, EN

OpenAI Daybreak Automates Detects and Fix Vulnerabilities Automatically

2026-05-12 10:05

OpenAI has introduced Daybreak, a strategic initiative to change how modern software is built and defended against emerging threats. Moving away from traditional reactive patching, Daybreak focuses on making software resilient by design from the very beginning of the development…

Read more →

Cyber Security News, EN

TrickMo Android Banking Malware Targets Banking, Wallet, and Authenticator Apps

2026-05-12 10:05

A dangerous Android banking malware known as TrickMo has resurfaced with a powerful new variant, and this time it is more stealthy, more capable, and harder to stop than ever before. The threat is actively targeting users of banking apps,…

Read more →

Page 1 of 5388
1 2 3 … 5,388 »

Pages

  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Telegram Channel

Recent Posts

  • IT Security News Hourly Summary 2026-05-12 12h : 11 posts May 12, 2026
  • State-sponsored actors, better known as the friends you don’t want May 12, 2026
  • North Korea Hackers Abuse Git Hooks to Deploy Cross-Platform Malware May 12, 2026
  • 1 in 8 employees have sold company logins or know someone who has May 12, 2026
  • Apple, Google drag cross-platform texting into the encrypted age May 12, 2026
  • Cline AI Agent Flaw Allows Attackers to Launch RCE Attacks May 12, 2026
  • Cushman & Wakefield – 310,431 breached accounts May 12, 2026
  • TeamPCP Compromised Checkmarx Jenkins AST Plugin Following KICS Supply Chain Attack May 12, 2026
  • Magecart Hackers Abuse Google Tag Manager to Inject Credit Card Skimmers May 12, 2026
  • Critical PHP SOAP Extension Vulnerabilities Enables Remote Code Execution Attacks May 12, 2026
  • Stolen Canvas data was “returned” after hacker agreement, Instructure says May 12, 2026
  • Malicious Hugging Face Repository Typosquats OpenAI May 12, 2026
  • Santa Clara County Sues Meta Over Scam Ads May 12, 2026
  • Claude Chrome Extension Flaw Lets Malicious Add-Ons Steal Gmail and Drive Data May 12, 2026
  • Fake TronLink Chrome Extension Steals Crypto Wallet Credentials May 12, 2026
  • OpenAI’s Daybreak uses Codex Security to identify risky attack paths May 12, 2026
  • Mini Shai-Hulud Worm Compromises TanStack, Mistral AI, Guardrails AI & More Packages May 12, 2026
  • A.I. software flaw hackers, Forza Horizon 6 leak, Linux kernel hit again May 12, 2026
  • Meta Removes Full Encryption From Instagram May 12, 2026
  • Microsoft Warns: MistralAI PyPI Package Compromised with Malware May 12, 2026

Copyright © 2026 IT Security News. All Rights Reserved. The Magazine Basic Theme by bavotasan.com.

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}