IT Security News

Cybersecurity news and articles about information security, vulnerabilities, exploits, hacks, laws, spam, viruses, malware, breaches.

Main menu

Skip to content
  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Telegram Channel
hourly summary

IT Security News Hourly Summary 2024-12-08 00h : 1 posts

2024-12-08 00:12

1 posts were published in the last hour 22:55 : IT Security News Daily Summary 2024-12-07

Read more →

daily summary

IT Security News Daily Summary 2024-12-07

2024-12-07 23:12

59 posts were published in the last hour 21:5 : IT Security News Hourly Summary 2024-12-07 22h : 1 posts 20:34 : 8Base ransomware group hacked Croatia’s Port of Rijeka 18:5 : IT Security News Hourly Summary 2024-12-07 19h :…

Read more →

hourly summary

IT Security News Hourly Summary 2024-12-07 22h : 1 posts

2024-12-07 22:12

1 posts were published in the last hour 20:34 : 8Base ransomware group hacked Croatia’s Port of Rijeka

Read more →

EN, Security Affairs

8Base ransomware group hacked Croatia’s Port of Rijeka

2024-12-07 21:12

The 8Base ransomware group attacked Croatia’s Port of Rijeka, stealing sensitive data, including contracts and accounting info. A cyber attack hit the Port of Rijeka in Croatia, the 8Base ransomware group claimed responsibility for the security breach. The Port of…

Read more →

hourly summary

IT Security News Hourly Summary 2024-12-07 19h : 1 posts

2024-12-07 19:12

1 posts were published in the last hour 17:5 : IT Security News Hourly Summary 2024-12-07 18h : 1 posts

Read more →

hourly summary

IT Security News Hourly Summary 2024-12-07 18h : 1 posts

2024-12-07 18:12

1 posts were published in the last hour 16:36 : Romania’s Election System Hit by Over 85,000 Cyberattacks, Russian Links Suspected

Read more →

CySecurity News - Latest Information Security and Hacking Incidents, EN

Romania’s Election System Hit by Over 85,000 Cyberattacks, Russian Links Suspected

2024-12-07 17:12

Romania’s intelligence service in its declassified report disclosed the country’s election systems were hit by over 85,000 cyberattacks. Attackers have also stolen login credentials for election-related sites and posted the information on a Russian hacker forum just before the first…

Read more →

hourly summary

IT Security News Hourly Summary 2024-12-07 17h : 5 posts

2024-12-07 17:12

5 posts were published in the last hour 16:2 : 84 Arrested as Russian Ransomware Laundering Networks Disrupted 16:2 : Are You Using AI in Marketing? Here’s How to Do It Responsibly 15:33 : Llama 3.3: Meta präsentiert KI-Modell mit…

Read more →

EN, Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News

84 Arrested as Russian Ransomware Laundering Networks Disrupted

2024-12-07 17:12

Operation Destabilise was a major international operation led by the UK’s National Crime Agency (NCA) to dismantle two Russian-speaking criminal networks: Smart and TGR. These networks were backbone in laundering billions of dollars for various criminal activities. This article has…

Read more →

CySecurity News - Latest Information Security and Hacking Incidents, EN

Are You Using AI in Marketing? Here’s How to Do It Responsibly

2024-12-07 17:12

  Artificial Intelligence (AI) has emerged as a transformative force, reshaping industries and delivering unprecedented value to businesses worldwide. From automating mundane tasks to offering predictive insights, AI has catalyzed innovation on a massive scale. However, its rapid adoption raises…

Read more →

DE, t3n.de - Software & Entwicklung

Llama 3.3: Meta präsentiert KI-Modell mit Spitzenleistung zu niedrigeren Kosten

2024-12-07 16:12

Meta hat Llama 3.3 70B vorgestellt. Das neue KI-Sprachmodell soll die gleiche Leistung wie das bisherige Spitzenmodell bieten und Konkurrenten wie OpenAIs GPT-4o übertreffen – allerdings zu deutlich niedrigeren Kosten. Dieser Artikel wurde indexiert von t3n.de – Software & Entwicklung…

Read more →

DE, t3n.de - Software & Entwicklung

Gemini Chatbot bekommt lustiges Feature aus Googles Suchmaschine

2024-12-07 16:12

Googles Chatbot Gemini könnte nach einem Update eine neue Schaltfläche bekommen. Was in etwa passiert, wenn man auf „Auf gut Glück!“ klickt, könnten User:innen der Google-Suche erahnen. Dieser Artikel wurde indexiert von t3n.de – Software & Entwicklung Lesen Sie den…

Read more →

DE, t3n.de - Software & Entwicklung

11 geniale Apps, die deinen Mac besser machen – und dich keinen Cent kosten

2024-12-07 16:12

Apples Desktop-Betriebssystem hat viele praktische Funktionen. Hier und da fehlt aber doch ein sinnvolles Feature. Mit den richtigen Apps könnt ihr die jedoch nachrüsten – und das kostet keinen Cent. Dieser Artikel wurde indexiert von t3n.de – Software & Entwicklung…

Read more →

hourly summary

IT Security News Hourly Summary 2024-12-07 16h : 4 posts

2024-12-07 16:12

4 posts were published in the last hour 15:4 : Iran Spies on Senior Israeli Officials, Launches Over 200 Cyberattacks 14:34 : Generative AI Fuels Financial Fraud 14:34 : ENISA’s Biennial Cybersecurity Report Highlights EU Threats and Policy Needs 14:34…

Read more →

CySecurity News - Latest Information Security and Hacking Incidents, EN

Iran Spies on Senior Israeli Officials, Launches Over 200 Cyberattacks

2024-12-07 16:12

Shin Bet, an Israeli Cybersecurity Service said recently it discovered over 200 Iranian phishing attempts targeting top Israeli diplomats to get personal information. Shin Bet believes the attacks were launched by Iranian actors through Telegram, WhatsApp, and email.  The threat…

Read more →

CySecurity News - Latest Information Security and Hacking Incidents, EN

Generative AI Fuels Financial Fraud

2024-12-07 15:12

  < p style=”text-align: justify;”>According to the FBI, criminals are increasingly using generative artificial intelligence (AI) to make their fraudulent schemes more convincing. This technology enables fraudsters to produce large amounts of realistic content with minimal time and effort, increasing…

Read more →

CySecurity News - Latest Information Security and Hacking Incidents, EN

ENISA’s Biennial Cybersecurity Report Highlights EU Threats and Policy Needs

2024-12-07 15:12

  < p style=”text-align: justify;”>The EU Agency for Cybersecurity (ENISA) has released its inaugural biennial report under the NIS 2 Directive, offering an analysis of cybersecurity maturity and capabilities across the EU. Developed in collaboration with all 27 EU Member…

Read more →

CySecurity News - Latest Information Security and Hacking Incidents, EN

Turn Your Phone Off Daily for Five Minutes to Prevent Hacking

2024-12-07 15:12

  < p style=”text-align: justify;”>There are numerous ways in which critical data on your phone can be compromised. These range from subscription-based apps that covertly transmit private user data to social media platforms like Facebook, to fraudulent accounts that trick…

Read more →

hourly summary

IT Security News Hourly Summary 2024-12-07 15h : 6 posts

2024-12-07 15:12

6 posts were published in the last hour 14:2 : Cybersecurity Leader SonicWall Shares 2025 Outlook 14:2 : New DroidBot Android Spyware Targeting Banking and Crypto Users 13:35 : Deutsche Bahn: Sparpreistickets künftig auch ohne E-Mail oder Handy nutzbar 13:7…

Read more →

Cybersecurity Insiders, EN

Cybersecurity Leader SonicWall Shares 2025 Outlook

2024-12-07 15:12

Cybersecurity leader SonicWall has just released their 2025 outlook, including the threats, challenges and trends that will shape the sector in the year ahead. Below, SonicWall’s leading team of threat researchers share their forecast including the key vulnerabilities and threats…

Read more →

EN, Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News

New DroidBot Android Spyware Targeting Banking and Crypto Users

2024-12-07 15:12

DroidBot, a sophisticated Android RAT, is targeting individuals and financial institutions across Europe. This article has been indexed from Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News Read the original article: New DroidBot Android Spyware Targeting Banking and Crypto…

Read more →

DE, Golem.de - Security

Deutsche Bahn: Sparpreistickets künftig auch ohne E-Mail oder Handy nutzbar

2024-12-07 14:12

Künftig können Bahnkunden Sparpreistickets kaufen, ohne Handynummer oder E-Mail-Adresse anzugeben – nach Kritik eines Datenschützers. (Deutsche Bahn, Datenschutz) Dieser Artikel wurde indexiert von Golem.de – Security Lesen Sie den originalen Artikel: Deutsche Bahn: Sparpreistickets künftig auch ohne E-Mail oder Handy…

Read more →

DE, Golem.de - Security

Wenn der Rubel nicht rollt: Cyberangriff auf eine der größten Banken Russlands

2024-12-07 14:12

Bei der russischen Gazprombank hat es weitreichende Ausfälle gegeben. Der ukrainische Militärgeheimdienst GUR bekennt sich schuldig. (Cyberwar, DoS) Dieser Artikel wurde indexiert von Golem.de – Security Lesen Sie den originalen Artikel: Wenn der Rubel nicht rollt: Cyberangriff auf eine der…

Read more →

Cybersecurity Insiders, EN

Safeguarding resilience in the age of outages: Essential actions for CIOs

2024-12-07 14:12

With technology now supporting almost every facet of business operations, the durability of IT systems and networks is increasingly crucial. Recent events like the CrowdStrike service disruption demonstrate that even top-tier organisations can be susceptible to having their systems impacted…

Read more →

Page 2874 of 5285
« 1 … 2,872 2,873 2,874 2,875 2,876 … 5,285 »

Pages

  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Telegram Channel

Recent Posts

  • Humanoid Robot Chases Boar In Warsaw April 22, 2026
  • Namastex npm Packages Spread TeamPCP-Style CanisterWorm Malware April 22, 2026
  • Vercel confirms April 2026 security incident linked to third-party AI tool April 22, 2026
  • Shadow AI, deepfakes, and supply chain compromise are rewriting the financial sector threat playbook April 22, 2026
  • Apple Intelligence flaw kept stolen tokens reusable on another device April 22, 2026
  • PentAGI: Open-source autonomous AI penetration testing system April 22, 2026
  • Microsoft-Signed Binary Used to Sneak LOTUSLITE Into India-Focused Espionage Campaign April 22, 2026
  • SAML vs OIDC vs OAuth: The 60-Second B2B Playbook April 22, 2026
  • SAML vs OIDC vs OAuth 2.0: 12 Differences Every B2B Engineering Team Should Know April 22, 2026
  • CISA lacks Mythos, Lovable’s leak by design, YouTube’s deepfake detection April 22, 2026
  • Was Booking.com hacked? April 22, 2026
  • Met Police Defeat Challenge To Live Facial Recognition April 22, 2026
  • Amazon, Anthropic Expand Alliance With 5GW Compute Push to Power Claude April 22, 2026
  • 1,370+ Microsoft SharePoint Servers at Risk of Spoofing Attacks Found Exposed Online April 22, 2026
  • IT Security News Hourly Summary 2026-04-22 09h : 3 posts April 22, 2026
  • Hackers Tie Iranian Espionage to CastleRAT and ChainShell April 22, 2026
  • French Authorities Confirm Data Breach Amid Hackers’ Data Leak Allegations April 22, 2026
  • Microsoft Emergency .NET 10.0.7 Update to Patch Elevation of Privilege Vulnerability April 22, 2026
  • Microsoft Issues Emergency .NET 10.0.7 Update to Patch Elevation of Privilege Vulnerability April 22, 2026
  • Microsoft-Signed Binary Helps Deliver LOTUSLITE in India Spy Campaign April 22, 2026

Copyright © 2026 IT Security News. All Rights Reserved. The Magazine Basic Theme by bavotasan.com.

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}