IT Security News

Cybersecurity news and articles about information security, vulnerabilities, exploits, hacks, laws, spam, viruses, malware, breaches.

Main menu

Skip to content
  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Telegram Channel
EN, GBHackers Security | #1 Globally Trusted Cyber Security News Platform

Itron Discloses Data Breach After Hackers Access Internal Systems

2026-04-27 13:04

Itron, Inc., a leading smart metering and energy infrastructure technology company, has disclosed a cybersecurity incident after an unauthorized third party gained access to certain of its internal systems, according to a Form 8-K filing submitted to the U.S. Securities…

Read more →

EN, Security Affairs

Firefox bug CVE-2026-6770 enabled cross-site tracking and Tor fingerprinting

2026-04-27 13:04

CVE-2026-6770 let attackers fingerprint Firefox and Tor users, even in Private mode. Firefox 150 and Tor Browser 15.0.10 fixed it. A vulnerability, tracked as CVE-2026-6770, allowed attackers to fingerprint Firefox users, even in Private Browsing, and also impacted the Tor…

Read more →

EN, securityweek

UNC6692 Uses Email Bombing, Social Engineering to Deploy ‘Snow’ Malware

2026-04-27 13:04

The threat actor infected victims with the Snow malware family – Snowbelt, Snowglaze, and Snowbasin – for persistent access. The post UNC6692 Uses Email Bombing, Social Engineering to Deploy ‘Snow’ Malware appeared first on SecurityWeek. This article has been indexed…

Read more →

EN, Security Boulevard

AI Security Questionnaires: Why Most Startups Fail (And the Trust Stack That Fixes It)

2026-04-27 13:04

AI Security Questionnaires: Why Most Startups Fail (And the Trust Stack That Fixes It) It’s Monday. Your enterprise prospect just sent a 312-question security questionnaire. Forty of those questions are about AI — model bias, training data lineage, ISO 42001,…

Read more →

EN, Hackread – Cybersecurity News, Data Breaches, AI and More

Vidar Infostealer Spreads via Fake CAPTCHAs, Hides in JPEG and TXT Files

2026-04-27 12:04

New version of Vidar infostealer spreads via fake CAPTCHAs, hides in JPEG and TXT files, uses fileless attacks and steals browser, crypto wallet data. This article has been indexed from Hackread – Cybersecurity News, Data Breaches, AI and More Read…

Read more →

EN, securityweek

Easily Exploitable ‘Pack2TheRoot’ Linux Vulnerability Leads to Root Access

2026-04-27 12:04

A race condition in PackageKit allows unprivileged users to escalate privileges when installing packages. The post Easily Exploitable ‘Pack2TheRoot’ Linux Vulnerability Leads to Root Access appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article:…

Read more →

EN, The Register - Security

ICO chief John Edwards steps back as workplace probe quietly unfolds

2026-04-27 12:04

UK’s data watchdog confirms its boss has been off the job since February while an HR investigation runs The UK’s data watchdog is without its chief after John Edwards stepped aside from the Information Commissioner’s Office while an independent workplace…

Read more →

EN, securityweek

US Launches Sweeping Crackdown on Southeast Asia Cyberscams and Sanctions Cambodian Senator

2026-04-27 12:04

U.S. officials have announced a sweeping crackdown on Southeast Asian cyberscam operations as part of what U.S. Attorney Jeanine Pirro characterized Friday as a “new theater of war” launched by the Trump administration against Chinese transnational organized crime. The crackdown,…

Read more →

hourly summary

IT Security News Hourly Summary 2026-04-27 12h : 15 posts

2026-04-27 12:04

15 posts were published in the last hour 9:36 : OpenClaw Flaws Expose Systems to Policy Bypass Attacks 9:36 : North Korean Hackers Target Pharma Firms with Malware-Laced Excel Attacks 9:36 : ‘fast16’ Malware with Sabotage Capabilities Attacking Ultra expensive…

Read more →

EN, GBHackers Security | #1 Globally Trusted Cyber Security News Platform

OpenClaw Flaws Expose Systems to Policy Bypass Attacks

2026-04-27 11:04

OpenClaw, a rapidly adopted open-source autonomous AI agent framework, has released critical security updates to address three moderate-severity vulnerabilities. Found in npm package versions before 2026.4.20, these complex flaws expose systems to severe policy bypasses, unauthorized local configuration modifications, and…

Read more →

EN, GBHackers Security | #1 Globally Trusted Cyber Security News Platform

North Korean Hackers Target Pharma Firms with Malware-Laced Excel Attacks

2026-04-27 11:04

North Korean state-backed hackers are using weaponized Excel-themed files to infect pharmaceutical and life science companies with malware, abusing Windows shortcut files, PowerShell, and cloud storage for stealthy data theft. The campaign begins with highly tailored spear‑phishing emails sent to…

Read more →

Cyber Security News, EN

‘fast16’ Malware with Sabotage Capabilities Attacking Ultra expensive Targets

2026-04-27 11:04

The fast16 malware is a recently exposed sabotage‑capable threat designed to target extremely high‑value environments and ultra‑expensive systems with precision. It does not behave like common commodity malware that aims for broad infections, but instead focuses on select victims where…

Read more →

Cyber Security News, EN

Top 10 Best NDR (Network Detection and Response) Solutions in 2026

2026-04-27 11:04

In the modern enterprise, the network is the ultimate source of ground truth. As organizations accelerate their digital transformation and adopt complex, cloud-native security architectures, the traditional perimeter has dissolved. Threat actors routinely bypass endpoint defenses using compromised credentials, living-off-the-land…

Read more →

Cyber Security News, EN

Attackers Can Backdoor CODESYS Applications by Chaining Vulnerabilities

2026-04-27 11:04

Multiple vulnerabilities in the CODESYS Control runtime, one of the world’s most widely adopted software-based programmable logic controller (Soft PLC) platforms. According to Nozomi Networks Labs researchers, by chaining these security flaws, an authenticated attacker can replace a legitimate industrial…

Read more →

Cyber Security News, EN

Vidar Malware Hides Second-Stage Payloads in JPEG and TXT Files to Evade Detection

2026-04-27 11:04

Vidar, one of the most active information-stealing malware families, has taken on a new shape in 2026. Researchers have found that its latest version now conceals second-stage payloads inside JPEG image files and TXT documents, making it much harder for…

Read more →

EN, Help Net Security

TLS Connect gives SMBs a right-sized automated tool to manage TLS certificates

2026-04-27 11:04

GMO GlobalSign today launched TLS Connect, a Certificate Lifecycle Management (CLM) tool designed specifically for SMBs. TLS Connect automates public trust TLS certificate deployment and renewal, allowing SMBs to strengthen security, maintain regulatory compliance and reduce business risk. The introduction…

Read more →

EN, www.infosecurity-magazine.com

Researchers Identify Fast16 Sabotage Malware That Pre-Dates Stuxnet

2026-04-27 11:04

The “fast16” malware may have been used to target Iran’s nuclear program prior to Stuxnet This article has been indexed from www.infosecurity-magazine.com Read the original article: Researchers Identify Fast16 Sabotage Malware That Pre-Dates Stuxnet

Read more →

Cybersecurity Dive - Latest News, EN

When security becomes the attack surface: Why endpoint protection must evolve

2026-04-27 11:04

When attackers target security tools, protection must be resilient, self-healing and always on. This article has been indexed from Cybersecurity Dive – Latest News Read the original article: When security becomes the attack surface: Why endpoint protection must evolve

Read more →

EN, GBHackers Security | #1 Globally Trusted Cyber Security News Platform

Critical Gemini CLI Flaw Raises Supply Chain Security Concerns

2026-04-27 11:04

Google has rolled out urgent security updates for its Gemini CLI and the accompanying GitHub Action to address a critical vulnerability. Tracked as GHSA-wpqr-6v78-jr5g, this flaw exposes continuous integration and continuous deployment (CI/CD) pipelines to Remote Code Execution (RCE) attacks.…

Read more →

EN, Security Affairs

Italy moves to extradite Chinese national to the U.S. over hacking charges

2026-04-27 11:04

Italy plans to extradite Xu Zewei to the U.S. over alleged hacks on COVID-19 research tied to state-backed operations. Italy is moving to extradite Xu Zewei, the Chinese national arrested in 2025 at the request of U.S. authorities on cyber-espionage…

Read more →

EN, Security Affairs

Fast16: Pre-Stuxnet malware that targeted precision engineering software

2026-04-27 11:04

Fast16 is a pre-Stuxnet malware that tampered with precision software and spread itself. Evidence suggests links to U.S. operations during early cyber tensions. SentinelOne uncovered Fast16, a sabotage malware used in 2005, years before Stuxnet. The malicious code is written…

Read more →

EN, Have I Been Pwned latest breaches

ADT – 5,488,888 breached accounts

2026-04-27 11:04

In April 2026, home security firm ADT confirmed a data breach by ShinyHunters, which listed the company on its website as part of a “pay or leak” extortion attempt. The breach impacted 5.5M unique email addresses along with names, phone…

Read more →

EN, securityweek

Firefox Vulnerability Allows Tor User Fingerprinting

2026-04-27 11:04

The vulnerability is tracked as CVE-2026-6770 and it has been patched with the release of Firefox 150 and Tor 15.0.10. The post Firefox Vulnerability Allows Tor User Fingerprinting appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…

Read more →

EN, Security Boulevard

FBI, Indonesian Authorities Team to Take Down Site Ripping Off Users for Millions

2026-04-27 11:04

Phishing still hooks users around the world and coaxes them to hand over credentials. But on occasion the good guys take them down, like the FBI in collaboration with Indonesian law enforcement did with W3LLStore marketplace.  The post FBI, Indonesian…

Read more →

Page 33 of 5343
« 1 … 31 32 33 34 35 … 5,343 »

Pages

  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Telegram Channel

Recent Posts

  • CISA Adds Actively Exploited Linux Root Access Bug CVE-2026-31431 to KEV May 3, 2026
  • Disneyland Deploys Facial Recognition at Select Entrance Lanes to Prevent Pass Fraud May 3, 2026
  • IT Security News Hourly Summary 2026-05-03 00h : 1 posts May 3, 2026
  • IT Security News Daily Summary 2026-05-02 May 2, 2026
  • Ransomware Campaign Leverages QEMU to Slip Past Enterprise Defences May 2, 2026
  • IT Security News Hourly Summary 2026-05-02 21h : 1 posts May 2, 2026
  • Google AppSheet Exploited in 30,000-User Facebook Phishing Operation May 2, 2026
  • Hackers Breach Government and Military Servers by Exploiting cPanel Vulnerability May 2, 2026
  • Trellix Source Code Breach – Hackers Gain Unauthorized Access to Repository May 2, 2026
  • Two US cybersecurity experts sentenced in ransomware case, third awaits July ruling May 2, 2026
  • I Mapped Every Major Startup Credit Program for 2026. Most Founders Are Leaving $500K+ on the Table May 2, 2026
  • Lazarus Hackers Steal $290M from KelpDAO in Cross-Chain Exploit May 2, 2026
  • Terms And Conditions Grow Harder To Read As Platforms Limit Users’ Legal Rights Study Finds May 2, 2026
  • IT Security News Hourly Summary 2026-05-02 18h : 1 posts May 2, 2026
  • [un]prompted 2026 – Source to Sink: Improving LLM Vuln Discovery May 2, 2026
  • GoldPickaxe May 2, 2026
  • Trellix discloses the breach of a code repository May 2, 2026
  • IT Security News Hourly Summary 2026-05-02 15h : 2 posts May 2, 2026
  • 2 US Cybersecurity Experts Jailed for Aiding ALPHV (BlackCat) Ransomware May 2, 2026
  • Multiple Exim Mail Server Vulnerabilities Leads to Crash with Malicious DNS data May 2, 2026

Copyright © 2026 IT Security News. All Rights Reserved. The Magazine Basic Theme by bavotasan.com.

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}