IT Security News

Cybersecurity news and articles about information security, vulnerabilities, exploits, hacks, laws, spam, viruses, malware, breaches.

Main menu

Skip to content
  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Apps
    • Telegram Channel
EN, Help Net Security

Poland repels data-wiping malware attack on energy systems

2026-01-26 15:01

Suspected Russian cyber attackers tried to take down parts of Poland’s energy infrastructure with new data-wiping malware – and failed. According to information shared by the Polish government earlier this month, the attacks happened on 29 and 30 December 2025,…

Read more →

EN, The Hacker News

⚡ Weekly Recap: Firewall Flaws, AI-Built Malware, Browser Traps, Critical CVEs & More

2026-01-26 15:01

Security failures rarely arrive loudly. They slip in through trusted tools, half-fixed problems, and habits people stop questioning. This week’s recap shows that pattern clearly. Attackers are moving faster than defenses, mixing old tricks with new paths. “Patched” no longer…

Read more →

EN, www.infosecurity-magazine.com

Okta Flags Customised, Reactive Vishing Attacks Which Bypass MFA

2026-01-26 15:01

Threat actors posing as IT support teams use phishing kits to generate fake login sites in real-time to trick victims into handing over credentials This article has been indexed from www.infosecurity-magazine.com Read the original article: Okta Flags Customised, Reactive Vishing…

Read more →

EN, www.infosecurity-magazine.com

Law Firm Investigates Coupang Security Failures Ahead of Class Action Deadline

2026-01-26 15:01

The US law firm Hagens Berman will lead a class action lawsuit against Coupang over security failures that led to a June 2025 data breach This article has been indexed from www.infosecurity-magazine.com Read the original article: Law Firm Investigates Coupang…

Read more →

EN, Hackread – Cybersecurity News, Data Breaches, AI, and More

New Fake CAPTCHA Scam Abuses Microsoft Tools to Install Amatera Stealer

2026-01-26 14:01

Another day, another fake CAPTCHA scam, but this one abuses Microsoft’s signed tools. This article has been indexed from Hackread – Cybersecurity News, Data Breaches, AI, and More Read the original article: New Fake CAPTCHA Scam Abuses Microsoft Tools to…

Read more →

EN, Security Affairs

North Korea–linked KONNI uses AI to build stealthy malware tooling

2026-01-26 14:01

Check Point links an active phishing campaign to North Korea–aligned KONNI, targeting developers with fake blockchain project docs and using an AI-written PowerShell backdoor. Check Point Research uncovered an active phishing campaign attributed to the North Korea–linked KONNI group (aka Kimsuky,…

Read more →

Cyber Security News, EN

‘SyncFuture’ Campaign Weaponizing Legitimate Enterprise Security Software to Deploy Malware

2026-01-26 14:01

In December 2025, threat researchers uncovered an alarming espionage operation targeting residents of India through sophisticated phishing campaigns. The attack, dubbed SyncFuture, demonstrates how cybercriminals can abuse legitimate business software as a vehicle for launching advanced malware attacks. Attackers sent…

Read more →

Cyber Security News, EN

New DPRK Interview Campaign Leverages Fake Fonts to Deploy Malware

2026-01-26 14:01

North Korea’s Lazarus Group has launched a sophisticated supply chain attack targeting software developers through a campaign called “Fake Font.” The threat actors are using fake job interviews and malicious GitHub repositories to trick engineers into downloading code that contains…

Read more →

Cyber Security News, EN

MITRE Releases New Cybersecurity Framework to Protect the Embedded Systems

2026-01-26 14:01

A new Embedded Systems Threat Matrix™ (ESTM) framework was introduced to help secure embedded systems used in critical infrastructure and defense technologies across the U.S. Developed collaboratively with the Air Force’s Cyber Resiliency Office for Weapon Systems (CROWS). ESTM addresses…

Read more →

EN, The Register - Security

Moscow likely behind wiper attack on Poland’s power grid, experts say

2026-01-26 14:01

Cyber sleuths believe Sandworm up to its old tricks with a brand-new sabotage toy Russia was probably behind the failed attempts to compromise the systems of Poland’s power companies in December, cybersecurity researchers claim.… This article has been indexed from…

Read more →

EN, securityweek

TikTok Finalizes a Deal to Form a New American Entity

2026-01-26 14:01

TikTok has finalized a deal to create a new American entity, avoiding the looming threat of a ban in the United States. The post TikTok Finalizes a Deal to Form a New American Entity appeared first on SecurityWeek. This article…

Read more →

EN, securityweek

‘Stanley’ Malware Toolkit Enables Phishing via Website Spoofing

2026-01-26 14:01

Priced $2,000 – $6,000 on a cybercrime forum, the MaaS toolkit promises publication on the Chrome Web Store. The post ‘Stanley’ Malware Toolkit Enables Phishing via Website Spoofing appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…

Read more →

EN, securityweek

Cyber Insights 2026: Threat Hunting in an Age of Automation and AI

2026-01-26 14:01

Understanding how threat hunting differs from reactive security provides a deeper understanding of the role, while hinting at how it will evolve in the future. The post Cyber Insights 2026: Threat Hunting in an Age of Automation and AI appeared…

Read more →

EN, Help Net Security

Quantum computing firm IonQ acquires US semiconductor firm SkyWater for $1.8 billion

2026-01-26 14:01

IonQ and SkyWater Technology have entered into a definitive agreement pursuant to which IonQ will acquire SkyWater for $35.00 per share in a cash-and-stock transaction, subject to a collar, implying a total equity value of approximately $1.8 billion. “This transformational…

Read more →

EN, The Hacker News

Winning Against AI-Based Attacks Requires a Combined Defensive Approach

2026-01-26 14:01

If there’s a constant in cybersecurity, it’s that adversaries are always innovating. The rise of offensive AI is transforming attack strategies and making them harder to detect. Google’s Threat Intelligence Group, recently reported on adversaries using Large Language Models (LLMs)…

Read more →

EN, Hackread – Cybersecurity News, Data Breaches, AI, and More

$6,000 “Stanley” Toolkit Sold on Russian Forums Fakes Secure URLs in Chrome

2026-01-26 13:01

Say hello to Stanley, a new malicious toolkit that guarantees bypassing Google’s Chrome Web Store review process. This article has been indexed from Hackread – Cybersecurity News, Data Breaches, AI, and More Read the original article: $6,000 “Stanley” Toolkit Sold…

Read more →

EN, The Register - Security

Oracle AI sailed the world on Royal Navy flagship via cloud-at-the-edge kit

2026-01-26 13:01

Big Red says ‘sovereign’ platform supports decision-making and operational learning at sea Britain’s Royal Navy is using Oracle Cloud edge infrastructure to operate AI-driven defenses on the aircraft carrier HMS Prince of Wales.… This article has been indexed from The…

Read more →

EN, www.infosecurity-magazine.com

Wiper Attack on Polish Power Grid Linked to Russia’s Sandworm

2026-01-26 13:01

A destructive cyber attack targeting Poland’s energy sector has been linked to Russian APT group Sandworm This article has been indexed from www.infosecurity-magazine.com Read the original article: Wiper Attack on Polish Power Grid Linked to Russia’s Sandworm

Read more →

Cybersecurity Dive - Latest News, EN

Top 3 factors for selecting an identity access management tool

2026-01-26 13:01

Identity and access management (IAM) ensures that people and entities with digital identities have the right level of access to your enterprise resources. This article has been indexed from Cybersecurity Dive – Latest News Read the original article: Top 3…

Read more →

EN, Security Archives - TechRepublic

Gmail Spam Filter Breakdown Affects 1.8B Users

2026-01-26 12:01

The disruption began Saturday (5am Pacific time, Jan .24) affecting approximately 1.8 billion Gmail users worldwide with widespread email misclassification. The post Gmail Spam Filter Breakdown Affects 1.8B Users appeared first on TechRepublic. This article has been indexed from Security…

Read more →

Cyber Security News, EN

Sandworm APT Group Targeting Poland’s Power Grid with DynoWiper Malware

2026-01-26 12:01

Late December 2025 brought alarming news to Poland as its energy infrastructure became the target of what security experts describe as the country’s largest cyberattack in years. The Russian-aligned Sandworm group, known for orchestrating some of the most damaging attacks…

Read more →

Cyber Security News, EN

New Instagram Vulnerability Exposes Private Posts to Anyone

2026-01-26 12:01

A critical server-side vulnerability in Instagram’s infrastructure allowed unauthenticated attackers to access private photos and captions without a login or follower relationship, according to a disclosure released this week by security researcher Jatin Banga. The vulnerability, which was reportedly patched…

Read more →

Cyber Security News, EN

New Phishing Attack Leverages Vercel Hosting Platform to Deliver a Remote Access Tool

2026-01-26 12:01

A sophisticated phishing campaign active between November 2025 and January 2026 has been exploiting Vercel’s legitimate hosting platform to distribute remote access tools to unsuspecting victims. The attack chain combines social engineering with trusted domain exploitation, making it particularly effective…

Read more →

Cyber Security News, EN

Microsoft Releases Out-of-Band Update KB5078127 to Fix Windows 11 File System and Outlook Freezes

2026-01-26 12:01

An out-of-band (OOB) cumulative update, KB5078127, to address critical file system compatibility issues affecting Windows 11 users. The update resolves widespread problems introduced by the January 13, 2026, security update (KB5074109) that caused application freezes and cloud storage failures across…

Read more →

Page 33 of 4837
« 1 … 31 32 33 34 35 … 4,837 »

Pages

  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Apps
    • Telegram Channel

Recent Posts

  • US Seizes $400 Million Linked to Helix Dark Web Crypto Mixer January 31, 2026
  • Iran-Linked RedKitten Cyber Campaign Targets Human Rights NGOs and Activists January 31, 2026
  • Jeffrey Epstein Had a ‘Personal Hacker,’ Informant Claims January 31, 2026
  • BadIIS Malware Used in Coordinated Attacks on Asian Web Servers January 31, 2026
  • Cyberattacks Disrupt Communications at Wind, Solar, and Heat Facilities in Poland January 31, 2026
  • How to Film ICE January 31, 2026
  • IT Security News Hourly Summary 2026-01-31 12h : 1 posts January 31, 2026
  • AutoPentestX – Automated Penetration Testing Toolkit Designed for Linux systems January 31, 2026
  • Panera Bread – 5,112,502 breached accounts January 31, 2026
  • Metasploit Releases 7 New Exploit Modules covering FreePBX, Cacti and SmarterMail January 31, 2026
  • SCADA Vulnerability Triggers DoS, Potentially Disrupting Industrial Operations January 31, 2026
  • Mandiant Finds ShinyHunters-Style Vishing Attacks Stealing MFA to Breach SaaS Platforms January 31, 2026
  • IT Security News Hourly Summary 2026-01-31 09h : 2 posts January 31, 2026
  • CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms January 31, 2026
  • Quantifying cyber risk at Netflix, Highmark Health: Case studies January 31, 2026
  • 2026-01-31: Traffic analysis exercise: Lumma in the room-ah! January 31, 2026
  • In-Depth Look at Phishing and Cybersecurity Culture with David Shipley | Cybersecurity Today January 31, 2026
  • 2026-01-30: PhantomStealer infection January 31, 2026
  • We Keep Hearing the Same Question: Morpheus (AI SOC) vs. Traditional SOAR January 31, 2026
  • IT Security News Hourly Summary 2026-01-31 03h : 3 posts January 31, 2026

Copyright © 2026 IT Security News. All Rights Reserved. The Magazine Basic Theme by bavotasan.com.

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}