IT Security News

Cybersecurity news and articles about information security, vulnerabilities, exploits, hacks, laws, spam, viruses, malware, breaches.

Main menu

Skip to content
  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Telegram Channel
EN, Help Net Security

AI cyber capability is speeding past earlier projections

2026-05-14 12:05

AI cyber capability is improving faster than expected, with newer models surpassing earlier projections, according to the UK government’s AI Security Institute (AISI). AISI measures AI cyber capability using “time horizon benchmarks”, which estimate how long AI systems can complete…

Read more →

EN, Silicon UK

BYD Adds Fast Charging To International EV Models

2026-05-14 11:05

Tech that can charge battery in 5 minutes comes to Europe, as BYD seeks to pose more direct challenge to petrol vehicles This article has been indexed from Silicon UK Read the original article: BYD Adds Fast Charging To International…

Read more →

EN, GBHackers Security | #1 Globally Trusted Cyber Security News Platform

Hackers Hijack HWMonitor to Sideload Malicious DLL

2026-05-14 11:05

Hackers are once again exploiting user trust in legitimate software, this time abusing the popular CPUID HWMonitor utility to deliver a stealthy remote access trojan. The malicious archive mimics a legitimate installer, highlighting how trusted tools remain a powerful lure…

Read more →

EN, GBHackers Security | #1 Globally Trusted Cyber Security News Platform

GitLab Security Flaw Allows Cross-Site Scripting and Unauthenticated DoS

2026-05-14 11:05

GitLab has issued an urgent security update to neutralise a massive wave of vulnerabilities. Threat actors could exploit these newly disclosed flaws to silently hijack developer sessions or completely paralyze continuous integration pipelines with unauthenticated attacks. GitLab Security Flaw On…

Read more →

EN, Security Affairs

FamousSparrow targets Azerbaijani energy sector in multi-wave espionage campaign

2026-05-14 11:05

Chinese-linked FamousSparrow repeatedly targeted an Azerbaijani oil and gas company, reusing the same entry point in three intrusions from Dec 2025 to Feb 2026. Chinese-linked threat actor FamousSparrow has conducted a sustained intrusion campaign against an Azerbaijani oil and gas…

Read more →

Cyber Security News, EN

Critical 18-Year-Old NGINX Vulnerability Enables Remote Code Execution Attacks

2026-05-14 11:05

A critical heap buffer overflow vulnerability has been discovered in the source code of NGINX, present since 2008. This vulnerability has been publicly disclosed, along with a working proof-of-concept exploit that can enable unauthenticated remote code execution (RCE) against one…

Read more →

Cyber Security News, EN

Windows DNS Client Vulnerability Enables Remote Code Execution Attacks

2026-05-14 11:05

A newly disclosed vulnerability in the Microsoft Windows DNS Client could let attackers silently execute malicious code across enterprise networks, exposing a massive attack surface. Officially designated as CVE-2026-41096, this critical security flaw carries a severe CVSS score of 9.8…

Read more →

Cyber Security News, EN

Seedworm APT Abuses Signed Fortemedia and SentinelOne Binaries for DLL Sideloading

2026-05-14 11:05

Iran-linked hackers have been quietly breaking into networks around the world, and their latest campaign is more calculated than anything we have seen from them before. The group known as Seedworm, also tracked as MuddyWater, spent the first quarter of…

Read more →

Cyber Security News, EN

Packagist Urges Immediate Composer Update After GitHub Actions Token Leak

2026-05-14 11:05

Packagist is sounding the alarm for PHP developers everywhere. A flaw in Composer, the widely used PHP dependency manager, briefly caused GitHub authentication tokens to leak into publicly visible CI logs, raising urgent concerns about credential exposure across thousands of…

Read more →

Cyber Security News, EN

Langflow CVE-2026-33017 Exploited to Steal AWS Keys and Deploy NATS Worker

2026-05-14 11:05

Attackers are now abusing a fresh Langflow vulnerability to quietly steal cloud keys and turn victim systems into workers for a new NATS based botnet. This campaign shows how a single exposed AI workflow tool can become the start of…

Read more →

EN, Malwarebytes

Deepfake sextortion forces schools to remove student photos from websites

2026-05-14 11:05

Experts are urging schools to take down identifiable photos of students, after AI deepfakes have led to sextortion cases at UK schools. This article has been indexed from Malwarebytes Read the original article: Deepfake sextortion forces schools to remove student…

Read more →

EN, www.infosecurity-magazine.com

Most Organizations Now Use AI Agents for Sensitive Security Tasks

2026-05-14 11:05

Semperis study finds 74% of organizations believe AI will increase attacks on identity infrastructure This article has been indexed from www.infosecurity-magazine.com Read the original article: Most Organizations Now Use AI Agents for Sensitive Security Tasks

Read more →

EN, Silicon UK

Mistral Pitches Security-Focused AI As Mythos Alternative

2026-05-14 11:05

French start-up reportedly in talks with European banks to use upcoming model to review security of their systems This article has been indexed from Silicon UK Read the original article: Mistral Pitches Security-Focused AI As Mythos Alternative

Read more →

EN, securityweek

High-Severity Vulnerability Patched in VMware Fusion

2026-05-14 11:05

The patch was announced as Broadcom is attending the Pwn2Own hacking competition in Berlin this week. The post High-Severity Vulnerability Patched in VMware Fusion appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article: High-Severity…

Read more →

EN, Silicon UK

UK AI Chip Start-Up Fractile Raises $220m

2026-05-14 10:05

Fractile completes Series B round valuing it at $1bn as it seeks to ease inference bottleneck for cutting-edge AI models This article has been indexed from Silicon UK Read the original article: UK AI Chip Start-Up Fractile Raises $220m

Read more →

EN, Silicon UK

Met Police Arrest 173 In Live Facial Recognition Trial

2026-05-14 10:05

Six-month live facial recognition trial results in an arrest every 35 minutes, including a woman wanted for more than 20 years This article has been indexed from Silicon UK Read the original article: Met Police Arrest 173 In Live Facial…

Read more →

EN, GBHackers Security | #1 Globally Trusted Cyber Security News Platform

PoC Released for 18-Year-Old NGINX Flaw Allowing Remote Code Execution

2026-05-14 10:05

A critical vulnerability in NGINX’s source code, hidden since 2008, has finally been exposed, and a working exploit is already in the wild. Security researchers at depthfirst have publicly released a proof-of-concept (PoC) exploit demonstrating unauthenticated remote code execution (RCE)…

Read more →

EN, GBHackers Security | #1 Globally Trusted Cyber Security News Platform

Langflow CVE-2026-33017 Exploited to Steal AWS Keys, Deploy NATS Worker

2026-05-14 10:05

Langflow instances left unpatched against CVE-2026-33017 are now being actively abused not just for remote code execution, but as launchpads to steal AWS keys and join a NATS-backed botnet-style worker pool dubbed “KeyHunter.” The vulnerability, now listed in CISA’s Known…

Read more →

EN, Help Net Security

CERN’s open source KiCad library gives the world 17,000 circuit board components

2026-05-14 10:05

CERN has released its complete KiCad component library under an open source license, making it available to hardware designers anywhere in the world. The library, maintained by CERN’s Design Office, contains more than 17,000 electronic components in the form of…

Read more →

EN, The Hacker News

New Fragnesia Linux Kernel LPE Grants Root Access via Page Cache Corruption

2026-05-14 10:05

Details have emerged about a new variant of the recent Dirty Frag Linux local privilege escalation (LPE) vulnerability that allows local attackers to gain root access, making it the third such bug to be identified in the kernel within a…

Read more →

EN, Silicon UK

Waymo Issues Recall After Car Drives Into Flooded Road

2026-05-14 09:05

Google sister company issues ‘voluntary’ software update after empty vehicle swept away in flooded road in San Antonio, Texas This article has been indexed from Silicon UK Read the original article: Waymo Issues Recall After Car Drives Into Flooded Road

Read more →

EN, GBHackers Security | #1 Globally Trusted Cyber Security News Platform

Packagist Warns: Update Composer Now After GitHub Actions Token Leak

2026-05-14 09:05

A sudden change in GitHub’s token format has triggered an unexpected security vulnerability in Composer, exposing sensitive authentication tokens in CI/CD logs and forcing Packagist to issue an urgent warning to PHP developers worldwide. The issue stems from a mismatch…

Read more →

EN, Security Affairs

Nitrogen Ransomware claims massive data theft from Foxconn

2026-05-14 09:05

Foxconn confirmed a cyberattack on some North American factories. The Nitrogen ransomware group claims it stole 8TB of data from the firm. Foxconn confirmed that several of its North American factories were affected by a cyberattack. The manufacturer confirmed it…

Read more →

Cyber Security News, EN

The Gentlemen RaaS Leverages Fortinet and Cisco Edge Devices for Initial Access

2026-05-14 09:05

A ransomware group that only surfaced in mid-2025 has already made a significant mark on the threat landscape. The Gentlemen, a ransomware-as-a-service (RaaS) operation, has quickly risen to become one of the most active ransomware programs in the world, with…

Read more →

Page 33 of 5434
« 1 … 31 32 33 34 35 … 5,434 »

Pages

  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Telegram Channel

Recent Posts

  • Madison Square Garden Bans Lawyer Representing New York Cop Injured at a Boxing Match May 20, 2026
  • Introducing RAMPART and Clarity: Open source tools to bring safety into Agent development workflow May 20, 2026
  • IT Security News Hourly Summary 2026-05-20 18h : 15 posts May 20, 2026
  • Fake malware-signing service Fox Tempest dismantled by Microsoft May 20, 2026
  • Microsoft Rolls Out Mitigations for ‘YellowKey’ BitLocker Bypass May 20, 2026
  • Quantum Bridge Raises $8 Million for Quantum-Safe Key Distribution Solution May 20, 2026
  • Pulitzer-Winning Journalists Expose the Human Cost and Hidden Network Behind Digital Arrest Scams May 20, 2026
  • Customers say Trump Mobile is leaking their personal information May 20, 2026
  • Microsoft issues YellowKey mitigation, no patch yet May 20, 2026
  • European Union Agrees to Ban AI Generated Non Consensual Sexualized Deepfakes May 20, 2026
  • PCPJack Worm Steals Cloud Credentials While Wiping Out TeamPCP Infections May 20, 2026
  • Token Pilfering: How Token Theft is Plaguing Cybersecurity May 20, 2026
  • Android Malware Campaign Used Hundreds of Fake Apps to Silently Charge Users May 20, 2026
  • Understanding Trend Structure: Higher Highs and Lower Lows Explained May 20, 2026
  • Critical ExifTool Vulnerability Allows Attackers to Compromise Macs via Single Malicious Image May 20, 2026
  • FreePBX Vulnerability Allow Attackers to Gain Access to User Portals May 20, 2026
  • Pardus Linux Local Privilege Escalation Flaw Allows Silent Root Access May 20, 2026
  • Grafana GitHub Breach Linked to TanStack npm Supply Chain Ransomware May 20, 2026
  • AI-Powered App Attacks Are Faster, More Frequent and Harder to Stop May 20, 2026
  • Webworm APT targets European government organizations with new backdoors May 20, 2026

Copyright © 2026 IT Security News. All Rights Reserved. The Magazine Basic Theme by bavotasan.com.

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}