IT Security News

Cybersecurity news and articles about information security, vulnerabilities, exploits, hacks, laws, spam, viruses, malware, breaches.

Main menu

Skip to content
  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Telegram Channel
EN, Security Affairs

France’s ANTS ID System website hit by cyberattack, possible data breach

2026-04-20 23:04

A cyberattack hit France’s ANTS website, possibly exposing personal data from users applying for IDs, passports, and driver’s licenses. A cyberattack targeted France’s ANTS platform, which handles applications for passports, ID cards, residence permits, and driver’s licenses. Authorities detected the…

Read more →

Cyber Security News, EN

Hackers Use AppDomain Hijacking to Turn Trusted Intel Utility Into Malware Launcher

2026-04-20 23:04

Security researchers have uncovered a highly sophisticated attack campaign that weaponizes a legitimate, digitally signed Intel utility to secretly deploy malware, all without touching a single line of the original program’s code. The campaign, dubbed Operation PhantomCLR, represents a serious evolution…

Read more →

Cyber Security News, EN

Gh0st RAT and CloverPlus Adware Delivered Together in New Dual-Payload Malware Campaign

2026-04-20 23:04

A newly identified malware campaign is raising serious concerns across the cybersecurity community by delivering two very different threats at the same time. Attackers are now using a single, obfuscated loader to push both Gh0st Remote Access Trojan (RAT) and…

Read more →

EN, Security Archives - TechRepublic

Amtrak Data Breach Exposes 2.1M Records, Reports Suggest Larger Leak

2026-04-20 22:04

Amtrak data breach exposes over 2.1 million customer records after CRM access. Learn what was leaked, risks, and steps users and IT teams should take now. The post Amtrak Data Breach Exposes 2.1M Records, Reports Suggest Larger Leak appeared first…

Read more →

EN, Security Archives - TechRepublic

This VPN Lets You Verify Your Business Privacy For $130

2026-04-20 22:04

VP.NET makes VPN privacy verifiable, not just policy-based, with secure enclave tech for up to five devices. The post This VPN Lets You Verify Your Business Privacy For $130 appeared first on TechRepublic. This article has been indexed from Security…

Read more →

EN, Security Boulevard

[un]prompted 2026 – Rob T. Lee, Glenn Thorpe, Dan Hubbard & Sergej Epp – Vibe Coded (Micro-Talks)

2026-04-20 22:04

Author, Creator & Presenter: Rob T. Lee, Glenn Thorpe, Dan Hubbard & Sergej Epp Our thanks to [un]prompted for publishing their Creators, Authors and Presenter’s outstanding [un]prompted 2026 AI Security Practitioner content on the Organizations’ YouTube Channel. Permalink The post…

Read more →

Cyber Security News, EN

North Korea-Linked UNC1069 Uses Fake Zoom and Teams Meetings to Hack Crypto Professionals

2026-04-20 22:04

A North Korean threat group known as UNC1069 has been running a sophisticated campaign that tricks cryptocurrency and Web3 professionals into joining fake online meetings, only to infect their computers with malware designed to steal digital assets. The group pretends…

Read more →

EN, The Register - Security

Claude Desktop changes app access settings for browsers you don’t even have installed yet

2026-04-20 22:04

Installation and pre-approval without consent looks dubious under EU law One app should not modify another app without asking for and receiving your explicit consent. Yet Anthropic’s Claude Desktop for macOS installs files that affect other vendors’ applications without disclosure,…

Read more →

DZone Security Zone, EN

Cybersecurity with a Digital Twin: Why Real-Time Data Streaming Matters

2026-04-20 21:04

Cyberattacks on critical infrastructure and manufacturing systems are growing in scale and sophistication. Industrial control systems, connected devices, and cloud services expand the attack surface far beyond traditional IT networks. Ransomware can stop production lines, and manipulated sensor data can…

Read more →

EN, Security Archives - TechRepublic

The MCP Disclosure Is the AI Era’s ‘Open Redirect’ Moment

2026-04-20 21:04

The MCP flaw reveals a systemic AI security gap, exposing enterprise systems to supply chain attacks and forcing a shift toward data-layer governance. The post The MCP Disclosure Is the AI Era’s ‘Open Redirect’ Moment appeared first on TechRepublic. This…

Read more →

EN, Security Affairs

Scattered Spider member Tyler Buchanan pleads guilty to major crypto theft

2026-04-20 21:04

Tyler Buchanan, linked to Scattered Spider, pleaded guilty in the US to hacking companies and stealing millions in cryptocurrency. Tyler Buchanan, a 24-year-old from Scotland linked to the Scattered Spider group, admitted in a US court that he hacked dozens…

Read more →

EN, The Hacker News

SGLang CVE-2026-5760 (CVSS 9.8) Enables RCE via Malicious GGUF Model Files

2026-04-20 21:04

A critical security vulnerability has been disclosed in SGLang that, if successfully exploited, could result in remote code execution on susceptible systems. The vulnerability, tracked as CVE-2026-5760, carries a CVSS score of 9.8 out of 10.0. It has been described…

Read more →

hourly summary

IT Security News Hourly Summary 2026-04-20 21h : 7 posts

2026-04-20 21:04

7 posts were published in the last hour 18:34 : Hidden Cyber Threat AI Is Preparing That Some Companies Aren’t Thinking About 18:34 : Chrome Privacy Concerns Rise as Expert Warns of Fingerprinting Risks 18:34 : Over 800 Android Apps…

Read more →

DZone Security Zone, EN

Hidden Cyber Threat AI Is Preparing That Some Companies Aren’t Thinking About

2026-04-20 20:04

Cyber threats are in an era where defense and attack are powered by artificial intelligence. While AI has seen a rapid advancement in recent times, it has raised concern among world leaders, policymakers and experts. Evidently, the rapid and unpredictable…

Read more →

EN, Security Archives - TechRepublic

Chrome Privacy Concerns Rise as Expert Warns of Fingerprinting Risks

2026-04-20 20:04

A privacy expert warns Chrome still allows browser fingerprinting and tracking, raising concerns after Google’s shift away from third-party cookie changes. The post Chrome Privacy Concerns Rise as Expert Warns of Fingerprinting Risks appeared first on TechRepublic. This article has…

Read more →

EN, Security Archives - TechRepublic

Over 800 Android Apps Targeted in PIN-Stealing Trojan Campaign

2026-04-20 20:04

Four Android banking malware campaigns are targeting more than 800 apps by abusing overlays, Accessibility permissions, and sideloaded fake apps to steal PINs. The post Over 800 Android Apps Targeted in PIN-Stealing Trojan Campaign appeared first on TechRepublic. This article…

Read more →

EN, Security Archives - TechRepublic

Microsoft Defender Flaws Exploited on Windows, Two Left Unpatched

2026-04-20 20:04

Although the team with Microsoft moved swiftly to patch the BlueHammer vulnerability, other exploits still threaten Microsoft Defender and Windows users. The post Microsoft Defender Flaws Exploited on Windows, Two Left Unpatched appeared first on TechRepublic. This article has been…

Read more →

EN, Security Boulevard

Randall Munroe’s XKCD ‘Subduction Retrieval’

2026-04-20 20:04

via the comic artistry and dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Subduction Retrieval’ appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read the original article: Randall Munroe’s…

Read more →

EN, Security Boulevard

Article 5 and the EU AI Act’s Absolute Red Lines – FireTail Blog

2026-04-20 20:04

Apr 20, 2026 – Alan Fagan – Most conversations about the EU AI Act focus on August 2026, when obligations for high-risk AI systems become fully enforceable. But Article 5 is already live. The Act’s eight prohibited practices became enforceable…

Read more →

CySecurity News - Latest Information Security and Hacking Incidents, EN

Eurail Breach Exposes Data of Over 300,000 U.S. Users

2026-04-20 20:04

  Eurail B.V. has confirmed a data breach affecting 308,777 individuals in the United States. Among them are 242 people from New Hampshire. The incident took place between the end of December 2025 and early January 2026. During this period,…

Read more →

EN, Security Archives - TechRepublic

2026’s Breach List So Far: FBI Hacked, 1B Androids at Risk, 270M iPhones Vulnerable

2026-04-20 20:04

From the FBI breach to the DarkSword iPhone exploit, these are the biggest cyber attacks and security failures that have shaped 2026 so far. The post 2026’s Breach List So Far: FBI Hacked, 1B Androids at Risk, 270M iPhones Vulnerable…

Read more →

EN, Security Archives - TechRepublic

Vercel Confirms Major Security Incident as Hacker Claims $2M Ransom Demand

2026-04-20 20:04

Vercel confirms a security incident after a threat actor claims internal access and demands a $2M ransom, raising concerns about API keys, CI/CD pipelines, and cloud security. The post Vercel Confirms Major Security Incident as Hacker Claims $2M Ransom Demand…

Read more →

EN, Search Security Resources and Information from TechTarget

Cybersecurity in the age of AI means bigger, faster threats

2026-04-20 20:04

<p>With attackers able to move at AI speed, defenders can’t rely on the techniques and instincts they’ve come to trust. Even the best of best practices won’t meet the threat, said speakers at the recent SecureWorld conference in Boston.</p> <p>An…

Read more →

All CISA Advisories, EN

​​Supply Chain Compromise Impacts Axios Node Package Manager​

2026-04-20 20:04

The Cybersecurity and Infrastructure Security Agency (CISA) is releasing this alert to provide guidance in response to the software supply chain compromise of the Axios node package manager (npm).1 Axios is an HTTP client for JavaScript that developers commonly use…

Read more →

Page 67 of 5342
« 1 … 65 66 67 68 69 … 5,342 »

Pages

  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Telegram Channel

Recent Posts

  • Brace for the patch tsunami: AI is unearthing decades of buried code debt May 2, 2026
  • ZenBusiness – 5,118,184 breached accounts May 2, 2026
  • Attackers Abuse Google AppSheet, Netlify, and Telegram in Facebook Phishing Campaign May 2, 2026
  • Attackers Deploy AiTM Phishing Pages to Access SharePoint, HubSpot, and Google Workspace May 2, 2026
  • RBI Cybersecurity Compliance Checklist for Fintech Organizations May 2, 2026
  • Trellix Confirms Source Code Breach With Unauthorized Repository Access May 2, 2026
  • IT Security News Hourly Summary 2026-05-02 09h : 2 posts May 2, 2026
  • PyTorch Lightning and Intercom Client Users Exposed to Credential Stealing Campaign May 2, 2026
  • Massive Facebook Phishing Operation Leverages AppSheet, Netlify, and Telegram May 2, 2026
  • cPanelSniper PoC Exploit Disclosed as 44,000 Servers Reportedly Compromised May 2, 2026
  • CVE-2026-31431: Copy Fail vulnerability enables Linux root privilege escalation across cloud environments May 2, 2026
  • Connected Cars Are Rolling Spy Networks — And They Can Be Hacked May 2, 2026
  • IT Security News Hourly Summary 2026-05-02 06h : 1 posts May 2, 2026
  • cPanelSniper – PoC Exploit Disclosed for cPanel Vulnerability, 44,000 Servers Compromised May 2, 2026
  • IT Security News Hourly Summary 2026-05-02 03h : 1 posts May 2, 2026
  • The npm Threat Landscape: Attack Surface and Mitigations (Updated May 1) May 2, 2026
  • What Is Dark AI? How to Protect Yourself From This Growing Threat May 2, 2026
  • Essential Data Sources for Detection Beyond the Endpoint May 2, 2026
  • News brief: Critical infrastructure, OT cybersecurity attacks May 2, 2026
  • IT Security News Hourly Summary 2026-05-02 00h : 4 posts May 2, 2026

Copyright © 2026 IT Security News. All Rights Reserved. The Magazine Basic Theme by bavotasan.com.

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}