IT Security News

Cybersecurity news and articles about information security, vulnerabilities, exploits, hacks, laws, spam, viruses, malware, breaches.

Main menu

Skip to content
  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Telegram Channel
EN, GBHackers Security | #1 Globally Trusted Cyber Security News Platform

Vidar Stealer 2.0 Spreads via Fake Game Cheats Shared on GitHub and Reddit

2026-03-18 10:03

Large‑scale campaigns abusing GitHub and Reddit to spread Vidar Stealer 2.0 through fake “free game cheats,” targeting players of popular online titles across the board. The operation shows how the takedown of other infostealers has shifted criminal demand toward Vidar,…

Read more →

EN, Information Security Buzz

Delegated Trust Is Becoming the Largest Attack Surface in Modern Security

2026-03-18 10:03

Over the next decade, the way we define security failures is going to change. No longer will it begin with an unpatched server or a careless employee clicking the wrong link. The root cause will be something far more ordinary,…

Read more →

EN, Help Net Security

ManageEngine expands Endpoint Central with EDR and secure access

2026-03-18 10:03

ManageEngine has announced the expansion of its unified endpoint management and security (UEMS) platform, Endpoint Central, to include endpoint detection and response (EDR) and secure private access capabilities. The additions bolster Endpoint Central’s endpoint security capabilities by enabling AI-powered threat…

Read more →

EN, Help Net Security

Virtue AI brings continuous stress testing to enterprise AI agents

2026-03-18 10:03

Virtue AI has announced Agent ForgingGround with built-in Red-Teaming Agents, the first enterprise-scale testing ground designed to continuously evaluate and stress-test AI agents (including multi-agent systems) before, during, and after deployment. As organizations adopt large-scale AI agents, many enterprises are…

Read more →

EN, Silicon UK

Police To Deploy Live Facial Recognition In Norwich

2026-03-18 10:03

Live facial recognition van to be stationed in Norwich city centre on Sunday, amid government plans to expand tech’s use This article has been indexed from Silicon UK Read the original article: Police To Deploy Live Facial Recognition In Norwich

Read more →

EN, Information Security Buzz

Cyberattacks Soar 245% as War Triggers Global Digital Offensive

2026-03-18 10:03

Since the outbreak of the Middle East conflict on 28 February 2026, Akamai has seen a surge of 245% in cyberattacks against key businesses and institutions in North America, Europe, and some Asian Pacific countries.  One group in particular, Handala (widely believed to have…

Read more →

EN, Information Security Buzz

UK’s Companies House exposed data linked to millions of firms

2026-03-18 10:03

Companies House, the UK’s official registrar of companies, has disclosed a security flaw in its WebFiling service that exposed sensitive data tied to more than five million registered businesses.   The issue traces back to a system update rolled out in October 2025 and went unnoticed for five months…

Read more →

hourly summary

IT Security News Hourly Summary 2026-03-18 09h : 12 posts

2026-03-18 10:03

12 posts were published in the last hour 7:36 : Boggy Serpens Hits Diplomats, Critical Infrastructure in Espionage Waves 7:36 : Iran’s cyberattack against med tech firm is ‘just the beginning’ 7:36 : ‘CrackArmor’ Exposes Nine Vulnerabilities in Linux AppArmor 7:36…

Read more →

EN, GBHackers Security | #1 Globally Trusted Cyber Security News Platform

Boggy Serpens Hits Diplomats, Critical Infrastructure in Espionage Waves

2026-03-18 09:03

Boggy Serpens, also known as MuddyWater, has escalated its cyberespionage operations over the past year, focusing on diplomats and critical infrastructure organizations in a coordinated, multi-wave campaign. Boggy Serpens has moved beyond its earlier noisy, high-volume phishing style to prioritize…

Read more →

EN, The Register - Security

Iran’s cyberattack against med tech firm is ‘just the beginning’

2026-03-18 09:03

Even without a navy, or air power, ‘They’ll still have the ability to hack’ Businesses should expect that Iran will conduct more aggressive cyber-ops as the war escalates, according to security analysts.… This article has been indexed from The Register…

Read more →

EN, Information Security Buzz

‘CrackArmor’ Exposes Nine Vulnerabilities in Linux AppArmor

2026-03-18 09:03

The Qualys Threat Research Unit (TRU) has identified nine vulnerabilities in AppArmor, a Linux Security Module.   The vulnerability has been present since 2017 (version v4.11). AppArmor is the default mandatory access control system for Ubuntu, Debian, SUSE, and several cloud platforms. Its presence in all…

Read more →

EN, Have I Been Pwned latest breaches

Aura – 903,080 breached accounts

2026-03-18 09:03

In March 2026, the online safety service Aura disclosed a data breach that exposed 900k unique email addresses. The data was primarily associated with a marketing tool from a previously acquired company, with fewer than 20k active Aura customers affected.…

Read more →

Cyber Security News, EN

Ubuntu Desktop Systems Vulnerability Enables Attackers to Gain Full Root Access

2026-03-18 09:03

A Local Privilege Escalation (LPE) vulnerability in default installations of Ubuntu Desktop 24.04 and later allows an unprivileged local attacker to gain full root access. Tracked as CVE-2026-3888, uncovered by The Qualys Threat Research Unit, the flaw exploits an unintended…

Read more →

EN, Help Net Security

Cybercriminals scale up, government sector hit hardest

2026-03-18 09:03

Government agencies faced the highest volume of cyberattack campaigns in 2025, according to new findings from HPE Threat Labs, which tracked 1,186 active campaigns over the course of the year. The data covers activity observed between January 1 and December…

Read more →

EN, Help Net Security

Tufin introduces AI agents to take on network security work

2026-03-18 09:03

Tufin is launching a new collection of AI agents designed to take on network security tasks for teams that are already stretched thin. This helps free up scarce expertise to focus on higher-level risks, critical decisions, and defending the enterprise.…

Read more →

EN, The Hacker News

Apple Fixes WebKit Vulnerability Enabling Same-Origin Policy Bypass on iOS and macOS

2026-03-18 09:03

Apple on Tuesday released its first round of Background Security Improvements to address a security flaw in WebKit that affects iOS, iPadOS, and macOS. The vulnerability, tracked as CVE-2026-20643 (CVSS score: N/A), has been described as a cross-origin issue in…

Read more →

Cybersecurity Headlines, EN

Energy strategy, scammer accord, font-rendering attack

2026-03-18 09:03

Energy Department to release first cyber strategy Tech giants sign on to fight scammers Font-rendering hides malicious commands from AI in plain sight Get links to all our stories in the show notes: https://cisoseries.com/cybersecurity-news-energy-strategy-scammer-accord-font-rendering-attack/ Huge thanks to our episode sponsor,…

Read more →

EN, Panda Security Mediacenter

Over one billion customer records belonging to IDMerit users left unprotected online

2026-03-18 09:03

Cyber researchers discovered more than one billion unprotected IDMerit customer records online. The records included details of people from all over the world, with hundreds… The post Over one billion customer records belonging to IDMerit users left unprotected online appeared…

Read more →

EN, GBHackers Security | #1 Globally Trusted Cyber Security News Platform

Researchers Disclose ‘RegPwn,’ a Windows Registry Weakness Allowing SYSTEM Access

2026-03-18 09:03

Researchers at MDSec have disclosed a newly patched Elevation of Privilege vulnerability in Microsoft Windows, known as “RegPwn”. Tracked as CVE-2026-24291, this flaw allows a low-privileged user to gain full SYSTEM access by exploiting how Windows handles registry configurations for…

Read more →

EN, GBHackers Security | #1 Globally Trusted Cyber Security News Platform

New Kubernetes NFS CSI Vulnerability Enables Unauthorized Directory Deletion and Changes

2026-03-18 09:03

A newly disclosed security flaw in the Kubernetes Container Storage Interface (CSI) Driver for Network File System (NFS) exposes storage servers to unauthorized directory modification and deletion. Tracked as CVE-2026-3864 with a medium-severity CVSS v3.1 score of 6.5, this vulnerability…

Read more →

EN, Security Boulevard

Exposed Ollama Servers: Security Risks of Publicly Accessible LLM Infrastructure

2026-03-18 09:03

Learn how exposed Ollama servers can allow unauthorized model access, prompt abuse, and GPU resource consumption when LLM inference APIs are publicly accessible. The post Exposed Ollama Servers: Security Risks of Publicly Accessible LLM Infrastructure appeared first on Indusface. The…

Read more →

EN, Help Net Security

Stop building security goals around controls

2026-03-18 09:03

In this Help Net Security interview, Devin Rudnicki, CISO at Fitch Group, argues that security strategy fails when it loses its connection to business outcomes. Rudnicki walks through how to align security goals with corporate priorities, why CISOs must present…

Read more →

EN, GBHackers Security | #1 Globally Trusted Cyber Security News Platform

Fake Telegram Download Site Delivers Stealthy In-Memory Malware Loader

2026-03-18 08:03

A newly discovered malware campaign is exploiting user trust in Telegram by distributing a trojanized installer through a typosquatted website, telegrgam[.]com. The site closely mimics the official Telegram download portal and delivers a malicious executable named tsetup-x64.6.exe, making it appear legitimate…

Read more →

EN, Heimdal Security Blog

Nordic MSPs Can Now Access Heimdal’s Unified Security and Compliance Platform Through Elovade

2026-03-18 08:03

Copenhagen, Denmark – 18 March 2026 – Heimdal has appointed Elovade as its official distributor in the Nordic region. The move gives MSPs and resellers across Sweden, Norway, Denmark, Iceland, and Finland direct access to Heimdal’s consolidated cybersecurity platform through…

Read more →

Page 67 of 5153
« 1 … 65 66 67 68 69 … 5,153 »

Pages

  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Telegram Channel

Recent Posts

  • Can Agentic AI keep you ahead in cybersecurity? March 28, 2026
  • Is your Agentic AI impenetrable by cyber threats? March 28, 2026
  • How adaptable are NHIs in dynamic markets? March 28, 2026
  • ShinyHunters Claims 350GB Data Breach at European Commission March 28, 2026
  • Government Remains Primary Target as Cyberattacks Grow in 2025 March 28, 2026
  • ShinyHunters claims the hack of the European Commission March 28, 2026
  • MiniMax Unveils Self-Evolving M2.7 AI: Handles 50% of RL Research March 28, 2026
  • Iran-Linked Hackers Breach FBI Director’s Personal Email, Hit Stryker With Wiper Attack March 28, 2026
  • IT Security News Hourly Summary 2026-03-28 18h : 2 posts March 28, 2026
  • CISA Warns of F5 BIG-IP Vulnerability Actively Exploited in Attacks March 28, 2026
  • Cybersecurity Companies’ Stocks Fall as Anthropic Tests Powerful New Model March 28, 2026
  • BSidesSLC 2025 – Good Models Gone Bad – Visualizing Data Poisoning With Gephi March 28, 2026
  • From Data to Intelligence: Why More Signals Don’t Equal Better Security March 28, 2026
  • TeamPCP Supply Chain Campaign: Update 003 – Operational Tempo Shift as Campaign Enters Monetization Phase With No New Compromises in 48 Hours, (Sat, Mar 28th) March 28, 2026
  • Lloyds Group to Compensate 450,000 Customers After App Glitch March 28, 2026
  • ConnectWise Warns of Critical ScreenConnect Flaw Enabling Unauthorized Access March 28, 2026
  • DarkSword Exploit Kit Targets iPhones, Steals Crypto Wallet and Personal Data March 28, 2026
  • Large Scale Ransomware Attack at Marquis Compromises Data of 672000 People March 28, 2026
  • Passwordless for Service SMB Software: Where Friction Actually Kills Revenue March 28, 2026
  • Secure Authentication Starts With Secure Software Development March 28, 2026

Copyright © 2026 IT Security News. All Rights Reserved. The Magazine Basic Theme by bavotasan.com.

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}