IT Security News

Cybersecurity news and articles about information security, vulnerabilities, exploits, hacks, laws, spam, viruses, malware, breaches.

Main menu

Skip to content
  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Telegram Channel
EN, The Register - Security

Sharing isn’t caring if it’s an admin password

2026-04-23 11:04

Keeping it simple for the developers can lead to very complex headaches later PWNED  Welcome back to PWNED, the column where we celebrate the people who’ve taught us how not to secure a server. If you’ve ever tied your own…

Read more →

EN, The Hacker News

Vercel Finds More Compromised Accounts in Context.ai-Linked Breach

2026-04-23 11:04

Vercel on Wednesday revealed that it has identified an additional set of customer accounts that were compromised as part of a security incident that enabled unauthorized access to its internal systems. The company said it made the discovery after expanding…

Read more →

EN, The Hacker News

China-Linked GopherWhisper Infects 12 Mongolian Government Systems with Go Backdoors

2026-04-23 11:04

Mongolian governmental institutions have emerged as the target of a previously undocumented China-aligned advanced persistent threat (APT) group tracked as GopherWhisper. “The group wields a wide array of tools mostly written in Go, using injectors and loaders to deploy and…

Read more →

EN, www.infosecurity-magazine.com

Researchers Uncover 10 In-the-Wild Prompt Injection Payloads Targeting AI Agents

2026-04-23 11:04

Forcepoint has found 10 new indirect prompt injection attacks targeting AI agents This article has been indexed from www.infosecurity-magazine.com Read the original article: Researchers Uncover 10 In-the-Wild Prompt Injection Payloads Targeting AI Agents

Read more →

EN, Silicon UK

China’s DeepSeek Holds First Funding Round

2026-04-23 11:04

DeepSeek reportedly looks for first outside funds to establish valuation benchmark and help retain talent, amid aggressive poaching This article has been indexed from Silicon UK Read the original article: China’s DeepSeek Holds First Funding Round

Read more →

EN, GBHackers Security | #1 Globally Trusted Cyber Security News Platform

North Korean Fake IT Workers Infiltrate Firms to Dodge Sanctions

2026-04-23 11:04

North Korean threat actors are once again leveraging deceptive remote work schemes to infiltrate global organizations, using fake IT worker personas to generate revenue and bypass international sanctions. A recent investigation, triggered by cryptocurrency security researcher ZachXBT, sheds light on…

Read more →

EN, GBHackers Security | #1 Globally Trusted Cyber Security News Platform

Attackers Exploit LMDeploy Flaw in the Wild Within 12 Hours of Advisory

2026-04-23 11:04

A critical Server-Side Request Forgery (SSRF) vulnerability in LMDeploy’s vision-language module was exploited in active attacks just 12 hours and 31 minutes after its public disclosure, with no proof-of-concept code required. On April 21, 2026, GitHub published security advisory GHSA-6w67-hwm5-92mq, later…

Read more →

Cyber Security News, EN

Critical Pack2TheRoot Vulnerability Let Attackers Gain Root Access or Compromise the System

2026-04-23 11:04

A high-severity privilege escalation vulnerability, dubbed Pack2TheRoot (CVE-2026-41651, CVSS 3.1: 8.8), has been publicly disclosed by Deutsche Telekom’s Red Team, affecting multiple major Linux distributions in their default installations. The flaw allows any local unprivileged user to silently install or…

Read more →

EN, securityweek

Apple Patches iOS Flaw Allowing Recovery of Deleted Chats

2026-04-23 11:04

Apple rolled out the security patches for dozens of iPhone and iPad models and generations. The post Apple Patches iOS Flaw Allowing Recovery of Deleted Chats appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original…

Read more →

EN, Help Net Security

OpenAI tackles a bad habit people have when interacting with AI

2026-04-23 11:04

Since people tend to paste personal data into AI tools such as ChatGPT, OpenAI has released Privacy Filter, an open-weight model designed to detect and redact personally identifiable information (PII) in text. The model is available under the Apache 2.0…

Read more →

EN, Help Net Security

GopherWhisper APT group hides command and control traffic in Slack and Discord

2026-04-23 11:04

Attackers continue to lean on everyday collaboration platforms to hide command and control traffic inside normal enterprise noise. A newly identified China-aligned APT group pushes that trend further, running its operations through Slack workspaces, Discord servers, Outlook drafts, and the…

Read more →

EN, The Hacker News

Apple Patches iOS Flaw That Stored Deleted Signal Notifications in FBI Forensic Case

2026-04-23 11:04

Apple has rolled out a software fix for iOS and iPadOS to address a Notification Services flaw that stored notifications marked for deletion on the device. The vulnerability, tracked as CVE-2026-28950 (CVSS score: N/A), has been described as a logging…

Read more →

EN, www.infosecurity-magazine.com

NCSC Backs Passkeys, Hailing a New Era of Sign-in

2026-04-23 11:04

The UK’s NCSC has fully backed passkeys as consumers’ first choice for login, citing progress with FIDO and successful use across the NHS This article has been indexed from www.infosecurity-magazine.com Read the original article: NCSC Backs Passkeys, Hailing a New…

Read more →

EN, Silicon UK

Nio Hit By Patent Claim Over Battery-Swap Stations

2026-04-23 10:04

Chinese EV maker Nio accused of infringing patents from defunct Israeli start-up to build network of battery-swapping stations This article has been indexed from Silicon UK Read the original article: Nio Hit By Patent Claim Over Battery-Swap Stations

Read more →

EN, Silicon UK

FCA Raids London Properties In Crypto Crackdown

2026-04-23 10:04

Authorities search eight properties in capital associated with unregistered peer-to-peer crypto trading, amid money laundering risk This article has been indexed from Silicon UK Read the original article: FCA Raids London Properties In Crypto Crackdown

Read more →

EN, Silicon UK

Micron Pushes US Lawmakers To Restrict China Sales

2026-04-23 10:04

Micron is reportedly driving force behind bill that aims to bring in increased restrictions on chipmaking equipment sales to China This article has been indexed from Silicon UK Read the original article: Micron Pushes US Lawmakers To Restrict China Sales

Read more →

EN, GBHackers Security | #1 Globally Trusted Cyber Security News Platform

Lazarus Lures Developers With Backdoored Coding Tests

2026-04-23 10:04

North Korea-linked hackers are using AI-assisted malware and backdoored coding challenges to quietly loot millions in cryptocurrency from Web3 developers. Expel assesses with high confidence that HexagonalRodent is a DPRK state-sponsored subgroup that likely evolved from fraudulent IT worker operations…

Read more →

EN, GBHackers Security | #1 Globally Trusted Cyber Security News Platform

Fake Wallpaper App, YouTube Channel Used to Spread notnullOSX Malware

2026-04-23 10:04

Hackers are abusing a fake macOS wallpaper app and a hijacked YouTube channel to quietly deliver notnullOSX, a new crypto-focused stealer that targets Macs via ClickFix commands and weaponized DMG installers. The campaign is highly selective, going after victims with crypto…

Read more →

EN, GBHackers Security | #1 Globally Trusted Cyber Security News Platform

Xinference PyPI Breach Exposes Developers to Cloud Credential Theft

2026-04-23 10:04

A severe supply chain attack has compromised the popular Python package Xinference, exposing developers to massive data theft. Threat actors uploaded malicious versions of the tool to the Python Package Index (PyPI), embedding a heavily obfuscated infostealer into the code.…

Read more →

EN, The Register - Security

Pass the key, passwords have passed their sell-by date

2026-04-23 10:04

NCSC passes judgment: passkeys pass muster, passwords fail The UK’s National Cyber Security Centre (NCSC) has officially endorsed passkeys as the default authentication standard, marking the first time the agency has told consumers to move away from passwords entirely.… This…

Read more →

EN, Security Affairs

Microsoft Graph API misused by new GoGra Linux malware for hidden communication

2026-04-23 10:04

A new GoGra Linux malware uses Microsoft Graph API and an Outlook inbox to deliver payloads, making it stealthy and hard to detect. A new Linux version of the GoGra backdoor uses Microsoft’s Graph API and an Outlook inbox to…

Read more →

EN, Malwarebytes

Roblox clamps down on chats and age checks as legal pressure builds

2026-04-23 10:04

Roblox is paying millions to settle child safety claims while rolling out strict age checks and chat limits that could reshape how kids use the platform. This article has been indexed from Malwarebytes Read the original article: Roblox clamps down…

Read more →

EN, securityweek

Recent Microsoft Defender Vulnerability Exploited as Zero-Day

2026-04-23 10:04

The flaw allows attackers to access the SAM database, extract NTLM hashes, and gain System privileges. The post Recent Microsoft Defender Vulnerability Exploited as Zero-Day appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article:…

Read more →

EN, Security Blog G Data Software AG

Fake Document, Real Access: Foxit Impersonation Enables Stealth VNC Control

2026-04-23 09:04

Attackers who impersonate trusted vendors do not only damage the reputation of the original vendor, but also cause heaps of trouble down the line. This article has been indexed from Security Blog G Data Software AG Read the original article:…

Read more →

Page 85 of 5377
« 1 … 83 84 85 86 87 … 5,377 »

Pages

  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Telegram Channel

Recent Posts

  • NVIDIA Confirms GeForce Data Breach Exposed Users’ Personal Data May 9, 2026
  • Critical Microsoft 365 Copilot Vulnerabilities Expose sensitive Information May 9, 2026
  • Let’s Encrypt Halts Certificate Issuance After Cross-Signed Root Certificate Incident May 9, 2026
  • 2026-05-08: macOS Shub Stealer infection May 9, 2026
  • IT Security News Hourly Summary 2026-05-09 00h : 5 posts May 9, 2026
  • IT Security News Daily Summary 2026-05-08 May 8, 2026
  • RansomHouse says it breached Trellix and exposes internal systems May 8, 2026
  • Friday Squid Blogging: Giant Squid Live in the Waters of Western Australia May 8, 2026
  • The Department of Know: AI “transformation paradox,” Copy Fail chaos, hacked lawnmowers May 8, 2026
  • Fake macOS Troubleshooting Sites Used to Steal iCloud Data in ClickFix Scam May 8, 2026
  • Hackers Deploy Modular RAT With Credential Theft and Screenshot Capture Capabilities May 8, 2026
  • New PamDOORa Backdoor Attacking Linux Systems to Steal SSH Credentials May 8, 2026
  • Cyberattacks on Poland’s Water Plants: A Blueprint for Hybrid Warfare May 8, 2026
  • Cisco Warns of Network Management Flaw That Can Force Systems Offline Through Remote DoS Attacks May 8, 2026
  • Australia Demands Faster Cybersecurity Action to Address Mythos Activity May 8, 2026
  • IT Security News Hourly Summary 2026-05-08 21h : 6 posts May 8, 2026
  • Hackers Use Fake OpenClaw Installer to Steal Crypto Wallet and Password Manager Credentials May 8, 2026
  • Škoda Security Incident Exposes Customers Data From Online Shop May 8, 2026
  • Poland says hackers breached water treatment plants, and the US is facing the same threat May 8, 2026
  • Active attack: Dirty Frag Linux vulnerability expands post-compromise risk May 8, 2026

Copyright © 2026 IT Security News. All Rights Reserved. The Magazine Basic Theme by bavotasan.com.

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}