IT Security News

Cybersecurity news and articles about information security, vulnerabilities, exploits, hacks, laws, spam, viruses, malware, breaches.

Main menu

Skip to content
  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Apps
    • Telegram Channel
EN, Security Latest

Russia Wants This Mega Missile to Intimidate the West, but It Keeps Crashing

2025-12-03 02:12

One of Vladimir Putin’s favorite sabers to rattle seems to have lost its edge. This article has been indexed from Security Latest Read the original article: Russia Wants This Mega Missile to Intimidate the West, but It Keeps Crashing

Read more →

EN, Trend Micro Research, News and Perspectives

Unraveling Water Saci’s New Multi-Format, AI-Enhanced Attacks Propagated via WhatsApp

2025-12-03 01:12

Through AI-driven code conversion and a layered infection chain involving different file formats and scripting languages, the threat actors behind Water Saci are quickly upgrading their malware delivery and propagation methods across WhatsApp in Brazil. This article has been indexed…

Read more →

EN, Search Security Resources and Information from TechTarget

How to use the ZMap network scanner

2025-12-03 01:12

<p>ZMap, an open source utility under the Apache 2.0 license, is a unique and powerful high-speed network scanner designed to probe the internet. The app focuses on performance rather than depth. As a result, it conducts simple scans that are…

Read more →

hourly summary

IT Security News Hourly Summary 2025-12-03 00h : 3 posts

2025-12-03 01:12

3 posts were published in the last hour 22:55 : IT Security News Daily Summary 2025-12-02 22:6 : U.S. CISA adds Android Framework flaws to its Known Exploited Vulnerabilities catalog 22:6 : Hackers can Hijack Your Dash Cams in Seconds…

Read more →

daily summary

IT Security News Daily Summary 2025-12-02

2025-12-03 00:12

146 posts were published in the last hour 22:6 : U.S. CISA adds Android Framework flaws to its Known Exploited Vulnerabilities catalog 22:6 : Hackers can Hijack Your Dash Cams in Seconds and Weaponize it for Future Attacks 21:31 :…

Read more →

EN, Security Affairs

U.S. CISA adds Android Framework flaws to its Known Exploited Vulnerabilities catalog

2025-12-03 00:12

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Android Framework flaws to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added Android Framework flaws to its Known Exploited Vulnerabilities (KEV) catalog. Below are the flaws added…

Read more →

Cyber Security News, EN

Hackers can Hijack Your Dash Cams in Seconds and Weaponize it for Future Attacks

2025-12-03 00:12

Dashcams have become essential devices for drivers worldwide, serving as reliable witnesses in case of accidents or roadside disputes. However, a team of Singaporean cybersecurity researchers has uncovered a disturbing reality: these seemingly harmless devices can be hijacked within seconds…

Read more →

EN, eSecurity Planet

India Mandates Undeletable Security App on All Smartphones

2025-12-02 23:12

India now requires all phones to ship with an undeletable government security app, raising privacy and security concerns. The post India Mandates Undeletable Security App on All Smartphones appeared first on eSecurity Planet. This article has been indexed from eSecurity…

Read more →

Blog, EN

Empower CISOs with Visibility, Agility, Compliance, and Strategic ROI

2025-12-02 23:12

Learn how Akamai Prolexic Network Cloud Firewall allows CISOs to manage risk, resilience, and reputation by delivering visibility, agility, and proactive defense. This article has been indexed from Blog Read the original article: Empower CISOs with Visibility, Agility, Compliance, and…

Read more →

Cyber Security News, EN

Hackers Leverage Evilginx to Undermine MFA Security Mimicking Legitimate SSO Sites

2025-12-02 23:12

Hackers are turning to Evilginx, a powerful adversary-in-the-middle tool, to get around multi-factor authentication and take over cloud accounts. The framework acts as a reverse proxy between the victim and real single sign-on pages, so the login screen looks and…

Read more →

Cyber Security News, EN

Ukraine Hackers Attacking Russian Aerospace Companies and Other Defence-Related Sectors

2025-12-02 23:12

Ukraine-linked hackers are stepping up cyberattacks against Russian aerospace and wider defence-related companies, using new custom malware to steal designs, schedules, and internal emails. The campaign targets both prime contractors and smaller suppliers, aiming to map production chains and expose…

Read more →

Cyber Security News, EN

Nisos Details Earlier Signs of Insider Detection via Authentication and Access Controls

2025-12-02 23:12

Insider threats remain one of the most challenging security problems that organizations face today. These threats typically do not show obvious warning signs at first. Instead, they reveal themselves through small, unusual activities that often blend into normal daily operations.…

Read more →

EN, eSecurity Planet

Rapidly Evolving Arkanix Stealer Hits Credentials and Wallets

2025-12-02 22:12

Arkanix Stealer is a fast-evolving infostealer spreading through Discord to harvest credentials, wallets, and system data. The post Rapidly Evolving Arkanix Stealer Hits Credentials and Wallets appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read…

Read more →

hourly summary

IT Security News Hourly Summary 2025-12-02 21h : 7 posts

2025-12-02 22:12

7 posts were published in the last hour 20:2 : 100,000 WordPress Sites Affected by Remote Code Execution Vulnerability in Advanced Custom Fields: Extended WordPress Plugin 19:32 : 2025-11-10: Ten days of scans and probes and web traffic hitting my…

Read more →

Blog - Wordfence, EN

100,000 WordPress Sites Affected by Remote Code Execution Vulnerability in Advanced Custom Fields: Extended WordPress Plugin

2025-12-02 22:12

On November 18th, 2025, we received a submission for an unauthenticated Remote Code Execution vulnerability in Advanced Custom Fields: Extended, a WordPress plugin with more than 100,000 active installations. This vulnerability can be leveraged to execute code remotely. The post…

Read more →

EN, Malware-Traffic-Analysis.net - Blog Entries

2025-11-10: Ten days of scans and probes and web traffic hitting my web server

2025-12-02 21:12

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Malware-Traffic-Analysis.net – Blog Entries Read the original article: 2025-11-10: Ten days of scans and probes and web…

Read more →

EN, Malware-Traffic-Analysis.net - Blog Entries

2025-11-23: Ten days of scans and probes and web traffic hitting my web server

2025-12-02 21:12

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Malware-Traffic-Analysis.net – Blog Entries Read the original article: 2025-11-23: Ten days of scans and probes and web…

Read more →

EN, Security Latest

Your Data Might Determine How Much You Pay for Eggs

2025-12-02 21:12

A newly enacted New York law requires retailers to say whether your data influences the price of basic goods like a dozen eggs or toilet paper, but not how. This article has been indexed from Security Latest Read the original…

Read more →

Cyber Security News, EN

Researchers Expose Lazarus Recruitment Pipeline Live on Camera Through Honeypot Operation

2025-12-02 21:12

A collaborative investigation by Mauro Eldritch of BCA LTD, ANYRUN, and NorthScan has provided unprecedented visibility into how North Korean threat actors from the Lazarus Group recruit and operate against Western companies. Researchers documented the complete attack cycle in real-time,…

Read more →

Cyber Security News, EN

Water Saci Hackers Leveraging AI Tools to Attack WhatsApp Web Users

2025-12-02 21:12

Cybercriminals targeting Brazilian users have aggressively escalated their tactics, launching a highly sophisticated campaign dubbed “Water Saci.” This new wave of attacks weaponizes WhatsApp Web, a platform implicitly trusted by millions, to deliver banking trojans and steal sensitive financial data.…

Read more →

Cyber Security News, EN

Salty2FA and Tycoon2FA Phishing Kits Attacking Enterprise Users to Steal Login Credentials

2025-12-02 21:12

A new type of phishing attack that combines two different phishing kits: Salty2FA and Tycoon2FA. This marks a significant change in the Phishing-as-a-Service (PhaaS) landscape. While phishing kits typically maintain unique signatures in their code and delivery mechanisms, recent campaigns…

Read more →

EN, The Register - Security

Two Android 0-day bugs disclosed and fixed, plus 105 more to patch

2025-12-02 21:12

Christmas comes early for attackers this year Two high-severity Android bugs were exploited as zero-days before Google issued a fix, according to its December Android security bulletin. … This article has been indexed from The Register – Security Read the original…

Read more →

EN, Security Boulevard

Undetected Firefox WebAssembly Flaw Put 180 Million Users at Risk

2025-12-02 21:12

Cybersecurity startup Aisle discovered a subtle but dangerous coding error in a Firefox WebAssembly implementation sat undetected for six months despite being shipped with a regression testing capability created by Mozilla to find such a problem. The post Undetected Firefox…

Read more →

EN, The Hacker News

India Orders Messaging Apps to Work Only With Active SIM Cards to Prevent Fraud and Misuse

2025-12-02 21:12

India’s Department of Telecommunications (DoT) has issued directions to app-based communication service providers to ensure that the platforms cannot be used without an active SIM card linked to the user’s mobile number. To that end, messaging apps like WhatsApp, Telegram,…

Read more →

Page 85 of 4652
« 1 … 83 84 85 86 87 … 4,652 »

Pages

  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Apps
    • Telegram Channel

Recent Posts

  • What Cyber Defenders Really Think About AI Risk December 19, 2025
  • Chinese APT ‘LongNosedGoblin’ Targeting Asian Governments December 19, 2025
  • Denmark Blames Russia for Cyberattacks Ahead of Elections and on Water Utility December 19, 2025
  • CSA Study: Mature AI Governance Translates Into Responsible AI Adoption December 19, 2025
  • Hacks, thefts and disruption: The worst data breaches of 2025 December 19, 2025
  • Scripted Sparrow Uses Automation to Generate and Send their Attack Messages December 19, 2025
  • CISA warns ASUS Live Update backdoor is still exploitable, seven years on December 19, 2025
  • The WAF must die – some interesting thoughts – FireTail Blog December 19, 2025
  • IT Security News Hourly Summary 2025-12-19 15h : 7 posts December 19, 2025
  • Criminal IP and Palo Alto Networks Cortex XSOAR integrate to bring AI-driven exposure intelligence to automated incident response December 19, 2025
  • Cyber Criminals Are Recruiting Insiders in Banks, Telecoms, and Tech December 19, 2025
  • Docker Makes 1,000 Hardened Images Free and Open Source December 19, 2025
  • Ransomware Attack 2025 Recap – From Critical Data Extortion to Operational Disruption December 19, 2025
  • Hackers Targeting HubSpot Users in Targeted Phishing Attack December 19, 2025
  • HPE tells customers to patch fast as OneView RCE bug scores a perfect 10 December 19, 2025
  • US Shuts Down Crypto Exchange E-Note, Charges Russian Administrator December 19, 2025
  • Docker Fixes ‘Ask Gordon’ AI Flaw That Enabled Metadata-Based Attacks December 19, 2025
  • CLOP targets Gladinet CentreStack servers in large-scale extortion campaign December 19, 2025
  • Making CloudFlare Workers Work for Red Teams December 19, 2025
  • AI Advertising Company Hacked December 19, 2025

Copyright © 2025 IT Security News. All Rights Reserved. The Magazine Basic Theme by bavotasan.com.

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}