IT Security News

IT Security News Cybersecurity news and articles about information security, vulnerabilities, exploits, hacks, laws, spam, viruses, malware, breaches.

  • YARA-X 1.13.0 Release, (Mon, Feb 9th)
    by IT Security News Bot on February 9, 2026 at 12:23 pm

    YARA-X's 1.13.0 release brings 4 improvements and 4 bugfixes. This article has been indexed from SANS Internet Storm Center, InfoCON: green Read the original article: YARA-X 1.13.0 Release, (Mon, Feb 9th) Read more → The post YARA-X 1.13.0 Release, (Mon, Feb 9th) appeared first on IT Security News.

  • Quick Howto: Extract URLs from RTF files, (Mon, Feb 9th)
    by IT Security News Bot on February 9, 2026 at 12:23 pm

    Malicious RTF (Rich Text Format) documents are back in the news with the exploitation of CVE-2026-21509 by APT28. This article has been indexed from SANS Internet Storm Center, InfoCON: green Read the original article: Quick Howto: Extract URLs from RTF… Read more → The post Quick Howto: Extract URLs from RTF files, (Mon, Feb 9th) appeared first on IT Security News.

  • ISC Stormcast For Monday, February 9th, 2026 https://isc.sans.edu/podcastdetail/9800, (Mon, Feb 9th)
    by IT Security News Bot on February 9, 2026 at 12:23 pm

    This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from SANS Internet Storm Center, InfoCON: green Read the original article: ISC Stormcast For Monday, February 9th, 2026… Read more → The post ISC Stormcast For Monday, February 9th, 2026 https://isc.sans.edu/podcastdetail/9800, (Mon, Feb 9th) appeared first on IT Security News.

  • ScarCruft Exploits Trusted Cloud Services and OLE Documents to Deliver Malware
    by IT Security News Bot on February 9, 2026 at 12:23 pm

    The North Korean-backed advanced persistent threat (APT) group known as ScarCruft has significantly evolved its attack techniques. In a departure from their established methods, the group is now using a sophisticated OLE-based dropper to distribute its signature malware, ROKRAT. This… Read more → The post ScarCruft Exploits Trusted Cloud Services and OLE Documents to Deliver Malware appeared first on IT Security News.

  • How the GNU C Compiler became the Clippy of cryptography
    by IT Security News Bot on February 9, 2026 at 12:23 pm

    Security devs forced to hide Boolean logic from overeager optimizer FOSDEM 2026  The creators of security software have encountered an unlikely foe in their attempts to protect us: modern compilers.… This article has been indexed from The Register – Security… Read more → The post How the GNU C Compiler became the Clippy of cryptography appeared first on IT Security News.

  • AI Is Here to Replace Nuclear Treaties. Scared Yet?
    by IT Security News Bot on February 9, 2026 at 12:23 pm

    The last major nuclear arms treaty between the US and Russia just expired. Some experts believe a combination of satellite surveillance, AI, and human reviewers can take its place. Others, not so much. This article has been indexed from Security… Read more → The post AI Is Here to Replace Nuclear Treaties. Scared Yet? appeared first on IT Security News.

  • Follow the money: Switzerland remains Europe’s top destination for tech pay
    by IT Security News Bot on February 9, 2026 at 12:23 pm

    Average Swiss salaries dwarf those on offer across the rest of the continent European techies looking for the biggest payday are far better off in Switzerland than anywhere else, with average salaries eclipsing all other countries on the continent.… This… Read more → The post Follow the money: Switzerland remains Europe’s top destination for tech pay appeared first on IT Security News.

  • Linux kernel 6.19 reaches stable release, kernel 7.0 work is already underway
    by IT Security News Bot on February 9, 2026 at 12:22 pm

    Development activity on the Linux kernel continues into early 2026 with the stable release of version 6.19. Kernel maintainers have completed the pre-release cycle and merged the final set of changes into the mainline tree. The release follows the ongoing… Read more → The post Linux kernel 6.19 reaches stable release, kernel 7.0 work is already underway appeared first on IT Security News.

  • BeyondTrust fixes easy-to-exploit pre-auth RCE vulnerability in remote access tools (CVE-2026-1731)
    by IT Security News Bot on February 9, 2026 at 12:22 pm

    BeyondTrust fixed a critical remote code execution vulnerability (CVE-2026-1731) in its Remote Support (RS) and Privileged Remote Access (PRA) solutions and is urging self-hosted customers to apply the patch as soon a possible. Unlike the Remote Support zero-day (CVE-2024-12356) that… Read more → The post BeyondTrust fixes easy-to-exploit pre-auth RCE vulnerability in remote access tools (CVE-2026-1731) appeared first on IT Security News.

  • BridgePay Confirms Ransomware Attack, No Card Data Compromised
    by IT Security News Bot on February 9, 2026 at 12:22 pm

    The services of Florida-based payments platform BridgePay are offline due to a ransomware attack This article has been indexed from www.infosecurity-magazine.com Read the original article: BridgePay Confirms Ransomware Attack, No Card Data Compromised Read more → The post BridgePay Confirms Ransomware Attack, No Card Data Compromised appeared first on IT Security News.

  • Hackers Abuse ClawHub Skills to Evade VirusTotal via Social Engineering
    by IT Security News Bot on February 9, 2026 at 11:32 am

    A new evolution in ClawHub skill-based attacks that effectively sidesteps recent security measures. Rather than embedding base64-encoded payloads directly in SKILL.md files, threat actors have now shifted to a simpler approach: hosting malware on convincing lookalike websites and using skills… Read more → The post Hackers Abuse ClawHub Skills to Evade VirusTotal via Social Engineering appeared first on IT Security News.

  • Iran’s Digital Surveillance Machine Is Almost Complete
    by IT Security News Bot on February 9, 2026 at 11:32 am

    After more than 15 years of draconian measures, culminating in an ongoing internet shutdown, the Iranian regime seems to be staggering toward its digital surveillance endgame. This article has been indexed from Security Latest Read the original article: Iran’s Digital… Read more → The post Iran’s Digital Surveillance Machine Is Almost Complete appeared first on IT Security News.

  • January 2026 Cyber Attacks Statistics
    by IT Security News Bot on February 9, 2026 at 11:32 am

    After the cyber attacks timelines (part I and part II), it’s time to publish the statistics for January 2026 where I collected and analyzed 178 events. In January 2026, Cyber Crime continued to lead the Motivations chart with 76%, ahead… Read more → The post January 2026 Cyber Attacks Statistics appeared first on IT Security News.

  • APT Hackers Target Edge Devices by Abusing Trusted Services to Deploy Malware
    by IT Security News Bot on February 9, 2026 at 11:32 am

    Advanced Persistent Threat actors are shifting their focus toward network edge devices, exploiting critical vulnerabilities in firewalls, routers, and VPN appliances to establish long-term access within target environments. These attacks mark a dangerous evolution in cyber warfare, where adversaries bypass… Read more → The post APT Hackers Target Edge Devices by Abusing Trusted Services to Deploy Malware appeared first on IT Security News.

  • Hackers Exploiting ClawHub Skills to Bypass VirusTotal Detections via Social Engineering
    by IT Security News Bot on February 9, 2026 at 11:32 am

    Threat actors have significantly evolved their attack strategies recently observed within the ClawHub ecosystem, moving away from easily detectable methods to more subtle techniques. Rather than embedding malicious payloads directly into files, they now host these dangers on convincing external… Read more → The post Hackers Exploiting ClawHub Skills to Bypass VirusTotal Detections via Social Engineering appeared first on IT Security News.

  • European Commission Contains Cyber-Attack Targeting Staff Mobile Data
    by IT Security News Bot on February 9, 2026 at 11:32 am

    The European Commission has confirmed the detection and containment of a security incident affecting the central infrastructure that manages staff mobile devices. The breach, identified on January 30 through internal telemetry, resulted in unauthorized access to a limited subset of… Read more → The post European Commission Contains Cyber-Attack Targeting Staff Mobile Data appeared first on IT Security News.

  • ScarCruft Abuses Legitimate Cloud Services for C2 and OLE-based Chain to Drop Malware
    by IT Security News Bot on February 9, 2026 at 11:32 am

    ScarCruft, a prolific North Korean-backed advanced persistent threat (APT) group, has significantly refined its cyberespionage capabilities in a newly identified campaign distributing the ROKRAT malware. This recent activity marks a strategic deviation from their traditional reliance on LNK-based attack chains,… Read more → The post ScarCruft Abuses Legitimate Cloud Services for C2 and OLE-based Chain to Drop Malware appeared first on IT Security News.

  • Fake 7-Zip downloads are turning home PCs into proxy nodes
    by IT Security News Bot on February 9, 2026 at 11:32 am

    A convincing lookalike of the popular 7-Zip archiver site has been silently turning victims’ machines into residential proxy nodes. This article has been indexed from Malwarebytes Read the original article: Fake 7-Zip downloads are turning home PCs into proxy nodes Read more → The post Fake 7-Zip downloads are turning home PCs into proxy nodes appeared first on IT Security News.

  • TikTok under EU pressure to change its addictive algorithm
    by IT Security News Bot on February 9, 2026 at 11:32 am

    The European Commission has issued preliminary findings that say TikTok breaches the Digital Services Act due to its addictive design. The Commission opened a formal investigation into TikTok in February 2024. The probe examined whether the platform meets its obligations… Read more → The post TikTok under EU pressure to change its addictive algorithm appeared first on IT Security News.

  • OpenAI updates Europe privacy policy, adding new data categories
    by IT Security News Bot on February 9, 2026 at 11:32 am

    OpenAI has updated its Europe-facing privacy policy following the November 2024 EU revision, clarifying scope, expanding coverage, and detailing user controls. The updated document is longer, with dedicated sections for data controls and practical resources. It explains key controls and… Read more → The post OpenAI updates Europe privacy policy, adding new data categories appeared first on IT Security News.

Share Websitecyber
We are an ethical website cyber security team and we perform security assessments to protect our clients.