Category: www.infosecurity-magazine.com

SEO Poisoning Targets Chinese Users with Fake Software Sites

SEO poisoning attack has been observed targeting Chinese Windows users via lookalike domains, installing Hiddengh0st and Winos This article has been indexed from www.infosecurity-magazine.com Read the original article: SEO Poisoning Targets Chinese Users with Fake Software Sites

HybridPetya Mimics NotPetya, Adds UEFI Compromise

HybridPetya ransomware mimics Petya/NotPetya, with an added UEFI bootkit and Secure Boot bypass This article has been indexed from www.infosecurity-magazine.com Read the original article: HybridPetya Mimics NotPetya, Adds UEFI Compromise

AI-Forged Military IDs Used in North Korean Phishing Attack

Genians observed the Kimsuky group impersonate a defense institution in a spear-phishing attack, leveraging ChatGPT to create fake military ID cards This article has been indexed from www.infosecurity-magazine.com Read the original article: AI-Forged Military IDs Used in North Korean Phishing…

CISA at Risk After OIG Accuses it of Wasting Federal Funds

US Department of Homeland Security OIG claims CISA mismanaged a key cyber retention incentive program This article has been indexed from www.infosecurity-magazine.com Read the original article: CISA at Risk After OIG Accuses it of Wasting Federal Funds

Phishing Campaigns Drop RMM Tools for Remote Access

Threat actors are using multiple lures to trick users into installing RMM tools This article has been indexed from www.infosecurity-magazine.com Read the original article: Phishing Campaigns Drop RMM Tools for Remote Access

Attackers Adopting Novel LOTL Techniques to Evade Detection

HP Wolf has reported the use of multiple, uncommon binaries and novel uses of legitimate image files in recent malicious campaigns This article has been indexed from www.infosecurity-magazine.com Read the original article: Attackers Adopting Novel LOTL Techniques to Evade Detection

France Warns Apple Users of New Spyware Campaign

Apple has sent at least four notifications in 2025, according to the French national cybersecurity agency This article has been indexed from www.infosecurity-magazine.com Read the original article: France Warns Apple Users of New Spyware Campaign

ICO Warns of Student-Led Data Breaches in UK Schools

ICO warned that growing hacks by children into school computer systems is setting them up for “a life of cybercrime” This article has been indexed from www.infosecurity-magazine.com Read the original article: ICO Warns of Student-Led Data Breaches in UK Schools

CISA Launches Roadmap for the CVE Program

The US cybersecurity agency called for the CVE program to remain publicly maintained and vendor-neutral while emphasizing the need for broader engagement This article has been indexed from www.infosecurity-magazine.com Read the original article: CISA Launches Roadmap for the CVE Program

Fileless Malware Deploys Advanced RAT via Legitimate Tools

A sophisticated fileless malware campaign has been observed using legitimate tools to deliver AsyncRAT executed in memory This article has been indexed from www.infosecurity-magazine.com Read the original article: Fileless Malware Deploys Advanced RAT via Legitimate Tools

Wyden Urges FTC Investigation Over Ascension Ransomware Hack

Senator Ron Wyden of Oregon has urged the FTC to investigate Microsoft for cybersecurity lapses linked to ransomware attacks on US critical infrastructure This article has been indexed from www.infosecurity-magazine.com Read the original article: Wyden Urges FTC Investigation Over Ascension…

KillSec Ransomware Hits Brazilian Healthcare IT Vendor

A ransomware attack by KillSec on Brazil software provider MedicSolution threatens healthcare, impacting providers and patients This article has been indexed from www.infosecurity-magazine.com Read the original article: KillSec Ransomware Hits Brazilian Healthcare IT Vendor

Ransomware Payments Plummet in Education Amid Enhanced Resiliency

Sophos found that average ransom demands and payments fell substantially in the education sector in 2025, as recovery time and costs fell This article has been indexed from www.infosecurity-magazine.com Read the original article: Ransomware Payments Plummet in Education Amid Enhanced…

Two Zero-Days Among Patch Tuesday CVEs This Month

Microsoft has fixed over 80 vulnerabilities including two publicly disclosed zero-days in its latest Patch Tuesday release This article has been indexed from www.infosecurity-magazine.com Read the original article: Two Zero-Days Among Patch Tuesday CVEs This Month

Malicious npm Code Reached 10% of Cloud Environments

Wiz Security warns that a recently discovered supply chain attack campaign targeting npm is far from over This article has been indexed from www.infosecurity-magazine.com Read the original article: Malicious npm Code Reached 10% of Cloud Environments

Threat Actor Accidentally Exposes AI-Powered Operations

A threat actor accidentally revealed their AI-powered methods by installing Huntress security software This article has been indexed from www.infosecurity-magazine.com Read the original article: Threat Actor Accidentally Exposes AI-Powered Operations

Salty2FA Phishing Kit Unveils New Level of Sophistication

Salty2FA phishing campaign showcases advanced techniques and professionalism of cybercrime operations This article has been indexed from www.infosecurity-magazine.com Read the original article: Salty2FA Phishing Kit Unveils New Level of Sophistication

Open Source Community Thwarts Massive npm Supply Chain Attack

What could have been a historic supply chain attack seems to have been averted due to the rapid response of the open source community This article has been indexed from www.infosecurity-magazine.com Read the original article: Open Source Community Thwarts Massive…

Chinese Cyber Espionage Campaign Impersonates US Congressman

A House select committee said Chinese actors impersonated Representative John Moolenaar to steal information that could be used to influence trade talks This article has been indexed from www.infosecurity-magazine.com Read the original article: Chinese Cyber Espionage Campaign Impersonates US Congressman

Salesloft: GitHub Account Breach Was Ground Zero in Drift Campaign

Salesloft has revealed that threat actors targeted customer Salesforce data after breaching its GitHub account This article has been indexed from www.infosecurity-magazine.com Read the original article: Salesloft: GitHub Account Breach Was Ground Zero in Drift Campaign

Wealthsimple Confirms Data Breach After Supply Chain Attack

Wealthsimple confirmed a third-party vendor data breach affecting roughly 30,000 customers This article has been indexed from www.infosecurity-magazine.com Read the original article: Wealthsimple Confirms Data Breach After Supply Chain Attack

MostereRAT Targets Windows Users With Stealth Tactics

Phishing campaign unveiled MostereRAT, targeting Windows systems with advanced evasion techniques This article has been indexed from www.infosecurity-magazine.com Read the original article: MostereRAT Targets Windows Users With Stealth Tactics

Remote Access Abuse Biggest Pre-Ransomware Indicator

Cisco Talos found that abuse of remote services and remote access software are the most prevalent ‘pre-ransomware’ tactics deployed by threat actors This article has been indexed from www.infosecurity-magazine.com Read the original article: Remote Access Abuse Biggest Pre-Ransomware Indicator

Qualys, Tenable Latest Victims of Salesloft Drift Hack

Palo Alto Networks, Cloudflare and Zscaler were also among confirmed victims of the attack This article has been indexed from www.infosecurity-magazine.com Read the original article: Qualys, Tenable Latest Victims of Salesloft Drift Hack

GhostAction Supply Chain Attack Compromises 3000+ Secrets

Security researchers have discovered a new malicious campaign impacting hundreds of GitHub users This article has been indexed from www.infosecurity-magazine.com Read the original article: GhostAction Supply Chain Attack Compromises 3000+ Secrets

SAP S/4HANA Users Urged to Patch Critical Exploited Bug

Critical SAP S/4HANA vulnerability CVE-2025-42957 is being exploited in the wild This article has been indexed from www.infosecurity-magazine.com Read the original article: SAP S/4HANA Users Urged to Patch Critical Exploited Bug

South Carolina School District Data Breach Affects 31,000 People

An investigation has revealed that files were stolen in a data breach affecting a South Carolina school district This article has been indexed from www.infosecurity-magazine.com Read the original article: South Carolina School District Data Breach Affects 31,000 People

61% of US Companies Hit by Insider Data Breaches

The OPSWAT report found that insider breaches cost impacted firms $2.7m on average due to factors such as regulatory fines and diminished productivity This article has been indexed from www.infosecurity-magazine.com Read the original article: 61% of US Companies Hit by…

North Korean Hackers Exploit Threat Intel Platforms For Phishing

North Korean hackers have been observed exploiting cyber threat intelligence platforms in a campaign targeting job seekers with malware-laced lures This article has been indexed from www.infosecurity-magazine.com Read the original article: North Korean Hackers Exploit Threat Intel Platforms For Phishing

GhostRedirector Emerges as New China-Aligned Threat Actor

A newly identified hacking group named GhostRedirector has compromised 65 Windows servers using previously unknown tools This article has been indexed from www.infosecurity-magazine.com Read the original article: GhostRedirector Emerges as New China-Aligned Threat Actor

CMS Provider Sitecore Patches Exploited Critical Zero Day

Google Cloud’s Mandiant successfully disrupted an active ViewState deserialization attack affecting Sitecore deployments This article has been indexed from www.infosecurity-magazine.com Read the original article: CMS Provider Sitecore Patches Exploited Critical Zero Day

Scattered Spider-Linked Group Claims JLR Cyber-Attack

JLR said it is investigating following claims by the actor “Scattered Lapsus$ Hunters” that it had stolen data from the firm and had issued an extortion demand This article has been indexed from www.infosecurity-magazine.com Read the original article: Scattered Spider-Linked…

Threat Actors Abuse Hexstrike-AI Tool to Accelerate Exploitation

Hackers are using legitimate red team tool Hexstrike-AI to simplify and speed up vulnerability exploitation This article has been indexed from www.infosecurity-magazine.com Read the original article: Threat Actors Abuse Hexstrike-AI Tool to Accelerate Exploitation

Malicious npm Packages Exploit Ethereum Smart Contracts

A malicious campaign using Ethereum smart contracts has been observed targeting developers via npm and GitHub This article has been indexed from www.infosecurity-magazine.com Read the original article: Malicious npm Packages Exploit Ethereum Smart Contracts

Major IPTV Piracy Network Uncovered Spanning 1100 Domains

A massive IPTV privacy network has been uncovered distributing unlicensed content from major brands including Apple TV, Disney+, HBO, Netflix and more This article has been indexed from www.infosecurity-magazine.com Read the original article: Major IPTV Piracy Network Uncovered Spanning 1100…

Tycoon Phishing Kit Utilizes New Capabilities to Hide Malicious Links

Barracuda observed new methods to disguise phishing links in Tycoon phishing attacks, which are designed to bypass automated email security systems This article has been indexed from www.infosecurity-magazine.com Read the original article: Tycoon Phishing Kit Utilizes New Capabilities to Hide…

Brazilian Fintech Giant Sinqia Reveals $130m Heist Attempt

Evertec subsidiary Sinqia has posted details of an attempt to steal $130m from two B2B partners This article has been indexed from www.infosecurity-magazine.com Read the original article: Brazilian Fintech Giant Sinqia Reveals $130m Heist Attempt

Brazilian FinTech Giant Sinqia Reveals $130m Heist Attempt

Evertec subsidiary Sinqia has posted details of an attempt to steal $130m from two B2B partners This article has been indexed from www.infosecurity-magazine.com Read the original article: Brazilian FinTech Giant Sinqia Reveals $130m Heist Attempt

ICE Reinstates Contract with Spyware Vendor Paragon

The US Immigration agency has resumed a $2m contract with the Graphite spyware developer, now owned by US investor AE Industrial Partners This article has been indexed from www.infosecurity-magazine.com Read the original article: ICE Reinstates Contract with Spyware Vendor Paragon

Malicious npm Package Masquerades as Popular Email Library

A malicious npm package “nodejs-smtp” has been discovered impersonating nodemailer and injecting code to drain crypto wallets This article has been indexed from www.infosecurity-magazine.com Read the original article: Malicious npm Package Masquerades as Popular Email Library

Azure AD Credentials Exposed in Public App Settings File

Experts have revealed an Azure AD vulnerability exposing ClientId and ClientSecret in a publicly accessible appsettings.json file This article has been indexed from www.infosecurity-magazine.com Read the original article: Azure AD Credentials Exposed in Public App Settings File

Zscaler Customer Info Taken in Salesloft Breach

Zscaler has emerged as the latest corporate victim of a supply chain attack targeting Salesforce data This article has been indexed from www.infosecurity-magazine.com Read the original article: Zscaler Customer Info Taken in Salesloft Breach

Silver Fox Exploits Signed Drivers to Deploy ValleyRAT Backdoor

Silver Fox APT abuses Microsoft-signed drivers to kill antivirus and deploy ValleyRAT remote-access backdoor This article has been indexed from www.infosecurity-magazine.com Read the original article: Silver Fox Exploits Signed Drivers to Deploy ValleyRAT Backdoor

High-Risk SQLi Flaw Exposes WordPress Memberships Plugin Users

A vulnerability in the WordPress Paid Memberships Subscription plugin could lead to unauthenticated SQL injection on affected sites This article has been indexed from www.infosecurity-magazine.com Read the original article: High-Risk SQLi Flaw Exposes WordPress Memberships Plugin Users

Critical SQLi Threat to WordPress Memberships Plugin Users

A vulnerability in the WordPress Paid Memberships Subscription plugin could lead to unauthenticated SQL injection on affected sites This article has been indexed from www.infosecurity-magazine.com Read the original article: Critical SQLi Threat to WordPress Memberships Plugin Users

Ransomware Attack on Pennsylvania’s AG Office Disrupts Court Cases

Pennsylvania’s Attorney General confirmed the OAG had refused to pay a ransom demand to the attackers after files were encrypted This article has been indexed from www.infosecurity-magazine.com Read the original article: Ransomware Attack on Pennsylvania’s AG Office Disrupts Court Cases

Salesloft Attacks Target Google Workspace

Adversaries targeting the Salesloft Drift application integration with Salesforce have also compromised Google Workspace accounts This article has been indexed from www.infosecurity-magazine.com Read the original article: Salesloft Attacks Target Google Workspace

WhatsApp Patches Zero-Day, Zero-Click Flaw

WhatsApp has fixed a zero-day vulnerability linked to a sophisticated cyber-attack This article has been indexed from www.infosecurity-magazine.com Read the original article: WhatsApp Patches Zero-Day, Zero-Click Flaw

Npm Package Hijacked to Steal Data and Crypto via AI-Powered Malware

A software supply chain attack targeting Nx marks the first known case where attackers have leveraged developer AI assistants, according to StepSecurity This article has been indexed from www.infosecurity-magazine.com Read the original article: Npm Package Hijacked to Steal Data and…

State-Sponsored Hackers Behind Majority of Vulnerability Exploits

Recorded Future highlighted the vast capabilities of state actors to rapidly weaponize newly disclosed vulnerabilities for geopolitical purposes This article has been indexed from www.infosecurity-magazine.com Read the original article: State-Sponsored Hackers Behind Majority of Vulnerability Exploits

TransUnion Data Breach Impacts 4.5 Million US Customers

The credit rating giant revealed that the breach, which occurred on July 28, was caused by unauthorized access to a third-party application This article has been indexed from www.infosecurity-magazine.com Read the original article: TransUnion Data Breach Impacts 4.5 Million US…

Fake IT Support Attacks Hit Microsoft Teams

Fake IT support lures are being used to trick employees into installing remote‑access tools via Microsoft Teams This article has been indexed from www.infosecurity-magazine.com Read the original article: Fake IT Support Attacks Hit Microsoft Teams

Malicious VS Code Extensions Exploit Name Reuse Loophole

Visual Studio Code extensions have been identified exploiting a loophole that allows reuse of names from removed packages This article has been indexed from www.infosecurity-magazine.com Read the original article: Malicious VS Code Extensions Exploit Name Reuse Loophole

Nevada Confirms Ransomware Attack, State Data Stolen

Nevada’s CIO confirmed in a press conference that ransomware actors had exfiltrated data from state networks, amid an ongoing incident investigation This article has been indexed from www.infosecurity-magazine.com Read the original article: Nevada Confirms Ransomware Attack, State Data Stolen

Chinese Tech Firms Linked to Salt Typhoon Espionage Campaigns

The US, UK and allies have called out China’s “commercial cyber ecosystem” for enabling large-scale Salt Typhoon campaigns This article has been indexed from www.infosecurity-magazine.com Read the original article: Chinese Tech Firms Linked to Salt Typhoon Espionage Campaigns

Crypto Companies Freeze $47m in Romance Baiting Funds

Chainalysis, OKX, Binance and Tether have managed to stop nearly $50m reaching romance baiting fraudsters This article has been indexed from www.infosecurity-magazine.com Read the original article: Crypto Companies Freeze $47m in Romance Baiting Funds

Ransomware Actor Deletes Data and Backups Post-Exfiltration on Azure

Microsoft observed Storm-0501 pivot to the victim’s cloud environment to exfiltrate data rapidly and prevent the victim’s recovery This article has been indexed from www.infosecurity-magazine.com Read the original article: Ransomware Actor Deletes Data and Backups Post-Exfiltration on Azure

CISA Strengthens Software Procurement Security With New Tool

CISA has launched a new Software Acquisition Guide Web Tool to enhance security in software procurement This article has been indexed from www.infosecurity-magazine.com Read the original article: CISA Strengthens Software Procurement Security With New Tool

Researchers Discover First Reported AI-Powered Ransomware

While still in development, PromptLock is described as the “first known AI-powered ransomware” by ESET researchers This article has been indexed from www.infosecurity-magazine.com Read the original article: Researchers Discover First Reported AI-Powered Ransomware

ShadowSilk Campaign Targets Central Asian Governments

A series of cyber-attacks against government organizations in Central Asia and Asia- Pacific has been linked to the ShadowSilk threat cluster This article has been indexed from www.infosecurity-magazine.com Read the original article: ShadowSilk Campaign Targets Central Asian Governments

Citrix Patches Three NetScaler Zero Days as One Sees Active Exploitation

Citrix customers are urged to patch their vulnerable NetScaler appliances, but “patching alone won’t cut it,” experts said This article has been indexed from www.infosecurity-magazine.com Read the original article: Citrix Patches Three NetScaler Zero Days as One Sees Active Exploitation

New Data Theft Campaign Targets Salesforce via Salesloft App

Google is warning of a new credential theft campaign targeting Salesforce customers via Salesloft Drift This article has been indexed from www.infosecurity-magazine.com Read the original article: New Data Theft Campaign Targets Salesforce via Salesloft App

New Android Trojan Variant Expands with Ransomware Tactics

A new version of the Hook Android banking Trojan features 107 remote commands, including ransomware overlays This article has been indexed from www.infosecurity-magazine.com Read the original article: New Android Trojan Variant Expands with Ransomware Tactics

Phishing Campaign Uses UpCrypter to Deploy Remote Access Tools

A global phishing campaign has been identified using personalized emails and fake websites to deliver malware via UpCrypter This article has been indexed from www.infosecurity-magazine.com Read the original article: Phishing Campaign Uses UpCrypter to Deploy Remote Access Tools

US: Maryland Confirms Cyber Incident Affecting State Transport Systems

All previously scheduled mobility trips across Maryland for this week will be honored, said the state’s transportation administration This article has been indexed from www.infosecurity-magazine.com Read the original article: US: Maryland Confirms Cyber Incident Affecting State Transport Systems

CIISec: Most Security Professionals Want Stricter Regulations

A new CIISec poll finds the majority of industry professionals would prefer more rigorous cybersecurity laws This article has been indexed from www.infosecurity-magazine.com Read the original article: CIISec: Most Security Professionals Want Stricter Regulations

Tech Manufacturer Data I/O Hit by Ransomware

Data I/O has revealed operational disruption following a ransomware breach that forced it to take some systems offline This article has been indexed from www.infosecurity-magazine.com Read the original article: Tech Manufacturer Data I/O Hit by Ransomware

Chinese Developer Jailed for Deploying Malicious Code at US Company

A Chinese developer has been sentenced to four years in prison after being found to deploy malicious code in his employer’s network, including a “kill switch” This article has been indexed from www.infosecurity-magazine.com Read the original article: Chinese Developer Jailed…

CISA Seeks Biden Era’s SBOM Minimum Requirements Guideline Change

The US Cybersecurity and Infrastructure Security Agency is planning to launch an update to a 2021 guideline for SBOM requirements This article has been indexed from www.infosecurity-magazine.com Read the original article: CISA Seeks Biden Era’s SBOM Minimum Requirements Guideline Change

Attackers Abuse Virtual Private Servers to Compromise SaaS Accounts

Darktrace observed a coordinated campaign on customer SaaS accounts, all of which involved logins from IP addresses linked to VPS providers This article has been indexed from www.infosecurity-magazine.com Read the original article: Attackers Abuse Virtual Private Servers to Compromise SaaS…

Microsoft to Make All Products Quantum Safe by 2033

Microsoft has set out a roadmap to complete transition to PQC in all its products and services by 2033, with roll out beginning by 2029 This article has been indexed from www.infosecurity-magazine.com Read the original article: Microsoft to Make All…

Russian Espionage Group Static Tundra Targets Legacy Cisco Flaw

Russian state-backed hackers are exploiting a seven-year-old Cisco Smart Install vulnerability (CVE-2018-0171) in end-of-life devices, prompting warnings from the FBI and Cisco Talos This article has been indexed from www.infosecurity-magazine.com Read the original article: Russian Espionage Group Static Tundra Targets…

Colt Admits Customer Data Likely Stolen in Cyber-Attack

Colt customers can request a list of filenames posted on the dark web via a dedicated call center This article has been indexed from www.infosecurity-magazine.com Read the original article: Colt Admits Customer Data Likely Stolen in Cyber-Attack

Oregon Man Charged in Rapper Bot DDoS-for-Hire Case

A 22-year-old Oregon man has been charged with administering the Rapper Bot DDoS-for-hire Botnet This article has been indexed from www.infosecurity-magazine.com Read the original article: Oregon Man Charged in Rapper Bot DDoS-for-Hire Case

Orange Data Breach Raises SIM-Swapping Attack Fears

Orange Belgium revealed that a threat actor has compromised 850,000 customer accounts, with SIM card numbers among the data accessed This article has been indexed from www.infosecurity-magazine.com Read the original article: Orange Data Breach Raises SIM-Swapping Attack Fears