Category: www.infosecurity-magazine.com

Citrix Patches Three NetScaler Zero Days as One Sees Active Exploitation

Citrix customers are urged to patch their vulnerable NetScaler appliances, but “patching alone won’t cut it,” experts said This article has been indexed from www.infosecurity-magazine.com Read the original article: Citrix Patches Three NetScaler Zero Days as One Sees Active Exploitation

New Data Theft Campaign Targets Salesforce via Salesloft App

Google is warning of a new credential theft campaign targeting Salesforce customers via Salesloft Drift This article has been indexed from www.infosecurity-magazine.com Read the original article: New Data Theft Campaign Targets Salesforce via Salesloft App

New Android Trojan Variant Expands with Ransomware Tactics

A new version of the Hook Android banking Trojan features 107 remote commands, including ransomware overlays This article has been indexed from www.infosecurity-magazine.com Read the original article: New Android Trojan Variant Expands with Ransomware Tactics

Phishing Campaign Uses UpCrypter to Deploy Remote Access Tools

A global phishing campaign has been identified using personalized emails and fake websites to deliver malware via UpCrypter This article has been indexed from www.infosecurity-magazine.com Read the original article: Phishing Campaign Uses UpCrypter to Deploy Remote Access Tools

US: Maryland Confirms Cyber Incident Affecting State Transport Systems

All previously scheduled mobility trips across Maryland for this week will be honored, said the state’s transportation administration This article has been indexed from www.infosecurity-magazine.com Read the original article: US: Maryland Confirms Cyber Incident Affecting State Transport Systems

CIISec: Most Security Professionals Want Stricter Regulations

A new CIISec poll finds the majority of industry professionals would prefer more rigorous cybersecurity laws This article has been indexed from www.infosecurity-magazine.com Read the original article: CIISec: Most Security Professionals Want Stricter Regulations

Tech Manufacturer Data I/O Hit by Ransomware

Data I/O has revealed operational disruption following a ransomware breach that forced it to take some systems offline This article has been indexed from www.infosecurity-magazine.com Read the original article: Tech Manufacturer Data I/O Hit by Ransomware

Chinese Developer Jailed for Deploying Malicious Code at US Company

A Chinese developer has been sentenced to four years in prison after being found to deploy malicious code in his employer’s network, including a “kill switch” This article has been indexed from www.infosecurity-magazine.com Read the original article: Chinese Developer Jailed…

CISA Seeks Biden Era’s SBOM Minimum Requirements Guideline Change

The US Cybersecurity and Infrastructure Security Agency is planning to launch an update to a 2021 guideline for SBOM requirements This article has been indexed from www.infosecurity-magazine.com Read the original article: CISA Seeks Biden Era’s SBOM Minimum Requirements Guideline Change

Attackers Abuse Virtual Private Servers to Compromise SaaS Accounts

Darktrace observed a coordinated campaign on customer SaaS accounts, all of which involved logins from IP addresses linked to VPS providers This article has been indexed from www.infosecurity-magazine.com Read the original article: Attackers Abuse Virtual Private Servers to Compromise SaaS…

Microsoft to Make All Products Quantum Safe by 2033

Microsoft has set out a roadmap to complete transition to PQC in all its products and services by 2033, with roll out beginning by 2029 This article has been indexed from www.infosecurity-magazine.com Read the original article: Microsoft to Make All…

Russian Espionage Group Static Tundra Targets Legacy Cisco Flaw

Russian state-backed hackers are exploiting a seven-year-old Cisco Smart Install vulnerability (CVE-2018-0171) in end-of-life devices, prompting warnings from the FBI and Cisco Talos This article has been indexed from www.infosecurity-magazine.com Read the original article: Russian Espionage Group Static Tundra Targets…

Colt Admits Customer Data Likely Stolen in Cyber-Attack

Colt customers can request a list of filenames posted on the dark web via a dedicated call center This article has been indexed from www.infosecurity-magazine.com Read the original article: Colt Admits Customer Data Likely Stolen in Cyber-Attack

Oregon Man Charged in Rapper Bot DDoS-for-Hire Case

A 22-year-old Oregon man has been charged with administering the Rapper Bot DDoS-for-hire Botnet This article has been indexed from www.infosecurity-magazine.com Read the original article: Oregon Man Charged in Rapper Bot DDoS-for-Hire Case

Orange Data Breach Raises SIM-Swapping Attack Fears

Orange Belgium revealed that a threat actor has compromised 850,000 customer accounts, with SIM card numbers among the data accessed This article has been indexed from www.infosecurity-magazine.com Read the original article: Orange Data Breach Raises SIM-Swapping Attack Fears

NIST Unveils Guidelines to Help Spot Face Morphing Attempts

NIST has released new guidelines examining the pros and cons of detection methods for face morphing software This article has been indexed from www.infosecurity-magazine.com Read the original article: NIST Unveils Guidelines to Help Spot Face Morphing Attempts

TRM Launches Industry-Wide Platform to Fight Crypto Crimes

With Beacon Network, TRM Labs has brought together law enforcement and some of the largest crypto exchanges to fight against crypto crimes This article has been indexed from www.infosecurity-magazine.com Read the original article: TRM Launches Industry-Wide Platform to Fight Crypto…

Mule Operators in META Adopt Advanced Fraud Schemes

A new report has mapped the tactical evolution of mule operators in the META region from VPNs to advanced fraud networks This article has been indexed from www.infosecurity-magazine.com Read the original article: Mule Operators in META Adopt Advanced Fraud Schemes

Hackers Weaponize QR Codes in New ‘Quishing’ Attacks

Researchers discovered two new phishing techniques where attackers split malicious QR codes or embed them into legitimate ones This article has been indexed from www.infosecurity-magazine.com Read the original article: Hackers Weaponize QR Codes in New ‘Quishing’ Attacks

Executives Warned About Celebrity Podcast Scams

The Better Business Bureau is urging business owners and influencers not to fall for a new type of podcast scam This article has been indexed from www.infosecurity-magazine.com Read the original article: Executives Warned About Celebrity Podcast Scams

UK Retreats on Apple Encryption Backdoor Demand Following US Pressure

US director of national intelligence, Tulsi Gabbard, stated that her government persuaded the UK to withdraw its controversial demand This article has been indexed from www.infosecurity-magazine.com Read the original article: UK Retreats on Apple Encryption Backdoor Demand Following US Pressure

Microsoft Issues Out-of-Band Update to Fix Recovery Issues

Microsoft has issued an emergency patch to fix Windows recovery problems for some users This article has been indexed from www.infosecurity-magazine.com Read the original article: Microsoft Issues Out-of-Band Update to Fix Recovery Issues

ISACA Launches AI-Centric Security Management Certification

ISACA has launched the new AAISM certification to equip security leaders with AI risk management expertise This article has been indexed from www.infosecurity-magazine.com Read the original article: ISACA Launches AI-Centric Security Management Certification

Public Exploit Released for Critical SAP NetWeaver Flaw

A critical flaw in SAP NetWeaver AS Java is being widely exploited, allowing unauthenticated remote code execution This article has been indexed from www.infosecurity-magazine.com Read the original article: Public Exploit Released for Critical SAP NetWeaver Flaw

Legitimate Chrome VPN Extension Turns to Browser Spyware

Researchers detected that FreeVPN.One, a longstanding Chrome Web Store VPN extension, recently turned into spyware This article has been indexed from www.infosecurity-magazine.com Read the original article: Legitimate Chrome VPN Extension Turns to Browser Spyware

South Yorkshire Police Deletes 96,000 Pieces of Digital Evidence

South Yorkshire Police have been reprimanded by the ICO after deleting 96,000 pieces of evidence from officers’ bodycams This article has been indexed from www.infosecurity-magazine.com Read the original article: South Yorkshire Police Deletes 96,000 Pieces of Digital Evidence

Australian ISP iiNet Suffers Breach of 280,000+ Records

Over 280,000 customers of Australian ISP iiNet have been impacted by a data breach This article has been indexed from www.infosecurity-magazine.com Read the original article: Australian ISP iiNet Suffers Breach of 280,000+ Records

USB Malware Campaign Spreads Cryptominer Worldwide

A multi-stage attack delivered via USB devices has been observed installing cryptomining malware using DLL hijacking and PowerShell This article has been indexed from www.infosecurity-magazine.com Read the original article: USB Malware Campaign Spreads Cryptominer Worldwide

Popular npm Package Compromised in Phishing Attack

An incident involving the npm package eslint-config-prettier has been uncovered spreading Scavenger RAT This article has been indexed from www.infosecurity-magazine.com Read the original article: Popular npm Package Compromised in Phishing Attack

Chinese APT Group Targets Web Hosting Services in Taiwan

Cisco Talos observed the newly identified group compromise a Taiwanese web hosting provider to conduct a range of malicious activities This article has been indexed from www.infosecurity-magazine.com Read the original article: Chinese APT Group Targets Web Hosting Services in Taiwan

Colt Customers Face Prolonged Outages After Major Cyber Incident

The Warlock ransomware gang has taken credit for the cyber-attack after the UK telco giant publicly confirmed an incident on August 14 This article has been indexed from www.infosecurity-magazine.com Read the original article: Colt Customers Face Prolonged Outages After Major…

Workday Reveals CRM Breach

Workday has revealed a breach of its third-party CRM systems in what could be the latest ShinyHunters attack This article has been indexed from www.infosecurity-magazine.com Read the original article: Workday Reveals CRM Breach

Cisco Discloses Critical RCE Flaw in Firewall Management Software

Cisco has issued a software update to address the vulnerability, which can allow an unauthenticated, remote attacker to inject arbitrary shell commands This article has been indexed from www.infosecurity-magazine.com Read the original article: Cisco Discloses Critical RCE Flaw in Firewall…

Majority of Organizations Ship Vulnerable Code, Study Finds

A new Checkmarx study reveals that AI-generated code now accounts for over 60% of codebases in some companies, much of which contains known vulnerabilities This article has been indexed from www.infosecurity-magazine.com Read the original article: Majority of Organizations Ship Vulnerable…

Authorized Push Payment Fraud a National Security Risk to UK, Report Finds

A RUSI report warned that money mules are exploiting inadequate security controls in smaller payment service providers to move fraudulent transactions about This article has been indexed from www.infosecurity-magazine.com Read the original article: Authorized Push Payment Fraud a National Security…

KernelSU v0.5.7 Flaw Lets Android Apps Gain Root Access

A flaw in KernelSU 0.5.7 allows attackers to impersonate its manager app and gain root access to Android devices This article has been indexed from www.infosecurity-magazine.com Read the original article: KernelSU v0.5.7 Flaw Lets Android Apps Gain Root Access

Malvertising Campaign Deploys Modular PowerShell Malware PS1Bot

An ongoing malware campaign has been observed using malvertising to deliver PS1Bot, a PowerShell-based framework This article has been indexed from www.infosecurity-magazine.com Read the original article: Malvertising Campaign Deploys Modular PowerShell Malware PS1Bot

Erlang/OTP SSH Vulnerability Sees Spike in Exploitation Attempts

A critical RCE vulnerability in Erlang’s OTP SSH daemon has been identified that allows unauthenticated command execution This article has been indexed from www.infosecurity-magazine.com Read the original article: Erlang/OTP SSH Vulnerability Sees Spike in Exploitation Attempts

Deepfake AI Trading Scams Target Global Investors

AI-powered trading platforms have been observed exploiting deepfake technology to trick investors with fake endorsements This article has been indexed from www.infosecurity-magazine.com Read the original article: Deepfake AI Trading Scams Target Global Investors

Staffing Company Manpower Discloses Large-Scale Data Breach

The personal data of almost 145,000 people who were registered in Manpower’s systems was compromised This article has been indexed from www.infosecurity-magazine.com Read the original article: Staffing Company Manpower Discloses Large-Scale Data Breach

St. Paul’s Mayor Confirms Interlock Data Leak

Mayor of St. Paul, Minnesota, Melvin Carter, confirmed that employee data was published online by the Interlock ransomware gang This article has been indexed from www.infosecurity-magazine.com Read the original article: St. Paul’s Mayor Confirms Interlock Data Leak

US Authorities Seize $1m from BlackSuit Ransomware Group

The US Department of Justice has announced the seizure of domains, servers and $1m in proceeds from the BlackSuit ransomware group This article has been indexed from www.infosecurity-magazine.com Read the original article: US Authorities Seize $1m from BlackSuit Ransomware Group

Microsoft Fixes Over 100 CVEs on August Patch Tuesday

Microsoft announced updates for 107 vulnerabilities on Patch Tuesday, including one zero-day This article has been indexed from www.infosecurity-magazine.com Read the original article: Microsoft Fixes Over 100 CVEs on August Patch Tuesday

Hacker Alleges Russian Government Role in Kaseya Cyber-Attack

In a new investigation launched at DEFCON 33, Analyst1’s Jon DiMaggio revealed probable Russian government involvement in the Kaseya attack This article has been indexed from www.infosecurity-magazine.com Read the original article: Hacker Alleges Russian Government Role in Kaseya Cyber-Attack

GPT-5 Safeguards Bypassed Using Storytelling-Driven Jailbreak

A new technique has bypassed GPT-5’s safety systems via narrative-driven steering to elicit harmful output This article has been indexed from www.infosecurity-magazine.com Read the original article: GPT-5 Safeguards Bypassed Using Storytelling-Driven Jailbreak

29,000 Servers Remain Unpatched Against Microsoft Exchange Flaw

Over 29,000 Microsoft Exchange servers remain unpatched against a vulnerability that could allow attackers to seize control of entire domains in hybrid cloud environments This article has been indexed from www.infosecurity-magazine.com Read the original article: 29,000 Servers Remain Unpatched Against…

Home Office Phishing Scam Targets UK Immigration Sponsors

The sophisticated campaign aims to steal credentials of sponsor license holders to facilitate immigration fraud, extortion and other monetization schemes This article has been indexed from www.infosecurity-magazine.com Read the original article: Home Office Phishing Scam Targets UK Immigration Sponsors

Cybercriminals Exploit Low-Cost Initial Access Broker Market

Rapid7 found that threat actors are able to purchase low-cost initial access broker services, with many packages offering a variety of options This article has been indexed from www.infosecurity-magazine.com Read the original article: Cybercriminals Exploit Low-Cost Initial Access Broker Market

MITRE: Russian APT28’s LameHug, a Pilot for Future AI Cyber-Attacks

While “fairly primitive”, APT28’s LameHug was a testbed for future AI-powered attacks, said two MITRE experts during Black Hat USA 2025 This article has been indexed from www.infosecurity-magazine.com Read the original article: MITRE: Russian APT28’s LameHug, a Pilot for Future…

Financial Services Could Be Next in Line for ShinyHunters

New threat intelligence points to targeting of financial services and technology sectors by ShinyHunters group This article has been indexed from www.infosecurity-magazine.com Read the original article: Financial Services Could Be Next in Line for ShinyHunters

Hackers Raid Dutch Lab, Stealing Data on 500,000 Patients

Threat actors have stolen data on at least half a million cancer screening patients This article has been indexed from www.infosecurity-magazine.com Read the original article: Hackers Raid Dutch Lab, Stealing Data on 500,000 Patients

New WinRAR Zero-Day Exploited by RomCom Hackers

A flaw in WinRAR, tracked as CVE-2025-8088, has been exploited by the RomCom group to deploy malware This article has been indexed from www.infosecurity-magazine.com Read the original article: New WinRAR Zero-Day Exploited by RomCom Hackers

Connex Credit Union Breach Exposes 172,000 Members’ Data

A cyber-attack at Connex Credit Union has compromised data of 172,000 individuals, including sensitive information This article has been indexed from www.infosecurity-magazine.com Read the original article: Connex Credit Union Breach Exposes 172,000 Members’ Data

Embargo Ransomware Gang Amasses $34.2m in Attack Proceeds

TRM Labs observed crypto payments worth $34.2m moved from victims addresses to a range of destinations likely associated with the group This article has been indexed from www.infosecurity-magazine.com Read the original article: Embargo Ransomware Gang Amasses $34.2m in Attack Proceeds

Eight Countries Face EU Action Over NIS2 Deadline Failings

Eight European countries have yet to transpose NIS2 into law, exposing them to regulatory action This article has been indexed from www.infosecurity-magazine.com Read the original article: Eight Countries Face EU Action Over NIS2 Deadline Failings

UK Red Teamers “Deeply Skeptical” of AI

Commercial red team experts believe AI’s current impact on cyber is overstated This article has been indexed from www.infosecurity-magazine.com Read the original article: UK Red Teamers “Deeply Skeptical” of AI

Australian Regulator Sues Optus Over 2022 Data Breach

The Information Commissioner has applied for a civil penalty against Optus following the 2022 data breach that exposed the personal details of 9.5 million Australians This article has been indexed from www.infosecurity-magazine.com Read the original article: Australian Regulator Sues Optus…

US Federal Judiciary Tightens Security Following Escalated Cyber-Attacks

The judiciary announced stronger protections for its case management system following reports of a major breach of sensitive court documents in multiple states This article has been indexed from www.infosecurity-magazine.com Read the original article: US Federal Judiciary Tightens Security Following…

Bouygues Telecom Data Breach Exposes 6.4 Million Customer Records

Bouygues Telecom revealed the attackers stole personal data of 6.4 million customers, including contact details, contractual data and international bank account numbers This article has been indexed from www.infosecurity-magazine.com Read the original article: Bouygues Telecom Data Breach Exposes 6.4 Million…

Google Among Victims in Ongoing Salesforce Data Theft Campaign

Google confirms it was among the victims of an ongoing data theft campaign targeting Salesforce instances, where publicly available business names and contact details were retrieved by the threat actor This article has been indexed from www.infosecurity-magazine.com Read the original…

SonicWall: Attacks Linked to Legacy Bug and Password Use

SonicWall has claimed an uptick in Akira ransomware intrusions is due to legacy password use This article has been indexed from www.infosecurity-magazine.com Read the original article: SonicWall: Attacks Linked to Legacy Bug and Password Use

#BHUSA: Security Researchers Uncover Critical Flaws in Axis CCTV Software

Claroty researchers have uncovered four vulnerabilities in a proprietary protocol used by surveillance equipment manufacturer Axis Communications This article has been indexed from www.infosecurity-magazine.com Read the original article: #BHUSA: Security Researchers Uncover Critical Flaws in Axis CCTV Software

Clinical Data Stolen in Cyber-Attack on Kidney Dialysis Provider DaVita

The incident, reported to be ransomware-related, has resulted in attackers stealing sensitive personal and clinical data, including lab test results This article has been indexed from www.infosecurity-magazine.com Read the original article: Clinical Data Stolen in Cyber-Attack on Kidney Dialysis Provider…

US Authorities Extradite Nigerian Man Accused of Hacking and Fraud

A Nigerian man accused of hacking, fraud and identity theft has been extradited from France to the US to face charges This article has been indexed from www.infosecurity-magazine.com Read the original article: US Authorities Extradite Nigerian Man Accused of Hacking…

#BHUSA: Exploring the Top Cyber Threats Facing Agentic AI Systems

During the pre-Black Hat AI Summit, Sean Morgan, Protect AI’s Chief Architect, highlighted the three most prominent security risks of using AI agents This article has been indexed from www.infosecurity-magazine.com Read the original article: #BHUSA: Exploring the Top Cyber Threats…

#BHUSA: Malware Complexity Jumps 127% in Six Months

Adversaries are prioritizing stealth over scale, according to OPSWAT’s latest Threat Landscape Report This article has been indexed from www.infosecurity-magazine.com Read the original article: #BHUSA: Malware Complexity Jumps 127% in Six Months

Ransomware Actors Expand Tactics Beyond Encryption and Exfiltration

Ransomware actors deploy a range of activities to make it harder for victims to recover and increase the consequences of not paying demands This article has been indexed from www.infosecurity-magazine.com Read the original article: Ransomware Actors Expand Tactics Beyond Encryption…

Chanel and Pandora Breached as Salesforce Campaign Continues

Chanel and Pandora have revealed data breaches reportedly linked to attacks on their Salesforce instances This article has been indexed from www.infosecurity-magazine.com Read the original article: Chanel and Pandora Breached as Salesforce Campaign Continues

Chinese Smishing Campaigns Compromise up to 115 Million US Payment Cards

SecAlliance highlighted the evolution in smishing campaigns orchestrated by Chinese syndicates, which exploit digital wallet tokenization This article has been indexed from www.infosecurity-magazine.com Read the original article: Chinese Smishing Campaigns Compromise up to 115 Million US Payment Cards

Critical Vulnerabilities Found in NVIDIA’s Triton Inference Server

Critical vulnerabilities in NVIDIA’s Triton Inference Server, discovered by researchers, could allow unauthenticated attackers to gain full server control through remote code execution This article has been indexed from www.infosecurity-magazine.com Read the original article: Critical Vulnerabilities Found in NVIDIA’s Triton…

Cybersecurity Teams Hit by Lowest Budget Growth in Five Years

IANS found that stagnant budget growth rates have significantly impacted CISOs ability to increase their teams’ headcount This article has been indexed from www.infosecurity-magazine.com Read the original article: Cybersecurity Teams Hit by Lowest Budget Growth in Five Years