Category: www.infosecurity-magazine.com

Trump CISA Cuts Threaten US Election Integrity, Experts Warn

Expert speakers discussed the impact of reported cutbacks to CISA on the ability of local officials to protect against surging cyber-attacks on US election infrastructure This article has been indexed from www.infosecurity-magazine.com Read the original article: Trump CISA Cuts Threaten…

Morphing Meerkat PhaaS Platform Spoofs 100+ Brands

A PhaaS platform, dubbed ‘Morphing Meerkat,’ uses DNS MX records to spoof over 100 brands and steal credentials, according to Infoblox Threat Intel This article has been indexed from www.infosecurity-magazine.com Read the original article: Morphing Meerkat PhaaS Platform Spoofs 100+…

CoffeeLoader Malware Loader Linked to SmokeLoader Operations

Newly identified CoffeeLoader uses multiple evasion techniques and persistence mechanisms to deploy payloads and bypass endpoint security This article has been indexed from www.infosecurity-magazine.com Read the original article: CoffeeLoader Malware Loader Linked to SmokeLoader Operations

No MFA? Expect Hefty Fines, UK’s ICO Warns

The ICO’s Deputy Commissioner told Infosecurity that organizations that fail to implement MFA and suffer a breach can expect heavy penalties This article has been indexed from www.infosecurity-magazine.com Read the original article: No MFA? Expect Hefty Fines, UK’s ICO Warns

Chinese Spy Group FamousSparrow Back with a Vengeance, Targets US

Once considered inactive, the Chinese cyber espionage group FamousSparrow has reemerged, targeting organizations across the US, Mexico and Honduras This article has been indexed from www.infosecurity-magazine.com Read the original article: Chinese Spy Group FamousSparrow Back with a Vengeance, Targets US

NCA Warns of Sadistic Online “Com” Networks

The UK’s National Crime Agency is warning of a growing cyber and physical threat from homegrown teens This article has been indexed from www.infosecurity-magazine.com Read the original article: NCA Warns of Sadistic Online “Com” Networks

NCSC Urges Domain Registrars to Improve Security

The UK’s National Cyber Security Centre has released new guidance to help domain registrars enhance security This article has been indexed from www.infosecurity-magazine.com Read the original article: NCSC Urges Domain Registrars to Improve Security

SecurityScorecard Observes Surge in Third-Party Breaches

In its 2025 Global Third-Party Breach Report, SecurityScorecard has found that 35.5% of all cyber breaches in 2024 were third-party related, up from 29% in 2023 This article has been indexed from www.infosecurity-magazine.com Read the original article: SecurityScorecard Observes Surge…

Threat Actors Abuse Trust in Cloud Collaboration Platforms

Threat actors are exploiting cloud platforms like Adobe and Dropbox to evade email gateways and steal credentials This article has been indexed from www.infosecurity-magazine.com Read the original article: Threat Actors Abuse Trust in Cloud Collaboration Platforms

Malicious npm Packages Deliver Sophisticated Reverse Shells

A newly discovered malware campaign uses malicious npm packages to deploy reverse shells, compromising development environments This article has been indexed from www.infosecurity-magazine.com Read the original article: Malicious npm Packages Deliver Sophisticated Reverse Shells

ETSI Publishes New Quantum-Safe Encryption Standards

Standards body ETSI has defined a scheme for key encapsulation mechanisms with access control (KEMAC), enabling quantum-secure encryption This article has been indexed from www.infosecurity-magazine.com Read the original article: ETSI Publishes New Quantum-Safe Encryption Standards

ENISA Probes Space Threat Landscape in New Report

EU security agency ENISA has released a new report outlining the threats and potential mitigations for the space sector This article has been indexed from www.infosecurity-magazine.com Read the original article: ENISA Probes Space Threat Landscape in New Report

New Android Malware Uses .NET MAUI to Evade Detection

McAfee researchers have identified a new wave of Android malware campaigns leveraging .NET MAUI to steal sensitive user information through fake apps This article has been indexed from www.infosecurity-magazine.com Read the original article: New Android Malware Uses .NET MAUI to…

Cybercriminals Use Atlantis AIO to Target 140+ Platforms

Cybercriminals are increasingly leveraging Atlantis AIO, which automates credential stuffing attacks across more than 140 platforms This article has been indexed from www.infosecurity-magazine.com Read the original article: Cybercriminals Use Atlantis AIO to Target 140+ Platforms