Category: www.infosecurity-magazine.com

North Korea’s Fake IT Worker Scheme Sets Sights on Europe

Google has found a significant increase in North Korean actors attempting to gain employment as IT workers in European companies, leading to data theft and extortion This article has been indexed from www.infosecurity-magazine.com Read the original article: North Korea’s Fake…

Steam Surges to Top of Most Spoofed Brands List in Q1

Gaming community Steam appeared most often in phishing emails and texts detected by Guardio in Q1 2025 This article has been indexed from www.infosecurity-magazine.com Read the original article: Steam Surges to Top of Most Spoofed Brands List in Q1

ICO Apologizes After Data Protection Response Snafu

The UK’s data protection regulator says it is overwhelmed with complaints from the public This article has been indexed from www.infosecurity-magazine.com Read the original article: ICO Apologizes After Data Protection Response Snafu

Google to Switch on E2EE for All Gmail Users

Google is set to roll out end-to-end encryption for all Gmail users, boosting security, compliance and data sovereignty efforts This article has been indexed from www.infosecurity-magazine.com Read the original article: Google to Switch on E2EE for All Gmail Users

Cybercriminals Expand Use of Lookalike Domains in Email Attacks

BlueVoyant found that the use of lookalike domains in email-based attacks is allowing actors to extend the types of individuals and organizations being targeted This article has been indexed from www.infosecurity-magazine.com Read the original article: Cybercriminals Expand Use of Lookalike…

New Malware Variant RESURGE Exploits Ivanti Vulnerability

CISA recommends immediate action to address malware variant RESURGE exploiting Ivanti vulnerability CVE-2025-0282 This article has been indexed from www.infosecurity-magazine.com Read the original article: New Malware Variant RESURGE Exploits Ivanti Vulnerability

EU Commission to Invest €1.3bn in Cybersecurity and AI

The funding will go to several projects within the Digital Europe Programme (DIGITAL) work program for 2025 to 2027 This article has been indexed from www.infosecurity-magazine.com Read the original article: EU Commission to Invest €1.3bn in Cybersecurity and AI

NCSC Urges Users to Patch Next.js Flaw Immediately

The UK’s National Cyber Security Agency has called on Next.js users to patch CVE-2025-29927 This article has been indexed from www.infosecurity-magazine.com Read the original article: NCSC Urges Users to Patch Next.js Flaw Immediately

US Seizes $8.2m from Romance Baiting Scammers

The DoJ has managed to recoup over $8m from scammers, stolen in romance baiting schemes This article has been indexed from www.infosecurity-magazine.com Read the original article: US Seizes $8.2m from Romance Baiting Scammers

Solar Power System Vulnerabilities Could Result in Blackouts

Forescout researchers found multiple vulnerabilities in leading solar power system manufacturers, which could be exploited to cause emergencies and blackouts This article has been indexed from www.infosecurity-magazine.com Read the original article: Solar Power System Vulnerabilities Could Result in Blackouts

Trump CISA Cuts Threaten US Election Integrity, Experts Warn

Expert speakers discussed the impact of reported cutbacks to CISA on the ability of local officials to protect against surging cyber-attacks on US election infrastructure This article has been indexed from www.infosecurity-magazine.com Read the original article: Trump CISA Cuts Threaten…

Morphing Meerkat PhaaS Platform Spoofs 100+ Brands

A PhaaS platform, dubbed ‘Morphing Meerkat,’ uses DNS MX records to spoof over 100 brands and steal credentials, according to Infoblox Threat Intel This article has been indexed from www.infosecurity-magazine.com Read the original article: Morphing Meerkat PhaaS Platform Spoofs 100+…

CoffeeLoader Malware Loader Linked to SmokeLoader Operations

Newly identified CoffeeLoader uses multiple evasion techniques and persistence mechanisms to deploy payloads and bypass endpoint security This article has been indexed from www.infosecurity-magazine.com Read the original article: CoffeeLoader Malware Loader Linked to SmokeLoader Operations