Over 10.5 million individuals were impacted by a widespread 2024 data breach at Conduent Business Services, with customer notifications issued in October 2025 This article has been indexed from www.infosecurity-magazine.com Read the original article: Conduent Data Breach Impacts Over 10.5…
Category: www.infosecurity-magazine.com
Chinese-Linked Hackers Exploit Windows Flaw to Spy on Belgian and Hungarian Diplomats
A new UNC6384 campaign highlights the threat actor’s growing sophistication and geographic expansion This article has been indexed from www.infosecurity-magazine.com Read the original article: Chinese-Linked Hackers Exploit Windows Flaw to Spy on Belgian and Hungarian Diplomats
Facial Recognition Firm Clearview AI Hit with Criminal Complaint in Austria
Clearview AI faces a criminal complaint in Austria for allegedly ignoring EU data protection rulings This article has been indexed from www.infosecurity-magazine.com Read the original article: Facial Recognition Firm Clearview AI Hit with Criminal Complaint in Austria
Critical Flaws Found in Elementor King Addons Affect 10,000 Sites
The King Addons for Elementor plugin contains two flaws allowing unauthenticated file uploads and privilege escalation This article has been indexed from www.infosecurity-magazine.com Read the original article: Critical Flaws Found in Elementor King Addons Affect 10,000 Sites
Threat Actors Utilize AdaptixC2 for Malicious Payload Delivery
Cybercriminals are abusing AdaptixC2, a legitimate emulation framework, in ransomware campaigns This article has been indexed from www.infosecurity-magazine.com Read the original article: Threat Actors Utilize AdaptixC2 for Malicious Payload Delivery
Shadow AI: One In Four Employees Use Unapproved AI Tools, Research Finds
Over a quarter of employees work with AI tools that had not been authorized by their company This article has been indexed from www.infosecurity-magazine.com Read the original article: Shadow AI: One In Four Employees Use Unapproved AI Tools, Research Finds
Proton Claims 300 Million Records Compromised So Far This Year
A new dark web analysis reveals more than 300 million records have been breached in 2025 to date This article has been indexed from www.infosecurity-magazine.com Read the original article: Proton Claims 300 Million Records Compromised So Far This Year
Defense Contractor Boss Pleads Guilty to Selling Zero-Day Exploits to Russia
The former general manager of defense contractor Trenchant has admitted selling zero-days to Russian broker This article has been indexed from www.infosecurity-magazine.com Read the original article: Defense Contractor Boss Pleads Guilty to Selling Zero-Day Exploits to Russia
Chrome to Make HTTPS Mandatory by Default in 2026
Google Chrome will enhance security with enforced HTTPS connections from version 154, set for release in October 2026 This article has been indexed from www.infosecurity-magazine.com Read the original article: Chrome to Make HTTPS Mandatory by Default in 2026
Npm Malware Uses Invisible Dependencies to Infect Dozens of Packages
The ongoing ‘PhantomRaven’ malicious campaign has infected 126 npm packages to date, representing 86,000 downloads This article has been indexed from www.infosecurity-magazine.com Read the original article: Npm Malware Uses Invisible Dependencies to Infect Dozens of Packages
PHP Servers and IoT Devices Face Growing Cyber-Attack Risks
A rise in attacks on PHP servers, IoT devices and cloud gateways is linked to botnets exploiting flaws, according to new research published by Qualys This article has been indexed from www.infosecurity-magazine.com Read the original article: PHP Servers and IoT…
New Atroposia RAT Surfaces on Dark Web
Atroposia is a newly discovered modular RAT that uses encrypted channels and advanced theft capabilities to target credentials and crypto wallets This article has been indexed from www.infosecurity-magazine.com Read the original article: New Atroposia RAT Surfaces on Dark Web
Open Source “b3” Benchmark to Boost LLM Security for Agents
The backbone breaker benchmark (b3) has been launched to enhance the security of LLMs within AI agents This article has been indexed from www.infosecurity-magazine.com Read the original article: Open Source “b3” Benchmark to Boost LLM Security for Agents
BSI Warns of Looming AI Governance Crisis
The British Standards Institution claims business leaders aren’t focused enough on managing AI risk This article has been indexed from www.infosecurity-magazine.com Read the original article: BSI Warns of Looming AI Governance Crisis
Investment Scams Spread Across Asia With International Reach
A surge in fake investment platforms targeting cryptocurrency and forex markets has been driving a new wave of financial crime in Asia This article has been indexed from www.infosecurity-magazine.com Read the original article: Investment Scams Spread Across Asia With International…
Chrome Zero-Day Actively Exploited in Attacks by Mem3nt0 mori
A zero-day flaw in Chrome has been exploited by Mem3nt0 mori in Operation ForumTroll as part of a targeted espionage campaign This article has been indexed from www.infosecurity-magazine.com Read the original article: Chrome Zero-Day Actively Exploited in Attacks by Mem3nt0…
Nation-State Cyber Ecosystems Weakened by Sanctions, Report Reveals
Cyber-related economic sanctions can alter adversary behavior, forcing underground networks to distance themselves from named actors This article has been indexed from www.infosecurity-magazine.com Read the original article: Nation-State Cyber Ecosystems Weakened by Sanctions, Report Reveals
A Quarter of Scam Victims Have Considered Self-Harm
ITRC report charts shocking rise of identity fraud victims driven to thoughts of self-harm This article has been indexed from www.infosecurity-magazine.com Read the original article: A Quarter of Scam Victims Have Considered Self-Harm
Actively Exploited WSUS Bug Added to CISA KEV List
Sysadmins are urged to patch WSUS vulnerability CVE-2025-59287 as soon as possible, with federal agencies required to update by November 14 This article has been indexed from www.infosecurity-magazine.com Read the original article: Actively Exploited WSUS Bug Added to CISA KEV…
Qilin Ransomware Group Publishes Over 40 Cases Monthly
Qilin ransomware activity has surged in late 2025, threatening data leaks via double extortion tactics This article has been indexed from www.infosecurity-magazine.com Read the original article: Qilin Ransomware Group Publishes Over 40 Cases Monthly