Tag: www.infosecurity-magazine.com

Record Number of Girls Compete in CyberFirst Contest

More than 14,500 girls from across the UK took part in this year’s CyberFirst Girls competition This article has been indexed from www.infosecurity-magazine.com Read the original article: Record Number of Girls Compete in CyberFirst Contest

DDoS Blamed as X Suffers Multiple Outages

Pro-Palestine Dark Storm Team group claims responsibility for major DDoS attacks on X This article has been indexed from www.infosecurity-magazine.com Read the original article: DDoS Blamed as X Suffers Multiple Outages

SIM Swapping Fraud Surges in the Middle East

SIM swapping fraud surges in the Middle East as cybercriminals exploit websites mimicking legitimate services to steal personal data This article has been indexed from www.infosecurity-magazine.com Read the original article: SIM Swapping Fraud Surges in the Middle East

UK AI Research Under Threat From Nation-State Hackers

The Alan Turing institute urged government and academia to address systemic cultural and structural security barriers in UK AI research This article has been indexed from www.infosecurity-magazine.com Read the original article: UK AI Research Under Threat From Nation-State Hackers

Switzerland Mandates Cyber-Attack Reporting for Critical Infrastructure

Starting April 2025, Swiss critical infrastructure organizations will have to report cyber-attacks to the country’s authorities within 24 hours of discovery This article has been indexed from www.infosecurity-magazine.com Read the original article: Switzerland Mandates Cyber-Attack Reporting for Critical Infrastructure

Texas Developer Convicted After Kill Switch Sabotage Plot

Software developer Davis Lu cost his employer hundreds of thousands after deploying malware that caused crashes and failed logins This article has been indexed from www.infosecurity-magazine.com Read the original article: Texas Developer Convicted After Kill Switch Sabotage Plot

Majority of Orgs Hit by AI Cyber-Attacks as Detection Lags

AI-driven cyberattacks are rapidly escalating, with a vast majority of security professionals reporting encounters and anticipating a surge, while struggling with detection This article has been indexed from www.infosecurity-magazine.com Read the original article: Majority of Orgs Hit by AI Cyber-Attacks…

Attackers Target Japanese Firms with Cobalt Strike

Attackers are actively exploiting an RCE flaw in Windows PHP-CGI implementations to target Japanese firms, deploying Cobalt Strike for persistence This article has been indexed from www.infosecurity-magazine.com Read the original article: Attackers Target Japanese Firms with Cobalt Strike

Attackers Targeting Japanese Firms with Cobalt Strike

Attackers are actively exploiting an RCE flaw in Windows PHP-CGI implementations to target Japanese firms, deploying Cobalt Strike for persistence This article has been indexed from www.infosecurity-magazine.com Read the original article: Attackers Targeting Japanese Firms with Cobalt Strike

Cybersecurity Job Satisfaction Plummets, Women Hit Hardest

Layoffs and cutbacks have been cited as major factors in a significant drop in job satisfaction among women working in cybersecurity, according to ISC2 This article has been indexed from www.infosecurity-magazine.com Read the original article: Cybersecurity Job Satisfaction Plummets, Women…

Silk Typhoon Shifts Tactics to Exploit Common IT Solutions

Chinese espionage group Silk Typhoon is increasingly exploiting common IT solutions to infiltrate networks and exfiltrate data This article has been indexed from www.infosecurity-magazine.com Read the original article: Silk Typhoon Shifts Tactics to Exploit Common IT Solutions

Stress and Burnout Impacting Vast Majority of IT Pros

ISACA identified factors such as heavy workload and long hours as the primary causes of stress, while there has been high turnover of IT professionals in the past two years This article has been indexed from www.infosecurity-magazine.com Read the original…

New Cyber-Espionage Campaign Targets UAE Aviation and Transport

A cyber-espionage campaign targeting UAE aviation and transport has been identified by researchers, using customized lures to deploy Sosano malware This article has been indexed from www.infosecurity-magazine.com Read the original article: New Cyber-Espionage Campaign Targets UAE Aviation and Transport

CISO Liability Risks Spur Policy Changes at 93% of Organizations

Fastly found that organizations have introduced changes such as increasing CISO participation in strategic decisions in response to growing personal liability risks This article has been indexed from www.infosecurity-magazine.com Read the original article: CISO Liability Risks Spur Policy Changes at…

Attackers Leverage Microsoft Teams and Quick Assist for Access

Phishing attack exploits social engineering techniques alongside Microsoft Teams and remote access software to deploy BackConnect malware This article has been indexed from www.infosecurity-magazine.com Read the original article: Attackers Leverage Microsoft Teams and Quick Assist for Access

Vodafone Trials Quantum-Safe Tech to Protect Smartphone Browsing

Telecoms provider Vodafone has developed the new proof of concept with IBM, as it seeks to implement post-quantum cryptography ahead of anticipated quantum-based attacks This article has been indexed from www.infosecurity-magazine.com Read the original article: Vodafone Trials Quantum-Safe Tech to…

BYOVD Attacks Exploit Zero-Day in Paragon Partition Manager

Threat actors are exploiting a zero-day bug in Paragon Partition Manager’s BioNTdrv.sys driver during ransomware attacks This article has been indexed from www.infosecurity-magazine.com Read the original article: BYOVD Attacks Exploit Zero-Day in Paragon Partition Manager

Third-Party Attacks Drive Major Financial Losses in 2024

Data from Resilience found that third-party attacks made up 23% of material cyber insurance claims in 2024, with ransomware attacks targeting vendors a major driver This article has been indexed from www.infosecurity-magazine.com Read the original article: Third-Party Attacks Drive Major…

Old Vulnerabilities Among the Most Widely Exploited

Four in ten flaws exploited by threat actors in 2024 were from 2020 or earlier, with some dating back to the 1990s, according to a GreyNoise report This article has been indexed from www.infosecurity-magazine.com Read the original article: Old Vulnerabilities…

Prolific Data Extortion Actor Arrested in Thailand

A joint operation between the Thai and Singapore police has resulted in the arrest of a man allegedly responsible for over 90 data extortion attacks worldwide This article has been indexed from www.infosecurity-magazine.com Read the original article: Prolific Data Extortion…

Software Vulnerabilities Take Almost Nine Months to Patch

Veracode found a 47% increase in the average time taken to patch software vulnerabilities, driven by growing reliance on third-party code This article has been indexed from www.infosecurity-magazine.com Read the original article: Software Vulnerabilities Take Almost Nine Months to Patch

Chinese Cyber Espionage Jumps 150%, CrowdStrike Finds

In its 2025 Global Threat Report, CrowdStrike observed a significant escalation in Chinese cyber espionage activities This article has been indexed from www.infosecurity-magazine.com Read the original article: Chinese Cyber Espionage Jumps 150%, CrowdStrike Finds

Signal May Exit Sweden If Government Imposes Encryption Backdoor

Meredith Whittaker, Signal’s CEO, has threatened to pull the company out of Sweden if a proposed government bill requiring encryption backdoors becomes law This article has been indexed from www.infosecurity-magazine.com Read the original article: Signal May Exit Sweden If Government…

Ransomware Gang Publishes Stolen Genea IVF Patient Data

IVF clinic Genea has confirmed that stolen patient data has been published online, with the Termite ransomware group appearing to be the perpetrators This article has been indexed from www.infosecurity-magazine.com Read the original article: Ransomware Gang Publishes Stolen Genea IVF…

Geopolitical Tension Fuels APT and Hacktivism Surge

Europe is hit hard as geopolitics drives increase in state-backed APT and hacktivist activity This article has been indexed from www.infosecurity-magazine.com Read the original article: Geopolitical Tension Fuels APT and Hacktivism Surge

Only a Fifth of Ransomware Attacks Now Encrypt Data

ReliaQuest claims 80% of ransomware attacks now focus solely on exfiltrating data as it is faster This article has been indexed from www.infosecurity-magazine.com Read the original article: Only a Fifth of Ransomware Attacks Now Encrypt Data

Chinese Botnet Bypasses MFA in Microsoft 365 Attacks

SecurityScorecard revealed that the large-scale password spraying campaign can bypass MFA and security access policies by utilizing Non-interactive sign-ins This article has been indexed from www.infosecurity-magazine.com Read the original article: Chinese Botnet Bypasses MFA in Microsoft 365 Attacks

Quarter of Brits Report Deepfake Phone Scams

New Hiya data finds 26% of UK consumers encountered a deepfake scam call in Q4 2024 This article has been indexed from www.infosecurity-magazine.com Read the original article: Quarter of Brits Report Deepfake Phone Scams

Michigan Man Indicted for Dark Web Credential Fraud

Michigan man indicted for dark web credential fraud, purchased 2,500 logins from Genesis Market This article has been indexed from www.infosecurity-magazine.com Read the original article: Michigan Man Indicted for Dark Web Credential Fraud

Google Cloud Shields Data With Quantum-Resistant Digital Signatures

Google Cloud’s Key Management Service now features quantum-safe digital signatures to strengthen data integrity and prepare for emerging quantum computing challenges This article has been indexed from www.infosecurity-magazine.com Read the original article: Google Cloud Shields Data With Quantum-Resistant Digital Signatures

IT/OT Convergence Fuels Manufacturing Cyber Incidents

Telstra found that 75% of cyber incidents impacting manufacturing firms originated from the targeting of IT systems connected to OT environments This article has been indexed from www.infosecurity-magazine.com Read the original article: IT/OT Convergence Fuels Manufacturing Cyber Incidents

BlackBasta Ransomware Chatlogs Leaked Online

BlackBasta’s internal chatlogs are “highly useful from a threat intelligence perspective,” said Prodaft, the firm that revealed the leak This article has been indexed from www.infosecurity-magazine.com Read the original article: BlackBasta Ransomware Chatlogs Leaked Online

Mobile Phishing Attacks Surge with 16% of Incidents in US

Mobile phishing attacks surged in 2024, with 16% of all incidents occurring in the US, according to a new Zimperium report This article has been indexed from www.infosecurity-magazine.com Read the original article: Mobile Phishing Attacks Surge with 16% of Incidents…

West Coast Cybersecurity Salaries Outshine Rest of Country

A survey by IANS and Artico found significant regional variation in cybersecurity salary levels across North America This article has been indexed from www.infosecurity-magazine.com Read the original article: West Coast Cybersecurity Salaries Outshine Rest of Country

Over 330 Million Credentials Compromised by Infostealers

Kela researchers 330 million compromised credentials to infostealer activity on over four million machines in 2024 This article has been indexed from www.infosecurity-magazine.com Read the original article: Over 330 Million Credentials Compromised by Infostealers

WordPress Plugin Vulnerability Exposes 90,000 Sites to Attack

A flaw in the Jupiter X Core plugin has been identified, allowing upload of malicious SVG files and remote code execution on vulnerable servers This article has been indexed from www.infosecurity-magazine.com Read the original article: WordPress Plugin Vulnerability Exposes 90,000…

Finastra Notifies Customers of Data Breach

Finastra notifies customers of data breach that took place more than three months ago, impacting sensitive financial information This article has been indexed from www.infosecurity-magazine.com Read the original article: Finastra Notifies Customers of Data Breach

Australian IVF Clinic Suffers Data Breach Following Cyber Incident

Australia-based Genea said it is investigating the cyber incident to determine whether any personal data was accessed by an unauthorized third party This article has been indexed from www.infosecurity-magazine.com Read the original article: Australian IVF Clinic Suffers Data Breach Following…

Cyber Investor Insight Partners Suffers Security Breach

Venture capital firm Insight Partners, which counts Recorded Future, SentinelOne and Wiz in its portfolio, confirmed an intrusion into its systems via a social engineering attack This article has been indexed from www.infosecurity-magazine.com Read the original article: Cyber Investor Insight…

Russian State Hackers Target Signal to Spy on Ukrainians

Google has warned that Russian state-backed hackers are targeting Signal to eavesdrop on persons of interest in Ukraine This article has been indexed from www.infosecurity-magazine.com Read the original article: Russian State Hackers Target Signal to Spy on Ukrainians

Hundreds of US Military and Defense Credentials Compromised

Hudson Rock has found evidence that infostealers have compromised hundreds of US military and defense contractor credentials This article has been indexed from www.infosecurity-magazine.com Read the original article: Hundreds of US Military and Defense Credentials Compromised

OpenSSH Flaws Expose Systems to Critical Attacks

Significant OpenSSH flaws are exposing systems to man-in-the-middle and denial-of service attacks This article has been indexed from www.infosecurity-magazine.com Read the original article: OpenSSH Flaws Expose Systems to Critical Attacks

Evolving Snake Keylogger Variant Targets Windows Users

A new Snake Keylogger variant, responsible for over 280 million blocked infection attempts worldwide, has been identified targeting Windows users This article has been indexed from www.infosecurity-magazine.com Read the original article: Evolving Snake Keylogger Variant Targets Windows Users

Proofpoint Uncovers FrigidStealer, A New MacOS Infostealer

Proofpoint also identified two new threat actors operating components of web inject campaigns, TA2726 and TA2727 This article has been indexed from www.infosecurity-magazine.com Read the original article: Proofpoint Uncovers FrigidStealer, A New MacOS Infostealer

Zacks Investment Research Breach Hits 12 Million

A threat actor claims to have hacked and published data on 12 million Zacks Investment Research accounts This article has been indexed from www.infosecurity-magazine.com Read the original article: Zacks Investment Research Breach Hits 12 Million

Microsoft Detects New XCSSET MacOS Malware Variant

Microsoft has observed a new variant of XCSSET, a sophisticated macOS malware that infects Xcode projects This article has been indexed from www.infosecurity-magazine.com Read the original article: Microsoft Detects New XCSSET MacOS Malware Variant

South Korea Suspends Downloads of AI Chatbot DeepSeek

South Korea’s Personal Information Protection Commission is blocking DeepSeek AI downloads over privacy concerns This article has been indexed from www.infosecurity-magazine.com Read the original article: South Korea Suspends Downloads of AI Chatbot DeepSeek

Telegram Used as C2 Channel for New Golang Malware

A Golang backdoor is using Telegram as its command and control (C2) channel, an approach that makes detection harder for defenders, according to Netskope researchers This article has been indexed from www.infosecurity-magazine.com Read the original article: Telegram Used as C2…

Palo Alto Networks and SonicWall Firewalls Under Attack

Vulnerabilities in firewalls from Palo Alto Networks and SonicWall are currently under active exploitation This article has been indexed from www.infosecurity-magazine.com Read the original article: Palo Alto Networks and SonicWall Firewalls Under Attack

China-Linked Espionage Tools Used in Recent Ransomware Attack

Symantec found that tools previously only used by Chinese nation-state espionage actors were deployed in a ransomware attack This article has been indexed from www.infosecurity-magazine.com Read the original article: China-Linked Espionage Tools Used in Recent Ransomware Attack

CISA and FBI Warn Against Buffer Overflow Vulnerabilities

US agencies have issued a new alert to eliminate buffer overflow vulnerabilities, urging memory-safe programming for secure-by-design software development This article has been indexed from www.infosecurity-magazine.com Read the original article: CISA and FBI Warn Against Buffer Overflow Vulnerabilities

Astaroth Phishing Kit Bypasses 2FA Using Reverse Proxy Techniques

Astaroth is an advanced phishing kit using real-time credential and session cookie capture to compromise Gmail, Yahoo and Office 365 accounts This article has been indexed from www.infosecurity-magazine.com Read the original article: Astaroth Phishing Kit Bypasses 2FA Using Reverse Proxy…

Romance Baiting Losses Surge 40% Annually

Ahead of Valentine’s Day, Chainalysis figures reveal 40% increase in losses to pig butchering, or romance baiting, scams This article has been indexed from www.infosecurity-magazine.com Read the original article: Romance Baiting Losses Surge 40% Annually