A cyber-espionage campaign by Pakistan’s TransparentTribe has been identified, targeting Indian government systems using DeskRAT This article has been indexed from www.infosecurity-magazine.com Read the original article: Pakistani-Linked Hacker Group Targets Indian Government
Tag: www.infosecurity-magazine.com
Lazarus Group’s Operation DreamJob Targets European Defense Firms
Cyber-attacks by North Korea’s Lazarus Group target European defense firms in drone development This article has been indexed from www.infosecurity-magazine.com Read the original article: Lazarus Group’s Operation DreamJob Targets European Defense Firms
Major Vulnerabilities Found in TP-Link VPN Routers
Forescout researchers discovered critical and high-severity vulnerabilities in several TP-Link VPN routers This article has been indexed from www.infosecurity-magazine.com Read the original article: Major Vulnerabilities Found in TP-Link VPN Routers
Lumma Stealer Vacuum Filled by Upgraded Vidar 2.0 Infostealer, Researchers Say
Trend Micro believe security teams should anticipate increased Vidar 2.0 prevalence in campaigns through Q4 2025 This article has been indexed from www.infosecurity-magazine.com Read the original article: Lumma Stealer Vacuum Filled by Upgraded Vidar 2.0 Infostealer, Researchers Say
MuddyWater Uses Compromised Mailboxes in Global Phishing Campaign
Group-IB has uncovered a phishing campaign by Iran-linked MuddyWater, exploiting compromised emails for foreign intelligence This article has been indexed from www.infosecurity-magazine.com Read the original article: MuddyWater Uses Compromised Mailboxes in Global Phishing Campaign
PhantomCaptcha Campaign Targets Ukraine Relief Organizations
SentinelLABS Researchers have uncovered a new phishing campaign, PhantomCaptcha, targeting aid organizations supporting Ukraine This article has been indexed from www.infosecurity-magazine.com Read the original article: PhantomCaptcha Campaign Targets Ukraine Relief Organizations
JLR Hack UK’s Costliest Ever, Hitting Economy with £1.9bn Loss
The Cyber Monitoring Centre has classified the cyber-attack against Jaguar Land Rover as a “systemic cyber event” This article has been indexed from www.infosecurity-magazine.com Read the original article: JLR Hack UK’s Costliest Ever, Hitting Economy with £1.9bn Loss
Scattered Lapsus$ Hunters Signal Shift in Tactics
Scattered Lapsus$ Hunters may be preparing to launch an extortion-as-a-service model, according to Palo Alto Networks This article has been indexed from www.infosecurity-magazine.com Read the original article: Scattered Lapsus$ Hunters Signal Shift in Tactics
Singapore Officials Impersonated in Sophisticated Investment Scam
Group-IB has uncovered a scam operation impersonating Singapore officials using Google Ads and deepfakes This article has been indexed from www.infosecurity-magazine.com Read the original article: Singapore Officials Impersonated in Sophisticated Investment Scam
Ransomware Payouts Surge to $3.6m Amid Evolving Tactics
According to ExtraHop’s latest threat landscape report, average ransomware payments surged 44% to $3.6m in 2025 despite fewer incidents This article has been indexed from www.infosecurity-magazine.com Read the original article: Ransomware Payouts Surge to $3.6m Amid Evolving Tactics
Critical WatchGuard Fireware OS Flaw Enables Remote Code Execution
A critical out-of-bounds write flaw (CVE-2025-9242) in WatchGuard Fireware OS could allow remote code execution This article has been indexed from www.infosecurity-magazine.com Read the original article: Critical WatchGuard Fireware OS Flaw Enables Remote Code Execution
Russian Coldriver Hackers Deploy New ‘NoRobot’ Malware
The Coldriver hacking group reportedly shifted its operation quickly after the May 2025 public disclosure of its LostKeys malware This article has been indexed from www.infosecurity-magazine.com Read the original article: Russian Coldriver Hackers Deploy New ‘NoRobot’ Malware
Lumma Stealer Developers Doxxed in Underground Rival Cybercrime Campaign
Lumma Stealer operators allegedly exposed in underground doxxing campaign, with sensitive details leaked by rival cybercriminals, according to Trend Micro This article has been indexed from www.infosecurity-magazine.com Read the original article: Lumma Stealer Developers Doxxed in Underground Rival Cybercrime Campaign
Experian Fined €2.7m For GDPR Breach in Netherlands
The Dutch Data Protection Authority issued Experian a €2.7m for GDPR violations including excessive collection of personal data This article has been indexed from www.infosecurity-magazine.com Read the original article: Experian Fined €2.7m For GDPR Breach in Netherlands
AI-Driven Social Engineering Top Cyber Threat for 2026, ISACA Survey Reveals
Only one in ten IT and cybersecurity professionals feels “very prepared” to manage generative AI risks This article has been indexed from www.infosecurity-magazine.com Read the original article: AI-Driven Social Engineering Top Cyber Threat for 2026, ISACA Survey Reveals
Salt Typhoon Uses Citrix Flaw in Global Cyber-Attack
A cyber intrusion by China-linked group Salt Typhoon has been observed targeting global infrastructure via DLL sideloading This article has been indexed from www.infosecurity-magazine.com Read the original article: Salt Typhoon Uses Citrix Flaw in Global Cyber-Attack
Criminal SIM Card Supply Network Busted by Europol
Several suspects have been arrested over links with a network running a “sophisticated” cybercrime-enabling service This article has been indexed from www.infosecurity-magazine.com Read the original article: Criminal SIM Card Supply Network Busted by Europol
Microsoft Revokes 200+ Fake Certificates Used in Teams Malware Attack
Microsoft has revoked over 200 fraudulent code-signing certificates used in a ransomware campaign involving fake Teams installers by threat group Vanilla Tempest This article has been indexed from www.infosecurity-magazine.com Read the original article: Microsoft Revokes 200+ Fake Certificates Used in…
Teen Tied to Russian Hackers in Dutch Cyber Espionage Probe
Dutch prosecutors suspect three teens of aiding a foreign power, with one allegedly linked to a Russian-affiliated hacker group This article has been indexed from www.infosecurity-magazine.com Read the original article: Teen Tied to Russian Hackers in Dutch Cyber Espionage Probe
North Korean Hackers Use EtherHiding to Steal Crypto
Google reveals North Korean hackers are using EtherHiding, a blockchain-based technique, to deliver malware and steal cryptocurrency This article has been indexed from www.infosecurity-magazine.com Read the original article: North Korean Hackers Use EtherHiding to Steal Crypto