Tag: www.infosecurity-magazine.com

DragonForce Ransomware Hits Saudi Firm, 6TB Data Stolen

DragonForce ransomware attacks Saudi firms stealing 6TB data, escalating cyber threats in real estate This article has been indexed from www.infosecurity-magazine.com Read the original article: DragonForce Ransomware Hits Saudi Firm, 6TB Data Stolen

Winos 4.0 Malware Targets Taiwan With Email Impersonation

Winos 4.0 malware uses phishing emails to target organizations in Taiwan, Fortinet experts warn This article has been indexed from www.infosecurity-magazine.com Read the original article: Winos 4.0 Malware Targets Taiwan With Email Impersonation

Software Vulnerabilities Take Almost Nine Months to Patch

Veracode found a 47% increase in the average time taken to patch software vulnerabilities, driven by growing reliance on third-party code This article has been indexed from www.infosecurity-magazine.com Read the original article: Software Vulnerabilities Take Almost Nine Months to Patch

Chinese Cyber Espionage Jumps 150%, CrowdStrike Finds

In its 2025 Global Threat Report, CrowdStrike observed a significant escalation in Chinese cyber espionage activities This article has been indexed from www.infosecurity-magazine.com Read the original article: Chinese Cyber Espionage Jumps 150%, CrowdStrike Finds

OpenSSF Publishes Security Framework for Open Source Software

OpenSSF has released new baseline security best practices to improve open source software quality This article has been indexed from www.infosecurity-magazine.com Read the original article: OpenSSF Publishes Security Framework for Open Source Software

99% of Organizations Report API-Related Security Issues

99% of organizations report API-related security issues, highlighting risks from API growth This article has been indexed from www.infosecurity-magazine.com Read the original article: 99% of Organizations Report API-Related Security Issues

Signal May Exit Sweden If Government Imposes Encryption Backdoor

Meredith Whittaker, Signal’s CEO, has threatened to pull the company out of Sweden if a proposed government bill requiring encryption backdoors becomes law This article has been indexed from www.infosecurity-magazine.com Read the original article: Signal May Exit Sweden If Government…

Ransomware Gang Publishes Stolen Genea IVF Patient Data

IVF clinic Genea has confirmed that stolen patient data has been published online, with the Termite ransomware group appearing to be the perpetrators This article has been indexed from www.infosecurity-magazine.com Read the original article: Ransomware Gang Publishes Stolen Genea IVF…

Geopolitical Tension Fuels APT and Hacktivism Surge

Europe is hit hard as geopolitics drives increase in state-backed APT and hacktivist activity This article has been indexed from www.infosecurity-magazine.com Read the original article: Geopolitical Tension Fuels APT and Hacktivism Surge

Chinese-Backed Silver Fox Plants Backdoors in Healthcare Networks

Forescout observed the recently identified Chinese hacking group using medical imaging software applications to deliver malware This article has been indexed from www.infosecurity-magazine.com Read the original article: Chinese-Backed Silver Fox Plants Backdoors in Healthcare Networks

Only a Fifth of Ransomware Attacks Now Encrypt Data

ReliaQuest claims 80% of ransomware attacks now focus solely on exfiltrating data as it is faster This article has been indexed from www.infosecurity-magazine.com Read the original article: Only a Fifth of Ransomware Attacks Now Encrypt Data

Chinese Botnet Bypasses MFA in Microsoft 365 Attacks

SecurityScorecard revealed that the large-scale password spraying campaign can bypass MFA and security access policies by utilizing Non-interactive sign-ins This article has been indexed from www.infosecurity-magazine.com Read the original article: Chinese Botnet Bypasses MFA in Microsoft 365 Attacks

Quarter of Brits Report Deepfake Phone Scams

New Hiya data finds 26% of UK consumers encountered a deepfake scam call in Q4 2024 This article has been indexed from www.infosecurity-magazine.com Read the original article: Quarter of Brits Report Deepfake Phone Scams

Essential Addons for Elementor XSS Vulnerability Discovered

Elementor plugin flaw puts 2m WordPress websites at risk, allowing XSS attacks via malicious scripts This article has been indexed from www.infosecurity-magazine.com Read the original article: Essential Addons for Elementor XSS Vulnerability Discovered

Michigan Man Indicted for Dark Web Credential Fraud

Michigan man indicted for dark web credential fraud, purchased 2,500 logins from Genesis Market This article has been indexed from www.infosecurity-magazine.com Read the original article: Michigan Man Indicted for Dark Web Credential Fraud

Google Cloud Shields Data With Quantum-Resistant Digital Signatures

Google Cloud’s Key Management Service now features quantum-safe digital signatures to strengthen data integrity and prepare for emerging quantum computing challenges This article has been indexed from www.infosecurity-magazine.com Read the original article: Google Cloud Shields Data With Quantum-Resistant Digital Signatures

IT/OT Convergence Fuels Manufacturing Cyber Incidents

Telstra found that 75% of cyber incidents impacting manufacturing firms originated from the targeting of IT systems connected to OT environments This article has been indexed from www.infosecurity-magazine.com Read the original article: IT/OT Convergence Fuels Manufacturing Cyber Incidents

Experts Slam Government After “Disastrous” Apple Encryption Move

Experts argue Britons are now less secure after their government effectively forced Apple to abandon end-to-end encryption This article has been indexed from www.infosecurity-magazine.com Read the original article: Experts Slam Government After “Disastrous” Apple Encryption Move

BlackBasta Ransomware Chatlogs Leaked Online

BlackBasta’s internal chatlogs are “highly useful from a threat intelligence perspective,” said Prodaft, the firm that revealed the leak This article has been indexed from www.infosecurity-magazine.com Read the original article: BlackBasta Ransomware Chatlogs Leaked Online

Malicious Ads Target Freelance Developers via GitHub

Fake job ads target freelance developers, spreading malware via GitHub This article has been indexed from www.infosecurity-magazine.com Read the original article: Malicious Ads Target Freelance Developers via GitHub

Mobile Phishing Attacks Surge with 16% of Incidents in US

Mobile phishing attacks surged in 2024, with 16% of all incidents occurring in the US, according to a new Zimperium report This article has been indexed from www.infosecurity-magazine.com Read the original article: Mobile Phishing Attacks Surge with 16% of Incidents…

West Coast Cybersecurity Salaries Outshine Rest of Country

A survey by IANS and Artico found significant regional variation in cybersecurity salary levels across North America This article has been indexed from www.infosecurity-magazine.com Read the original article: West Coast Cybersecurity Salaries Outshine Rest of Country

Over 330 Million Credentials Compromised by Infostealers

Kela researchers 330 million compromised credentials to infostealer activity on over four million machines in 2024 This article has been indexed from www.infosecurity-magazine.com Read the original article: Over 330 Million Credentials Compromised by Infostealers

Hackers Chain Exploits of Three Palo Alto Networks Firewall Flaws

Palo Alto Networks has observed exploit attempts chaining three vulnerabilities in its PAN-OS firewall appliances This article has been indexed from www.infosecurity-magazine.com Read the original article: Hackers Chain Exploits of Three Palo Alto Networks Firewall Flaws

CISA and FBI Warn of Global Threat from Ghost Ransomware

CISA and the FBI have released a joint advisory detailing the activity of China’s Ghost ransomware This article has been indexed from www.infosecurity-magazine.com Read the original article: CISA and FBI Warn of Global Threat from Ghost Ransomware

WordPress Plugin Vulnerability Exposes 90,000 Sites to Attack

A flaw in the Jupiter X Core plugin has been identified, allowing upload of malicious SVG files and remote code execution on vulnerable servers This article has been indexed from www.infosecurity-magazine.com Read the original article: WordPress Plugin Vulnerability Exposes 90,000…

Finastra Notifies Customers of Data Breach

Finastra notifies customers of data breach that took place more than three months ago, impacting sensitive financial information This article has been indexed from www.infosecurity-magazine.com Read the original article: Finastra Notifies Customers of Data Breach

Australian IVF Clinic Suffers Data Breach Following Cyber Incident

Australia-based Genea said it is investigating the cyber incident to determine whether any personal data was accessed by an unauthorized third party This article has been indexed from www.infosecurity-magazine.com Read the original article: Australian IVF Clinic Suffers Data Breach Following…

Cyber Investor Insight Partners Suffers Security Breach

Venture capital firm Insight Partners, which counts Recorded Future, SentinelOne and Wiz in its portfolio, confirmed an intrusion into its systems via a social engineering attack This article has been indexed from www.infosecurity-magazine.com Read the original article: Cyber Investor Insight…

Russian State Hackers Target Signal to Spy on Ukrainians

Google has warned that Russian state-backed hackers are targeting Signal to eavesdrop on persons of interest in Ukraine This article has been indexed from www.infosecurity-magazine.com Read the original article: Russian State Hackers Target Signal to Spy on Ukrainians

Hundreds of US Military and Defense Credentials Compromised

Hudson Rock has found evidence that infostealers have compromised hundreds of US military and defense contractor credentials This article has been indexed from www.infosecurity-magazine.com Read the original article: Hundreds of US Military and Defense Credentials Compromised

OpenSSH Flaws Expose Systems to Critical Attacks

Significant OpenSSH flaws are exposing systems to man-in-the-middle and denial-of service attacks This article has been indexed from www.infosecurity-magazine.com Read the original article: OpenSSH Flaws Expose Systems to Critical Attacks

Mustang Panda Leverages Microsoft Tools to Bypass Anti-Virus Solutions

Trend Micro found that Chinese espionage group Mustang Panda is deploying malware via legitimate Microsoft tools, enabling it to bypass ESET antivirus applications This article has been indexed from www.infosecurity-magazine.com Read the original article: Mustang Panda Leverages Microsoft Tools to…

Evolving Snake Keylogger Variant Targets Windows Users

A new Snake Keylogger variant, responsible for over 280 million blocked infection attempts worldwide, has been identified targeting Windows users This article has been indexed from www.infosecurity-magazine.com Read the original article: Evolving Snake Keylogger Variant Targets Windows Users

BlackLock On Track to Be 2025’s Most Prolific Ransomware Group

The BlackLock or Eldorado ransomware gang could be the year’s fastest-growing ransomware-as-a-service group This article has been indexed from www.infosecurity-magazine.com Read the original article: BlackLock On Track to Be 2025’s Most Prolific Ransomware Group

Proofpoint Uncovers FrigidStealer, A New MacOS Infostealer

Proofpoint also identified two new threat actors operating components of web inject campaigns, TA2726 and TA2727 This article has been indexed from www.infosecurity-magazine.com Read the original article: Proofpoint Uncovers FrigidStealer, A New MacOS Infostealer

Zacks Investment Research Breach Hits 12 Million

A threat actor claims to have hacked and published data on 12 million Zacks Investment Research accounts This article has been indexed from www.infosecurity-magazine.com Read the original article: Zacks Investment Research Breach Hits 12 Million

Pro-Russia Hackers NoName057(16) Hit Italian Banks and Airports

Pro-Russia hackers NoName057(16) has targeted Italian banks, airports and ports in a series of DDoS attacks This article has been indexed from www.infosecurity-magazine.com Read the original article: Pro-Russia Hackers NoName057(16) Hit Italian Banks and Airports

Microsoft Detects New XCSSET MacOS Malware Variant

Microsoft has observed a new variant of XCSSET, a sophisticated macOS malware that infects Xcode projects This article has been indexed from www.infosecurity-magazine.com Read the original article: Microsoft Detects New XCSSET MacOS Malware Variant

South Korea Suspends Downloads of AI Chatbot DeepSeek

South Korea’s Personal Information Protection Commission is blocking DeepSeek AI downloads over privacy concerns This article has been indexed from www.infosecurity-magazine.com Read the original article: South Korea Suspends Downloads of AI Chatbot DeepSeek

Telegram Used as C2 Channel for New Golang Malware

A Golang backdoor is using Telegram as its command and control (C2) channel, an approach that makes detection harder for defenders, according to Netskope researchers This article has been indexed from www.infosecurity-magazine.com Read the original article: Telegram Used as C2…

Estonian Duo Plead Guilty to $577m Crypto Ponzi Scheme

Two Estonian nationals have pleaded guilty to running a cryptocurrency-related Ponzi scheme This article has been indexed from www.infosecurity-magazine.com Read the original article: Estonian Duo Plead Guilty to $577m Crypto Ponzi Scheme

Palo Alto Networks and SonicWall Firewalls Under Attack

Vulnerabilities in firewalls from Palo Alto Networks and SonicWall are currently under active exploitation This article has been indexed from www.infosecurity-magazine.com Read the original article: Palo Alto Networks and SonicWall Firewalls Under Attack

Russian Hackers Target Microsoft 365 Accounts with Device Code Phishing

Volexity highlighted how Russian nation-state actors are stealing Microsoft device authentication codes to compromise accounts This article has been indexed from www.infosecurity-magazine.com Read the original article: Russian Hackers Target Microsoft 365 Accounts with Device Code Phishing

UK’s AI Safety Institute Rebrands Amid Government Strategy Shift

The organization becomes the AI Security Institute as the UK shifts its focus to tackling AI risks to national security This article has been indexed from www.infosecurity-magazine.com Read the original article: UK’s AI Safety Institute Rebrands Amid Government Strategy Shift

China-Linked Espionage Tools Used in Recent Ransomware Attack

Symantec found that tools previously only used by Chinese nation-state espionage actors were deployed in a ransomware attack This article has been indexed from www.infosecurity-magazine.com Read the original article: China-Linked Espionage Tools Used in Recent Ransomware Attack

CISA and FBI Warn Against Buffer Overflow Vulnerabilities

US agencies have issued a new alert to eliminate buffer overflow vulnerabilities, urging memory-safe programming for secure-by-design software development This article has been indexed from www.infosecurity-magazine.com Read the original article: CISA and FBI Warn Against Buffer Overflow Vulnerabilities

Astaroth Phishing Kit Bypasses 2FA Using Reverse Proxy Techniques

Astaroth is an advanced phishing kit using real-time credential and session cookie capture to compromise Gmail, Yahoo and Office 365 accounts This article has been indexed from www.infosecurity-magazine.com Read the original article: Astaroth Phishing Kit Bypasses 2FA Using Reverse Proxy…

Romance Baiting Losses Surge 40% Annually

Ahead of Valentine’s Day, Chainalysis figures reveal 40% increase in losses to pig butchering, or romance baiting, scams This article has been indexed from www.infosecurity-magazine.com Read the original article: Romance Baiting Losses Surge 40% Annually

North Korea Targets Crypto Devs Through NPM Packages

SecurityScorecard has uncovered a sophisticated campaign linked to North Korea’s Lazarus Group, distributing crypto-stealing malware This article has been indexed from www.infosecurity-magazine.com Read the original article: North Korea Targets Crypto Devs Through NPM Packages

Romance Scams Cost Americans $697.3M Last Year

Romance scams cost Americans $697.3m in 2024, with crypto fraud schemes on the rise This article has been indexed from www.infosecurity-magazine.com Read the original article: Romance Scams Cost Americans $697.3M Last Year

CHERI Security Hardware Program Essential to UK Security, Says Government

NCSC CTO Ollie Whitehouse discussed a UK government-backed project designed to secure underlying computer hardware, preventing most vulnerabilities from occurring This article has been indexed from www.infosecurity-magazine.com Read the original article: CHERI Security Hardware Program Essential to UK Security, Says…

Microsoft Fixes Another Two Actively Exploited Zero-Days

February Patch Tuesday sees Microsoft fix four zero-days, including two under active exploitation This article has been indexed from www.infosecurity-magazine.com Read the original article: Microsoft Fixes Another Two Actively Exploited Zero-Days

Alabama Hacker Admits Role in SEC X Account Breach

An Alabama man has admitted hacking into the US Security and Exchange Commission’s X account using SIM swap fraud to gain access This article has been indexed from www.infosecurity-magazine.com Read the original article: Alabama Hacker Admits Role in SEC X…

DDoS Attack Volume and Magnitude Continues to Soar

Gcore reported a 56% year-over-year rise in DDoS attacks in H2 2024, highlighting a steep long-term growth tend for the attack technique This article has been indexed from www.infosecurity-magazine.com Read the original article: DDoS Attack Volume and Magnitude Continues to…

New Chinese Hacking Campaign Targets Manufacturing Firms to Steal IP

Chinese hackers are infiltrating the networks of suppliers of “sensitive” manufacturers, according to a Check Point report to be published in the coming weeks This article has been indexed from www.infosecurity-magazine.com Read the original article: New Chinese Hacking Campaign Targets…

Ransomware Gangs Increasingly Prioritize Speed and Volume in Attacks

Ransomware groups are adopting agile techniques in a quantity-over-quality approach, according to a new report from Huntress This article has been indexed from www.infosecurity-magazine.com Read the original article: Ransomware Gangs Increasingly Prioritize Speed and Volume in Attacks

OpenAI Was Not Breached, Say Researchers

Kela researchers explain that infostealers are to blame for compromised OpenAI logins This article has been indexed from www.infosecurity-magazine.com Read the original article: OpenAI Was Not Breached, Say Researchers

BadIIS Malware Exploits IIS Servers for SEO Fraud

Trend Micro uncovers BadIIS malware exploiting IIS servers for SEO fraud and malicious redirects This article has been indexed from www.infosecurity-magazine.com Read the original article: BadIIS Malware Exploits IIS Servers for SEO Fraud

US: Man Gets 20 Years for $37m Crypto Heist

A US resident based in Indiana was charged with cyber intrusion and cryptocurrency theft conspiracies This article has been indexed from www.infosecurity-magazine.com Read the original article: US: Man Gets 20 Years for $37m Crypto Heist

Georgia Hospital Alerts 120,000 Individuals of Data Breach

Memorial Hospital and Manor, located in Bainbridge, Georgia, has alerted 120,000 individuals that their data was breached following a ransomware attack last November This article has been indexed from www.infosecurity-magazine.com Read the original article: Georgia Hospital Alerts 120,000 Individuals of…

UK Military Fast-Tracks Cybersecurity Recruitment

The UK MoD has announced it is fast-tracking the recruitment of specialist cybersecurity roles, with recruits offered a starting salary of above £40,000 This article has been indexed from www.infosecurity-magazine.com Read the original article: UK Military Fast-Tracks Cybersecurity Recruitment

Experts Dismayed at UK’s Apple Decryption Demands

Security and privacy experts have questioned a new demand from the UK Home Office on Apple’s encrypted iCloud service This article has been indexed from www.infosecurity-magazine.com Read the original article: Experts Dismayed at UK’s Apple Decryption Demands

Most UK GDPR Enforcement Actions Targeted Public Sector in 2024

27 UK public sector organizations faced ICO enforcement actions in 2024, with three fines issued, according to URM Consulting This article has been indexed from www.infosecurity-magazine.com Read the original article: Most UK GDPR Enforcement Actions Targeted Public Sector in 2024

Malicious AI Models on Hugging Face Exploit Novel Attack Technique

The technique, called nullifAI, allows the models to bypass Hugging Face’s protective measures against malicious AI models This article has been indexed from www.infosecurity-magazine.com Read the original article: Malicious AI Models on Hugging Face Exploit Novel Attack Technique

Third-Party Risk Management Failures Expose UK Finance Sector

Orange Cyberdefense found that over half of UK financial firms suffered at least one third-party attack in 2024, linked to significant gaps in risk management strategies This article has been indexed from www.infosecurity-magazine.com Read the original article: Third-Party Risk Management…

Cybercriminals Weaponize Graphics Files in Phishing Attacks

Sophos has observed cybercriminals ramping up their use of graphics files as part of email phishing attacks to bypass conventional security protections This article has been indexed from www.infosecurity-magazine.com Read the original article: Cybercriminals Weaponize Graphics Files in Phishing Attacks

Europol Cracks Down on Global Child Abuse Network “The Com”

US and Europol dismantle neo-Nazi child abuse network in global crackdown against online exploitation This article has been indexed from www.infosecurity-magazine.com Read the original article: Europol Cracks Down on Global Child Abuse Network “The Com”

WordPress ASE Plugin Vulnerability Threatens Site Security

Patchstack urges admins to patch new WordPress ASE plugin vulnerability that lets users restore previous admin privileges This article has been indexed from www.infosecurity-magazine.com Read the original article: WordPress ASE Plugin Vulnerability Threatens Site Security

NCSC Issues Guidance to Protect UK Research and Innovation

The UK’s National Cyber Security Centre has published a new set of resources for startups and researchers This article has been indexed from www.infosecurity-magazine.com Read the original article: NCSC Issues Guidance to Protect UK Research and Innovation

Spanish Police Arrest Suspected NATO and US Army Hacker

Spain’s National Police force has arrested a suspected data thief who targeted government and military victims This article has been indexed from www.infosecurity-magazine.com Read the original article: Spanish Police Arrest Suspected NATO and US Army Hacker

Sophisticated Phishing Campaign Targets Ukraine’s Largest Bank

A new phishing attack by UAC-0006 has been discovered targeting PrivatBank with malicious files in password-protected archives to evade detection This article has been indexed from www.infosecurity-magazine.com Read the original article: Sophisticated Phishing Campaign Targets Ukraine’s Largest Bank

Ransomware Payments Decline 35% as Victims Resist Demands

Chainalysis found that ransomware payments fell significantly year-over-year despite a recorded increase in the number of ransomware events in 2024 This article has been indexed from www.infosecurity-magazine.com Read the original article: Ransomware Payments Decline 35% as Victims Resist Demands

Mobile Malware Targeting Indian Banks Exposes 50,000 Users

Indian banking malware attack exposes 50,000 users, stealing financial data via SMS interception and phishing This article has been indexed from www.infosecurity-magazine.com Read the original article: Mobile Malware Targeting Indian Banks Exposes 50,000 Users

Five Eyes Launch Guidance to Improve Edge Device Security

The UK and its Five Eyes partners have launched new security guidance for edge device manufacturers and network defenders This article has been indexed from www.infosecurity-magazine.com Read the original article: Five Eyes Launch Guidance to Improve Edge Device Security

Destructive Attacks on Financial Institutions Surge

Contrast Security reveals a 12.5% annual increase in destructive cyber-attacks on banks This article has been indexed from www.infosecurity-magazine.com Read the original article: Destructive Attacks on Financial Institutions Surge

Destructive Attacks on Financial Institutions Surge 13%

Contrast Security reveals a 12.5% annual increase in destructive cyber-attacks on banks This article has been indexed from www.infosecurity-magazine.com Read the original article: Destructive Attacks on Financial Institutions Surge 13%

DaggerFly-Linked Linux Malware Targets Network Appliances

DaggerFly’s Lunar Peek campaign is using a new malware strain, identified by FortiGuard Labs, to compromise Linux networks This article has been indexed from www.infosecurity-magazine.com Read the original article: DaggerFly-Linked Linux Malware Targets Network Appliances

Threefold Increase in Malware Targeting Credential Stores

Picus Security reports infostealer surge after revealing credentials appear in 29% of malware This article has been indexed from www.infosecurity-magazine.com Read the original article: Threefold Increase in Malware Targeting Credential Stores