Category: www.infosecurity-magazine.com

ENISA Probes Space Threat Landscape in New Report

EU security agency ENISA has released a new report outlining the threats and potential mitigations for the space sector This article has been indexed from www.infosecurity-magazine.com Read the original article: ENISA Probes Space Threat Landscape in New Report

New Android Malware Uses .NET MAUI to Evade Detection

McAfee researchers have identified a new wave of Android malware campaigns leveraging .NET MAUI to steal sensitive user information through fake apps This article has been indexed from www.infosecurity-magazine.com Read the original article: New Android Malware Uses .NET MAUI to…

Cybercriminals Use Atlantis AIO to Target 140+ Platforms

Cybercriminals are increasingly leveraging Atlantis AIO, which automates credential stuffing attacks across more than 140 platforms This article has been indexed from www.infosecurity-magazine.com Read the original article: Cybercriminals Use Atlantis AIO to Target 140+ Platforms

VanHelsingRaaS Expands Rapidly in Cybercrime Market

VanHelsingRaaS, a new ransomware-as-a-service program, infected three victims within two weeks of release, demanding ransoms of $500,000 This article has been indexed from www.infosecurity-magazine.com Read the original article: VanHelsingRaaS Expands Rapidly in Cybercrime Market

Ukraine Railway Systems Hit by Targeted Cyber-Attack

Ukraine’s national railway company has suffered a “large-scale” cyber-attack, disrupting online services and operations This article has been indexed from www.infosecurity-magazine.com Read the original article: Ukraine Railway Systems Hit by Targeted Cyber-Attack

Albabat Ransomware Evolves to Target Linux and macOS

Trend Micro observed a continuous development of Albabat ransomware, designed to expand attacks and streamline operations This article has been indexed from www.infosecurity-magazine.com Read the original article: Albabat Ransomware Evolves to Target Linux and macOS

Cybercriminals Exploit CheckPoint Antivirus Driver in Malicious Campaign

A security researcher has observed threat actors exploiting vulnerabilities in a driver used by CheckPoint’s ZoneAlarm antivirus to bypass Windows security measures This article has been indexed from www.infosecurity-magazine.com Read the original article: Cybercriminals Exploit CheckPoint Antivirus Driver in Malicious…

Attackers Use Fake CAPTCHAs to Deploy Lumma Stealer RAT

Attackers are exploiting user familiarity with CAPTCHAs to distribute the Lumma Stealer RAT via malicious PowerShell commands, according to HP This article has been indexed from www.infosecurity-magazine.com Read the original article: Attackers Use Fake CAPTCHAs to Deploy Lumma Stealer RAT

FishMonger APT Group Linked to I-SOON in Espionage Campaigns

The FishMonger APT Group has been linked with I-SOON, targeting governments, NGOs and think tanks in cyber-espionage campaigns This article has been indexed from www.infosecurity-magazine.com Read the original article: FishMonger APT Group Linked to I-SOON in Espionage Campaigns

UK Police Arrest 422 in Major Fraud Crackdown

February’s Operation Henhouse resulted in hundreds of arrests and the seizure of £7.5m This article has been indexed from www.infosecurity-magazine.com Read the original article: UK Police Arrest 422 in Major Fraud Crackdown

Over Half a Million Hit by Pennsylvania Schools Union Breach

The Pennsylvania State Education Association (PSEA) has sent breach notifications to over 500,000 current and former members This article has been indexed from www.infosecurity-magazine.com Read the original article: Over Half a Million Hit by Pennsylvania Schools Union Breach

NCSC Sets 2035 Deadline for Post-Quantum Cryptography Migration

New NCSC guidance sets out a three-phase migration to post-quantum cryptography, designed to ensure all systems are protected from quantum attacks by 2035 This article has been indexed from www.infosecurity-magazine.com Read the original article: NCSC Sets 2035 Deadline for Post-Quantum…

Windows Shortcut Flaw Exploited by 11 State-Sponsored Groups

Newly discovered vulnerability ZDI-CAN-25373 takes advantage of Windows shortcuts has been exploited by 11 state-sponsored groups since 2017 This article has been indexed from www.infosecurity-magazine.com Read the original article: Windows Shortcut Flaw Exploited by 11 State-Sponsored Groups

752,000 Browser Phishing Attacks Mark 140% Increase YoY

A surge in browser-based phishing attacks has been recorded over the past year, with a 140% increase compared to 2023 according to Menlo Security This article has been indexed from www.infosecurity-magazine.com Read the original article: 752,000 Browser Phishing Attacks Mark…

Fortinet Vulnerability Exploited in Ransomware Attack, CISA Warns

The US Cybersecurity and Infrastructure Security Agency added flaws in Fortinet and a popular GitHub Action to its Known Exploited Vulnerabilities catalog This article has been indexed from www.infosecurity-magazine.com Read the original article: Fortinet Vulnerability Exploited in Ransomware Attack, CISA…

New Report Highlights Common Passwords in RDP Attacks

Report reveals common password use in RDP attacks, highlighting weak credentials remain a major security flaw This article has been indexed from www.infosecurity-magazine.com Read the original article: New Report Highlights Common Passwords in RDP Attacks

Google Buys Wiz in $32bn Cloud Security Push

Google is set to acquire Wiz, a cloud security platform founded in 2020, for $32bn in an all-cash deal This article has been indexed from www.infosecurity-magazine.com Read the original article: Google Buys Wiz in $32bn Cloud Security Push

BlackBasta Ransomware Ties to Russian Authorities Uncovered

Leaked chat logs have exposed connections between the BlackBasta ransomware group and Russian authorities, according to new analysis by Trellix This article has been indexed from www.infosecurity-magazine.com Read the original article: BlackBasta Ransomware Ties to Russian Authorities Uncovered

Large-Scale Malicious App Campaign Bypassing Android Security

Bitdefender said the malicious app campaign has resulted in more than 60 million downloads of malicious apps from the Google Play Store This article has been indexed from www.infosecurity-magazine.com Read the original article: Large-Scale Malicious App Campaign Bypassing Android Security

UK’s Online Safety Act: Ofcom Can Now Issue Sanctions

From March 17, Ofcom will enforce rules requiring tech platforms operating in the UK to remove illegal content, including child abuse material This article has been indexed from www.infosecurity-magazine.com Read the original article: UK’s Online Safety Act: Ofcom Can Now…

Researchers Confirm BlackLock as Eldorado Rebrand

DarkAtlas researchers have uncovered a direct link between BlackLock and the Eldorado ransomware group, confirming a rebranded identity of the notorious threat actor This article has been indexed from www.infosecurity-magazine.com Read the original article: Researchers Confirm BlackLock as Eldorado Rebrand

Security Database Aims to Empower Non-Profits

Common Good Cyber has released a new mapping database designed to help NGOs find the security tools they need This article has been indexed from www.infosecurity-magazine.com Read the original article: Security Database Aims to Empower Non-Profits

LockBit Ransomware Developer Extradited to US

US authorities have extradited Rostislav Panev on charges of being a developer of the notorious LockBit ransomware This article has been indexed from www.infosecurity-magazine.com Read the original article: LockBit Ransomware Developer Extradited to US

Fraudsters Impersonate Clop Ransomware to Extort Businesses

Barracuda observed threat actors impersonating the Clop ransomware group via email to extort payments, claiming to have exfiltrated sensitive data This article has been indexed from www.infosecurity-magazine.com Read the original article: Fraudsters Impersonate Clop Ransomware to Extort Businesses

Volt Typhoon Accessed US OT Network for Nearly a Year

Volt Typhoon’s ten-month intrusion of Littleton Electric Light and Water Departments exposes vulnerabilities in the US electric grid This article has been indexed from www.infosecurity-magazine.com Read the original article: Volt Typhoon Accessed US OT Network for Nearly a Year

Tech Complexity Puts UK Cybersecurity at Risk

Palo Alto Networks found that nearly two-thirds of UK organizations cited technology complexity as the most significant challenge towards building a sophisticated security posture This article has been indexed from www.infosecurity-magazine.com Read the original article: Tech Complexity Puts UK Cybersecurity…

VC Investment in Cyber Startups Surges 35%

VC firms invested 35% more in cybersecurity startups in North America and Europe in Q4 2024 than a year previously This article has been indexed from www.infosecurity-magazine.com Read the original article: VC Investment in Cyber Startups Surges 35%

Trump Administration Shakes Up CISA with Staff and Funding Cuts

In a new round of cuts since Donald Trump became president, 100 people working with the US Cybersecurity and Infrastructure Agency saw their contracts terminated This article has been indexed from www.infosecurity-magazine.com Read the original article: Trump Administration Shakes Up…

Machine Identities Outnumber Humans Increasing Risk Seven-Fold

Surging machine identities, faster threat detection and fewer vulnerabilities are shaping cloud security according to a new report This article has been indexed from www.infosecurity-magazine.com Read the original article: Machine Identities Outnumber Humans Increasing Risk Seven-Fold

Chinese Hackers Implant Backdoor Malware on Juniper Routers

Mandiant revealed that Chinese espionage actor UNC3886 has deployed modified versions of the TinyShell backdoor across multiple Juniper OS routers This article has been indexed from www.infosecurity-magazine.com Read the original article: Chinese Hackers Implant Backdoor Malware on Juniper Routers

Microsoft Patches a Whopping Seven Zero-Days in March

Microsoft has fixed seven zero-days this Patch Tuesday, including one not currently being actively exploited This article has been indexed from www.infosecurity-magazine.com Read the original article: Microsoft Patches a Whopping Seven Zero-Days in March

New York Sues Allstate Over Data Breach and Security Failures

New York sues Allstate over data breach, alleging security failures that exposed the driver’s license numbers of nearly 200,000 individuals This article has been indexed from www.infosecurity-magazine.com Read the original article: New York Sues Allstate Over Data Breach and Security…

95% of Data Breaches Tied to Human Error in 2024

Mimecast found that insider threats, credential misuse and user-driven errors were involved in most security incidents last year This article has been indexed from www.infosecurity-magazine.com Read the original article: 95% of Data Breaches Tied to Human Error in 2024

Record Number of Girls Compete in CyberFirst Contest

More than 14,500 girls from across the UK took part in this year’s CyberFirst Girls competition This article has been indexed from www.infosecurity-magazine.com Read the original article: Record Number of Girls Compete in CyberFirst Contest

DDoS Blamed as X Suffers Multiple Outages

Pro-Palestine Dark Storm Team group claims responsibility for major DDoS attacks on X This article has been indexed from www.infosecurity-magazine.com Read the original article: DDoS Blamed as X Suffers Multiple Outages

SIM Swapping Fraud Surges in the Middle East

SIM swapping fraud surges in the Middle East as cybercriminals exploit websites mimicking legitimate services to steal personal data This article has been indexed from www.infosecurity-magazine.com Read the original article: SIM Swapping Fraud Surges in the Middle East

UK AI Research Under Threat From Nation-State Hackers

The Alan Turing institute urged government and academia to address systemic cultural and structural security barriers in UK AI research This article has been indexed from www.infosecurity-magazine.com Read the original article: UK AI Research Under Threat From Nation-State Hackers

Switzerland Mandates Cyber-Attack Reporting for Critical Infrastructure

Starting April 2025, Swiss critical infrastructure organizations will have to report cyber-attacks to the country’s authorities within 24 hours of discovery This article has been indexed from www.infosecurity-magazine.com Read the original article: Switzerland Mandates Cyber-Attack Reporting for Critical Infrastructure

Texas Developer Convicted After Kill Switch Sabotage Plot

Software developer Davis Lu cost his employer hundreds of thousands after deploying malware that caused crashes and failed logins This article has been indexed from www.infosecurity-magazine.com Read the original article: Texas Developer Convicted After Kill Switch Sabotage Plot

Majority of Orgs Hit by AI Cyber-Attacks as Detection Lags

AI-driven cyberattacks are rapidly escalating, with a vast majority of security professionals reporting encounters and anticipating a surge, while struggling with detection This article has been indexed from www.infosecurity-magazine.com Read the original article: Majority of Orgs Hit by AI Cyber-Attacks…

Attackers Target Japanese Firms with Cobalt Strike

Attackers are actively exploiting an RCE flaw in Windows PHP-CGI implementations to target Japanese firms, deploying Cobalt Strike for persistence This article has been indexed from www.infosecurity-magazine.com Read the original article: Attackers Target Japanese Firms with Cobalt Strike

Attackers Targeting Japanese Firms with Cobalt Strike

Attackers are actively exploiting an RCE flaw in Windows PHP-CGI implementations to target Japanese firms, deploying Cobalt Strike for persistence This article has been indexed from www.infosecurity-magazine.com Read the original article: Attackers Targeting Japanese Firms with Cobalt Strike

Cybersecurity Job Satisfaction Plummets, Women Hit Hardest

Layoffs and cutbacks have been cited as major factors in a significant drop in job satisfaction among women working in cybersecurity, according to ISC2 This article has been indexed from www.infosecurity-magazine.com Read the original article: Cybersecurity Job Satisfaction Plummets, Women…

Silk Typhoon Shifts Tactics to Exploit Common IT Solutions

Chinese espionage group Silk Typhoon is increasingly exploiting common IT solutions to infiltrate networks and exfiltrate data This article has been indexed from www.infosecurity-magazine.com Read the original article: Silk Typhoon Shifts Tactics to Exploit Common IT Solutions

Stress and Burnout Impacting Vast Majority of IT Pros

ISACA identified factors such as heavy workload and long hours as the primary causes of stress, while there has been high turnover of IT professionals in the past two years This article has been indexed from www.infosecurity-magazine.com Read the original…

New Cyber-Espionage Campaign Targets UAE Aviation and Transport

A cyber-espionage campaign targeting UAE aviation and transport has been identified by researchers, using customized lures to deploy Sosano malware This article has been indexed from www.infosecurity-magazine.com Read the original article: New Cyber-Espionage Campaign Targets UAE Aviation and Transport

CISO Liability Risks Spur Policy Changes at 93% of Organizations

Fastly found that organizations have introduced changes such as increasing CISO participation in strategic decisions in response to growing personal liability risks This article has been indexed from www.infosecurity-magazine.com Read the original article: CISO Liability Risks Spur Policy Changes at…

Attackers Leverage Microsoft Teams and Quick Assist for Access

Phishing attack exploits social engineering techniques alongside Microsoft Teams and remote access software to deploy BackConnect malware This article has been indexed from www.infosecurity-magazine.com Read the original article: Attackers Leverage Microsoft Teams and Quick Assist for Access

Vodafone Trials Quantum-Safe Tech to Protect Smartphone Browsing

Telecoms provider Vodafone has developed the new proof of concept with IBM, as it seeks to implement post-quantum cryptography ahead of anticipated quantum-based attacks This article has been indexed from www.infosecurity-magazine.com Read the original article: Vodafone Trials Quantum-Safe Tech to…

BYOVD Attacks Exploit Zero-Day in Paragon Partition Manager

Threat actors are exploiting a zero-day bug in Paragon Partition Manager’s BioNTdrv.sys driver during ransomware attacks This article has been indexed from www.infosecurity-magazine.com Read the original article: BYOVD Attacks Exploit Zero-Day in Paragon Partition Manager