Category: www.infosecurity-magazine.com

New Cyber-Espionage Campaign Targets UAE Aviation and Transport

A cyber-espionage campaign targeting UAE aviation and transport has been identified by researchers, using customized lures to deploy Sosano malware This article has been indexed from www.infosecurity-magazine.com Read the original article: New Cyber-Espionage Campaign Targets UAE Aviation and Transport

CISO Liability Risks Spur Policy Changes at 93% of Organizations

Fastly found that organizations have introduced changes such as increasing CISO participation in strategic decisions in response to growing personal liability risks This article has been indexed from www.infosecurity-magazine.com Read the original article: CISO Liability Risks Spur Policy Changes at…

Attackers Leverage Microsoft Teams and Quick Assist for Access

Phishing attack exploits social engineering techniques alongside Microsoft Teams and remote access software to deploy BackConnect malware This article has been indexed from www.infosecurity-magazine.com Read the original article: Attackers Leverage Microsoft Teams and Quick Assist for Access

Vodafone Trials Quantum-Safe Tech to Protect Smartphone Browsing

Telecoms provider Vodafone has developed the new proof of concept with IBM, as it seeks to implement post-quantum cryptography ahead of anticipated quantum-based attacks This article has been indexed from www.infosecurity-magazine.com Read the original article: Vodafone Trials Quantum-Safe Tech to…

BYOVD Attacks Exploit Zero-Day in Paragon Partition Manager

Threat actors are exploiting a zero-day bug in Paragon Partition Manager’s BioNTdrv.sys driver during ransomware attacks This article has been indexed from www.infosecurity-magazine.com Read the original article: BYOVD Attacks Exploit Zero-Day in Paragon Partition Manager

Third-Party Attacks Drive Major Financial Losses in 2024

Data from Resilience found that third-party attacks made up 23% of material cyber insurance claims in 2024, with ransomware attacks targeting vendors a major driver This article has been indexed from www.infosecurity-magazine.com Read the original article: Third-Party Attacks Drive Major…

Old Vulnerabilities Among the Most Widely Exploited

Four in ten flaws exploited by threat actors in 2024 were from 2020 or earlier, with some dating back to the 1990s, according to a GreyNoise report This article has been indexed from www.infosecurity-magazine.com Read the original article: Old Vulnerabilities…

Prolific Data Extortion Actor Arrested in Thailand

A joint operation between the Thai and Singapore police has resulted in the arrest of a man allegedly responsible for over 90 data extortion attacks worldwide This article has been indexed from www.infosecurity-magazine.com Read the original article: Prolific Data Extortion…

Software Vulnerabilities Take Almost Nine Months to Patch

Veracode found a 47% increase in the average time taken to patch software vulnerabilities, driven by growing reliance on third-party code This article has been indexed from www.infosecurity-magazine.com Read the original article: Software Vulnerabilities Take Almost Nine Months to Patch

Chinese Cyber Espionage Jumps 150%, CrowdStrike Finds

In its 2025 Global Threat Report, CrowdStrike observed a significant escalation in Chinese cyber espionage activities This article has been indexed from www.infosecurity-magazine.com Read the original article: Chinese Cyber Espionage Jumps 150%, CrowdStrike Finds

Signal May Exit Sweden If Government Imposes Encryption Backdoor

Meredith Whittaker, Signal’s CEO, has threatened to pull the company out of Sweden if a proposed government bill requiring encryption backdoors becomes law This article has been indexed from www.infosecurity-magazine.com Read the original article: Signal May Exit Sweden If Government…

Ransomware Gang Publishes Stolen Genea IVF Patient Data

IVF clinic Genea has confirmed that stolen patient data has been published online, with the Termite ransomware group appearing to be the perpetrators This article has been indexed from www.infosecurity-magazine.com Read the original article: Ransomware Gang Publishes Stolen Genea IVF…

Geopolitical Tension Fuels APT and Hacktivism Surge

Europe is hit hard as geopolitics drives increase in state-backed APT and hacktivist activity This article has been indexed from www.infosecurity-magazine.com Read the original article: Geopolitical Tension Fuels APT and Hacktivism Surge

Only a Fifth of Ransomware Attacks Now Encrypt Data

ReliaQuest claims 80% of ransomware attacks now focus solely on exfiltrating data as it is faster This article has been indexed from www.infosecurity-magazine.com Read the original article: Only a Fifth of Ransomware Attacks Now Encrypt Data

Chinese Botnet Bypasses MFA in Microsoft 365 Attacks

SecurityScorecard revealed that the large-scale password spraying campaign can bypass MFA and security access policies by utilizing Non-interactive sign-ins This article has been indexed from www.infosecurity-magazine.com Read the original article: Chinese Botnet Bypasses MFA in Microsoft 365 Attacks

Quarter of Brits Report Deepfake Phone Scams

New Hiya data finds 26% of UK consumers encountered a deepfake scam call in Q4 2024 This article has been indexed from www.infosecurity-magazine.com Read the original article: Quarter of Brits Report Deepfake Phone Scams

Michigan Man Indicted for Dark Web Credential Fraud

Michigan man indicted for dark web credential fraud, purchased 2,500 logins from Genesis Market This article has been indexed from www.infosecurity-magazine.com Read the original article: Michigan Man Indicted for Dark Web Credential Fraud

Google Cloud Shields Data With Quantum-Resistant Digital Signatures

Google Cloud’s Key Management Service now features quantum-safe digital signatures to strengthen data integrity and prepare for emerging quantum computing challenges This article has been indexed from www.infosecurity-magazine.com Read the original article: Google Cloud Shields Data With Quantum-Resistant Digital Signatures

IT/OT Convergence Fuels Manufacturing Cyber Incidents

Telstra found that 75% of cyber incidents impacting manufacturing firms originated from the targeting of IT systems connected to OT environments This article has been indexed from www.infosecurity-magazine.com Read the original article: IT/OT Convergence Fuels Manufacturing Cyber Incidents

BlackBasta Ransomware Chatlogs Leaked Online

BlackBasta’s internal chatlogs are “highly useful from a threat intelligence perspective,” said Prodaft, the firm that revealed the leak This article has been indexed from www.infosecurity-magazine.com Read the original article: BlackBasta Ransomware Chatlogs Leaked Online

Mobile Phishing Attacks Surge with 16% of Incidents in US

Mobile phishing attacks surged in 2024, with 16% of all incidents occurring in the US, according to a new Zimperium report This article has been indexed from www.infosecurity-magazine.com Read the original article: Mobile Phishing Attacks Surge with 16% of Incidents…

West Coast Cybersecurity Salaries Outshine Rest of Country

A survey by IANS and Artico found significant regional variation in cybersecurity salary levels across North America This article has been indexed from www.infosecurity-magazine.com Read the original article: West Coast Cybersecurity Salaries Outshine Rest of Country

Over 330 Million Credentials Compromised by Infostealers

Kela researchers 330 million compromised credentials to infostealer activity on over four million machines in 2024 This article has been indexed from www.infosecurity-magazine.com Read the original article: Over 330 Million Credentials Compromised by Infostealers

WordPress Plugin Vulnerability Exposes 90,000 Sites to Attack

A flaw in the Jupiter X Core plugin has been identified, allowing upload of malicious SVG files and remote code execution on vulnerable servers This article has been indexed from www.infosecurity-magazine.com Read the original article: WordPress Plugin Vulnerability Exposes 90,000…

Finastra Notifies Customers of Data Breach

Finastra notifies customers of data breach that took place more than three months ago, impacting sensitive financial information This article has been indexed from www.infosecurity-magazine.com Read the original article: Finastra Notifies Customers of Data Breach

Australian IVF Clinic Suffers Data Breach Following Cyber Incident

Australia-based Genea said it is investigating the cyber incident to determine whether any personal data was accessed by an unauthorized third party This article has been indexed from www.infosecurity-magazine.com Read the original article: Australian IVF Clinic Suffers Data Breach Following…

Cyber Investor Insight Partners Suffers Security Breach

Venture capital firm Insight Partners, which counts Recorded Future, SentinelOne and Wiz in its portfolio, confirmed an intrusion into its systems via a social engineering attack This article has been indexed from www.infosecurity-magazine.com Read the original article: Cyber Investor Insight…

Russian State Hackers Target Signal to Spy on Ukrainians

Google has warned that Russian state-backed hackers are targeting Signal to eavesdrop on persons of interest in Ukraine This article has been indexed from www.infosecurity-magazine.com Read the original article: Russian State Hackers Target Signal to Spy on Ukrainians

Hundreds of US Military and Defense Credentials Compromised

Hudson Rock has found evidence that infostealers have compromised hundreds of US military and defense contractor credentials This article has been indexed from www.infosecurity-magazine.com Read the original article: Hundreds of US Military and Defense Credentials Compromised

OpenSSH Flaws Expose Systems to Critical Attacks

Significant OpenSSH flaws are exposing systems to man-in-the-middle and denial-of service attacks This article has been indexed from www.infosecurity-magazine.com Read the original article: OpenSSH Flaws Expose Systems to Critical Attacks

Evolving Snake Keylogger Variant Targets Windows Users

A new Snake Keylogger variant, responsible for over 280 million blocked infection attempts worldwide, has been identified targeting Windows users This article has been indexed from www.infosecurity-magazine.com Read the original article: Evolving Snake Keylogger Variant Targets Windows Users

Proofpoint Uncovers FrigidStealer, A New MacOS Infostealer

Proofpoint also identified two new threat actors operating components of web inject campaigns, TA2726 and TA2727 This article has been indexed from www.infosecurity-magazine.com Read the original article: Proofpoint Uncovers FrigidStealer, A New MacOS Infostealer

Zacks Investment Research Breach Hits 12 Million

A threat actor claims to have hacked and published data on 12 million Zacks Investment Research accounts This article has been indexed from www.infosecurity-magazine.com Read the original article: Zacks Investment Research Breach Hits 12 Million

Microsoft Detects New XCSSET MacOS Malware Variant

Microsoft has observed a new variant of XCSSET, a sophisticated macOS malware that infects Xcode projects This article has been indexed from www.infosecurity-magazine.com Read the original article: Microsoft Detects New XCSSET MacOS Malware Variant

South Korea Suspends Downloads of AI Chatbot DeepSeek

South Korea’s Personal Information Protection Commission is blocking DeepSeek AI downloads over privacy concerns This article has been indexed from www.infosecurity-magazine.com Read the original article: South Korea Suspends Downloads of AI Chatbot DeepSeek

Telegram Used as C2 Channel for New Golang Malware

A Golang backdoor is using Telegram as its command and control (C2) channel, an approach that makes detection harder for defenders, according to Netskope researchers This article has been indexed from www.infosecurity-magazine.com Read the original article: Telegram Used as C2…

Palo Alto Networks and SonicWall Firewalls Under Attack

Vulnerabilities in firewalls from Palo Alto Networks and SonicWall are currently under active exploitation This article has been indexed from www.infosecurity-magazine.com Read the original article: Palo Alto Networks and SonicWall Firewalls Under Attack

China-Linked Espionage Tools Used in Recent Ransomware Attack

Symantec found that tools previously only used by Chinese nation-state espionage actors were deployed in a ransomware attack This article has been indexed from www.infosecurity-magazine.com Read the original article: China-Linked Espionage Tools Used in Recent Ransomware Attack

CISA and FBI Warn Against Buffer Overflow Vulnerabilities

US agencies have issued a new alert to eliminate buffer overflow vulnerabilities, urging memory-safe programming for secure-by-design software development This article has been indexed from www.infosecurity-magazine.com Read the original article: CISA and FBI Warn Against Buffer Overflow Vulnerabilities

Astaroth Phishing Kit Bypasses 2FA Using Reverse Proxy Techniques

Astaroth is an advanced phishing kit using real-time credential and session cookie capture to compromise Gmail, Yahoo and Office 365 accounts This article has been indexed from www.infosecurity-magazine.com Read the original article: Astaroth Phishing Kit Bypasses 2FA Using Reverse Proxy…

Romance Baiting Losses Surge 40% Annually

Ahead of Valentine’s Day, Chainalysis figures reveal 40% increase in losses to pig butchering, or romance baiting, scams This article has been indexed from www.infosecurity-magazine.com Read the original article: Romance Baiting Losses Surge 40% Annually

North Korea Targets Crypto Devs Through NPM Packages

SecurityScorecard has uncovered a sophisticated campaign linked to North Korea’s Lazarus Group, distributing crypto-stealing malware This article has been indexed from www.infosecurity-magazine.com Read the original article: North Korea Targets Crypto Devs Through NPM Packages

Romance Scams Cost Americans $697.3M Last Year

Romance scams cost Americans $697.3m in 2024, with crypto fraud schemes on the rise This article has been indexed from www.infosecurity-magazine.com Read the original article: Romance Scams Cost Americans $697.3M Last Year

Alabama Hacker Admits Role in SEC X Account Breach

An Alabama man has admitted hacking into the US Security and Exchange Commission’s X account using SIM swap fraud to gain access This article has been indexed from www.infosecurity-magazine.com Read the original article: Alabama Hacker Admits Role in SEC X…

DDoS Attack Volume and Magnitude Continues to Soar

Gcore reported a 56% year-over-year rise in DDoS attacks in H2 2024, highlighting a steep long-term growth tend for the attack technique This article has been indexed from www.infosecurity-magazine.com Read the original article: DDoS Attack Volume and Magnitude Continues to…

OpenAI Was Not Breached, Say Researchers

Kela researchers explain that infostealers are to blame for compromised OpenAI logins This article has been indexed from www.infosecurity-magazine.com Read the original article: OpenAI Was Not Breached, Say Researchers

BadIIS Malware Exploits IIS Servers for SEO Fraud

Trend Micro uncovers BadIIS malware exploiting IIS servers for SEO fraud and malicious redirects This article has been indexed from www.infosecurity-magazine.com Read the original article: BadIIS Malware Exploits IIS Servers for SEO Fraud

US: Man Gets 20 Years for $37m Crypto Heist

A US resident based in Indiana was charged with cyber intrusion and cryptocurrency theft conspiracies This article has been indexed from www.infosecurity-magazine.com Read the original article: US: Man Gets 20 Years for $37m Crypto Heist

Georgia Hospital Alerts 120,000 Individuals of Data Breach

Memorial Hospital and Manor, located in Bainbridge, Georgia, has alerted 120,000 individuals that their data was breached following a ransomware attack last November This article has been indexed from www.infosecurity-magazine.com Read the original article: Georgia Hospital Alerts 120,000 Individuals of…

UK Military Fast-Tracks Cybersecurity Recruitment

The UK MoD has announced it is fast-tracking the recruitment of specialist cybersecurity roles, with recruits offered a starting salary of above £40,000 This article has been indexed from www.infosecurity-magazine.com Read the original article: UK Military Fast-Tracks Cybersecurity Recruitment

Experts Dismayed at UK’s Apple Decryption Demands

Security and privacy experts have questioned a new demand from the UK Home Office on Apple’s encrypted iCloud service This article has been indexed from www.infosecurity-magazine.com Read the original article: Experts Dismayed at UK’s Apple Decryption Demands