Tag: www.infosecurity-magazine.com

Compliance Now Biggest Cyber Challenge for UK Financial Services

Regulatory compliance and data protection were the biggest cybersecurity challenges cited by UK financial organizations, according to a Bridewell survey This article has been indexed from www.infosecurity-magazine.com Read the original article: Compliance Now Biggest Cyber Challenge for UK Financial Services

LabHost Phishing Mastermind Sentenced to 8.5 Years

A UK man has been sentenced to over eight years for masterminding £100m phishing platform LabHost This article has been indexed from www.infosecurity-magazine.com Read the original article: LabHost Phishing Mastermind Sentenced to 8.5 Years

Major WordPress Plugin Flaw Exploited in Under 4 Hours

Flaw in SureTriggers plugin allows unauthenticated users to create admin accounts on WordPress sites This article has been indexed from www.infosecurity-magazine.com Read the original article: Major WordPress Plugin Flaw Exploited in Under 4 Hours

US Blocks Foreign Governments from Acquiring Citizen Data

The US government has implemented a program that applies export controls on data transactions to certain countries of concern, including China and Russia This article has been indexed from www.infosecurity-magazine.com Read the original article: US Blocks Foreign Governments from Acquiring…

NVD Revamps Operations as Vulnerability Reporting Surges

The NVD program manager has announced undergoing process improvements to catch up with its growing vulnerability backlog This article has been indexed from www.infosecurity-magazine.com Read the original article: NVD Revamps Operations as Vulnerability Reporting Surges

Cyble Urges Critical Vulnerability Fixes Affecting Industrial Systems

Rockwell Automation, Hitachi Energy and Inaba Denki Sangyo have products affected by critical vulnerabilities carrying severity ratings as high as 9.9 This article has been indexed from www.infosecurity-magazine.com Read the original article: Cyble Urges Critical Vulnerability Fixes Affecting Industrial Systems

Google Cloud: China Achieves “Cyber Superpower” Status

Google Cloud’s Sandra Joyce said that Chinese state actors’ advanced techniques and ability to stay undetected pose huge challenges This article has been indexed from www.infosecurity-magazine.com Read the original article: Google Cloud: China Achieves “Cyber Superpower” Status

Ransomware Attacks Hit All-Time High as Payoffs Dwindle

While ransomware attack claims are at an all-time high, financial losses from actual attacks may be reducing This article has been indexed from www.infosecurity-magazine.com Read the original article: Ransomware Attacks Hit All-Time High as Payoffs Dwindle

Microsoft Fixes Over 130 CVEs in April Patch Tuesday

Microsoft has issued security updates to fix 130+ vulnerabilities this month, including one zero-day This article has been indexed from www.infosecurity-magazine.com Read the original article: Microsoft Fixes Over 130 CVEs in April Patch Tuesday

CISA Warns of CrushFTP Vulnerability Exploitation in the Wild

The US Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2025-31161 to its Known Exploited Vulnerabilities (KEV) catalog This article has been indexed from www.infosecurity-magazine.com Read the original article: CISA Warns of CrushFTP Vulnerability Exploitation in the Wild

Boards Urged to Follow New Cyber Code of Practice

The British government has launched a new code of practice designed to boost corporate cyber governance This article has been indexed from www.infosecurity-magazine.com Read the original article: Boards Urged to Follow New Cyber Code of Practice

Malicious Microsoft VS Code Extensions Used in Cryptojacking Campaign

Security researchers from ExtensionTotal have found nine malicious extensions in Visual Studio Code, Microsoft’s lightweight source-code editor This article has been indexed from www.infosecurity-magazine.com Read the original article: Malicious Microsoft VS Code Extensions Used in Cryptojacking Campaign

Cyber Agencies Warn of Fast Flux Threat Bypassing Network Defenses

A joint cybersecurity advisory warns organizations globally about the defense gap in detecting and blocking fast flux techniques, which are exploited for malicious activities This article has been indexed from www.infosecurity-magazine.com Read the original article: Cyber Agencies Warn of Fast…

Chinese State Hackers Exploiting Newly Disclosed Ivanti Flaw

Mandiant warned that Chinese espionage actor UNC5221 is actively exploiting a critical Ivanti vulnerability, which can lead to remote code execution This article has been indexed from www.infosecurity-magazine.com Read the original article: Chinese State Hackers Exploiting Newly Disclosed Ivanti Flaw

Major Online Platform for Child Exploitation Dismantled

An international law enforcement operation has shut down Kidflix, a platform for child sexual exploitation with 1.8m registered users This article has been indexed from www.infosecurity-magazine.com Read the original article: Major Online Platform for Child Exploitation Dismantled

CrushFTP Vulnerability Exploited Following Disclosure Issues

A critical authentication bypass flaw in CrushFTP is under active exploitation following a mishandled disclosure process This article has been indexed from www.infosecurity-magazine.com Read the original article: CrushFTP Vulnerability Exploited Following Disclosure Issues

Sensitive Data Breached in Highline Schools Ransomware Incident

Highline Public Schools revealed that sensitive personal, financial and medical data was accessed by ransomware attackers during the September 2024 incident This article has been indexed from www.infosecurity-magazine.com Read the original article: Sensitive Data Breached in Highline Schools Ransomware Incident

Stripe API Skimming Campaign Unveils New Techniques for Theft

A novel skimming attack has been observed by Jscramber, using the Stripe API to steal payment information by injecting malicious scripts into pages This article has been indexed from www.infosecurity-magazine.com Read the original article: Stripe API Skimming Campaign Unveils New…

Gray Bots Surge as Generative AI Scraper Activity Increases

Gray bots surge as generative AI scraper activity increases, impacting web applications with millions of requests daily This article has been indexed from www.infosecurity-magazine.com Read the original article: Gray Bots Surge as Generative AI Scraper Activity Increases

North Korea’s Fake IT Worker Scheme Sets Sights on Europe

Google has found a significant increase in North Korean actors attempting to gain employment as IT workers in European companies, leading to data theft and extortion This article has been indexed from www.infosecurity-magazine.com Read the original article: North Korea’s Fake…

Steam Surges to Top of Most Spoofed Brands List in Q1

Gaming community Steam appeared most often in phishing emails and texts detected by Guardio in Q1 2025 This article has been indexed from www.infosecurity-magazine.com Read the original article: Steam Surges to Top of Most Spoofed Brands List in Q1

ICO Apologizes After Data Protection Response Snafu

The UK’s data protection regulator says it is overwhelmed with complaints from the public This article has been indexed from www.infosecurity-magazine.com Read the original article: ICO Apologizes After Data Protection Response Snafu

Google to Switch on E2EE for All Gmail Users

Google is set to roll out end-to-end encryption for all Gmail users, boosting security, compliance and data sovereignty efforts This article has been indexed from www.infosecurity-magazine.com Read the original article: Google to Switch on E2EE for All Gmail Users

Cybercriminals Expand Use of Lookalike Domains in Email Attacks

BlueVoyant found that the use of lookalike domains in email-based attacks is allowing actors to extend the types of individuals and organizations being targeted This article has been indexed from www.infosecurity-magazine.com Read the original article: Cybercriminals Expand Use of Lookalike…

New Malware Variant RESURGE Exploits Ivanti Vulnerability

CISA recommends immediate action to address malware variant RESURGE exploiting Ivanti vulnerability CVE-2025-0282 This article has been indexed from www.infosecurity-magazine.com Read the original article: New Malware Variant RESURGE Exploits Ivanti Vulnerability

EU Commission to Invest €1.3bn in Cybersecurity and AI

The funding will go to several projects within the Digital Europe Programme (DIGITAL) work program for 2025 to 2027 This article has been indexed from www.infosecurity-magazine.com Read the original article: EU Commission to Invest €1.3bn in Cybersecurity and AI

NCSC Urges Users to Patch Next.js Flaw Immediately

The UK’s National Cyber Security Agency has called on Next.js users to patch CVE-2025-29927 This article has been indexed from www.infosecurity-magazine.com Read the original article: NCSC Urges Users to Patch Next.js Flaw Immediately

US Seizes $8.2m from Romance Baiting Scammers

The DoJ has managed to recoup over $8m from scammers, stolen in romance baiting schemes This article has been indexed from www.infosecurity-magazine.com Read the original article: US Seizes $8.2m from Romance Baiting Scammers

Solar Power System Vulnerabilities Could Result in Blackouts

Forescout researchers found multiple vulnerabilities in leading solar power system manufacturers, which could be exploited to cause emergencies and blackouts This article has been indexed from www.infosecurity-magazine.com Read the original article: Solar Power System Vulnerabilities Could Result in Blackouts

Trump CISA Cuts Threaten US Election Integrity, Experts Warn

Expert speakers discussed the impact of reported cutbacks to CISA on the ability of local officials to protect against surging cyber-attacks on US election infrastructure This article has been indexed from www.infosecurity-magazine.com Read the original article: Trump CISA Cuts Threaten…

Morphing Meerkat PhaaS Platform Spoofs 100+ Brands

A PhaaS platform, dubbed ‘Morphing Meerkat,’ uses DNS MX records to spoof over 100 brands and steal credentials, according to Infoblox Threat Intel This article has been indexed from www.infosecurity-magazine.com Read the original article: Morphing Meerkat PhaaS Platform Spoofs 100+…

CoffeeLoader Malware Loader Linked to SmokeLoader Operations

Newly identified CoffeeLoader uses multiple evasion techniques and persistence mechanisms to deploy payloads and bypass endpoint security This article has been indexed from www.infosecurity-magazine.com Read the original article: CoffeeLoader Malware Loader Linked to SmokeLoader Operations

No MFA? Expect Hefty Fines, UK’s ICO Warns

The ICO’s Deputy Commissioner told Infosecurity that organizations that fail to implement MFA and suffer a breach can expect heavy penalties This article has been indexed from www.infosecurity-magazine.com Read the original article: No MFA? Expect Hefty Fines, UK’s ICO Warns

Chinese Spy Group FamousSparrow Back with a Vengeance, Targets US

Once considered inactive, the Chinese cyber espionage group FamousSparrow has reemerged, targeting organizations across the US, Mexico and Honduras This article has been indexed from www.infosecurity-magazine.com Read the original article: Chinese Spy Group FamousSparrow Back with a Vengeance, Targets US

NCA Warns of Sadistic Online “Com” Networks

The UK’s National Crime Agency is warning of a growing cyber and physical threat from homegrown teens This article has been indexed from www.infosecurity-magazine.com Read the original article: NCA Warns of Sadistic Online “Com” Networks

NCSC Urges Domain Registrars to Improve Security

The UK’s National Cyber Security Centre has released new guidance to help domain registrars enhance security This article has been indexed from www.infosecurity-magazine.com Read the original article: NCSC Urges Domain Registrars to Improve Security

SecurityScorecard Observes Surge in Third-Party Breaches

In its 2025 Global Third-Party Breach Report, SecurityScorecard has found that 35.5% of all cyber breaches in 2024 were third-party related, up from 29% in 2023 This article has been indexed from www.infosecurity-magazine.com Read the original article: SecurityScorecard Observes Surge…

Threat Actors Abuse Trust in Cloud Collaboration Platforms

Threat actors are exploiting cloud platforms like Adobe and Dropbox to evade email gateways and steal credentials This article has been indexed from www.infosecurity-magazine.com Read the original article: Threat Actors Abuse Trust in Cloud Collaboration Platforms

Malicious npm Packages Deliver Sophisticated Reverse Shells

A newly discovered malware campaign uses malicious npm packages to deploy reverse shells, compromising development environments This article has been indexed from www.infosecurity-magazine.com Read the original article: Malicious npm Packages Deliver Sophisticated Reverse Shells

ETSI Publishes New Quantum-Safe Encryption Standards

Standards body ETSI has defined a scheme for key encapsulation mechanisms with access control (KEMAC), enabling quantum-secure encryption This article has been indexed from www.infosecurity-magazine.com Read the original article: ETSI Publishes New Quantum-Safe Encryption Standards

ENISA Probes Space Threat Landscape in New Report

EU security agency ENISA has released a new report outlining the threats and potential mitigations for the space sector This article has been indexed from www.infosecurity-magazine.com Read the original article: ENISA Probes Space Threat Landscape in New Report

New Android Malware Uses .NET MAUI to Evade Detection

McAfee researchers have identified a new wave of Android malware campaigns leveraging .NET MAUI to steal sensitive user information through fake apps This article has been indexed from www.infosecurity-magazine.com Read the original article: New Android Malware Uses .NET MAUI to…

Cybercriminals Use Atlantis AIO to Target 140+ Platforms

Cybercriminals are increasingly leveraging Atlantis AIO, which automates credential stuffing attacks across more than 140 platforms This article has been indexed from www.infosecurity-magazine.com Read the original article: Cybercriminals Use Atlantis AIO to Target 140+ Platforms

VanHelsingRaaS Expands Rapidly in Cybercrime Market

VanHelsingRaaS, a new ransomware-as-a-service program, infected three victims within two weeks of release, demanding ransoms of $500,000 This article has been indexed from www.infosecurity-magazine.com Read the original article: VanHelsingRaaS Expands Rapidly in Cybercrime Market

Ukraine Railway Systems Hit by Targeted Cyber-Attack

Ukraine’s national railway company has suffered a “large-scale” cyber-attack, disrupting online services and operations This article has been indexed from www.infosecurity-magazine.com Read the original article: Ukraine Railway Systems Hit by Targeted Cyber-Attack

Albabat Ransomware Evolves to Target Linux and macOS

Trend Micro observed a continuous development of Albabat ransomware, designed to expand attacks and streamline operations This article has been indexed from www.infosecurity-magazine.com Read the original article: Albabat Ransomware Evolves to Target Linux and macOS

Cybercriminals Exploit CheckPoint Antivirus Driver in Malicious Campaign

A security researcher has observed threat actors exploiting vulnerabilities in a driver used by CheckPoint’s ZoneAlarm antivirus to bypass Windows security measures This article has been indexed from www.infosecurity-magazine.com Read the original article: Cybercriminals Exploit CheckPoint Antivirus Driver in Malicious…

Attackers Use Fake CAPTCHAs to Deploy Lumma Stealer RAT

Attackers are exploiting user familiarity with CAPTCHAs to distribute the Lumma Stealer RAT via malicious PowerShell commands, according to HP This article has been indexed from www.infosecurity-magazine.com Read the original article: Attackers Use Fake CAPTCHAs to Deploy Lumma Stealer RAT

FishMonger APT Group Linked to I-SOON in Espionage Campaigns

The FishMonger APT Group has been linked with I-SOON, targeting governments, NGOs and think tanks in cyber-espionage campaigns This article has been indexed from www.infosecurity-magazine.com Read the original article: FishMonger APT Group Linked to I-SOON in Espionage Campaigns

UK Police Arrest 422 in Major Fraud Crackdown

February’s Operation Henhouse resulted in hundreds of arrests and the seizure of £7.5m This article has been indexed from www.infosecurity-magazine.com Read the original article: UK Police Arrest 422 in Major Fraud Crackdown

Over Half a Million Hit by Pennsylvania Schools Union Breach

The Pennsylvania State Education Association (PSEA) has sent breach notifications to over 500,000 current and former members This article has been indexed from www.infosecurity-magazine.com Read the original article: Over Half a Million Hit by Pennsylvania Schools Union Breach