G7 Sets 2034 Deadline for Finance to Adopt Quantum-Safe Systems Information Security Magazine 2 months 1 week ago The financial sector should finalize its post-quantum cryptography transition circa 2034, G7 cyber experts said
Microsoft Fixes Three Zero-Days on Busy Patch Tuesday Information Security Magazine 2 months 1 week ago Microsoft has patched three zero-day vulnerabilities in the first patch Tuesday of 2026, including one under active exploitation
Impersonation Fraud Drives Record $17bn in Crypto Losses Information Security Magazine 2 months 1 week ago Chainalysis estimates $17bn will be lost to crypto scams in 2025 as AI takes hold
CISA Flags Actively Exploited Gogs Vulnerability With No Patch Information Security Magazine 2 months 1 week ago A high-severity security flaw in the Gogs Git service is being actively exploited, leading to remote code execution
SHADOW#REACTOR Campaign Uses Text-Only Staging to Deploy Remcos RAT Information Security Magazine 2 months 1 week ago SHADOW#REACTOR is a multi-stage Windows malware campaign that stealthily deploys the Remcos RAT using complex infection techniques
Phishing Scams Exploit Browser-in-the-Browser Attacks to Steal Facebook Passwords Information Security Magazine 2 months 1 week ago Cybersecurity researchers issue warning over a surge in attacks designed to trick Facebook users into handing over login credentials
New Chinese-Made Malware Framework Targets Linux-Based Cloud Environments Information Security Magazine 2 months 1 week ago Detected by Check Point researchers, VoidLink is a sophisticated malware framework that can be used to implant malware in the most common cloud environments
Parliament Asks Security Pros to Shape Cyber Security and Resilience Bill Information Security Magazine 2 months 1 week ago Lawmakers want the security industry to help them scrutinize the Cyber Security and Resilience Bill
Global Magecart Campaign Targets Six Card Networks Information Security Magazine 2 months 1 week ago Silent Push has discovered a new Magecart campaign targeting six major payment network providers that has been running since 2022
Palo Alto Networks Introduces New Vibe Coding Security Governance Framework Information Security Magazine 2 months 1 week ago Researchers at Palo Alto’s Unit 42 have outlined a list of recommended security controls for vibe coding tools
CISA Closes Ten Emergency Directives After Federal Cyber Reviews Information Security Magazine 2 months 1 week ago US agency CISA has retired ten Emergency Directives issued between 2019 and 2024, marking a new step in managing federal cyber-risk
California Shuts Down Health Data Resales By Unregistered Brokers Information Security Magazine 2 months 1 week ago California privacy regulator, the CPPA, is cracking down on data brokers trading personal data without authorization
World Economic Forum: Cyber-fraud overtakes ransomware as business leaders' top cyber-security concern Information Security Magazine 2 months 1 week ago “Pervasive” threat of phishing, invoice scams and other cyber-enabled fraud is at “record highs”, warns WEF Cybersecurity Outlook 2026
Illicit Crypto Activity Hits Record $158bn in 2025 Information Security Magazine 2 months 1 week ago TRM Labs says illegal crypto flows into digital wallets increased to $158bn in 2025
BreachForums Database Leak Turns the Tables on Threat Actors Information Security Magazine 2 months 1 week ago A database featuring 300,000+ users of notorious hacking forum BreachForums has been leaked online
Europol Leads Global Crackdown on Black Axe Cybercrime Gang, 34 Arrested Information Security Magazine 2 months 1 week ago Europol-backed operation targets group behind numerous BEC attacks and romance scams
World Economic Forum: Deepfake Face-Swapping Tools Are Creating Critical Security Risks Information Security Magazine 2 months 1 week ago Researchers at the World Economic Forum have shown that threat actors can use commercial deepfake tools to bypass corporate security protections
AI-Powered Truman Show Operation Industrializes Investment Fraud Information Security Magazine 2 months 1 week ago Check Point has uncovered a vast, AI-powered scam operation dubbed the “Truman Show”
FBI Warns of North Korean QR Phishing Campaigns Information Security Magazine 2 months 1 week ago The FBI says North Korea’s Kimsuky APT group is using QR codes in spear phishing campaigns
GoBruteforcer Botnet Targets Linux Servers Information Security Magazine 2 months 2 weeks ago The GoBruteforcer botnet has been observed targeting exposed Linux servers on services like FTP and MySQL