Threat Actors Abuse Trust in Cloud Collaboration Platforms(link is external) Information Security Magazine 3 weeks ago Threat actors are exploiting cloud platforms like Adobe and Dropbox to evade email gateways and steal credentials
Malicious npm Packages Deliver Sophisticated Reverse Shells(link is external) Information Security Magazine 3 weeks ago A newly discovered malware campaign uses malicious npm packages to deploy reverse shells, compromising development environments
ETSI Publishes New Quantum-Safe Encryption Standards(link is external) Information Security Magazine 3 weeks ago Standards body ETSI has defined a scheme for key encapsulation mechanisms with access control (KEMAC), enabling quantum-secure encryption
ENISA Probes Space Threat Landscape in New Report(link is external) Information Security Magazine 3 weeks ago EU security agency ENISA has released a new report outlining the threats and potential mitigations for the space sector
UK Government’s New Fraud Strategy to Focus on Tech-Enabled Threats(link is external) Information Security Magazine 3 weeks ago The UK government’s new fraud minister will today announce plans for a newly expanded fraud strategy
New Android Malware Uses .NET MAUI to Evade Detection(link is external) Information Security Magazine 3 weeks 1 day ago McAfee researchers have identified a new wave of Android malware campaigns leveraging .NET MAUI to steal sensitive user information through fake apps
Cybercriminals Use Atlantis AIO to Target 140+ Platforms(link is external) Information Security Magazine 3 weeks 1 day ago Cybercriminals are increasingly leveraging Atlantis AIO, which automates credential stuffing attacks across more than 140 platforms
NIST Warns of Significant Limitations in AI/ML Security Mitigations(link is external) Information Security Magazine 3 weeks 1 day ago NIST has urged more research and emphasis on developing mitigations for attacks on AI and ML systems
China-Linked Weaver Ant Hackers Exposed After Four-Year Telco Infiltration(link is external) Information Security Magazine 3 weeks 1 day ago Sygnia has uncovered Weaver Ant, a Chinese threat actor that spied on telecommunications networks for years
Dark Web Mentions of Malicious AI Tools Spike 200%(link is external) Information Security Magazine 3 weeks 1 day ago Kela researchers detect a 200%+ increase in dark web chatter about malicious AI tools
IngressNightmare: Four Critical Bugs Found in 40% of Cloud Systems(link is external) Information Security Magazine 3 weeks 1 day ago Wiz Security finds four critical RCE vulnerabilities in the Ingress NGINX Controller for Kubernetes
VanHelsingRaaS Expands Rapidly in Cybercrime Market(link is external) Information Security Magazine 3 weeks 2 days ago VanHelsingRaaS, a new ransomware-as-a-service program, infected three victims within two weeks of release, demanding ransoms of $500,000
Ukraine Railway Systems Hit by Targeted Cyber-Attack(link is external) Information Security Magazine 3 weeks 2 days ago Ukraine’s national railway company has suffered a “large-scale” cyber-attack, disrupting online services and operations
Authorities Seize 1842 Devices in Africa’s Cybercrime Crackdown(link is external) Information Security Magazine 3 weeks 2 days ago Authorities in seven African countries have arrested 306 suspects and seized 1842 devices in Operation Red Card
California AG Reminds 23andMe Customers of Data Deletion Rights Amid Bankruptcy Filing(link is external) Information Security Magazine 3 weeks 2 days ago Two years after a data breach that compromised almost seven million customers, 23andMe's CEO has resigned as the company files for bankruptcy
Teen Boys at Risk of Sextortion as 74% Lack Basic Awareness(link is external) Information Security Magazine 3 weeks 2 days ago The UK’s National Crime Agency has launched a new campaign designed to raise awareness of sextortion among teenage boys
Google Account Hijackers Target Victims Via Semrush Ads(link is external) Information Security Magazine 3 weeks 2 days ago Threat actors are looking to compromise Google accounts to further malvertising and data theft
Albabat Ransomware Evolves to Target Linux and macOS(link is external) Information Security Magazine 3 weeks 5 days ago Trend Micro observed a continuous development of Albabat ransomware, designed to expand attacks and streamline operations
Cybercriminals Exploit CheckPoint Antivirus Driver in Malicious Campaign(link is external) Information Security Magazine 3 weeks 5 days ago A security researcher has observed threat actors exploiting vulnerabilities in a driver used by CheckPoint’s ZoneAlarm antivirus to bypass Windows security measures
Attackers Use Fake CAPTCHAs to Deploy Lumma Stealer RAT(link is external) Information Security Magazine 3 weeks 5 days ago Attackers are exploiting user familiarity with CAPTCHAs to distribute the Lumma Stealer RAT via malicious PowerShell commands, according to HP