Criminal Proxy Network Infects Thousands of IoT Devices Information Security Magazine 6 months 3 weeks ago The criminal proxy network infected thousands of IoT and end-of-life devices, creating dangerous botnet
#Infosec2025: Experts to Shine Light on Vendor Supply Chain Resilience Against Third-Party Risks Information Security Magazine 6 months 3 weeks ago During Infosecurity Europe 2025 experts will explore how to strengthen organizational resilience against persistent third-party risks
EU Launches Free Entry-Level Cyber Training Program Information Security Magazine 6 months 3 weeks ago She@Cyber training program is focused on improving the representation of women and other underrepresented groups in the cybersecurity industry
FreeDrain Phishing Scam Drains Crypto Hobbyists' Wallets Information Security Magazine 6 months 3 weeks ago A global cryptocurrency phishing operation likely based in India or Sri Lanka has been stealing digital assets since at least 2022
Japanese Account Hijackers Make $2bn+ of Illegal Trades Information Security Magazine 6 months 3 weeks ago Hackers have compromised Japanese trading accounts in an apparent attempt to manipulate the stock market
German Police Shutter “eXch” Money Laundering Service Information Security Magazine 6 months 3 weeks ago Germany’s BKA has seized the infrastructure behind the crypto swapping service eXch
Google Deploys On-Device AI to Thwart Scams on Chrome and Android Information Security Magazine 6 months 3 weeks ago The tech giant plans to leverage its Gemini Nano LLM on-device to enhance scam detection on Chrome
UN Launches New Cyber-Attack Assessment Framework Information Security Magazine 6 months 3 weeks ago The UNIDR Intrusion Path is designed to provide a simplified view of cyber-threats and security across the network perimeter
FBI Sounds Alarm on Rogue Cybercrime Services Targeting Obsolete Routers Information Security Magazine 6 months 3 weeks ago The FBI has detected indicators of malware targeting end-of-life routers associated with Anyproxy and 5Socks proxy services
PowerSchool Admits Ransom Payment Amid Fresh Extortion Demands Information Security Magazine 6 months 3 weeks ago PowerSchool said its customers had been hit by new extortion demands using data stolen in a previous attack, despite attacker claims the data had been deleted
US Federal Agencies Alert on “Unsophisticated” OT Cyber-Threats Information Security Magazine 6 months 4 weeks ago Cyber incidents targeting OT in US critical infrastructure have prompted renewed federal action
Russian Group Launches LOSTKEYS Malware in Attacks Information Security Magazine 6 months 4 weeks ago New LOSTKEYS malware has been identified and linked to COLDRIVER by GTIG, stealing files and system data in targeted attacks
LockBit Ransomware Hacked, Insider Secrets Exposed Information Security Magazine 6 months 4 weeks ago The data dump will likely shed light on LockBit’s recent activity and help law enforcement trace cryptocurrency transactions
Just 5% of Enterprises Have Deployed Quantum-Safe Encryption Information Security Magazine 6 months 4 weeks ago DigiCert survey finds only 5% of global businesses are using post-quantum cryptography
UK Cyber Essentials Certification Numbers Falling Short Information Security Magazine 6 months 4 weeks ago The UK government is set to prioritize increasing the number of UK organizations who are Cyber Essentials certified over the coming year
UK Launches New Cybersecurity Assessment Initiatives to Drive Secure by Design Information Security Magazine 6 months 4 weeks ago The UK government unveiled two new assessment schemes to boost confidence in the security of products and services during CYBERUK
Confusion Reigns as Threat Actors Exploit Samsung MagicInfo Flaw Information Security Magazine 6 months 4 weeks ago Researchers spot in-the-wild exploits of Samsung MagicInfo despite recent patch
#Infosec2025: Combating Deepfake Threats at the Age of AI Agents Information Security Magazine 6 months 4 weeks ago Organizations can start defending against deepfakes now, before efficient detectors are available
Hacker Finds New Technique to Bypass SentinelOne EDR Solution Information Security Magazine 6 months 4 weeks ago Security researchers at Aon have discovered a threat actor who bypassed SentinelOne EDR protection to deploy Babuk ransomware
Inferno Drainer Returns, Stealing Millions from Crypto Wallets Information Security Magazine 6 months 4 weeks ago Inferno Drainer returns, stealing millions from crypto wallets through phishing on Discord