Cybercriminals Eye DeepSeek, Alibaba LLMs for Malware Development Information Security Magazine 10 months ago Check Point has observed cybercriminals toy with Alibaba’s Qwen LLM to develop infostealers
Destructive Attacks on Financial Institutions Surge Information Security Magazine 10 months ago Contrast Security reveals a 12.5% annual increase in destructive cyber-attacks on banks
DaggerFly-Linked Linux Malware Targets Network Appliances Information Security Magazine 10 months ago DaggerFly’s Lunar Peek campaign is using a new malware strain, identified by FortiGuard Labs, to compromise Linux networks
Threefold Increase in Malware Targeting Credential Stores Information Security Magazine 10 months ago Picus Security reports infostealer surge after revealing credentials appear in 29% of malware
Sophisticated Phishing Attack Bypasses Microsoft ADFS MFA Information Security Magazine 10 months ago A sophisticated phishing campaign targeting Microsoft ADFS has been observed, affecting more than 150 organizations
Surge in Infostealer Attacks Threatens EMEA Organizations' Data Security Information Security Magazine 10 months ago Check Point Research has found over 10 million stolen credentials associated with EMEA organizations exposed on cybercrime markets
Texas to Establish Cyber Command Amid “Dramatic” Rise in Attacks Information Security Magazine 10 months ago Texas Governor Greg Abbott announced a Cyber Command, designed to combat surging attacks on the state by nation-states and cybercriminals
Casio and Others Hit by Magento Web Skimmer Campaign Information Security Magazine 10 months ago Jscambler claims at least 17 sites have been infected with web skimmers, including Casio’s
CISA Warns of Backdoor Vulnerability in Contec Patient Monitors Information Security Magazine 10 months ago CISA has identified a backdoor in Contec CMS8000 devices that could allow unauthorized access to patient data and disrupt monitoring functions
High-profile X Accounts Targeted in Phishing Campaign Information Security Magazine 10 months ago Hackers hijack high-profile X accounts with phishing scams to steal credentials and promote fraudulent cryptocurrency schemes
768 CVEs Exploited in the Wild in 2024 Information Security Magazine 10 months ago VulnCheck observed 768 public reports of CVEs exploited in the wild for the first time in 2024, a 20% rise compared to 2023
European Police: Data Volumes and Deletion Hindering Investigations Information Security Magazine 10 months ago A new Europol report warns of major challenges accessing and analyzing data for cybercrime investigations
UK Announces “World-First” AI Security Standard Information Security Magazine 10 months ago The UK government has launched a new AI security code of practice it believes will become an ETSI standard
Threat Actors Target Public-Facing Apps for Initial Access Information Security Magazine 10 months ago Cisco Talos found that exploitation of public-facing applications made up 40% of incidents it observed in Q4 2024, marking a notable shift in initial access techniques
Tata Technologies Hit by Ransomware Attack Information Security Magazine 10 months ago The Indian tech giant temporarily suspended some of its IT services, which have now been restored
DeepSeek's Flagship AI Model Under Fire for Security Vulnerabilities Information Security Magazine 10 months ago Cyber reports exposed major security flaws in DeepSeek’s R1 LLM
International Operation Dismantles Cracked and Nulled Cybercrime Hubs Information Security Magazine 10 months ago A global law enforcement operation has taken down infrastructure used by Cracked.io and Nulled.io, which provide cybercriminal tools and services
Google Blocked 2.36 Million Policy-Violating Apps Information Security Magazine 10 months ago Google Play blocked 2.36 million policy-violating apps and banned 158,000 harmful developer accounts in 2024
Attackers Increase Use of HTTP Clients for Account Takeovers Information Security Magazine 10 months ago HTTP client tools used to compromise Microsoft 365 environments with 78% of tenants targeted in 2024
Syncjacking Attack Enables Full Browser and Device Takeover Information Security Magazine 10 months ago SquareX researchers warn that browser syncjacking could lead to full browser and device hijacking