Invoice Fraud Costs UK Construction Sector Millions, NCA Warns Information Security Magazine 5 days 8 hours ago The National Crime Agency has warned construction firms about surging invoice fraud
Cloud Phones Linked to Rising Financial Fraud Threat Information Security Magazine 6 days 2 hours ago Cloud Android phones fuel financial fraud, evading detection and enabling dropper accounts
Hackers Exploit Compromised Enterprise Identities at Industrial Scale, Warns SentinelOne Information Security Magazine 6 days 3 hours ago Cybersecurity company’s annual report issues warning over a “mass-marketed impersonation crisis” over attackers abusing legitimate credentials
US: FCC Bans Foreign-Made Routers Over National Security Concerns Information Security Magazine 6 days 6 hours ago The US Federal Communications Commission has placed all “consumer-grade” internet routers produced outside the US on its “covered list”
TeamPCP Expands Supply Chain Campaign With LiteLLM PyPI Compromise Information Security Magazine 6 days 6 hours ago Python package LiteLLM compromised with credential-stealing malware linked to TeamPCP threat group
Experts Sound Alarm Over “Prompt Poaching” Browser Extensions Information Security Magazine 6 days 7 hours ago Expel has warned of malicious Chrome extensions stealing users’ AI conversations
Operation Henhouse Nets Over 500 Arrests in UK Fraud Crackdown Information Security Magazine 6 days 9 hours ago UK police trumpet success of Operation Henhouse as they seize and freeze over £27m in suspected fraud proceeds
RSA Conference: UK NCSC Head Urges Industry to Develop Vibe Coding Safeguards Information Security Magazine 6 days 21 hours ago The head of the UK’s NCSC is calling the cybersecurity industry to “seize the disruptive vibe coding opportunity” to make software more secure
Silver Fox Cyber Campaigns Show Shift Toward Dual Espionage Information Security Magazine 1 week ago Silver Fox pivots from ValleyRAT tax lures to WhatsApp‑style stealers, blending espionage & phishing
Citrix Urges Immediate Patching for Critical NetScaler Vulnerabilities Information Security Magazine 1 week ago A critical vulnerability in Citrix’s NetScaler products allows unauthenticated remote attackers to leak information from the appliance's memory
New Npm 'Ghost Campaign' Uses Fake Install Logs to Hide Malware Information Security Magazine 1 week ago Ghost npm campaign fakes install logs to steal sudo passwords and drop RATs that loot crypto and data
Former Ukrainian Foreign Minister Dmytro Kuleba to Address the New Cyber Frontline at Infosecurity Europe Information Security Magazine 1 week ago Geopolitics and cyber warfare take center stage at Infosecurity Europe as Dmytro Kuleba discusses Ukraine’s hybrid war experience
Enterprise Cybersecurity Software Fails 20% of the Time, Warns Absolute Security Information Security Magazine 1 week ago Poor patch management, increasingly complex IT environments and continued use of obsolete software puts organizations at risk from cyber threats, says the Absolute Security 2026 Resilience Risk Index
Russian Initial Access Broker Handed 81-Month Sentence Information Security Magazine 1 week ago Russian cybercriminal Aleksei Volkov has received close to seven years behind bars for role in Yanluowang ransomware
Handala Group Tied to Iranian Hack‑and‑Leak Operations, FBI Reveals Information Security Magazine 1 week ago The FBI has warned that Iranian hacking group Handala has been targeting opponents of the regime since 2023
Most Cybersecurity Staff Don’t Know How Fast They Could Stop a Cyber-Attack on AI Systems Information Security Magazine 1 week 1 day ago ISACA survey found that confusion over responsibility and lack of understanding around AI cyber-attacks makes containing them difficult
Tycoon2FA Phishing Service Resumes Activity Post-Takedown Information Security Magazine 1 week 1 day ago Tycoon2FA phishing platform resumes activity post-takedown, leveraging AITM techniques to bypass MFA
High-Tech Sector Overtakes Finance as Top Target for Cyber-Attacks, Mandiant Reports Information Security Magazine 1 week 1 day ago High tech was the most frequently targeted industry in Mandiant investigations in 2025, overtaking financial services which led in 2023 and 2024
Trivy Supply Chain Attack Expands With New Compromised Docker Images Information Security Magazine 1 week 1 day ago New Trivy Docker images 0.69.5 and 0.69.6 compromised with TeamPCP infostealer, impacting CI/CD scans
CISA Orders US Government to Patch Maximum Severity Cisco Flaw Information Security Magazine 1 week 1 day ago CISA added CVE-2026-20131 to its KEV catalog as it is being used in ransomware campaigns