News
Entertainment
Science & Technology
Sport
Business & Money
Life
Culture & Art
Hobbies
8 | Follower
Infosecurity Magazine - Information Security & IT Security
04.04.2025
An international law enforcement operation has shut down Kidflix, a platform for child sexual exploitation with 1.8m registered users
Highline Public Schools revealed that sensitive personal, financial and medical data was accessed by ransomware attackers during the 2024 incident
The cybercriminal uses the service of Proton66, an infamous Russian-based bulletproof hosting provider, to deploy malware
A critical authentication bypass flaw in CrushFTP is under active exploitation following a mishandled disclosure process
03.04.2025
Semperis claims 62% of water and electricity providers were hit by cyber-attacks in the past year
Google has found a significant increase in North Korean actors attempting to gain employment as IT workers in European companies, leading to data theft
A novel skimming attack has been observed by Jscramber, using the Stripe API to steal payment information by injecting malicious scripts into pages
BforeAI researchers discover 596 suspicious Bybit-themed domains designed to defraud visitors
Gaming community Steam appeared in most phishing emails and texts detected by Guardio in Q1 2025
Hackers stole $1.67bn of cryptocurrencies in the first quarter of 2025, a 303% increase
A cyber threat actor has claimed to have leaked 144GB of data from Royal Mail users
Gray bots surge as generative AI scraper activity increases, impacting web applications with millions of requests daily
02.04.2025
A new attack targeting Microsoft Teams users used vishing, remote access tools and DLL sideloading to deploy a JavaScript backdoor
Google is set to roll out end-to-end encryption for all Gmail users, boosting security, compliance and data sovereignty efforts
BlueVoyant found that the use of lookalike domains in email-based attacks is allowing actors to target more individuals and organizations
WP Ultimate CSV Importer flaws expose 20,000 websites to attacks enabling attackers to achieve full site compromise
The UK’s data protection regulator says it is overwhelmed with complaints from the public
The CERT-UA investigation concluded that the attack’s techniques were “characteristic of Russian intelligence services”
01.04.2025
CISA recommends immediate action to address malware variant RESURGE exploiting Ivanti vulnerability CVE-2025-0282
A thousand UK service providers will be expected to comply with the forthcoming Cyber Security and Resilience Bill
New “ClickFake Interview” campaign attributed to the Lazarus Group targets crypto professionals with fake job offers
The UK’s National Cyber Security Agency has called on Next.js users to patch CVE-2025-29927
The funding will go to several projects within the Digital Europe Programme (DIGITAL) work program for 2025 to 2027
31.03.2025
The DoJ has managed to recoup over $8m from scammers, stolen in romance baiting schemes
29.03.2025
Expert speakers discussed the impact of reported cutbacks to CISA on the ability of local officials to combat surging cyber-attacks on US elections
Forescout researchers found multiple vulnerabilities in leading solar power system manufacturers, which could be exploited to cause emergencies and blackou
Claroty revealed that 89% of healthcare organizations use the top 1% of riskiest Internet-of-Medical-Things (IoMT) devices
A PhaaS platform, dubbed 'Morphing Meerkat,' uses DNS MX records to spoof over 100 brands and steal credentials, according to Infoblox Threat Intel
28.03.2025
The UK’s National Cyber Security Centre has released new guidance to help domain registrars enhance security
Once considered inactive, the Chinese cyber espionage group FamousSparrow has reemerged, targeting organizations across the US, Mexico and Honduras
The ICO’s Deputy Commissioner told Infosecurity that organizations that fail to implement MFA and suffer a breach can expect heavy penalties
Newly identified CoffeeLoader uses multiple evasion techniques and persistence mechanisms to deploy payloads and bypass endpoint security
PJobRAT malware targets Taiwan Android users, stealing data through fake messaging platforms
The UK’s National Crime Agency is warning of a growing cyber and physical threat from homegrown teens
27.03.2025
Standards body ETSI has defined a scheme for key encapsulation mechanisms with access control (KEMAC), enabling quantum-secure encryption
EU security agency ENISA has released a new report outlining the threats and potential mitigations for the space sector
The UK government’s new fraud minister will today announce plans for a newly expanded fraud strategy
A newly discovered malware campaign uses malicious npm packages to deploy reverse shells, compromising development environments
SecurityScorecard has found that 35.5% of all cyber breaches in 2024 were third-party related, up from 29% in 2023
Threat actors are exploiting cloud platforms like Adobe and Dropbox to evade email gateways and steal credentials