News
Entertainment
Science & Technology
Sport
Business & Money
Life
Culture & Art
Hobbies
8 | Follower
Infosecurity Magazine - Information Security & IT Security
02.08.2025
Microsoft has observed Russian state actor Secret Blizzard using an AiTM position to gain initial access, assisted by official domestic intercept systems
Spikes in attacker activity precede the disclosure of vulnerabilities 80% of the time, according to a new GreyNoise report
01.08.2025
The DoubleTrouble Android banking Trojan has evolved, using Discord for delivery and introducing several new features
North Korea’s Lazarus Group has been blamed for a cyber-espionage campaign using open source packages
A SentinelLabs report has revealed patents linked to firms aiding China's cyber-espionage operations, exposing new capabilities
Avast researchers shared a step-by-step guide to decrypt files for victims of FunkSec ransomware
Flashpoint data reveals an 800% increase in credentials stolen via infostealers in just six months
A covert ATM attack used a Raspberry Pi to breach bank systems, employing stealthy malware and anti-forensics techniques
The arrest of members of the Scattered Spider cyber-attack group have temporarily halted new intrusions, however, similar threat actors continue to pose ri
Experts argue that password managers are still useful despite Microsoft Authenticator ditching its capabilities
CISA has launched a new tool to streamline cyber incident response and aid in adversary eviction
Google’s Project Zero team will provide limited details of new vulnerabilities early following discovery, in a bid to speed up end users’ patching
The UK’s AI Security Institute has announced a new AI misalignment research program
Semperis found that executives were physically threatened in 40% of ransomware incidents, in a bid to pressure victims to pay demands
30.07.2025
The federal government has applied for forfeiture of the funds, which were seized by FBI Dallas in April 2025
Backdoor malware Auto-Color targets Linux systems, exploiting SAP NetWeaver flaw CVE-2025-31324
Hackers are actively exploiting two critical flaws in Cisco Identity Services Engine, said the US Cybersecurity and Infrastructure Security Agency
Flaw in Base44 allowed unauthorized access to private apps, bypassing authentication systems
The comprehensive guidance focuses on technical recommendations for securing agentic AI applications, from development to deployment
Some of Orange’s professional and consumer services may be disrupted for a few days because of the cyber incident
29.07.2025
Two pro-Ukraine hacktivists have claimed responsibility for a destructive attack on Aeroflot
Arizonan woman sentenced to 102 months for operating laptop farm for North Korean IT workers
The US and partners from nine countries have taken down part of the ransomware group’s infrastructure
A Scottish charity has been fined £18,000 for systematic data protection failings
Cisco Talos warned that the Chaos group, thought to be formed of former BlackSuit members, has launched a wave of attacks targeted a variety of sectors
Scattered Spider has targeted VMware vSphere environments, exploiting retail, airline and insurance sectors
Insurance firm Allianz Life said that a threat actor accessed personally identifiable information of the majority of its 1.4 million US customers
Sygnia observed Chinese cyber campaign dubbed Fire Ant deploying sophisticated techniques to gain full compromise of victim environments
Dating app Tea has been compromised by a hacker, resulting in the exposure of 13,000 selfies
A large-scale malware campaign known as SarangTrap has been observed using fake dating apps to steal personal data, targeting South Korean users
Despite claims by a hacker, French defense company Naval Group has detected no intrusions into its IT environments at the time of writing
10,000 WordPress sites vulnerable to takeover due to critical flaws in HT Contact Form Widget plugin
16.07.2025
The Co-op is teaming up with The Hacking Games to inspire pathways into ethical cybersecurity careers
A new phishing campaign uses SVG files for JavaScript redirects, bypassing traditional detection methods
MITRE has introduced AADAPT framework, a new cybersecurity framework aimed at mitigating risks in digital financial systems like cryptocurrency
The NCSC’s new Vulnerability Research Institute will help it develop outreach with the external cybersecurity community
Darknet giant Abacus Market has gone offline due to a likely exit scam, according to TRM Labs
The latest report from AppOmni has revealed 91% confidence in SaaS security while 75% of organizations have faced incidents
Socket has identified a new malware loader called XORIndex incorporated into malicious packages published to the npm registry, with over 9000 downloads
15.07.2025
Grok-4 was jailbroken 48 hours post-launch using Echo Chamber and Crescendo attack methods