Infosecurity News

  1. Cybercriminals Use Fake CrowdStrike Job Offers to Distribute Cryptominer

    CrowdStrike warned it had observed a phishing campaign impersonating the firm’s recruitment process to lure victims into downloading cryptominer

  2. Slovakia Hit by Historic Cyber-Attack on Land Registry

    A large-scale cyber-attack has targeted the information system of Slovakia’s land registry, impacting the management of land and property records

  3. Medusind Breach Exposes Sensitive Patient Data

    The US medical billing firm is notifying over 360,000 customers that their personal, financial and medical data may have been exposed

  4. Fake PoC Exploit Targets Security Researchers with Infostealer

    Trend Micro detailed how attackers are using a fake proof-of-concept for a critical Microsoft vulnerability, designed to steal sensitive data from security researchers

  5. Fancy Product Designer Plugin Flaws Expose WordPress Sites

    Critical Fancy Product Designer plugin flaws risk remote code execution and SQL injection attacks on WordPress sites

  6. Japan Faces Prolonged Cyber-Attacks Linked to China’s MirrorFace

    Cyber-attacks by China-linked MirrorFace targeted Japan’s national security information in major campaigns operating since 2019

  7. PowerSchool Reportedly Pays Ransom to Prevent Student Data Leak

    A school district said that PowerSchool paid a ransom to prevent the attackers releasing data it accessed of students and teachers in North America

  8. EU Commission Liable for Breaching EU’s Own Data Protection Rules

    A court has ruled the EU Commission infringed an individual’s right to the protection of their personal data by transferring their details to the US

  9. Government Launches £1.9m Initiative to Boost UK’s Cyber Resilience

    The UK government has pledged nearly £2m to 30 new Cyber Local projects designed to enhance cyber resilience

  10. Critical Ivanti Zero-Day Exploited in the Wild

    Ivanti customers are urged to patch two new bugs in the security vendor's products, one of which is being actively exploited

  11. Green Bay Packers Pro Shop Data Breach Compromises Customers

    The Green Bay Packers disclosed on Monday that their official online store was breached and customer information stolen

  12. US Launches Cyber Trust Mark for IoT Devices

    The voluntary Cyber Trust Mark labeling program will allow consumers to assess the cybersecurity of IoT devices when making purchasing decisions

  13. Scammers Exploit Microsoft 365 to Target PayPal Users

    A new PayPal phishing scam used genuine money requests, bypassing security checks to deceive recipients

  14. Casio Admits Security Failings as Attackers Leak Employee and Customer Data

    Electronics firm Casio revealed that ransomware attackers have leaked the personal data of employees, customers and business partners

  15. New Mirai Botnet Exploits Zero-Days in Routers and Smart Devices

    A newly identified Mirai botnet exploits over 20 vulnerabilities, including zero-days, in industrial routers and smart home devices

  16. Fake Government Officials Use Remote Access Tools for Card Fraud

    Group-IB has observed scammers impersonating government officials to trick disaffected consumers into divulging card details

  17. New Research Highlights Vulnerabilities in MLOps Platforms

    New research by Security Intelligence has revealed security risks in MLOps platforms including Azure ML, BigML and Google Vertex AI

  18. Moxa Urges Immediate Updates for Security Vulnerabilities

    Moxa has reported two critical vulnerabilities in its routers and network security appliances that could allow system compromise and arbitrary code execution

  19. Phishing Click Rates Triple in 2024

    Netskope observed a 190% growth in enterprise users clicking phishing links as attackers become more creative in delivering effective lures

  20. UK Government to Ban Creation of Explicit Deepfakes

    The UK government is cracking down on the generation of sexually explicit deepfakes in a bid to protect women and girls

What’s hot on Infosecurity Magazine?