Infosecurity News

  1. Fortinet Confirms Critical Zero-Day Vulnerability in Firewalls

    The security provider published mitigation measures to prevent exploitation

  2. Secureworks Exposes North Korean Links to Fraudulent Crowdfunding

    Secureworks Counter Threat Unit (CTU) has identified links between North Korean IT workers and fraudulent crowdfunding activities, with the group known as Nickle Tapestry orchestrating scams to support North Korean interests

  3. Microsoft Patches Eight Zero-Days to Start the Year

    Patch Tuesday saw Microsoft fix eight zero-days, three of which are being actively exploited

  4. New AI Rule Aims to Prevent Misuse of US Technology

    A new Interim Final Rule on Artificial Intelligence Diffusion issued in the US strengthens security, streamlines chip sales and prevents misuse of AI technology

  5. Browser-Based Cyber-Threats Surge as Email Malware Declines

    Browser-based cyber-threats surged in 2024, with credential abuse and infostealers on the rise

  6. Manchester Law Firm Leads 15,000 to Sue Google and Microsoft over AI Data

    Barings Law is planning to sue the two tech giants over numerous alleged violations of data misuse, including for AI training

  7. UK Considers Ban on Ransomware Payments by Public Bodies

    A UK government consultation has proposed banning public sector and critical infrastructure organizations from making ransomware payments to disincentivize attackers from targeting these services

  8. Remediation Times Drop Sharply as Cyber Hygiene Take Up Surges

    CISA claims US critical infrastructure providers are improving cyber hygiene and remediation activities

  9. UK Registry Nominet Breached Via Ivanti Zero-Day

    The .uk registry Nominet has been breached by a recently disclosed zero-day vulnerability in Ivanti products

  10. Critical Infrastructure Urged to Scrutinize Product Security During Procurement

    A joint government advisory has set out steps critical infrastructure firms should take to ensure any OT products they purchase are secure by design

  11. Russian Malware Campaign Hits Central Asian Diplomatic Files

    Diplomatic entities in Kazakhstan and Central Asia have been targeted by UAC-0063 using weaponized Word docs deploying HATVIBE malware

  12. Microsoft 365 MFA Outage Fixed

    Microsoft confirmed an outage of its multi-factor authentication system impacting access to Microsoft 365, causing login failures and service disruption

  13. New Ransomware Group Uses AI to Develop Nefarious Tools

    Researchers at Check Point said FunkSec operators appear to use AI for malware development

  14. WEF Warns of Growing Cyber Inequity Amid Escalating Complexities in Cyberspace

    A new WEF report highlighted growing disparities in the cyber capabilities of different types of organizations and regions

  15. Three Russians Charged with Crypto Mixer Money Laundering

    Three Russian men have been indicted on money laundering charges connected to cryptocurrency mixers

  16. Telefonica Breach Hits 20,000 Employees and Exposes Jira Details

    Telefonica has confirmed a breach of its internal ticketing system exposing more than 236,000 lines of customer data

  17. Cybercriminals Use Fake CrowdStrike Job Offers to Distribute Cryptominer

    CrowdStrike warned it had observed a phishing campaign impersonating the firm’s recruitment process to lure victims into downloading cryptominer

  18. Slovakia Hit by Historic Cyber-Attack on Land Registry

    A large-scale cyber-attack has targeted the information system of Slovakia’s land registry, impacting the management of land and property records

  19. Medusind Breach Exposes Sensitive Patient Data

    The US medical billing firm is notifying over 360,000 customers that their personal, financial and medical data may have been exposed

  20. Fake PoC Exploit Targets Security Researchers with Infostealer

    Trend Micro detailed how attackers are using a fake proof-of-concept for a critical Microsoft vulnerability, designed to steal sensitive data from security researchers

What’s hot on Infosecurity Magazine?