Infosecurity News

  1. New Hacking Group Leaks Configuration of 15,000 Fortinet Firewalls

    The leak likely comes from a zero-day exploit affecting Fortinet’s products

  2. GoDaddy Accused of Serious Security Failings by FTC

    A proposed settlement order from the FTC will require GoDaddy to strengthen its security practices following multiple data breaches at the web hosting giant

  3. Hackers Use Image-Based Malware and GenAI to Evade Email Security

    HP Wolf highlighted novel techniques used by attackers to bypass email protections, including embedding malicious code inside images and utilizing GenAI

  4. EU To Launch New Support Centre by 2026 to Boost Healthcare Cybersecurity

    A new EU action plan will be structured around four pillars: prevention, threat detection and identification, response to cyber-attacks and deterrence

  5. CISA Launches Playbook to Boost AI Cybersecurity Collaboration

    CISA launched the JCDC AI Cybersecurity Playbook to enhance collaboration on AI cybersecurity risks

  6. Multi-Cloud Adoption Surges Amid Rising Security Concerns

    A new report from Fortinet reveals increased adoption of multi-cloud strategies and hybrid implementations combining on-premises and public cloud infrastructure

  7. Chinese PlugX Malware Deleted in Global Law Enforcement Operation

    The FBI deleted Chinese PlugX malware from thousands of devices in the US, using a technique developed by French cybersecurity firm Sekoia.io

  8. Illicit Crypto-Inflows Set to Top $51bn in a Year

    Chainalysis estimates threat actors made at least $51bn through crypto crime in 2024

  9. Fortinet Confirms Critical Zero-Day Vulnerability in Firewalls

    The security provider published mitigation measures to prevent exploitation

  10. Secureworks Exposes North Korean Links to Fraudulent Crowdfunding

    Secureworks Counter Threat Unit (CTU) has identified links between North Korean IT workers and fraudulent crowdfunding activities, with the group known as Nickle Tapestry orchestrating scams to support North Korean interests

  11. Microsoft Patches Eight Zero-Days to Start the Year

    Patch Tuesday saw Microsoft fix eight zero-days, three of which are being actively exploited

  12. New AI Rule Aims to Prevent Misuse of US Technology

    A new Interim Final Rule on Artificial Intelligence Diffusion issued in the US strengthens security, streamlines chip sales and prevents misuse of AI technology

  13. Browser-Based Cyber-Threats Surge as Email Malware Declines

    Browser-based cyber-threats surged in 2024, with credential abuse and infostealers on the rise

  14. Manchester Law Firm Leads 15,000 to Sue Google and Microsoft over AI Data

    Barings Law is planning to sue the two tech giants over numerous alleged violations of data misuse, including for AI training

  15. UK Considers Ban on Ransomware Payments by Public Bodies

    A UK government consultation has proposed banning public sector and critical infrastructure organizations from making ransomware payments to disincentivize attackers from targeting these services

  16. Remediation Times Drop Sharply as Cyber Hygiene Take Up Surges

    CISA claims US critical infrastructure providers are improving cyber hygiene and remediation activities

  17. UK Registry Nominet Breached Via Ivanti Zero-Day

    The .uk registry Nominet has been breached by a recently disclosed zero-day vulnerability in Ivanti products

  18. Critical Infrastructure Urged to Scrutinize Product Security During Procurement

    A joint government advisory has set out steps critical infrastructure firms should take to ensure any OT products they purchase are secure by design

  19. Russian Malware Campaign Hits Central Asian Diplomatic Files

    Diplomatic entities in Kazakhstan and Central Asia have been targeted by UAC-0063 using weaponized Word docs deploying HATVIBE malware

  20. Microsoft 365 MFA Outage Fixed

    Microsoft confirmed an outage of its multi-factor authentication system impacting access to Microsoft 365, causing login failures and service disruption

What’s hot on Infosecurity Magazine?