Infosecurity News

  1. 61% of Hackers Use New Exploit Code Within 48 Hours of Attack

    61% of hackers use new exploit code within 48 hours, ransomware remains top threat in 2024

  2. Ghostwriter Cyber-Attack Targets Ukrainian, Belarusian Opposition

    Ghostwriter cyber-attack targets Ukrainian, Belarusian opposition using weaponized Excel documents

  3. Chinese-Backed Silver Fox Plants Backdoors in Healthcare Networks

    Forescout observed the recently identified Chinese hacking group using medical imaging software applications to deliver malware

  4. Only a Fifth of Ransomware Attacks Now Encrypt Data

    ReliaQuest claims 80% of ransomware attacks now focus solely on exfiltrating data as it is faster

  5. Chinese Botnet Bypasses MFA in Microsoft 365 Attacks

    SecurityScorecard revealed that the large-scale password spraying campaign can bypass MFA and security access policies by utilizing Non-interactive sign-ins

  6. Quarter of Brits Report Deepfake Phone Scams

    New Hiya data finds 26% of UK consumers encountered a deepfake scam call in Q4 2024

  7. Essential Addons for Elementor XSS Vulnerability Discovered

    Elementor plugin flaw puts 2m WordPress websites at risk, allowing XSS attacks via malicious scripts

  8. Michigan Man Indicted for Dark Web Credential Fraud

    Michigan man indicted for dark web credential fraud, purchased 2,500 logins from Genesis Market

  9. Google Cloud Shields Data With Quantum-Resistant Digital Signatures

    Google Cloud's Key Management Service now features quantum-safe digital signatures to strengthen data integrity and prepare for emerging quantum computing challenges

  10. IT/OT Convergence Fuels Manufacturing Cyber Incidents

    Telstra found that 75% of cyber incidents impacting manufacturing firms originated from the targeting of IT systems connected to OT environments

  11. Experts Slam Government After “Disastrous” Apple Encryption Move

    Experts argue Britons are now less secure after their government effectively forced Apple to abandon end-to-end encryption

  12. Bybit Offers $140m Bounty to Recover Funds After Mega Crypto-Heist

    Following the largest-ever crypto theft, Bybit is offering researchers up to 10% of recovered funds

  13. Salt Typhoon Exploited Cisco Devices With Custom Tool to Spy on US Telcos

    Chinese threat actor Salt Typhoon used JumbledPath, a custom-built utility, to gain access to a remote Cisco device, said the network provider

  14. DoD Contractor Pays $11.2M over False Cyber Certifications Claims

    Health Net Federal Services has agreed to pay over $11m over alleged false cybersecurity reporting

  15. BlackBasta Ransomware Chatlogs Leaked Online

    BlackBasta’s internal chatlogs are “highly useful from a threat intelligence perspective,” said Prodaft, the firm that revealed the leak

  16. Microsoft’s Quantum Chip Breakthrough Accelerates Threat to Encryption Protocols

    Microsoft has developed the first ever quantum chip, shortening the timeframe for when quantum computers will break exiting encryption

  17. Malicious Ads Target Freelance Developers via GitHub

    Fake job ads target freelance developers, spreading malware via GitHub

  18. West Coast Cybersecurity Salaries Outshine Rest of Country

    A survey by IANS and Artico found significant regional variation in cybersecurity salary levels across North America

  19. Mobile Phishing Attacks Surge with 16% of Incidents in US

    Mobile phishing attacks surged in 2024, with 16% of all incidents occurring in the US, according to a new Zimperium report

  20. Over 330 Million Credentials Compromised by Infostealers

    Kela researchers 330 million compromised credentials to infostealer activity on over four million machines in 2024

What’s hot on Infosecurity Magazine?