Infosecurity News

  1. Chinese Threat Actors Target Europe in SmugX Campaign

    The attacks rely on novel delivery methods to deploy a variant of PlugX

  2. Meduza Stealer Targets Windows Users With Advanced Tactics

    Uptycs discovered the new threat while monitoring dark web forums and Telegram channels

  3. TSMC Targeted by LockBit via Supplier Breach

    The giant chip manufacturer’s supplier, Kinmax, admits to an attack against its internal specific testing environment

  4. Croydon Council Hit With Enforcement Notice For FOI Fail

    ICO continues policy of not fining public sector organizations

  5. International Police Operation Dismantles Phone Scam Network

    Elderly victims suffer losses in the millions of dollars

  6. Musk Losing Battle of Bad Bots as Rate Limits Begin

    Growing number of Twitter users voice disquiet

  7. Switzerland’s Security Report: Impact of Russia–Ukraine Conflict

    The increasing rivalry between significant powers heavily influences the country's security

  8. Critical Flaw Exposes ArcServe Backup to Remote Code Execution

    MDSec ActiveBreach said the flaw affects versions 7.0 to 9.0 of the software

  9. 8Base Ransomware Group Emerges as Major Threat

    VMware explained that 8Base employs a combination of encryption and “name-and-shame” tactics

  10. LockBit Claims TSMC Hack, Demands $70m Ransom

    If confirmed, it could be the fourth-largest ransom demand of all time

  11. MITRE Announces Most Dangerous Software Weaknesses

    CWE Top 25 list is calculated from two years of vulnerability data

  12. GCHQ Reveals Details of State-Backed Breach

    Cyber-espionage incident occurred 20 years ago, says NCSC

  13. Amazon Issues Lawsuits Targeting Fake Review Brokers

    E-commerce giant looks to improve customer trust in its marketplace

  14. NSA and CISA Release Guidelines to Secure CI/CD Environments

    The guidelines highlight three key threat scenarios and recommends mitigations for each

  15. MIT Publishes Framework to Evaluate Cybersecurity Methods

    It assesses information hackers could get from a victim program protected by an obfuscation scheme

  16. Charming Kitten’s PowerStar Malware Evolves with Advanced Techniques

    Volexity said the updated malware uses IPFS, public cloud hosting for decryption and configuration

  17. LockBit Dominates Ransomware World, New Report Finds

    LockBit becomes one of the first major ransomware operations to specifically target macOS

  18. VPN and RDP Exploitation the Most Common Attack Technique

    Initial access brokers still play a key role in threat supply chain

  19. US Prosecutors Line Up Charges in $2.5bn Healthcare Fraud Cases

    Nearly 80 individuals accused of participating in multiple schemes

  20. Japan in the Crosshairs of Many State-Sponsored Threat Actors New Report Finds

    Rapid7 found that Vietnamese APTs have also been targeting Japanese organizations, especially competitors of Vietnam’s budding automotive industry

What’s hot on Infosecurity Magazine?