Infosecurity News

  1. #DEFCON: AI Cyber Challenge Winners Revealed in DARPA’s $4M Cybersecurity Showdown

    The winners of the AI Cybersecurity Challenge (AIxCC), Team Atlanta, won a $4m prize

  2. #BHUSA: CISA Execs ‘Hopeful’ for Extension of Cybersecurity Information Sharing Act

    Leaders of the US Cybersecurity and Infrastructure Agency (CISA) pushed back on layoff concerns and highlighted new initiatives

  3. Australian Regulator Sues Optus Over 2022 Data Breach

    The Information Commissioner has applied for a civil penalty against Optus following the 2022 data breach that exposed the personal details of 9.5 million Australians

  4. US Federal Judiciary Tightens Security Following Escalated Cyber-Attacks

    The judiciary announced stronger protections for its case management system following reports of a major breach of sensitive court documents in multiple states

  5. Bouygues Telecom Data Breach Exposes 6.4 Million Customer Records

    Bouygues Telecom revealed the attackers stole personal data of 6.4 million customers, including contact details, contractual data and international bank account numbers

  6. #BHUSA: 1000 DoD Contractors Now Covered by NSA’s Free Cyber Services Program

    The NSA’s CAPT program, launched in 2024 with Horizon3.ai, now benefits 1000 of the 300,000 US Defense Industrial Base companies

  7. #BHUSA: Microsoft Debuts AI Agent Able to Reverse Engineer Malware

    A new Microsoft AI agent, named Project Ire, is able to autonomously classify malware at a global scale with a high level of precision

  8. New Microsoft Exchange Vulnerability Puts Hybrid Cloud Environments at Risk

    Microsoft Exchange customers have been urged to apply fixes set out in a hybrid deployment security update published in April

  9. Google Among Victims in Ongoing Salesforce Data Theft Campaign

    Google confirms it was among the victims of an ongoing data theft campaign targeting Salesforce instances, where publicly available business names and contact details were retrieved by the threat actor

  10. Experts Alarmed by UK Government’s Companies House ID Checks

    A UK government initiative to tackle Companies House fraud has raised security concerns

  11. SonicWall: Attacks Linked to Legacy Bug and Password Use

    SonicWall has claimed an uptick in Akira ransomware intrusions is due to legacy password use

  12. #BHUSA: Security Researchers Uncover Critical Flaws in Axis CCTV Software

    Claroty researchers have uncovered four vulnerabilities in a proprietary protocol used by surveillance equipment manufacturer Axis Communications

  13. #BHUSA: Researchers Expose Infrastructure Behind Cybercrime Network VexTrio

    According to Infoblox’s new report, the VexTrio cybercrime-enabling network originates from Italy and Eastern Europe

  14. Clinical Data Stolen in Cyber-Attack on Kidney Dialysis Provider DaVita

    The incident, reported to be ransomware-related, has resulted in attackers stealing sensitive personal and clinical data, including lab test results

  15. #BHUSA: OpenAI Launches Red Teaming Challenge for New Open-Weight LLMs

    GenAI company OpenAI has launched its first-ever open-weight models alongside a red teaming challenge

  16. US Authorities Extradite Nigerian Man Accused of Hacking and Fraud

    A Nigerian man accused of hacking, fraud and identity theft has been extradited from France to the US to face charges

  17. #BHUSA: Exploring the Top Cyber Threats Facing Agentic AI Systems

    During the pre-Black Hat AI Summit, Sean Morgan, Protect AI’s Chief Architect, highlighted the three most prominent security risks of using AI agents

  18. #BHUSA: Malware Complexity Jumps 127% in Six Months

    Adversaries are prioritizing stealth over scale, according to OPSWAT’s latest Threat Landscape Report

  19. Attackers Are Targeting Critical Apex One Vulnerabilities, Trend Micro Warns

    Trend Micro has released a temporary fix for the flaws, which enable remote code execution on on-prem Apex One machines

  20. Ransomware Actors Expand Tactics Beyond Encryption and Exfiltration

    Ransomware actors deploy a range of activities to make it harder for victims to recover and increase the consequences of not paying demands

What’s Hot on Infosecurity Magazine?