Infosecurity News

  1. New Wiper Malware Targets Ukrainian Infrastructure

    New PathWiper malware targeted Ukrainian critical infrastructure, using legitimate tools for cyber-attacks

  2. Trump Administration Revises Cybersecurity Rules, Replaces Biden and Obama Orders

    A new Trump Executive Order limits the use of cybersecurity-related sanctions only against foreign malicious actors

  3. US Tries to Claw Back $7m Taken by North Korean IT Workers

    The Justice Department has filed a civil forfeiture complaint alleging North Korean IT workers amassed $7m+

  4. FBI Warns Smart Home Users of Badbox 2.0 Botnet Threat

    The FBI says mainly Chinese-made IoT devices pose a threat from Badbox 2.0 malware

  5. Scattered Spider Uses Tech Vendor Impersonation and Phishing Kits to Target Helpdesks

    The ransomware group combines IT vendor impersonation and phishing frameworks like Evilginx to breach its targets

  6. #Infosec2025: Top Six Cyber Trends CISOs Need to Know

    Experts at Infosecurity Europe 2025 highlighted a range of major industry trends, from advanced social engineering techniques to vulnerability exploits

  7. #Infosec2025: Cybersecurity Lessons From Maersk’s Former CISO

    2017 ransomware attack on shipping company A P Moller Maersk marked a turning point for the cybersecurity industry, according to its former CISO Adam Banks

  8. #Infosec2025: DNS Hijacking, A Major Cyber Threat for the UK Government

    During Infosecurity Europe 2025, Nick Woodcraft, from the UK Government, shared his experience in implementing measures to protect domains within the .gov.uk DNS namespace

  9. #Infosec2025: Ransomware Victims Urged to Engage to Take Back Control

    Engagement with ransomware actors doesn’t necessarily mean payment; it’s about getting the best outcomes, a leading negotiator had argued

  10. #Infosec2025: Know Your Audience to Make an Impact, CISOs Tell Their Peers

    A panel of CISOs at Infosecurity Europe urged their peers to use risk management and clear communication to tame a chaotic cyber landscape

  11. #Infosec2025: Threat Actors Weaponizing Hardware Devices to Exploit Fortified Environments

    Sophisticated nation-state and cybercriminal groups are using insiders to infect targets via hardware devices, despite a lack of reporting of this threat

  12. #Infosec2025: Defenders and Attackers are Locked in an AI Arms Race

    Malicious actors are making more use of AI in attacks, even as governments look to boost AI investments

  13. #Infosec2025: Seven Steps to Building a Mature Vulnerability Management Program

    At Infosecurity Europe 2025, Axonius’ Jon Ridyard proposed seven best practices to build mature vulnerability management processes

  14. #Infosec2025: Securing Endpoints is Still Vital Amid Changing Threats

    Endpoint and network security is still essential, even as malicious actors turn to supply chains, identities and AI

  15. #Infosec2025 Cloud-Native Technology Prompts New Security Approaches

    Moving to cloud-native architecture and modern platforms is allowing enterprises to automate operations and improve security

  16. #Infosec2025: Cybersecurity Support Networks Too Fragmented for SMBs, Say Experts

    Experts argue the case for “communities of support” to boost SMB cyber-resilience

  17. #Infosec2025: Simplicity Should Guide Cybersecurity Purchasing Decisions

    Experts argue that CISOs should avoid product duplication and simplify their language to ensure budget is spent wisely

  18. #Infosec2025: Concern Grows Over Agentic AI Security Risks

    Agentic AI systems could threaten security and data privacy, unless organizations test each model and component

  19. #Infosec2025: UK Retail Hack Was "Subtle," Not Complex, Says River Island CISO

    The attacks on UK retailers are “a wake-up call” for the industry, said River Island’s Information Security Officer

  20. Phishing Campaign Uses Fake Booking.com Emails to Deliver Malware

    A phishing campaign spoofing Booking.com has been observed targeting hospitality sector, using ClickFix to install malware

What’s Hot on Infosecurity Magazine?