Infosecurity News

  1. New Android Espionage Campaign Spotted in India and Pakistan

    A new cyber espionage campaign, called ‘eXotic Visit,’ targeted Android users in South Asia via seemingly legitimate messaging apps

  2. Raspberry Robin Distributed Through Windows Script Files

    Distribution vectors of the Raspberry Robin worm now include Windows Script Files (WSF) alongside other methods like USB drives

  3. Threat Actors Game GitHub Search to Spread Malware

    Checkmarx warns of GitHub search result manipulation designed to promote malicious repositories

  4. US Data Breach Reports Surge 90% Annually in Q1

    The number of publicly reported data breaches and leaks grew 90% in the first three months of the year

  5. Rhadamanthys Malware Deployed By TA547 Against German Targets

    Proofpoint said this is the first time the threat actor has been seen using LLM-generated PowerShell scripts

  6. LG TV Vulnerabilities Expose 91,000 Devices

    The issues identified permit unauthorized access to the TV’s root system by bypassing authorization mechanisms

  7. Women Experience Exclusion Twice as Often as Men in Cybersecurity

    A WiCyS report detailed the causes of disparities in the experiences of women working in cybersecurity compared to men, including respect and exclusion

  8. Windows: New 'BatBadBut' Rust Vulnerability Given Highest Severity Score

    A flaw in the Rust standard library exposes Windows systems to command injection attacks

  9. US Claims to Have Recovered $1.4bn in COVID Fraud

    The DoJ says it has seized $1.4bn and charged 3500 defendants in COVID fraud cases since 2021

  10. Microsoft Patches 150 Flaws Including Two Zero-Days

    April’s Patch Tuesday saw fixes for 150 CVEs, including two being actively exploited in the wild

  11. Half of UK Businesses Hit by Cyber-Incident in Past Year, UK Government Finds

    The UK Government’s latest Cyber Security Breaches Survey found a large increase in the proportion of businesses impacted by a cyber-attack or breach in the past 12 months

  12. Hackers Use Malware to Hunt Software Vulnerabilities

    Palo Alto Networks observed growing malware-initiated vulnerability scanning activity

  13. Change Healthcare Hit By Cyber Extortion Again

    RansomHub has surfaced threatening to expose stolen data unless another ransom is paid

  14. Research Unearths RUBYCARP’s Multi-Miner Assault on Crypto

    Sysdig stated that, by deploying multiple miners, the group decreased attack time and detection risk

  15. Foreign Interference Drives Record Surge in IP Theft

    DTEX claims industrial espionage and IP theft are at an all-time high thanks to malicious insiders

  16. Over 90,000 D-Link NAS Devices Are Under Attack

    Threat actors are targeting a high severity vulnerability in close to 100,000 legacy D-Link devices

  17. Why Identity Management is Key in a Cyber Resilience Strategy

    For the fourth edition of Identity Management Day, the Identity Defined Security Alliance shared staggering numbers on the boom of identity-related cyber incidents

  18. US Federal Data Privacy Law Introduced by Legislators

    Two US lawmakers have published a draft federal data privacy law, dubbed the American Privacy Rights Act, which aims to provide protections for the personal information of all US citizens

  19. Byakugan Infostealer Capabilities Revealed

    Fortinet said the malware functions identified include screen monitoring, screen capturing, cryptomining and more

  20. New Malware “Latrodectus” Linked to IcedID

    The malware, discovered by Proofpoint and Team Cymru, was mainly utilized by initial access brokers

What’s hot on Infosecurity Magazine?