<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <link>https://www.infosecurity-magazine.com/news/</link>
    <copyright>Copyright © 2026 Reed Exhibitions Ltd. All Rights Reserved.</copyright>
    <item>
      <title>New Phishing Platform Used in Credential Theft Campaigns Against C-Suite Execs</title>
      <link>https://www.infosecurity-magazine.com/news/new-phishing-platform-credential/</link>
      <description>A large-scale credential theft campaign targeting senior executives has been linked to a previously unknown automated phishing platform called Venom</description>
      <pubDate>Fri, 03 Apr 2026 08:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/new-phishing-platform-credential/</guid>
    </item>
    <item>
      <title>New 'Storm' Infostealer Remotely Decrypts Stolen Credentials</title>
      <link>https://www.infosecurity-magazine.com/news/storm-infostealer-remotely/</link>
      <description>This modern infostealer adopted server-side decryption of stolen credentials to bypass security controls</description>
      <pubDate>Thu, 02 Apr 2026 15:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/storm-infostealer-remotely/</guid>
    </item>
    <item>
      <title>NCSC Issues Security Alert Over Hackers Targeting WhatsApp and Signal Accounts</title>
      <link>https://www.infosecurity-magazine.com/news/ncsc-alert-hackers-whatsapp-signal/</link>
      <description>The UK’s cybersecurity agency offered advice to “high-risk’ individuals” on how to protect against social engineering and cyber-attacks</description>
      <pubDate>Thu, 02 Apr 2026 14:15:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/ncsc-alert-hackers-whatsapp-signal/</guid>
    </item>
    <item>
      <title>Apple Expands iOS 18 Security Updates Amid DarkSword Threat</title>
      <link>https://www.infosecurity-magazine.com/news/apple-ios-18-updates-darksword/</link>
      <description>iOS/iPadOS 18.7.7 updates expanded to protect older devices from DarkSword web exploit kit</description>
      <pubDate>Thu, 02 Apr 2026 13:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/apple-ios-18-updates-darksword/</guid>
    </item>
    <item>
      <title>Researchers Observe Sub-One-Hour Ransomware Attacks</title>
      <link>https://www.infosecurity-magazine.com/news/researchers-subonehour-ransomware/</link>
      <description>Halcyon says Akira is now capable of carrying out an entire ransomware attack in less than an hour</description>
      <pubDate>Thu, 02 Apr 2026 13:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/researchers-subonehour-ransomware/</guid>
    </item>
    <item>
      <title>GitHub Used as Covert Channel in Multi-Stage Malware Campaign</title>
      <link>https://www.infosecurity-magazine.com/news/github-covert-multi-stage-malware/</link>
      <description>LNK files use GitHub C2, embedded decoders and PowerShell for persistence and data exfiltration</description>
      <pubDate>Thu, 02 Apr 2026 13:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/github-covert-multi-stage-malware/</guid>
    </item>
    <item>
      <title>Most CNI Firms Face Up to £5m in Downtime from OT Attacks</title>
      <link>https://www.infosecurity-magazine.com/news/most-cni-firms-5m-downtime-ot/</link>
      <description>E2e-assure says 80% of critical infrastructure providers could face millions in downtime from cyber-attacks</description>
      <pubDate>Thu, 02 Apr 2026 08:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/most-cni-firms-5m-downtime-ot/</guid>
    </item>
    <item>
      <title>Google Introduces Android Dev Verification Amid Openness Debate</title>
      <link>https://www.infosecurity-magazine.com/news/google-android-dev-verification/</link>
      <description>Android requires dev identity verification for sideloaded apps; phased global rollout from September</description>
      <pubDate>Wed, 01 Apr 2026 15:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/google-android-dev-verification/</guid>
    </item>
    <item>
      <title>New Venom Stealer MaaS Platform Automates Continuous Data Theft</title>
      <link>https://www.infosecurity-magazine.com/news/venom-stealer-maas-automates-data/</link>
      <description>Venom Stealer malware-as-a-service automates ClickFix social engineering, credential and crypto exfiltration</description>
      <pubDate>Wed, 01 Apr 2026 13:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/venom-stealer-maas-automates-data/</guid>
    </item>
    <item>
      <title>Chinese Hackers Target European Governments in Espionage Campaigns</title>
      <link>https://www.infosecurity-magazine.com/news/china-hackers-ta416-europe/</link>
      <description>Chinese state-backed group TA416 had suspended its cyber espionage operations in Europe since 2023, noted Proofpoint</description>
      <pubDate>Wed, 01 Apr 2026 12:05:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/china-hackers-ta416-europe/</guid>
    </item>
    <item>
      <title>Eight in 10 UK Manufacturers Hit by Cyber Incident in a Year</title>
      <link>https://www.infosecurity-magazine.com/news/eight-10-uk-manufacturers-hit/</link>
      <description>Most UK manufacturers compromised last year suffered financial loss, says ESET</description>
      <pubDate>Wed, 01 Apr 2026 09:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/eight-10-uk-manufacturers-hit/</guid>
    </item>
    <item>
      <title>Hackers Hijack Axios npm Package to Spread RATs</title>
      <link>https://www.infosecurity-magazine.com/news/hackers-hijack-axios-npm-package/</link>
      <description>Threat actors hijacked the popular npm package axios to spread RAT malware after compromising an open‑source maintainer’s account, researchers warn</description>
      <pubDate>Wed, 01 Apr 2026 09:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/hackers-hijack-axios-npm-package/</guid>
    </item>
    <item>
      <title>Maryland Man Charged Over $53m Uranium Finance Crypto Hack</title>
      <link>https://www.infosecurity-magazine.com/news/man-charged-uranium-crypto-hack/</link>
      <description>Maryland man accused of $53m Uranium Finance hack, exploited smart contract flaws, laundered funds</description>
      <pubDate>Tue, 31 Mar 2026 15:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/man-charged-uranium-crypto-hack/</guid>
    </item>
    <item>
      <title>Phantom Project Bundles Infostealer, Crypter and RAT For Sale</title>
      <link>https://www.infosecurity-magazine.com/news/phantom-project-infostealer-nov-25/</link>
      <description>Phantom Stealer .NET harvests browser credentials, cookies, cards, sessions, as stealer-as-a-service</description>
      <pubDate>Tue, 31 Mar 2026 14:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/phantom-project-infostealer-nov-25/</guid>
    </item>
    <item>
      <title>ChatGPT Security Issue Enabled Data Theft via Single Prompt</title>
      <link>https://www.infosecurity-magazine.com/news/chatgpt-security-issue-steal-data/</link>
      <description>OpenAI has patched vulnerability, which Check Point said was because of a DNS loophole
</description>
      <pubDate>Tue, 31 Mar 2026 13:01:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/chatgpt-security-issue-steal-data/</guid>
    </item>
    <item>
      <title>TeamPCP Explores Ways to Exploit Stolen Supply Chain Secrets</title>
      <link>https://www.infosecurity-magazine.com/news/teampcp-exploit-stolen-supply/</link>
      <description>TeamPCP is exploring ways to monetize the secrets harvested during supply chain attacks, with identified ties to the Lapsus$ and Vect ransomware gangs</description>
      <pubDate>Tue, 31 Mar 2026 12:15:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/teampcp-exploit-stolen-supply/</guid>
    </item>
    <item>
      <title>Employee Data Breaches Surge to Seven-Year High</title>
      <link>https://www.infosecurity-magazine.com/news/employee-data-breaches-surge/</link>
      <description>Analysis from law firm Nockolds suggests non-cyber incidents are driving up employee data breaches</description>
      <pubDate>Tue, 31 Mar 2026 10:01:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/employee-data-breaches-surge/</guid>
    </item>
    <item>
      <title>NCSC Urges Immediate Patching of F5 BIG-IP Bug</title>
      <link>https://www.infosecurity-magazine.com/news/ncsc-urges-immediate-patching-f5/</link>
      <description>The National Cyber Security Centre wants UK firms to patch CVE-2025-53521</description>
      <pubDate>Tue, 31 Mar 2026 08:45:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/ncsc-urges-immediate-patching-f5/</guid>
    </item>
    <item>
      <title>Cybercriminals Exploit Tax Season With New Phishing Tactics</title>
      <link>https://www.infosecurity-magazine.com/news/tax-season-new-phishing-tactics/</link>
      <description>Tax-season phishing floods deliver RMM malware, credential theft, BEC and tax-form scams</description>
      <pubDate>Mon, 30 Mar 2026 15:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/tax-season-new-phishing-tactics/</guid>
    </item>
    <item>
      <title>Lloyds IT Glitch Exposed Data of Nearly 500,000 Banking Customers</title>
      <link>https://www.infosecurity-magazine.com/news/lloyds-glitch-exposed-500000/</link>
      <description>Lloyds app glitch exposed up to 447,936 customers’ transactions and personal data during update</description>
      <pubDate>Mon, 30 Mar 2026 14:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/lloyds-glitch-exposed-500000/</guid>
    </item>
    <item>
      <title>DeepLoad Malware Combines ClickFix With AI-Generated Code to Avoid Detection</title>
      <link>https://www.infosecurity-magazine.com/news/deepload-malware-clickfix-ai-code/</link>
      <description>Researchers at ReliaQuest warn of persistent malware campaign targeting enterprise credentials</description>
      <pubDate>Mon, 30 Mar 2026 12:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/deepload-malware-clickfix-ai-code/</guid>
    </item>
    <item>
      <title>Critical Citrix NetScaler Vulnerability Exploited in the Wild</title>
      <link>https://www.infosecurity-magazine.com/news/critical-citrix-netscaler/</link>
      <description>Researchers from watchTowr and Defused have found evidence that attackers are actively exploiting CVE-2026-3055, a critical NetScaler vulnerability</description>
      <pubDate>Mon, 30 Mar 2026 10:45:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/critical-citrix-netscaler/</guid>
    </item>
    <item>
      <title>ICO Fines UK Nuisance Call Scammers £100,000</title>
      <link>https://www.infosecurity-magazine.com/news/ico-fines-uk-nuisance-call/</link>
      <description>The UK Information Commissioner’s Office has handed a £100,000 fine to Birmingham-based TMAC</description>
      <pubDate>Mon, 30 Mar 2026 09:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/ico-fines-uk-nuisance-call/</guid>
    </item>
    <item>
      <title>European Commission Confirms Cloud Data Breach</title>
      <link>https://www.infosecurity-magazine.com/news/european-commission-cloud-data/</link>
      <description>The European Commission has revealed details of a data breach impacting its AWS infrastructure</description>
      <pubDate>Mon, 30 Mar 2026 08:15:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/european-commission-cloud-data/</guid>
    </item>
    <item>
      <title>New Wave of AiTM Phishing Targets TikTok for Business</title>
      <link>https://www.infosecurity-magazine.com/news/phishing-targets-tiktok-for/</link>
      <description>Push Security has uncovered a new AiTM phishing campaign targeting TikTok for Business accounts using Google  and TikTok themed login pages</description>
      <pubDate>Fri, 27 Mar 2026 16:01:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/phishing-targets-tiktok-for/</guid>
    </item>
    <item>
      <title>TeamPCP Targets Telnyx Package in Latest PyPI Software Supply Chain Attack</title>
      <link>https://www.infosecurity-magazine.com/news/teampcp-targets-telnyx-pypi-package/</link>
      <description>Socket and Endor Labs discovered a new TeamPCP campaign leading to the delivery of credential-stealing malware</description>
      <pubDate>Fri, 27 Mar 2026 15:06:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/teampcp-targets-telnyx-pypi-package/</guid>
    </item>
    <item>
      <title>Quantum Computing Threat to Encryption Is Closer Than Expected, Warns Google</title>
      <link>https://www.infosecurity-magazine.com/news/quantum-encryption-q-day-closer/</link>
      <description>‘Q-Day’ and the cybersecurity problems it brings could come as early as 2029 as Google accelerates its post-quantum cryptography migration</description>
      <pubDate>Fri, 27 Mar 2026 12:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/quantum-encryption-q-day-closer/</guid>
    </item>
    <item>
      <title>UK Cracks Down on Chinese Crypto Marketplace for Funding Southeast Asia Scam Hubs</title>
      <link>https://www.infosecurity-magazine.com/news/uk-sanction-chinese-crypto/</link>
      <description>The UK government has sanctioned Xinbi, described as “the second-largest illicit online marketplace ever”</description>
      <pubDate>Fri, 27 Mar 2026 12:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/uk-sanction-chinese-crypto/</guid>
    </item>
    <item>
      <title>Security Researchers Sound the Alarm on Vulnerabilities in AI-Generated Code</title>
      <link>https://www.infosecurity-magazine.com/news/ai-generated-code-vulnerabilities/</link>
      <description>Security researchers from Georgia Tech have observed a surge in reported CVEs for which the flaw was introduced by AI-generated code</description>
      <pubDate>Thu, 26 Mar 2026 16:40:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/ai-generated-code-vulnerabilities/</guid>
    </item>
    <item>
      <title>Attackers Rapidly Weaponize Critical Oracle WebLogic RCE, Honeypot Study Finds</title>
      <link>https://www.infosecurity-magazine.com/news/critical-oracle-weblogic-rce/</link>
      <description>Attackers rapidly exploited a critical Oracle WebLogic RCE flaw the same day exploit code was released, according to a CloudSEK honeypot study</description>
      <pubDate>Thu, 26 Mar 2026 16:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/critical-oracle-weblogic-rce/</guid>
    </item>
    <item>
      <title>EtherRAT Techniques Bypass Security Via Ethereum Smart Contracts</title>
      <link>https://www.infosecurity-magazine.com/news/etherrat-bypass-security-ethereum/</link>
      <description>EtherRAT hides C2 in Ethereum smart contracts via EtherHiding, steals wallets and credentials</description>
      <pubDate>Thu, 26 Mar 2026 15:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/etherrat-bypass-security-ethereum/</guid>
    </item>
    <item>
      <title>AI Becomes the Top Cybersecurity Priority for Defenders as Criminals Exploit It, PwC Warns</title>
      <link>https://www.infosecurity-magazine.com/news/ai-top-cyber-priority-defenders-pwc/</link>
      <description>PwC Annual Threat Dynamics report says AI-threats are the biggest concern of clients</description>
      <pubDate>Thu, 26 Mar 2026 13:15:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/ai-top-cyber-priority-defenders-pwc/</guid>
    </item>
    <item>
      <title>OpenAI Expands Bug Bounty to Cover AI Abuse and 'Safety' Concerns</title>
      <link>https://www.infosecurity-magazine.com/news/openai-bug-bounty-ai-abuse-safety/</link>
      <description>OpenAI’s Safety Bug Bounty program seeks to address AI safety vulnerabilities beyond traditional security flaws</description>
      <pubDate>Thu, 26 Mar 2026 12:20:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/openai-bug-bounty-ai-abuse-safety/</guid>
    </item>
    <item>
      <title>Iran-Linked Pay2Key Ransomware Group Re-Emerges</title>
      <link>https://www.infosecurity-magazine.com/news/iranlinked-pay2key-ransomware/</link>
      <description>Halcyon and Beazley Security track the return of Iranian ransomware group Pay2Key</description>
      <pubDate>Thu, 26 Mar 2026 10:45:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/iranlinked-pay2key-ransomware/</guid>
    </item>
    <item>
      <title>Invoice Fraud Costs UK Construction Sector Millions, NCA Warns</title>
      <link>https://www.infosecurity-magazine.com/news/invoice-fraud-uk-construction/</link>
      <description>The National Crime Agency has warned construction firms about surging invoice fraud</description>
      <pubDate>Thu, 26 Mar 2026 10:07:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/invoice-fraud-uk-construction/</guid>
    </item>
    <item>
      <title>Cloud Phones Linked to Rising Financial Fraud Threat</title>
      <link>https://www.infosecurity-magazine.com/news/cloud-phones-financial-fraud/</link>
      <description>Cloud Android phones fuel financial fraud, evading detection and enabling dropper accounts</description>
      <pubDate>Wed, 25 Mar 2026 16:05:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/cloud-phones-financial-fraud/</guid>
    </item>
    <item>
      <title>Hackers Exploit Compromised Enterprise Identities at Industrial Scale, Warns SentinelOne</title>
      <link>https://www.infosecurity-magazine.com/news/hackers-exploit-id-industrial-scale/</link>
      <description>Cybersecurity company’s annual report issues warning over a “mass-marketed impersonation crisis” over attackers abusing legitimate credentials </description>
      <pubDate>Wed, 25 Mar 2026 15:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/hackers-exploit-id-industrial-scale/</guid>
    </item>
    <item>
      <title>US: FCC Bans Foreign-Made Routers Over National Security Concerns</title>
      <link>https://www.infosecurity-magazine.com/news/us-fcc-bans-foreign-made-routers/</link>
      <description>The US Federal Communications Commission has placed all “consumer-grade” internet routers produced outside the US on its “covered list”</description>
      <pubDate>Wed, 25 Mar 2026 12:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/us-fcc-bans-foreign-made-routers/</guid>
    </item>
    <item>
      <title>TeamPCP Expands Supply Chain Campaign With LiteLLM PyPI Compromise</title>
      <link>https://www.infosecurity-magazine.com/news/teampcp-litellm-pypi-supply-chain/</link>
      <description>Python package LiteLLM compromised with credential-stealing malware linked to TeamPCP threat group</description>
      <pubDate>Wed, 25 Mar 2026 12:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/teampcp-litellm-pypi-supply-chain/</guid>
    </item>
    <item>
      <title>Experts Sound Alarm Over “Prompt Poaching” Browser Extensions</title>
      <link>https://www.infosecurity-magazine.com/news/experts-prompt-poaching-browser/</link>
      <description>Expel has warned of malicious Chrome extensions stealing users’ AI conversations</description>
      <pubDate>Wed, 25 Mar 2026 11:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/experts-prompt-poaching-browser/</guid>
    </item>
    <item>
      <title>Operation Henhouse Nets Over 500 Arrests in UK Fraud Crackdown</title>
      <link>https://www.infosecurity-magazine.com/news/police-fraud-crackdown-leads-to/</link>
      <description>UK police trumpet success of Operation Henhouse as they seize and freeze over £27m in suspected fraud proceeds</description>
      <pubDate>Wed, 25 Mar 2026 09:35:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/police-fraud-crackdown-leads-to/</guid>
    </item>
    <item>
      <title>RSA Conference: UK NCSC Head Urges Industry to Develop Vibe Coding Safeguards</title>
      <link>https://www.infosecurity-magazine.com/news/rsac-uk-ncsc-urges-vibe-coding/</link>
      <description>The head of the UK’s NCSC is calling the cybersecurity industry to “seize the disruptive vibe coding opportunity” to make software more secure</description>
      <pubDate>Tue, 24 Mar 2026 21:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/rsac-uk-ncsc-urges-vibe-coding/</guid>
    </item>
    <item>
      <title>Silver Fox Cyber Campaigns Show Shift Toward Dual Espionage</title>
      <link>https://www.infosecurity-magazine.com/news/silver-fox-cyber-dual-espionage/</link>
      <description>Silver Fox pivots from ValleyRAT tax lures to WhatsApp‑style stealers, blending espionage &amp; phishing</description>
      <pubDate>Tue, 24 Mar 2026 16:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/silver-fox-cyber-dual-espionage/</guid>
    </item>
    <item>
      <title>Citrix Urges Immediate Patching for Critical NetScaler Vulnerabilities</title>
      <link>https://www.infosecurity-magazine.com/news/citrix-patch-netscaler/</link>
      <description>A critical vulnerability in Citrix’s NetScaler products allows unauthenticated remote attackers to leak information from the appliance's memory</description>
      <pubDate>Tue, 24 Mar 2026 15:15:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/citrix-patch-netscaler/</guid>
    </item>
    <item>
      <title>New Npm 'Ghost Campaign' Uses Fake Install Logs to Hide Malware</title>
      <link>https://www.infosecurity-magazine.com/news/npm-ghost-campaign-fake-install/</link>
      <description>Ghost npm campaign fakes install logs to steal sudo passwords and drop RATs that loot crypto and data</description>
      <pubDate>Tue, 24 Mar 2026 14:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/npm-ghost-campaign-fake-install/</guid>
    </item>
    <item>
      <title>Former Ukrainian Foreign Minister Dmytro Kuleba to Address the New Cyber Frontline at Infosecurity Europe</title>
      <link>https://www.infosecurity-magazine.com/news/foreign-minister-kuleba/</link>
      <description>Geopolitics and cyber warfare take center stage at Infosecurity Europe as Dmytro Kuleba discusses Ukraine’s hybrid war experience</description>
      <pubDate>Tue, 24 Mar 2026 14:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/foreign-minister-kuleba/</guid>
    </item>
    <item>
      <title>Enterprise Cybersecurity Software Fails 20% of the Time, Warns Absolute Security</title>
      <link>https://www.infosecurity-magazine.com/news/cybersecurity-software-failure-20/</link>
      <description>Poor patch management, increasingly complex IT environments and continued use of obsolete software puts organizations at risk from cyber threats, says the Absolute Security 2026 Resilience Risk Index</description>
      <pubDate>Tue, 24 Mar 2026 13:15:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/cybersecurity-software-failure-20/</guid>
    </item>
    <item>
      <title>Russian Initial Access Broker Handed 81-Month Sentence</title>
      <link>https://www.infosecurity-magazine.com/news/russian-initial-access-broker/</link>
      <description>Russian cybercriminal Aleksei Volkov has received close to seven years behind bars for role in Yanluowang ransomware </description>
      <pubDate>Tue, 24 Mar 2026 10:32:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/russian-initial-access-broker/</guid>
    </item>
    <item>
      <title>Handala Group Tied to Iranian Hack‑and‑Leak Operations, FBI Reveals</title>
      <link>https://www.infosecurity-magazine.com/news/handala-group-iranian-hack-and/</link>
      <description>The FBI has warned that Iranian hacking group Handala has been targeting opponents of the regime since 2023</description>
      <pubDate>Tue, 24 Mar 2026 09:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/handala-group-iranian-hack-and/</guid>
    </item>
    <item>
      <title>Most Cybersecurity Staff Don’t Know How Fast They Could Stop a Cyber-Attack on AI Systems</title>
      <link>https://www.infosecurity-magazine.com/news/cyber-staff-unsure-on-preventing/</link>
      <description>ISACA survey found that confusion over responsibility and lack of understanding around AI cyber-attacks makes containing them difficult</description>
      <pubDate>Mon, 23 Mar 2026 16:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/cyber-staff-unsure-on-preventing/</guid>
    </item>
    <item>
      <title>Tycoon2FA Phishing Service Resumes Activity Post-Takedown</title>
      <link>https://www.infosecurity-magazine.com/news/tycoon2fa-phishing-service-resumes/</link>
      <description>Tycoon2FA phishing platform resumes activity post-takedown, leveraging AITM techniques to bypass MFA</description>
      <pubDate>Mon, 23 Mar 2026 16:05:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/tycoon2fa-phishing-service-resumes/</guid>
    </item>
    <item>
      <title>High-Tech Sector Overtakes Finance as Top Target for Cyber-Attacks, Mandiant Reports</title>
      <link>https://www.infosecurity-magazine.com/news/high-tech-top-target-cyberattacks/</link>
      <description>High tech was the most frequently targeted industry in Mandiant investigations in 2025, overtaking financial services which led in 2023 and 2024</description>
      <pubDate>Mon, 23 Mar 2026 15:35:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/high-tech-top-target-cyberattacks/</guid>
    </item>
    <item>
      <title>Trivy Supply Chain Attack Expands With New Compromised Docker Images</title>
      <link>https://www.infosecurity-magazine.com/news/trivy-supply-chain-attack-expands/</link>
      <description>New Trivy Docker images 0.69.5 and 0.69.6 compromised with TeamPCP infostealer, impacting CI/CD scans</description>
      <pubDate>Mon, 23 Mar 2026 15:05:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/trivy-supply-chain-attack-expands/</guid>
    </item>
    <item>
      <title>CISA Orders US Government to Patch Maximum Severity Cisco Flaw</title>
      <link>https://www.infosecurity-magazine.com/news/cisa-orders-us-government-patch/</link>
      <description>CISA added CVE-2026-20131 to its KEV catalog as it is being used in ransomware campaigns</description>
      <pubDate>Mon, 23 Mar 2026 10:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/cisa-orders-us-government-patch/</guid>
    </item>
    <item>
      <title>Operation Alice Takes Down 370,000+ Dark Web Sites</title>
      <link>https://www.infosecurity-magazine.com/news/operation-alice-370000-dark-web/</link>
      <description>German-led policing effort against fraud operation disrupts countless CSAM and cybercrime sites</description>
      <pubDate>Mon, 23 Mar 2026 09:10:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/operation-alice-370000-dark-web/</guid>
    </item>
    <item>
      <title>Hackers Exploit Critical Langflow Bug in Just 20 Hours </title>
      <link>https://www.infosecurity-magazine.com/news/hackers-exploit-critical-langflow/</link>
      <description>Sysdig details how threat actors exploited a critical CVE in Langflow in less than a day </description>
      <pubDate>Fri, 20 Mar 2026 10:20:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/hackers-exploit-critical-langflow/</guid>
    </item>
    <item>
      <title>NCA Boss Warns That Teens Are Being “Radicalized” Into Cybercrime Online</title>
      <link>https://www.infosecurity-magazine.com/news/nca-boss-warns-teens-radicalized/</link>
      <description>The National Crime Agency’s director general warns that technology is rapidly reshaping crime</description>
      <pubDate>Fri, 20 Mar 2026 09:40:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/nca-boss-warns-teens-radicalized/</guid>
    </item>
    <item>
      <title>Ransomware Affiliate Exposes Details of 'The Gentlemen' Operation</title>
      <link>https://www.infosecurity-magazine.com/news/ransomware-affiliate-gentlemen/</link>
      <description>Hastalamuerte leaks The Gentlemen RaaS ops: FortiGate exploits, BYOVD evasion, Qilin split tactics</description>
      <pubDate>Thu, 19 Mar 2026 16:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/ransomware-affiliate-gentlemen/</guid>
    </item>
    <item>
      <title>Financial Brands Targeted in Global Mobile Banking Malware Surge</title>
      <link>https://www.infosecurity-magazine.com/news/financial-brands-mobile-banking/</link>
      <description>Mobile banking malware targets over 1200 financial apps globally, shifting fraud to user devices</description>
      <pubDate>Thu, 19 Mar 2026 14:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/financial-brands-mobile-banking/</guid>
    </item>
    <item>
      <title>FCA Updates Cyber Incident and Third-Party Reporting Rules </title>
      <link>https://www.infosecurity-magazine.com/news/fca-updates-incident-thirdparty/</link>
      <description>The UK’s financial regulator has issued new rules to make incident and third-party reporting clearer </description>
      <pubDate>Thu, 19 Mar 2026 10:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/fca-updates-incident-thirdparty/</guid>
    </item>
    <item>
      <title>AWS Warns Hackers Have Abused Cisco Firewall Zero-Day Since January</title>
      <link>https://www.infosecurity-magazine.com/news/interlock-ransomware-exploit-cisco/</link>
      <description>Notorious ransomware group Interlock has been exploiting a Cisco zero-day bug since January, AWS says</description>
      <pubDate>Thu, 19 Mar 2026 09:50:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/interlock-ransomware-exploit-cisco/</guid>
    </item>
    <item>
      <title>UK: Regulation Drives Cyber Spending for Critical Infrastructure Orgs</title>
      <link>https://www.infosecurity-magazine.com/news/uk-regulation-drives-cyber/</link>
      <description>35% of security leaders working in the UK’s critical infrastructure said regulatory requirements are the primary influence on their security programs</description>
      <pubDate>Thu, 19 Mar 2026 09:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/uk-regulation-drives-cyber/</guid>
    </item>
    <item>
      <title>New Ubuntu Flaw Enables Local Attackers to Gain Root Access</title>
      <link>https://www.infosecurity-magazine.com/news/ubuntu-flaw-enables-root-access/</link>
      <description>CVE-2026-3888 Ubuntu snap flaw lets local users escalate to root via timing-based exploit</description>
      <pubDate>Wed, 18 Mar 2026 15:45:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/ubuntu-flaw-enables-root-access/</guid>
    </item>
    <item>
      <title>Crypto Scam "ShieldGuard" Dismantled After Malware Discovery</title>
      <link>https://www.infosecurity-magazine.com/news/crypto-scam-shieldguard-dismantled/</link>
      <description>ShieldGuard Chrome extension posed as a crypto security tool but stole wallets and drained user data</description>
      <pubDate>Wed, 18 Mar 2026 14:15:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/crypto-scam-shieldguard-dismantled/</guid>
    </item>
    <item>
      <title>AI-Enabled Adversaries Compress Time-to-Exploit Following Vulnerability Disclosure</title>
      <link>https://www.infosecurity-magazine.com/news/exploitation-accelerates-in-2025/</link>
      <description>Rapid7 says median time from publication to CISA KEV inclusion dropped to five days</description>
      <pubDate>Wed, 18 Mar 2026 13:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/exploitation-accelerates-in-2025/</guid>
    </item>
    <item>
      <title>Vidar Stealer 2.0 Exploits GitHub, Reddit to Deliver Malware via Fake Game Cheats</title>
      <link>https://www.infosecurity-magazine.com/news/vidar-stealer-exploits-github/</link>
      <description>The Vidar 2.0 infostealers is deployed through fake free game cheats on GitHub and Reddit</description>
      <pubDate>Wed, 18 Mar 2026 11:15:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/vidar-stealer-exploits-github/</guid>
    </item>
    <item>
      <title>AI Issues Will Drive Half of Incident Response Efforts by 2028, Says Gartner</title>
      <link>https://www.infosecurity-magazine.com/news/ai-issues-half-incident-response/</link>
      <description>Gartner has urged security teams to get involved in AI projects from the start to avoid costly incident response</description>
      <pubDate>Wed, 18 Mar 2026 09:40:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/ai-issues-half-incident-response/</guid>
    </item>
    <item>
      <title>Android OS-Level Attack Bypasses Mobile Payment Security</title>
      <link>https://www.infosecurity-magazine.com/news/android-attack-bypasses-payment/</link>
      <description>Android’s LSPosed-based attack hijacks payment apps via runtime manipulation and SIM-binding bypass</description>
      <pubDate>Tue, 17 Mar 2026 16:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/android-attack-bypasses-payment/</guid>
    </item>
    <item>
      <title>'CursorJack’ Attack Path Exposes Code Execution Risk in AI Development Environment</title>
      <link>https://www.infosecurity-magazine.com/news/cursor-jack-attack-path-ai/</link>
      <description>CursorJack shows how malicious MCP deeplinks in Cursor IDE can trigger user-approved code execution</description>
      <pubDate>Tue, 17 Mar 2026 15:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/cursor-jack-attack-path-ai/</guid>
    </item>
    <item>
      <title>Surge in Nation State Attacks on UK Firms Amid Cyber Warfare Fears</title>
      <link>https://www.infosecurity-magazine.com/news/nation-state-attacks-uk-firms/</link>
      <description>Armis reveals that “mutually assured disruption” is no longer preventing state-backed attacks</description>
      <pubDate>Tue, 17 Mar 2026 12:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/nation-state-attacks-uk-firms/</guid>
    </item>
    <item>
      <title>Average Number of Daily API Attacks Up 113% Annually</title>
      <link>https://www.infosecurity-magazine.com/news/average-number-daily-api-attacks/</link>
      <description>Akamai says 87% of organizations suffered an API-related security incident last year</description>
      <pubDate>Tue, 17 Mar 2026 10:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/average-number-daily-api-attacks/</guid>
    </item>
    <item>
      <title>UK Cyber Monitoring Centre Sets Its Sights on US Expansion One Year After Launch</title>
      <link>https://www.infosecurity-magazine.com/news/uk-cyber-monitoring-centre-us/</link>
      <description>The US Cyber Monitoring Center should be operational in 2027, said the UK CMC leadership</description>
      <pubDate>Tue, 17 Mar 2026 10:15:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/uk-cyber-monitoring-centre-us/</guid>
    </item>
    <item>
      <title>Researchers Warn of Global Surge in Fake Shipment Tracking Scams</title>
      <link>https://www.infosecurity-magazine.com/news/global-surge-fake-shipment/</link>
      <description>Some of these campaigns are linked to Darcula, a Chinese-language phishing-as-a-service platform</description>
      <pubDate>Mon, 16 Mar 2026 14:45:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/global-surge-fake-shipment/</guid>
    </item>
    <item>
      <title>CrackArmor Flaws Expose Linux Systems to Privilege Escalation</title>
      <link>https://www.infosecurity-magazine.com/news/crackarmor-linux-privilege/</link>
      <description>CrackArmor AppArmor flaws let local Linux users gain root, break containers and enable DoS attacks</description>
      <pubDate>Mon, 16 Mar 2026 14:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/crackarmor-linux-privilege/</guid>
    </item>
    <item>
      <title>Security Flaw in AWS Bedrock Code Interpreter Raises Alarms</title>
      <link>https://www.infosecurity-magazine.com/news/security-flaw-aws-bedrock/</link>
      <description>DNS-based attack in AWS Bedrock AgentCore lets AI sandboxes exfiltrate cloud data</description>
      <pubDate>Mon, 16 Mar 2026 13:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/security-flaw-aws-bedrock/</guid>
    </item>
    <item>
      <title>FBI Calls for Help to Track Steam Malware Campaign</title>
      <link>https://www.infosecurity-magazine.com/news/fbi-calls-help-track-steam-malware/</link>
      <description>The FBI wants to hear from gamers who have downloaded Steam titles containing malware</description>
      <pubDate>Mon, 16 Mar 2026 11:15:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/fbi-calls-help-track-steam-malware/</guid>
    </item>
    <item>
      <title>UK: Companies House Web Glitch Exposes Corporate Details to Fraudsters</title>
      <link>https://www.infosecurity-magazine.com/news/companies-house-glitch-exposes/</link>
      <description>An issue with the Companies House website has put the personal and corporate information of millions at risk</description>
      <pubDate>Mon, 16 Mar 2026 10:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/companies-house-glitch-exposes/</guid>
    </item>
    <item>
      <title>Interpol's 'Operation Synergia III' Nets 94 Arrests in Major Cybercrime Sweep</title>
      <link>https://www.infosecurity-magazine.com/news/interpol-operation-synergia3-94/</link>
      <description>A new law enforcement operation against phishing and ransomware operators led to the takedown of 45,000 malicious IP addresses</description>
      <pubDate>Fri, 13 Mar 2026 16:15:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/interpol-operation-synergia3-94/</guid>
    </item>
    <item>
      <title>Law Enforcement Dismantles SocksEscort Proxy Network in Operation Lightning</title>
      <link>https://www.infosecurity-magazine.com/news/socksescort-proxy-network-op/</link>
      <description>Operation Lightning sees international law enforcement partners shut down ‘SocksEscort,’ a major malicious proxy service used by cybercriminals worldwide</description>
      <pubDate>Fri, 13 Mar 2026 10:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/socksescort-proxy-network-op/</guid>
    </item>
    <item>
      <title>PixRevolution Malware Hijacks Brazil's PIX Transfers in Real Time</title>
      <link>https://www.infosecurity-magazine.com/news/pixrevolution-malware-brazils-pix/</link>
      <description>PixRevolution Android trojan hijacks Brazil’s PIX payments in real time using accessibility abuse</description>
      <pubDate>Thu, 12 Mar 2026 16:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/pixrevolution-malware-brazils-pix/</guid>
    </item>
    <item>
      <title>Critical Zero-Click Flaw in n8n Allows Full Server Compromise</title>
      <link>https://www.infosecurity-magazine.com/news/critical-zeroclick-flaw-n8n-pillar/</link>
      <description>The critical vulnerability affecting both cloud and self-hosted n8n instances requires no authentication or even n8n account to be exploited</description>
      <pubDate>Thu, 12 Mar 2026 15:28:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/critical-zeroclick-flaw-n8n-pillar/</guid>
    </item>
    <item>
      <title>CISA Issues Emergency Directive Over Exploited Cisco SD-WAN Flaws</title>
      <link>https://www.infosecurity-magazine.com/news/cisa-cisco-sd-wan-flaws-directive/</link>
      <description>CISA issued urgent directive as attackers exploit Cisco SD-WAN flaw granting admin access to networks</description>
      <pubDate>Thu, 12 Mar 2026 12:45:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/cisa-cisco-sd-wan-flaws-directive/</guid>
    </item>
    <item>
      <title>Police Scotland Fined After Sharing Victim’s Phone Data </title>
      <link>https://www.infosecurity-magazine.com/news/police-scotland-fined-sharing/</link>
      <description>The ICO has fined Police Scotland after it shared the entire contents of a victim’s phone with her alleged attacker</description>
      <pubDate>Thu, 12 Mar 2026 10:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/police-scotland-fined-sharing/</guid>
    </item>
    <item>
      <title>Iran Claims Massive Cyber-Attack on MedTech Firm Stryker</title>
      <link>https://www.infosecurity-magazine.com/news/iran-massive-wiper-attack-medtech/</link>
      <description>The pro-Iran Handala group claims to have wiped 200,000 systems in destructive wiper malware attack on US firm Stryker</description>
      <pubDate>Thu, 12 Mar 2026 09:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/iran-massive-wiper-attack-medtech/</guid>
    </item>
    <item>
      <title>France: National Cybersecurity Agency Reports Ransomware Attack Drop in 2025</title>
      <link>https://www.infosecurity-magazine.com/news/france-anssi-ransomware-attack/</link>
      <description>French small and medium businesses remained the organizations most targeted by ransomware in 2025</description>
      <pubDate>Wed, 11 Mar 2026 16:50:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/france-anssi-ransomware-attack/</guid>
    </item>
    <item>
      <title>Infosecurity Europe Announces 2026 Keynote Line Up</title>
      <link>https://www.infosecurity-magazine.com/news/infosecurity-europe-2026-keynote/</link>
      <description>Infosecurity Europe 2026 reveals its keynote line-up, featuring Jason Fox, Shlomo Kramer, Cynthia Kaiser and more, with sessions on AI, cloud security and post quantum threats</description>
      <pubDate>Wed, 11 Mar 2026 16:20:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/infosecurity-europe-2026-keynote/</guid>
    </item>
    <item>
      <title>Researchers Uncover ‘LeakyLooker’ Vulnerabilities in Google Looker Studio</title>
      <link>https://www.infosecurity-magazine.com/news/google-looker-studios-security-gaps/</link>
      <description>LeakyLooker flaws in Google Looker Studio let attackers run cross-tenant SQL attacks on cloud data</description>
      <pubDate>Wed, 11 Mar 2026 16:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/google-looker-studios-security-gaps/</guid>
    </item>
    <item>
      <title>Compromised WordPress Sites Deliver ClickFix Attacks in Global Infostealer Campaign</title>
      <link>https://www.infosecurity-magazine.com/news/wordpress-clickfix-infostealer/</link>
      <description>Over 250 legitimate websites, including news outlets and  a US Senate candidate’s official webpage, been compromised to infect visitors with infostealers, warn Rapid7 researchers</description>
      <pubDate>Wed, 11 Mar 2026 14:45:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/wordpress-clickfix-infostealer/</guid>
    </item>
    <item>
      <title>BlackSanta EDR-Killer Targets HR Teams in CV-Themed Campaign</title>
      <link>https://www.infosecurity-magazine.com/news/blacksanta-edr-killer-targets-hr/</link>
      <description>BlackSanta malware targets HR staff with fake resumes, kills EDR and steals system data</description>
      <pubDate>Wed, 11 Mar 2026 14:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/blacksanta-edr-killer-targets-hr/</guid>
    </item>
    <item>
      <title>Researchers Discover Major Security Gaps in LLM Guardrails</title>
      <link>https://www.infosecurity-magazine.com/news/major-security-gaps-llm-guardrails/</link>
      <description>Palo Alto Networks’ Unit 42 has developed a successful attack to bypass safety guardrails in popular generative AI tools</description>
      <pubDate>Wed, 11 Mar 2026 13:35:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/major-security-gaps-llm-guardrails/</guid>
    </item>
    <item>
      <title>Cyber-Attacks on UK Firms Increase at Four Times Global Rate</title>
      <link>https://www.infosecurity-magazine.com/news/cyberattacks-uk-firms-increase/</link>
      <description>Check Point data shows attack volumes are growing much faster in the UK than worldwide</description>
      <pubDate>Wed, 11 Mar 2026 10:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/cyberattacks-uk-firms-increase/</guid>
    </item>
    <item>
      <title>Microsoft Fixes Two Publicly Disclosed Zero-Days </title>
      <link>https://www.infosecurity-magazine.com/news/microsoft-fixes-two-publicly/</link>
      <description>March Patch Tuesday sees Microsoft release updates for 79 flaws</description>
      <pubDate>Wed, 11 Mar 2026 09:20:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/microsoft-fixes-two-publicly/</guid>
    </item>
    <item>
      <title>OpenAI's Promptfoo Deal Plugs Agentic AI Testing Gap</title>
      <link>https://www.infosecurity-magazine.com/news/openai-promptfoo-deal-agentic-ai/</link>
      <description>OpenAI’s latest acquisition addresses a security need Jamieson O’Reilly, security advisor at OpenClaw, raised during an exclusive interview with Infosecurity</description>
      <pubDate>Tue, 10 Mar 2026 17:15:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/openai-promptfoo-deal-agentic-ai/</guid>
    </item>
    <item>
      <title>Only 24% Of organizations Test Identity Recovery Every Six Months</title>
      <link>https://www.infosecurity-magazine.com/news/organizations-test-identity-sec-6/</link>
      <description>Only 24% of organizations test identity disaster recovery plans every 6 months, Quest Software said</description>
      <pubDate>Tue, 10 Mar 2026 16:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/organizations-test-identity-sec-6/</guid>
    </item>
    <item>
      <title>Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds </title>
      <link>https://www.infosecurity-magazine.com/news/cloud-attackers-prefer-exploits/</link>
      <description>Google Cloud report details a sharp rise in attackers exploiting software vulnerabilities, including React2Shell</description>
      <pubDate>Tue, 10 Mar 2026 15:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/cloud-attackers-prefer-exploits/</guid>
    </item>
    <item>
      <title>Ericsson Breach Exposes Data of 15k Employees and Customers</title>
      <link>https://www.infosecurity-magazine.com/news/ericsson-breach-exposes-data-15k/</link>
      <description>Ericsson data breach affects 15k employees/customers after third-party service provider compromise</description>
      <pubDate>Tue, 10 Mar 2026 15:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/ericsson-breach-exposes-data-15k/</guid>
    </item>
    <item>
      <title>Russian Hackers Target WhatsApp and Signal Accounts of Global Military and Government Officials</title>
      <link>https://www.infosecurity-magazine.com/news/russian-hackers-target-military/</link>
      <description>Dutch intelligence reveals Russian state hackers are trying to hijack the Signal and WhatsApp accounts of key targets</description>
      <pubDate>Tue, 10 Mar 2026 10:45:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/russian-hackers-target-military/</guid>
    </item>
    <item>
      <title>ShinyHunters Targets Hundreds of Websites in New Salesforce Campaign</title>
      <link>https://www.infosecurity-magazine.com/news/shinyhunters-hundreds-websites/</link>
      <description>Prolific ShinyHunters group claims to have stolen data from nearly 400 websites in Experience Cloud attacks</description>
      <pubDate>Tue, 10 Mar 2026 10:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/shinyhunters-hundreds-websites/</guid>
    </item>
    <item>
      <title>Threat Actor Exploits Flaws and Uses Elastic Cloud SIEM to Manage Stolen Data</title>
      <link>https://www.infosecurity-magazine.com/news/elastic-cloud-siem-manage-stolen/</link>
      <description>Huntress researchers uncover campaign exploiting vulnerabilities to steal data using Elastic Cloud as a data hub</description>
      <pubDate>Mon, 09 Mar 2026 15:45:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/elastic-cloud-siem-manage-stolen/</guid>
    </item>
    <item>
      <title>Trump Administration Unveils New Cyber Strategy for America</title>
      <link>https://www.infosecurity-magazine.com/news/usa-unveils-new-cyber-strategy/</link>
      <description>US national cyber strategy focuses on stronger defenses, countering threats, fostering innovation</description>
      <pubDate>Mon, 09 Mar 2026 15:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/usa-unveils-new-cyber-strategy/</guid>
    </item>
    <item>
      <title>UK Launches New Crackdown Unit to Tackle Cyber-Fraud at the Source</title>
      <link>https://www.infosecurity-magazine.com/news/uk-new-crackdown-unit-cyber-fraud/</link>
      <description>New UK Online Crime Centre will combine expertise from a range of sources to takedown online channels cyber-scammers rely on</description>
      <pubDate>Mon, 09 Mar 2026 14:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/uk-new-crackdown-unit-cyber-fraud/</guid>
    </item>
    <item>
      <title>AI Security Startups Dominate New Cyber Innovation Awards</title>
      <link>https://www.infosecurity-magazine.com/news/ai-security-startups-cyber/</link>
      <description>Over one in five winners of IT-Harvest’s 2026 Cyber 150 are AI security companies</description>
      <pubDate>Mon, 09 Mar 2026 13:25:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/ai-security-startups-cyber/</guid>
    </item>
    <item>
      <title>TriZetto Provider Solutions Breach Hits 3.4 Million Patients</title>
      <link>https://www.infosecurity-magazine.com/news/trizetto-provider-solutions-breach/</link>
      <description>Billing services provider TriZetto Provider Solutions has begun notifying millions of patients about a data breach</description>
      <pubDate>Mon, 09 Mar 2026 10:45:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/trizetto-provider-solutions-breach/</guid>
    </item>
    <item>
      <title>Ghanaian Pleads Guilty to Role in $100m Romance Scam</title>
      <link>https://www.infosecurity-magazine.com/news/ghanaian-pleads-guilty-100m/</link>
      <description>Derrick Van Yeboah admitted he stole over $10m in romance scams as part of crime gang</description>
      <pubDate>Mon, 09 Mar 2026 10:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/ghanaian-pleads-guilty-100m/</guid>
    </item>
    <item>
      <title>Iran's MuddyWater Hackers Hit US Firms with New 'Dindoor' Backdoor</title>
      <link>https://www.infosecurity-magazine.com/news/iran-muddywater-hackers-us-firms/</link>
      <description>A bank, an airport, a non-profit and the Israeli branch of a US software company were among the targets of this new MuddyWater campaign</description>
      <pubDate>Fri, 06 Mar 2026 15:15:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/iran-muddywater-hackers-us-firms/</guid>
    </item>
    <item>
      <title>Zero‑Day Attacks on Enterprise Software Reach Record High, Google Warns</title>
      <link>https://www.infosecurity-magazine.com/news/zero-day-enterprise-record-high/</link>
      <description>Almost a quarter of the zero days detected by Google in 2025 targeted security and networking appliances</description>
      <pubDate>Fri, 06 Mar 2026 12:29:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/zero-day-enterprise-record-high/</guid>
    </item>
    <item>
      <title>AI-Driven Insider Risk Now a “Critical Business Threat,” Report Warns</title>
      <link>https://www.infosecurity-magazine.com/news/ai-insider-risk-critical-business/</link>
      <description>Malicious insiders are using misusing AI for nefarious gain, while employees cutting corners also creates risk, warns Mimecast</description>
      <pubDate>Thu, 05 Mar 2026 16:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/ai-insider-risk-critical-business/</guid>
    </item>
    <item>
      <title>ContextCrush Flaw Exposes AI Development Tools to Attacks</title>
      <link>https://www.infosecurity-magazine.com/news/contextcrush-ai-development-tools/</link>
      <description>Critical flaw "ContextCrush" in Context7 MCP Server could allow malicious instructions into AI tools</description>
      <pubDate>Thu, 05 Mar 2026 14:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/contextcrush-ai-development-tools/</guid>
    </item>
    <item>
      <title>Coruna Exploit Kit Targets Older iPhones in Multi-Stage Campaigns</title>
      <link>https://www.infosecurity-magazine.com/news/coruna-exploit-older-iphones/</link>
      <description>Exploit kit "Coruna" targets iPhones running iOS 13.0 to 17.2.1, focusing on financial data theft</description>
      <pubDate>Thu, 05 Mar 2026 12:15:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/coruna-exploit-older-iphones/</guid>
    </item>
    <item>
      <title>Zero-Click FreeScout Bug Enables Remote Code Execution</title>
      <link>https://www.infosecurity-magazine.com/news/zeroclick-freescout-bug-remote/</link>
      <description>Ox Security warns that Mail2Shell could enable threat actors to hijack FreeScout systems without user interaction</description>
      <pubDate>Thu, 05 Mar 2026 11:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/zeroclick-freescout-bug-remote/</guid>
    </item>
    <item>
      <title>Cisco Issues Patches for 48 Vulnerabilities in Enterprise Networking Products</title>
      <link>https://www.infosecurity-magazine.com/news/cisco-issues-patches-48/</link>
      <description>Two of the 48 Cisco vulnerabilities, affecting Secure Firewall Management Center, are maximum-severity flaws</description>
      <pubDate>Thu, 05 Mar 2026 10:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/cisco-issues-patches-48/</guid>
    </item>
    <item>
      <title>Europol Operation Seizes LeakBase Data Breach Site</title>
      <link>https://www.infosecurity-magazine.com/news/europol-seizes-leakbase-data/</link>
      <description>A global operation has resulted in the takedown of popular cybercrime forum LeakBase</description>
      <pubDate>Thu, 05 Mar 2026 09:45:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/europol-seizes-leakbase-data/</guid>
    </item>
    <item>
      <title>Coalition of Western Countries Launches 6G Cybersecurity Guidelines</title>
      <link>https://www.infosecurity-magazine.com/news/gcot-6g-cybersecurity-guidelines/</link>
      <description>A coalition of seven Western nations has launched guidelines to help integrate security-by-design principles into future 6G standards</description>
      <pubDate>Wed, 04 Mar 2026 16:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/gcot-6g-cybersecurity-guidelines/</guid>
    </item>
    <item>
      <title>Global Takedown Neutralizes Tycoon2FA Phishing Service</title>
      <link>https://www.infosecurity-magazine.com/news/global-takedown-tycoon2fa-phishing/</link>
      <description>Law enforcers and industry partners have taken down notorious phishing-as-a-service platform Tycoon2FA</description>
      <pubDate>Wed, 04 Mar 2026 16:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/global-takedown-tycoon2fa-phishing/</guid>
    </item>
    <item>
      <title>Surge in Attacks on Surveillance Cameras Linked to Iranian Hackers</title>
      <link>https://www.infosecurity-magazine.com/news/iran-attacks-surveillance-cameras/</link>
      <description>Increased attempts to compromise surveillance cameras linked to Iran during Middle East conflict</description>
      <pubDate>Wed, 04 Mar 2026 15:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/iran-attacks-surveillance-cameras/</guid>
    </item>
    <item>
      <title>Multi-Stage "BadPaw" Malware Campaign Targets Ukraine</title>
      <link>https://www.infosecurity-magazine.com/news/badpaw-malware-targets-ukraine/</link>
      <description>Malware campaign uses Ukrainian email service for credibility, deploying "BadPaw" to execute attacks</description>
      <pubDate>Wed, 04 Mar 2026 14:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/badpaw-malware-targets-ukraine/</guid>
    </item>
    <item>
      <title>Calls for Global Digital Estate Standard as Posthumous Deepfake Fraud Risk Grows</title>
      <link>https://www.infosecurity-magazine.com/news/digital-estate-post-death-deepfake/</link>
      <description>The OpenID Foundation warns that fragmented policies on posthumous digital accounts could open the door for fraudsters to exploit AI deepfakes</description>
      <pubDate>Wed, 04 Mar 2026 10:45:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/digital-estate-post-death-deepfake/</guid>
    </item>
    <item>
      <title>Israel: RedAlert Spyware Campaign Exploits Wartime Panic With Trojanized App</title>
      <link>https://www.infosecurity-magazine.com/news/redalert-israel-spyware-campaign/</link>
      <description>Espionage campaign exploits Israel-Iran conflict, distributing a trojanized Red Alert app via SMS</description>
      <pubDate>Tue, 03 Mar 2026 16:15:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/redalert-israel-spyware-campaign/</guid>
    </item>
    <item>
      <title>AI and Deepfakes Supercharge Sophisticated Cyber-Attacks, Says Cloudflare</title>
      <link>https://www.infosecurity-magazine.com/news/ai-deepfakes-supercharge/</link>
      <description>Cloudflare Threat Report warns that AI tools enable attackers who lacked required skills to generate effective attacks rapidly and at scale</description>
      <pubDate>Tue, 03 Mar 2026 15:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/ai-deepfakes-supercharge/</guid>
    </item>
    <item>
      <title>Leaked Database Sheds Light on Iranian Crypto Sanctions Evasion</title>
      <link>https://www.infosecurity-magazine.com/news/iranian-crypto-leaked-database/</link>
      <description>Ariomex database reveals potential sanctions evasion and capital transfers tied to Iranian actors</description>
      <pubDate>Tue, 03 Mar 2026 14:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/iranian-crypto-leaked-database/</guid>
    </item>
    <item>
      <title>Half of US CISOs Work the Equivalent of a Six-Day Week</title>
      <link>https://www.infosecurity-magazine.com/news/half-us-cisos-work-equivalent/</link>
      <description>Seemplicity finds US security leaders work 11 or more extra hours per week</description>
      <pubDate>Tue, 03 Mar 2026 14:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/half-us-cisos-work-equivalent/</guid>
    </item>
    <item>
      <title>Huge “Shadow Layer” of Organizations Hit by Supply Chain Attacks</title>
      <link>https://www.infosecurity-magazine.com/news/shadow-layer-organizations-supply/</link>
      <description>Black Kite reveals 26,000 unnamed corporate victims linked to 136 third-party breaches</description>
      <pubDate>Tue, 03 Mar 2026 11:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/shadow-layer-organizations-supply/</guid>
    </item>
    <item>
      <title>Iranian Cyber Threat Actor Targets Iraqi Government Officials in AI-Powered Campaign</title>
      <link>https://www.infosecurity-magazine.com/news/iran-cyber-threat-actor-iraq/</link>
      <description>Zscaler ThreatLabz assessed with medium to high confidence that an Iranian adversary targeted Iraq’s Ministry of Foreign Affairs in a new cyber-attack</description>
      <pubDate>Tue, 03 Mar 2026 10:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/iran-cyber-threat-actor-iraq/</guid>
    </item>
    <item>
      <title>Chrome Unveils Plan For Quantum-Safe HTTPS Certificates</title>
      <link>https://www.infosecurity-magazine.com/news/chrome-quantum-safe-https/</link>
      <description>Google Chrome initiates quantum-resistant measures via Merkle Tree Certificates to secure HTTPS</description>
      <pubDate>Mon, 02 Mar 2026 16:15:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/chrome-quantum-safe-https/</guid>
    </item>
    <item>
      <title>Expect Iran to Launch Cyber-Attacks Globally, Warns Google Head of Threat Intel</title>
      <link>https://www.infosecurity-magazine.com/news/iran-cyber-attacks-global-google/</link>
      <description>John Hultquist suggests “aggressive” Iranian cyber attackers will target the US and its Gulf allies with plausibly deniable ransomware attacks, hacktivist campaigns and more</description>
      <pubDate>Mon, 02 Mar 2026 15:45:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/iran-cyber-attacks-global-google/</guid>
    </item>
    <item>
      <title>Hybrid Middle East Conflict Triggers Surge in Global Cyber Activity</title>
      <link>https://www.infosecurity-magazine.com/news/middle-east-conflict-surge-global/</link>
      <description>Military strikes in the Middle East escalate cyber ops, raising spillover risks globally for firms</description>
      <pubDate>Mon, 02 Mar 2026 15:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/middle-east-conflict-surge-global/</guid>
    </item>
    <item>
      <title>ClawJacked Bug Enables Covert AI Agent Hijacking</title>
      <link>https://www.infosecurity-magazine.com/news/clawjacked-bug-covert-ai-agent/</link>
      <description>Oasis Security reveals how a new ClawJacked vulnerability could allow attackers to silently take over a victim’s OpenClaw agent</description>
      <pubDate>Mon, 02 Mar 2026 11:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/clawjacked-bug-covert-ai-agent/</guid>
    </item>
    <item>
      <title>Ransomware Payments Decline 8% as Attacks Surge 50%</title>
      <link>https://www.infosecurity-magazine.com/news/ransomware-payments-decline-1/</link>
      <description>Chainalysis reveals a big surge in median ransomware payment size in 2025 despite overall drop in criminal revenue</description>
      <pubDate>Mon, 02 Mar 2026 10:45:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/ransomware-payments-decline-1/</guid>
    </item>
    <item>
      <title>North Korea's APT37 Expands Toolkit to Breach Air-Gapped Networks</title>
      <link>https://www.infosecurity-magazine.com/news/north-korea-apt37-expands-toolkit/</link>
      <description>The security researchers from Zscaler ThreatLabz have also discovered five new tools deployed by the North Korean hacking group</description>
      <pubDate>Fri, 27 Feb 2026 14:15:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/north-korea-apt37-expands-toolkit/</guid>
    </item>
    <item>
      <title>UK Vulnerability Monitoring Service Cuts Unresolved Security Flaws by 75%</title>
      <link>https://www.infosecurity-magazine.com/news/uk-vuln-monitoring-service-cuts/</link>
      <description>The UK government says its new Vulnerability Monitoring Service has cut unresolved security flaws by 75% and reduced cyber-attack fix times from nearly two months to just over a week</description>
      <pubDate>Fri, 27 Feb 2026 11:45:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/uk-vuln-monitoring-service-cuts/</guid>
    </item>
    <item>
      <title>‘Project Compass’ Cracks Down on ‘The Com’: 30 Members of Notorious Cybercrime Gang Arrested </title>
      <link>https://www.infosecurity-magazine.com/news/project-compass-com-arrests/</link>
      <description>International law enforcement operation led by Europol targets network of teenagers and young adults involved in ransomware attacks, extortion and other crimes</description>
      <pubDate>Fri, 27 Feb 2026 11:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/project-compass-com-arrests/</guid>
    </item>
    <item>
      <title>Aeternum Botnet Shifts Command Control to Polygon Blockchain</title>
      <link>https://www.infosecurity-magazine.com/news/aeternum-botnet-c2-polygon/</link>
      <description>New botnet Aeternum shifted C2 operations to Polygon blockchain, complicating takedown efforts</description>
      <pubDate>Thu, 26 Feb 2026 16:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/aeternum-botnet-c2-polygon/</guid>
    </item>
    <item>
      <title>Darktrace Flags 32 Million Phishing Emails in 2025 as Identity Attacks Intensify</title>
      <link>https://www.infosecurity-magazine.com/news/32m-phishing-emails-detected-2025/</link>
      <description>2025 saw 32M phishing emails, with identity threats surpassing vulnerabilities</description>
      <pubDate>Thu, 26 Feb 2026 15:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/32m-phishing-emails-detected-2025/</guid>
    </item>
    <item>
      <title>Exploitable Vulnerabilities Present in 87% of Organizations</title>
      <link>https://www.infosecurity-magazine.com/news/exploitable-vulnerabilities-in-87/</link>
      <description>Datadog report reveals two-fifths of services are affected by exploitable bugs</description>
      <pubDate>Thu, 26 Feb 2026 14:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/exploitable-vulnerabilities-in-87/</guid>
    </item>
    <item>
      <title>UK's Data Watchdog Gets a Makeover to Match Growing Demands</title>
      <link>https://www.infosecurity-magazine.com/news/uk-data-watchdog-ico-makeover/</link>
      <description>The UK’s Information Commissioner's Office is about to ditch single-leader model for CEO and board in a major shake-up</description>
      <pubDate>Thu, 26 Feb 2026 14:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/uk-data-watchdog-ico-makeover/</guid>
    </item>
    <item>
      <title>Google Disrupts ‘Prolific’ and ‘Elusive’ China-Linked Global Hacking Campaign</title>
      <link>https://www.infosecurity-magazine.com/news/google-prolific-china-hacking/</link>
      <description>UNC2814 hit 53 victims in 42 countries with novel backdoor in decade long cyber espionage operation</description>
      <pubDate>Thu, 26 Feb 2026 12:09:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/google-prolific-china-hacking/</guid>
    </item>
    <item>
      <title>Global Cyber Agencies Urge Immediate Patching of Cisco SD-WAN Zero Day</title>
      <link>https://www.infosecurity-magazine.com/news/immediate-patch-cisco-catalyst/</link>
      <description>The US and allies are urging Cisco Catalyst SD-WAN customers to hunt for signs of exploitation</description>
      <pubDate>Thu, 26 Feb 2026 09:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/immediate-patch-cisco-catalyst/</guid>
    </item>
    <item>
      <title>44% Surge in App Exploits as AI Speeds Up Cyber-Attacks, IBM Finds</title>
      <link>https://www.infosecurity-magazine.com/news/app-exploits-surge-ai-speeds/</link>
      <description>IBM's 2026 X-Force report reveals 44% rise in cyber-attacks on public apps, driven by AI and flaws</description>
      <pubDate>Wed, 25 Feb 2026 14:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/app-exploits-surge-ai-speeds/</guid>
    </item>
    <item>
      <title>Malicious NuGet Package Targets Stripe Developers</title>
      <link>https://www.infosecurity-magazine.com/news/malicious-nuget-package-stripe-devs/</link>
      <description>Malicious NuGet package mimicking Stripe's library targeted developers</description>
      <pubDate>Wed, 25 Feb 2026 13:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/malicious-nuget-package-stripe-devs/</guid>
    </item>
    <item>
      <title>Former Defense Contractor Boss Gets 7+ Years for Selling Zero Days</title>
      <link>https://www.infosecurity-magazine.com/news/defense-contractor-boss-7-years/</link>
      <description>A former general manager of a US defense contractor has been sentenced after selling zero days to Russia</description>
      <pubDate>Wed, 25 Feb 2026 10:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/defense-contractor-boss-7-years/</guid>
    </item>
    <item>
      <title>ICO’s £14m Reddit Fine Highlights Age Check Privacy Concerns</title>
      <link>https://www.infosecurity-magazine.com/news/icos-14m-reddit-fine-age-check/</link>
      <description>The UK’s ICO has fined Reddit over £14m for failing to use children’s personal information lawfully</description>
      <pubDate>Wed, 25 Feb 2026 09:40:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/icos-14m-reddit-fine-age-check/</guid>
    </item>
    <item>
      <title>Cost of Insider Incidents Surges 20% to Nearly $20m </title>
      <link>https://www.infosecurity-magazine.com/news/cost-of-insider-incidents-surges/</link>
      <description>DTEX claims insider incidents cost $19.5m in 2025, with employee negligence most expensive</description>
      <pubDate>Tue, 24 Feb 2026 17:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/cost-of-insider-incidents-surges/</guid>
    </item>
    <item>
      <title>Multifaceted Phishing Scheme Deceives Bitpanda Customers</title>
      <link>https://www.infosecurity-magazine.com/news/bitpanda-mfa-phishing-scheme/</link>
      <description>Phishing attack mimicking Bitpanda targets users, harvesting credentials and personal information</description>
      <pubDate>Tue, 24 Feb 2026 16:05:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/bitpanda-mfa-phishing-scheme/</guid>
    </item>
    <item>
      <title>North Korean Lazarus Group Expands Ransomware Activity With Medusa</title>
      <link>https://www.infosecurity-magazine.com/news/north-korean-lazarus-group-medusa/</link>
      <description>Ransomware Medusa linked to North Korean hackers targets US healthcare amid ongoing attacks</description>
      <pubDate>Tue, 24 Feb 2026 14:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/north-korean-lazarus-group-medusa/</guid>
    </item>
    <item>
      <title>AI Accelerates Attacker Breakout Time to Just Four Minutes</title>
      <link>https://www.infosecurity-magazine.com/news/ai-accelerates-attack-breakout/</link>
      <description>ReliaQuest claims AI has reduced breakout and exfiltration time to under 10 minutes</description>
      <pubDate>Tue, 24 Feb 2026 13:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/ai-accelerates-attack-breakout/</guid>
    </item>
    <item>
      <title>Chinese AI Firms Hit Claude with Distillation Attacks, Anthropic Warns</title>
      <link>https://www.infosecurity-magazine.com/news/chinese-ai-claude-distillation/</link>
      <description>Anthropic accused DeepSeek, Moonshot and MiniMax of illicitly using Claude to steal some of the AI model’s capabilities</description>
      <pubDate>Tue, 24 Feb 2026 11:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/chinese-ai-claude-distillation/</guid>
    </item>
    <item>
      <title>AI-powered Cyber-Attacks Up Significantly in the Last Year, Warns CrowdStrike</title>
      <link>https://www.infosecurity-magazine.com/news/ai-powered-cyberattacks-up/</link>
      <description>CrowdStrike Global Threat Report warns how adversaries are leveraging AI to make campaigns more efficient and more effective</description>
      <pubDate>Tue, 24 Feb 2026 10:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/ai-powered-cyberattacks-up/</guid>
    </item>
    <item>
      <title>Shai-Hulud-Like Worm Targets Developers via npm and AI Tools</title>
      <link>https://www.infosecurity-magazine.com/news/shai-hulud-like-worm-devs-npm-ai/</link>
      <description>Supply chain worm mimicking Shai-Hulud malware spread via malicious npm packages, targeting AI tools has been identified by security researchers </description>
      <pubDate>Mon, 23 Feb 2026 16:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/shai-hulud-like-worm-devs-npm-ai/</guid>
    </item>
    <item>
      <title>Fraud Investigation Reveals Sophisticated Python Malware</title>
      <link>https://www.infosecurity-magazine.com/news/fraud-investigation-python-malware/</link>
      <description>Sophisticated Python malware uncovered in fraud probe shows obfuscation, disposable infrastructure</description>
      <pubDate>Mon, 23 Feb 2026 15:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/fraud-investigation-python-malware/</guid>
    </item>
    <item>
      <title>Russian Cyber Threat Actor Uses GenAI to Compromise Fortinet Firewalls</title>
      <link>https://www.infosecurity-magazine.com/news/russian-threat-actor-genai/</link>
      <description>A low-skilled Russian-speaking attacker has used GenAI tools to help deploy a successful attack workflow targeting FortiGate instances</description>
      <pubDate>Mon, 23 Feb 2026 12:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/russian-threat-actor-genai/</guid>
    </item>
    <item>
      <title>Leading Semiconductor Supplier Advantest Hit by Ransomware Attack</title>
      <link>https://www.infosecurity-magazine.com/news/advantest-ransomware-attack/</link>
      <description>Advantest, a Japanese specialist in testing computer chips for major semiconductor manufacturers, has deployed incident response protocols following a cybersecurity incident</description>
      <pubDate>Mon, 23 Feb 2026 11:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/advantest-ransomware-attack/</guid>
    </item>
    <item>
      <title>Jackpotting Surge Costs Banks Over $20m, Warns FBI</title>
      <link>https://www.infosecurity-magazine.com/news/jackpotting-surge-costs-banks-20m/</link>
      <description>A new FBI Flash alert claims $20m was lost to ATM jackpotting attacks in 2025 alone</description>
      <pubDate>Mon, 23 Feb 2026 10:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/jackpotting-surge-costs-banks-20m/</guid>
    </item>
    <item>
      <title>University of Mississippi Medical Center Still Offline After Ransomware Attack</title>
      <link>https://www.infosecurity-magazine.com/news/university-mississippi-medical/</link>
      <description>University of Mississippi Medical Center is still scrambling to respond to a ransomware attack last Thursday</description>
      <pubDate>Mon, 23 Feb 2026 08:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/university-mississippi-medical/</guid>
    </item>
    <item>
      <title>Dramatic Escalation in Frequency and Power of DDoS Attacks </title>
      <link>https://www.infosecurity-magazine.com/news/ddos-escalation-frequency-power/</link>
      <description>DDoS attack frequency has risen to ‘alarming levels,’ warns Radware report</description>
      <pubDate>Fri, 20 Feb 2026 12:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/ddos-escalation-frequency-power/</guid>
    </item>
    <item>
      <title>Android Malware Hijacks Google Gemini to Stay Hidden</title>
      <link>https://www.infosecurity-magazine.com/news/android-malware-hijacks-google/</link>
      <description>A new Android malware implant using Google Gemini to perform persistence tasks was discovered on VirusTotal and analyzed by ESET</description>
      <pubDate>Fri, 20 Feb 2026 11:35:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/android-malware-hijacks-google/</guid>
    </item>
    <item>
      <title>Remcos RAT Expands Real-Time Surveillance Capabilities</title>
      <link>https://www.infosecurity-magazine.com/news/remcos-rat-expands-real-time/</link>
      <description>New Remcos RAT variant enhances real-time surveillance and evasion techniques to compromise Windows</description>
      <pubDate>Thu, 19 Feb 2026 16:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/remcos-rat-expands-real-time/</guid>
    </item>
    <item>
      <title>Industrial-Scale Fake Coretax Apps Drive $2m Fraud in Indonesia</title>
      <link>https://www.infosecurity-magazine.com/news/fake-coretax-apps-fraud-indonesia/</link>
      <description>Fraud campaign exploiting Indonesia’s Coretax resulted in $1.5m to $2m in losses via malicious apps</description>
      <pubDate>Thu, 19 Feb 2026 15:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/fake-coretax-apps-fraud-indonesia/</guid>
    </item>
    <item>
      <title>Industrial Control System Vulnerabilities Hit Record Highs </title>
      <link>https://www.infosecurity-magazine.com/news/industrial-control-system-vulns/</link>
      <description>Forescout paper reveals ICS advisories hit a record 508 in 2025</description>
      <pubDate>Thu, 19 Feb 2026 13:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/industrial-control-system-vulns/</guid>
    </item>
    <item>
      <title>Starkiller: New ‘Commercial-Grade’ Phishing Kit Bypasses MFA </title>
      <link>https://www.infosecurity-magazine.com/news/starkiller-phishing-kit-bypasses/</link>
      <description>A new cybercriminal toolkit uses proxies to mimic popular online services and represents a “significant escalation in phishing infrastructure,” warn researchers at Abnormal</description>
      <pubDate>Thu, 19 Feb 2026 12:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/starkiller-phishing-kit-bypasses/</guid>
    </item>
    <item>
      <title>Flaws in Popular Software Development App Extensions Allow Data Exfiltration</title>
      <link>https://www.infosecurity-magazine.com/news/vulnerabilities-vs-code-cursor/</link>
      <description>Four serious new vulnerabilities affect Microsoft Visual Studio Code, Cursor and Windsurf extensions, three of which remain unpatched</description>
      <pubDate>Thu, 19 Feb 2026 10:45:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/vulnerabilities-vs-code-cursor/</guid>
    </item>
    <item>
      <title>Researchers Reveal Six New OpenClaw Vulnerabilities</title>
      <link>https://www.infosecurity-magazine.com/news/researchers-six-new-openclaw/</link>
      <description>Endor Labs has published details of six new vulnerabilities in popular AI assistant OpenClaw </description>
      <pubDate>Thu, 19 Feb 2026 10:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/researchers-six-new-openclaw/</guid>
    </item>
    <item>
      <title>Cryptojacking Campaign Exploits Driver to Boost Monero Mining</title>
      <link>https://www.infosecurity-magazine.com/news/cryptojacking-driver-boost-monero/</link>
      <description>Cryptojacking campaign used pirated software to deploy a persistent XMRig miner with stealth tactics</description>
      <pubDate>Wed, 18 Feb 2026 16:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/cryptojacking-driver-boost-monero/</guid>
    </item>
    <item>
      <title>AI Assistants Used as Covert Command-and-Control Relays</title>
      <link>https://www.infosecurity-magazine.com/news/ai-assistants-covert-c2-relays/</link>
      <description>AIs like Grok and Microsoft Copilot can be exploited as covert C2 channels for malware communication</description>
      <pubDate>Wed, 18 Feb 2026 15:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/ai-assistants-covert-c2-relays/</guid>
    </item>
    <item>
      <title>Record Number of Ransomware Victims and Groups in 2025</title>
      <link>https://www.infosecurity-magazine.com/news/record-number-ransomware-victims/</link>
      <description>Searchlight Cyber reports a 30% annual increase in ransomware victim numbers in 2025</description>
      <pubDate>Wed, 18 Feb 2026 11:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/record-number-ransomware-victims/</guid>
    </item>
    <item>
      <title>Chinese APT Group Exploits Dell Zero-Day for Two Years</title>
      <link>https://www.infosecurity-magazine.com/news/chinese-apt-exploits-dell-zeroday/</link>
      <description>Mandiant reveals campaign featuring exploit of a CVSS 10.0 CVE in Dell RecoverPoint for Virtual Machines</description>
      <pubDate>Wed, 18 Feb 2026 10:10:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/chinese-apt-exploits-dell-zeroday/</guid>
    </item>
    <item>
      <title>Android 17 Beta Introduces Secure-By-Default Architecture</title>
      <link>https://www.infosecurity-magazine.com/news/android-17-beta-secure-default/</link>
      <description>Android 17 Beta introduces privacy, security updates and a new Canary channel for improved development</description>
      <pubDate>Tue, 17 Feb 2026 16:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/android-17-beta-secure-default/</guid>
    </item>
    <item>
      <title>Apple Expands RCS Encryption and Memory Protections in iOS 26.4</title>
      <link>https://www.infosecurity-magazine.com/news/apple-rcs-encryption-memory/</link>
      <description>iOS 26.4 Beta adds end-to-end encryption for RCS messaging and enhanced Memory Integrity Enforcement</description>
      <pubDate>Tue, 17 Feb 2026 15:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/apple-rcs-encryption-memory/</guid>
    </item>
    <item>
      <title>Low-Skilled Cybercriminals Use AI to Perform "Vibe Extortion" Attacks</title>
      <link>https://www.infosecurity-magazine.com/news/cybercriminals-ai-vibe-extortion/</link>
      <description>Unit 42 researchers observed a low-skilled threat actor using an LLM to script a professional extortion strategy, complete with deadlines and pressure tactics</description>
      <pubDate>Tue, 17 Feb 2026 13:45:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/cybercriminals-ai-vibe-extortion/</guid>
    </item>
    <item>
      <title>Over-Privileged AI Drives 4.5 Times Higher Incident Rates</title>
      <link>https://www.infosecurity-magazine.com/news/overprivileged-ai-45-times-higher/</link>
      <description>Teleport study reveals that organizations running over-privileged AI have a 76% incident rate</description>
      <pubDate>Tue, 17 Feb 2026 13:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/overprivileged-ai-45-times-higher/</guid>
    </item>
    <item>
      <title>Significant Rise in Ransomware Attacks Targeting Industrial Operations</title>
      <link>https://www.infosecurity-magazine.com/news/rise-in-ransomware-targeting/</link>
      <description>Dragos annual report warns of a surge in ransomware attacks causing increased operational disruption in industrial environments </description>
      <pubDate>Tue, 17 Feb 2026 12:50:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/rise-in-ransomware-targeting/</guid>
    </item>
    <item>
      <title>Infostealer Targets OpenClaw to Loot Victim’s Digital Life</title>
      <link>https://www.infosecurity-magazine.com/news/infostealer-targets-openclaw/</link>
      <description>Hudson Rock has warned OpenClaw users that infostealers are targeting their configuration files</description>
      <pubDate>Tue, 17 Feb 2026 09:35:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/infostealer-targets-openclaw/</guid>
    </item>
    <item>
      <title>Vulnerabilities in Password Managers Allow Hackers to View and Change Passwords</title>
      <link>https://www.infosecurity-magazine.com/news/vulnerabilities-password-managers/</link>
      <description>Security researchers have challenged end-to-end encryption claims from popular commercial password managers</description>
      <pubDate>Mon, 16 Feb 2026 17:15:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/vulnerabilities-password-managers/</guid>
    </item>
    <item>
      <title>SMEs Wrong to Assume They Won’t Be Hit by Cyber-Attacks, NCSC Boss Warns 
</title>
      <link>https://www.infosecurity-magazine.com/news/sme-cyber-attack-threat-ncsc/</link>
      <description>NCSC’s Richard Horne has warned that cybercriminals do not care about business size and called for SMEs to act now to secure their organizations  </description>
      <pubDate>Mon, 16 Feb 2026 16:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/sme-cyber-attack-threat-ncsc/</guid>
    </item>
    <item>
      <title>OysterLoader Evolves With New C2 Infrastructure and Obfuscation</title>
      <link>https://www.infosecurity-magazine.com/news/oysterloader-new-c2-infrastructure/</link>
      <description>OysterLoader malware evolves into 2026, refining C2 infrastructure, obfuscation &amp; infection stages</description>
      <pubDate>Mon, 16 Feb 2026 16:15:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/oysterloader-new-c2-infrastructure/</guid>
    </item>
    <item>
      <title>Operation DoppelBrand Weaponizes Trusted Brands For Credential Theft</title>
      <link>https://www.infosecurity-magazine.com/news/operation-doppelbrand-trusted/</link>
      <description>New phishing campaign dubbed Operation DoppelBrand targeted major financial firms like Wells Fargo</description>
      <pubDate>Mon, 16 Feb 2026 15:45:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/operation-doppelbrand-trusted/</guid>
    </item>
    <item>
      <title>Google Warns of In the Wild Exploit as It Patches New Chrome Zero Day</title>
      <link>https://www.infosecurity-magazine.com/news/google-patches-new-in-wild-chrome/</link>
      <description>A high severity vulnerability in Google Chrome and allows remote attackers to execute code </description>
      <pubDate>Mon, 16 Feb 2026 11:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/google-patches-new-in-wild-chrome/</guid>
    </item>
    <item>
      <title>Crypto Payments to Human Traffickers Surges 85% </title>
      <link>https://www.infosecurity-magazine.com/news/crypto-payments-human-traffickers/</link>
      <description>Chainalysis warns that online fraud is fuelling sophisticated human trafficking operations </description>
      <pubDate>Mon, 16 Feb 2026 10:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/crypto-payments-human-traffickers/</guid>
    </item>
    <item>
      <title>Odido Breach Impacts Millions of Dutch Telco Users</title>
      <link>https://www.infosecurity-magazine.com/news/odido-breach-millions-dutch-telco/</link>
      <description>Dutch telco Odido has revealed a major data breach impacting over six million customers</description>
      <pubDate>Mon, 16 Feb 2026 09:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/odido-breach-millions-dutch-telco/</guid>
    </item>
    <item>
      <title>Munich Security Conference: Cyber Threats Lead G7 Risk Index, Disinformation Ranks Third</title>
      <link>https://www.infosecurity-magazine.com/news/munich-security-index-cyberattacks/</link>
      <description>G7 countries ranked cyber-attacks as the top risk, while BICS members placed cyber threats only as the eighth most pressing risk</description>
      <pubDate>Fri, 13 Feb 2026 12:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/munich-security-index-cyberattacks/</guid>
    </item>
    <item>
      <title>Fake AI Assistants in Google Chrome Web Store Steal Passwords and Spy on Emails</title>
      <link>https://www.infosecurity-magazine.com/news/fake-ai-assistants-google-chrome/</link>
      <description>Hundreds of thousands of users have downloaded malicious AI extensions masquerading as ChatGPT, Gemini, Grok and others, warn cybersecurity researchers at LayerX</description>
      <pubDate>Fri, 13 Feb 2026 11:25:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/fake-ai-assistants-google-chrome/</guid>
    </item>
    <item>
      <title>World Leaks Ransomware Group Adds Stealthy, Custom Malware ‘RustyRocket’ to Attacks</title>
      <link>https://www.infosecurity-magazine.com/news/world-leaks-ransomware-rustyrocket/</link>
      <description>Accenture Cybersecurity warns over difficult to detect, “sophisticated toolset” being deployed as part of extortion campaigns</description>
      <pubDate>Thu, 12 Feb 2026 13:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/world-leaks-ransomware-rustyrocket/</guid>
    </item>
    <item>
      <title>Nation-State Hackers Embrace Gemini AI for Malicious Campaigns, Google Finds</title>
      <link>https://www.infosecurity-magazine.com/news/nation-state-hackers-gemini-ai/</link>
      <description>Google researchers found that government-backed hackers now use AI throughout the whole attack lifecycle</description>
      <pubDate>Thu, 12 Feb 2026 12:45:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/nation-state-hackers-gemini-ai/</guid>
    </item>
    <item>
      <title>AI Skills Represent Dangerous New Attack Surface, Says TrendAI</title>
      <link>https://www.infosecurity-magazine.com/news/ai-skills-dangerous-new-attack/</link>
      <description>New TrendAI report warns that most security tools can’t protect against attacks on AI skills artifacts</description>
      <pubDate>Thu, 12 Feb 2026 10:45:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/ai-skills-dangerous-new-attack/</guid>
    </item>
    <item>
      <title>Time to Exploit Plummets as N-Day Flaws Dominate</title>
      <link>https://www.infosecurity-magazine.com/news/time-exploit-plummets-nday-flaws/</link>
      <description>Flashpoint warns of a dramatic drop in the average time between vulnerability disclosure and exploitation</description>
      <pubDate>Thu, 12 Feb 2026 09:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/time-exploit-plummets-nday-flaws/</guid>
    </item>
    <item>
      <title>North Korean Hackers Use Deepfake Video Calls to Target Crypto Firms</title>
      <link>https://www.infosecurity-magazine.com/news/north-korea-hackers-deepfake-crypto/</link>
      <description>Campaign combines stolen Telegram accounts, fake Zoom calls and ClickFix attacks to deploy infostealer malware</description>
      <pubDate>Wed, 11 Feb 2026 16:35:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/north-korea-hackers-deepfake-crypto/</guid>
    </item>
    <item>
      <title>US Court Hands Crypto Scammer 20 Years in $73m Case</title>
      <link>https://www.infosecurity-magazine.com/news/court-hands-crypto-scammer-20-years/</link>
      <description>A federal court has sentenced crypto-scammer Daren Li to 20 years in absentia </description>
      <pubDate>Wed, 11 Feb 2026 12:05:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/court-hands-crypto-scammer-20-years/</guid>
    </item>
    <item>
      <title>FIRST Forecasts Record-Breaking 50,000+ CVEs in 2026</title>
      <link>https://www.infosecurity-magazine.com/news/first-forecasts-record-50000-cve/</link>
      <description>This year should break all the records in terms of vulnerability disclosed, reaching or even surpassing 50,000 new CVEs disclosed</description>
      <pubDate>Wed, 11 Feb 2026 11:35:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/first-forecasts-record-50000-cve/</guid>
    </item>
    <item>
      <title>Microsoft Fixes Six Zero Day Vulnerability in February Patch Tuesday</title>
      <link>https://www.infosecurity-magazine.com/news/microsoft-six-zero-day-feb-2026/</link>
      <description>Six actively exploited zero-day bug have been patched by Microsoft</description>
      <pubDate>Wed, 11 Feb 2026 09:50:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/microsoft-six-zero-day-feb-2026/</guid>
    </item>
    <item>
      <title>Phorpiex Phishing Delivers Low-Noise Global Group Ransomware</title>
      <link>https://www.infosecurity-magazine.com/news/phorpiex-phishing-global-group/</link>
      <description>High-volume phishing campaign delivers Phorpiex malware via malicious Windows Shortcut files</description>
      <pubDate>Tue, 10 Feb 2026 16:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/phorpiex-phishing-global-group/</guid>
    </item>
    <item>
      <title>“Digital Parasite” Warning as Attackers Favor Stealth for Extortion</title>
      <link>https://www.infosecurity-magazine.com/news/digital-parasite-attackers-stealth/</link>
      <description>Picus Security warns of the increasingly sophisticated ways malicious activity is staying hidden</description>
      <pubDate>Tue, 10 Feb 2026 14:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/digital-parasite-attackers-stealth/</guid>
    </item>
    <item>
      <title>New Mobile Spyware ZeroDayRAT Targets Android and iOS</title>
      <link>https://www.infosecurity-magazine.com/news/zerodayrat-mobile-spyware-android/</link>
      <description>ZeroDayRAT is a new mobile spyware targeting Android and iOS, offering attackers persistent access</description>
      <pubDate>Tue, 10 Feb 2026 14:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/zerodayrat-mobile-spyware-android/</guid>
    </item>
    <item>
      <title>Singapore Takes Down Chinese Hackers Targeting Telco Networks</title>
      <link>https://www.infosecurity-magazine.com/news/singapore-takes-down-china-hackers/</link>
      <description>Operation Cyber Guardian was Singapore’s largest and longest running anti-cyber threat law enforcement operation</description>
      <pubDate>Tue, 10 Feb 2026 12:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/singapore-takes-down-china-hackers/</guid>
    </item>
    <item>
      <title>NCSC Issues Warning Over “Severe” Cyber-Attacks Targeting Critical National Infrastructure </title>
      <link>https://www.infosecurity-magazine.com/news/ncsc-warning-severe-cyberattacks/</link>
      <description>NCSC call firms to ‘act now’ following disruptive malware attacks targeting Polish energy providers</description>
      <pubDate>Tue, 10 Feb 2026 11:50:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/ncsc-warning-severe-cyberattacks/</guid>
    </item>
    <item>
      <title>European Governments Breached in Zero-Day Attacks Targeting Ivanti</title>
      <link>https://www.infosecurity-magazine.com/news/european-governments-zeroday/</link>
      <description>The European Commission and government agencies in Finland and the Netherlands have suffered potentially related breaches</description>
      <pubDate>Tue, 10 Feb 2026 09:45:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/european-governments-zeroday/</guid>
    </item>
    <item>
      <title>New Zero-Click Flaw in Claude Desktop Extensions, Anthropic Declines Fix</title>
      <link>https://www.infosecurity-magazine.com/news/zeroclick-flaw-claude-dxt/</link>
      <description>Security researchers from LayerX identified a new flaw in 50 Claude Desktop Extensions that could lead to unauthorized remote code execution</description>
      <pubDate>Mon, 09 Feb 2026 17:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/zeroclick-flaw-claude-dxt/</guid>
    </item>
    <item>
      <title>Two Connecticut Men Charged In Alleged $3m Gambling Fraud Scheme</title>
      <link>https://www.infosecurity-magazine.com/news/men-charged-gambling-fraud-scheme/</link>
      <description>Two Connecticut men face federal charges for a $3m scheme targeting online gambling platforms</description>
      <pubDate>Mon, 09 Feb 2026 16:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/men-charged-gambling-fraud-scheme/</guid>
    </item>
    <item>
      <title>VoidLink Malware Exhibits Multi-Cloud Capabilities and AI Code</title>
      <link>https://www.infosecurity-magazine.com/news/voidlink-malware-multi-cloud-ai/</link>
      <description>VoidLink, a Linux-based C2 framework, facilitates credential theft, data exfiltration across clouds</description>
      <pubDate>Mon, 09 Feb 2026 15:25:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/voidlink-malware-multi-cloud-ai/</guid>
    </item>
    <item>
      <title>BridgePay Confirms Ransomware Attack, No Card Data Compromised</title>
      <link>https://www.infosecurity-magazine.com/news/bridgepay-confirms-ransomware/</link>
      <description>The services of Florida-based payments platform BridgePay are offline due to a ransomware attack</description>
      <pubDate>Mon, 09 Feb 2026 11:15:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/bridgepay-confirms-ransomware/</guid>
    </item>
    <item>
      <title>Social Media Platforms Earn Billions from Scam Ads</title>
      <link>https://www.infosecurity-magazine.com/news/social-media-platforms-billions/</link>
      <description>Revolut claims social media sites make £3.8bn annually from scam ads targeting European users</description>
      <pubDate>Mon, 09 Feb 2026 10:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/social-media-platforms-billions/</guid>
    </item>
    <item>
      <title>Researchers Find 40,000+ Exposed OpenClaw Instances</title>
      <link>https://www.infosecurity-magazine.com/news/researchers-40000-exposed-openclaw/</link>
      <description>SecurityScorecard has identified over 40,000 OpenClaw deployments exposed to potential attack</description>
      <pubDate>Mon, 09 Feb 2026 09:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/researchers-40000-exposed-openclaw/</guid>
    </item>
    <item>
      <title>US Agencies Told to Scrap End of Support Edge Devices</title>
      <link>https://www.infosecurity-magazine.com/news/us-agencies-scrap-end-of-support/</link>
      <description>CISA has issued a new directive requiring federal agencies to decommission all end of support edge devices within 12 months to reduce ongoing exploitation risks</description>
      <pubDate>Mon, 09 Feb 2026 09:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/us-agencies-scrap-end-of-support/</guid>
    </item>
    <item>
      <title>Chinese-Made Malware Kit Targets Chinese-Based Routers and Edge Devices</title>
      <link>https://www.infosecurity-magazine.com/news/china-malware-kit-targets-routers/</link>
      <description>DKnife is a Chinese made malware framework that targets Chinese-based users</description>
      <pubDate>Fri, 06 Feb 2026 17:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/china-malware-kit-targets-routers/</guid>
    </item>
    <item>
      <title>Substack Confirms Data Breach, "Limited User Data" Compromised</title>
      <link>https://www.infosecurity-magazine.com/news/substack-confirms-data-breach/</link>
      <description>Substack did not specify the number of users affected by the data breach</description>
      <pubDate>Fri, 06 Feb 2026 16:22:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/substack-confirms-data-breach/</guid>
    </item>
    <item>
      <title>New Cyber Startup Programme to Debut at Infosecurity Europe 2026 </title>
      <link>https://www.infosecurity-magazine.com/news/cyber-startup-programme/</link>
      <description>Infosecurity Europe 2026 will debut a new Cyber Startup Programme, featuring a dedicated show-floor zone for early-stage cybersecurity companies to showcase innovations, connect with investors and highlight emerging technologies</description>
      <pubDate>Fri, 06 Feb 2026 08:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/cyber-startup-programme/</guid>
    </item>
    <item>
      <title>Malicious Commands in GitHub Codespaces Enable RCE</title>
      <link>https://www.infosecurity-magazine.com/news/malicious-commands-in-github/</link>
      <description>Flaws in GitHub Codespaces allow RCE via crafted repositories or pull requests</description>
      <pubDate>Thu, 05 Feb 2026 14:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/malicious-commands-in-github/</guid>
    </item>
    <item>
      <title>Smartphones Now Involved in Nearly Every Police Investigation</title>
      <link>https://www.infosecurity-magazine.com/news/smartphones-involved-every-police/</link>
      <description>Cellebrite data confirms digital evidence is now central to almost all cases</description>
      <pubDate>Thu, 05 Feb 2026 13:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/smartphones-involved-every-police/</guid>
    </item>
    <item>
      <title>New Hacking Campaign Exploits Microsoft Windows WinRAR Vulnerability </title>
      <link>https://www.infosecurity-magazine.com/news/hacking-exploits-windows-winrar/</link>
      <description>Researchers at Check Point link ‘Amarath-Dragon’ attacks to prolific Chinese cyber-espionage operation </description>
      <pubDate>Thu, 05 Feb 2026 11:50:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/hacking-exploits-windows-winrar/</guid>
    </item>
    <item>
      <title>AI-Enabled Voice and Virtual Meeting Fraud Surges 1000%+</title>
      <link>https://www.infosecurity-magazine.com/news/ai-voice-virtual-meeting-fraud/</link>
      <description>Pindrop warns of 1210% increase in AI-powered fraud last year</description>
      <pubDate>Thu, 05 Feb 2026 10:05:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/ai-voice-virtual-meeting-fraud/</guid>
    </item>
    <item>
      <title>Global SystemBC Botnet Found Active Across 10,000 Infected Systems</title>
      <link>https://www.infosecurity-magazine.com/news/global-systembc-botnet-10000/</link>
      <description>SystemBC malware linked to 10,000 infected IPs, posing risks to sensitive government infrastructure</description>
      <pubDate>Wed, 04 Feb 2026 16:15:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/global-systembc-botnet-10000/</guid>
    </item>
    <item>
      <title>New Technical Markers Reveal Expanding ShadowSyndicate Cybercriminal Infrastructure</title>
      <link>https://www.infosecurity-magazine.com/news/shadowsyndicate/</link>
      <description>ShadowSyndicate cluster expands with new SSH fingerprints connecting servers to other ransomware ops</description>
      <pubDate>Wed, 04 Feb 2026 15:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/shadowsyndicate/</guid>
    </item>
    <item>
      <title>AI Drives Doubling of Phishing Attacks in a Year</title>
      <link>https://www.infosecurity-magazine.com/news/ai-double-volume-phishing-attacks/</link>
      <description>Cofense claims AI is making phishing emails more personalized and sophisticated</description>
      <pubDate>Wed, 04 Feb 2026 14:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/ai-double-volume-phishing-attacks/</guid>
    </item>
    <item>
      <title>Two Critical Flaws in n8n AI Workflow Automation Platform Allow Complete Takeover</title>
      <link>https://www.infosecurity-magazine.com/news/two-critical-flaws-in-n8n-ai/</link>
      <description>Pillar Security discovered two new critical vulnerabilities in n8n that could lead to supply chain compromise, credential harvesting and complete takeover attacks</description>
      <pubDate>Wed, 04 Feb 2026 13:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/two-critical-flaws-in-n8n-ai/</guid>
    </item>
    <item>
      <title>SolarWinds Web Help Desk Vulnerability Actively Exploited </title>
      <link>https://www.infosecurity-magazine.com/news/solarwinds-web-help-desk/</link>
      <description>CISA has added a critical CVE in SolarWinds Web Help Desk to its KEV Catalog</description>
      <pubDate>Wed, 04 Feb 2026 10:15:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/solarwinds-web-help-desk/</guid>
    </item>
    <item>
      <title>Hundreds of Malicious Crypto Trading Add-Ons Found in Moltbot/OpenClaw</title>
      <link>https://www.infosecurity-magazine.com/news/malicious-crypto-trading-skills/</link>
      <description>A security researcher found 386 malicious ‘skills’ published on ClawHub, a skill repository for the popular OpenClaw AI assistant project</description>
      <pubDate>Tue, 03 Feb 2026 16:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/malicious-crypto-trading-skills/</guid>
    </item>
    <item>
      <title>SQL Injection Flaw Affects 40,000 WordPress Sites</title>
      <link>https://www.infosecurity-magazine.com/news/wordpress-sql-injection-flaw-40000/</link>
      <description>40,000 WordPress sites are vulnerable to SQL injection in Quiz and Survey Master plugin</description>
      <pubDate>Tue, 03 Feb 2026 16:15:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/wordpress-sql-injection-flaw-40000/</guid>
    </item>
    <item>
      <title>DockerDash Exposes AI Supply Chain Weakness In Docker's Ask Gordon</title>
      <link>https://www.infosecurity-magazine.com/news/dockerdash-weakness-dockers-ask/</link>
      <description>DockerDash vulnerability allows RCE and data exfiltration via unverified metadata in Ask Gordon</description>
      <pubDate>Tue, 03 Feb 2026 15:15:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/dockerdash-weakness-dockers-ask/</guid>
    </item>
    <item>
      <title>UK ICO Launches Investigation into X Over AI Generated Non-Consensual Sexual Imagery</title>
      <link>https://www.infosecurity-magazine.com/news/ico-investigates-x-over-grok-ai/</link>
      <description>UK Data Protection Watchdog has “serious concerns” over data privacy on Elon Musk’s social platform</description>
      <pubDate>Tue, 03 Feb 2026 14:47:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/ico-investigates-x-over-grok-ai/</guid>
    </item>
    <item>
      <title>Researchers Warn of New “Vect” RaaS Variant</title>
      <link>https://www.infosecurity-magazine.com/news/researchers-warn-new-vect-raas/</link>
      <description>A new ransomware-as-a-service operation dubbed “Vect” features custom malware</description>
      <pubDate>Tue, 03 Feb 2026 14:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/researchers-warn-new-vect-raas/</guid>
    </item>
    <item>
      <title>Cybercrime Unit of Paris Prosecutors Raid Elon Musk’s X Offices in France</title>
      <link>https://www.infosecurity-magazine.com/news/paris-prosecutors-raid-elon-musk-x/</link>
      <description>Elon Musk and X’s former CEO were summoned for voluntary interviews in Paris on April 20, 2026</description>
      <pubDate>Tue, 03 Feb 2026 12:45:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/paris-prosecutors-raid-elon-musk-x/</guid>
    </item>
    <item>
      <title>New Password-Stealing Phishing Campaign Targets Corporate Dropbox Credentials</title>
      <link>https://www.infosecurity-magazine.com/news/password-stealing-phishing-pdf/</link>
      <description>Multi-stage attack begins with fake message relating to business requests and evades detection with link hidden in a PDF</description>
      <pubDate>Tue, 03 Feb 2026 10:55:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/password-stealing-phishing-pdf/</guid>
    </item>
    <item>
      <title>Vibe-Coded Moltbook Exposes User Data, API Keys and More</title>
      <link>https://www.infosecurity-magazine.com/news/moltbook-exposes-user-data-api/</link>
      <description>Wiz Security claims Moltbook misconfiguration allowed full read and write access </description>
      <pubDate>Tue, 03 Feb 2026 10:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/moltbook-exposes-user-data-api/</guid>
    </item>
    <item>
      <title>NSA Publishes New Zero Trust Implementation Guidelines</title>
      <link>https://www.infosecurity-magazine.com/news/nsa-zero-trust-implementation/</link>
      <description>NSA released new guidelines to help organizations achieve target-level Zero Trust maturity</description>
      <pubDate>Mon, 02 Feb 2026 16:05:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/nsa-zero-trust-implementation/</guid>
    </item>
    <item>
      <title>Notepad++ Update Hijacking Linked to Hosting Provider Compromise</title>
      <link>https://www.infosecurity-magazine.com/news/notepad-update-hijacked/</link>
      <description>A supply chain attack on Notepad++ update process was linked to compromised hosting infrastructure</description>
      <pubDate>Mon, 02 Feb 2026 15:15:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/notepad-update-hijacked/</guid>
    </item>
    <item>
      <title>Fancy Bear Exploits Microsoft Office Flaw in Ukraine, EU Cyber-Attacks</title>
      <link>https://www.infosecurity-magazine.com/news/fancy-bear-exploits-office-flaw/</link>
      <description>Russia-linked hacking group Fancy Bear is exploiting a brand-new vulnerability in Microsoft Office, CERT-UA says</description>
      <pubDate>Mon, 02 Feb 2026 12:45:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/fancy-bear-exploits-office-flaw/</guid>
    </item>
    <item>
      <title>Android RAT Uses Hugging Face to Host Malware</title>
      <link>https://www.infosecurity-magazine.com/news/android-rat-hugging-face-host/</link>
      <description>Bitdefender has discovered a new Android malware campaign that uses Hugging Face </description>
      <pubDate>Mon, 02 Feb 2026 10:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/android-rat-hugging-face-host/</guid>
    </item>
    <item>
      <title>Former Google Engineer Found Guilty of Stealing AI Secrets</title>
      <link>https://www.infosecurity-magazine.com/news/former-google-engineer-guilty/</link>
      <description>Linwei Ding, a former Google engineer, has been found guilty of stealing trade secrets for China</description>
      <pubDate>Mon, 02 Feb 2026 09:20:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/former-google-engineer-guilty/</guid>
    </item>
    <item>
      <title>Labyrinth Chollima Evolves into Three North Korean Hacking Groups</title>
      <link>https://www.infosecurity-magazine.com/news/labyrinth-chollima-dprk-three/</link>
      <description>CrowdStrike assessed that two new threat actor groups have spun off from North Korean Labyrinth Chollima hackers</description>
      <pubDate>Fri, 30 Jan 2026 15:40:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/labyrinth-chollima-dprk-three/</guid>
    </item>
    <item>
      <title>New AI-Developed Malware Campaign Targets Iranian Protests</title>
      <link>https://www.infosecurity-magazine.com/news/ai-malware-redkitten-iranian/</link>
      <description>The RedKitten campaign distributes lures designed to target people seeking information about missing persons or political dissidents in Iran</description>
      <pubDate>Fri, 30 Jan 2026 11:55:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/ai-malware-redkitten-iranian/</guid>
    </item>
    <item>
      <title>National Crime Agency and NatWest Issue Joint Warning Over Invoice Fraud Threat</title>
      <link>https://www.infosecurity-magazine.com/news/nca-natwest-warning-over-invoice/</link>
      <description>Cyber fraudsters targeting corporate finance departments costs businesses millions a year</description>
      <pubDate>Fri, 30 Jan 2026 11:10:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/nca-natwest-warning-over-invoice/</guid>
    </item>
    <item>
      <title>Google Disrupts Extensive Residential Proxy Networks</title>
      <link>https://www.infosecurity-magazine.com/news/google-disrupts-proxy-networks/</link>
      <description>Google has taken coordinated action against the massive IPIDEA residential proxy network, enhancing customer protections and disrupting cybercrime operations</description>
      <pubDate>Thu, 29 Jan 2026 17:15:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/google-disrupts-proxy-networks/</guid>
    </item>
    <item>
      <title>Operation Winter SHIELD: FBI Issues Call to Arms for Organizations to Improve Cybersecurity</title>
      <link>https://www.infosecurity-magazine.com/news/fbi-operation-winter-shield-cyber/</link>
      <description>The FBI outlines ten actions which organizations can take to defend networks against cybercriminal and nation-state threats</description>
      <pubDate>Thu, 29 Jan 2026 16:50:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/fbi-operation-winter-shield-cyber/</guid>
    </item>
    <item>
      <title>France Fines National Employment Agency €5m Over 2024 Data Breach</title>
      <link>https://www.infosecurity-magazine.com/news/france-finesemployment-agency-5m/</link>
      <description>The French data protection regulator said that France Travail’s response to a 2024 data breach violated GDPR</description>
      <pubDate>Thu, 29 Jan 2026 16:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/france-finesemployment-agency-5m/</guid>
    </item>
    <item>
      <title>New CISA Guidance Targets Insider Threat Risks</title>
      <link>https://www.infosecurity-magazine.com/news/cisa-targets-insider-threat-risks/</link>
      <description>CISA urges action against insider threats with publication of a new infographic offering strategies to manage risks</description>
      <pubDate>Thu, 29 Jan 2026 16:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/cisa-targets-insider-threat-risks/</guid>
    </item>
    <item>
      <title>FBI Takes Down RAMP Ransomware Forum</title>
      <link>https://www.infosecurity-magazine.com/news/fbi-takes-down-ramp-ransomware/</link>
      <description>The dark web forum administrator confirmed the takedown and said they had “no plans to rebuild”</description>
      <pubDate>Thu, 29 Jan 2026 13:05:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/fbi-takes-down-ramp-ransomware/</guid>
    </item>
    <item>
      <title>Ransomware Victim Numbers Rise, Despite Drop in Active Extortion Groups</title>
      <link>https://www.infosecurity-magazine.com/news/ransomware-numbers-rise-despite/</link>
      <description>Ransomware victims surged in Q4 2025 despite fewer active extortion groups, with data leaks rising 50%, ReliaQuest researchers report</description>
      <pubDate>Thu, 29 Jan 2026 13:01:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/ransomware-numbers-rise-despite/</guid>
    </item>
    <item>
      <title>US Data Breaches Hit Record High but Victim Numbers Decline</title>
      <link>https://www.infosecurity-magazine.com/news/us-data-breaches-record-high/</link>
      <description>Non-profit ITRC says the number of data breaches increased 5% annually to reach a record total in 2025</description>
      <pubDate>Thu, 29 Jan 2026 12:45:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/us-data-breaches-record-high/</guid>
    </item>
    <item>
      <title>Number of Cybersecurity Pros Surges 194% in Four Years</title>
      <link>https://www.infosecurity-magazine.com/news/number-cybersecurity-pros-surges/</link>
      <description>Cybersecurity is now the fifth fastest-growing occupation in the UK, says Socura</description>
      <pubDate>Thu, 29 Jan 2026 09:45:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/number-cybersecurity-pros-surges/</guid>
    </item>
    <item>
      <title>Cybersecurity Teams Embrace AI, Just Not at the Scale Marketing Suggests</title>
      <link>https://www.infosecurity-magazine.com/news/cybersecurity-teams-embrace-ai/</link>
      <description>Despite the seemingly widespread adoption of AI for security operations, security leaders primarily use it for “relatively basic use cases,” said a Sumo Logic study</description>
      <pubDate>Thu, 29 Jan 2026 09:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/cybersecurity-teams-embrace-ai/</guid>
    </item>
    <item>
      <title>Autonomous System Uncovers Long-Standing OpenSSL Flaws</title>
      <link>https://www.infosecurity-magazine.com/news/12-openssl-flaws/</link>
      <description>A recent update has fixed 12 vulnerabilities in OpenSSL, some existing in the codebase for years</description>
      <pubDate>Wed, 28 Jan 2026 16:45:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/12-openssl-flaws/</guid>
    </item>
    <item>
      <title>Critical and High Severity n8n Sandbox Flaws Allow RCE</title>
      <link>https://www.infosecurity-magazine.com/news/n8n-sandbox-flaws-allow-rce/</link>
      <description>Two critical security flaws in n8n have exposed sandboxing vulnerabilities, enabling remote code execution for attackers</description>
      <pubDate>Wed, 28 Jan 2026 16:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/n8n-sandbox-flaws-allow-rce/</guid>
    </item>
    <item>
      <title>Emojis in PureRAT’s Code Point to AI-Generated Malware Campaign</title>
      <link>https://www.infosecurity-magazine.com/news/emojis-in-purerats-code/</link>
      <description>Researchers discover that PureRAT’s code now contains emojis – indicating it has been written by AI based-on comments ripped from social media. </description>
      <pubDate>Wed, 28 Jan 2026 12:10:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/emojis-in-purerats-code/</guid>
    </item>
    <item>
      <title>AI Security Threats Loom as Enterprise Usage Jumps 91%</title>
      <link>https://www.infosecurity-magazine.com/news/ai-security-threats-loom-zscaler/</link>
      <description>Zscaler analysts found critical vulnerabilities in 100% of enterprise AI systems, with 90% compromised in under 90 minutes</description>
      <pubDate>Wed, 28 Jan 2026 11:45:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/ai-security-threats-loom-zscaler/</guid>
    </item>
    <item>
      <title>Researchers Uncover 454,000+ Malicious Open Source Packages</title>
      <link>https://www.infosecurity-magazine.com/news/454000-malicious-open-source/</link>
      <description>Sonatype warns that open source threats became industrialized with a surge in malicious packages in 2025</description>
      <pubDate>Wed, 28 Jan 2026 11:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/454000-malicious-open-source/</guid>
    </item>
    <item>
      <title>Chinese Money Launderers Drive Global Ecosystem Worth $82bn</title>
      <link>https://www.infosecurity-magazine.com/news/chinese-money-launderers-global/</link>
      <description>Chainalysis claims Chinese money launderers now account for 20% of global activity</description>
      <pubDate>Wed, 28 Jan 2026 10:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/chinese-money-launderers-global/</guid>
    </item>
    <item>
      <title>Pyodide Sandbox Escape Enables Remote Code Execution in Grist-Core</title>
      <link>https://www.infosecurity-magazine.com/news/pyodide-sandbox-escape-rce-grist/</link>
      <description>Critical sandbox escape vulnerability in Grist-Core enables remote code execution via a malicious formula</description>
      <pubDate>Tue, 27 Jan 2026 16:45:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/pyodide-sandbox-escape-rce-grist/</guid>
    </item>
    <item>
      <title>PeckBirdy Framework Tied to China-Aligned Cyber Campaigns</title>
      <link>https://www.infosecurity-magazine.com/news/peckbirdy-framework-tied-china/</link>
      <description>PeckBirdy command-and-control framework targeting gambling, government sectors in Asia since 2023 has been linked to China-aligned APTs</description>
      <pubDate>Tue, 27 Jan 2026 16:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/peckbirdy-framework-tied-china/</guid>
    </item>
    <item>
      <title>Over 80% of Ethical Hackers Now Use AI </title>
      <link>https://www.infosecurity-magazine.com/news/over-80-of-ethical-hackers-now-use/</link>
      <description>Bugcrowd study reveals 82% of security researchers now use AI, a big increase from 2023 figures</description>
      <pubDate>Tue, 27 Jan 2026 14:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/over-80-of-ethical-hackers-now-use/</guid>
    </item>
    <item>
      <title>Microsoft Releases Patch for Office Zero Day Amid Evidence of Exploitation</title>
      <link>https://www.infosecurity-magazine.com/news/microsoft-patch-office-zero-day/</link>
      <description>Microsoft urged customers running Microsoft Office 2016 and 2019 to apply the patch to be protected</description>
      <pubDate>Tue, 27 Jan 2026 10:45:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/microsoft-patch-office-zero-day/</guid>
    </item>
    <item>
      <title>World Leaks Ransomware Group Claims 1.4TB Nike Data Breach</title>
      <link>https://www.infosecurity-magazine.com/news/worldleaks-ransomware-14tb-nike/</link>
      <description>Nike is investigating after the World Leaks ransomware group posted a 1.4TB data dump</description>
      <pubDate>Tue, 27 Jan 2026 09:45:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/worldleaks-ransomware-14tb-nike/</guid>
    </item>
    <item>
      <title>CISA Releases List of Post-Quantum Cryptography Product Categories</title>
      <link>https://www.infosecurity-magazine.com/news/cisa-post-quantum-cryptography/</link>
      <description>CISA released initial list of PQC-capable hardware and software to guide companies amid quantum threats</description>
      <pubDate>Mon, 26 Jan 2026 16:15:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/cisa-post-quantum-cryptography/</guid>
    </item>
  </channel>
</rss>