Infosecurity News

  1. Ukraine's Delta Military Intel System Hit by Attacks

    Phishing campaign spotted by CERT-UA

  2. Ransomware Groups to Increase Zero-Day Exploit-Based Access Methods in the Future

    Trend Micro’s latest research paper analyzed ways in which ransomware groups could evolve to stay on top of strengthened cyber-protection measures

  3. Meta Takes Down Over 200 Covert Influence Operations Since 2017

    The most common location for influence operations was Russia, according to Meta

  4. Mobile App Users at Risk as API Keys of Email Marketing Services Exposed

    Leaked API keys allow threat actors to perform a variety of unauthorized actions

  5. NIST to Scrap SHA-1 Algorithm by 2030

    The agency said it will stop using SHA-1 in its last remaining specified protocols by December 31 2030

  6. API Vulnerabilities Discovered in LEGO Marketplace

    The vulnerabilities, which are now fixed, could have put sensitive customer data at risk

  7. Agenda Ransomware Switches to Rust to Attack Critical Infrastructure

    Victim companies have a combined revenue of around $550m

  8. Meta's Bug Bounty Program Shows $2m Awarded in 2022

    The total amount since the program's establishment in 2011 is reportedly $16m

  9. Social Blade Confirms Data Breach Exposing PII on the Dark Web

    The company confirmed the data does not include any credit card information

  10. Two-Thirds of Security Pros Have Burnt Out in Past Year

    Excessive workload is the most common contributing factor

  11. Former Twitter Employee Gets 42 Months for Saudi Scheme

    Insider was bribed by the Middle East kingdom

  12. OECD Signs "Landmark" Privacy Agreement

    Club of rich countries wants to improve cross-border data flows

  13. Senate Approves Bill Banning TikTok From US Government Devices

    The bill still needs to receive approval from the US House of Representatives

  14. NSA, CISA Warn Against Threats to 5G Network Slicing

    Improper network slice management may enable attackers to access data from different network slices

  15. Loan Scam Campaign 'MoneyMonger' Exploits Flutter to Hide Malware

    Zimperium said the code was part of an existing campaign previously discovered by K7 Security Labs

  16. Feds Hit DDoS-for-Hire Services with 48 Domain Seizures

    Six also charged in connection with booter services

  17. Over 85% of Attacks Hide in Encrypted Channels

    Zscaler reveals 20% increase in malicious use of encryption

  18. Platforms Flooded with 144,000 Phishing Packages

    NuGet, PyPi and npm inundated with malicious packages

  19. Signed Microsoft Drivers Used in Attacks Against Businesses

    In some cases, the threat actor's intent was to ultimately provide SIM-swapping services

  20. AgentTesla Remains Most Prolific Malware in November, Emotet and Qbot Grow

    These are some of the key findings from the latest Check Point Research Most Wanted report

What’s Hot on Infosecurity Magazine?