Infosecurity News

  1. Magniber Ransomware Adopts JavaScript to Attack Individual Users

    Consumers should protect themselves by using least-privilege principles

  2. Report Shows How China Has Been Using Cyber-Attacks Over the Past Decade

    Consultancy firm Booz Allen has published a comprehensive report on Chinese-sponsored threat

  3. Chinese APT WIP19 Targets IT Service Providers and Telcos

    The group is characterized by the use of a stolen digital certificate issued by DEEPSoft

  4. Malicious WhatsApp Mod Spotted Infecting Android Devices

    YoWhatsApp v2.22.11.75 was distributed via ads on Android apps like Snaptube and VidMate

  5. Budworm Espionage Group Returns, Targets US State Legislature

    Budworm leveraged the Log4j vulnerabilities to compromise the Apache Tomcat service on servers

  6. IP Cameras, VoIP and Video Conferencing Revealed as Riskiest IoT Devices

    Warning to orgnaizations to be aware of risky devices across IT, IoT, OT and IoMT

  7. UK Government Urges Action to Enhance Supply Chain Security

    The NCSC guidance has been issued amid a significant increase in supply chain attacks in recent years

  8. #DTX2022: Cyber Needs to Redress the Defensive-Offensive Balance Following Russia-Ukraine

    The Russia-Ukraine conflict highlights the value of defensive cybersecurity, says Dr Alexi Drew

  9. FormBook Tops Check Point's Most Wanted Malware List For September

    Vidar, an infostealer, has entered the top 10 list in eighth place for the first time

  10. Microsoft October 2022 Patch Tuesday Fixes 84 Flaws, Including Zero-Day

    Thirteen of the 84 vulnerabilities fixed in yesterday’s update are classified as 'Critical'

  11. Singtel's Australian IT Firm Dialog Suffers Data Breach

    The breach affected around 20 clients and 1000 current and/or former Dialog employees

  12. Claroty Found Hardcoded Cryptographic Keys in Siemens PLCs Using RCE

    The vulnerability has been assigned a CVE – Siemens has already updated affected systems and published recommendations for mitigating the risk

  13. Polonium Uses Seven Backdoor Variants to Spy on Israeli Organizations

    Researchers at ESET found evidence of previously undocumented custom tools used by the hackers

  14. #ISC2Congress: US Government is Embracing 'Collective Defense'

    We are all in it together, says the DoE's chief information officer

  15. Google Unifies Recent Acquisitions Under New Cloud Security Offering

    Google embeds in cloud security market with new software suite

  16. Toyota Reveals Data Leak of 300,000 Customers

    The leak was caused by an access key being made publicly available on GitHub for almost five years

  17. A New Wave of PayPal Invoice Scams Using Crypto Disguise

    Trend Micro found evidence of new PayPal scammers impersonating crypto-related businesses

  18. #ISC2Congress: Cybersecurity Pros Must Prepare for Emerging Deepfake Threats

    The security risks posed by deepfake technology are increasing

  19. Calls for Better Microsoft Teams Backup as Confidential Info Sent on the Platform

    Many admitted to sending messages on Teams they should not have

  20. Pro-Russian Group KillNet Claims Responsibility for 14 US Airport DDoS Attacks

    The websites of several major US airports were disrupted on October 10, 2022

What’s Hot on Infosecurity Magazine?