Infosecurity News

  1. Google Chrome Vulnerability Lets Sites Quietly Overwrite Clipboard Contents

    The bug was discovered by developer Jeff Johnson, who detailed his findings in a blog post

  2. JuiceLedger Hacker Linked to First Phishing Campaign Targeting PyPI Users

    JuiceLedger started poisoning open-source packages as a way to target a wider audience in August

  3. New Ransomware Group BianLian Activity Exploding

    The threat actor using the common Go programming language and a custom toolkit claims twenty victims

  4. CISA, NSA and npm Release Software Supply Chain Guidance

    Best practices are designed to help developers bolster security

  5. UK Government Releases New AI Security Guidance

    New principles set to take on adversarial machine learning

  6. Chile and Montenegro Floored by Ransomware

    Governments reveal system compromise in separate incidents

  7. Source Code of Over 1800 Android and iOS Apps Gives Access to AWS Credentials

    Roughly 50% of all the apps analyzed were seen using the same AWS tokens found in other apps

  8. Ragnar Locker Ransomware Targets Energy Sector, Cybereason Suggests

    The malware can also check if specific products are installed, particularly security software

  9. Apple Releases Update for iOS 12 to Patch Exploited Vulnerability

    The flaw would allow the processing of maliciously crafted web content and arbitrary code execution

  10. Standards Body Publishes Guidelines for IoT Security Testing

    Document will help testers create benchmarks for security products

  11. Detected Cyber-Threats Surge 52% in 1H 2022

    Trend Micro warns of Linux-based ransomware

  12. Microsoft Finds Account Takeover Bug in TikTok

    Vulnerability impacted social media firm’s Android app

  13. Golang-based Malware Campaign Relies on James Webb Telescope's Image

    Initial infection begins with a phishing email containing a Microsoft Office attachment

  14. Evil Corp and Conti Linked to Cisco Data Breach, eSentire Suggests

    The firm said the tools used to attack Cisco were also deployed to compromise one of its clients

  15. UK Imposes Tough New Cybersecurity Rules for Telecom Providers

    Ofcom will be able to issue fines for non-compliance of up to 10% of turnover

  16. Intel Selects Check Point Quantum IoT Protect for RISC-V Platform

    IoT device manufacturers can now incorporate security at the start of the product life-cycle

  17. Initiative Aims to Encourage Diverse Talent into Cyber

    National Cybersecurity Alliance launches HBCU career program

  18. Ukrainian Police Bust Crypto Fraud Call Centers

    Scammers spoofed legitimate banks’ phone numbers

  19. ICO Pursues Traffic Accident Data Thieves

    Data protection regulator begins criminal proceedings

  20. ModernLoader Delivers Stealers, Cryptominers and RATs Via Fake Amazon Gift Cards

    The association between the three apparently unrelated campaigns was made by Cisco Talos

What’s Hot on Infosecurity Magazine?