Infosecurity News

  1. #BHUSA: Bug Bounty Botox – Why You Need a Security Process First

    Katie Moussouris explains why simply having a bug bounty program isn't enough to fix security problems

  2. #BHUSA: Failure to Challenge is a Social Engineering Risk

    The UK Ministry of Defence is actively training staff to confront individuals that are engaged in risky behaviours

  3. #BHUSA: What has Changed in the Post-Stuxnet Era?

    Investigative journalist Kim Zetter explains that Stuxnet continues to serves as a precedent for attacks happening now

  4. US Unmasks Suspected Conti Ransomware Actor

    State Department offers $10m reward for info on notorious group

  5. Zeppelin Ransomware Victims May Need Multiple Decryption Keys

    CISA issues new alert about RaaS variant

  6. Recovery From NHS Ransomware Attack May Take a Month

    Managed service provider Advanced publishes update on recent cyber incident

  7. CISA Unveils Cybersecurity Toolkit to Shield US Elections From Hackers

    The toolkit protects election infrastructure targeted by phishing, ransomware and DDoS attacks

  8. Zimbra RCE Vulnerability Exploited Without Admin Privileges

    Over 1,000 ZCS instances around the world were reportedly backdoored and compromised

  9. Android Banking Trojan SOVA Comes Back With New Features Including Ransomware

    SOVA v4 features new capabilities and is reportedly targeting more than 200 mobile applications

  10. #BHUSA: The Cyber Safety Review Board Outlines Log4j Lessons

    The CSRB concluded that the initial disclosure on Log4j was done right, but there is still much to improve

  11. #BHUSA: Russia's Wiper Attacks Against Ukraine Detailed

    According to researchers, Russia is rolling out a growing list of wiper attacks against Ukraine

  12. #BHUSA: Chris Krebs Explains How Cybersecurity Can Improve

    Former US CISA Director Chris Krebs opens Black Hat USA detailing the state of cybersecurity today

  13. #BHUSA: New Open Source Group Set to Streamline Threat Detection

    New open source project set to reduce operational pain for SecOps analysts

  14. Ransomware Data Theft Epidemic Fuelling BEC Attacks

    Accenture warns that stolen data is flooding the cybercrime underground

  15. Suspected $3m Romance Scammer Extradited to Japan

    Interpol warns of growing role of money mules

  16. DeathStalker's VileRAT Continues to Target Foreign and Crypto Exchanges

    The campaign is not only ongoing, the threat actors increased its efforts to compromise targets using VileRAT

  17. Cyber-criminals Shift From Macros to Shortcut Files to Hack Business PCs, HP Reports

    The report shows an 11% rise in archive files containing malware, including LNK files

  18. Emotet Tops List of July's Most Widely Used Malware

    The Emotet botnet continues to evolve and now includes a credit card stealer module

  19. Predator Pleads Guilty After Targeting Thousands of Girls Online

    West Sussex man blackmailed his victims

  20. Exploit Activity Surges 150% in Q2 Thanks to Log4Shell

    Malware and botnet detections also soar

What’s Hot on Infosecurity Magazine?