Infosecurity News

  1. EvilProxy Phishing Toolkit Spotted on Dark Web Forums

    The tool highlights the growth in attacks against online services and MFA authorization mechanisms

  2. New Rules for Crypto Exchanges to Stop Sanctions Evaders

    UK Treasury demands exchanges report suspected breaches

  3. Samsung Reveals New US Data Breach

    Personal info of "certain customers" was affected

  4. IRS Leaks 120,000 Taxpayers' Personal Details

    US government still working out what went wrong

  5. US Police Deployed Obscure Smartphone Tracking Tool With No Warrants

    It would allow police to search billions of mobile device-based records, including GPS data

  6. Google Chrome Vulnerability Lets Sites Quietly Overwrite Clipboard Contents

    The bug was discovered by developer Jeff Johnson, who detailed his findings in a blog post

  7. JuiceLedger Hacker Linked to First Phishing Campaign Targeting PyPI Users

    JuiceLedger started poisoning open-source packages as a way to target a wider audience in August

  8. New Ransomware Group BianLian Activity Exploding

    The threat actor using the common Go programming language and a custom toolkit claims twenty victims

  9. CISA, NSA and npm Release Software Supply Chain Guidance

    Best practices are designed to help developers bolster security

  10. UK Government Releases New AI Security Guidance

    New principles set to take on adversarial machine learning

  11. Chile and Montenegro Floored by Ransomware

    Governments reveal system compromise in separate incidents

  12. Source Code of Over 1800 Android and iOS Apps Gives Access to AWS Credentials

    Roughly 50% of all the apps analyzed were seen using the same AWS tokens found in other apps

  13. Ragnar Locker Ransomware Targets Energy Sector, Cybereason Suggests

    The malware can also check if specific products are installed, particularly security software

  14. Apple Releases Update for iOS 12 to Patch Exploited Vulnerability

    The flaw would allow the processing of maliciously crafted web content and arbitrary code execution

  15. Standards Body Publishes Guidelines for IoT Security Testing

    Document will help testers create benchmarks for security products

  16. Detected Cyber-Threats Surge 52% in 1H 2022

    Trend Micro warns of Linux-based ransomware

  17. Microsoft Finds Account Takeover Bug in TikTok

    Vulnerability impacted social media firm’s Android app

  18. Golang-based Malware Campaign Relies on James Webb Telescope's Image

    Initial infection begins with a phishing email containing a Microsoft Office attachment

  19. Evil Corp and Conti Linked to Cisco Data Breach, eSentire Suggests

    The firm said the tools used to attack Cisco were also deployed to compromise one of its clients

  20. UK Imposes Tough New Cybersecurity Rules for Telecom Providers

    Ofcom will be able to issue fines for non-compliance of up to 10% of turnover

What’s Hot on Infosecurity Magazine?