<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <link>https://www.infosecurity-magazine.com/news/</link>
    <copyright>Copyright © 2026 Reed Exhibitions Ltd. All Rights Reserved.</copyright>
    <item>
      <title>PixRevolution Malware Hijacks Brazil's PIX Transfers in Real Time</title>
      <link>https://www.infosecurity-magazine.com/news/pixrevolution-malware-brazils-pix/</link>
      <description>PixRevolution Android trojan hijacks Brazil’s PIX payments in real time using accessibility abuse</description>
      <pubDate>Thu, 12 Mar 2026 16:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/pixrevolution-malware-brazils-pix/</guid>
    </item>
    <item>
      <title>Critical Zero-Click Flaw in n8n Allows Full Server Compromise</title>
      <link>https://www.infosecurity-magazine.com/news/critical-zeroclick-flaw-n8n-pillar/</link>
      <description>The critical vulnerability affecting both cloud and self-hosted n8n instances requires no authentication or even n8n account to be exploited</description>
      <pubDate>Thu, 12 Mar 2026 15:28:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/critical-zeroclick-flaw-n8n-pillar/</guid>
    </item>
    <item>
      <title>CISA Issues Emergency Directive Over Exploited Cisco SD-WAN Flaws</title>
      <link>https://www.infosecurity-magazine.com/news/cisa-cisco-sd-wan-flaws-directive/</link>
      <description>CISA issued urgent directive as attackers exploit Cisco SD-WAN flaw granting admin access to networks</description>
      <pubDate>Thu, 12 Mar 2026 12:45:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/cisa-cisco-sd-wan-flaws-directive/</guid>
    </item>
    <item>
      <title>Police Scotland Fined After Sharing Victim’s Phone Data </title>
      <link>https://www.infosecurity-magazine.com/news/police-scotland-fined-sharing/</link>
      <description>The ICO has fined Police Scotland after it shared the entire contents of a victim’s phone with her alleged attacker</description>
      <pubDate>Thu, 12 Mar 2026 10:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/police-scotland-fined-sharing/</guid>
    </item>
    <item>
      <title>Iran Claim Massive Cyber-Attack on MedTech Firm Stryker</title>
      <link>https://www.infosecurity-magazine.com/news/iran-massive-wiper-attack-medtech/</link>
      <description>The pro-Iran Handala group claims to have wiped 200,000 systems in destructive wiper malware attack on US firm Stryker</description>
      <pubDate>Thu, 12 Mar 2026 09:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/iran-massive-wiper-attack-medtech/</guid>
    </item>
    <item>
      <title>France: National Cybersecurity Agency Reports Ransomware Attack Drop in 2025</title>
      <link>https://www.infosecurity-magazine.com/news/france-anssi-ransomware-attack/</link>
      <description>French small and medium businesses remained the organizations most targeted by ransomware in 2025</description>
      <pubDate>Wed, 11 Mar 2026 16:50:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/france-anssi-ransomware-attack/</guid>
    </item>
    <item>
      <title>Infosecurity Europe Announces 2026 Keynote Line Up</title>
      <link>https://www.infosecurity-magazine.com/news/infosecurity-europe-2026-keynote/</link>
      <description>Infosecurity Europe 2026 reveals its keynote line-up, featuring Jason Fox, Shlomo Kramer, Cynthia Kaiser and more, with sessions on AI, cloud security and post quantum threats</description>
      <pubDate>Wed, 11 Mar 2026 16:20:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/infosecurity-europe-2026-keynote/</guid>
    </item>
    <item>
      <title>Researchers Uncover ‘LeakyLooker’ Vulnerabilities in Google Looker Studio</title>
      <link>https://www.infosecurity-magazine.com/news/google-looker-studios-security-gaps/</link>
      <description>LeakyLooker flaws in Google Looker Studio let attackers run cross-tenant SQL attacks on cloud data</description>
      <pubDate>Wed, 11 Mar 2026 16:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/google-looker-studios-security-gaps/</guid>
    </item>
    <item>
      <title>Compromised WordPress Sites Deliver ClickFix Attacks in Global Infostealer Campaign</title>
      <link>https://www.infosecurity-magazine.com/news/wordpress-clickfix-infostealer/</link>
      <description>Over 250 legitimate websites, including news outlets and  a US Senate candidate’s official webpage, been compromised to infect visitors with infostealers, warn Rapid7 researchers</description>
      <pubDate>Wed, 11 Mar 2026 14:45:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/wordpress-clickfix-infostealer/</guid>
    </item>
    <item>
      <title>BlackSanta EDR-Killer Targets HR Teams in CV-Themed Campaign</title>
      <link>https://www.infosecurity-magazine.com/news/blacksanta-edr-killer-targets-hr/</link>
      <description>BlackSanta malware targets HR staff with fake resumes, kills EDR and steals system data</description>
      <pubDate>Wed, 11 Mar 2026 14:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/blacksanta-edr-killer-targets-hr/</guid>
    </item>
    <item>
      <title>Researchers Discover Major Security Gaps in LLM Guardrails</title>
      <link>https://www.infosecurity-magazine.com/news/major-security-gaps-llm-guardrails/</link>
      <description>Palo Alto Networks’ Unit 42 has developed a successful attack to bypass safety guardrails in popular generative AI tools</description>
      <pubDate>Wed, 11 Mar 2026 13:35:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/major-security-gaps-llm-guardrails/</guid>
    </item>
    <item>
      <title>Cyber-Attacks on UK Firms Increase at Four Times Global Rate</title>
      <link>https://www.infosecurity-magazine.com/news/cyberattacks-uk-firms-increase/</link>
      <description>Check Point data shows attack volumes are growing much faster in the UK than worldwide</description>
      <pubDate>Wed, 11 Mar 2026 10:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/cyberattacks-uk-firms-increase/</guid>
    </item>
    <item>
      <title>Microsoft Fixes Two Publicly Disclosed Zero-Days </title>
      <link>https://www.infosecurity-magazine.com/news/microsoft-fixes-two-publicly/</link>
      <description>March Patch Tuesday sees Microsoft release updates for 79 flaws</description>
      <pubDate>Wed, 11 Mar 2026 09:20:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/microsoft-fixes-two-publicly/</guid>
    </item>
    <item>
      <title>OpenAI's Promptfoo Deal Plugs Agentic AI Testing Gap</title>
      <link>https://www.infosecurity-magazine.com/news/openai-promptfoo-deal-agentic-ai/</link>
      <description>OpenAI’s latest acquisition addresses a security need Jamieson O’Reilly, security advisor at OpenClaw, raised during an exclusive interview with Infosecurity</description>
      <pubDate>Tue, 10 Mar 2026 17:15:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/openai-promptfoo-deal-agentic-ai/</guid>
    </item>
    <item>
      <title>Only 24% Of organizations Test Identity Recovery Every Six Months</title>
      <link>https://www.infosecurity-magazine.com/news/organizations-test-identity-sec-6/</link>
      <description>Only 24% of organizations test identity disaster recovery plans every 6 months, Quest Software said</description>
      <pubDate>Tue, 10 Mar 2026 16:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/organizations-test-identity-sec-6/</guid>
    </item>
    <item>
      <title>Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds </title>
      <link>https://www.infosecurity-magazine.com/news/cloud-attackers-prefer-exploits/</link>
      <description>Google Cloud report details a sharp rise in attackers exploiting software vulnerabilities, including React2Shell</description>
      <pubDate>Tue, 10 Mar 2026 15:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/cloud-attackers-prefer-exploits/</guid>
    </item>
    <item>
      <title>Ericsson Breach Exposes Data of 15k Employees and Customers</title>
      <link>https://www.infosecurity-magazine.com/news/ericsson-breach-exposes-data-15k/</link>
      <description>Ericsson data breach affects 15k employees/customers after third-party service provider compromise</description>
      <pubDate>Tue, 10 Mar 2026 15:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/ericsson-breach-exposes-data-15k/</guid>
    </item>
    <item>
      <title>Russian Hackers Target WhatsApp and Signal Accounts of Global Military and Government Officials</title>
      <link>https://www.infosecurity-magazine.com/news/russian-hackers-target-military/</link>
      <description>Dutch intelligence reveals Russian state hackers are trying to hijack the Signal and WhatsApp accounts of key targets</description>
      <pubDate>Tue, 10 Mar 2026 10:45:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/russian-hackers-target-military/</guid>
    </item>
    <item>
      <title>ShinyHunters Targets Hundreds of Websites in New Salesforce Campaign</title>
      <link>https://www.infosecurity-magazine.com/news/shinyhunters-hundreds-websites/</link>
      <description>Prolific ShinyHunters group claims to have stolen data from nearly 400 websites in Experience Cloud attacks</description>
      <pubDate>Tue, 10 Mar 2026 10:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/shinyhunters-hundreds-websites/</guid>
    </item>
    <item>
      <title>Threat Actor Exploits Flaws and Uses Elastic Cloud SIEM to Manage Stolen Data</title>
      <link>https://www.infosecurity-magazine.com/news/elastic-cloud-siem-manage-stolen/</link>
      <description>Huntress researchers uncover campaign exploiting vulnerabilities to steal data using Elastic Cloud as a data hub</description>
      <pubDate>Mon, 09 Mar 2026 15:45:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/elastic-cloud-siem-manage-stolen/</guid>
    </item>
    <item>
      <title>Trump Administration Unveils New Cyber Strategy for America</title>
      <link>https://www.infosecurity-magazine.com/news/usa-unveils-new-cyber-strategy/</link>
      <description>US national cyber strategy focuses on stronger defenses, countering threats, fostering innovation</description>
      <pubDate>Mon, 09 Mar 2026 15:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/usa-unveils-new-cyber-strategy/</guid>
    </item>
    <item>
      <title>UK Launches New Crackdown Unit to Tackle Cyber-Fraud at the Source</title>
      <link>https://www.infosecurity-magazine.com/news/uk-new-crackdown-unit-cyber-fraud/</link>
      <description>New UK Online Crime Centre will combine expertise from a range of sources to takedown online channels cyber-scammers rely on</description>
      <pubDate>Mon, 09 Mar 2026 14:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/uk-new-crackdown-unit-cyber-fraud/</guid>
    </item>
    <item>
      <title>AI Security Startups Dominate New Cyber Innovation Awards</title>
      <link>https://www.infosecurity-magazine.com/news/ai-security-startups-cyber/</link>
      <description>Over one in five winners of IT-Harvest’s 2026 Cyber 150 are AI security companies</description>
      <pubDate>Mon, 09 Mar 2026 13:25:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/ai-security-startups-cyber/</guid>
    </item>
    <item>
      <title>TriZetto Provider Solutions Breach Hits 3.4 Million Patients</title>
      <link>https://www.infosecurity-magazine.com/news/trizetto-provider-solutions-breach/</link>
      <description>Billing services provider TriZetto Provider Solutions has begun notifying millions of patients about a data breach</description>
      <pubDate>Mon, 09 Mar 2026 10:45:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/trizetto-provider-solutions-breach/</guid>
    </item>
    <item>
      <title>Ghanaian Pleads Guilty to Role in $100m Romance Scam</title>
      <link>https://www.infosecurity-magazine.com/news/ghanaian-pleads-guilty-100m/</link>
      <description>Derrick Van Yeboah admitted he stole over $10m in romance scams as part of crime gang</description>
      <pubDate>Mon, 09 Mar 2026 10:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/ghanaian-pleads-guilty-100m/</guid>
    </item>
    <item>
      <title>Iran's MuddyWater Hackers Hit US Firms with New 'Dindoor' Backdoor</title>
      <link>https://www.infosecurity-magazine.com/news/iran-muddywater-hackers-us-firms/</link>
      <description>A bank, an airport, a non-profit and the Israeli branch of a US software company were among the targets of this new MuddyWater campaign</description>
      <pubDate>Fri, 06 Mar 2026 15:15:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/iran-muddywater-hackers-us-firms/</guid>
    </item>
    <item>
      <title>Zero‑Day Attacks on Enterprise Software Reach Record High, Google Warns</title>
      <link>https://www.infosecurity-magazine.com/news/zero-day-enterprise-record-high/</link>
      <description>Almost a quarter of the zero days detected by Google in 2025 targeted security and networking appliances</description>
      <pubDate>Fri, 06 Mar 2026 12:29:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/zero-day-enterprise-record-high/</guid>
    </item>
    <item>
      <title>AI-Driven Insider Risk Now a “Critical Business Threat,” Report Warns</title>
      <link>https://www.infosecurity-magazine.com/news/ai-insider-risk-critical-business/</link>
      <description>Malicious insiders are using misusing AI for nefarious gain, while employees cutting corners also creates risk, warns Mimecast</description>
      <pubDate>Thu, 05 Mar 2026 16:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/ai-insider-risk-critical-business/</guid>
    </item>
    <item>
      <title>ContextCrush Flaw Exposes AI Development Tools to Attacks</title>
      <link>https://www.infosecurity-magazine.com/news/contextcrush-ai-development-tools/</link>
      <description>Critical flaw "ContextCrush" in Context7 MCP Server could allow malicious instructions into AI tools</description>
      <pubDate>Thu, 05 Mar 2026 14:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/contextcrush-ai-development-tools/</guid>
    </item>
    <item>
      <title>Coruna Exploit Kit Targets Older iPhones in Multi-Stage Campaigns</title>
      <link>https://www.infosecurity-magazine.com/news/coruna-exploit-older-iphones/</link>
      <description>Exploit kit "Coruna" targets iPhones running iOS 13.0 to 17.2.1, focusing on financial data theft</description>
      <pubDate>Thu, 05 Mar 2026 12:15:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/coruna-exploit-older-iphones/</guid>
    </item>
    <item>
      <title>Zero-Click FreeScout Bug Enables Remote Code Execution</title>
      <link>https://www.infosecurity-magazine.com/news/zeroclick-freescout-bug-remote/</link>
      <description>Ox Security warns that Mail2Shell could enable threat actors to hijack FreeScout systems without user interaction</description>
      <pubDate>Thu, 05 Mar 2026 11:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/zeroclick-freescout-bug-remote/</guid>
    </item>
    <item>
      <title>Cisco Issues Patches for 48 Vulnerabilities in Enterprise Networking Products</title>
      <link>https://www.infosecurity-magazine.com/news/cisco-issues-patches-48/</link>
      <description>Two of the 48 Cisco vulnerabilities, affecting Secure Firewall Management Center, are maximum-severity flaws</description>
      <pubDate>Thu, 05 Mar 2026 10:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/cisco-issues-patches-48/</guid>
    </item>
    <item>
      <title>Europol Operation Seizes LeakBase Data Breach Site</title>
      <link>https://www.infosecurity-magazine.com/news/europol-seizes-leakbase-data/</link>
      <description>A global operation has resulted in the takedown of popular cybercrime forum LeakBase</description>
      <pubDate>Thu, 05 Mar 2026 09:45:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/europol-seizes-leakbase-data/</guid>
    </item>
    <item>
      <title>Coalition of Western Countries Launches 6G Cybersecurity Guidelines</title>
      <link>https://www.infosecurity-magazine.com/news/gcot-6g-cybersecurity-guidelines/</link>
      <description>A coalition of seven Western nations has launched guidelines to help integrate security-by-design principles into future 6G standards</description>
      <pubDate>Wed, 04 Mar 2026 16:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/gcot-6g-cybersecurity-guidelines/</guid>
    </item>
    <item>
      <title>Global Takedown Neutralizes Tycoon2FA Phishing Service</title>
      <link>https://www.infosecurity-magazine.com/news/global-takedown-tycoon2fa-phishing/</link>
      <description>Law enforcers and industry partners have taken down notorious phishing-as-a-service platform Tycoon2FA</description>
      <pubDate>Wed, 04 Mar 2026 16:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/global-takedown-tycoon2fa-phishing/</guid>
    </item>
    <item>
      <title>Surge in Attacks on Surveillance Cameras Linked to Iranian Hackers</title>
      <link>https://www.infosecurity-magazine.com/news/iran-attacks-surveillance-cameras/</link>
      <description>Increased attempts to compromise surveillance cameras linked to Iran during Middle East conflict</description>
      <pubDate>Wed, 04 Mar 2026 15:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/iran-attacks-surveillance-cameras/</guid>
    </item>
    <item>
      <title>Multi-Stage "BadPaw" Malware Campaign Targets Ukraine</title>
      <link>https://www.infosecurity-magazine.com/news/badpaw-malware-targets-ukraine/</link>
      <description>Malware campaign uses Ukrainian email service for credibility, deploying "BadPaw" to execute attacks</description>
      <pubDate>Wed, 04 Mar 2026 14:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/badpaw-malware-targets-ukraine/</guid>
    </item>
    <item>
      <title>Calls for Global Digital Estate Standard as Posthumous Deepfake Fraud Risk Grows</title>
      <link>https://www.infosecurity-magazine.com/news/digital-estate-post-death-deepfake/</link>
      <description>The OpenID Foundation warns that fragmented policies on posthumous digital accounts could open the door for fraudsters to exploit AI deepfakes</description>
      <pubDate>Wed, 04 Mar 2026 10:45:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/digital-estate-post-death-deepfake/</guid>
    </item>
    <item>
      <title>Israel: RedAlert Spyware Campaign Exploits Wartime Panic With Trojanized App</title>
      <link>https://www.infosecurity-magazine.com/news/redalert-israel-spyware-campaign/</link>
      <description>Espionage campaign exploits Israel-Iran conflict, distributing a trojanized Red Alert app via SMS</description>
      <pubDate>Tue, 03 Mar 2026 16:15:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/redalert-israel-spyware-campaign/</guid>
    </item>
    <item>
      <title>AI and Deepfakes Supercharge Sophisticated Cyber-Attacks, Says Cloudflare</title>
      <link>https://www.infosecurity-magazine.com/news/ai-deepfakes-supercharge/</link>
      <description>Cloudflare Threat Report warns that AI tools enable attackers who lacked required skills to generate effective attacks rapidly and at scale</description>
      <pubDate>Tue, 03 Mar 2026 15:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/ai-deepfakes-supercharge/</guid>
    </item>
    <item>
      <title>Leaked Database Sheds Light on Iranian Crypto Sanctions Evasion</title>
      <link>https://www.infosecurity-magazine.com/news/iranian-crypto-leaked-database/</link>
      <description>Ariomex database reveals potential sanctions evasion and capital transfers tied to Iranian actors</description>
      <pubDate>Tue, 03 Mar 2026 14:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/iranian-crypto-leaked-database/</guid>
    </item>
    <item>
      <title>Half of US CISOs Work the Equivalent of a Six-Day Week</title>
      <link>https://www.infosecurity-magazine.com/news/half-us-cisos-work-equivalent/</link>
      <description>Seemplicity finds US security leaders work 11 or more extra hours per week</description>
      <pubDate>Tue, 03 Mar 2026 14:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/half-us-cisos-work-equivalent/</guid>
    </item>
    <item>
      <title>Huge “Shadow Layer” of Organizations Hit by Supply Chain Attacks</title>
      <link>https://www.infosecurity-magazine.com/news/shadow-layer-organizations-supply/</link>
      <description>Black Kite reveals 26,000 unnamed corporate victims linked to 136 third-party breaches</description>
      <pubDate>Tue, 03 Mar 2026 11:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/shadow-layer-organizations-supply/</guid>
    </item>
    <item>
      <title>Iranian Cyber Threat Actor Targets Iraqi Government Officials in AI-Powered Campaign</title>
      <link>https://www.infosecurity-magazine.com/news/iran-cyber-threat-actor-iraq/</link>
      <description>Zscaler ThreatLabz assessed with medium to high confidence that an Iranian adversary targeted Iraq’s Ministry of Foreign Affairs in a new cyber-attack</description>
      <pubDate>Tue, 03 Mar 2026 10:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/iran-cyber-threat-actor-iraq/</guid>
    </item>
    <item>
      <title>Chrome Unveils Plan For Quantum-Safe HTTPS Certificates</title>
      <link>https://www.infosecurity-magazine.com/news/chrome-quantum-safe-https/</link>
      <description>Google Chrome initiates quantum-resistant measures via Merkle Tree Certificates to secure HTTPS</description>
      <pubDate>Mon, 02 Mar 2026 16:15:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/chrome-quantum-safe-https/</guid>
    </item>
    <item>
      <title>Expect Iran to Launch Cyber-Attacks Globally, Warns Google Head of Threat Intel</title>
      <link>https://www.infosecurity-magazine.com/news/iran-cyber-attacks-global-google/</link>
      <description>John Hultquist suggests “aggressive” Iranian cyber attackers will target the US and its Gulf allies with plausibly deniable ransomware attacks, hacktivist campaigns and more</description>
      <pubDate>Mon, 02 Mar 2026 15:45:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/iran-cyber-attacks-global-google/</guid>
    </item>
    <item>
      <title>Hybrid Middle East Conflict Triggers Surge in Global Cyber Activity</title>
      <link>https://www.infosecurity-magazine.com/news/middle-east-conflict-surge-global/</link>
      <description>Military strikes in the Middle East escalate cyber ops, raising spillover risks globally for firms</description>
      <pubDate>Mon, 02 Mar 2026 15:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/middle-east-conflict-surge-global/</guid>
    </item>
    <item>
      <title>ClawJacked Bug Enables Covert AI Agent Hijacking</title>
      <link>https://www.infosecurity-magazine.com/news/clawjacked-bug-covert-ai-agent/</link>
      <description>Oasis Security reveals how a new ClawJacked vulnerability could allow attackers to silently take over a victim’s OpenClaw agent</description>
      <pubDate>Mon, 02 Mar 2026 11:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/clawjacked-bug-covert-ai-agent/</guid>
    </item>
    <item>
      <title>Ransomware Payments Decline 8% as Attacks Surge 50%</title>
      <link>https://www.infosecurity-magazine.com/news/ransomware-payments-decline-1/</link>
      <description>Chainalysis reveals a big surge in median ransomware payment size in 2025 despite overall drop in criminal revenue</description>
      <pubDate>Mon, 02 Mar 2026 10:45:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/ransomware-payments-decline-1/</guid>
    </item>
    <item>
      <title>North Korea's APT37 Expands Toolkit to Breach Air-Gapped Networks</title>
      <link>https://www.infosecurity-magazine.com/news/north-korea-apt37-expands-toolkit/</link>
      <description>The security researchers from Zscaler ThreatLabz have also discovered five new tools deployed by the North Korean hacking group</description>
      <pubDate>Fri, 27 Feb 2026 14:15:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/north-korea-apt37-expands-toolkit/</guid>
    </item>
    <item>
      <title>UK Vulnerability Monitoring Service Cuts Unresolved Security Flaws by 75%</title>
      <link>https://www.infosecurity-magazine.com/news/uk-vuln-monitoring-service-cuts/</link>
      <description>The UK government says its new Vulnerability Monitoring Service has cut unresolved security flaws by 75% and reduced cyber-attack fix times from nearly two months to just over a week</description>
      <pubDate>Fri, 27 Feb 2026 11:45:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/uk-vuln-monitoring-service-cuts/</guid>
    </item>
    <item>
      <title>‘Project Compass’ Cracks Down on ‘The Com’: 30 Members of Notorious Cybercrime Gang Arrested </title>
      <link>https://www.infosecurity-magazine.com/news/project-compass-com-arrests/</link>
      <description>International law enforcement operation led by Europol targets network of teenagers and young adults involved in ransomware attacks, extortion and other crimes</description>
      <pubDate>Fri, 27 Feb 2026 11:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/project-compass-com-arrests/</guid>
    </item>
    <item>
      <title>Aeternum Botnet Shifts Command Control to Polygon Blockchain</title>
      <link>https://www.infosecurity-magazine.com/news/aeternum-botnet-c2-polygon/</link>
      <description>New botnet Aeternum shifted C2 operations to Polygon blockchain, complicating takedown efforts</description>
      <pubDate>Thu, 26 Feb 2026 16:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/aeternum-botnet-c2-polygon/</guid>
    </item>
    <item>
      <title>Darktrace Flags 32 Million Phishing Emails in 2025 as Identity Attacks Intensify</title>
      <link>https://www.infosecurity-magazine.com/news/32m-phishing-emails-detected-2025/</link>
      <description>2025 saw 32M phishing emails, with identity threats surpassing vulnerabilities</description>
      <pubDate>Thu, 26 Feb 2026 15:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/32m-phishing-emails-detected-2025/</guid>
    </item>
    <item>
      <title>Exploitable Vulnerabilities Present in 87% of Organizations</title>
      <link>https://www.infosecurity-magazine.com/news/exploitable-vulnerabilities-in-87/</link>
      <description>Datadog report reveals two-fifths of services are affected by exploitable bugs</description>
      <pubDate>Thu, 26 Feb 2026 14:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/exploitable-vulnerabilities-in-87/</guid>
    </item>
    <item>
      <title>UK's Data Watchdog Gets a Makeover to Match Growing Demands</title>
      <link>https://www.infosecurity-magazine.com/news/uk-data-watchdog-ico-makeover/</link>
      <description>The UK’s Information Commissioner's Office is about to ditch single-leader model for CEO and board in a major shake-up</description>
      <pubDate>Thu, 26 Feb 2026 14:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/uk-data-watchdog-ico-makeover/</guid>
    </item>
    <item>
      <title>Google Disrupts ‘Prolific’ and ‘Elusive’ China-Linked Global Hacking Campaign</title>
      <link>https://www.infosecurity-magazine.com/news/google-prolific-china-hacking/</link>
      <description>UNC2814 hit 53 victims in 42 countries with novel backdoor in decade long cyber espionage operation</description>
      <pubDate>Thu, 26 Feb 2026 12:09:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/google-prolific-china-hacking/</guid>
    </item>
    <item>
      <title>Global Cyber Agencies Urge Immediate Patching of Cisco SD-WAN Zero Day</title>
      <link>https://www.infosecurity-magazine.com/news/immediate-patch-cisco-catalyst/</link>
      <description>The US and allies are urging Cisco Catalyst SD-WAN customers to hunt for signs of exploitation</description>
      <pubDate>Thu, 26 Feb 2026 09:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/immediate-patch-cisco-catalyst/</guid>
    </item>
    <item>
      <title>44% Surge in App Exploits as AI Speeds Up Cyber-Attacks, IBM Finds</title>
      <link>https://www.infosecurity-magazine.com/news/app-exploits-surge-ai-speeds/</link>
      <description>IBM's 2026 X-Force report reveals 44% rise in cyber-attacks on public apps, driven by AI and flaws</description>
      <pubDate>Wed, 25 Feb 2026 14:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/app-exploits-surge-ai-speeds/</guid>
    </item>
    <item>
      <title>Malicious NuGet Package Targets Stripe Developers</title>
      <link>https://www.infosecurity-magazine.com/news/malicious-nuget-package-stripe-devs/</link>
      <description>Malicious NuGet package mimicking Stripe's library targeted developers</description>
      <pubDate>Wed, 25 Feb 2026 13:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/malicious-nuget-package-stripe-devs/</guid>
    </item>
    <item>
      <title>Former Defense Contractor Boss Gets 7+ Years for Selling Zero Days</title>
      <link>https://www.infosecurity-magazine.com/news/defense-contractor-boss-7-years/</link>
      <description>A former general manager of a US defense contractor has been sentenced after selling zero days to Russia</description>
      <pubDate>Wed, 25 Feb 2026 10:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/defense-contractor-boss-7-years/</guid>
    </item>
    <item>
      <title>ICO’s £14m Reddit Fine Highlights Age Check Privacy Concerns</title>
      <link>https://www.infosecurity-magazine.com/news/icos-14m-reddit-fine-age-check/</link>
      <description>The UK’s ICO has fined Reddit over £14m for failing to use children’s personal information lawfully</description>
      <pubDate>Wed, 25 Feb 2026 09:40:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/icos-14m-reddit-fine-age-check/</guid>
    </item>
    <item>
      <title>Cost of Insider Incidents Surges 20% to Nearly $20m </title>
      <link>https://www.infosecurity-magazine.com/news/cost-of-insider-incidents-surges/</link>
      <description>DTEX claims insider incidents cost $19.5m in 2025, with employee negligence most expensive</description>
      <pubDate>Tue, 24 Feb 2026 17:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/cost-of-insider-incidents-surges/</guid>
    </item>
    <item>
      <title>Multifaceted Phishing Scheme Deceives Bitpanda Customers</title>
      <link>https://www.infosecurity-magazine.com/news/bitpanda-mfa-phishing-scheme/</link>
      <description>Phishing attack mimicking Bitpanda targets users, harvesting credentials and personal information</description>
      <pubDate>Tue, 24 Feb 2026 16:05:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/bitpanda-mfa-phishing-scheme/</guid>
    </item>
    <item>
      <title>North Korean Lazarus Group Expands Ransomware Activity With Medusa</title>
      <link>https://www.infosecurity-magazine.com/news/north-korean-lazarus-group-medusa/</link>
      <description>Ransomware Medusa linked to North Korean hackers targets US healthcare amid ongoing attacks</description>
      <pubDate>Tue, 24 Feb 2026 14:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/north-korean-lazarus-group-medusa/</guid>
    </item>
    <item>
      <title>AI Accelerates Attacker Breakout Time to Just Four Minutes</title>
      <link>https://www.infosecurity-magazine.com/news/ai-accelerates-attack-breakout/</link>
      <description>ReliaQuest claims AI has reduced breakout and exfiltration time to under 10 minutes</description>
      <pubDate>Tue, 24 Feb 2026 13:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/ai-accelerates-attack-breakout/</guid>
    </item>
    <item>
      <title>Chinese AI Firms Hit Claude with Distillation Attacks, Anthropic Warns</title>
      <link>https://www.infosecurity-magazine.com/news/chinese-ai-claude-distillation/</link>
      <description>Anthropic accused DeepSeek, Moonshot and MiniMax of illicitly using Claude to steal some of the AI model’s capabilities</description>
      <pubDate>Tue, 24 Feb 2026 11:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/chinese-ai-claude-distillation/</guid>
    </item>
    <item>
      <title>AI-powered Cyber-Attacks Up Significantly in the Last Year, Warns CrowdStrike</title>
      <link>https://www.infosecurity-magazine.com/news/ai-powered-cyberattacks-up/</link>
      <description>CrowdStrike Global Threat Report warns how adversaries are leveraging AI to make campaigns more efficient and more effective</description>
      <pubDate>Tue, 24 Feb 2026 10:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/ai-powered-cyberattacks-up/</guid>
    </item>
    <item>
      <title>Shai-Hulud-Like Worm Targets Developers via npm and AI Tools</title>
      <link>https://www.infosecurity-magazine.com/news/shai-hulud-like-worm-devs-npm-ai/</link>
      <description>Supply chain worm mimicking Shai-Hulud malware spread via malicious npm packages, targeting AI tools has been identified by security researchers </description>
      <pubDate>Mon, 23 Feb 2026 16:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/shai-hulud-like-worm-devs-npm-ai/</guid>
    </item>
    <item>
      <title>Fraud Investigation Reveals Sophisticated Python Malware</title>
      <link>https://www.infosecurity-magazine.com/news/fraud-investigation-python-malware/</link>
      <description>Sophisticated Python malware uncovered in fraud probe shows obfuscation, disposable infrastructure</description>
      <pubDate>Mon, 23 Feb 2026 15:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/fraud-investigation-python-malware/</guid>
    </item>
    <item>
      <title>Russian Cyber Threat Actor Uses GenAI to Compromise Fortinet Firewalls</title>
      <link>https://www.infosecurity-magazine.com/news/russian-threat-actor-genai/</link>
      <description>A low-skilled Russian-speaking attacker has used GenAI tools to help deploy a successful attack workflow targeting FortiGate instances</description>
      <pubDate>Mon, 23 Feb 2026 12:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/russian-threat-actor-genai/</guid>
    </item>
    <item>
      <title>Leading Semiconductor Supplier Advantest Hit by Ransomware Attack</title>
      <link>https://www.infosecurity-magazine.com/news/advantest-ransomware-attack/</link>
      <description>Advantest, a Japanese specialist in testing computer chips for major semiconductor manufacturers, has deployed incident response protocols following a cybersecurity incident</description>
      <pubDate>Mon, 23 Feb 2026 11:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/advantest-ransomware-attack/</guid>
    </item>
    <item>
      <title>Jackpotting Surge Costs Banks Over $20m, Warns FBI</title>
      <link>https://www.infosecurity-magazine.com/news/jackpotting-surge-costs-banks-20m/</link>
      <description>A new FBI Flash alert claims $20m was lost to ATM jackpotting attacks in 2025 alone</description>
      <pubDate>Mon, 23 Feb 2026 10:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/jackpotting-surge-costs-banks-20m/</guid>
    </item>
    <item>
      <title>University of Mississippi Medical Center Still Offline After Ransomware Attack</title>
      <link>https://www.infosecurity-magazine.com/news/university-mississippi-medical/</link>
      <description>University of Mississippi Medical Center is still scrambling to respond to a ransomware attack last Thursday</description>
      <pubDate>Mon, 23 Feb 2026 08:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/university-mississippi-medical/</guid>
    </item>
    <item>
      <title>Dramatic Escalation in Frequency and Power of DDoS Attacks </title>
      <link>https://www.infosecurity-magazine.com/news/ddos-escalation-frequency-power/</link>
      <description>DDoS attack frequency has risen to ‘alarming levels,’ warns Radware report</description>
      <pubDate>Fri, 20 Feb 2026 12:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/ddos-escalation-frequency-power/</guid>
    </item>
    <item>
      <title>Android Malware Hijacks Google Gemini to Stay Hidden</title>
      <link>https://www.infosecurity-magazine.com/news/android-malware-hijacks-google/</link>
      <description>A new Android malware implant using Google Gemini to perform persistence tasks was discovered on VirusTotal and analyzed by ESET</description>
      <pubDate>Fri, 20 Feb 2026 11:35:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/android-malware-hijacks-google/</guid>
    </item>
    <item>
      <title>Remcos RAT Expands Real-Time Surveillance Capabilities</title>
      <link>https://www.infosecurity-magazine.com/news/remcos-rat-expands-real-time/</link>
      <description>New Remcos RAT variant enhances real-time surveillance and evasion techniques to compromise Windows</description>
      <pubDate>Thu, 19 Feb 2026 16:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/remcos-rat-expands-real-time/</guid>
    </item>
    <item>
      <title>Industrial-Scale Fake Coretax Apps Drive $2m Fraud in Indonesia</title>
      <link>https://www.infosecurity-magazine.com/news/fake-coretax-apps-fraud-indonesia/</link>
      <description>Fraud campaign exploiting Indonesia’s Coretax resulted in $1.5m to $2m in losses via malicious apps</description>
      <pubDate>Thu, 19 Feb 2026 15:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/fake-coretax-apps-fraud-indonesia/</guid>
    </item>
    <item>
      <title>Industrial Control System Vulnerabilities Hit Record Highs </title>
      <link>https://www.infosecurity-magazine.com/news/industrial-control-system-vulns/</link>
      <description>Forescout paper reveals ICS advisories hit a record 508 in 2025</description>
      <pubDate>Thu, 19 Feb 2026 13:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/industrial-control-system-vulns/</guid>
    </item>
    <item>
      <title>Starkiller: New ‘Commercial-Grade’ Phishing Kit Bypasses MFA </title>
      <link>https://www.infosecurity-magazine.com/news/starkiller-phishing-kit-bypasses/</link>
      <description>A new cybercriminal toolkit uses proxies to mimic popular online services and represents a “significant escalation in phishing infrastructure,” warn researchers at Abnormal</description>
      <pubDate>Thu, 19 Feb 2026 12:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/starkiller-phishing-kit-bypasses/</guid>
    </item>
    <item>
      <title>Flaws in Popular Software Development App Extensions Allow Data Exfiltration</title>
      <link>https://www.infosecurity-magazine.com/news/vulnerabilities-vs-code-cursor/</link>
      <description>Four serious new vulnerabilities affect Microsoft Visual Studio Code, Cursor and Windsurf extensions, three of which remain unpatched</description>
      <pubDate>Thu, 19 Feb 2026 10:45:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/vulnerabilities-vs-code-cursor/</guid>
    </item>
    <item>
      <title>Researchers Reveal Six New OpenClaw Vulnerabilities</title>
      <link>https://www.infosecurity-magazine.com/news/researchers-six-new-openclaw/</link>
      <description>Endor Labs has published details of six new vulnerabilities in popular AI assistant OpenClaw </description>
      <pubDate>Thu, 19 Feb 2026 10:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/researchers-six-new-openclaw/</guid>
    </item>
    <item>
      <title>Cryptojacking Campaign Exploits Driver to Boost Monero Mining</title>
      <link>https://www.infosecurity-magazine.com/news/cryptojacking-driver-boost-monero/</link>
      <description>Cryptojacking campaign used pirated software to deploy a persistent XMRig miner with stealth tactics</description>
      <pubDate>Wed, 18 Feb 2026 16:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/cryptojacking-driver-boost-monero/</guid>
    </item>
    <item>
      <title>AI Assistants Used as Covert Command-and-Control Relays</title>
      <link>https://www.infosecurity-magazine.com/news/ai-assistants-covert-c2-relays/</link>
      <description>AIs like Grok and Microsoft Copilot can be exploited as covert C2 channels for malware communication</description>
      <pubDate>Wed, 18 Feb 2026 15:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/ai-assistants-covert-c2-relays/</guid>
    </item>
    <item>
      <title>Record Number of Ransomware Victims and Groups in 2025</title>
      <link>https://www.infosecurity-magazine.com/news/record-number-ransomware-victims/</link>
      <description>Searchlight Cyber reports a 30% annual increase in ransomware victim numbers in 2025</description>
      <pubDate>Wed, 18 Feb 2026 11:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/record-number-ransomware-victims/</guid>
    </item>
    <item>
      <title>Chinese APT Group Exploits Dell Zero-Day for Two Years</title>
      <link>https://www.infosecurity-magazine.com/news/chinese-apt-exploits-dell-zeroday/</link>
      <description>Mandiant reveals campaign featuring exploit of a CVSS 10.0 CVE in Dell RecoverPoint for Virtual Machines</description>
      <pubDate>Wed, 18 Feb 2026 10:10:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/chinese-apt-exploits-dell-zeroday/</guid>
    </item>
    <item>
      <title>Android 17 Beta Introduces Secure-By-Default Architecture</title>
      <link>https://www.infosecurity-magazine.com/news/android-17-beta-secure-default/</link>
      <description>Android 17 Beta introduces privacy, security updates and a new Canary channel for improved development</description>
      <pubDate>Tue, 17 Feb 2026 16:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/android-17-beta-secure-default/</guid>
    </item>
    <item>
      <title>Apple Expands RCS Encryption and Memory Protections in iOS 26.4</title>
      <link>https://www.infosecurity-magazine.com/news/apple-rcs-encryption-memory/</link>
      <description>iOS 26.4 Beta adds end-to-end encryption for RCS messaging and enhanced Memory Integrity Enforcement</description>
      <pubDate>Tue, 17 Feb 2026 15:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/apple-rcs-encryption-memory/</guid>
    </item>
    <item>
      <title>Low-Skilled Cybercriminals Use AI to Perform "Vibe Extortion" Attacks</title>
      <link>https://www.infosecurity-magazine.com/news/cybercriminals-ai-vibe-extortion/</link>
      <description>Unit 42 researchers observed a low-skilled threat actor using an LLM to script a professional extortion strategy, complete with deadlines and pressure tactics</description>
      <pubDate>Tue, 17 Feb 2026 13:45:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/cybercriminals-ai-vibe-extortion/</guid>
    </item>
    <item>
      <title>Over-Privileged AI Drives 4.5 Times Higher Incident Rates</title>
      <link>https://www.infosecurity-magazine.com/news/overprivileged-ai-45-times-higher/</link>
      <description>Teleport study reveals that organizations running over-privileged AI have a 76% incident rate</description>
      <pubDate>Tue, 17 Feb 2026 13:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/overprivileged-ai-45-times-higher/</guid>
    </item>
    <item>
      <title>Significant Rise in Ransomware Attacks Targeting Industrial Operations</title>
      <link>https://www.infosecurity-magazine.com/news/rise-in-ransomware-targeting/</link>
      <description>Dragos annual report warns of a surge in ransomware attacks causing increased operational disruption in industrial environments </description>
      <pubDate>Tue, 17 Feb 2026 12:50:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/rise-in-ransomware-targeting/</guid>
    </item>
    <item>
      <title>Infostealer Targets OpenClaw to Loot Victim’s Digital Life</title>
      <link>https://www.infosecurity-magazine.com/news/infostealer-targets-openclaw/</link>
      <description>Hudson Rock has warned OpenClaw users that infostealers are targeting their configuration files</description>
      <pubDate>Tue, 17 Feb 2026 09:35:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/infostealer-targets-openclaw/</guid>
    </item>
    <item>
      <title>Vulnerabilities in Password Managers Allow Hackers to View and Change Passwords</title>
      <link>https://www.infosecurity-magazine.com/news/vulnerabilities-password-managers/</link>
      <description>Security researchers have challenged end-to-end encryption claims from popular commercial password managers</description>
      <pubDate>Mon, 16 Feb 2026 17:15:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/vulnerabilities-password-managers/</guid>
    </item>
    <item>
      <title>SMEs Wrong to Assume They Won’t Be Hit by Cyber-Attacks, NCSC Boss Warns 
</title>
      <link>https://www.infosecurity-magazine.com/news/sme-cyber-attack-threat-ncsc/</link>
      <description>NCSC’s Richard Horne has warned that cybercriminals do not care about business size and called for SMEs to act now to secure their organizations  </description>
      <pubDate>Mon, 16 Feb 2026 16:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/sme-cyber-attack-threat-ncsc/</guid>
    </item>
    <item>
      <title>OysterLoader Evolves With New C2 Infrastructure and Obfuscation</title>
      <link>https://www.infosecurity-magazine.com/news/oysterloader-new-c2-infrastructure/</link>
      <description>OysterLoader malware evolves into 2026, refining C2 infrastructure, obfuscation &amp; infection stages</description>
      <pubDate>Mon, 16 Feb 2026 16:15:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/oysterloader-new-c2-infrastructure/</guid>
    </item>
    <item>
      <title>Operation DoppelBrand Weaponizes Trusted Brands For Credential Theft</title>
      <link>https://www.infosecurity-magazine.com/news/operation-doppelbrand-trusted/</link>
      <description>New phishing campaign dubbed Operation DoppelBrand targeted major financial firms like Wells Fargo</description>
      <pubDate>Mon, 16 Feb 2026 15:45:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/operation-doppelbrand-trusted/</guid>
    </item>
    <item>
      <title>Google Warns of In the Wild Exploit as It Patches New Chrome Zero Day</title>
      <link>https://www.infosecurity-magazine.com/news/google-patches-new-in-wild-chrome/</link>
      <description>A high severity vulnerability in Google Chrome and allows remote attackers to execute code </description>
      <pubDate>Mon, 16 Feb 2026 11:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/google-patches-new-in-wild-chrome/</guid>
    </item>
    <item>
      <title>Crypto Payments to Human Traffickers Surges 85% </title>
      <link>https://www.infosecurity-magazine.com/news/crypto-payments-human-traffickers/</link>
      <description>Chainalysis warns that online fraud is fuelling sophisticated human trafficking operations </description>
      <pubDate>Mon, 16 Feb 2026 10:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/crypto-payments-human-traffickers/</guid>
    </item>
    <item>
      <title>Odido Breach Impacts Millions of Dutch Telco Users</title>
      <link>https://www.infosecurity-magazine.com/news/odido-breach-millions-dutch-telco/</link>
      <description>Dutch telco Odido has revealed a major data breach impacting over six million customers</description>
      <pubDate>Mon, 16 Feb 2026 09:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/odido-breach-millions-dutch-telco/</guid>
    </item>
    <item>
      <title>Munich Security Conference: Cyber Threats Lead G7 Risk Index, Disinformation Ranks Third</title>
      <link>https://www.infosecurity-magazine.com/news/munich-security-index-cyberattacks/</link>
      <description>G7 countries ranked cyber-attacks as the top risk, while BICS members placed cyber threats only as the eighth most pressing risk</description>
      <pubDate>Fri, 13 Feb 2026 12:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/munich-security-index-cyberattacks/</guid>
    </item>
    <item>
      <title>Fake AI Assistants in Google Chrome Web Store Steal Passwords and Spy on Emails</title>
      <link>https://www.infosecurity-magazine.com/news/fake-ai-assistants-google-chrome/</link>
      <description>Hundreds of thousands of users have downloaded malicious AI extensions masquerading as ChatGPT, Gemini, Grok and others, warn cybersecurity researchers at LayerX</description>
      <pubDate>Fri, 13 Feb 2026 11:25:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/fake-ai-assistants-google-chrome/</guid>
    </item>
    <item>
      <title>World Leaks Ransomware Group Adds Stealthy, Custom Malware ‘RustyRocket’ to Attacks</title>
      <link>https://www.infosecurity-magazine.com/news/world-leaks-ransomware-rustyrocket/</link>
      <description>Accenture Cybersecurity warns over difficult to detect, “sophisticated toolset” being deployed as part of extortion campaigns</description>
      <pubDate>Thu, 12 Feb 2026 13:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/world-leaks-ransomware-rustyrocket/</guid>
    </item>
    <item>
      <title>Nation-State Hackers Embrace Gemini AI for Malicious Campaigns, Google Finds</title>
      <link>https://www.infosecurity-magazine.com/news/nation-state-hackers-gemini-ai/</link>
      <description>Google researchers found that government-backed hackers now use AI throughout the whole attack lifecycle</description>
      <pubDate>Thu, 12 Feb 2026 12:45:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/nation-state-hackers-gemini-ai/</guid>
    </item>
    <item>
      <title>AI Skills Represent Dangerous New Attack Surface, Says TrendAI</title>
      <link>https://www.infosecurity-magazine.com/news/ai-skills-dangerous-new-attack/</link>
      <description>New TrendAI report warns that most security tools can’t protect against attacks on AI skills artifacts</description>
      <pubDate>Thu, 12 Feb 2026 10:45:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/ai-skills-dangerous-new-attack/</guid>
    </item>
    <item>
      <title>Time to Exploit Plummets as N-Day Flaws Dominate</title>
      <link>https://www.infosecurity-magazine.com/news/time-exploit-plummets-nday-flaws/</link>
      <description>Flashpoint warns of a dramatic drop in the average time between vulnerability disclosure and exploitation</description>
      <pubDate>Thu, 12 Feb 2026 09:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/time-exploit-plummets-nday-flaws/</guid>
    </item>
    <item>
      <title>North Korean Hackers Use Deepfake Video Calls to Target Crypto Firms</title>
      <link>https://www.infosecurity-magazine.com/news/north-korea-hackers-deepfake-crypto/</link>
      <description>Campaign combines stolen Telegram accounts, fake Zoom calls and ClickFix attacks to deploy infostealer malware</description>
      <pubDate>Wed, 11 Feb 2026 16:35:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/north-korea-hackers-deepfake-crypto/</guid>
    </item>
    <item>
      <title>US Court Hands Crypto Scammer 20 Years in $73m Case</title>
      <link>https://www.infosecurity-magazine.com/news/court-hands-crypto-scammer-20-years/</link>
      <description>A federal court has sentenced crypto-scammer Daren Li to 20 years in absentia </description>
      <pubDate>Wed, 11 Feb 2026 12:05:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/court-hands-crypto-scammer-20-years/</guid>
    </item>
    <item>
      <title>FIRST Forecasts Record-Breaking 50,000+ CVEs in 2026</title>
      <link>https://www.infosecurity-magazine.com/news/first-forecasts-record-50000-cve/</link>
      <description>This year should break all the records in terms of vulnerability disclosed, reaching or even surpassing 50,000 new CVEs disclosed</description>
      <pubDate>Wed, 11 Feb 2026 11:35:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/first-forecasts-record-50000-cve/</guid>
    </item>
    <item>
      <title>Microsoft Fixes Six Zero Day Vulnerability in February Patch Tuesday</title>
      <link>https://www.infosecurity-magazine.com/news/microsoft-six-zero-day-feb-2026/</link>
      <description>Six actively exploited zero-day bug have been patched by Microsoft</description>
      <pubDate>Wed, 11 Feb 2026 09:50:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/microsoft-six-zero-day-feb-2026/</guid>
    </item>
    <item>
      <title>Phorpiex Phishing Delivers Low-Noise Global Group Ransomware</title>
      <link>https://www.infosecurity-magazine.com/news/phorpiex-phishing-global-group/</link>
      <description>High-volume phishing campaign delivers Phorpiex malware via malicious Windows Shortcut files</description>
      <pubDate>Tue, 10 Feb 2026 16:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/phorpiex-phishing-global-group/</guid>
    </item>
    <item>
      <title>“Digital Parasite” Warning as Attackers Favor Stealth for Extortion</title>
      <link>https://www.infosecurity-magazine.com/news/digital-parasite-attackers-stealth/</link>
      <description>Picus Security warns of the increasingly sophisticated ways malicious activity is staying hidden</description>
      <pubDate>Tue, 10 Feb 2026 14:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/digital-parasite-attackers-stealth/</guid>
    </item>
    <item>
      <title>New Mobile Spyware ZeroDayRAT Targets Android and iOS</title>
      <link>https://www.infosecurity-magazine.com/news/zerodayrat-mobile-spyware-android/</link>
      <description>ZeroDayRAT is a new mobile spyware targeting Android and iOS, offering attackers persistent access</description>
      <pubDate>Tue, 10 Feb 2026 14:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/zerodayrat-mobile-spyware-android/</guid>
    </item>
    <item>
      <title>Singapore Takes Down Chinese Hackers Targeting Telco Networks</title>
      <link>https://www.infosecurity-magazine.com/news/singapore-takes-down-china-hackers/</link>
      <description>Operation Cyber Guardian was Singapore’s largest and longest running anti-cyber threat law enforcement operation</description>
      <pubDate>Tue, 10 Feb 2026 12:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/singapore-takes-down-china-hackers/</guid>
    </item>
    <item>
      <title>NCSC Issues Warning Over “Severe” Cyber-Attacks Targeting Critical National Infrastructure </title>
      <link>https://www.infosecurity-magazine.com/news/ncsc-warning-severe-cyberattacks/</link>
      <description>NCSC call firms to ‘act now’ following disruptive malware attacks targeting Polish energy providers</description>
      <pubDate>Tue, 10 Feb 2026 11:50:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/ncsc-warning-severe-cyberattacks/</guid>
    </item>
    <item>
      <title>European Governments Breached in Zero-Day Attacks Targeting Ivanti</title>
      <link>https://www.infosecurity-magazine.com/news/european-governments-zeroday/</link>
      <description>The European Commission and government agencies in Finland and the Netherlands have suffered potentially related breaches</description>
      <pubDate>Tue, 10 Feb 2026 09:45:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/european-governments-zeroday/</guid>
    </item>
    <item>
      <title>New Zero-Click Flaw in Claude Desktop Extensions, Anthropic Declines Fix</title>
      <link>https://www.infosecurity-magazine.com/news/zeroclick-flaw-claude-dxt/</link>
      <description>Security researchers from LayerX identified a new flaw in 50 Claude Desktop Extensions that could lead to unauthorized remote code execution</description>
      <pubDate>Mon, 09 Feb 2026 17:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/zeroclick-flaw-claude-dxt/</guid>
    </item>
    <item>
      <title>Two Connecticut Men Charged In Alleged $3m Gambling Fraud Scheme</title>
      <link>https://www.infosecurity-magazine.com/news/men-charged-gambling-fraud-scheme/</link>
      <description>Two Connecticut men face federal charges for a $3m scheme targeting online gambling platforms</description>
      <pubDate>Mon, 09 Feb 2026 16:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/men-charged-gambling-fraud-scheme/</guid>
    </item>
    <item>
      <title>VoidLink Malware Exhibits Multi-Cloud Capabilities and AI Code</title>
      <link>https://www.infosecurity-magazine.com/news/voidlink-malware-multi-cloud-ai/</link>
      <description>VoidLink, a Linux-based C2 framework, facilitates credential theft, data exfiltration across clouds</description>
      <pubDate>Mon, 09 Feb 2026 15:25:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/voidlink-malware-multi-cloud-ai/</guid>
    </item>
    <item>
      <title>BridgePay Confirms Ransomware Attack, No Card Data Compromised</title>
      <link>https://www.infosecurity-magazine.com/news/bridgepay-confirms-ransomware/</link>
      <description>The services of Florida-based payments platform BridgePay are offline due to a ransomware attack</description>
      <pubDate>Mon, 09 Feb 2026 11:15:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/bridgepay-confirms-ransomware/</guid>
    </item>
    <item>
      <title>Social Media Platforms Earn Billions from Scam Ads</title>
      <link>https://www.infosecurity-magazine.com/news/social-media-platforms-billions/</link>
      <description>Revolut claims social media sites make £3.8bn annually from scam ads targeting European users</description>
      <pubDate>Mon, 09 Feb 2026 10:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/social-media-platforms-billions/</guid>
    </item>
    <item>
      <title>Researchers Find 40,000+ Exposed OpenClaw Instances</title>
      <link>https://www.infosecurity-magazine.com/news/researchers-40000-exposed-openclaw/</link>
      <description>SecurityScorecard has identified over 40,000 OpenClaw deployments exposed to potential attack</description>
      <pubDate>Mon, 09 Feb 2026 09:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/researchers-40000-exposed-openclaw/</guid>
    </item>
    <item>
      <title>US Agencies Told to Scrap End of Support Edge Devices</title>
      <link>https://www.infosecurity-magazine.com/news/us-agencies-scrap-end-of-support/</link>
      <description>CISA has issued a new directive requiring federal agencies to decommission all end of support edge devices within 12 months to reduce ongoing exploitation risks</description>
      <pubDate>Mon, 09 Feb 2026 09:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/us-agencies-scrap-end-of-support/</guid>
    </item>
    <item>
      <title>Chinese-Made Malware Kit Targets Chinese-Based Routers and Edge Devices</title>
      <link>https://www.infosecurity-magazine.com/news/china-malware-kit-targets-routers/</link>
      <description>DKnife is a Chinese made malware framework that targets Chinese-based users</description>
      <pubDate>Fri, 06 Feb 2026 17:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/china-malware-kit-targets-routers/</guid>
    </item>
    <item>
      <title>Substack Confirms Data Breach, "Limited User Data" Compromised</title>
      <link>https://www.infosecurity-magazine.com/news/substack-confirms-data-breach/</link>
      <description>Substack did not specify the number of users affected by the data breach</description>
      <pubDate>Fri, 06 Feb 2026 16:22:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/substack-confirms-data-breach/</guid>
    </item>
    <item>
      <title>New Cyber Startup Programme to Debut at Infosecurity Europe 2026 </title>
      <link>https://www.infosecurity-magazine.com/news/cyber-startup-programme/</link>
      <description>Infosecurity Europe 2026 will debut a new Cyber Startup Programme, featuring a dedicated show-floor zone for early-stage cybersecurity companies to showcase innovations, connect with investors and highlight emerging technologies</description>
      <pubDate>Fri, 06 Feb 2026 08:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/cyber-startup-programme/</guid>
    </item>
    <item>
      <title>Malicious Commands in GitHub Codespaces Enable RCE</title>
      <link>https://www.infosecurity-magazine.com/news/malicious-commands-in-github/</link>
      <description>Flaws in GitHub Codespaces allow RCE via crafted repositories or pull requests</description>
      <pubDate>Thu, 05 Feb 2026 14:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/malicious-commands-in-github/</guid>
    </item>
    <item>
      <title>Smartphones Now Involved in Nearly Every Police Investigation</title>
      <link>https://www.infosecurity-magazine.com/news/smartphones-involved-every-police/</link>
      <description>Cellebrite data confirms digital evidence is now central to almost all cases</description>
      <pubDate>Thu, 05 Feb 2026 13:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/smartphones-involved-every-police/</guid>
    </item>
    <item>
      <title>New Hacking Campaign Exploits Microsoft Windows WinRAR Vulnerability </title>
      <link>https://www.infosecurity-magazine.com/news/hacking-exploits-windows-winrar/</link>
      <description>Researchers at Check Point link ‘Amarath-Dragon’ attacks to prolific Chinese cyber-espionage operation </description>
      <pubDate>Thu, 05 Feb 2026 11:50:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/hacking-exploits-windows-winrar/</guid>
    </item>
    <item>
      <title>AI-Enabled Voice and Virtual Meeting Fraud Surges 1000%+</title>
      <link>https://www.infosecurity-magazine.com/news/ai-voice-virtual-meeting-fraud/</link>
      <description>Pindrop warns of 1210% increase in AI-powered fraud last year</description>
      <pubDate>Thu, 05 Feb 2026 10:05:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/ai-voice-virtual-meeting-fraud/</guid>
    </item>
    <item>
      <title>Global SystemBC Botnet Found Active Across 10,000 Infected Systems</title>
      <link>https://www.infosecurity-magazine.com/news/global-systembc-botnet-10000/</link>
      <description>SystemBC malware linked to 10,000 infected IPs, posing risks to sensitive government infrastructure</description>
      <pubDate>Wed, 04 Feb 2026 16:15:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/global-systembc-botnet-10000/</guid>
    </item>
    <item>
      <title>New Technical Markers Reveal Expanding ShadowSyndicate Cybercriminal Infrastructure</title>
      <link>https://www.infosecurity-magazine.com/news/shadowsyndicate/</link>
      <description>ShadowSyndicate cluster expands with new SSH fingerprints connecting servers to other ransomware ops</description>
      <pubDate>Wed, 04 Feb 2026 15:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/shadowsyndicate/</guid>
    </item>
    <item>
      <title>AI Drives Doubling of Phishing Attacks in a Year</title>
      <link>https://www.infosecurity-magazine.com/news/ai-double-volume-phishing-attacks/</link>
      <description>Cofense claims AI is making phishing emails more personalized and sophisticated</description>
      <pubDate>Wed, 04 Feb 2026 14:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/ai-double-volume-phishing-attacks/</guid>
    </item>
    <item>
      <title>Two Critical Flaws in n8n AI Workflow Automation Platform Allow Complete Takeover</title>
      <link>https://www.infosecurity-magazine.com/news/two-critical-flaws-in-n8n-ai/</link>
      <description>Pillar Security discovered two new critical vulnerabilities in n8n that could lead to supply chain compromise, credential harvesting and complete takeover attacks</description>
      <pubDate>Wed, 04 Feb 2026 13:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/two-critical-flaws-in-n8n-ai/</guid>
    </item>
    <item>
      <title>SolarWinds Web Help Desk Vulnerability Actively Exploited </title>
      <link>https://www.infosecurity-magazine.com/news/solarwinds-web-help-desk/</link>
      <description>CISA has added a critical CVE in SolarWinds Web Help Desk to its KEV Catalog</description>
      <pubDate>Wed, 04 Feb 2026 10:15:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/solarwinds-web-help-desk/</guid>
    </item>
    <item>
      <title>Hundreds of Malicious Crypto Trading Add-Ons Found in Moltbot/OpenClaw</title>
      <link>https://www.infosecurity-magazine.com/news/malicious-crypto-trading-skills/</link>
      <description>A security researcher found 386 malicious ‘skills’ published on ClawHub, a skill repository for the popular OpenClaw AI assistant project</description>
      <pubDate>Tue, 03 Feb 2026 16:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/malicious-crypto-trading-skills/</guid>
    </item>
    <item>
      <title>SQL Injection Flaw Affects 40,000 WordPress Sites</title>
      <link>https://www.infosecurity-magazine.com/news/wordpress-sql-injection-flaw-40000/</link>
      <description>40,000 WordPress sites are vulnerable to SQL injection in Quiz and Survey Master plugin</description>
      <pubDate>Tue, 03 Feb 2026 16:15:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/wordpress-sql-injection-flaw-40000/</guid>
    </item>
    <item>
      <title>DockerDash Exposes AI Supply Chain Weakness In Docker's Ask Gordon</title>
      <link>https://www.infosecurity-magazine.com/news/dockerdash-weakness-dockers-ask/</link>
      <description>DockerDash vulnerability allows RCE and data exfiltration via unverified metadata in Ask Gordon</description>
      <pubDate>Tue, 03 Feb 2026 15:15:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/dockerdash-weakness-dockers-ask/</guid>
    </item>
    <item>
      <title>UK ICO Launches Investigation into X Over AI Generated Non-Consensual Sexual Imagery</title>
      <link>https://www.infosecurity-magazine.com/news/ico-investigates-x-over-grok-ai/</link>
      <description>UK Data Protection Watchdog has “serious concerns” over data privacy on Elon Musk’s social platform</description>
      <pubDate>Tue, 03 Feb 2026 14:47:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/ico-investigates-x-over-grok-ai/</guid>
    </item>
    <item>
      <title>Researchers Warn of New “Vect” RaaS Variant</title>
      <link>https://www.infosecurity-magazine.com/news/researchers-warn-new-vect-raas/</link>
      <description>A new ransomware-as-a-service operation dubbed “Vect” features custom malware</description>
      <pubDate>Tue, 03 Feb 2026 14:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/researchers-warn-new-vect-raas/</guid>
    </item>
    <item>
      <title>Cybercrime Unit of Paris Prosecutors Raid Elon Musk’s X Offices in France</title>
      <link>https://www.infosecurity-magazine.com/news/paris-prosecutors-raid-elon-musk-x/</link>
      <description>Elon Musk and X’s former CEO were summoned for voluntary interviews in Paris on April 20, 2026</description>
      <pubDate>Tue, 03 Feb 2026 12:45:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/paris-prosecutors-raid-elon-musk-x/</guid>
    </item>
    <item>
      <title>New Password-Stealing Phishing Campaign Targets Corporate Dropbox Credentials</title>
      <link>https://www.infosecurity-magazine.com/news/password-stealing-phishing-pdf/</link>
      <description>Multi-stage attack begins with fake message relating to business requests and evades detection with link hidden in a PDF</description>
      <pubDate>Tue, 03 Feb 2026 10:55:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/password-stealing-phishing-pdf/</guid>
    </item>
    <item>
      <title>Vibe-Coded Moltbook Exposes User Data, API Keys and More</title>
      <link>https://www.infosecurity-magazine.com/news/moltbook-exposes-user-data-api/</link>
      <description>Wiz Security claims Moltbook misconfiguration allowed full read and write access </description>
      <pubDate>Tue, 03 Feb 2026 10:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/moltbook-exposes-user-data-api/</guid>
    </item>
    <item>
      <title>NSA Publishes New Zero Trust Implementation Guidelines</title>
      <link>https://www.infosecurity-magazine.com/news/nsa-zero-trust-implementation/</link>
      <description>NSA released new guidelines to help organizations achieve target-level Zero Trust maturity</description>
      <pubDate>Mon, 02 Feb 2026 16:05:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/nsa-zero-trust-implementation/</guid>
    </item>
    <item>
      <title>Notepad++ Update Hijacking Linked to Hosting Provider Compromise</title>
      <link>https://www.infosecurity-magazine.com/news/notepad-update-hijacked/</link>
      <description>A supply chain attack on Notepad++ update process was linked to compromised hosting infrastructure</description>
      <pubDate>Mon, 02 Feb 2026 15:15:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/notepad-update-hijacked/</guid>
    </item>
    <item>
      <title>Fancy Bear Exploits Microsoft Office Flaw in Ukraine, EU Cyber-Attacks</title>
      <link>https://www.infosecurity-magazine.com/news/fancy-bear-exploits-office-flaw/</link>
      <description>Russia-linked hacking group Fancy Bear is exploiting a brand-new vulnerability in Microsoft Office, CERT-UA says</description>
      <pubDate>Mon, 02 Feb 2026 12:45:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/fancy-bear-exploits-office-flaw/</guid>
    </item>
    <item>
      <title>Android RAT Uses Hugging Face to Host Malware</title>
      <link>https://www.infosecurity-magazine.com/news/android-rat-hugging-face-host/</link>
      <description>Bitdefender has discovered a new Android malware campaign that uses Hugging Face </description>
      <pubDate>Mon, 02 Feb 2026 10:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/android-rat-hugging-face-host/</guid>
    </item>
    <item>
      <title>Former Google Engineer Found Guilty of Stealing AI Secrets</title>
      <link>https://www.infosecurity-magazine.com/news/former-google-engineer-guilty/</link>
      <description>Linwei Ding, a former Google engineer, has been found guilty of stealing trade secrets for China</description>
      <pubDate>Mon, 02 Feb 2026 09:20:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/former-google-engineer-guilty/</guid>
    </item>
    <item>
      <title>Labyrinth Chollima Evolves into Three North Korean Hacking Groups</title>
      <link>https://www.infosecurity-magazine.com/news/labyrinth-chollima-dprk-three/</link>
      <description>CrowdStrike assessed that two new threat actor groups have spun off from North Korean Labyrinth Chollima hackers</description>
      <pubDate>Fri, 30 Jan 2026 15:40:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/labyrinth-chollima-dprk-three/</guid>
    </item>
    <item>
      <title>New AI-Developed Malware Campaign Targets Iranian Protests</title>
      <link>https://www.infosecurity-magazine.com/news/ai-malware-redkitten-iranian/</link>
      <description>The RedKitten campaign distributes lures designed to target people seeking information about missing persons or political dissidents in Iran</description>
      <pubDate>Fri, 30 Jan 2026 11:55:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/ai-malware-redkitten-iranian/</guid>
    </item>
    <item>
      <title>National Crime Agency and NatWest Issue Joint Warning Over Invoice Fraud Threat</title>
      <link>https://www.infosecurity-magazine.com/news/nca-natwest-warning-over-invoice/</link>
      <description>Cyber fraudsters targeting corporate finance departments costs businesses millions a year</description>
      <pubDate>Fri, 30 Jan 2026 11:10:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/nca-natwest-warning-over-invoice/</guid>
    </item>
    <item>
      <title>Google Disrupts Extensive Residential Proxy Networks</title>
      <link>https://www.infosecurity-magazine.com/news/google-disrupts-proxy-networks/</link>
      <description>Google has taken coordinated action against the massive IPIDEA residential proxy network, enhancing customer protections and disrupting cybercrime operations</description>
      <pubDate>Thu, 29 Jan 2026 17:15:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/google-disrupts-proxy-networks/</guid>
    </item>
    <item>
      <title>Operation Winter SHIELD: FBI Issues Call to Arms for Organizations to Improve Cybersecurity</title>
      <link>https://www.infosecurity-magazine.com/news/fbi-operation-winter-shield-cyber/</link>
      <description>The FBI outlines ten actions which organizations can take to defend networks against cybercriminal and nation-state threats</description>
      <pubDate>Thu, 29 Jan 2026 16:50:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/fbi-operation-winter-shield-cyber/</guid>
    </item>
    <item>
      <title>France Fines National Employment Agency €5m Over 2024 Data Breach</title>
      <link>https://www.infosecurity-magazine.com/news/france-finesemployment-agency-5m/</link>
      <description>The French data protection regulator said that France Travail’s response to a 2024 data breach violated GDPR</description>
      <pubDate>Thu, 29 Jan 2026 16:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/france-finesemployment-agency-5m/</guid>
    </item>
    <item>
      <title>New CISA Guidance Targets Insider Threat Risks</title>
      <link>https://www.infosecurity-magazine.com/news/cisa-targets-insider-threat-risks/</link>
      <description>CISA urges action against insider threats with publication of a new infographic offering strategies to manage risks</description>
      <pubDate>Thu, 29 Jan 2026 16:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/cisa-targets-insider-threat-risks/</guid>
    </item>
    <item>
      <title>FBI Takes Down RAMP Ransomware Forum</title>
      <link>https://www.infosecurity-magazine.com/news/fbi-takes-down-ramp-ransomware/</link>
      <description>The dark web forum administrator confirmed the takedown and said they had “no plans to rebuild”</description>
      <pubDate>Thu, 29 Jan 2026 13:05:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/fbi-takes-down-ramp-ransomware/</guid>
    </item>
    <item>
      <title>Ransomware Victim Numbers Rise, Despite Drop in Active Extortion Groups</title>
      <link>https://www.infosecurity-magazine.com/news/ransomware-numbers-rise-despite/</link>
      <description>Ransomware victims surged in Q4 2025 despite fewer active extortion groups, with data leaks rising 50%, ReliaQuest researchers report</description>
      <pubDate>Thu, 29 Jan 2026 13:01:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/ransomware-numbers-rise-despite/</guid>
    </item>
    <item>
      <title>US Data Breaches Hit Record High but Victim Numbers Decline</title>
      <link>https://www.infosecurity-magazine.com/news/us-data-breaches-record-high/</link>
      <description>Non-profit ITRC says the number of data breaches increased 5% annually to reach a record total in 2025</description>
      <pubDate>Thu, 29 Jan 2026 12:45:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/us-data-breaches-record-high/</guid>
    </item>
    <item>
      <title>Number of Cybersecurity Pros Surges 194% in Four Years</title>
      <link>https://www.infosecurity-magazine.com/news/number-cybersecurity-pros-surges/</link>
      <description>Cybersecurity is now the fifth fastest-growing occupation in the UK, says Socura</description>
      <pubDate>Thu, 29 Jan 2026 09:45:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/number-cybersecurity-pros-surges/</guid>
    </item>
    <item>
      <title>Cybersecurity Teams Embrace AI, Just Not at the Scale Marketing Suggests</title>
      <link>https://www.infosecurity-magazine.com/news/cybersecurity-teams-embrace-ai/</link>
      <description>Despite the seemingly widespread adoption of AI for security operations, security leaders primarily use it for “relatively basic use cases,” said a Sumo Logic study</description>
      <pubDate>Thu, 29 Jan 2026 09:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/cybersecurity-teams-embrace-ai/</guid>
    </item>
    <item>
      <title>Autonomous System Uncovers Long-Standing OpenSSL Flaws</title>
      <link>https://www.infosecurity-magazine.com/news/12-openssl-flaws/</link>
      <description>A recent update has fixed 12 vulnerabilities in OpenSSL, some existing in the codebase for years</description>
      <pubDate>Wed, 28 Jan 2026 16:45:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/12-openssl-flaws/</guid>
    </item>
    <item>
      <title>Critical and High Severity n8n Sandbox Flaws Allow RCE</title>
      <link>https://www.infosecurity-magazine.com/news/n8n-sandbox-flaws-allow-rce/</link>
      <description>Two critical security flaws in n8n have exposed sandboxing vulnerabilities, enabling remote code execution for attackers</description>
      <pubDate>Wed, 28 Jan 2026 16:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/n8n-sandbox-flaws-allow-rce/</guid>
    </item>
    <item>
      <title>Emojis in PureRAT’s Code Point to AI-Generated Malware Campaign</title>
      <link>https://www.infosecurity-magazine.com/news/emojis-in-purerats-code/</link>
      <description>Researchers discover that PureRAT’s code now contains emojis – indicating it has been written by AI based-on comments ripped from social media. </description>
      <pubDate>Wed, 28 Jan 2026 12:10:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/emojis-in-purerats-code/</guid>
    </item>
    <item>
      <title>AI Security Threats Loom as Enterprise Usage Jumps 91%</title>
      <link>https://www.infosecurity-magazine.com/news/ai-security-threats-loom-zscaler/</link>
      <description>Zscaler analysts found critical vulnerabilities in 100% of enterprise AI systems, with 90% compromised in under 90 minutes</description>
      <pubDate>Wed, 28 Jan 2026 11:45:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/ai-security-threats-loom-zscaler/</guid>
    </item>
    <item>
      <title>Researchers Uncover 454,000+ Malicious Open Source Packages</title>
      <link>https://www.infosecurity-magazine.com/news/454000-malicious-open-source/</link>
      <description>Sonatype warns that open source threats became industrialized with a surge in malicious packages in 2025</description>
      <pubDate>Wed, 28 Jan 2026 11:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/454000-malicious-open-source/</guid>
    </item>
    <item>
      <title>Chinese Money Launderers Drive Global Ecosystem Worth $82bn</title>
      <link>https://www.infosecurity-magazine.com/news/chinese-money-launderers-global/</link>
      <description>Chainalysis claims Chinese money launderers now account for 20% of global activity</description>
      <pubDate>Wed, 28 Jan 2026 10:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/chinese-money-launderers-global/</guid>
    </item>
    <item>
      <title>Pyodide Sandbox Escape Enables Remote Code Execution in Grist-Core</title>
      <link>https://www.infosecurity-magazine.com/news/pyodide-sandbox-escape-rce-grist/</link>
      <description>Critical sandbox escape vulnerability in Grist-Core enables remote code execution via a malicious formula</description>
      <pubDate>Tue, 27 Jan 2026 16:45:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/pyodide-sandbox-escape-rce-grist/</guid>
    </item>
    <item>
      <title>PeckBirdy Framework Tied to China-Aligned Cyber Campaigns</title>
      <link>https://www.infosecurity-magazine.com/news/peckbirdy-framework-tied-china/</link>
      <description>PeckBirdy command-and-control framework targeting gambling, government sectors in Asia since 2023 has been linked to China-aligned APTs</description>
      <pubDate>Tue, 27 Jan 2026 16:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/peckbirdy-framework-tied-china/</guid>
    </item>
    <item>
      <title>Over 80% of Ethical Hackers Now Use AI </title>
      <link>https://www.infosecurity-magazine.com/news/over-80-of-ethical-hackers-now-use/</link>
      <description>Bugcrowd study reveals 82% of security researchers now use AI, a big increase from 2023 figures</description>
      <pubDate>Tue, 27 Jan 2026 14:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/over-80-of-ethical-hackers-now-use/</guid>
    </item>
    <item>
      <title>Microsoft Releases Patch for Office Zero Day Amid Evidence of Exploitation</title>
      <link>https://www.infosecurity-magazine.com/news/microsoft-patch-office-zero-day/</link>
      <description>Microsoft urged customers running Microsoft Office 2016 and 2019 to apply the patch to be protected</description>
      <pubDate>Tue, 27 Jan 2026 10:45:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/microsoft-patch-office-zero-day/</guid>
    </item>
    <item>
      <title>World Leaks Ransomware Group Claims 1.4TB Nike Data Breach</title>
      <link>https://www.infosecurity-magazine.com/news/worldleaks-ransomware-14tb-nike/</link>
      <description>Nike is investigating after the World Leaks ransomware group posted a 1.4TB data dump</description>
      <pubDate>Tue, 27 Jan 2026 09:45:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/worldleaks-ransomware-14tb-nike/</guid>
    </item>
    <item>
      <title>CISA Releases List of Post-Quantum Cryptography Product Categories</title>
      <link>https://www.infosecurity-magazine.com/news/cisa-post-quantum-cryptography/</link>
      <description>CISA released initial list of PQC-capable hardware and software to guide companies amid quantum threats</description>
      <pubDate>Mon, 26 Jan 2026 16:15:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/cisa-post-quantum-cryptography/</guid>
    </item>
    <item>
      <title>Researchers Uncover “Haxor” SEO Poisoning Marketplace</title>
      <link>https://www.infosecurity-magazine.com/news/researchers-haxor-seo-poisoning/</link>
      <description>Fortra researchers have discovered a new SEO poisoning operation known as “HaxorSEO”</description>
      <pubDate>Mon, 26 Jan 2026 15:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/researchers-haxor-seo-poisoning/</guid>
    </item>
    <item>
      <title>Law Firm Investigates Coupang Security Failures Ahead of Class Action Deadline</title>
      <link>https://www.infosecurity-magazine.com/news/law-firm-coupang-security-failures/</link>
      <description>The US law firm Hagens Berman will lead a class action lawsuit against Coupang over security failures that led to a June 2025 data breach</description>
      <pubDate>Mon, 26 Jan 2026 13:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/law-firm-coupang-security-failures/</guid>
    </item>
    <item>
      <title>Okta Flags Customized, Reactive Vishing Attacks Which Bypass MFA</title>
      <link>https://www.infosecurity-magazine.com/news/okta-flags-vishing-attacks-which/</link>
      <description>Threat actors posing as IT support teams use phishing kits to generate fake login sites in real-time to trick victims into handing over credentials</description>
      <pubDate>Mon, 26 Jan 2026 12:12:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/okta-flags-vishing-attacks-which/</guid>
    </item>
    <item>
      <title>Wiper Attack on Polish Power Grid Linked to Russia’s Sandworm</title>
      <link>https://www.infosecurity-magazine.com/news/wiper-attack-polish-power-grid/</link>
      <description>A destructive cyber attack targeting Poland’s energy sector has been linked to Russian APT group Sandworm</description>
      <pubDate>Mon, 26 Jan 2026 10:55:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/wiper-attack-polish-power-grid/</guid>
    </item>
    <item>
      <title>NHS Issues Open Letter Demanding Improved Cybersecurity Standards from Suppliers</title>
      <link>https://www.infosecurity-magazine.com/news/nhs-open-letter-demands-improved/</link>
      <description>Open letter by NHS technology leaders outlines plans to identify risks to software supply chain security across health and social care system</description>
      <pubDate>Fri, 23 Jan 2026 14:38:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/nhs-open-letter-demands-improved/</guid>
    </item>
    <item>
      <title>Under Armour Investigates Data Breach After 72 Million Records Allegedly Exposed</title>
      <link>https://www.infosecurity-magazine.com/news/under-armour-investigates-data/</link>
      <description>Under Armour said there is no evidence at this point to suggest the incident affected systems used to process payments or store customer passwords</description>
      <pubDate>Fri, 23 Jan 2026 12:10:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/under-armour-investigates-data/</guid>
    </item>
    <item>
      <title>Critical Appsmith Flaw Enables Account Takeovers</title>
      <link>https://www.infosecurity-magazine.com/news/appsmith-flaw-account-takeovers/</link>
      <description>Critical vulnerability in Appsmith allows account takeover via flawed password reset process</description>
      <pubDate>Thu, 22 Jan 2026 16:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/appsmith-flaw-account-takeovers/</guid>
    </item>
    <item>
      <title>RealHomes CRM Plugin Flaw Affected 30,000 WordPress Sites</title>
      <link>https://www.infosecurity-magazine.com/news/realhomes-crm-plugin-flaw/</link>
      <description>Security flaw in RealHomes CRM plugin allowed file uploads; patches released for 30,000+ sites</description>
      <pubDate>Thu, 22 Jan 2026 15:10:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/realhomes-crm-plugin-flaw/</guid>
    </item>
    <item>
      <title>Zero-Day Exploits Surge, Nearly 30% of Flaws Attacked Before Disclosure</title>
      <link>https://www.infosecurity-magazine.com/news/zeroday-exploits-surge-vulncheck/</link>
      <description>VulnCheck analysts found that vulnerabilities exploited before being publicly disclosed rose from 23.6% in 2024 to 28.96% in 2025</description>
      <pubDate>Thu, 22 Jan 2026 12:45:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/zeroday-exploits-surge-vulncheck/</guid>
    </item>
    <item>
      <title>LastPass Warns of Phishing Campaign Attempting to Steal Master Passwords</title>
      <link>https://www.infosecurity-magazine.com/news/lastpass-phishing-master-passwords/</link>
      <description>Phoney email alerts suggest users need to backup their LastPass accounts within 24 hours. LastPass says it would never require this action from users </description>
      <pubDate>Thu, 22 Jan 2026 12:07:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/lastpass-phishing-master-passwords/</guid>
    </item>
    <item>
      <title>UK Executives Warn They May Not Survive a Major Cyber-Attack, Vodafone Survey Finds</title>
      <link>https://www.infosecurity-magazine.com/news/uk-execs-warn-may-not-suruvie/</link>
      <description>UK Executives Warn They May Not Survive a Major Cyber-Attack, Vodafone Survey Finds</description>
      <pubDate>Thu, 22 Jan 2026 11:05:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/uk-execs-warn-may-not-suruvie/</guid>
    </item>
    <item>
      <title>Over 160,000 Companies Notify Regulators of GDPR Breaches</title>
      <link>https://www.infosecurity-magazine.com/news/160000-companies-regulator-gdpr/</link>
      <description>DLA Piper finds 22% increase in breached firms notifying European GDPR regulators</description>
      <pubDate>Thu, 22 Jan 2026 10:35:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/160000-companies-regulator-gdpr/</guid>
    </item>
    <item>
      <title>Phishing and Spoofed Sites Remain Primary Entry Points For Olympics</title>
      <link>https://www.infosecurity-magazine.com/news/phishing-spoofed-sites-olympic/</link>
      <description>Cyber risks for the Milano-Cortina 2026 Winter Games include phishing and spoofed websites as key threat vectors</description>
      <pubDate>Wed, 21 Jan 2026 16:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/phishing-spoofed-sites-olympic/</guid>
    </item>
    <item>
      <title>Peruvian Loan Scam Harvests Cards and PINs via Fake Applications</title>
      <link>https://www.infosecurity-magazine.com/news/loan-scam-harvests-cards-pins/</link>
      <description>Loan phishing operation in Peru is stealing card info by impersonating financial institutions</description>
      <pubDate>Wed, 21 Jan 2026 15:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/loan-scam-harvests-cards-pins/</guid>
    </item>
    <item>
      <title>VoidLink Linux Malware Was Built Using an AI Agent, Researchers Reveal </title>
      <link>https://www.infosecurity-magazine.com/news/voidlink-linux-malware-built-using/</link>
      <description>Sophisticated malware previously thought to be the work of a well-resourced cyber-crime group was built by one person - with the aid of AI tools</description>
      <pubDate>Wed, 21 Jan 2026 12:51:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/voidlink-linux-malware-built-using/</guid>
    </item>
    <item>
      <title>EU Unveils Cybersecurity Overhaul with Proposed Update to Cybersecurity Act</title>
      <link>https://www.infosecurity-magazine.com/news/eu-unveils-cybersecurity-act-2/</link>
      <description>The EU’s Cybersecurity Act 2.0 will aim to address some of the challenges of the current CSA, including the slow rollout of certification schemes</description>
      <pubDate>Wed, 21 Jan 2026 12:15:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/eu-unveils-cybersecurity-act-2/</guid>
    </item>
    <item>
      <title>Experts Welcome Global Cybersecurity Vulnerability Enumeration Launch</title>
      <link>https://www.infosecurity-magazine.com/news/global-cybersecurity-vulnerability/</link>
      <description>A new service, the Global Cybersecurity Vulnerability Enumeration (GCVE), offers an alternative to the US-led CVE</description>
      <pubDate>Wed, 21 Jan 2026 10:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/global-cybersecurity-vulnerability/</guid>
    </item>
    <item>
      <title>Report Fraud Promises to Streamline Fight Against Economic Crime</title>
      <link>https://www.infosecurity-magazine.com/news/report-fraud-fight-against/</link>
      <description>City of London Police has launched the UK’s national Report Fraud service</description>
      <pubDate>Wed, 21 Jan 2026 09:45:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/report-fraud-fight-against/</guid>
    </item>
    <item>
      <title>Risk of AI Model Collapse to Drive Zero Trust Data Governance, Gartner Says </title>
      <link>https://www.infosecurity-magazine.com/news/ai-model-collapse-zero-trust-data/</link>
      <description>Gartner predicts 50% of organizations will adopt zero trust data governance by 2028</description>
      <pubDate>Wed, 21 Jan 2026 08:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/ai-model-collapse-zero-trust-data/</guid>
    </item>
    <item>
      <title>Chainlit Security Flaws Highlight Infrastructure Risks in AI Apps</title>
      <link>https://www.infosecurity-magazine.com/news/chainlit-security-flaws-ai-apps/</link>
      <description>2 security vulnerabilities in the Chainlit framework expose risks from web flaws in AI applications</description>
      <pubDate>Tue, 20 Jan 2026 16:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/chainlit-security-flaws-ai-apps/</guid>
    </item>
    <item>
      <title>Prompt Injection Bugs Found in Official Anthropic Git MCP Server</title>
      <link>https://www.infosecurity-magazine.com/news/prompt-injection-bugs-anthropic/</link>
      <description>Three vulnerabilities in Anthropic's Git server for the MCP can be exploited via prompt injection</description>
      <pubDate>Tue, 20 Jan 2026 15:01:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/prompt-injection-bugs-anthropic/</guid>
    </item>
    <item>
      <title>Cyber Risks Among CEOs’ Top Worries Amid Weak Short Term Growth Outlook</title>
      <link>https://www.infosecurity-magazine.com/news/cyber-risks-among-ceos-top-worries/</link>
      <description>PwC’s 29th Global CEO Survey shows cyber risk rising to the top of CEO concerns as confidence in short term business growth weakens</description>
      <pubDate>Tue, 20 Jan 2026 14:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/cyber-risks-among-ceos-top-worries/</guid>
    </item>
    <item>
      <title>LinkedIn Phishing Campaign Exploits Open-Source Pen Testing Tool to Compromise Business Execs </title>
      <link>https://www.infosecurity-magazine.com/news/linkedin-phishing-campaign-targets/</link>
      <description>Cybersecurity Researchers at ReliaQuest warn of an ongoing campaign delivered to “high-value individuals” via LinkedIn messages</description>
      <pubDate>Tue, 20 Jan 2026 13:04:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/linkedin-phishing-campaign-targets/</guid>
    </item>
    <item>
      <title>AI Supercharges Attacks in Cybercrime's New 'Fifth Wave'</title>
      <link>https://www.infosecurity-magazine.com/news/ai-supercharges-attacks-cybercrime/</link>
      <description>Weaponized AI is fueling a new wave of cybercrime, said Group-IB in its latest report</description>
      <pubDate>Tue, 20 Jan 2026 12:15:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/ai-supercharges-attacks-cybercrime/</guid>
    </item>
    <item>
      <title>Scam Marketplace Tudou Guarantee Shutters Telegram Ops</title>
      <link>https://www.infosecurity-magazine.com/news/scam-market-tudou-guarantee-shut/</link>
      <description>A notorious marketplace for fraud, Tudou Guarantee, appears to have closed its public Telegram groups</description>
      <pubDate>Tue, 20 Jan 2026 10:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/scam-market-tudou-guarantee-shut/</guid>
    </item>
    <item>
      <title>Researchers Uncover PDFSIDER Malware Built for Long-Term, Covert System Access</title>
      <link>https://www.infosecurity-magazine.com/news/pdfsider-anti-vm-checks-hidden/</link>
      <description>New malware PDFSIDER enables covert, long-term access to compromised systems via advanced techniques</description>
      <pubDate>Mon, 19 Jan 2026 16:20:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/pdfsider-anti-vm-checks-hidden/</guid>
    </item>
    <item>
      <title>Russian Hacktivists Intensify Disruptive Cyber Pressure on UK Orgs</title>
      <link>https://www.infosecurity-magazine.com/news/russia-cyber-pressure-uk-orgs/</link>
      <description>UK NCSC warned of disruptive cyber attacks by Russian hacktivists targeting critical infrastructure</description>
      <pubDate>Mon, 19 Jan 2026 15:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/russia-cyber-pressure-uk-orgs/</guid>
    </item>
    <item>
      <title>Malicious Google Chrome Extensions Hijack Workday and Netsuite </title>
      <link>https://www.infosecurity-magazine.com/news/malicious-google-chrome-extension/</link>
      <description>Users of widely used HR and ERP platforms targeted with malicious extensions which were available in the Chrome Web Store</description>
      <pubDate>Mon, 19 Jan 2026 12:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/malicious-google-chrome-extension/</guid>
    </item>
    <item>
      <title>Suspects Linked to Black Basta Ransomware Group Raided in Ukraine</title>
      <link>https://www.infosecurity-magazine.com/news/suspects-black-basta-ransomware/</link>
      <description>Oleg Evgenievich Nefedov, allegedly one of the founders of Black Basta, was also placed on Europol’s and Interpol’s Most Wanted lists</description>
      <pubDate>Mon, 19 Jan 2026 11:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/suspects-black-basta-ransomware/</guid>
    </item>
    <item>
      <title>Cyber Breaches, Compliance and Reputation Top UK Corporate Concerns</title>
      <link>https://www.infosecurity-magazine.com/news/cyber-breaches-compliance/</link>
      <description>UK firms face confluence of cyber-related risks in 2026, says Nardello &amp; Co </description>
      <pubDate>Mon, 19 Jan 2026 09:56:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/cyber-breaches-compliance/</guid>
    </item>
    <item>
      <title>Researchers Exploit Bug in StealC Infostealer to Collect Evidence</title>
      <link>https://www.infosecurity-magazine.com/news/researchers-exploit-bug-stealc/</link>
      <description>CyberArk says it exploited a vulnerability in the StealC infostealer to gather intelligence</description>
      <pubDate>Mon, 19 Jan 2026 09:03:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/researchers-exploit-bug-stealc/</guid>
    </item>
    <item>
      <title>TamperedChef Malvertising Campaign Drops Malware via Fake PDF Manuals</title>
      <link>https://www.infosecurity-magazine.com/news/tamperedchef-malvertising-fake-pdf/</link>
      <description>TamperedChef creates backdoors and steals user credentials – particularly in organizations reliant on technical equipment</description>
      <pubDate>Fri, 16 Jan 2026 12:05:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/tamperedchef-malvertising-fake-pdf/</guid>
    </item>
    <item>
      <title>Account Compromise Surged 389% in 2025, Says eSentire</title>
      <link>https://www.infosecurity-magazine.com/news/account-compromise-surged-2025/</link>
      <description>An eSentire report showed credential theft accounted for 74% of all observed cyber threats in 2025</description>
      <pubDate>Fri, 16 Jan 2026 11:40:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/account-compromise-surged-2025/</guid>
    </item>
    <item>
      <title>RondoDox Botnet Targets HPE OneView Vulnerability in Exploitation Wave</title>
      <link>https://www.infosecurity-magazine.com/news/rondodox-botnet-targets-hpe/</link>
      <description>Check Point Research has reported a surge in attacks on a vulnerability in HPE OneView, driven by the Linux-based RondoDox botnet </description>
      <pubDate>Fri, 16 Jan 2026 09:15:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/rondodox-botnet-targets-hpe/</guid>
    </item>
    <item>
      <title>Global Agencies Release New Guidance to Secure Industrial Networks</title>
      <link>https://www.infosecurity-magazine.com/news/global-agencies-secure-industrial/</link>
      <description>CISA, NCSC and the FBI have released a new security guide to enhance protection for OT environments</description>
      <pubDate>Thu, 15 Jan 2026 16:15:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/global-agencies-secure-industrial/</guid>
    </item>
    <item>
      <title>Hackers Increasingly Shun Encryption in Favour of Pure Data Theft and Extortion</title>
      <link>https://www.infosecurity-magazine.com/news/hackers-shun-encryption-in-favour/</link>
      <description>While ‘traditional’ ransomware attacks remain stable, some gangs are shifting towards exploiting zero-days and supply chains to go straight to stealing data</description>
      <pubDate>Thu, 15 Jan 2026 15:45:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/hackers-shun-encryption-in-favour/</guid>
    </item>
    <item>
      <title>Cyber Threat Actors Ramp Up Attacks on Industrial Environments</title>
      <link>https://www.infosecurity-magazine.com/news/cyber-threat-actors-ramp-up-ics/</link>
      <description>Hacktivists and cybercriminals have intensified their efforts to exploit vulnerabilities in industrial systems, according to a Cyble report</description>
      <pubDate>Thu, 15 Jan 2026 15:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/cyber-threat-actors-ramp-up-ics/</guid>
    </item>
    <item>
      <title>CodeBuild Flaw Put AWS Console Supply Chain At Risk</title>
      <link>https://www.infosecurity-magazine.com/news/codebuild-flaw-aws-console-risk/</link>
      <description>A critical AWS CodeBuild misconfiguration has exposed core repositories to potential attack</description>
      <pubDate>Thu, 15 Jan 2026 15:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/codebuild-flaw-aws-console-risk/</guid>
    </item>
    <item>
      <title>CISO Role Reaches “Inflexion Point” With Executive-Level Titles</title>
      <link>https://www.infosecurity-magazine.com/news/ciso-role-inflexion-point/</link>
      <description>IANS Research reveals a growth in executive-level CISO titles, amid resource challenges</description>
      <pubDate>Thu, 15 Jan 2026 14:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/ciso-role-inflexion-point/</guid>
    </item>
    <item>
      <title>Data Privacy Teams Face Staffing Shortages and Budget Constraints, ISACA Warns</title>
      <link>https://www.infosecurity-magazine.com/news/data-privacy-teams-staffing/</link>
      <description>ISACA’s State of Privacy 2026 report reveals that data privacy teams remain understaffed and underfunded, despite growing regulatory demands and rising technical privacy challenges</description>
      <pubDate>Thu, 15 Jan 2026 12:15:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/data-privacy-teams-staffing/</guid>
    </item>
    <item>
      <title>ICE Agent Doxxing Site DDoS-ed Via Russian Servers</title>
      <link>https://www.infosecurity-magazine.com/news/ice-agent-doxxing-site-ddosed/</link>
      <description>DDoS-ers are striking a website linked to a data breach at the Department of Homeland Security </description>
      <pubDate>Thu, 15 Jan 2026 11:15:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/ice-agent-doxxing-site-ddosed/</guid>
    </item>
    <item>
      <title>Criminal Subscription Service Behind AI-Powered Cyber-Attacks Taken Out By Microsoft </title>
      <link>https://www.infosecurity-magazine.com/news/criminal-subscription-service/</link>
      <description>RedVDS cyber-crime-as-a-service platform powering phishing, BEC attacks and other fraud has cost victims millions</description>
      <pubDate>Wed, 14 Jan 2026 16:32:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/criminal-subscription-service/</guid>
    </item>
    <item>
      <title>Hackers Use Fake PayPal Notices to Steal Credentials, Deploy RMMs</title>
      <link>https://www.infosecurity-magazine.com/news/hackers-fake-paypal-notices-deploy/</link>
      <description>Phishing attacks have been identified using fake PayPal alerts to exploit remote monitoring and management tools</description>
      <pubDate>Wed, 14 Jan 2026 16:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/hackers-fake-paypal-notices-deploy/</guid>
    </item>
    <item>
      <title>DeadLock Ransomware Uses Polygon Smart Contracts For Proxy Rotation</title>
      <link>https://www.infosecurity-magazine.com/news/deadlock-polygon-smart-contracts/</link>
      <description>A new DeadLock ransomware operation uses Polygon blockchain smart contracts to manage proxy server addresses</description>
      <pubDate>Wed, 14 Jan 2026 14:20:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/deadlock-polygon-smart-contracts/</guid>
    </item>
    <item>
      <title>G7 Sets 2034 Deadline for Finance to Adopt Quantum-Safe Systems</title>
      <link>https://www.infosecurity-magazine.com/news/g7-2034-deadline-finance-pqc/</link>
      <description>The financial sector should finalize its post-quantum cryptography transition circa 2034, G7 cyber experts said</description>
      <pubDate>Wed, 14 Jan 2026 11:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/g7-2034-deadline-finance-pqc/</guid>
    </item>
    <item>
      <title>Microsoft Fixes Three Zero-Days on Busy Patch Tuesday</title>
      <link>https://www.infosecurity-magazine.com/news/microsoft-three-zerodays-busy/</link>
      <description>Microsoft has patched three zero-day vulnerabilities in the first patch Tuesday of 2026, including one under active exploitation</description>
      <pubDate>Wed, 14 Jan 2026 10:45:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/microsoft-three-zerodays-busy/</guid>
    </item>
    <item>
      <title>Impersonation Fraud Drives Record $17bn in Crypto Losses </title>
      <link>https://www.infosecurity-magazine.com/news/impersonation-fraud-record-17bn/</link>
      <description>Chainalysis estimates $17bn will be lost to crypto scams in 2025 as AI takes hold</description>
      <pubDate>Wed, 14 Jan 2026 10:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/impersonation-fraud-record-17bn/</guid>
    </item>
    <item>
      <title>CISA Flags Actively Exploited Gogs Vulnerability With No Patch</title>
      <link>https://www.infosecurity-magazine.com/news/cisa-flags-exploited-gogs-flaw-no/</link>
      <description>A high-severity security flaw in the Gogs Git service is being actively exploited, leading to remote code execution</description>
      <pubDate>Tue, 13 Jan 2026 16:45:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/cisa-flags-exploited-gogs-flaw-no/</guid>
    </item>
    <item>
      <title>SHADOW#REACTOR Campaign Uses Text-Only Staging to Deploy Remcos RAT</title>
      <link>https://www.infosecurity-magazine.com/news/shadowreactor-text-staging-remcos/</link>
      <description>SHADOW#REACTOR is a multi-stage Windows malware campaign that stealthily deploys the Remcos RAT using complex infection techniques</description>
      <pubDate>Tue, 13 Jan 2026 16:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/shadowreactor-text-staging-remcos/</guid>
    </item>
    <item>
      <title>Phishing Scams Exploit Browser-in-the-Browser Attacks to Steal Facebook Passwords</title>
      <link>https://www.infosecurity-magazine.com/news/phishing-scams-exploit-browser/</link>
      <description>Cybersecurity researchers issue warning over a surge in attacks designed to trick Facebook users into handing over login credentials </description>
      <pubDate>Tue, 13 Jan 2026 14:40:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/phishing-scams-exploit-browser/</guid>
    </item>
    <item>
      <title>New Chinese-Made Malware Framework Targets Linux-Based Cloud Environments</title>
      <link>https://www.infosecurity-magazine.com/news/chinese-malware-framework-linux/</link>
      <description>Detected by Check Point researchers, VoidLink is a sophisticated malware framework that can be used to implant malware in the most common cloud environments</description>
      <pubDate>Tue, 13 Jan 2026 14:31:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/chinese-malware-framework-linux/</guid>
    </item>
    <item>
      <title>Parliament Asks Security Pros to Shape Cyber Security and Resilience Bill</title>
      <link>https://www.infosecurity-magazine.com/news/parliament-security-pros-cyber/</link>
      <description>Lawmakers want the security industry to help them scrutinize the Cyber Security and Resilience Bill</description>
      <pubDate>Tue, 13 Jan 2026 11:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/parliament-security-pros-cyber/</guid>
    </item>
    <item>
      <title>Global Magecart Campaign Targets Six Card Networks </title>
      <link>https://www.infosecurity-magazine.com/news/global-magecart-campaign-six-card/</link>
      <description>Silent Push has discovered a new Magecart campaign targeting six major payment network providers that has been running since 2022</description>
      <pubDate>Tue, 13 Jan 2026 11:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/global-magecart-campaign-six-card/</guid>
    </item>
    <item>
      <title>Palo Alto Networks Introduces New Vibe Coding Security Governance Framework</title>
      <link>https://www.infosecurity-magazine.com/news/palo-alto-networks-vibe-coding/</link>
      <description>Researchers at Palo Alto’s Unit 42 have outlined a list of recommended security controls for vibe coding tools</description>
      <pubDate>Mon, 12 Jan 2026 17:15:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/palo-alto-networks-vibe-coding/</guid>
    </item>
    <item>
      <title>CISA Closes Ten Emergency Directives After Federal Cyber Reviews</title>
      <link>https://www.infosecurity-magazine.com/news/cisa-closes-ten-emergency/</link>
      <description>US agency CISA has retired ten Emergency Directives issued between 2019 and 2024, marking a new step in managing federal cyber-risk</description>
      <pubDate>Mon, 12 Jan 2026 16:45:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/cisa-closes-ten-emergency/</guid>
    </item>
    <item>
      <title>California Shuts Down Health Data Resales By Unregistered Brokers</title>
      <link>https://www.infosecurity-magazine.com/news/california-shuts-health-data/</link>
      <description>California privacy regulator, the CPPA, is cracking down on data brokers trading personal data without authorization</description>
      <pubDate>Mon, 12 Jan 2026 16:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/california-shuts-health-data/</guid>
    </item>
    <item>
      <title>World Economic Forum: Cyber-fraud overtakes ransomware as business leaders' top cyber-security concern</title>
      <link>https://www.infosecurity-magazine.com/news/fraud-overtakes-ransomware-as-top/</link>
      <description>“Pervasive” threat of phishing, invoice scams and other cyber-enabled fraud is at “record highs”, warns WEF Cybersecurity Outlook 2026</description>
      <pubDate>Mon, 12 Jan 2026 14:10:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/fraud-overtakes-ransomware-as-top/</guid>
    </item>
    <item>
      <title>Illicit Crypto Activity Hits Record $158bn in 2025</title>
      <link>https://www.infosecurity-magazine.com/news/illicit-crypto-activity-record/</link>
      <description>TRM Labs says illegal crypto flows into digital wallets increased to $158bn in 2025</description>
      <pubDate>Mon, 12 Jan 2026 10:15:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/illicit-crypto-activity-record/</guid>
    </item>
    <item>
      <title>BreachForums Database Leak Turns the Tables on Threat Actors</title>
      <link>https://www.infosecurity-magazine.com/news/breachforums-database-leak/</link>
      <description>A database featuring 300,000+ users of notorious hacking forum BreachForums has been leaked online</description>
      <pubDate>Mon, 12 Jan 2026 09:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/breachforums-database-leak/</guid>
    </item>
    <item>
      <title>Europol Leads Global Crackdown on Black Axe Cybercrime Gang, 34 Arrested</title>
      <link>https://www.infosecurity-magazine.com/news/europol-crackdown-on-black-axe/</link>
      <description>Europol-backed operation targets group behind numerous BEC attacks and romance scams</description>
      <pubDate>Fri, 09 Jan 2026 13:01:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/europol-crackdown-on-black-axe/</guid>
    </item>
    <item>
      <title>World Economic Forum: Deepfake Face-Swapping Tools Are Creating Critical Security Risks </title>
      <link>https://www.infosecurity-magazine.com/news/wef-deepfake-faceswapping-security/</link>
      <description>Researchers at the World Economic Forum have shown that threat actors can use commercial deepfake tools to bypass corporate security protections</description>
      <pubDate>Fri, 09 Jan 2026 12:34:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/wef-deepfake-faceswapping-security/</guid>
    </item>
    <item>
      <title>AI-Powered Truman Show Operation Industrializes Investment Fraud</title>
      <link>https://www.infosecurity-magazine.com/news/ai-truman-show-industrializes/</link>
      <description>Check Point has uncovered a vast, AI-powered scam operation dubbed the “Truman Show”</description>
      <pubDate>Fri, 09 Jan 2026 11:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/ai-truman-show-industrializes/</guid>
    </item>
    <item>
      <title>FBI Warns of North Korean QR Phishing Campaigns</title>
      <link>https://www.infosecurity-magazine.com/news/fbi-warns-north-korean-qr-phishing/</link>
      <description>The FBI says North Korea’s Kimsuky APT group is using QR codes in spear phishing campaigns</description>
      <pubDate>Fri, 09 Jan 2026 10:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/fbi-warns-north-korean-qr-phishing/</guid>
    </item>
    <item>
      <title>GoBruteforcer Botnet Targets Linux Servers</title>
      <link>https://www.infosecurity-magazine.com/news/gobruteforcer-botnet-linux-servers/</link>
      <description>The GoBruteforcer botnet has been observed targeting exposed Linux servers on services like FTP and MySQL</description>
      <pubDate>Thu, 08 Jan 2026 17:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/gobruteforcer-botnet-linux-servers/</guid>
    </item>
    <item>
      <title>New Zero-Click Attack Lets ChatGPT User Steal Data</title>
      <link>https://www.infosecurity-magazine.com/news/new-zeroclick-attack-chatgpt/</link>
      <description>Researchers at Radware discovered new prompt injection attacks in ChatGPT agentic features</description>
      <pubDate>Thu, 08 Jan 2026 16:45:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/new-zeroclick-attack-chatgpt/</guid>
    </item>
    <item>
      <title>China-Linked UAT-7290 Targets Telecom Networks in South Asia</title>
      <link>https://www.infosecurity-magazine.com/news/china-uat-7290-targets-telecoms/</link>
      <description>A long-term cyber-espionage campaign targeting South Asia's telecom firms has been linked to UAT-7290</description>
      <pubDate>Thu, 08 Jan 2026 16:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/china-uat-7290-targets-telecoms/</guid>
    </item>
    <item>
      <title>Phishing Attacks Exploit Misconfigured Email Routing Settings to Target Microsoft 365 Users</title>
      <link>https://www.infosecurity-magazine.com/news/phishing-exploits-misconfigured/</link>
      <description>Misconfigurations abused to make phishing emails look like they come from within the organization </description>
      <pubDate>Thu, 08 Jan 2026 14:01:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/phishing-exploits-misconfigured/</guid>
    </item>
    <item>
      <title>Fifth of Breaches Take Two Weeks to Recover From</title>
      <link>https://www.infosecurity-magazine.com/news/fifth-breaches-two-weeks-recover/</link>
      <description>Absolute Security claims that full recovery from endpoint-related downtime can take up to a fortnight for most organizations</description>
      <pubDate>Thu, 08 Jan 2026 12:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/fifth-breaches-two-weeks-recover/</guid>
    </item>
    <item>
      <title>US To Leave Global Forum on Cyber Expertise</title>
      <link>https://www.infosecurity-magazine.com/news/us-leave-global-forum-on-cyber/</link>
      <description>The Trump administration decided to leave 66 international organizations, including the GFCE and the European Centre of Excellence for Countering Hybrid Threats</description>
      <pubDate>Thu, 08 Jan 2026 11:15:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/us-leave-global-forum-on-cyber/</guid>
    </item>
    <item>
      <title>Maximum Severity “Ni8mare” Bug Lets Hackers Hijack n8n Servers</title>
      <link>https://www.infosecurity-magazine.com/news/maximum-severity-ni8mare-bug/</link>
      <description>A newly discovered vulnerability in authentication platform n8n could allow threat actors to take control of n8n servers</description>
      <pubDate>Thu, 08 Jan 2026 10:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/maximum-severity-ni8mare-bug/</guid>
    </item>
    <item>
      <title>Versatile Malware Loader pkr_mtsi Delivers Diverse Payloads</title>
      <link>https://www.infosecurity-magazine.com/news/malware-loader-pkrmtsi-payloads/</link>
      <description>Malicious Windows packer named pkr_mtsi used as a flexible malware loader in malvertising campaigns</description>
      <pubDate>Wed, 07 Jan 2026 16:45:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/malware-loader-pkrmtsi-payloads/</guid>
    </item>
    <item>
      <title>Ghost Tap Malware Fuels Surge in Remote NFC Payment Fraud</title>
      <link>https://www.infosecurity-magazine.com/news/ghost-tap-malware-remote-nfc-fraud/</link>
      <description>New Android malware enables unauthorized tap-to-pay transactions without physical access to bank cards</description>
      <pubDate>Wed, 07 Jan 2026 16:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/ghost-tap-malware-remote-nfc-fraud/</guid>
    </item>
    <item>
      <title>China intensifies Cyber-Attacks on Taiwan as Energy Sector Sees Tenfold Spike</title>
      <link>https://www.infosecurity-magazine.com/news/china-intensifies-cyberattacks/</link>
      <description>Taiwan recorded an average of 2.63 million cyber intrusion attempts to it critical infrastructure per day coming from China in 2025</description>
      <pubDate>Wed, 07 Jan 2026 14:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/china-intensifies-cyberattacks/</guid>
    </item>
    <item>
      <title>Personal LLM Accounts Drive Shadow AI Data Leak Risks </title>
      <link>https://www.infosecurity-magazine.com/news/personal-llm-accounts-drive-shadow/</link>
      <description>Lack of visibility and governance around employees using generative AI is resulting in rise in data security risks</description>
      <pubDate>Wed, 07 Jan 2026 13:10:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/personal-llm-accounts-drive-shadow/</guid>
    </item>
    <item>
      <title>Hackers Claim to Disconnect Brightspeed Customers After Breach</title>
      <link>https://www.infosecurity-magazine.com/news/hackers-disconnect-brightspeed/</link>
      <description>A hacking collective claims it has disconnected customers of US ISP Brightspeed</description>
      <pubDate>Wed, 07 Jan 2026 10:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/hackers-disconnect-brightspeed/</guid>
    </item>
    <item>
      <title>MFA Failure Enables Infostealer Breach At 50 Enterprises</title>
      <link>https://www.infosecurity-magazine.com/news/mfa-failure-infostealer-breach-50/</link>
      <description>Threat actor “Zestix” was able to breach around 50 firms using infostealers because they lacked multi-factor authentication</description>
      <pubDate>Wed, 07 Jan 2026 09:45:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/mfa-failure-infostealer-breach-50/</guid>
    </item>
    <item>
      <title>Hospitality Sector Hit By PHALT#BLYX ClickFix Malware Campaign</title>
      <link>https://www.infosecurity-magazine.com/news/phaltblyx-clickfix-malware/</link>
      <description>Multi-stage malware campaign targets hospitality organizations using social engineering and abuse of MSBuild.exe</description>
      <pubDate>Tue, 06 Jan 2026 16:15:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/phaltblyx-clickfix-malware/</guid>
    </item>
    <item>
      <title>High-Severity Flaw in Open WebUI Affects AI Connections</title>
      <link>https://www.infosecurity-magazine.com/news/flaw-open-webui-affects-ai/</link>
      <description>A high-severity security flaw in Open WebUI Direct Connections risks account takeover and server compromises</description>
      <pubDate>Tue, 06 Jan 2026 15:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/flaw-open-webui-affects-ai/</guid>
    </item>
    <item>
      <title>UK Launches New Cyber Unit to Bolster Defences Against Cyber Threats </title>
      <link>https://www.infosecurity-magazine.com/news/uk-launches-new-cyber-unit/</link>
      <description>UK government’s new Cyber Action plan looks to provide more ‘hands-on’ support for protecting against and responding to security incidents</description>
      <pubDate>Tue, 06 Jan 2026 12:45:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/uk-launches-new-cyber-unit/</guid>
    </item>
  </channel>
</rss>