<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <link>https://www.infosecurity-magazine.com/news/</link>
    <copyright>Copyright © 2026 Reed Exhibitions Ltd. All Rights Reserved.</copyright>
    <item>
      <title>GitHub Confirms Breach of Internal Repositories Via Malicious VS Code Extension</title>
      <link>https://www.infosecurity-magazine.com/news/github-confirms-breach-vs-code/</link>
      <description>The prolific threat group TeamPCP has claimed a hack into GitHub’s internal repositories</description>
      <pubDate>Wed, 20 May 2026 10:45:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/github-confirms-breach-vs-code/</guid>
    </item>
    <item>
      <title>Researchers Warn CypherLoc Scareware Has Targeted Millions of Users </title>
      <link>https://www.infosecurity-magazine.com/news/researchers-cypherloc-scareware/</link>
      <description>Barracuda reveals new CypherLoc scareware has featured in nearly three million attacks</description>
      <pubDate>Wed, 20 May 2026 10:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/researchers-cypherloc-scareware/</guid>
    </item>
    <item>
      <title>Verizon DBIR: Vulnerability Exploits Overtake Credentials as Top Access Vector</title>
      <link>https://www.infosecurity-magazine.com/news/verizon-dbir-exploits-top-access/</link>
      <description>Verizon DBIR finds 31% of data breaches began with software flaws last year</description>
      <pubDate>Wed, 20 May 2026 08:40:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/verizon-dbir-exploits-top-access/</guid>
    </item>
    <item>
      <title>Microsoft Takes Down Fox Tempest for Providing Ransomware-Enabling Signing Tool</title>
      <link>https://www.infosecurity-magazine.com/news/microsoft-takes-down-fox-tempest/</link>
      <description>Microsoft’s Digital Crimes Unit has taken down the infrastructure of Fox Tempest, a prolific cybercrime-enabling threat group</description>
      <pubDate>Tue, 19 May 2026 15:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/microsoft-takes-down-fox-tempest/</guid>
    </item>
    <item>
      <title>AI Raises the Bar on Vulnerability Awareness and Secure-by-Design Software</title>
      <link>https://www.infosecurity-magazine.com/news/ai-raises-vulnerability-awareness/</link>
      <description>AI-powered vulnerability scanning leaves no excuse for unpatched bugs as the EU Cyber Resilience Act pushes firms toward secure-by-design software</description>
      <pubDate>Tue, 19 May 2026 12:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/ai-raises-vulnerability-awareness/</guid>
    </item>
    <item>
      <title>Agentic AI Accelerates Software Builds and Mobile App Attacks </title>
      <link>https://www.infosecurity-magazine.com/news/agentic-ai-accelerates-software/</link>
      <description>Digital.ai data reveals 87% of apps were attacked over the past year</description>
      <pubDate>Tue, 19 May 2026 12:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/agentic-ai-accelerates-software/</guid>
    </item>
    <item>
      <title>Grafana Labs Confirms Hackers Stole Source Code</title>
      <link>https://www.infosecurity-magazine.com/news/grafana-labs-confirms-hackers/</link>
      <description>Open source tool maker Grafana says hackers stole codebase via GitHub breach</description>
      <pubDate>Tue, 19 May 2026 09:15:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/grafana-labs-confirms-hackers/</guid>
    </item>
    <item>
      <title>Hackers Bypass Security Tools to Target Users Directly</title>
      <link>https://www.infosecurity-magazine.com/news/hackers-bypass-security-tools/</link>
      <description>Bridewell report calls out emergence of “fix-style” attacks</description>
      <pubDate>Tue, 19 May 2026 08:20:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/hackers-bypass-security-tools/</guid>
    </item>
    <item>
      <title>Interpol Launches Sweeping Cybercrime Crackdown in MENA Region</title>
      <link>https://www.infosecurity-magazine.com/news/interpol-cybercrime-crackdown-mena/</link>
      <description>Over 200 people were arrested in an anti-cybercrime operation that spanned 13 countries across the Middle East and North Africa</description>
      <pubDate>Mon, 18 May 2026 14:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/interpol-cybercrime-crackdown-mena/</guid>
    </item>
    <item>
      <title>The Infosecurity Europe Cyber Startup Competition: Meet the Finalists </title>
      <link>https://www.infosecurity-magazine.com/news/infosec-europe-cyber-startup/</link>
      <description>New for 2026, the Infosecurity Europe Startup competition will see five finalists pitch their ideas in front of a live audience, including senior industry leaders, investors and buyers</description>
      <pubDate>Mon, 18 May 2026 13:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/infosec-europe-cyber-startup/</guid>
    </item>
    <item>
      <title>NCSC Publishes Guidance on Securing Agentic AI Use</title>
      <link>https://www.infosecurity-magazine.com/news/ncsc-publishes-guidance-securing/</link>
      <description>The UK’s National Cyber Security Centre is helping organizations to understand agentic AI security risks</description>
      <pubDate>Mon, 18 May 2026 10:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/ncsc-publishes-guidance-securing/</guid>
    </item>
    <item>
      <title>Security Researchers Find 47 Zero-Days at Pwn2Own Berlin</title>
      <link>https://www.infosecurity-magazine.com/news/security-researchers-47-zerodays/</link>
      <description>The research community was awarded $1.3m as it found dozens of novel vulnerabilities at Pwn2Own Berlin</description>
      <pubDate>Mon, 18 May 2026 09:45:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/security-researchers-47-zerodays/</guid>
    </item>
    <item>
      <title>Bank of England, FCA and Treasury Raise Alarm Over Frontier AI</title>
      <link>https://www.infosecurity-magazine.com/news/bank-england-fca-treasury-alarm/</link>
      <description>The UK’s financial authorities have set expectations for the sector on cybersecurity and operational resilience</description>
      <pubDate>Mon, 18 May 2026 09:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/bank-england-fca-treasury-alarm/</guid>
    </item>
    <item>
      <title>Gremlin Stealer Evolves into Modular Threat with Advanced Evasion Capabilities </title>
      <link>https://www.infosecurity-magazine.com/news/gremlin-stealer-evolves-into/</link>
      <description>A new Gremlin stealer variant has evolved into a modular toolkit with advanced evasion and data theft capabilities, according to new Unit 42 research </description>
      <pubDate>Fri, 15 May 2026 14:19:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/gremlin-stealer-evolves-into/</guid>
    </item>
    <item>
      <title>Microsoft Reports Severe Zero-Day Flaw in On-Prem Exchange Servers</title>
      <link>https://www.infosecurity-magazine.com/news/microsoft-zeroday-exchange-servers/</link>
      <description>The zero-day vulnerability affects on-premises installations for all versions of Exchange Server 2016, 2019 and Subscription Edition</description>
      <pubDate>Fri, 15 May 2026 12:35:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/microsoft-zeroday-exchange-servers/</guid>
    </item>
    <item>
      <title>China-Linked Hackers Deploy New TencShell Malware Against Global Manufacturer</title>
      <link>https://www.infosecurity-magazine.com/news/china-hackers-tencshell-malware/</link>
      <description>A suspected China-linked threat actor targeted the Indian branch of a global manufacturer leveraging an open source offensive toolkit</description>
      <pubDate>Fri, 15 May 2026 08:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/china-hackers-tencshell-malware/</guid>
    </item>
    <item>
      <title>Mustang Panda Linked to Updated FDMTP Backdoor in Asia-Pacific Espionage Campaign</title>
      <link>https://www.infosecurity-magazine.com/news/mustang-panda-fdmtp-backdoor-apj/</link>
      <description>Mustang Panda campaign deploys updated FDMTP backdoor against Asia-Pacific and Japan networks</description>
      <pubDate>Thu, 14 May 2026 15:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/mustang-panda-fdmtp-backdoor-apj/</guid>
    </item>
    <item>
      <title>Google Launches Android Spyware Forensics Tool for High-Risk Users</title>
      <link>https://www.infosecurity-magazine.com/news/google-launches-android-spyware/</link>
      <description>Google’s Android Advanced Protection Mode is getting a new feature allowing trusted security experts to investigate potential spyware infections</description>
      <pubDate>Thu, 14 May 2026 13:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/google-launches-android-spyware/</guid>
    </item>
    <item>
      <title>New Fragnesia Flaw Hands Linux Local Users Root Access</title>
      <link>https://www.infosecurity-magazine.com/news/fragnesia-linux-kernel-lpe-root/</link>
      <description>New Fragnesia kernel flaw lets unprivileged local users escalate to root on Linux systems</description>
      <pubDate>Thu, 14 May 2026 13:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/fragnesia-linux-kernel-lpe-root/</guid>
    </item>
    <item>
      <title>Most Organizations Now Use AI Agents for Sensitive Security Tasks</title>
      <link>https://www.infosecurity-magazine.com/news/most-organizations-ai-agents/</link>
      <description>Semperis study finds 74% of organizations believe AI will increase attacks on identity infrastructure</description>
      <pubDate>Thu, 14 May 2026 09:20:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/most-organizations-ai-agents/</guid>
    </item>
    <item>
      <title>ICO Publishes Five-Step Plan to Counter Emerging AI-Powered Attacks</title>
      <link>https://www.infosecurity-magazine.com/news/ico-steps-in-advice-handling-ai/</link>
      <description>The Information Commissioner’s Office has released new guidance on how to mitigate the risk of AI-powered attacks</description>
      <pubDate>Thu, 14 May 2026 09:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/ico-steps-in-advice-handling-ai/</guid>
    </item>
    <item>
      <title>Canvas Owner Reaches Agreement With Cybercriminals After Ransomware Attack</title>
      <link>https://www.infosecurity-magazine.com/news/canvas-cybercriminals-agreement/</link>
      <description>Instructure says it reached an agreement with ShinyHunters over the Canvas breach data</description>
      <pubDate>Wed, 13 May 2026 14:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/canvas-cybercriminals-agreement/</guid>
    </item>
    <item>
      <title>Avada Builder Flaws Expose One Million WordPress Sites</title>
      <link>https://www.infosecurity-magazine.com/news/avada-builder-flaws-one-million/</link>
      <description>Avada Builder flaws allowed file read and SQL injection on one million WordPress sites</description>
      <pubDate>Wed, 13 May 2026 14:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/avada-builder-flaws-one-million/</guid>
    </item>
    <item>
      <title>Ransomware: Over Half of CISOs Would Consider Paying Ransom to Hackers</title>
      <link>https://www.infosecurity-magazine.com/news/ransomware-over-half-cisos-would/</link>
      <description>Survey of cybersecurity leaders suggests that majority would strongly consider paying cybercriminals, if that’s what it took to help restore encrypted systems</description>
      <pubDate>Wed, 13 May 2026 12:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/ransomware-over-half-cisos-would/</guid>
    </item>
    <item>
      <title>Global Cyber Agencies Issue New SBOMs for AI Guidance to Tackle AI Supply Chain Risks</title>
      <link>https://www.infosecurity-magazine.com/news/new-sboms-for-ai-guidance-2026/</link>
      <description>The G7 Cybersecurity Working Group releases new SBOM for AI guidance, outlining seven key data clusters to boost transparency and security across AI supply chains</description>
      <pubDate>Wed, 13 May 2026 11:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/new-sboms-for-ai-guidance-2026/</guid>
    </item>
    <item>
      <title>UK Cybersecurity Market Expands to £14.7bn with Strong Growth in AI Security Firms</title>
      <link>https://www.infosecurity-magazine.com/news/uks-cyber-sector-grows-revenue-11/</link>
      <description>UK cybersecurity sector reaches £14.7bn in revenue, driven by rapid growth in AI security firms, increased investment and rising employment across the industry</description>
      <pubDate>Wed, 13 May 2026 09:05:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/uks-cyber-sector-grows-revenue-11/</guid>
    </item>
    <item>
      <title>Microsoft Fixes 17 Critical Flaws in May Patch Tuesday</title>
      <link>https://www.infosecurity-magazine.com/news/microsoft-17-critical-flaws-may/</link>
      <description>Microsoft has patched 120 vulnerabilities in this month’s security update round</description>
      <pubDate>Wed, 13 May 2026 08:15:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/microsoft-17-critical-flaws-may/</guid>
    </item>
    <item>
      <title>OpenAI Launches 'Daybreak' to Help Build Secure By Design Software</title>
      <link>https://www.infosecurity-magazine.com/news/openai-daybreak-secure-by-design/</link>
      <description>With Daybreak, OpenAI wants its frontier AI models to be used to deploy secure by design software from the ground up</description>
      <pubDate>Tue, 12 May 2026 15:15:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/openai-daybreak-secure-by-design/</guid>
    </item>
    <item>
      <title>Mini Shai-Hulud Hits TanStack npm Packages</title>
      <link>https://www.infosecurity-magazine.com/news/mini-shai-hulud-tanstack-npm/</link>
      <description>Mini Shai-Hulud compromises TanStack npm packages and spreads across PyPI</description>
      <pubDate>Tue, 12 May 2026 14:45:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/mini-shai-hulud-tanstack-npm/</guid>
    </item>
    <item>
      <title>End‑to‑End Encrypted RCS Messaging Arrives Across iPhone and Android</title>
      <link>https://www.infosecurity-magazine.com/news/apple-google-rcs-end-to-end/</link>
      <description>Apple begins rolling out end-to-end encrypted RCS messaging between iPhone and Android in iOS 26.5</description>
      <pubDate>Tue, 12 May 2026 13:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/apple-google-rcs-end-to-end/</guid>
    </item>
    <item>
      <title>Attackers Combine ClickFix With PySoxy Proxying to Maintain Persistence </title>
      <link>https://www.infosecurity-magazine.com/news/clickfix-combined-pysoxy-proxying/</link>
      <description>Exploitation of open-source tools allows attackers to maintain persistent access after initial social engineering, warn ReliaQuest researchers</description>
      <pubDate>Tue, 12 May 2026 12:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/clickfix-combined-pysoxy-proxying/</guid>
    </item>
    <item>
      <title>Malicious Hugging Face Repository Typosquats OpenAI</title>
      <link>https://www.infosecurity-magazine.com/news/malicious-hugging-face-repo/</link>
      <description>HiddenLayer reveals infostealer malware in a Hugging Face repository</description>
      <pubDate>Tue, 12 May 2026 09:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/malicious-hugging-face-repo/</guid>
    </item>
    <item>
      <title>South Staffordshire Water Fined £1m After Data Breach</title>
      <link>https://www.infosecurity-magazine.com/news/south-staffordshire-water-fined-1m/</link>
      <description>The ICO has fined South Staffordshire Water nearly £1m for a series of data protection failings</description>
      <pubDate>Tue, 12 May 2026 08:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/south-staffordshire-water-fined-1m/</guid>
    </item>
    <item>
      <title>TrickMo Variant Routes Android Trojan Traffic Through TON</title>
      <link>https://www.infosecurity-magazine.com/news/trickmo-c-ton-network-android/</link>
      <description>ThreatFabric finds new TrickMo Android banking trojan variant routing C2 through The Open Network</description>
      <pubDate>Mon, 11 May 2026 15:15:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/trickmo-c-ton-network-android/</guid>
    </item>
    <item>
      <title>Rushed Patches Follow Broken Embargo on New Linux Kernel Vulnerabilities</title>
      <link>https://www.infosecurity-magazine.com/news/dirty-frag-linux-kernel/</link>
      <description>Two new high-severity vulnerabilities, dubbed ’Dirty Frag’ when chained, have been found in the Linux kernel, affecting most Linux distributions </description>
      <pubDate>Mon, 11 May 2026 14:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/dirty-frag-linux-kernel/</guid>
    </item>
    <item>
      <title>Fake Claude Code Page Pushes PowerShell Stealer at Devs</title>
      <link>https://www.infosecurity-magazine.com/news/fake-claude-code-installer/</link>
      <description>Ontinue uncovers fake Claude Code installer pushing PowerShell stealer abusing Chrome's IElevator2</description>
      <pubDate>Mon, 11 May 2026 14:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/fake-claude-code-installer/</guid>
    </item>
    <item>
      <title>Hackers Observed Using AI to Develop Zero-Day for the First Time</title>
      <link>https://www.infosecurity-magazine.com/news/hackers-using-ai-zero-day-first/</link>
      <description>Google Threat Intelligence Group details how cybercriminals attempted to launch a campaign based around an AI-developed Zero-Day targeting open-source software</description>
      <pubDate>Mon, 11 May 2026 13:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/hackers-using-ai-zero-day-first/</guid>
    </item>
    <item>
      <title>US: FCC Relaxes Foreign-Made Router Ban to Allow for Security Updates</title>
      <link>https://www.infosecurity-magazine.com/news/us-fcc-relaxes-foreign-router-ban/</link>
      <description>The same extension applies to security updates shipped to US-based users of foreign-made drones</description>
      <pubDate>Mon, 11 May 2026 11:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/us-fcc-relaxes-foreign-router-ban/</guid>
    </item>
    <item>
      <title>ShinyHunters Escalates Canvas Extortion with School by School Ransom Campaign</title>
      <link>https://www.infosecurity-magazine.com/news/shinyhunters-escalates-canvas/</link>
      <description>ShinyHunters has escalated its Canvas extortion campaign, defacing hundreds of school login pages and threatening to leak stolen data unless institutions negotiate</description>
      <pubDate>Mon, 11 May 2026 10:05:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/shinyhunters-escalates-canvas/</guid>
    </item>
    <item>
      <title>Zara Data Breach Impacts Nearly 200,000 Customers</title>
      <link>https://www.infosecurity-magazine.com/news/zara-data-breach-impacts-200000/</link>
      <description>ShinyHunters gets away with emails and other data on 200,000 Zara customers</description>
      <pubDate>Mon, 11 May 2026 09:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/zara-data-breach-impacts-200000/</guid>
    </item>
    <item>
      <title>Police Shut Relaunched Crimenetwork Dark Web Marketplace</title>
      <link>https://www.infosecurity-magazine.com/news/police-shut-crimenetwork-may-2025/</link>
      <description>Spanish police have arrested the suspected administrator of German dark web marketplace Crimenetwork</description>
      <pubDate>Mon, 11 May 2026 08:15:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/police-shut-crimenetwork-may-2025/</guid>
    </item>
    <item>
      <title>Australian Cyber Security Centre Issues Alert Over ClickFix Attacks</title>
      <link>https://www.infosecurity-magazine.com/news/australian-cyber-security-centre/</link>
      <description>ACSC warns over a campaign targeting organizations which uses ClickFix to deliver Vidar infostealer malware</description>
      <pubDate>Fri, 08 May 2026 11:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/australian-cyber-security-centre/</guid>
    </item>
    <item>
      <title>PCPJack Campaign Boots TeamPCP Off Compromised Machines</title>
      <link>https://www.infosecurity-magazine.com/news/pcpjack-campaign-boots-teampcp-off/</link>
      <description>SentinelOne believes the PCPJack campaign may be the brainchild of a former TeamPCP member</description>
      <pubDate>Fri, 08 May 2026 09:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/pcpjack-campaign-boots-teampcp-off/</guid>
    </item>
    <item>
      <title>Legacy Security Tools Failing Data Protection, Capital One Software Report Finds</title>
      <link>https://www.infosecurity-magazine.com/news/legacy-security-tools-are-failing/</link>
      <description>Traditional network security tools are undermining data protection, with Forrester and Capital One Software research warning AI adoption is impossible without rethinking data security</description>
      <pubDate>Thu, 07 May 2026 14:50:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/legacy-security-tools-are-failing/</guid>
    </item>
    <item>
      <title>Cline Kanban Flaw Lets Websites Hijack AI Coding Agents</title>
      <link>https://www.infosecurity-magazine.com/news/cline-kanban-websocket-hijack-ai/</link>
      <description>Oasis Security finds critical Cline kanban WebSocket flaw exposing AI coding agents to hijack</description>
      <pubDate>Thu, 07 May 2026 14:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/cline-kanban-websocket-hijack-ai/</guid>
    </item>
    <item>
      <title>OpenAI and Anthropic LLMs Used in Critical Infrastructure Cyber-Attack, Warns Dragos</title>
      <link>https://www.infosecurity-magazine.com/news/llm-critical-infrastructure/</link>
      <description>Commercial AI models were used to help plan and conduct cyber-attack against operational technology of a water and drainage facility, say researchers</description>
      <pubDate>Thu, 07 May 2026 14:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/llm-critical-infrastructure/</guid>
    </item>
    <item>
      <title>Fake Claude AI Site Drops Beagle Backdoor on Windows Users</title>
      <link>https://www.infosecurity-magazine.com/news/fake-claude-site-beagle-backdoor/</link>
      <description>Sophos finds fake Claude site spreading DonutLoader and a new Beagle backdoor via DLL sideloading</description>
      <pubDate>Thu, 07 May 2026 13:15:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/fake-claude-site-beagle-backdoor/</guid>
    </item>
    <item>
      <title>Daemon Tools Developer Confirms Software Was Trojanized </title>
      <link>https://www.infosecurity-magazine.com/news/daemon-tools-confirms-software/</link>
      <description>A China-linked threat actor backdoored a version of Daemon Tools to infect thousands</description>
      <pubDate>Thu, 07 May 2026 09:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/daemon-tools-confirms-software/</guid>
    </item>
    <item>
      <title>Researchers Spot Uptick in Use of Vercel for Phishing Campaigns</title>
      <link>https://www.infosecurity-magazine.com/news/researchers-spot-uptick-vercel/</link>
      <description>Cofense has warned of a “significant” increase in phishing campaigns abusing Vercel platform</description>
      <pubDate>Thu, 07 May 2026 08:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/researchers-spot-uptick-vercel/</guid>
    </item>
    <item>
      <title>CloudZ Malware Abuses Phone Link to Steal SMS OTPs</title>
      <link>https://www.infosecurity-magazine.com/news/cloudz-rat-pheno-phone-link-otp/</link>
      <description>Cisco Talos uncovers CloudZ RAT and Pheno plugin abusing Microsoft Phone Link to intercept SMS OTPs</description>
      <pubDate>Wed, 06 May 2026 15:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/cloudz-rat-pheno-phone-link-otp/</guid>
    </item>
    <item>
      <title>CISA Urges Critical Infrastructure Providers to Make Plans to Remain Operational if hit by Cyber-Attack</title>
      <link>https://www.infosecurity-magazine.com/news/cisa-ci-fortify-isolation-recovery/</link>
      <description>CISA’s CI Fortify initiative aim for critical infrastructure operators to build isolation &amp; recovery</description>
      <pubDate>Wed, 06 May 2026 13:15:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/cisa-ci-fortify-isolation-recovery/</guid>
    </item>
    <item>
      <title>Iran-Linked APT Posed as Chaos Ransomware Member in Espionage Campaign</title>
      <link>https://www.infosecurity-magazine.com/news/iran-linked-apt-chaos-ransomware/</link>
      <description>Rapid7 reveals an Iranian false flag operation masquerading as a Chaos ransomware attack</description>
      <pubDate>Wed, 06 May 2026 13:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/iran-linked-apt-chaos-ransomware/</guid>
    </item>
    <item>
      <title>One in Eight Workers Has Sold Their Corporate Logins</title>
      <link>https://www.infosecurity-magazine.com/news/one-eight-workers-sold-corporate/</link>
      <description>Cifas says that 13% of employees admit selling company credentials to a former colleague</description>
      <pubDate>Wed, 06 May 2026 08:40:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/one-eight-workers-sold-corporate/</guid>
    </item>
    <item>
      <title>Microsoft Flags Mass Phishing Campaign Using Fake Compliance Emails</title>
      <link>https://www.infosecurity-magazine.com/news/microsoft-phishing-fake-compliance/</link>
      <description>Microsoft researchers warn of a large-scale phishing campaign using fake compliance emails to steal credentials, targeting 35,000 users across 13,000 organizations worldwide</description>
      <pubDate>Tue, 05 May 2026 16:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/microsoft-phishing-fake-compliance/</guid>
    </item>
    <item>
      <title>North Korean APT Targets Yanbian Gamers via Trojanized Platform</title>
      <link>https://www.infosecurity-magazine.com/news/scarcruft-birdcall-android-yanbian/</link>
      <description>ESET warns that North Korean hackers compromised a Yanbian gaming site in a supply‑chain attack, trojanizing Windows and Android software to spy on users</description>
      <pubDate>Tue, 05 May 2026 15:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/scarcruft-birdcall-android-yanbian/</guid>
    </item>
    <item>
      <title>Fake SSA Emails Drive Venomous#Helper Phishing Campaign</title>
      <link>https://www.infosecurity-magazine.com/news/ssa-emails-venomous-helper-phishing/</link>
      <description>Venomous#Helper attackers impersonate the US Social Security Administration to deploy signed RMM software and maintain persistent access across US networks</description>
      <pubDate>Tue, 05 May 2026 14:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/ssa-emails-venomous-helper-phishing/</guid>
    </item>
    <item>
      <title>AI Adoption Outpaces Safety Policies, Leaving Organizations Exposed to Cyber Risk</title>
      <link>https://www.infosecurity-magazine.com/news/ai-adoption-outpaces-safety-policy/</link>
      <description>ISACA report warns that while AI has become the norm, many organizations are yet to formally apply safety or security policies around its use</description>
      <pubDate>Tue, 05 May 2026 11:10:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/ai-adoption-outpaces-safety-policy/</guid>
    </item>
    <item>
      <title>NCSC Warns of an AI-Fuelled “Vulnerability Patch Wave”</title>
      <link>https://www.infosecurity-magazine.com/news/ncsc-warns-aifuelled-vulnerability/</link>
      <description>The UK's National Cyber Security Centre is urging organizations to prepare for glut of new software updates</description>
      <pubDate>Tue, 05 May 2026 09:40:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/ncsc-warns-aifuelled-vulnerability/</guid>
    </item>
    <item>
      <title>Trellix Reveals Unauthorized Access to Source Code</title>
      <link>https://www.infosecurity-magazine.com/news/trellix-reveals-unauthorized/</link>
      <description>Security vendor Trellix has suffered a breach involving unauthorized access</description>
      <pubDate>Tue, 05 May 2026 08:55:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/trellix-reveals-unauthorized/</guid>
    </item>
    <item>
      <title>Small Defense Firms Lack Network Data to Stop Nation-State Hackers, Analyst Says</title>
      <link>https://www.infosecurity-magazine.com/news/small-defense-firms-lack-network/</link>
      <description>Team Cymru’s Stephen Campbell warned that small US defense contractors are not well prepared to face cyber intrusions through edge devices</description>
      <pubDate>Mon, 04 May 2026 12:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/small-defense-firms-lack-network/</guid>
    </item>
    <item>
      <title>OpenAI To Extend Cyber Program to Government Agencies</title>
      <link>https://www.infosecurity-magazine.com/news/openai-extend-cyber-program/</link>
      <description>OpenAI announced its intention to expand the Trusted Access for Cyber program for cyber defenders at the federal, state and local government levels</description>
      <pubDate>Mon, 04 May 2026 08:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/openai-extend-cyber-program/</guid>
    </item>
    <item>
      <title>Anthropic Rolls Out Claude Security for AI Vulnerability Scanning</title>
      <link>https://www.infosecurity-magazine.com/news/anthropic-claude-security-for-ai/</link>
      <description>Claude Security enters public beta, giving enterprises AI driven code scanning with no API integration or custom agents required</description>
      <pubDate>Fri, 01 May 2026 12:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/anthropic-claude-security-for-ai/</guid>
    </item>
    <item>
      <title>Two American Cybersecurity Workers Jailed for BlackCat Ransomware Attacks</title>
      <link>https://www.infosecurity-magazine.com/news/cybersecurity-workers-jailed/</link>
      <description>The cybersecurity workers used their knowledge and skills to conduct ransomware attacks for notorious gang, rather than protect victims against them</description>
      <pubDate>Fri, 01 May 2026 11:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/cybersecurity-workers-jailed/</guid>
    </item>
    <item>
      <title>Nine-Year-Old Zero-Day Flaw in Linux Kernel Discovered by AI-Equipped Security Researcher</title>
      <link>https://www.infosecurity-magazine.com/news/zero-day-2017-linux-kernel/</link>
      <description>A researcher from offensive security firm Theori has found a nine-year-old flaw in the Linux kernel with the help of AI</description>
      <pubDate>Fri, 01 May 2026 10:45:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/zero-day-2017-linux-kernel/</guid>
    </item>
    <item>
      <title>Three Arrested for Hacking Over 610,000 Roblox Accounts</title>
      <link>https://www.infosecurity-magazine.com/news/three-arrested-over-roblox-hacking/</link>
      <description>Suspects accused of distributing malware and selling access to stolen Roblox accounts on Russian marketplaces</description>
      <pubDate>Thu, 30 Apr 2026 16:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/three-arrested-over-roblox-hacking/</guid>
    </item>
    <item>
      <title>Deep#Door Python Backdoor Evades Detection On Windows</title>
      <link>https://www.infosecurity-magazine.com/news/deepdoor-python-backdoor-windows/</link>
      <description>Deep#Door Python RAT uses tunneling and obfuscation to evade detection and steal credentials</description>
      <pubDate>Thu, 30 Apr 2026 15:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/deepdoor-python-backdoor-windows/</guid>
    </item>
    <item>
      <title>CISA and Partners Publish Zero Trust Guidance For OT Security</title>
      <link>https://www.infosecurity-magazine.com/news/zero-trust-guidance-operational/</link>
      <description>A new CISA‑led guide explains how zero‑trust security can be applied to operational technology, balancing cyber defence with safety and system availability</description>
      <pubDate>Thu, 30 Apr 2026 14:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/zero-trust-guidance-operational/</guid>
    </item>
    <item>
      <title>UK: Education Sector Faces Surge in Cyber Breaches Despite Stable National Threat Levels</title>
      <link>https://www.infosecurity-magazine.com/news/uk-education-sector-faces-surge-in/</link>
      <description>The British public education sector has faced the nation’s most dramatic increase in cyber breach prevalence over the past year</description>
      <pubDate>Thu, 30 Apr 2026 13:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/uk-education-sector-faces-surge-in/</guid>
    </item>
    <item>
      <title>Europol Busts Albanian Scam Call Centers in Major Online Fraud Case</title>
      <link>https://www.infosecurity-magazine.com/news/europol-albanian-scam-call-centers/</link>
      <description>European police arrested 10 suspects after dismantling Albanian scam call centers linked to a €50m ($58m) online investment fraud operation</description>
      <pubDate>Thu, 30 Apr 2026 10:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/europol-albanian-scam-call-centers/</guid>
    </item>
    <item>
      <title>Cyber is the Number One Global “People Risk,” Says Marsh</title>
      <link>https://www.infosecurity-magazine.com/news/cyber-number-one-global-people/</link>
      <description>Marsh’s 2026 People Risks survey finds cyber‑related challenges dominate, as cyber‑threat literacy tops risks and cyber and AI skills shortages rise</description>
      <pubDate>Thu, 30 Apr 2026 09:10:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/cyber-number-one-global-people/</guid>
    </item>
    <item>
      <title>Cursor Extension Flaw Exposes Developer API Keys</title>
      <link>https://www.infosecurity-magazine.com/news/cursor-extension-flaw-exposes-api/</link>
      <description>Cursor flaw lets extensions steal API keys and session tokens without user interaction, according to researchers at LayerX</description>
      <pubDate>Wed, 29 Apr 2026 15:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/cursor-extension-flaw-exposes-api/</guid>
    </item>
    <item>
      <title>Malicious npm Dependency Linked to AI Assisted Commit Targets Crypto Wallets</title>
      <link>https://www.infosecurity-magazine.com/news/ai-npm-dependency-targets-crypto/</link>
      <description>Researchers uncover a malicious npm dependency linked to an AI‑assisted code commit that steals sensitive data and exposes crypto wallets</description>
      <pubDate>Wed, 29 Apr 2026 14:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/ai-npm-dependency-targets-crypto/</guid>
    </item>
    <item>
      <title>Researchers Track 2.9 Billion Compromised Credentials </title>
      <link>https://www.infosecurity-magazine.com/news/29-billion-compromised-credentials/</link>
      <description>KELA claims infostealers remained the primary access vector for attacks in 2025</description>
      <pubDate>Wed, 29 Apr 2026 13:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/29-billion-compromised-credentials/</guid>
    </item>
    <item>
      <title>Critical Flaw Turns Vect Ransomware into Data Destroying Wiper</title>
      <link>https://www.infosecurity-magazine.com/news/critical-flaw-vect-ransomware-data/</link>
      <description>The Vect 2.0 ransomware wipes large files instead of merely encrypting them, making recovery impossible – even for the attackers</description>
      <pubDate>Wed, 29 Apr 2026 10:45:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/critical-flaw-vect-ransomware-data/</guid>
    </item>
    <item>
      <title>A Quarter of Healthcare Organizations Report Medical Device Cyber-Attacks</title>
      <link>https://www.infosecurity-magazine.com/news/quarter-healthcare-medical-device/</link>
      <description>RunSafe report reveals most attacks on medical devices disrupt patient care</description>
      <pubDate>Wed, 29 Apr 2026 10:05:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/quarter-healthcare-medical-device/</guid>
    </item>
    <item>
      <title>Medtronic Confirms Data Breach After ShinyHunters Claims</title>
      <link>https://www.infosecurity-magazine.com/news/medtronic-data-breach-shinyhunters/</link>
      <description>Medtronic confirms IT breach as ShinyHunters claims millions of records accesseda</description>
      <pubDate>Tue, 28 Apr 2026 15:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/medtronic-data-breach-shinyhunters/</guid>
    </item>
    <item>
      <title>Ransomware Turf War as 0APT and KryBit Groups Trade Blows</title>
      <link>https://www.infosecurity-magazine.com/news/ransomware-turf-war-0apt-krybit/</link>
      <description>Ransomware groups 0APT and KryBit have doxxed each other online </description>
      <pubDate>Tue, 28 Apr 2026 13:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/ransomware-turf-war-0apt-krybit/</guid>
    </item>
    <item>
      <title>Chinese National Extradited Over Silk Typhoon Cyber Campaign</title>
      <link>https://www.infosecurity-magazine.com/news/chinese-national-extradited-silk/</link>
      <description>Extradition links alleged MSS-directed hacker to  Silk Typhoon and COVID-19 espionage</description>
      <pubDate>Tue, 28 Apr 2026 12:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/chinese-national-extradited-silk/</guid>
    </item>
    <item>
      <title>No Metrics Are Better Than Bad Metrics in the SOC, Says NCSC</title>
      <link>https://www.infosecurity-magazine.com/news/no-metrics-better-bad-metrics-soc/</link>
      <description>The National Cyber Security Centre has warned against measuring SOCs with ticket-based metrics</description>
      <pubDate>Tue, 28 Apr 2026 08:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/no-metrics-better-bad-metrics-soc/</guid>
    </item>
    <item>
      <title>North Korean Hackers Target Crypto Firms with ClickFix and AI-Made Zoom Lures</title>
      <link>https://www.infosecurity-magazine.com/news/bluenoroff-dprk-hackers-target/</link>
      <description>Arctic Wolf attributed this large-scale spear-phishing campaign to BlueNoroff, a financially motivated subgroup of the Lazarus Group</description>
      <pubDate>Tue, 28 Apr 2026 08:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/bluenoroff-dprk-hackers-target/</guid>
    </item>
    <item>
      <title>US Sanctions Target Cambodian Scam Network Leaders</title>
      <link>https://www.infosecurity-magazine.com/news/us-sanctions-cambodian-scam-network/</link>
      <description>US sanctions target Cambodian scam networks tied to crypto fraud and trafficking</description>
      <pubDate>Mon, 27 Apr 2026 15:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/us-sanctions-cambodian-scam-network/</guid>
    </item>
    <item>
      <title>Utilities Tech Supplier Itron Discloses Cyber-Attack, Operations Unaffected</title>
      <link>https://www.infosecurity-magazine.com/news/utilities-tech-supplier-itron/</link>
      <description>Itron confirmed a cyber incident but does not believe it is likely to have a material impact on the company</description>
      <pubDate>Mon, 27 Apr 2026 14:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/utilities-tech-supplier-itron/</guid>
    </item>
    <item>
      <title>Widely Used Browser Extensions Selling User Data</title>
      <link>https://www.infosecurity-magazine.com/news/browser-extensions-sell-user-data/</link>
      <description>Dozens of browser extensions openly sell user data via privacy policy disclosures</description>
      <pubDate>Mon, 27 Apr 2026 13:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/browser-extensions-sell-user-data/</guid>
    </item>
    <item>
      <title>Most Cybersecurity  Professionals Feel Undervalued and Underpaid</title>
      <link>https://www.infosecurity-magazine.com/news/cybersecurity-pros-feel/</link>
      <description>A new report by global technology recruitment firm, Harvey Nash, found that three quarters of cybersecurity staff are pessimistic on pay and half are looking for a new job</description>
      <pubDate>Mon, 27 Apr 2026 11:40:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/cybersecurity-pros-feel/</guid>
    </item>
    <item>
      <title>Researchers Identify Fast16 Sabotage Malware That Pre-Dates Stuxnet</title>
      <link>https://www.infosecurity-magazine.com/news/fast16-sabotage-malware-winds/</link>
      <description>The “fast16” malware may have been used to target Iran’s nuclear program prior to Stuxnet</description>
      <pubDate>Mon, 27 Apr 2026 09:10:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/fast16-sabotage-malware-winds/</guid>
    </item>
    <item>
      <title>BlackFile Group Targets Retail and Hospitality with Vishing Attacks</title>
      <link>https://www.infosecurity-magazine.com/news/blackfile-group-targets-retail/</link>
      <description>Researchers uncover a new data theft and extortion group dubbed “BlackFile”</description>
      <pubDate>Mon, 27 Apr 2026 08:15:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/blackfile-group-targets-retail/</guid>
    </item>
    <item>
      <title>UK Biobank Data Breach: Health Data of 500,000 Listed for Sale in China</title>
      <link>https://www.infosecurity-magazine.com/news/uk-biobank-data-beach-health-data/</link>
      <description>UK government Minister confirms that breached health records of UK Biobank volunteers were up for sale on Chinese ecommerce platforms before being removed</description>
      <pubDate>Fri, 24 Apr 2026 13:25:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/uk-biobank-data-beach-health-data/</guid>
    </item>
    <item>
      <title>AI Rush is Reviving Old Cybersecurity Mistakes, Mandiant VP Warns</title>
      <link>https://www.infosecurity-magazine.com/news/ai-old-cybersecurity-mistakes/</link>
      <description>AI tools are not just creating new vulnerabilities, they are reviving old security failures, warned Jurgen Kutscher, VP of Mandiant Consulting</description>
      <pubDate>Fri, 24 Apr 2026 12:10:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/ai-old-cybersecurity-mistakes/</guid>
    </item>
    <item>
      <title>Npm Supply Chain Malware Attack Targets Developers With Worm-Like Propagation</title>
      <link>https://www.infosecurity-magazine.com/news/npm-supply-chain-worm-canister/</link>
      <description>Malicious npm packages spread via worm-like propagation and steal developer credentials</description>
      <pubDate>Fri, 24 Apr 2026 08:10:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/npm-supply-chain-worm-canister/</guid>
    </item>
    <item>
      <title> Google Favors General-Purpose Gemini Models Over Cybersecurity‑Specific AI</title>
      <link>https://www.infosecurity-magazine.com/news/google-gemini-over-cyber-specific/</link>
      <description>Google Cloud’s COO advocated for combining general-purpose frontier large language models with task-specific AI agents </description>
      <pubDate>Thu, 23 Apr 2026 16:40:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/google-gemini-over-cyber-specific/</guid>
    </item>
    <item>
      <title>Apple Fixes iOS Notification Bug Exposing Deleted Messages</title>
      <link>https://www.infosecurity-magazine.com/news/apple-ios-notification-bug-deleted/</link>
      <description>Apple patches iOS flaw that retained deleted notifications, exposing message data</description>
      <pubDate>Thu, 23 Apr 2026 13:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/apple-ios-notification-bug-deleted/</guid>
    </item>
    <item>
      <title>Google Introduces Unique AI Agent Identities in New Gemini Enterprise Platform</title>
      <link>https://www.infosecurity-magazine.com/news/google-ai-agent-identities-gemini/</link>
      <description>Google Cloud will attribute a unique cryptographic ID every AI agent that will be tied to “traceable and auditable” authorization policies</description>
      <pubDate>Thu, 23 Apr 2026 12:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/google-ai-agent-identities-gemini/</guid>
    </item>
    <item>
      <title>Cyber-Attacks Surge 63% Annually in Education Sector </title>
      <link>https://www.infosecurity-magazine.com/news/cyberattacks-surge-63-annually/</link>
      <description>Quorum Cyber report finds higher and further education institutions experienced 63% increase in attacks over a year</description>
      <pubDate>Thu, 23 Apr 2026 10:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/cyberattacks-surge-63-annually/</guid>
    </item>
    <item>
      <title>Researchers Uncover 10 In-the-Wild Prompt Injection Payloads Targeting AI Agents</title>
      <link>https://www.infosecurity-magazine.com/news/researchers-10-wild-indirect/</link>
      <description>Forcepoint has found 10 new indirect prompt injection attacks targeting AI agents</description>
      <pubDate>Thu, 23 Apr 2026 09:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/researchers-10-wild-indirect/</guid>
    </item>
    <item>
      <title>NCSC Backs Passkeys, Hailing a New Era of Sign-in </title>
      <link>https://www.infosecurity-magazine.com/news/ncsc-backs-passkeys-new-era-of/</link>
      <description>The UK’s NCSC has fully backed passkeys as consumers’ first choice for login, citing progress with FIDO and successful use across the NHS</description>
      <pubDate>Thu, 23 Apr 2026 08:45:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/ncsc-backs-passkeys-new-era-of/</guid>
    </item>
    <item>
      <title>MacOS Native Tools Enable Stealthy Enterprise Attacks</title>
      <link>https://www.infosecurity-magazine.com/news/macos-lotl-techniques-enterprise/</link>
      <description>macOS LOTL techniques bypass detection using native tools and metadata abuse</description>
      <pubDate>Wed, 22 Apr 2026 16:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/macos-lotl-techniques-enterprise/</guid>
    </item>
    <item>
      <title>NCSC Unveils SilentGlass, a Plug-In Device to Protect Monitors from Cyber-Attacks</title>
      <link>https://www.infosecurity-magazine.com/news/ncsc-silentglass-a-plugin-stop/</link>
      <description>The UK’s cybersecurity agency said the devices will be available for purchase by organizations around the world</description>
      <pubDate>Wed, 22 Apr 2026 15:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/ncsc-silentglass-a-plugin-stop/</guid>
    </item>
    <item>
      <title>UK Commits £90m for Cybersecurity and Pushes for ‘Resilience Pledge’</title>
      <link>https://www.infosecurity-magazine.com/news/uk-pledges-90m-for-cybersecurity/</link>
      <description>UK unveils £90m cybersecurity funding at CYBERUK to boost SME resilience, promote Cyber Essentials and a new Cyber Resilience Pledge, sparking industry debate</description>
      <pubDate>Wed, 22 Apr 2026 14:10:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/uk-pledges-90m-for-cybersecurity/</guid>
    </item>
    <item>
      <title>Surge in Silent Subject Phishing Attacks Targets VIP Users</title>
      <link>https://www.infosecurity-magazine.com/news/silent-subject-phishing-campaigns/</link>
      <description>Null subject phishing campaigns bypass filters and target VIPs with QR code and RMM abuse</description>
      <pubDate>Wed, 22 Apr 2026 13:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/silent-subject-phishing-campaigns/</guid>
    </item>
    <item>
      <title>Former Ransomware Negotiator Pleads Guilty to Working For BlackCat Cyber Gang</title>
      <link>https://www.infosecurity-magazine.com/news/former-ransomware-negotiator/</link>
      <description>A former ransomware negotiator has pleaded guilty to abusing his position by working with noted cybercrime group BlackCat</description>
      <pubDate>Wed, 22 Apr 2026 11:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/former-ransomware-negotiator/</guid>
    </item>
    <item>
      <title>Researchers Uncover ProxySmart Software Powering 90+ SIM Farms</title>
      <link>https://www.infosecurity-magazine.com/news/researchers-proxysmart-software-90/</link>
      <description>Infrawatch says ProxySmart platform enables SIM farm activity at “industrial scale”</description>
      <pubDate>Wed, 22 Apr 2026 10:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/researchers-proxysmart-software-90/</guid>
    </item>
    <item>
      <title>UK Faces a Cyber ‘Perfect Storm’ Driven by Tech Advances and Nation State Threats, NCSC Warns</title>
      <link>https://www.infosecurity-magazine.com/news/uk-faces-a-cyber-perfect-storm-ncsc/</link>
      <description>The convergence of global tensions and rapid technological change is driving a new era of cyber risk, the NCSC warns</description>
      <pubDate>Wed, 22 Apr 2026 08:07:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/uk-faces-a-cyber-perfect-storm-ncsc/</guid>
    </item>
    <item>
      <title>Trojanized Android App Fuels New Wave of NFC Fraud</title>
      <link>https://www.infosecurity-magazine.com/news/trojanized-android-handle-nfc/</link>
      <description>NGate malware abuses HandyPay app to steal NFC card data and PINs in Brazil</description>
      <pubDate>Tue, 21 Apr 2026 16:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/trojanized-android-handle-nfc/</guid>
    </item>
    <item>
      <title>The Gentlemen Ransomware Expands With Rapid Affiliate Growth</title>
      <link>https://www.infosecurity-magazine.com/news/gentlemen-ransomware-rapid/</link>
      <description>Gentlemen RaaS expands quickly with multi-platform attacks and SystemBC-linked infections</description>
      <pubDate>Tue, 21 Apr 2026 14:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/gentlemen-ransomware-rapid/</guid>
    </item>
    <item>
      <title>Unchecked AI Agents Cause Cybersecurity Incidents at Two Thirds of Firms </title>
      <link>https://www.infosecurity-magazine.com/news/unchecked-ai-agents-cause/</link>
      <description>Data exposure, operational disruption and financial losses among issues faced by businesses struggling with the rapid rise of AI agents, warns Cloud Security Alliance report </description>
      <pubDate>Tue, 21 Apr 2026 13:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/unchecked-ai-agents-cause/</guid>
    </item>
    <item>
      <title>Vercel Confirms Cyber Incident After Sophisticated Attacker Exploits Third‑Party Tool</title>
      <link>https://www.infosecurity-magazine.com/news/vercel-cyber-incident-threat-actor/</link>
      <description>Cloud app developer Vercel appears to have suffered a security breach</description>
      <pubDate>Tue, 21 Apr 2026 09:10:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/vercel-cyber-incident-threat-actor/</guid>
    </item>
    <item>
      <title>North Korea Blamed for $290m KelpDAO Crypto Heist </title>
      <link>https://www.infosecurity-magazine.com/news/north-korean-blamed-290m-kelpdao/</link>
      <description>North Korea’s Lazarus Group is pegged for a $290m crypto theft at KelpDAO</description>
      <pubDate>Tue, 21 Apr 2026 08:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/north-korean-blamed-290m-kelpdao/</guid>
    </item>
    <item>
      <title>ZionSiphon Malware Targets Water Infrastructure Systems</title>
      <link>https://www.infosecurity-magazine.com/news/zionsiphon-malware-water/</link>
      <description>ZionSiphon malware targets OT water systems with sabotage and ICS scanning capabilities</description>
      <pubDate>Mon, 20 Apr 2026 16:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/zionsiphon-malware-water/</guid>
    </item>
    <item>
      <title>Formbook Malware Campaign Uses Multiple Obfuscation Techniques to Avoid Detection</title>
      <link>https://www.infosecurity-magazine.com/news/formbook-malware-multiple/</link>
      <description>Formbook attacks use combination of DLL Side-Loading and Obfuscated JavaScript to stay hidden, researchers at WatchGuard have uncovered</description>
      <pubDate>Mon, 20 Apr 2026 15:01:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/formbook-malware-multiple/</guid>
    </item>
    <item>
      <title>Attackers Exploit DVR Command Injection Flaw to Deploy  Mirai-Based Botnet</title>
      <link>https://www.infosecurity-magazine.com/news/mirai-variant-dvr-flaw-iot-botnet/</link>
      <description>FortiGuard Labs has identified a Mirai-based Nexcorium campaign actively exploiting CVE-2024-3721 in TBK DVR devices</description>
      <pubDate>Mon, 20 Apr 2026 13:01:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/mirai-variant-dvr-flaw-iot-botnet/</guid>
    </item>
    <item>
      <title>NCSC Outlines Coordinated Plan to Boost NHS Cyber Resilience</title>
      <link>https://www.infosecurity-magazine.com/news/ncsc-plan-boost-nhs-cyber/</link>
      <description>The National Cyber Security Centre has shared an update of its resilience-building efforts for the NHS</description>
      <pubDate>Mon, 20 Apr 2026 09:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/ncsc-plan-boost-nhs-cyber/</guid>
    </item>
    <item>
      <title>Crypto Exchange Grinex Blames Western Spies for $13m Theft</title>
      <link>https://www.infosecurity-magazine.com/news/crypto-exchange-grinex-western/</link>
      <description>Russian crypto-exchange Grinex claims Western intelligence agencies were behind a $13m heist</description>
      <pubDate>Mon, 20 Apr 2026 09:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/crypto-exchange-grinex-western/</guid>
    </item>
    <item>
      <title>Commercial AI Models Show Rapid Gains in Vulnerability Research </title>
      <link>https://www.infosecurity-magazine.com/news/ai-models-rapid-gains/</link>
      <description>AI models are making rapid gains in vulnerability research and exploit development, raising new cybersecurity risks, a Forescout study finds</description>
      <pubDate>Fri, 17 Apr 2026 13:20:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/ai-models-rapid-gains/</guid>
    </item>
    <item>
      <title>DDoS-For-Hire Services Disrupted by International Police Action in ‘Operation PowerOff’</title>
      <link>https://www.infosecurity-magazine.com/news/ddos-services-hit-by-police/</link>
      <description>Coordinated action by FBI, Europol and others seizes infrastructure, makes arrests – and sends warning letters to known DDoS service users</description>
      <pubDate>Fri, 17 Apr 2026 11:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/ddos-services-hit-by-police/</guid>
    </item>
    <item>
      <title>US Nationals Jailed for Operating Fake Remote Worker Laptop Farms for North Korea</title>
      <link>https://www.infosecurity-magazine.com/news/us-nationals-jailed-north-korea/</link>
      <description>US authorities jail two Americans for aiding North Korean laptop farm scams that infiltrated over 100 firms</description>
      <pubDate>Thu, 16 Apr 2026 16:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/us-nationals-jailed-north-korea/</guid>
    </item>
    <item>
      <title>APK Malformation Found in Thousands of Android Malware Samples</title>
      <link>https://www.infosecurity-magazine.com/news/apk-malformation-android-malware/</link>
      <description>APK malformation tactic now appears in over 3000 Android malware samples evading static analysis</description>
      <pubDate>Thu, 16 Apr 2026 15:45:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/apk-malformation-android-malware/</guid>
    </item>
    <item>
      <title>Cookeville Medical Center Notifies Patients After July 2025 Ransomware Attack</title>
      <link>https://www.infosecurity-magazine.com/news/cookeville-medical-center-data/</link>
      <description>Tennessee's CRMC notifies over 337,000 patients of Rhysida ransomware breach exposing sensitive data</description>
      <pubDate>Thu, 16 Apr 2026 15:01:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/cookeville-medical-center-data/</guid>
    </item>
    <item>
      <title>NIST Drops NVD Enrichment for Pre-March 2026 Vulnerabilities</title>
      <link>https://www.infosecurity-magazine.com/news/nvd-enrichment-premarch-2026/</link>
      <description>NIST’s National Vulnerability Database will now prioritize enriching new and exploited flaws to address the record growth of reported CVEs</description>
      <pubDate>Thu, 16 Apr 2026 12:43:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/nvd-enrichment-premarch-2026/</guid>
    </item>
    <item>
      <title>Systemic Flaw in MCP Protocol Could Expose 150 Million Downloads</title>
      <link>https://www.infosecurity-magazine.com/news/systemic-flaw-mcp-expose-150/</link>
      <description>Ox Security claims as many as 200,000 servers are exposed by newly discovered MCP vulnerability </description>
      <pubDate>Thu, 16 Apr 2026 09:40:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/systemic-flaw-mcp-expose-150/</guid>
    </item>
    <item>
      <title>Automotive Ransomware Attacks Double in a Year</title>
      <link>https://www.infosecurity-magazine.com/news/automotive-ransomware-attacks/</link>
      <description>Halcyon says ransomware now accounts for more than two-fifths of cyber-attacks targeting carmakers</description>
      <pubDate>Thu, 16 Apr 2026 08:35:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/automotive-ransomware-attacks/</guid>
    </item>
    <item>
      <title>OpenAI Unveils GPT-5.4-Cyber for Improving Cyber Defense With AI</title>
      <link>https://www.infosecurity-magazine.com/news/openai-unveils-gpt-54-cyber-defense/</link>
      <description>OpenAI’s new frontier model focused on cybersecurity comes following Anthropic’s launch of Claude Mythos Preview and Project Glasswing </description>
      <pubDate>Wed, 15 Apr 2026 16:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/openai-unveils-gpt-54-cyber-defense/</guid>
    </item>
    <item>
      <title>European Cybersecurity Agency ENISA Seeks Top-Tier Status in CVE Program</title>
      <link>https://www.infosecurity-magazine.com/news/enisa-europe-seeks-top-level-root/</link>
      <description>The EU cybersecurity agency looks to become the third Top-Level Root CVE Numbering Authority, alongside CISA and MITRE</description>
      <pubDate>Wed, 15 Apr 2026 15:31:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/enisa-europe-seeks-top-level-root/</guid>
    </item>
    <item>
      <title>Signed Adware Operation Disables Antivirus Across 23,000 Hosts</title>
      <link>https://www.infosecurity-magazine.com/news/dragon-boss-adware-disables/</link>
      <description>Huntress uncovers adware deploying AV-killing payloads via signed updates across 23,000 endpoints</description>
      <pubDate>Wed, 15 Apr 2026 14:40:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/dragon-boss-adware-disables/</guid>
    </item>
    <item>
      <title>Critical Nginx-ui MCP Flaw Actively Exploited in the Wild</title>
      <link>https://www.infosecurity-magazine.com/news/nginx-ui-mcp-flaw-actively/</link>
      <description>Critical nginx-ui MCP authentication bypass CVE-2026-33032 actively exploited with CVSS 9.8</description>
      <pubDate>Wed, 15 Apr 2026 13:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/nginx-ui-mcp-flaw-actively/</guid>
    </item>
    <item>
      <title>AI Companies to Play Bigger Role in CVE Program, Says CISA</title>
      <link>https://www.infosecurity-magazine.com/news/ai-companies-to-play-bigger-role/</link>
      <description>At VulnCon, Lindsey Cerkovnik, head of vulnerability management at CISA, said AI companies should play a bigger role in vulnerability disclosures in the future</description>
      <pubDate>Wed, 15 Apr 2026 10:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/ai-companies-to-play-bigger-role/</guid>
    </item>
    <item>
      <title>Researchers Spot Surge in Brute-Force Attacks from Middle East</title>
      <link>https://www.infosecurity-magazine.com/news/researchers-surge-bruteforce/</link>
      <description>Barracuda says 88% of brute-force attempts in Q1 were from the region</description>
      <pubDate>Wed, 15 Apr 2026 09:45:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/researchers-surge-bruteforce/</guid>
    </item>
    <item>
      <title>Microsoft Fixes Two Zero-Days in April Patch Tuesday</title>
      <link>https://www.infosecurity-magazine.com/news/microsoft-two-zerodays-april-patch/</link>
      <description>Microsoft has patched two zero-day flaws and over 160 others</description>
      <pubDate>Wed, 15 Apr 2026 09:10:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/microsoft-two-zerodays-april-patch/</guid>
    </item>
    <item>
      <title>CISOs Urged to Innovate with Talent Retention as Job Satisfaction Declines</title>
      <link>https://www.infosecurity-magazine.com/news/cisos-innovate-talent-retention/</link>
      <description>A new IANS report claims just 34% of cybersecurity professionals plan to stay put in the next 12 months</description>
      <pubDate>Tue, 14 Apr 2026 13:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/cisos-innovate-talent-retention/</guid>
    </item>
    <item>
      <title>Triad Nexus Expands Global Fraud Operations Despite US Sanctions</title>
      <link>https://www.infosecurity-magazine.com/news/triad-nexus-expands-fraud/</link>
      <description>Triad Nexus scales $200m scams, uses infrastructure laundering, localized fraud and US-access blocks</description>
      <pubDate>Tue, 14 Apr 2026 12:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/triad-nexus-expands-fraud/</guid>
    </item>
    <item>
      <title>Malicious Chrome Extensions Campaign Exposes User Data</title>
      <link>https://www.infosecurity-magazine.com/news/chrome-extensions-expose-user-data/</link>
      <description>108 malicious Chrome extensions steal sessions, Google data, inject ads via single C2 infrastructure</description>
      <pubDate>Tue, 14 Apr 2026 11:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/chrome-extensions-expose-user-data/</guid>
    </item>
    <item>
      <title>AI Security Institute Advocates Security Best Practices After Mythos Test</title>
      <link>https://www.infosecurity-magazine.com/news/ai-security-institute-best/</link>
      <description>The AISI has issued its judgement on Anthropic’s Mythos Preview model</description>
      <pubDate>Tue, 14 Apr 2026 09:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/ai-security-institute-best/</guid>
    </item>
    <item>
      <title>Mailbox Rule Abuse Emerges as Stealthy Post-Compromise Threat</title>
      <link>https://www.infosecurity-magazine.com/news/mailbox-rule-abuse-stealthy-post/</link>
      <description>Attackers are abusing Microsoft 365 mailbox rules to hide activity, exfiltrate data and retain access after account compromise, researchers warn</description>
      <pubDate>Mon, 13 Apr 2026 15:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/mailbox-rule-abuse-stealthy-post/</guid>
    </item>
    <item>
      <title>Mirax Android Trojan Turns Devices Into Residential Proxy Nodes</title>
      <link>https://www.infosecurity-magazine.com/news/mirax-trojan-devices-proxy-nodes/</link>
      <description>Security researchers warn of Mirax, an emerging Android banking trojan using MaaS, remote access and residential proxies to target European users</description>
      <pubDate>Mon, 13 Apr 2026 14:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/mirax-trojan-devices-proxy-nodes/</guid>
    </item>
    <item>
      <title>FBI Dismantles $20m Phishing Operation W3LL</title>
      <link>https://www.infosecurity-magazine.com/news/fbi-dismantles-phishing-operation/</link>
      <description>The W3LL phishing kit has been associated with fraud attempts totaling $20m</description>
      <pubDate>Mon, 13 Apr 2026 10:35:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/fbi-dismantles-phishing-operation/</guid>
    </item>
    <item>
      <title>UK Cyber Security Council Launches Associate Cyber Security Professional Title</title>
      <link>https://www.infosecurity-magazine.com/news/associate-cyber-professional-title/</link>
      <description>The UK Cyber Security Council has unveiled a new Associate Cyber Security Professional title aimed at supporting early‑career cybersecurity professionals</description>
      <pubDate>Mon, 13 Apr 2026 09:15:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/associate-cyber-professional-title/</guid>
    </item>
    <item>
      <title>Operation Atlantic Seizes $12m in Crypto Losses</title>
      <link>https://www.infosecurity-magazine.com/news/operation-atlantic-seizes-12m/</link>
      <description>UK, US and Canadian authorities have identified over 20,000 victims of approval phishing scams that trick users into handing over full crypto wallet access</description>
      <pubDate>Mon, 13 Apr 2026 08:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/operation-atlantic-seizes-12m/</guid>
    </item>
    <item>
      <title>Just Three Ransomware Gangs Accounted for 40% of Attacks Last Month</title>
      <link>https://www.infosecurity-magazine.com/news/three-ransomware-gangs-40-percent/</link>
      <description>Qilin, Akira and Dragonforce were responsible for 40% of 672 ransomware incidents reported in March, says Check Point</description>
      <pubDate>Fri, 10 Apr 2026 12:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/three-ransomware-gangs-40-percent/</guid>
    </item>
    <item>
      <title>Google Chrome Rolls Out Protection Against Infostealers Targeting Session Cookies</title>
      <link>https://www.infosecurity-magazine.com/news/google-chrome-protection/</link>
      <description>Chrome’s Device Bound Session Credentials is designed to block infostealers from harvesting session cookie</description>
      <pubDate>Fri, 10 Apr 2026 11:25:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/google-chrome-protection/</guid>
    </item>
    <item>
      <title>STX RAT Targets Finance Sector With Advanced Stealth Tactics</title>
      <link>https://www.infosecurity-magazine.com/news/stx-rat-targets-finance-sector/</link>
      <description>STX RAT, a newly identified remote access trojan, attempted deployment in finance, showing advanced C2 and stealthy delivery methods</description>
      <pubDate>Thu, 09 Apr 2026 15:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/stx-rat-targets-finance-sector/</guid>
    </item>
    <item>
      <title>Bitcoin Depot Reports $3.6m Crypto Theft After System Breach</title>
      <link>https://www.infosecurity-magazine.com/news/bitcoin-depot-dollar36m-crypto/</link>
      <description>Bitcoin Depot has disclosed a cyber-attack that led to the theft of more than 50 Bitcoin, worth $3.66m, after hackers accessed its internal systems</description>
      <pubDate>Thu, 09 Apr 2026 14:01:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/bitcoin-depot-dollar36m-crypto/</guid>
    </item>
    <item>
      <title>Atomic Stealer MacOS ClickFix Attack Bypasses Apple Security Warnings</title>
      <link>https://www.infosecurity-magazine.com/news/atomic-stealer-macos-clickfix/</link>
      <description>macOS 26.4 update introduced security warnings into Terminal to prevent ClickFix attacks, so attackers have shifted to Script Editor instead</description>
      <pubDate>Thu, 09 Apr 2026 11:20:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/atomic-stealer-macos-clickfix/</guid>
    </item>
    <item>
      <title>Middle East Hack-for-Hire Operation Traced to South Asian Cyber Espionage Group</title>
      <link>https://www.infosecurity-magazine.com/news/middle-east-hack-operation-bitter/</link>
      <description>A spear-phishing campaign which spread across the Middle East between 2023 and 2024 has now been linked to Bitter APT group</description>
      <pubDate>Thu, 09 Apr 2026 10:45:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/middle-east-hack-operation-bitter/</guid>
    </item>
    <item>
      <title>Governance Gaps Emerge as AI Agents Drive 76% Increase in NHIs</title>
      <link>https://www.infosecurity-magazine.com/news/governance-gaps-agents-76-increase/</link>
      <description>SANS Institute reveals that AI agents are behind a 76% surge in non-human identities</description>
      <pubDate>Thu, 09 Apr 2026 10:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/governance-gaps-agents-76-increase/</guid>
    </item>
    <item>
      <title>Google Warns of New Threat Group Targeting BPOs and Helpdesks</title>
      <link>https://www.infosecurity-magazine.com/news/google-warns-group-targeting-bpos/</link>
      <description>Google’s threat intel team warns UNC6783, a new extortion group possibly linked to the “Raccoon” persona, is targeting BPOs and enterprises</description>
      <pubDate>Thu, 09 Apr 2026 08:35:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/google-warns-group-targeting-bpos/</guid>
    </item>
    <item>
      <title>Google API Keys Quietly Gain Access to Gemini on Android Devices</title>
      <link>https://www.infosecurity-magazine.com/news/google-api-keys-access-gemini/</link>
      <description>Google API key flaw exposes mobile apps to Gemini AI access, private files and billing risks</description>
      <pubDate>Wed, 08 Apr 2026 16:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/google-api-keys-access-gemini/</guid>
    </item>
    <item>
      <title>Critical Vulnerability in Ninja Forms Exposes WordPress Sites</title>
      <link>https://www.infosecurity-magazine.com/news/flaw-ninja-forms-wordpress/</link>
      <description>Ninja Forms File Upload RCE via unauthenticated arbitrary file upload; update to 3.3.27 immediately</description>
      <pubDate>Wed, 08 Apr 2026 15:10:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/flaw-ninja-forms-wordpress/</guid>
    </item>
    <item>
      <title>Anthropic Launches Project Glasswing to Use AI to Find and Fix Critical Software Vulnerabilities</title>
      <link>https://www.infosecurity-magazine.com/news/anthropic-launch-project-glasswing/</link>
      <description>Anthropic launches Project Glasswing, using its Claude Mythos Preview AI to autonomously identify and fix undiscovered vulnerabilities in critical software</description>
      <pubDate>Wed, 08 Apr 2026 11:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/anthropic-launch-project-glasswing/</guid>
    </item>
    <item>
      <title>US Thwarts DNS Hijacking Network Controlled by Russian APT28 Hackers</title>
      <link>https://www.infosecurity-magazine.com/news/us-thwarts-dns-hijacking-network/</link>
      <description>The FBI deployed a method to unplug US-based routers compromised by APT28 from the threat actor’s malicious network</description>
      <pubDate>Wed, 08 Apr 2026 10:03:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/us-thwarts-dns-hijacking-network/</guid>
    </item>
    <item>
      <title>Claude Discovers Apache ActiveMQ Bug Hidden for 13 Years</title>
      <link>https://www.infosecurity-magazine.com/news/claude-apache-activemq-bug-hidden/</link>
      <description>Anthropic’s Claude AI has helped researchers find a vulnerability in Apache ActiveMQ Classic</description>
      <pubDate>Wed, 08 Apr 2026 09:15:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/claude-apache-activemq-bug-hidden/</guid>
    </item>
    <item>
      <title>Iran‑Backed Threat Actors Hit US CNI Providers via Internet‑Facing OT Assets</title>
      <link>https://www.infosecurity-magazine.com/news/iranbacked-hackers-cni-ot-assets/</link>
      <description>CISA has revealed Iranian attacks causing disruption and financial loss at US critical infrastructure firms</description>
      <pubDate>Wed, 08 Apr 2026 08:15:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/iranbacked-hackers-cni-ot-assets/</guid>
    </item>
    <item>
      <title>Russian APT28 Hackers Hijack Routers to Steal Credentials, UK Security Agency Warns</title>
      <link>https://www.infosecurity-magazine.com/news/russia-apt28-hijack-routers-uk-ncsc/</link>
      <description>Newly identified malicious campaigns are linked to virtual private servers modified by APT28 to operate as malicious DNS servers</description>
      <pubDate>Tue, 07 Apr 2026 15:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/russia-apt28-hijack-routers-uk-ncsc/</guid>
    </item>
    <item>
      <title>GPU Rowhammer Attack Enables Privilege Escalation and Full System Compromise</title>
      <link>https://www.infosecurity-magazine.com/news/gpu-based-rowhammer-attack/</link>
      <description>GPUBreach uses GPU Rowhammer on GDDR6 to flip bits, corrupt page tables and escalate to system root</description>
      <pubDate>Tue, 07 Apr 2026 15:05:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/gpu-based-rowhammer-attack/</guid>
    </item>
    <item>
      <title>GrafanaGhost Exploit Bypasses AI Guardrails for Silent Data Exfiltration</title>
      <link>https://www.infosecurity-magazine.com/news/grafanaghost-silent-data/</link>
      <description>GrafanaGhost chains AI prompt injection and URL flaws to exfiltrate sensitive Grafana data</description>
      <pubDate>Tue, 07 Apr 2026 14:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/grafanaghost-silent-data/</guid>
    </item>
    <item>
      <title>Over $17bn Lost to Cyber Fraud in the Last Year, Warns FBI</title>
      <link>https://www.infosecurity-magazine.com/news/17bn-lost-to-cyber-fraud-warns-fbi/</link>
      <description>Cryptocurrency scams alone cost victims over $7 billion, while AI-enabled fraud threats are on the rise, says FBI</description>
      <pubDate>Tue, 07 Apr 2026 12:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/17bn-lost-to-cyber-fraud-warns-fbi/</guid>
    </item>
    <item>
      <title>Storm-1175 Exploits Flaws in High-Velocity Medusa Attacks</title>
      <link>https://www.infosecurity-magazine.com/news/storm1175-medusa-attacks/</link>
      <description>Microsoft has released a new report about the Storm-1175 group and its connection to Medusa ransomware</description>
      <pubDate>Tue, 07 Apr 2026 10:02:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/storm1175-medusa-attacks/</guid>
    </item>
    <item>
      <title>Fortinet Releases Emergency Patch After FortiClient EMS Bug Is Exploited</title>
      <link>https://www.infosecurity-magazine.com/news/fortinet-emergency-patch-ems-bug/</link>
      <description>Fortinet has updated its FortiClient EMS product after zero-day attacks surfaced </description>
      <pubDate>Tue, 07 Apr 2026 09:26:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/fortinet-emergency-patch-ems-bug/</guid>
    </item>
    <item>
      <title>New Phishing Platform Used in Credential Theft Campaigns Against C-Suite Execs</title>
      <link>https://www.infosecurity-magazine.com/news/new-phishing-platform-credential/</link>
      <description>A large-scale credential theft campaign targeting senior executives has been linked to a previously unknown automated phishing platform called Venom</description>
      <pubDate>Fri, 03 Apr 2026 08:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/new-phishing-platform-credential/</guid>
    </item>
    <item>
      <title>New 'Storm' Infostealer Remotely Decrypts Stolen Credentials</title>
      <link>https://www.infosecurity-magazine.com/news/storm-infostealer-remotely/</link>
      <description>This modern infostealer adopted server-side decryption of stolen credentials to bypass security controls</description>
      <pubDate>Thu, 02 Apr 2026 15:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/storm-infostealer-remotely/</guid>
    </item>
    <item>
      <title>NCSC Issues Security Alert Over Hackers Targeting WhatsApp and Signal Accounts</title>
      <link>https://www.infosecurity-magazine.com/news/ncsc-alert-hackers-whatsapp-signal/</link>
      <description>The UK’s cybersecurity agency offered advice to “high-risk’ individuals” on how to protect against social engineering and cyber-attacks</description>
      <pubDate>Thu, 02 Apr 2026 14:15:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/ncsc-alert-hackers-whatsapp-signal/</guid>
    </item>
    <item>
      <title>Apple Expands iOS 18 Security Updates Amid DarkSword Threat</title>
      <link>https://www.infosecurity-magazine.com/news/apple-ios-18-updates-darksword/</link>
      <description>iOS/iPadOS 18.7.7 updates expanded to protect older devices from DarkSword web exploit kit</description>
      <pubDate>Thu, 02 Apr 2026 13:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/apple-ios-18-updates-darksword/</guid>
    </item>
    <item>
      <title>Researchers Observe Sub-One-Hour Ransomware Attacks</title>
      <link>https://www.infosecurity-magazine.com/news/researchers-subonehour-ransomware/</link>
      <description>Halcyon says Akira is now capable of carrying out an entire ransomware attack in less than an hour</description>
      <pubDate>Thu, 02 Apr 2026 13:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/researchers-subonehour-ransomware/</guid>
    </item>
    <item>
      <title>GitHub Used as Covert Channel in Multi-Stage Malware Campaign</title>
      <link>https://www.infosecurity-magazine.com/news/github-covert-multi-stage-malware/</link>
      <description>LNK files use GitHub C2, embedded decoders and PowerShell for persistence and data exfiltration</description>
      <pubDate>Thu, 02 Apr 2026 13:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/github-covert-multi-stage-malware/</guid>
    </item>
    <item>
      <title>Most CNI Firms Face Up to £5m in Downtime from OT Attacks</title>
      <link>https://www.infosecurity-magazine.com/news/most-cni-firms-5m-downtime-ot/</link>
      <description>E2e-assure says 80% of critical infrastructure providers could face millions in downtime from cyber-attacks</description>
      <pubDate>Thu, 02 Apr 2026 08:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/most-cni-firms-5m-downtime-ot/</guid>
    </item>
    <item>
      <title>Google Introduces Android Dev Verification Amid Openness Debate</title>
      <link>https://www.infosecurity-magazine.com/news/google-android-dev-verification/</link>
      <description>Android requires dev identity verification for sideloaded apps; phased global rollout from September</description>
      <pubDate>Wed, 01 Apr 2026 15:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/google-android-dev-verification/</guid>
    </item>
    <item>
      <title>New Venom Stealer MaaS Platform Automates Continuous Data Theft</title>
      <link>https://www.infosecurity-magazine.com/news/venom-stealer-maas-automates-data/</link>
      <description>Venom Stealer malware-as-a-service automates ClickFix social engineering, credential and crypto exfiltration</description>
      <pubDate>Wed, 01 Apr 2026 13:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/venom-stealer-maas-automates-data/</guid>
    </item>
    <item>
      <title>Chinese Hackers Target European Governments in Espionage Campaigns</title>
      <link>https://www.infosecurity-magazine.com/news/china-hackers-ta416-europe/</link>
      <description>Chinese state-backed group TA416 had suspended its cyber espionage operations in Europe since 2023, noted Proofpoint</description>
      <pubDate>Wed, 01 Apr 2026 12:05:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/china-hackers-ta416-europe/</guid>
    </item>
    <item>
      <title>Eight in 10 UK Manufacturers Hit by Cyber Incident in a Year</title>
      <link>https://www.infosecurity-magazine.com/news/eight-10-uk-manufacturers-hit/</link>
      <description>Most UK manufacturers compromised last year suffered financial loss, says ESET</description>
      <pubDate>Wed, 01 Apr 2026 09:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/eight-10-uk-manufacturers-hit/</guid>
    </item>
    <item>
      <title>Hackers Hijack Axios npm Package to Spread RATs</title>
      <link>https://www.infosecurity-magazine.com/news/hackers-hijack-axios-npm-package/</link>
      <description>Threat actors hijacked the popular npm package axios to spread RAT malware after compromising an open‑source maintainer’s account, researchers warn</description>
      <pubDate>Wed, 01 Apr 2026 09:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/hackers-hijack-axios-npm-package/</guid>
    </item>
    <item>
      <title>Maryland Man Charged Over $53m Uranium Finance Crypto Hack</title>
      <link>https://www.infosecurity-magazine.com/news/man-charged-uranium-crypto-hack/</link>
      <description>Maryland man accused of $53m Uranium Finance hack, exploited smart contract flaws, laundered funds</description>
      <pubDate>Tue, 31 Mar 2026 15:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/man-charged-uranium-crypto-hack/</guid>
    </item>
    <item>
      <title>Phantom Project Bundles Infostealer, Crypter and RAT For Sale</title>
      <link>https://www.infosecurity-magazine.com/news/phantom-project-infostealer-nov-25/</link>
      <description>Phantom Stealer .NET harvests browser credentials, cookies, cards, sessions, as stealer-as-a-service</description>
      <pubDate>Tue, 31 Mar 2026 14:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/phantom-project-infostealer-nov-25/</guid>
    </item>
    <item>
      <title>ChatGPT Security Issue Enabled Data Theft via Single Prompt</title>
      <link>https://www.infosecurity-magazine.com/news/chatgpt-security-issue-steal-data/</link>
      <description>OpenAI has patched vulnerability, which Check Point said was because of a DNS loophole
</description>
      <pubDate>Tue, 31 Mar 2026 13:01:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/chatgpt-security-issue-steal-data/</guid>
    </item>
    <item>
      <title>TeamPCP Explores Ways to Exploit Stolen Supply Chain Secrets</title>
      <link>https://www.infosecurity-magazine.com/news/teampcp-exploit-stolen-supply/</link>
      <description>TeamPCP is exploring ways to monetize the secrets harvested during supply chain attacks, with identified ties to the Lapsus$ and Vect ransomware gangs</description>
      <pubDate>Tue, 31 Mar 2026 12:15:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/teampcp-exploit-stolen-supply/</guid>
    </item>
    <item>
      <title>Employee Data Breaches Surge to Seven-Year High</title>
      <link>https://www.infosecurity-magazine.com/news/employee-data-breaches-surge/</link>
      <description>Analysis from law firm Nockolds suggests non-cyber incidents are driving up employee data breaches</description>
      <pubDate>Tue, 31 Mar 2026 10:01:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/employee-data-breaches-surge/</guid>
    </item>
    <item>
      <title>NCSC Urges Immediate Patching of F5 BIG-IP Bug</title>
      <link>https://www.infosecurity-magazine.com/news/ncsc-urges-immediate-patching-f5/</link>
      <description>The National Cyber Security Centre wants UK firms to patch CVE-2025-53521</description>
      <pubDate>Tue, 31 Mar 2026 08:45:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/ncsc-urges-immediate-patching-f5/</guid>
    </item>
    <item>
      <title>Cybercriminals Exploit Tax Season With New Phishing Tactics</title>
      <link>https://www.infosecurity-magazine.com/news/tax-season-new-phishing-tactics/</link>
      <description>Tax-season phishing floods deliver RMM malware, credential theft, BEC and tax-form scams</description>
      <pubDate>Mon, 30 Mar 2026 15:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/tax-season-new-phishing-tactics/</guid>
    </item>
    <item>
      <title>Lloyds IT Glitch Exposed Data of Nearly 500,000 Banking Customers</title>
      <link>https://www.infosecurity-magazine.com/news/lloyds-glitch-exposed-500000/</link>
      <description>Lloyds app glitch exposed up to 447,936 customers’ transactions and personal data during update</description>
      <pubDate>Mon, 30 Mar 2026 14:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/lloyds-glitch-exposed-500000/</guid>
    </item>
    <item>
      <title>DeepLoad Malware Combines ClickFix With AI-Generated Code to Avoid Detection</title>
      <link>https://www.infosecurity-magazine.com/news/deepload-malware-clickfix-ai-code/</link>
      <description>Researchers at ReliaQuest warn of persistent malware campaign targeting enterprise credentials</description>
      <pubDate>Mon, 30 Mar 2026 12:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/deepload-malware-clickfix-ai-code/</guid>
    </item>
    <item>
      <title>Critical Citrix NetScaler Vulnerability Exploited in the Wild</title>
      <link>https://www.infosecurity-magazine.com/news/critical-citrix-netscaler/</link>
      <description>Researchers from watchTowr and Defused have found evidence that attackers are actively exploiting CVE-2026-3055, a critical NetScaler vulnerability</description>
      <pubDate>Mon, 30 Mar 2026 10:45:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/critical-citrix-netscaler/</guid>
    </item>
    <item>
      <title>ICO Fines UK Nuisance Call Scammers £100,000</title>
      <link>https://www.infosecurity-magazine.com/news/ico-fines-uk-nuisance-call/</link>
      <description>The UK Information Commissioner’s Office has handed a £100,000 fine to Birmingham-based TMAC</description>
      <pubDate>Mon, 30 Mar 2026 09:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/ico-fines-uk-nuisance-call/</guid>
    </item>
    <item>
      <title>European Commission Confirms Cloud Data Breach</title>
      <link>https://www.infosecurity-magazine.com/news/european-commission-cloud-data/</link>
      <description>The European Commission has revealed details of a data breach impacting its AWS infrastructure</description>
      <pubDate>Mon, 30 Mar 2026 08:15:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/european-commission-cloud-data/</guid>
    </item>
    <item>
      <title>New Wave of AiTM Phishing Targets TikTok for Business</title>
      <link>https://www.infosecurity-magazine.com/news/phishing-targets-tiktok-for/</link>
      <description>Push Security has uncovered a new AiTM phishing campaign targeting TikTok for Business accounts using Google  and TikTok themed login pages</description>
      <pubDate>Fri, 27 Mar 2026 16:01:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/phishing-targets-tiktok-for/</guid>
    </item>
    <item>
      <title>TeamPCP Targets Telnyx Package in Latest PyPI Software Supply Chain Attack</title>
      <link>https://www.infosecurity-magazine.com/news/teampcp-targets-telnyx-pypi-package/</link>
      <description>Socket and Endor Labs discovered a new TeamPCP campaign leading to the delivery of credential-stealing malware</description>
      <pubDate>Fri, 27 Mar 2026 15:06:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/teampcp-targets-telnyx-pypi-package/</guid>
    </item>
    <item>
      <title>Quantum Computing Threat to Encryption Is Closer Than Expected, Warns Google</title>
      <link>https://www.infosecurity-magazine.com/news/quantum-encryption-q-day-closer/</link>
      <description>‘Q-Day’ and the cybersecurity problems it brings could come as early as 2029 as Google accelerates its post-quantum cryptography migration</description>
      <pubDate>Fri, 27 Mar 2026 12:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/quantum-encryption-q-day-closer/</guid>
    </item>
    <item>
      <title>UK Cracks Down on Chinese Crypto Marketplace for Funding Southeast Asia Scam Hubs</title>
      <link>https://www.infosecurity-magazine.com/news/uk-sanction-chinese-crypto/</link>
      <description>The UK government has sanctioned Xinbi, described as “the second-largest illicit online marketplace ever”</description>
      <pubDate>Fri, 27 Mar 2026 12:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/uk-sanction-chinese-crypto/</guid>
    </item>
    <item>
      <title>Security Researchers Sound the Alarm on Vulnerabilities in AI-Generated Code</title>
      <link>https://www.infosecurity-magazine.com/news/ai-generated-code-vulnerabilities/</link>
      <description>Security researchers from Georgia Tech have observed a surge in reported CVEs for which the flaw was introduced by AI-generated code</description>
      <pubDate>Thu, 26 Mar 2026 16:40:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/ai-generated-code-vulnerabilities/</guid>
    </item>
    <item>
      <title>Attackers Rapidly Weaponize Critical Oracle WebLogic RCE, Honeypot Study Finds</title>
      <link>https://www.infosecurity-magazine.com/news/critical-oracle-weblogic-rce/</link>
      <description>Attackers rapidly exploited a critical Oracle WebLogic RCE flaw the same day exploit code was released, according to a CloudSEK honeypot study</description>
      <pubDate>Thu, 26 Mar 2026 16:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/critical-oracle-weblogic-rce/</guid>
    </item>
    <item>
      <title>EtherRAT Techniques Bypass Security Via Ethereum Smart Contracts</title>
      <link>https://www.infosecurity-magazine.com/news/etherrat-bypass-security-ethereum/</link>
      <description>EtherRAT hides C2 in Ethereum smart contracts via EtherHiding, steals wallets and credentials</description>
      <pubDate>Thu, 26 Mar 2026 15:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/etherrat-bypass-security-ethereum/</guid>
    </item>
    <item>
      <title>AI Becomes the Top Cybersecurity Priority for Defenders as Criminals Exploit It, PwC Warns</title>
      <link>https://www.infosecurity-magazine.com/news/ai-top-cyber-priority-defenders-pwc/</link>
      <description>PwC Annual Threat Dynamics report says AI-threats are the biggest concern of clients</description>
      <pubDate>Thu, 26 Mar 2026 13:15:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/ai-top-cyber-priority-defenders-pwc/</guid>
    </item>
    <item>
      <title>OpenAI Expands Bug Bounty to Cover AI Abuse and 'Safety' Concerns</title>
      <link>https://www.infosecurity-magazine.com/news/openai-bug-bounty-ai-abuse-safety/</link>
      <description>OpenAI’s Safety Bug Bounty program seeks to address AI safety vulnerabilities beyond traditional security flaws</description>
      <pubDate>Thu, 26 Mar 2026 12:20:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/openai-bug-bounty-ai-abuse-safety/</guid>
    </item>
    <item>
      <title>Iran-Linked Pay2Key Ransomware Group Re-Emerges</title>
      <link>https://www.infosecurity-magazine.com/news/iranlinked-pay2key-ransomware/</link>
      <description>Halcyon and Beazley Security track the return of Iranian ransomware group Pay2Key</description>
      <pubDate>Thu, 26 Mar 2026 10:45:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/iranlinked-pay2key-ransomware/</guid>
    </item>
    <item>
      <title>Invoice Fraud Costs UK Construction Sector Millions, NCA Warns</title>
      <link>https://www.infosecurity-magazine.com/news/invoice-fraud-uk-construction/</link>
      <description>The National Crime Agency has warned construction firms about surging invoice fraud</description>
      <pubDate>Thu, 26 Mar 2026 10:07:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/invoice-fraud-uk-construction/</guid>
    </item>
    <item>
      <title>Cloud Phones Linked to Rising Financial Fraud Threat</title>
      <link>https://www.infosecurity-magazine.com/news/cloud-phones-financial-fraud/</link>
      <description>Cloud Android phones fuel financial fraud, evading detection and enabling dropper accounts</description>
      <pubDate>Wed, 25 Mar 2026 16:05:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/cloud-phones-financial-fraud/</guid>
    </item>
    <item>
      <title>Hackers Exploit Compromised Enterprise Identities at Industrial Scale, Warns SentinelOne</title>
      <link>https://www.infosecurity-magazine.com/news/hackers-exploit-id-industrial-scale/</link>
      <description>Cybersecurity company’s annual report issues warning over a “mass-marketed impersonation crisis” over attackers abusing legitimate credentials </description>
      <pubDate>Wed, 25 Mar 2026 15:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/hackers-exploit-id-industrial-scale/</guid>
    </item>
    <item>
      <title>US: FCC Bans Foreign-Made Routers Over National Security Concerns</title>
      <link>https://www.infosecurity-magazine.com/news/us-fcc-bans-foreign-made-routers/</link>
      <description>The US Federal Communications Commission has placed all “consumer-grade” internet routers produced outside the US on its “covered list”</description>
      <pubDate>Wed, 25 Mar 2026 12:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/us-fcc-bans-foreign-made-routers/</guid>
    </item>
    <item>
      <title>TeamPCP Expands Supply Chain Campaign With LiteLLM PyPI Compromise</title>
      <link>https://www.infosecurity-magazine.com/news/teampcp-litellm-pypi-supply-chain/</link>
      <description>Python package LiteLLM compromised with credential-stealing malware linked to TeamPCP threat group</description>
      <pubDate>Wed, 25 Mar 2026 12:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/teampcp-litellm-pypi-supply-chain/</guid>
    </item>
    <item>
      <title>Experts Sound Alarm Over “Prompt Poaching” Browser Extensions</title>
      <link>https://www.infosecurity-magazine.com/news/experts-prompt-poaching-browser/</link>
      <description>Expel has warned of malicious Chrome extensions stealing users’ AI conversations</description>
      <pubDate>Wed, 25 Mar 2026 11:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/experts-prompt-poaching-browser/</guid>
    </item>
    <item>
      <title>Operation Henhouse Nets Over 500 Arrests in UK Fraud Crackdown</title>
      <link>https://www.infosecurity-magazine.com/news/police-fraud-crackdown-leads-to/</link>
      <description>UK police trumpet success of Operation Henhouse as they seize and freeze over £27m in suspected fraud proceeds</description>
      <pubDate>Wed, 25 Mar 2026 09:35:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/police-fraud-crackdown-leads-to/</guid>
    </item>
    <item>
      <title>RSA Conference: UK NCSC Head Urges Industry to Develop Vibe Coding Safeguards</title>
      <link>https://www.infosecurity-magazine.com/news/rsac-uk-ncsc-urges-vibe-coding/</link>
      <description>The head of the UK’s NCSC is calling the cybersecurity industry to “seize the disruptive vibe coding opportunity” to make software more secure</description>
      <pubDate>Tue, 24 Mar 2026 21:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/rsac-uk-ncsc-urges-vibe-coding/</guid>
    </item>
    <item>
      <title>Silver Fox Cyber Campaigns Show Shift Toward Dual Espionage</title>
      <link>https://www.infosecurity-magazine.com/news/silver-fox-cyber-dual-espionage/</link>
      <description>Silver Fox pivots from ValleyRAT tax lures to WhatsApp‑style stealers, blending espionage &amp; phishing</description>
      <pubDate>Tue, 24 Mar 2026 16:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/silver-fox-cyber-dual-espionage/</guid>
    </item>
    <item>
      <title>Citrix Urges Immediate Patching for Critical NetScaler Vulnerabilities</title>
      <link>https://www.infosecurity-magazine.com/news/citrix-patch-netscaler/</link>
      <description>A critical vulnerability in Citrix’s NetScaler products allows unauthenticated remote attackers to leak information from the appliance's memory</description>
      <pubDate>Tue, 24 Mar 2026 15:15:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/citrix-patch-netscaler/</guid>
    </item>
    <item>
      <title>New Npm 'Ghost Campaign' Uses Fake Install Logs to Hide Malware</title>
      <link>https://www.infosecurity-magazine.com/news/npm-ghost-campaign-fake-install/</link>
      <description>Ghost npm campaign fakes install logs to steal sudo passwords and drop RATs that loot crypto and data</description>
      <pubDate>Tue, 24 Mar 2026 14:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/npm-ghost-campaign-fake-install/</guid>
    </item>
    <item>
      <title>Former Ukrainian Foreign Minister Dmytro Kuleba to Address the New Cyber Frontline at Infosecurity Europe</title>
      <link>https://www.infosecurity-magazine.com/news/foreign-minister-kuleba/</link>
      <description>Geopolitics and cyber warfare take center stage at Infosecurity Europe as Dmytro Kuleba discusses Ukraine’s hybrid war experience</description>
      <pubDate>Tue, 24 Mar 2026 14:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/foreign-minister-kuleba/</guid>
    </item>
    <item>
      <title>Enterprise Cybersecurity Software Fails 20% of the Time, Warns Absolute Security</title>
      <link>https://www.infosecurity-magazine.com/news/cybersecurity-software-failure-20/</link>
      <description>Poor patch management, increasingly complex IT environments and continued use of obsolete software puts organizations at risk from cyber threats, says the Absolute Security 2026 Resilience Risk Index</description>
      <pubDate>Tue, 24 Mar 2026 13:15:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/cybersecurity-software-failure-20/</guid>
    </item>
    <item>
      <title>Russian Initial Access Broker Handed 81-Month Sentence</title>
      <link>https://www.infosecurity-magazine.com/news/russian-initial-access-broker/</link>
      <description>Russian cybercriminal Aleksei Volkov has received close to seven years behind bars for role in Yanluowang ransomware </description>
      <pubDate>Tue, 24 Mar 2026 10:32:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/russian-initial-access-broker/</guid>
    </item>
    <item>
      <title>Handala Group Tied to Iranian Hack‑and‑Leak Operations, FBI Reveals</title>
      <link>https://www.infosecurity-magazine.com/news/handala-group-iranian-hack-and/</link>
      <description>The FBI has warned that Iranian hacking group Handala has been targeting opponents of the regime since 2023</description>
      <pubDate>Tue, 24 Mar 2026 09:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/handala-group-iranian-hack-and/</guid>
    </item>
    <item>
      <title>Most Cybersecurity Staff Don’t Know How Fast They Could Stop a Cyber-Attack on AI Systems</title>
      <link>https://www.infosecurity-magazine.com/news/cyber-staff-unsure-on-preventing/</link>
      <description>ISACA survey found that confusion over responsibility and lack of understanding around AI cyber-attacks makes containing them difficult</description>
      <pubDate>Mon, 23 Mar 2026 16:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/cyber-staff-unsure-on-preventing/</guid>
    </item>
    <item>
      <title>Tycoon2FA Phishing Service Resumes Activity Post-Takedown</title>
      <link>https://www.infosecurity-magazine.com/news/tycoon2fa-phishing-service-resumes/</link>
      <description>Tycoon2FA phishing platform resumes activity post-takedown, leveraging AITM techniques to bypass MFA</description>
      <pubDate>Mon, 23 Mar 2026 16:05:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/tycoon2fa-phishing-service-resumes/</guid>
    </item>
    <item>
      <title>High-Tech Sector Overtakes Finance as Top Target for Cyber-Attacks, Mandiant Reports</title>
      <link>https://www.infosecurity-magazine.com/news/high-tech-top-target-cyberattacks/</link>
      <description>High tech was the most frequently targeted industry in Mandiant investigations in 2025, overtaking financial services which led in 2023 and 2024</description>
      <pubDate>Mon, 23 Mar 2026 15:35:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/high-tech-top-target-cyberattacks/</guid>
    </item>
    <item>
      <title>Trivy Supply Chain Attack Expands With New Compromised Docker Images</title>
      <link>https://www.infosecurity-magazine.com/news/trivy-supply-chain-attack-expands/</link>
      <description>New Trivy Docker images 0.69.5 and 0.69.6 compromised with TeamPCP infostealer, impacting CI/CD scans</description>
      <pubDate>Mon, 23 Mar 2026 15:05:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/trivy-supply-chain-attack-expands/</guid>
    </item>
    <item>
      <title>CISA Orders US Government to Patch Maximum Severity Cisco Flaw</title>
      <link>https://www.infosecurity-magazine.com/news/cisa-orders-us-government-patch/</link>
      <description>CISA added CVE-2026-20131 to its KEV catalog as it is being used in ransomware campaigns</description>
      <pubDate>Mon, 23 Mar 2026 10:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/cisa-orders-us-government-patch/</guid>
    </item>
    <item>
      <title>Operation Alice Takes Down 370,000+ Dark Web Sites</title>
      <link>https://www.infosecurity-magazine.com/news/operation-alice-370000-dark-web/</link>
      <description>German-led policing effort against fraud operation disrupts countless CSAM and cybercrime sites</description>
      <pubDate>Mon, 23 Mar 2026 09:10:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/operation-alice-370000-dark-web/</guid>
    </item>
    <item>
      <title>Hackers Exploit Critical Langflow Bug in Just 20 Hours </title>
      <link>https://www.infosecurity-magazine.com/news/hackers-exploit-critical-langflow/</link>
      <description>Sysdig details how threat actors exploited a critical CVE in Langflow in less than a day </description>
      <pubDate>Fri, 20 Mar 2026 10:20:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/hackers-exploit-critical-langflow/</guid>
    </item>
    <item>
      <title>NCA Boss Warns That Teens Are Being “Radicalized” Into Cybercrime Online</title>
      <link>https://www.infosecurity-magazine.com/news/nca-boss-warns-teens-radicalized/</link>
      <description>The National Crime Agency’s director general warns that technology is rapidly reshaping crime</description>
      <pubDate>Fri, 20 Mar 2026 09:40:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/nca-boss-warns-teens-radicalized/</guid>
    </item>
    <item>
      <title>Ransomware Affiliate Exposes Details of 'The Gentlemen' Operation</title>
      <link>https://www.infosecurity-magazine.com/news/ransomware-affiliate-gentlemen/</link>
      <description>Hastalamuerte leaks The Gentlemen RaaS ops: FortiGate exploits, BYOVD evasion, Qilin split tactics</description>
      <pubDate>Thu, 19 Mar 2026 16:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/ransomware-affiliate-gentlemen/</guid>
    </item>
    <item>
      <title>Financial Brands Targeted in Global Mobile Banking Malware Surge</title>
      <link>https://www.infosecurity-magazine.com/news/financial-brands-mobile-banking/</link>
      <description>Mobile banking malware targets over 1200 financial apps globally, shifting fraud to user devices</description>
      <pubDate>Thu, 19 Mar 2026 14:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/financial-brands-mobile-banking/</guid>
    </item>
    <item>
      <title>FCA Updates Cyber Incident and Third-Party Reporting Rules </title>
      <link>https://www.infosecurity-magazine.com/news/fca-updates-incident-thirdparty/</link>
      <description>The UK’s financial regulator has issued new rules to make incident and third-party reporting clearer </description>
      <pubDate>Thu, 19 Mar 2026 10:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/fca-updates-incident-thirdparty/</guid>
    </item>
    <item>
      <title>AWS Warns Hackers Have Abused Cisco Firewall Zero-Day Since January</title>
      <link>https://www.infosecurity-magazine.com/news/interlock-ransomware-exploit-cisco/</link>
      <description>Notorious ransomware group Interlock has been exploiting a Cisco zero-day bug since January, AWS says</description>
      <pubDate>Thu, 19 Mar 2026 09:50:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/interlock-ransomware-exploit-cisco/</guid>
    </item>
    <item>
      <title>UK: Regulation Drives Cyber Spending for Critical Infrastructure Orgs</title>
      <link>https://www.infosecurity-magazine.com/news/uk-regulation-drives-cyber/</link>
      <description>35% of security leaders working in the UK’s critical infrastructure said regulatory requirements are the primary influence on their security programs</description>
      <pubDate>Thu, 19 Mar 2026 09:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/uk-regulation-drives-cyber/</guid>
    </item>
    <item>
      <title>New Ubuntu Flaw Enables Local Attackers to Gain Root Access</title>
      <link>https://www.infosecurity-magazine.com/news/ubuntu-flaw-enables-root-access/</link>
      <description>CVE-2026-3888 Ubuntu snap flaw lets local users escalate to root via timing-based exploit</description>
      <pubDate>Wed, 18 Mar 2026 15:45:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/ubuntu-flaw-enables-root-access/</guid>
    </item>
    <item>
      <title>Crypto Scam "ShieldGuard" Dismantled After Malware Discovery</title>
      <link>https://www.infosecurity-magazine.com/news/crypto-scam-shieldguard-dismantled/</link>
      <description>ShieldGuard Chrome extension posed as a crypto security tool but stole wallets and drained user data</description>
      <pubDate>Wed, 18 Mar 2026 14:15:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/crypto-scam-shieldguard-dismantled/</guid>
    </item>
    <item>
      <title>AI-Enabled Adversaries Compress Time-to-Exploit Following Vulnerability Disclosure</title>
      <link>https://www.infosecurity-magazine.com/news/exploitation-accelerates-in-2025/</link>
      <description>Rapid7 says median time from publication to CISA KEV inclusion dropped to five days</description>
      <pubDate>Wed, 18 Mar 2026 13:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/exploitation-accelerates-in-2025/</guid>
    </item>
    <item>
      <title>Vidar Stealer 2.0 Exploits GitHub, Reddit to Deliver Malware via Fake Game Cheats</title>
      <link>https://www.infosecurity-magazine.com/news/vidar-stealer-exploits-github/</link>
      <description>The Vidar 2.0 infostealers is deployed through fake free game cheats on GitHub and Reddit</description>
      <pubDate>Wed, 18 Mar 2026 11:15:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/vidar-stealer-exploits-github/</guid>
    </item>
    <item>
      <title>AI Issues Will Drive Half of Incident Response Efforts by 2028, Says Gartner</title>
      <link>https://www.infosecurity-magazine.com/news/ai-issues-half-incident-response/</link>
      <description>Gartner has urged security teams to get involved in AI projects from the start to avoid costly incident response</description>
      <pubDate>Wed, 18 Mar 2026 09:40:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/ai-issues-half-incident-response/</guid>
    </item>
    <item>
      <title>Android OS-Level Attack Bypasses Mobile Payment Security</title>
      <link>https://www.infosecurity-magazine.com/news/android-attack-bypasses-payment/</link>
      <description>Android’s LSPosed-based attack hijacks payment apps via runtime manipulation and SIM-binding bypass</description>
      <pubDate>Tue, 17 Mar 2026 16:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/android-attack-bypasses-payment/</guid>
    </item>
    <item>
      <title>'CursorJack’ Attack Path Exposes Code Execution Risk in AI Development Environment</title>
      <link>https://www.infosecurity-magazine.com/news/cursor-jack-attack-path-ai/</link>
      <description>CursorJack shows how malicious MCP deeplinks in Cursor IDE can trigger user-approved code execution</description>
      <pubDate>Tue, 17 Mar 2026 15:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/cursor-jack-attack-path-ai/</guid>
    </item>
    <item>
      <title>Surge in Nation State Attacks on UK Firms Amid Cyber Warfare Fears</title>
      <link>https://www.infosecurity-magazine.com/news/nation-state-attacks-uk-firms/</link>
      <description>Armis reveals that “mutually assured disruption” is no longer preventing state-backed attacks</description>
      <pubDate>Tue, 17 Mar 2026 12:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/nation-state-attacks-uk-firms/</guid>
    </item>
    <item>
      <title>Average Number of Daily API Attacks Up 113% Annually</title>
      <link>https://www.infosecurity-magazine.com/news/average-number-daily-api-attacks/</link>
      <description>Akamai says 87% of organizations suffered an API-related security incident last year</description>
      <pubDate>Tue, 17 Mar 2026 10:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/average-number-daily-api-attacks/</guid>
    </item>
    <item>
      <title>UK Cyber Monitoring Centre Sets Its Sights on US Expansion One Year After Launch</title>
      <link>https://www.infosecurity-magazine.com/news/uk-cyber-monitoring-centre-us/</link>
      <description>The US Cyber Monitoring Center should be operational in 2027, said the UK CMC leadership</description>
      <pubDate>Tue, 17 Mar 2026 10:15:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/uk-cyber-monitoring-centre-us/</guid>
    </item>
    <item>
      <title>Researchers Warn of Global Surge in Fake Shipment Tracking Scams</title>
      <link>https://www.infosecurity-magazine.com/news/global-surge-fake-shipment/</link>
      <description>Some of these campaigns are linked to Darcula, a Chinese-language phishing-as-a-service platform</description>
      <pubDate>Mon, 16 Mar 2026 14:45:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/global-surge-fake-shipment/</guid>
    </item>
    <item>
      <title>CrackArmor Flaws Expose Linux Systems to Privilege Escalation</title>
      <link>https://www.infosecurity-magazine.com/news/crackarmor-linux-privilege/</link>
      <description>CrackArmor AppArmor flaws let local Linux users gain root, break containers and enable DoS attacks</description>
      <pubDate>Mon, 16 Mar 2026 14:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/crackarmor-linux-privilege/</guid>
    </item>
    <item>
      <title>Security Flaw in AWS Bedrock Code Interpreter Raises Alarms</title>
      <link>https://www.infosecurity-magazine.com/news/security-flaw-aws-bedrock/</link>
      <description>DNS-based attack in AWS Bedrock AgentCore lets AI sandboxes exfiltrate cloud data</description>
      <pubDate>Mon, 16 Mar 2026 13:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/security-flaw-aws-bedrock/</guid>
    </item>
    <item>
      <title>FBI Calls for Help to Track Steam Malware Campaign</title>
      <link>https://www.infosecurity-magazine.com/news/fbi-calls-help-track-steam-malware/</link>
      <description>The FBI wants to hear from gamers who have downloaded Steam titles containing malware</description>
      <pubDate>Mon, 16 Mar 2026 11:15:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/fbi-calls-help-track-steam-malware/</guid>
    </item>
    <item>
      <title>UK: Companies House Web Glitch Exposes Corporate Details to Fraudsters</title>
      <link>https://www.infosecurity-magazine.com/news/companies-house-glitch-exposes/</link>
      <description>An issue with the Companies House website has put the personal and corporate information of millions at risk</description>
      <pubDate>Mon, 16 Mar 2026 10:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/companies-house-glitch-exposes/</guid>
    </item>
    <item>
      <title>Interpol's 'Operation Synergia III' Nets 94 Arrests in Major Cybercrime Sweep</title>
      <link>https://www.infosecurity-magazine.com/news/interpol-operation-synergia3-94/</link>
      <description>A new law enforcement operation against phishing and ransomware operators led to the takedown of 45,000 malicious IP addresses</description>
      <pubDate>Fri, 13 Mar 2026 16:15:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/interpol-operation-synergia3-94/</guid>
    </item>
    <item>
      <title>Law Enforcement Dismantles SocksEscort Proxy Network in Operation Lightning</title>
      <link>https://www.infosecurity-magazine.com/news/socksescort-proxy-network-op/</link>
      <description>Operation Lightning sees international law enforcement partners shut down ‘SocksEscort,’ a major malicious proxy service used by cybercriminals worldwide</description>
      <pubDate>Fri, 13 Mar 2026 10:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/socksescort-proxy-network-op/</guid>
    </item>
    <item>
      <title>PixRevolution Malware Hijacks Brazil's PIX Transfers in Real Time</title>
      <link>https://www.infosecurity-magazine.com/news/pixrevolution-malware-brazils-pix/</link>
      <description>PixRevolution Android trojan hijacks Brazil’s PIX payments in real time using accessibility abuse</description>
      <pubDate>Thu, 12 Mar 2026 16:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/pixrevolution-malware-brazils-pix/</guid>
    </item>
    <item>
      <title>Critical Zero-Click Flaw in n8n Allows Full Server Compromise</title>
      <link>https://www.infosecurity-magazine.com/news/critical-zeroclick-flaw-n8n-pillar/</link>
      <description>The critical vulnerability affecting both cloud and self-hosted n8n instances requires no authentication or even n8n account to be exploited</description>
      <pubDate>Thu, 12 Mar 2026 15:28:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/critical-zeroclick-flaw-n8n-pillar/</guid>
    </item>
    <item>
      <title>CISA Issues Emergency Directive Over Exploited Cisco SD-WAN Flaws</title>
      <link>https://www.infosecurity-magazine.com/news/cisa-cisco-sd-wan-flaws-directive/</link>
      <description>CISA issued urgent directive as attackers exploit Cisco SD-WAN flaw granting admin access to networks</description>
      <pubDate>Thu, 12 Mar 2026 12:45:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/cisa-cisco-sd-wan-flaws-directive/</guid>
    </item>
    <item>
      <title>Police Scotland Fined After Sharing Victim’s Phone Data </title>
      <link>https://www.infosecurity-magazine.com/news/police-scotland-fined-sharing/</link>
      <description>The ICO has fined Police Scotland after it shared the entire contents of a victim’s phone with her alleged attacker</description>
      <pubDate>Thu, 12 Mar 2026 10:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/police-scotland-fined-sharing/</guid>
    </item>
    <item>
      <title>Iran Claims Massive Cyber-Attack on MedTech Firm Stryker</title>
      <link>https://www.infosecurity-magazine.com/news/iran-massive-wiper-attack-medtech/</link>
      <description>The pro-Iran Handala group claims to have wiped 200,000 systems in destructive wiper malware attack on US firm Stryker</description>
      <pubDate>Thu, 12 Mar 2026 09:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/iran-massive-wiper-attack-medtech/</guid>
    </item>
    <item>
      <title>France: National Cybersecurity Agency Reports Ransomware Attack Drop in 2025</title>
      <link>https://www.infosecurity-magazine.com/news/france-anssi-ransomware-attack/</link>
      <description>French small and medium businesses remained the organizations most targeted by ransomware in 2025</description>
      <pubDate>Wed, 11 Mar 2026 16:50:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/france-anssi-ransomware-attack/</guid>
    </item>
    <item>
      <title>Infosecurity Europe Announces 2026 Keynote Line Up</title>
      <link>https://www.infosecurity-magazine.com/news/infosecurity-europe-2026-keynote/</link>
      <description>Infosecurity Europe 2026 reveals its keynote line-up, featuring Jason Fox, Shlomo Kramer, Cynthia Kaiser and more, with sessions on AI, cloud security and post quantum threats</description>
      <pubDate>Wed, 11 Mar 2026 16:20:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/infosecurity-europe-2026-keynote/</guid>
    </item>
    <item>
      <title>Researchers Uncover ‘LeakyLooker’ Vulnerabilities in Google Looker Studio</title>
      <link>https://www.infosecurity-magazine.com/news/google-looker-studios-security-gaps/</link>
      <description>LeakyLooker flaws in Google Looker Studio let attackers run cross-tenant SQL attacks on cloud data</description>
      <pubDate>Wed, 11 Mar 2026 16:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/google-looker-studios-security-gaps/</guid>
    </item>
    <item>
      <title>Compromised WordPress Sites Deliver ClickFix Attacks in Global Infostealer Campaign</title>
      <link>https://www.infosecurity-magazine.com/news/wordpress-clickfix-infostealer/</link>
      <description>Over 250 legitimate websites, including news outlets and  a US Senate candidate’s official webpage, been compromised to infect visitors with infostealers, warn Rapid7 researchers</description>
      <pubDate>Wed, 11 Mar 2026 14:45:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/wordpress-clickfix-infostealer/</guid>
    </item>
    <item>
      <title>BlackSanta EDR-Killer Targets HR Teams in CV-Themed Campaign</title>
      <link>https://www.infosecurity-magazine.com/news/blacksanta-edr-killer-targets-hr/</link>
      <description>BlackSanta malware targets HR staff with fake resumes, kills EDR and steals system data</description>
      <pubDate>Wed, 11 Mar 2026 14:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/blacksanta-edr-killer-targets-hr/</guid>
    </item>
    <item>
      <title>Researchers Discover Major Security Gaps in LLM Guardrails</title>
      <link>https://www.infosecurity-magazine.com/news/major-security-gaps-llm-guardrails/</link>
      <description>Palo Alto Networks’ Unit 42 has developed a successful attack to bypass safety guardrails in popular generative AI tools</description>
      <pubDate>Wed, 11 Mar 2026 13:35:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/major-security-gaps-llm-guardrails/</guid>
    </item>
    <item>
      <title>Cyber-Attacks on UK Firms Increase at Four Times Global Rate</title>
      <link>https://www.infosecurity-magazine.com/news/cyberattacks-uk-firms-increase/</link>
      <description>Check Point data shows attack volumes are growing much faster in the UK than worldwide</description>
      <pubDate>Wed, 11 Mar 2026 10:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/cyberattacks-uk-firms-increase/</guid>
    </item>
    <item>
      <title>Microsoft Fixes Two Publicly Disclosed Zero-Days </title>
      <link>https://www.infosecurity-magazine.com/news/microsoft-fixes-two-publicly/</link>
      <description>March Patch Tuesday sees Microsoft release updates for 79 flaws</description>
      <pubDate>Wed, 11 Mar 2026 09:20:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/microsoft-fixes-two-publicly/</guid>
    </item>
    <item>
      <title>OpenAI's Promptfoo Deal Plugs Agentic AI Testing Gap</title>
      <link>https://www.infosecurity-magazine.com/news/openai-promptfoo-deal-agentic-ai/</link>
      <description>OpenAI’s latest acquisition addresses a security need Jamieson O’Reilly, security advisor at OpenClaw, raised during an exclusive interview with Infosecurity</description>
      <pubDate>Tue, 10 Mar 2026 17:15:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/openai-promptfoo-deal-agentic-ai/</guid>
    </item>
    <item>
      <title>Only 24% Of organizations Test Identity Recovery Every Six Months</title>
      <link>https://www.infosecurity-magazine.com/news/organizations-test-identity-sec-6/</link>
      <description>Only 24% of organizations test identity disaster recovery plans every 6 months, Quest Software said</description>
      <pubDate>Tue, 10 Mar 2026 16:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/organizations-test-identity-sec-6/</guid>
    </item>
  </channel>
</rss>