<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <link>https://www.infosecurity-magazine.com/news/</link>
    <copyright>Copyright © 2026 Reed Exhibitions Ltd. All Rights Reserved.</copyright>
    <item>
      <title>Cursor Extension Flaw Exposes Developer API Keys</title>
      <link>https://www.infosecurity-magazine.com/news/cursor-extension-flaw-exposes-api/</link>
      <description>Cursor flaw lets extensions steal API keys and session tokens without user interaction, according to researchers at LayerX</description>
      <pubDate>Wed, 29 Apr 2026 15:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/cursor-extension-flaw-exposes-api/</guid>
    </item>
    <item>
      <title>Malicious npm Dependency Linked to AI Assisted Commit Targets Crypto Wallets</title>
      <link>https://www.infosecurity-magazine.com/news/ai-npm-dependency-targets-crypto/</link>
      <description>Researchers uncover a malicious npm dependency linked to an AI‑assisted code commit that steals sensitive data and exposes crypto wallets</description>
      <pubDate>Wed, 29 Apr 2026 14:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/ai-npm-dependency-targets-crypto/</guid>
    </item>
    <item>
      <title>Researchers Track 2.9 Billion Compromised Credentials </title>
      <link>https://www.infosecurity-magazine.com/news/29-billion-compromised-credentials/</link>
      <description>KELA claims infostealers remained the primary access vector for attacks in 2025</description>
      <pubDate>Wed, 29 Apr 2026 13:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/29-billion-compromised-credentials/</guid>
    </item>
    <item>
      <title>Critical Flaw Turns Vect Ransomware into Data Destroying Wiper</title>
      <link>https://www.infosecurity-magazine.com/news/critical-flaw-vect-ransomware-data/</link>
      <description>The Vect 2.0 ransomware wipes large files instead of merely encrypting them, making recovery impossible – even for the attackers</description>
      <pubDate>Wed, 29 Apr 2026 10:45:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/critical-flaw-vect-ransomware-data/</guid>
    </item>
    <item>
      <title>A Quarter of Healthcare Organizations Report Medical Device Cyber-Attacks</title>
      <link>https://www.infosecurity-magazine.com/news/quarter-healthcare-medical-device/</link>
      <description>RunSafe report reveals most attacks on medical devices disrupt patient care</description>
      <pubDate>Wed, 29 Apr 2026 10:05:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/quarter-healthcare-medical-device/</guid>
    </item>
    <item>
      <title>Medtronic Confirms Data Breach After ShinyHunters Claims</title>
      <link>https://www.infosecurity-magazine.com/news/medtronic-data-breach-shinyhunters/</link>
      <description>Medtronic confirms IT breach as ShinyHunters claims millions of records accesseda</description>
      <pubDate>Tue, 28 Apr 2026 15:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/medtronic-data-breach-shinyhunters/</guid>
    </item>
    <item>
      <title>Ransomware Turf War as 0APT and KryBit Groups Trade Blows</title>
      <link>https://www.infosecurity-magazine.com/news/ransomware-turf-war-0apt-krybit/</link>
      <description>Ransomware groups 0APT and KryBit have doxxed each other online </description>
      <pubDate>Tue, 28 Apr 2026 13:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/ransomware-turf-war-0apt-krybit/</guid>
    </item>
    <item>
      <title>Chinese National Extradited Over Silk Typhoon Cyber Campaign</title>
      <link>https://www.infosecurity-magazine.com/news/chinese-national-extradited-silk/</link>
      <description>Extradition links alleged MSS-directed hacker to  Silk Typhoon and COVID-19 espionage</description>
      <pubDate>Tue, 28 Apr 2026 12:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/chinese-national-extradited-silk/</guid>
    </item>
    <item>
      <title>No Metrics Are Better Than Bad Metrics in the SOC, Says NCSC</title>
      <link>https://www.infosecurity-magazine.com/news/no-metrics-better-bad-metrics-soc/</link>
      <description>The National Cyber Security Centre has warned against measuring SOCs with ticket-based metrics</description>
      <pubDate>Tue, 28 Apr 2026 08:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/no-metrics-better-bad-metrics-soc/</guid>
    </item>
    <item>
      <title>North Korean Hackers Target Crypto Firms with ClickFix and AI-Made Zoom Lures</title>
      <link>https://www.infosecurity-magazine.com/news/bluenoroff-dprk-hackers-target/</link>
      <description>Arctic Wolf attributed this large-scale spear-phishing campaign to BlueNoroff, a financially motivated subgroup of the Lazarus Group</description>
      <pubDate>Tue, 28 Apr 2026 08:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/bluenoroff-dprk-hackers-target/</guid>
    </item>
    <item>
      <title>US Sanctions Target Cambodian Scam Network Leaders</title>
      <link>https://www.infosecurity-magazine.com/news/us-sanctions-cambodian-scam-network/</link>
      <description>US sanctions target Cambodian scam networks tied to crypto fraud and trafficking</description>
      <pubDate>Mon, 27 Apr 2026 15:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/us-sanctions-cambodian-scam-network/</guid>
    </item>
    <item>
      <title>Utilities Tech Supplier Itron Discloses Cyber-Attack, Operations Unaffected</title>
      <link>https://www.infosecurity-magazine.com/news/utilities-tech-supplier-itron/</link>
      <description>Itron confirmed a cyber incident but does not believe it is likely to have a material impact on the company</description>
      <pubDate>Mon, 27 Apr 2026 14:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/utilities-tech-supplier-itron/</guid>
    </item>
    <item>
      <title>Widely Used Browser Extensions Selling User Data</title>
      <link>https://www.infosecurity-magazine.com/news/browser-extensions-sell-user-data/</link>
      <description>Dozens of browser extensions openly sell user data via privacy policy disclosures</description>
      <pubDate>Mon, 27 Apr 2026 13:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/browser-extensions-sell-user-data/</guid>
    </item>
    <item>
      <title>Most Cybersecurity  Professionals Feel Undervalued and Underpaid</title>
      <link>https://www.infosecurity-magazine.com/news/cybersecurity-pros-feel/</link>
      <description>A new report by global technology recruitment firm, Harvey Nash, found that three quarters of cybersecurity staff are pessimistic on pay and half are looking for a new job</description>
      <pubDate>Mon, 27 Apr 2026 11:40:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/cybersecurity-pros-feel/</guid>
    </item>
    <item>
      <title>Researchers Identify Fast16 Sabotage Malware That Pre-Dates Stuxnet</title>
      <link>https://www.infosecurity-magazine.com/news/fast16-sabotage-malware-winds/</link>
      <description>The “fast16” malware may have been used to target Iran’s nuclear program prior to Stuxnet</description>
      <pubDate>Mon, 27 Apr 2026 09:10:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/fast16-sabotage-malware-winds/</guid>
    </item>
    <item>
      <title>BlackFile Group Targets Retail and Hospitality with Vishing Attacks</title>
      <link>https://www.infosecurity-magazine.com/news/blackfile-group-targets-retail/</link>
      <description>Researchers uncover a new data theft and extortion group dubbed “BlackFile”</description>
      <pubDate>Mon, 27 Apr 2026 08:15:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/blackfile-group-targets-retail/</guid>
    </item>
    <item>
      <title>UK Biobank Data Breach: Health Data of 500,000 Listed for Sale in China</title>
      <link>https://www.infosecurity-magazine.com/news/uk-biobank-data-beach-health-data/</link>
      <description>UK government Minister confirms that breached health records of UK Biobank volunteers were up for sale on Chinese ecommerce platforms before being removed</description>
      <pubDate>Fri, 24 Apr 2026 13:25:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/uk-biobank-data-beach-health-data/</guid>
    </item>
    <item>
      <title>AI Rush is Reviving Old Cybersecurity Mistakes, Mandiant VP Warns</title>
      <link>https://www.infosecurity-magazine.com/news/ai-old-cybersecurity-mistakes/</link>
      <description>AI tools are not just creating new vulnerabilities, they are reviving old security failures, warned Jurgen Kutscher, VP of Mandiant Consulting</description>
      <pubDate>Fri, 24 Apr 2026 12:10:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/ai-old-cybersecurity-mistakes/</guid>
    </item>
    <item>
      <title>Npm Supply Chain Malware Attack Targets Developers With Worm-Like Propagation</title>
      <link>https://www.infosecurity-magazine.com/news/npm-supply-chain-worm-canister/</link>
      <description>Malicious npm packages spread via worm-like propagation and steal developer credentials</description>
      <pubDate>Fri, 24 Apr 2026 08:10:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/npm-supply-chain-worm-canister/</guid>
    </item>
    <item>
      <title> Google Favors General-Purpose Gemini Models Over Cybersecurity‑Specific AI</title>
      <link>https://www.infosecurity-magazine.com/news/google-gemini-over-cyber-specific/</link>
      <description>Google Cloud’s COO advocated for combining general-purpose frontier large language models with task-specific AI agents </description>
      <pubDate>Thu, 23 Apr 2026 16:40:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/google-gemini-over-cyber-specific/</guid>
    </item>
    <item>
      <title>Apple Fixes iOS Notification Bug Exposing Deleted Messages</title>
      <link>https://www.infosecurity-magazine.com/news/apple-ios-notification-bug-deleted/</link>
      <description>Apple patches iOS flaw that retained deleted notifications, exposing message data</description>
      <pubDate>Thu, 23 Apr 2026 13:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/apple-ios-notification-bug-deleted/</guid>
    </item>
    <item>
      <title>Google Introduces Unique AI Agent Identities in New Gemini Enterprise Platform</title>
      <link>https://www.infosecurity-magazine.com/news/google-ai-agent-identities-gemini/</link>
      <description>Google Cloud will attribute a unique cryptographic ID every AI agent that will be tied to “traceable and auditable” authorization policies</description>
      <pubDate>Thu, 23 Apr 2026 12:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/google-ai-agent-identities-gemini/</guid>
    </item>
    <item>
      <title>Cyber-Attacks Surge 63% Annually in Education Sector </title>
      <link>https://www.infosecurity-magazine.com/news/cyberattacks-surge-63-annually/</link>
      <description>Quorum Cyber report finds higher and further education institutions experienced 63% increase in attacks over a year</description>
      <pubDate>Thu, 23 Apr 2026 10:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/cyberattacks-surge-63-annually/</guid>
    </item>
    <item>
      <title>Researchers Uncover 10 In-the-Wild Prompt Injection Payloads Targeting AI Agents</title>
      <link>https://www.infosecurity-magazine.com/news/researchers-10-wild-indirect/</link>
      <description>Forcepoint has found 10 new indirect prompt injection attacks targeting AI agents</description>
      <pubDate>Thu, 23 Apr 2026 09:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/researchers-10-wild-indirect/</guid>
    </item>
    <item>
      <title>NCSC Backs Passkeys, Hailing a New Era of Sign-in </title>
      <link>https://www.infosecurity-magazine.com/news/ncsc-backs-passkeys-new-era-of/</link>
      <description>The UK’s NCSC has fully backed passkeys as consumers’ first choice for login, citing progress with FIDO and successful use across the NHS</description>
      <pubDate>Thu, 23 Apr 2026 08:45:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/ncsc-backs-passkeys-new-era-of/</guid>
    </item>
    <item>
      <title>MacOS Native Tools Enable Stealthy Enterprise Attacks</title>
      <link>https://www.infosecurity-magazine.com/news/macos-lotl-techniques-enterprise/</link>
      <description>macOS LOTL techniques bypass detection using native tools and metadata abuse</description>
      <pubDate>Wed, 22 Apr 2026 16:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/macos-lotl-techniques-enterprise/</guid>
    </item>
    <item>
      <title>NCSC Unveils SilentGlass, a Plug-In Device to Protect Monitors from Cyber-Attacks</title>
      <link>https://www.infosecurity-magazine.com/news/ncsc-silentglass-a-plugin-stop/</link>
      <description>The UK’s cybersecurity agency said the devices will be available for purchase by organizations around the world</description>
      <pubDate>Wed, 22 Apr 2026 15:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/ncsc-silentglass-a-plugin-stop/</guid>
    </item>
    <item>
      <title>UK Commits £90m for Cybersecurity and Pushes for ‘Resilience Pledge’</title>
      <link>https://www.infosecurity-magazine.com/news/uk-pledges-90m-for-cybersecurity/</link>
      <description>UK unveils £90m cybersecurity funding at CYBERUK to boost SME resilience, promote Cyber Essentials and a new Cyber Resilience Pledge, sparking industry debate</description>
      <pubDate>Wed, 22 Apr 2026 14:10:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/uk-pledges-90m-for-cybersecurity/</guid>
    </item>
    <item>
      <title>Surge in Silent Subject Phishing Attacks Targets VIP Users</title>
      <link>https://www.infosecurity-magazine.com/news/silent-subject-phishing-campaigns/</link>
      <description>Null subject phishing campaigns bypass filters and target VIPs with QR code and RMM abuse</description>
      <pubDate>Wed, 22 Apr 2026 13:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/silent-subject-phishing-campaigns/</guid>
    </item>
    <item>
      <title>Former Ransomware Negotiator Pleads Guilty to Working For BlackCat Cyber Gang</title>
      <link>https://www.infosecurity-magazine.com/news/former-ransomware-negotiator/</link>
      <description>A former ransomware negotiator has pleaded guilty to abusing his position by working with noted cybercrime group BlackCat</description>
      <pubDate>Wed, 22 Apr 2026 11:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/former-ransomware-negotiator/</guid>
    </item>
    <item>
      <title>Researchers Uncover ProxySmart Software Powering 90+ SIM Farms</title>
      <link>https://www.infosecurity-magazine.com/news/researchers-proxysmart-software-90/</link>
      <description>Infrawatch says ProxySmart platform enables SIM farm activity at “industrial scale”</description>
      <pubDate>Wed, 22 Apr 2026 10:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/researchers-proxysmart-software-90/</guid>
    </item>
    <item>
      <title>UK Faces a Cyber ‘Perfect Storm’ Driven by Tech Advances and Nation State Threats, NCSC Warns</title>
      <link>https://www.infosecurity-magazine.com/news/uk-faces-a-cyber-perfect-storm-ncsc/</link>
      <description>The convergence of global tensions and rapid technological change is driving a new era of cyber risk, the NCSC warns</description>
      <pubDate>Wed, 22 Apr 2026 08:07:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/uk-faces-a-cyber-perfect-storm-ncsc/</guid>
    </item>
    <item>
      <title>Trojanized Android App Fuels New Wave of NFC Fraud</title>
      <link>https://www.infosecurity-magazine.com/news/trojanized-android-handle-nfc/</link>
      <description>NGate malware abuses HandyPay app to steal NFC card data and PINs in Brazil</description>
      <pubDate>Tue, 21 Apr 2026 16:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/trojanized-android-handle-nfc/</guid>
    </item>
    <item>
      <title>The Gentlemen Ransomware Expands With Rapid Affiliate Growth</title>
      <link>https://www.infosecurity-magazine.com/news/gentlemen-ransomware-rapid/</link>
      <description>Gentlemen RaaS expands quickly with multi-platform attacks and SystemBC-linked infections</description>
      <pubDate>Tue, 21 Apr 2026 14:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/gentlemen-ransomware-rapid/</guid>
    </item>
    <item>
      <title>Unchecked AI Agents Cause Cybersecurity Incidents at Two Thirds of Firms </title>
      <link>https://www.infosecurity-magazine.com/news/unchecked-ai-agents-cause/</link>
      <description>Data exposure, operational disruption and financial losses among issues faced by businesses struggling with the rapid rise of AI agents, warns Cloud Security Alliance report </description>
      <pubDate>Tue, 21 Apr 2026 13:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/unchecked-ai-agents-cause/</guid>
    </item>
    <item>
      <title>Vercel Confirms Cyber Incident After Sophisticated Attacker Exploits Third‑Party Tool</title>
      <link>https://www.infosecurity-magazine.com/news/vercel-cyber-incident-threat-actor/</link>
      <description>Cloud app developer Vercel appears to have suffered a security breach</description>
      <pubDate>Tue, 21 Apr 2026 09:10:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/vercel-cyber-incident-threat-actor/</guid>
    </item>
    <item>
      <title>North Korea Blamed for $290m KelpDAO Crypto Heist </title>
      <link>https://www.infosecurity-magazine.com/news/north-korean-blamed-290m-kelpdao/</link>
      <description>North Korea’s Lazarus Group is pegged for a $290m crypto theft at KelpDAO</description>
      <pubDate>Tue, 21 Apr 2026 08:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/north-korean-blamed-290m-kelpdao/</guid>
    </item>
    <item>
      <title>ZionSiphon Malware Targets Water Infrastructure Systems</title>
      <link>https://www.infosecurity-magazine.com/news/zionsiphon-malware-water/</link>
      <description>ZionSiphon malware targets OT water systems with sabotage and ICS scanning capabilities</description>
      <pubDate>Mon, 20 Apr 2026 16:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/zionsiphon-malware-water/</guid>
    </item>
    <item>
      <title>Formbook Malware Campaign Uses Multiple Obfuscation Techniques to Avoid Detection</title>
      <link>https://www.infosecurity-magazine.com/news/formbook-malware-multiple/</link>
      <description>Formbook attacks use combination of DLL Side-Loading and Obfuscated JavaScript to stay hidden, researchers at WatchGuard have uncovered</description>
      <pubDate>Mon, 20 Apr 2026 15:01:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/formbook-malware-multiple/</guid>
    </item>
    <item>
      <title>Attackers Exploit DVR Command Injection Flaw to Deploy  Mirai-Based Botnet</title>
      <link>https://www.infosecurity-magazine.com/news/mirai-variant-dvr-flaw-iot-botnet/</link>
      <description>FortiGuard Labs has identified a Mirai-based Nexcorium campaign actively exploiting CVE-2024-3721 in TBK DVR devices</description>
      <pubDate>Mon, 20 Apr 2026 13:01:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/mirai-variant-dvr-flaw-iot-botnet/</guid>
    </item>
    <item>
      <title>NCSC Outlines Coordinated Plan to Boost NHS Cyber Resilience</title>
      <link>https://www.infosecurity-magazine.com/news/ncsc-plan-boost-nhs-cyber/</link>
      <description>The National Cyber Security Centre has shared an update of its resilience-building efforts for the NHS</description>
      <pubDate>Mon, 20 Apr 2026 09:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/ncsc-plan-boost-nhs-cyber/</guid>
    </item>
    <item>
      <title>Crypto Exchange Grinex Blames Western Spies for $13m Theft</title>
      <link>https://www.infosecurity-magazine.com/news/crypto-exchange-grinex-western/</link>
      <description>Russian crypto-exchange Grinex claims Western intelligence agencies were behind a $13m heist</description>
      <pubDate>Mon, 20 Apr 2026 09:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/crypto-exchange-grinex-western/</guid>
    </item>
    <item>
      <title>Commercial AI Models Show Rapid Gains in Vulnerability Research </title>
      <link>https://www.infosecurity-magazine.com/news/ai-models-rapid-gains/</link>
      <description>AI models are making rapid gains in vulnerability research and exploit development, raising new cybersecurity risks, a Forescout study finds</description>
      <pubDate>Fri, 17 Apr 2026 13:20:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/ai-models-rapid-gains/</guid>
    </item>
    <item>
      <title>DDoS-For-Hire Services Disrupted by International Police Action in ‘Operation PowerOff’</title>
      <link>https://www.infosecurity-magazine.com/news/ddos-services-hit-by-police/</link>
      <description>Coordinated action by FBI, Europol and others seizes infrastructure, makes arrests – and sends warning letters to known DDoS service users</description>
      <pubDate>Fri, 17 Apr 2026 11:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/ddos-services-hit-by-police/</guid>
    </item>
    <item>
      <title>US Nationals Jailed for Operating Fake Remote Worker Laptop Farms for North Korea</title>
      <link>https://www.infosecurity-magazine.com/news/us-nationals-jailed-north-korea/</link>
      <description>US authorities jail two Americans for aiding North Korean laptop farm scams that infiltrated over 100 firms</description>
      <pubDate>Thu, 16 Apr 2026 16:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/us-nationals-jailed-north-korea/</guid>
    </item>
    <item>
      <title>APK Malformation Found in Thousands of Android Malware Samples</title>
      <link>https://www.infosecurity-magazine.com/news/apk-malformation-android-malware/</link>
      <description>APK malformation tactic now appears in over 3000 Android malware samples evading static analysis</description>
      <pubDate>Thu, 16 Apr 2026 15:45:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/apk-malformation-android-malware/</guid>
    </item>
    <item>
      <title>Cookeville Medical Center Notifies Patients After July 2025 Ransomware Attack</title>
      <link>https://www.infosecurity-magazine.com/news/cookeville-medical-center-data/</link>
      <description>Tennessee's CRMC notifies over 337,000 patients of Rhysida ransomware breach exposing sensitive data</description>
      <pubDate>Thu, 16 Apr 2026 15:01:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/cookeville-medical-center-data/</guid>
    </item>
    <item>
      <title>NIST Drops NVD Enrichment for Pre-March 2026 Vulnerabilities</title>
      <link>https://www.infosecurity-magazine.com/news/nvd-enrichment-premarch-2026/</link>
      <description>NIST’s National Vulnerability Database will now prioritize enriching new and exploited flaws to address the record growth of reported CVEs</description>
      <pubDate>Thu, 16 Apr 2026 12:43:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/nvd-enrichment-premarch-2026/</guid>
    </item>
    <item>
      <title>Systemic Flaw in MCP Protocol Could Expose 150 Million Downloads</title>
      <link>https://www.infosecurity-magazine.com/news/systemic-flaw-mcp-expose-150/</link>
      <description>Ox Security claims as many as 200,000 servers are exposed by newly discovered MCP vulnerability </description>
      <pubDate>Thu, 16 Apr 2026 09:40:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/systemic-flaw-mcp-expose-150/</guid>
    </item>
    <item>
      <title>Automotive Ransomware Attacks Double in a Year</title>
      <link>https://www.infosecurity-magazine.com/news/automotive-ransomware-attacks/</link>
      <description>Halcyon says ransomware now accounts for more than two-fifths of cyber-attacks targeting carmakers</description>
      <pubDate>Thu, 16 Apr 2026 08:35:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/automotive-ransomware-attacks/</guid>
    </item>
    <item>
      <title>OpenAI Unveils GPT-5.4-Cyber for Improving Cyber Defense With AI</title>
      <link>https://www.infosecurity-magazine.com/news/openai-unveils-gpt-54-cyber-defense/</link>
      <description>OpenAI’s new frontier model focused on cybersecurity comes following Anthropic’s launch of Claude Mythos Preview and Project Glasswing </description>
      <pubDate>Wed, 15 Apr 2026 16:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/openai-unveils-gpt-54-cyber-defense/</guid>
    </item>
    <item>
      <title>European Cybersecurity Agency ENISA Seeks Top-Tier Status in CVE Program</title>
      <link>https://www.infosecurity-magazine.com/news/enisa-europe-seeks-top-level-root/</link>
      <description>The EU cybersecurity agency looks to become the third Top-Level Root CVE Numbering Authority, alongside CISA and MITRE</description>
      <pubDate>Wed, 15 Apr 2026 15:31:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/enisa-europe-seeks-top-level-root/</guid>
    </item>
    <item>
      <title>Signed Adware Operation Disables Antivirus Across 23,000 Hosts</title>
      <link>https://www.infosecurity-magazine.com/news/dragon-boss-adware-disables/</link>
      <description>Huntress uncovers adware deploying AV-killing payloads via signed updates across 23,000 endpoints</description>
      <pubDate>Wed, 15 Apr 2026 14:40:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/dragon-boss-adware-disables/</guid>
    </item>
    <item>
      <title>Critical Nginx-ui MCP Flaw Actively Exploited in the Wild</title>
      <link>https://www.infosecurity-magazine.com/news/nginx-ui-mcp-flaw-actively/</link>
      <description>Critical nginx-ui MCP authentication bypass CVE-2026-33032 actively exploited with CVSS 9.8</description>
      <pubDate>Wed, 15 Apr 2026 13:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/nginx-ui-mcp-flaw-actively/</guid>
    </item>
    <item>
      <title>AI Companies to Play Bigger Role in CVE Program, Says CISA</title>
      <link>https://www.infosecurity-magazine.com/news/ai-companies-to-play-bigger-role/</link>
      <description>At VulnCon, Lindsey Cerkovnik, head of vulnerability management at CISA, said AI companies should play a bigger role in vulnerability disclosures in the future</description>
      <pubDate>Wed, 15 Apr 2026 10:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/ai-companies-to-play-bigger-role/</guid>
    </item>
    <item>
      <title>Researchers Spot Surge in Brute-Force Attacks from Middle East</title>
      <link>https://www.infosecurity-magazine.com/news/researchers-surge-bruteforce/</link>
      <description>Barracuda says 88% of brute-force attempts in Q1 were from the region</description>
      <pubDate>Wed, 15 Apr 2026 09:45:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/researchers-surge-bruteforce/</guid>
    </item>
    <item>
      <title>Microsoft Fixes Two Zero-Days in April Patch Tuesday</title>
      <link>https://www.infosecurity-magazine.com/news/microsoft-two-zerodays-april-patch/</link>
      <description>Microsoft has patched two zero-day flaws and over 160 others</description>
      <pubDate>Wed, 15 Apr 2026 09:10:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/microsoft-two-zerodays-april-patch/</guid>
    </item>
    <item>
      <title>CISOs Urged to Innovate with Talent Retention as Job Satisfaction Declines</title>
      <link>https://www.infosecurity-magazine.com/news/cisos-innovate-talent-retention/</link>
      <description>A new IANS report claims just 34% of cybersecurity professionals plan to stay put in the next 12 months</description>
      <pubDate>Tue, 14 Apr 2026 13:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/cisos-innovate-talent-retention/</guid>
    </item>
    <item>
      <title>Triad Nexus Expands Global Fraud Operations Despite US Sanctions</title>
      <link>https://www.infosecurity-magazine.com/news/triad-nexus-expands-fraud/</link>
      <description>Triad Nexus scales $200m scams, uses infrastructure laundering, localized fraud and US-access blocks</description>
      <pubDate>Tue, 14 Apr 2026 12:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/triad-nexus-expands-fraud/</guid>
    </item>
    <item>
      <title>Malicious Chrome Extensions Campaign Exposes User Data</title>
      <link>https://www.infosecurity-magazine.com/news/chrome-extensions-expose-user-data/</link>
      <description>108 malicious Chrome extensions steal sessions, Google data, inject ads via single C2 infrastructure</description>
      <pubDate>Tue, 14 Apr 2026 11:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/chrome-extensions-expose-user-data/</guid>
    </item>
    <item>
      <title>AI Security Institute Advocates Security Best Practices After Mythos Test</title>
      <link>https://www.infosecurity-magazine.com/news/ai-security-institute-best/</link>
      <description>The AISI has issued its judgement on Anthropic’s Mythos Preview model</description>
      <pubDate>Tue, 14 Apr 2026 09:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/ai-security-institute-best/</guid>
    </item>
    <item>
      <title>Mailbox Rule Abuse Emerges as Stealthy Post-Compromise Threat</title>
      <link>https://www.infosecurity-magazine.com/news/mailbox-rule-abuse-stealthy-post/</link>
      <description>Attackers are abusing Microsoft 365 mailbox rules to hide activity, exfiltrate data and retain access after account compromise, researchers warn</description>
      <pubDate>Mon, 13 Apr 2026 15:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/mailbox-rule-abuse-stealthy-post/</guid>
    </item>
    <item>
      <title>Mirax Android Trojan Turns Devices Into Residential Proxy Nodes</title>
      <link>https://www.infosecurity-magazine.com/news/mirax-trojan-devices-proxy-nodes/</link>
      <description>Security researchers warn of Mirax, an emerging Android banking trojan using MaaS, remote access and residential proxies to target European users</description>
      <pubDate>Mon, 13 Apr 2026 14:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/mirax-trojan-devices-proxy-nodes/</guid>
    </item>
    <item>
      <title>FBI Dismantles $20m Phishing Operation W3LL</title>
      <link>https://www.infosecurity-magazine.com/news/fbi-dismantles-phishing-operation/</link>
      <description>The W3LL phishing kit has been associated with fraud attempts totaling $20m</description>
      <pubDate>Mon, 13 Apr 2026 10:35:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/fbi-dismantles-phishing-operation/</guid>
    </item>
    <item>
      <title>UK Cyber Security Council Launches Associate Cyber Security Professional Title</title>
      <link>https://www.infosecurity-magazine.com/news/associate-cyber-professional-title/</link>
      <description>The UK Cyber Security Council has unveiled a new Associate Cyber Security Professional title aimed at supporting early‑career cybersecurity professionals</description>
      <pubDate>Mon, 13 Apr 2026 09:15:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/associate-cyber-professional-title/</guid>
    </item>
    <item>
      <title>Operation Atlantic Seizes $12m in Crypto Losses</title>
      <link>https://www.infosecurity-magazine.com/news/operation-atlantic-seizes-12m/</link>
      <description>UK, US and Canadian authorities have identified over 20,000 victims of approval phishing scams that trick users into handing over full crypto wallet access</description>
      <pubDate>Mon, 13 Apr 2026 08:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/operation-atlantic-seizes-12m/</guid>
    </item>
    <item>
      <title>Just Three Ransomware Gangs Accounted for 40% of Attacks Last Month</title>
      <link>https://www.infosecurity-magazine.com/news/three-ransomware-gangs-40-percent/</link>
      <description>Qilin, Akira and Dragonforce were responsible for 40% of 672 ransomware incidents reported in March, says Check Point</description>
      <pubDate>Fri, 10 Apr 2026 12:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/three-ransomware-gangs-40-percent/</guid>
    </item>
    <item>
      <title>Google Chrome Rolls Out Protection Against Infostealers Targeting Session Cookies</title>
      <link>https://www.infosecurity-magazine.com/news/google-chrome-protection/</link>
      <description>Chrome’s Device Bound Session Credentials is designed to block infostealers from harvesting session cookie</description>
      <pubDate>Fri, 10 Apr 2026 11:25:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/google-chrome-protection/</guid>
    </item>
    <item>
      <title>STX RAT Targets Finance Sector With Advanced Stealth Tactics</title>
      <link>https://www.infosecurity-magazine.com/news/stx-rat-targets-finance-sector/</link>
      <description>STX RAT, a newly identified remote access trojan, attempted deployment in finance, showing advanced C2 and stealthy delivery methods</description>
      <pubDate>Thu, 09 Apr 2026 15:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/stx-rat-targets-finance-sector/</guid>
    </item>
    <item>
      <title>Bitcoin Depot Reports $3.6m Crypto Theft After System Breach</title>
      <link>https://www.infosecurity-magazine.com/news/bitcoin-depot-dollar36m-crypto/</link>
      <description>Bitcoin Depot has disclosed a cyber-attack that led to the theft of more than 50 Bitcoin, worth $3.66m, after hackers accessed its internal systems</description>
      <pubDate>Thu, 09 Apr 2026 14:01:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/bitcoin-depot-dollar36m-crypto/</guid>
    </item>
    <item>
      <title>Atomic Stealer MacOS ClickFix Attack Bypasses Apple Security Warnings</title>
      <link>https://www.infosecurity-magazine.com/news/atomic-stealer-macos-clickfix/</link>
      <description>macOS 26.4 update introduced security warnings into Terminal to prevent ClickFix attacks, so attackers have shifted to Script Editor instead</description>
      <pubDate>Thu, 09 Apr 2026 11:20:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/atomic-stealer-macos-clickfix/</guid>
    </item>
    <item>
      <title>Middle East Hack-for-Hire Operation Traced to South Asian Cyber Espionage Group</title>
      <link>https://www.infosecurity-magazine.com/news/middle-east-hack-operation-bitter/</link>
      <description>A spear-phishing campaign which spread across the Middle East between 2023 and 2024 has now been linked to Bitter APT group</description>
      <pubDate>Thu, 09 Apr 2026 10:45:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/middle-east-hack-operation-bitter/</guid>
    </item>
    <item>
      <title>Governance Gaps Emerge as AI Agents Drive 76% Increase in NHIs</title>
      <link>https://www.infosecurity-magazine.com/news/governance-gaps-agents-76-increase/</link>
      <description>SANS Institute reveals that AI agents are behind a 76% surge in non-human identities</description>
      <pubDate>Thu, 09 Apr 2026 10:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/governance-gaps-agents-76-increase/</guid>
    </item>
    <item>
      <title>Google Warns of New Threat Group Targeting BPOs and Helpdesks</title>
      <link>https://www.infosecurity-magazine.com/news/google-warns-group-targeting-bpos/</link>
      <description>Google’s threat intel team warns UNC6783, a new extortion group possibly linked to the “Raccoon” persona, is targeting BPOs and enterprises</description>
      <pubDate>Thu, 09 Apr 2026 08:35:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/google-warns-group-targeting-bpos/</guid>
    </item>
    <item>
      <title>Google API Keys Quietly Gain Access to Gemini on Android Devices</title>
      <link>https://www.infosecurity-magazine.com/news/google-api-keys-access-gemini/</link>
      <description>Google API key flaw exposes mobile apps to Gemini AI access, private files and billing risks</description>
      <pubDate>Wed, 08 Apr 2026 16:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/google-api-keys-access-gemini/</guid>
    </item>
    <item>
      <title>Critical Vulnerability in Ninja Forms Exposes WordPress Sites</title>
      <link>https://www.infosecurity-magazine.com/news/flaw-ninja-forms-wordpress/</link>
      <description>Ninja Forms File Upload RCE via unauthenticated arbitrary file upload; update to 3.3.27 immediately</description>
      <pubDate>Wed, 08 Apr 2026 15:10:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/flaw-ninja-forms-wordpress/</guid>
    </item>
    <item>
      <title>Anthropic Launches Project Glasswing to Use AI to Find and Fix Critical Software Vulnerabilities</title>
      <link>https://www.infosecurity-magazine.com/news/anthropic-launch-project-glasswing/</link>
      <description>Anthropic launches Project Glasswing, using its Claude Mythos Preview AI to autonomously identify and fix undiscovered vulnerabilities in critical software</description>
      <pubDate>Wed, 08 Apr 2026 11:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/anthropic-launch-project-glasswing/</guid>
    </item>
    <item>
      <title>US Thwarts DNS Hijacking Network Controlled by Russian APT28 Hackers</title>
      <link>https://www.infosecurity-magazine.com/news/us-thwarts-dns-hijacking-network/</link>
      <description>The FBI deployed a method to unplug US-based routers compromised by APT28 from the threat actor’s malicious network</description>
      <pubDate>Wed, 08 Apr 2026 10:03:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/us-thwarts-dns-hijacking-network/</guid>
    </item>
    <item>
      <title>Claude Discovers Apache ActiveMQ Bug Hidden for 13 Years</title>
      <link>https://www.infosecurity-magazine.com/news/claude-apache-activemq-bug-hidden/</link>
      <description>Anthropic’s Claude AI has helped researchers find a vulnerability in Apache ActiveMQ Classic</description>
      <pubDate>Wed, 08 Apr 2026 09:15:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/claude-apache-activemq-bug-hidden/</guid>
    </item>
    <item>
      <title>Iran‑Backed Threat Actors Hit US CNI Providers via Internet‑Facing OT Assets</title>
      <link>https://www.infosecurity-magazine.com/news/iranbacked-hackers-cni-ot-assets/</link>
      <description>CISA has revealed Iranian attacks causing disruption and financial loss at US critical infrastructure firms</description>
      <pubDate>Wed, 08 Apr 2026 08:15:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/iranbacked-hackers-cni-ot-assets/</guid>
    </item>
    <item>
      <title>Russian APT28 Hackers Hijack Routers to Steal Credentials, UK Security Agency Warns</title>
      <link>https://www.infosecurity-magazine.com/news/russia-apt28-hijack-routers-uk-ncsc/</link>
      <description>Newly identified malicious campaigns are linked to virtual private servers modified by APT28 to operate as malicious DNS servers</description>
      <pubDate>Tue, 07 Apr 2026 15:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/russia-apt28-hijack-routers-uk-ncsc/</guid>
    </item>
    <item>
      <title>GPU Rowhammer Attack Enables Privilege Escalation and Full System Compromise</title>
      <link>https://www.infosecurity-magazine.com/news/gpu-based-rowhammer-attack/</link>
      <description>GPUBreach uses GPU Rowhammer on GDDR6 to flip bits, corrupt page tables and escalate to system root</description>
      <pubDate>Tue, 07 Apr 2026 15:05:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/gpu-based-rowhammer-attack/</guid>
    </item>
    <item>
      <title>GrafanaGhost Exploit Bypasses AI Guardrails for Silent Data Exfiltration</title>
      <link>https://www.infosecurity-magazine.com/news/grafanaghost-silent-data/</link>
      <description>GrafanaGhost chains AI prompt injection and URL flaws to exfiltrate sensitive Grafana data</description>
      <pubDate>Tue, 07 Apr 2026 14:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/grafanaghost-silent-data/</guid>
    </item>
    <item>
      <title>Over $17bn Lost to Cyber Fraud in the Last Year, Warns FBI</title>
      <link>https://www.infosecurity-magazine.com/news/17bn-lost-to-cyber-fraud-warns-fbi/</link>
      <description>Cryptocurrency scams alone cost victims over $7 billion, while AI-enabled fraud threats are on the rise, says FBI</description>
      <pubDate>Tue, 07 Apr 2026 12:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/17bn-lost-to-cyber-fraud-warns-fbi/</guid>
    </item>
    <item>
      <title>Storm-1175 Exploits Flaws in High-Velocity Medusa Attacks</title>
      <link>https://www.infosecurity-magazine.com/news/storm1175-medusa-attacks/</link>
      <description>Microsoft has released a new report about the Storm-1175 group and its connection to Medusa ransomware</description>
      <pubDate>Tue, 07 Apr 2026 10:02:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/storm1175-medusa-attacks/</guid>
    </item>
    <item>
      <title>Fortinet Releases Emergency Patch After FortiClient EMS Bug Is Exploited</title>
      <link>https://www.infosecurity-magazine.com/news/fortinet-emergency-patch-ems-bug/</link>
      <description>Fortinet has updated its FortiClient EMS product after zero-day attacks surfaced </description>
      <pubDate>Tue, 07 Apr 2026 09:26:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/fortinet-emergency-patch-ems-bug/</guid>
    </item>
    <item>
      <title>New Phishing Platform Used in Credential Theft Campaigns Against C-Suite Execs</title>
      <link>https://www.infosecurity-magazine.com/news/new-phishing-platform-credential/</link>
      <description>A large-scale credential theft campaign targeting senior executives has been linked to a previously unknown automated phishing platform called Venom</description>
      <pubDate>Fri, 03 Apr 2026 08:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/new-phishing-platform-credential/</guid>
    </item>
    <item>
      <title>New 'Storm' Infostealer Remotely Decrypts Stolen Credentials</title>
      <link>https://www.infosecurity-magazine.com/news/storm-infostealer-remotely/</link>
      <description>This modern infostealer adopted server-side decryption of stolen credentials to bypass security controls</description>
      <pubDate>Thu, 02 Apr 2026 15:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/storm-infostealer-remotely/</guid>
    </item>
    <item>
      <title>NCSC Issues Security Alert Over Hackers Targeting WhatsApp and Signal Accounts</title>
      <link>https://www.infosecurity-magazine.com/news/ncsc-alert-hackers-whatsapp-signal/</link>
      <description>The UK’s cybersecurity agency offered advice to “high-risk’ individuals” on how to protect against social engineering and cyber-attacks</description>
      <pubDate>Thu, 02 Apr 2026 14:15:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/ncsc-alert-hackers-whatsapp-signal/</guid>
    </item>
    <item>
      <title>Apple Expands iOS 18 Security Updates Amid DarkSword Threat</title>
      <link>https://www.infosecurity-magazine.com/news/apple-ios-18-updates-darksword/</link>
      <description>iOS/iPadOS 18.7.7 updates expanded to protect older devices from DarkSword web exploit kit</description>
      <pubDate>Thu, 02 Apr 2026 13:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/apple-ios-18-updates-darksword/</guid>
    </item>
    <item>
      <title>Researchers Observe Sub-One-Hour Ransomware Attacks</title>
      <link>https://www.infosecurity-magazine.com/news/researchers-subonehour-ransomware/</link>
      <description>Halcyon says Akira is now capable of carrying out an entire ransomware attack in less than an hour</description>
      <pubDate>Thu, 02 Apr 2026 13:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/researchers-subonehour-ransomware/</guid>
    </item>
    <item>
      <title>GitHub Used as Covert Channel in Multi-Stage Malware Campaign</title>
      <link>https://www.infosecurity-magazine.com/news/github-covert-multi-stage-malware/</link>
      <description>LNK files use GitHub C2, embedded decoders and PowerShell for persistence and data exfiltration</description>
      <pubDate>Thu, 02 Apr 2026 13:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/github-covert-multi-stage-malware/</guid>
    </item>
    <item>
      <title>Most CNI Firms Face Up to £5m in Downtime from OT Attacks</title>
      <link>https://www.infosecurity-magazine.com/news/most-cni-firms-5m-downtime-ot/</link>
      <description>E2e-assure says 80% of critical infrastructure providers could face millions in downtime from cyber-attacks</description>
      <pubDate>Thu, 02 Apr 2026 08:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/most-cni-firms-5m-downtime-ot/</guid>
    </item>
    <item>
      <title>Google Introduces Android Dev Verification Amid Openness Debate</title>
      <link>https://www.infosecurity-magazine.com/news/google-android-dev-verification/</link>
      <description>Android requires dev identity verification for sideloaded apps; phased global rollout from September</description>
      <pubDate>Wed, 01 Apr 2026 15:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/google-android-dev-verification/</guid>
    </item>
    <item>
      <title>New Venom Stealer MaaS Platform Automates Continuous Data Theft</title>
      <link>https://www.infosecurity-magazine.com/news/venom-stealer-maas-automates-data/</link>
      <description>Venom Stealer malware-as-a-service automates ClickFix social engineering, credential and crypto exfiltration</description>
      <pubDate>Wed, 01 Apr 2026 13:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/venom-stealer-maas-automates-data/</guid>
    </item>
    <item>
      <title>Chinese Hackers Target European Governments in Espionage Campaigns</title>
      <link>https://www.infosecurity-magazine.com/news/china-hackers-ta416-europe/</link>
      <description>Chinese state-backed group TA416 had suspended its cyber espionage operations in Europe since 2023, noted Proofpoint</description>
      <pubDate>Wed, 01 Apr 2026 12:05:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/china-hackers-ta416-europe/</guid>
    </item>
    <item>
      <title>Eight in 10 UK Manufacturers Hit by Cyber Incident in a Year</title>
      <link>https://www.infosecurity-magazine.com/news/eight-10-uk-manufacturers-hit/</link>
      <description>Most UK manufacturers compromised last year suffered financial loss, says ESET</description>
      <pubDate>Wed, 01 Apr 2026 09:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/eight-10-uk-manufacturers-hit/</guid>
    </item>
    <item>
      <title>Hackers Hijack Axios npm Package to Spread RATs</title>
      <link>https://www.infosecurity-magazine.com/news/hackers-hijack-axios-npm-package/</link>
      <description>Threat actors hijacked the popular npm package axios to spread RAT malware after compromising an open‑source maintainer’s account, researchers warn</description>
      <pubDate>Wed, 01 Apr 2026 09:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/hackers-hijack-axios-npm-package/</guid>
    </item>
    <item>
      <title>Maryland Man Charged Over $53m Uranium Finance Crypto Hack</title>
      <link>https://www.infosecurity-magazine.com/news/man-charged-uranium-crypto-hack/</link>
      <description>Maryland man accused of $53m Uranium Finance hack, exploited smart contract flaws, laundered funds</description>
      <pubDate>Tue, 31 Mar 2026 15:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/man-charged-uranium-crypto-hack/</guid>
    </item>
    <item>
      <title>Phantom Project Bundles Infostealer, Crypter and RAT For Sale</title>
      <link>https://www.infosecurity-magazine.com/news/phantom-project-infostealer-nov-25/</link>
      <description>Phantom Stealer .NET harvests browser credentials, cookies, cards, sessions, as stealer-as-a-service</description>
      <pubDate>Tue, 31 Mar 2026 14:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/phantom-project-infostealer-nov-25/</guid>
    </item>
    <item>
      <title>ChatGPT Security Issue Enabled Data Theft via Single Prompt</title>
      <link>https://www.infosecurity-magazine.com/news/chatgpt-security-issue-steal-data/</link>
      <description>OpenAI has patched vulnerability, which Check Point said was because of a DNS loophole
</description>
      <pubDate>Tue, 31 Mar 2026 13:01:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/chatgpt-security-issue-steal-data/</guid>
    </item>
    <item>
      <title>TeamPCP Explores Ways to Exploit Stolen Supply Chain Secrets</title>
      <link>https://www.infosecurity-magazine.com/news/teampcp-exploit-stolen-supply/</link>
      <description>TeamPCP is exploring ways to monetize the secrets harvested during supply chain attacks, with identified ties to the Lapsus$ and Vect ransomware gangs</description>
      <pubDate>Tue, 31 Mar 2026 12:15:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/teampcp-exploit-stolen-supply/</guid>
    </item>
    <item>
      <title>Employee Data Breaches Surge to Seven-Year High</title>
      <link>https://www.infosecurity-magazine.com/news/employee-data-breaches-surge/</link>
      <description>Analysis from law firm Nockolds suggests non-cyber incidents are driving up employee data breaches</description>
      <pubDate>Tue, 31 Mar 2026 10:01:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/employee-data-breaches-surge/</guid>
    </item>
    <item>
      <title>NCSC Urges Immediate Patching of F5 BIG-IP Bug</title>
      <link>https://www.infosecurity-magazine.com/news/ncsc-urges-immediate-patching-f5/</link>
      <description>The National Cyber Security Centre wants UK firms to patch CVE-2025-53521</description>
      <pubDate>Tue, 31 Mar 2026 08:45:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/ncsc-urges-immediate-patching-f5/</guid>
    </item>
    <item>
      <title>Cybercriminals Exploit Tax Season With New Phishing Tactics</title>
      <link>https://www.infosecurity-magazine.com/news/tax-season-new-phishing-tactics/</link>
      <description>Tax-season phishing floods deliver RMM malware, credential theft, BEC and tax-form scams</description>
      <pubDate>Mon, 30 Mar 2026 15:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/tax-season-new-phishing-tactics/</guid>
    </item>
    <item>
      <title>Lloyds IT Glitch Exposed Data of Nearly 500,000 Banking Customers</title>
      <link>https://www.infosecurity-magazine.com/news/lloyds-glitch-exposed-500000/</link>
      <description>Lloyds app glitch exposed up to 447,936 customers’ transactions and personal data during update</description>
      <pubDate>Mon, 30 Mar 2026 14:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/lloyds-glitch-exposed-500000/</guid>
    </item>
    <item>
      <title>DeepLoad Malware Combines ClickFix With AI-Generated Code to Avoid Detection</title>
      <link>https://www.infosecurity-magazine.com/news/deepload-malware-clickfix-ai-code/</link>
      <description>Researchers at ReliaQuest warn of persistent malware campaign targeting enterprise credentials</description>
      <pubDate>Mon, 30 Mar 2026 12:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/deepload-malware-clickfix-ai-code/</guid>
    </item>
    <item>
      <title>Critical Citrix NetScaler Vulnerability Exploited in the Wild</title>
      <link>https://www.infosecurity-magazine.com/news/critical-citrix-netscaler/</link>
      <description>Researchers from watchTowr and Defused have found evidence that attackers are actively exploiting CVE-2026-3055, a critical NetScaler vulnerability</description>
      <pubDate>Mon, 30 Mar 2026 10:45:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/critical-citrix-netscaler/</guid>
    </item>
    <item>
      <title>ICO Fines UK Nuisance Call Scammers £100,000</title>
      <link>https://www.infosecurity-magazine.com/news/ico-fines-uk-nuisance-call/</link>
      <description>The UK Information Commissioner’s Office has handed a £100,000 fine to Birmingham-based TMAC</description>
      <pubDate>Mon, 30 Mar 2026 09:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/ico-fines-uk-nuisance-call/</guid>
    </item>
    <item>
      <title>European Commission Confirms Cloud Data Breach</title>
      <link>https://www.infosecurity-magazine.com/news/european-commission-cloud-data/</link>
      <description>The European Commission has revealed details of a data breach impacting its AWS infrastructure</description>
      <pubDate>Mon, 30 Mar 2026 08:15:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/european-commission-cloud-data/</guid>
    </item>
    <item>
      <title>New Wave of AiTM Phishing Targets TikTok for Business</title>
      <link>https://www.infosecurity-magazine.com/news/phishing-targets-tiktok-for/</link>
      <description>Push Security has uncovered a new AiTM phishing campaign targeting TikTok for Business accounts using Google  and TikTok themed login pages</description>
      <pubDate>Fri, 27 Mar 2026 16:01:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/phishing-targets-tiktok-for/</guid>
    </item>
    <item>
      <title>TeamPCP Targets Telnyx Package in Latest PyPI Software Supply Chain Attack</title>
      <link>https://www.infosecurity-magazine.com/news/teampcp-targets-telnyx-pypi-package/</link>
      <description>Socket and Endor Labs discovered a new TeamPCP campaign leading to the delivery of credential-stealing malware</description>
      <pubDate>Fri, 27 Mar 2026 15:06:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/teampcp-targets-telnyx-pypi-package/</guid>
    </item>
    <item>
      <title>Quantum Computing Threat to Encryption Is Closer Than Expected, Warns Google</title>
      <link>https://www.infosecurity-magazine.com/news/quantum-encryption-q-day-closer/</link>
      <description>‘Q-Day’ and the cybersecurity problems it brings could come as early as 2029 as Google accelerates its post-quantum cryptography migration</description>
      <pubDate>Fri, 27 Mar 2026 12:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/quantum-encryption-q-day-closer/</guid>
    </item>
    <item>
      <title>UK Cracks Down on Chinese Crypto Marketplace for Funding Southeast Asia Scam Hubs</title>
      <link>https://www.infosecurity-magazine.com/news/uk-sanction-chinese-crypto/</link>
      <description>The UK government has sanctioned Xinbi, described as “the second-largest illicit online marketplace ever”</description>
      <pubDate>Fri, 27 Mar 2026 12:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/uk-sanction-chinese-crypto/</guid>
    </item>
    <item>
      <title>Security Researchers Sound the Alarm on Vulnerabilities in AI-Generated Code</title>
      <link>https://www.infosecurity-magazine.com/news/ai-generated-code-vulnerabilities/</link>
      <description>Security researchers from Georgia Tech have observed a surge in reported CVEs for which the flaw was introduced by AI-generated code</description>
      <pubDate>Thu, 26 Mar 2026 16:40:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/ai-generated-code-vulnerabilities/</guid>
    </item>
    <item>
      <title>Attackers Rapidly Weaponize Critical Oracle WebLogic RCE, Honeypot Study Finds</title>
      <link>https://www.infosecurity-magazine.com/news/critical-oracle-weblogic-rce/</link>
      <description>Attackers rapidly exploited a critical Oracle WebLogic RCE flaw the same day exploit code was released, according to a CloudSEK honeypot study</description>
      <pubDate>Thu, 26 Mar 2026 16:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/critical-oracle-weblogic-rce/</guid>
    </item>
    <item>
      <title>EtherRAT Techniques Bypass Security Via Ethereum Smart Contracts</title>
      <link>https://www.infosecurity-magazine.com/news/etherrat-bypass-security-ethereum/</link>
      <description>EtherRAT hides C2 in Ethereum smart contracts via EtherHiding, steals wallets and credentials</description>
      <pubDate>Thu, 26 Mar 2026 15:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/etherrat-bypass-security-ethereum/</guid>
    </item>
    <item>
      <title>AI Becomes the Top Cybersecurity Priority for Defenders as Criminals Exploit It, PwC Warns</title>
      <link>https://www.infosecurity-magazine.com/news/ai-top-cyber-priority-defenders-pwc/</link>
      <description>PwC Annual Threat Dynamics report says AI-threats are the biggest concern of clients</description>
      <pubDate>Thu, 26 Mar 2026 13:15:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/ai-top-cyber-priority-defenders-pwc/</guid>
    </item>
    <item>
      <title>OpenAI Expands Bug Bounty to Cover AI Abuse and 'Safety' Concerns</title>
      <link>https://www.infosecurity-magazine.com/news/openai-bug-bounty-ai-abuse-safety/</link>
      <description>OpenAI’s Safety Bug Bounty program seeks to address AI safety vulnerabilities beyond traditional security flaws</description>
      <pubDate>Thu, 26 Mar 2026 12:20:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/openai-bug-bounty-ai-abuse-safety/</guid>
    </item>
    <item>
      <title>Iran-Linked Pay2Key Ransomware Group Re-Emerges</title>
      <link>https://www.infosecurity-magazine.com/news/iranlinked-pay2key-ransomware/</link>
      <description>Halcyon and Beazley Security track the return of Iranian ransomware group Pay2Key</description>
      <pubDate>Thu, 26 Mar 2026 10:45:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/iranlinked-pay2key-ransomware/</guid>
    </item>
    <item>
      <title>Invoice Fraud Costs UK Construction Sector Millions, NCA Warns</title>
      <link>https://www.infosecurity-magazine.com/news/invoice-fraud-uk-construction/</link>
      <description>The National Crime Agency has warned construction firms about surging invoice fraud</description>
      <pubDate>Thu, 26 Mar 2026 10:07:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/invoice-fraud-uk-construction/</guid>
    </item>
    <item>
      <title>Cloud Phones Linked to Rising Financial Fraud Threat</title>
      <link>https://www.infosecurity-magazine.com/news/cloud-phones-financial-fraud/</link>
      <description>Cloud Android phones fuel financial fraud, evading detection and enabling dropper accounts</description>
      <pubDate>Wed, 25 Mar 2026 16:05:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/cloud-phones-financial-fraud/</guid>
    </item>
    <item>
      <title>Hackers Exploit Compromised Enterprise Identities at Industrial Scale, Warns SentinelOne</title>
      <link>https://www.infosecurity-magazine.com/news/hackers-exploit-id-industrial-scale/</link>
      <description>Cybersecurity company’s annual report issues warning over a “mass-marketed impersonation crisis” over attackers abusing legitimate credentials </description>
      <pubDate>Wed, 25 Mar 2026 15:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/hackers-exploit-id-industrial-scale/</guid>
    </item>
    <item>
      <title>US: FCC Bans Foreign-Made Routers Over National Security Concerns</title>
      <link>https://www.infosecurity-magazine.com/news/us-fcc-bans-foreign-made-routers/</link>
      <description>The US Federal Communications Commission has placed all “consumer-grade” internet routers produced outside the US on its “covered list”</description>
      <pubDate>Wed, 25 Mar 2026 12:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/us-fcc-bans-foreign-made-routers/</guid>
    </item>
    <item>
      <title>TeamPCP Expands Supply Chain Campaign With LiteLLM PyPI Compromise</title>
      <link>https://www.infosecurity-magazine.com/news/teampcp-litellm-pypi-supply-chain/</link>
      <description>Python package LiteLLM compromised with credential-stealing malware linked to TeamPCP threat group</description>
      <pubDate>Wed, 25 Mar 2026 12:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/teampcp-litellm-pypi-supply-chain/</guid>
    </item>
    <item>
      <title>Experts Sound Alarm Over “Prompt Poaching” Browser Extensions</title>
      <link>https://www.infosecurity-magazine.com/news/experts-prompt-poaching-browser/</link>
      <description>Expel has warned of malicious Chrome extensions stealing users’ AI conversations</description>
      <pubDate>Wed, 25 Mar 2026 11:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/experts-prompt-poaching-browser/</guid>
    </item>
    <item>
      <title>Operation Henhouse Nets Over 500 Arrests in UK Fraud Crackdown</title>
      <link>https://www.infosecurity-magazine.com/news/police-fraud-crackdown-leads-to/</link>
      <description>UK police trumpet success of Operation Henhouse as they seize and freeze over £27m in suspected fraud proceeds</description>
      <pubDate>Wed, 25 Mar 2026 09:35:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/police-fraud-crackdown-leads-to/</guid>
    </item>
    <item>
      <title>RSA Conference: UK NCSC Head Urges Industry to Develop Vibe Coding Safeguards</title>
      <link>https://www.infosecurity-magazine.com/news/rsac-uk-ncsc-urges-vibe-coding/</link>
      <description>The head of the UK’s NCSC is calling the cybersecurity industry to “seize the disruptive vibe coding opportunity” to make software more secure</description>
      <pubDate>Tue, 24 Mar 2026 21:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/rsac-uk-ncsc-urges-vibe-coding/</guid>
    </item>
    <item>
      <title>Silver Fox Cyber Campaigns Show Shift Toward Dual Espionage</title>
      <link>https://www.infosecurity-magazine.com/news/silver-fox-cyber-dual-espionage/</link>
      <description>Silver Fox pivots from ValleyRAT tax lures to WhatsApp‑style stealers, blending espionage &amp; phishing</description>
      <pubDate>Tue, 24 Mar 2026 16:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/silver-fox-cyber-dual-espionage/</guid>
    </item>
    <item>
      <title>Citrix Urges Immediate Patching for Critical NetScaler Vulnerabilities</title>
      <link>https://www.infosecurity-magazine.com/news/citrix-patch-netscaler/</link>
      <description>A critical vulnerability in Citrix’s NetScaler products allows unauthenticated remote attackers to leak information from the appliance's memory</description>
      <pubDate>Tue, 24 Mar 2026 15:15:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/citrix-patch-netscaler/</guid>
    </item>
    <item>
      <title>New Npm 'Ghost Campaign' Uses Fake Install Logs to Hide Malware</title>
      <link>https://www.infosecurity-magazine.com/news/npm-ghost-campaign-fake-install/</link>
      <description>Ghost npm campaign fakes install logs to steal sudo passwords and drop RATs that loot crypto and data</description>
      <pubDate>Tue, 24 Mar 2026 14:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/npm-ghost-campaign-fake-install/</guid>
    </item>
    <item>
      <title>Former Ukrainian Foreign Minister Dmytro Kuleba to Address the New Cyber Frontline at Infosecurity Europe</title>
      <link>https://www.infosecurity-magazine.com/news/foreign-minister-kuleba/</link>
      <description>Geopolitics and cyber warfare take center stage at Infosecurity Europe as Dmytro Kuleba discusses Ukraine’s hybrid war experience</description>
      <pubDate>Tue, 24 Mar 2026 14:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/foreign-minister-kuleba/</guid>
    </item>
    <item>
      <title>Enterprise Cybersecurity Software Fails 20% of the Time, Warns Absolute Security</title>
      <link>https://www.infosecurity-magazine.com/news/cybersecurity-software-failure-20/</link>
      <description>Poor patch management, increasingly complex IT environments and continued use of obsolete software puts organizations at risk from cyber threats, says the Absolute Security 2026 Resilience Risk Index</description>
      <pubDate>Tue, 24 Mar 2026 13:15:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/cybersecurity-software-failure-20/</guid>
    </item>
    <item>
      <title>Russian Initial Access Broker Handed 81-Month Sentence</title>
      <link>https://www.infosecurity-magazine.com/news/russian-initial-access-broker/</link>
      <description>Russian cybercriminal Aleksei Volkov has received close to seven years behind bars for role in Yanluowang ransomware </description>
      <pubDate>Tue, 24 Mar 2026 10:32:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/russian-initial-access-broker/</guid>
    </item>
    <item>
      <title>Handala Group Tied to Iranian Hack‑and‑Leak Operations, FBI Reveals</title>
      <link>https://www.infosecurity-magazine.com/news/handala-group-iranian-hack-and/</link>
      <description>The FBI has warned that Iranian hacking group Handala has been targeting opponents of the regime since 2023</description>
      <pubDate>Tue, 24 Mar 2026 09:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/handala-group-iranian-hack-and/</guid>
    </item>
    <item>
      <title>Most Cybersecurity Staff Don’t Know How Fast They Could Stop a Cyber-Attack on AI Systems</title>
      <link>https://www.infosecurity-magazine.com/news/cyber-staff-unsure-on-preventing/</link>
      <description>ISACA survey found that confusion over responsibility and lack of understanding around AI cyber-attacks makes containing them difficult</description>
      <pubDate>Mon, 23 Mar 2026 16:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/cyber-staff-unsure-on-preventing/</guid>
    </item>
    <item>
      <title>Tycoon2FA Phishing Service Resumes Activity Post-Takedown</title>
      <link>https://www.infosecurity-magazine.com/news/tycoon2fa-phishing-service-resumes/</link>
      <description>Tycoon2FA phishing platform resumes activity post-takedown, leveraging AITM techniques to bypass MFA</description>
      <pubDate>Mon, 23 Mar 2026 16:05:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/tycoon2fa-phishing-service-resumes/</guid>
    </item>
    <item>
      <title>High-Tech Sector Overtakes Finance as Top Target for Cyber-Attacks, Mandiant Reports</title>
      <link>https://www.infosecurity-magazine.com/news/high-tech-top-target-cyberattacks/</link>
      <description>High tech was the most frequently targeted industry in Mandiant investigations in 2025, overtaking financial services which led in 2023 and 2024</description>
      <pubDate>Mon, 23 Mar 2026 15:35:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/high-tech-top-target-cyberattacks/</guid>
    </item>
    <item>
      <title>Trivy Supply Chain Attack Expands With New Compromised Docker Images</title>
      <link>https://www.infosecurity-magazine.com/news/trivy-supply-chain-attack-expands/</link>
      <description>New Trivy Docker images 0.69.5 and 0.69.6 compromised with TeamPCP infostealer, impacting CI/CD scans</description>
      <pubDate>Mon, 23 Mar 2026 15:05:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/trivy-supply-chain-attack-expands/</guid>
    </item>
    <item>
      <title>CISA Orders US Government to Patch Maximum Severity Cisco Flaw</title>
      <link>https://www.infosecurity-magazine.com/news/cisa-orders-us-government-patch/</link>
      <description>CISA added CVE-2026-20131 to its KEV catalog as it is being used in ransomware campaigns</description>
      <pubDate>Mon, 23 Mar 2026 10:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/cisa-orders-us-government-patch/</guid>
    </item>
    <item>
      <title>Operation Alice Takes Down 370,000+ Dark Web Sites</title>
      <link>https://www.infosecurity-magazine.com/news/operation-alice-370000-dark-web/</link>
      <description>German-led policing effort against fraud operation disrupts countless CSAM and cybercrime sites</description>
      <pubDate>Mon, 23 Mar 2026 09:10:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/operation-alice-370000-dark-web/</guid>
    </item>
    <item>
      <title>Hackers Exploit Critical Langflow Bug in Just 20 Hours </title>
      <link>https://www.infosecurity-magazine.com/news/hackers-exploit-critical-langflow/</link>
      <description>Sysdig details how threat actors exploited a critical CVE in Langflow in less than a day </description>
      <pubDate>Fri, 20 Mar 2026 10:20:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/hackers-exploit-critical-langflow/</guid>
    </item>
    <item>
      <title>NCA Boss Warns That Teens Are Being “Radicalized” Into Cybercrime Online</title>
      <link>https://www.infosecurity-magazine.com/news/nca-boss-warns-teens-radicalized/</link>
      <description>The National Crime Agency’s director general warns that technology is rapidly reshaping crime</description>
      <pubDate>Fri, 20 Mar 2026 09:40:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/nca-boss-warns-teens-radicalized/</guid>
    </item>
    <item>
      <title>Ransomware Affiliate Exposes Details of 'The Gentlemen' Operation</title>
      <link>https://www.infosecurity-magazine.com/news/ransomware-affiliate-gentlemen/</link>
      <description>Hastalamuerte leaks The Gentlemen RaaS ops: FortiGate exploits, BYOVD evasion, Qilin split tactics</description>
      <pubDate>Thu, 19 Mar 2026 16:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/ransomware-affiliate-gentlemen/</guid>
    </item>
    <item>
      <title>Financial Brands Targeted in Global Mobile Banking Malware Surge</title>
      <link>https://www.infosecurity-magazine.com/news/financial-brands-mobile-banking/</link>
      <description>Mobile banking malware targets over 1200 financial apps globally, shifting fraud to user devices</description>
      <pubDate>Thu, 19 Mar 2026 14:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/financial-brands-mobile-banking/</guid>
    </item>
    <item>
      <title>FCA Updates Cyber Incident and Third-Party Reporting Rules </title>
      <link>https://www.infosecurity-magazine.com/news/fca-updates-incident-thirdparty/</link>
      <description>The UK’s financial regulator has issued new rules to make incident and third-party reporting clearer </description>
      <pubDate>Thu, 19 Mar 2026 10:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/fca-updates-incident-thirdparty/</guid>
    </item>
    <item>
      <title>AWS Warns Hackers Have Abused Cisco Firewall Zero-Day Since January</title>
      <link>https://www.infosecurity-magazine.com/news/interlock-ransomware-exploit-cisco/</link>
      <description>Notorious ransomware group Interlock has been exploiting a Cisco zero-day bug since January, AWS says</description>
      <pubDate>Thu, 19 Mar 2026 09:50:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/interlock-ransomware-exploit-cisco/</guid>
    </item>
    <item>
      <title>UK: Regulation Drives Cyber Spending for Critical Infrastructure Orgs</title>
      <link>https://www.infosecurity-magazine.com/news/uk-regulation-drives-cyber/</link>
      <description>35% of security leaders working in the UK’s critical infrastructure said regulatory requirements are the primary influence on their security programs</description>
      <pubDate>Thu, 19 Mar 2026 09:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/uk-regulation-drives-cyber/</guid>
    </item>
    <item>
      <title>New Ubuntu Flaw Enables Local Attackers to Gain Root Access</title>
      <link>https://www.infosecurity-magazine.com/news/ubuntu-flaw-enables-root-access/</link>
      <description>CVE-2026-3888 Ubuntu snap flaw lets local users escalate to root via timing-based exploit</description>
      <pubDate>Wed, 18 Mar 2026 15:45:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/ubuntu-flaw-enables-root-access/</guid>
    </item>
    <item>
      <title>Crypto Scam "ShieldGuard" Dismantled After Malware Discovery</title>
      <link>https://www.infosecurity-magazine.com/news/crypto-scam-shieldguard-dismantled/</link>
      <description>ShieldGuard Chrome extension posed as a crypto security tool but stole wallets and drained user data</description>
      <pubDate>Wed, 18 Mar 2026 14:15:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/crypto-scam-shieldguard-dismantled/</guid>
    </item>
    <item>
      <title>AI-Enabled Adversaries Compress Time-to-Exploit Following Vulnerability Disclosure</title>
      <link>https://www.infosecurity-magazine.com/news/exploitation-accelerates-in-2025/</link>
      <description>Rapid7 says median time from publication to CISA KEV inclusion dropped to five days</description>
      <pubDate>Wed, 18 Mar 2026 13:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/exploitation-accelerates-in-2025/</guid>
    </item>
    <item>
      <title>Vidar Stealer 2.0 Exploits GitHub, Reddit to Deliver Malware via Fake Game Cheats</title>
      <link>https://www.infosecurity-magazine.com/news/vidar-stealer-exploits-github/</link>
      <description>The Vidar 2.0 infostealers is deployed through fake free game cheats on GitHub and Reddit</description>
      <pubDate>Wed, 18 Mar 2026 11:15:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/vidar-stealer-exploits-github/</guid>
    </item>
    <item>
      <title>AI Issues Will Drive Half of Incident Response Efforts by 2028, Says Gartner</title>
      <link>https://www.infosecurity-magazine.com/news/ai-issues-half-incident-response/</link>
      <description>Gartner has urged security teams to get involved in AI projects from the start to avoid costly incident response</description>
      <pubDate>Wed, 18 Mar 2026 09:40:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/ai-issues-half-incident-response/</guid>
    </item>
    <item>
      <title>Android OS-Level Attack Bypasses Mobile Payment Security</title>
      <link>https://www.infosecurity-magazine.com/news/android-attack-bypasses-payment/</link>
      <description>Android’s LSPosed-based attack hijacks payment apps via runtime manipulation and SIM-binding bypass</description>
      <pubDate>Tue, 17 Mar 2026 16:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/android-attack-bypasses-payment/</guid>
    </item>
    <item>
      <title>'CursorJack’ Attack Path Exposes Code Execution Risk in AI Development Environment</title>
      <link>https://www.infosecurity-magazine.com/news/cursor-jack-attack-path-ai/</link>
      <description>CursorJack shows how malicious MCP deeplinks in Cursor IDE can trigger user-approved code execution</description>
      <pubDate>Tue, 17 Mar 2026 15:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/cursor-jack-attack-path-ai/</guid>
    </item>
    <item>
      <title>Surge in Nation State Attacks on UK Firms Amid Cyber Warfare Fears</title>
      <link>https://www.infosecurity-magazine.com/news/nation-state-attacks-uk-firms/</link>
      <description>Armis reveals that “mutually assured disruption” is no longer preventing state-backed attacks</description>
      <pubDate>Tue, 17 Mar 2026 12:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/nation-state-attacks-uk-firms/</guid>
    </item>
    <item>
      <title>Average Number of Daily API Attacks Up 113% Annually</title>
      <link>https://www.infosecurity-magazine.com/news/average-number-daily-api-attacks/</link>
      <description>Akamai says 87% of organizations suffered an API-related security incident last year</description>
      <pubDate>Tue, 17 Mar 2026 10:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/average-number-daily-api-attacks/</guid>
    </item>
    <item>
      <title>UK Cyber Monitoring Centre Sets Its Sights on US Expansion One Year After Launch</title>
      <link>https://www.infosecurity-magazine.com/news/uk-cyber-monitoring-centre-us/</link>
      <description>The US Cyber Monitoring Center should be operational in 2027, said the UK CMC leadership</description>
      <pubDate>Tue, 17 Mar 2026 10:15:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/uk-cyber-monitoring-centre-us/</guid>
    </item>
    <item>
      <title>Researchers Warn of Global Surge in Fake Shipment Tracking Scams</title>
      <link>https://www.infosecurity-magazine.com/news/global-surge-fake-shipment/</link>
      <description>Some of these campaigns are linked to Darcula, a Chinese-language phishing-as-a-service platform</description>
      <pubDate>Mon, 16 Mar 2026 14:45:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/global-surge-fake-shipment/</guid>
    </item>
    <item>
      <title>CrackArmor Flaws Expose Linux Systems to Privilege Escalation</title>
      <link>https://www.infosecurity-magazine.com/news/crackarmor-linux-privilege/</link>
      <description>CrackArmor AppArmor flaws let local Linux users gain root, break containers and enable DoS attacks</description>
      <pubDate>Mon, 16 Mar 2026 14:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/crackarmor-linux-privilege/</guid>
    </item>
    <item>
      <title>Security Flaw in AWS Bedrock Code Interpreter Raises Alarms</title>
      <link>https://www.infosecurity-magazine.com/news/security-flaw-aws-bedrock/</link>
      <description>DNS-based attack in AWS Bedrock AgentCore lets AI sandboxes exfiltrate cloud data</description>
      <pubDate>Mon, 16 Mar 2026 13:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/security-flaw-aws-bedrock/</guid>
    </item>
    <item>
      <title>FBI Calls for Help to Track Steam Malware Campaign</title>
      <link>https://www.infosecurity-magazine.com/news/fbi-calls-help-track-steam-malware/</link>
      <description>The FBI wants to hear from gamers who have downloaded Steam titles containing malware</description>
      <pubDate>Mon, 16 Mar 2026 11:15:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/fbi-calls-help-track-steam-malware/</guid>
    </item>
    <item>
      <title>UK: Companies House Web Glitch Exposes Corporate Details to Fraudsters</title>
      <link>https://www.infosecurity-magazine.com/news/companies-house-glitch-exposes/</link>
      <description>An issue with the Companies House website has put the personal and corporate information of millions at risk</description>
      <pubDate>Mon, 16 Mar 2026 10:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/companies-house-glitch-exposes/</guid>
    </item>
    <item>
      <title>Interpol's 'Operation Synergia III' Nets 94 Arrests in Major Cybercrime Sweep</title>
      <link>https://www.infosecurity-magazine.com/news/interpol-operation-synergia3-94/</link>
      <description>A new law enforcement operation against phishing and ransomware operators led to the takedown of 45,000 malicious IP addresses</description>
      <pubDate>Fri, 13 Mar 2026 16:15:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/interpol-operation-synergia3-94/</guid>
    </item>
    <item>
      <title>Law Enforcement Dismantles SocksEscort Proxy Network in Operation Lightning</title>
      <link>https://www.infosecurity-magazine.com/news/socksescort-proxy-network-op/</link>
      <description>Operation Lightning sees international law enforcement partners shut down ‘SocksEscort,’ a major malicious proxy service used by cybercriminals worldwide</description>
      <pubDate>Fri, 13 Mar 2026 10:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/socksescort-proxy-network-op/</guid>
    </item>
    <item>
      <title>PixRevolution Malware Hijacks Brazil's PIX Transfers in Real Time</title>
      <link>https://www.infosecurity-magazine.com/news/pixrevolution-malware-brazils-pix/</link>
      <description>PixRevolution Android trojan hijacks Brazil’s PIX payments in real time using accessibility abuse</description>
      <pubDate>Thu, 12 Mar 2026 16:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/pixrevolution-malware-brazils-pix/</guid>
    </item>
    <item>
      <title>Critical Zero-Click Flaw in n8n Allows Full Server Compromise</title>
      <link>https://www.infosecurity-magazine.com/news/critical-zeroclick-flaw-n8n-pillar/</link>
      <description>The critical vulnerability affecting both cloud and self-hosted n8n instances requires no authentication or even n8n account to be exploited</description>
      <pubDate>Thu, 12 Mar 2026 15:28:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/critical-zeroclick-flaw-n8n-pillar/</guid>
    </item>
    <item>
      <title>CISA Issues Emergency Directive Over Exploited Cisco SD-WAN Flaws</title>
      <link>https://www.infosecurity-magazine.com/news/cisa-cisco-sd-wan-flaws-directive/</link>
      <description>CISA issued urgent directive as attackers exploit Cisco SD-WAN flaw granting admin access to networks</description>
      <pubDate>Thu, 12 Mar 2026 12:45:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/cisa-cisco-sd-wan-flaws-directive/</guid>
    </item>
    <item>
      <title>Police Scotland Fined After Sharing Victim’s Phone Data </title>
      <link>https://www.infosecurity-magazine.com/news/police-scotland-fined-sharing/</link>
      <description>The ICO has fined Police Scotland after it shared the entire contents of a victim’s phone with her alleged attacker</description>
      <pubDate>Thu, 12 Mar 2026 10:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/police-scotland-fined-sharing/</guid>
    </item>
    <item>
      <title>Iran Claims Massive Cyber-Attack on MedTech Firm Stryker</title>
      <link>https://www.infosecurity-magazine.com/news/iran-massive-wiper-attack-medtech/</link>
      <description>The pro-Iran Handala group claims to have wiped 200,000 systems in destructive wiper malware attack on US firm Stryker</description>
      <pubDate>Thu, 12 Mar 2026 09:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/iran-massive-wiper-attack-medtech/</guid>
    </item>
    <item>
      <title>France: National Cybersecurity Agency Reports Ransomware Attack Drop in 2025</title>
      <link>https://www.infosecurity-magazine.com/news/france-anssi-ransomware-attack/</link>
      <description>French small and medium businesses remained the organizations most targeted by ransomware in 2025</description>
      <pubDate>Wed, 11 Mar 2026 16:50:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/france-anssi-ransomware-attack/</guid>
    </item>
    <item>
      <title>Infosecurity Europe Announces 2026 Keynote Line Up</title>
      <link>https://www.infosecurity-magazine.com/news/infosecurity-europe-2026-keynote/</link>
      <description>Infosecurity Europe 2026 reveals its keynote line-up, featuring Jason Fox, Shlomo Kramer, Cynthia Kaiser and more, with sessions on AI, cloud security and post quantum threats</description>
      <pubDate>Wed, 11 Mar 2026 16:20:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/infosecurity-europe-2026-keynote/</guid>
    </item>
    <item>
      <title>Researchers Uncover ‘LeakyLooker’ Vulnerabilities in Google Looker Studio</title>
      <link>https://www.infosecurity-magazine.com/news/google-looker-studios-security-gaps/</link>
      <description>LeakyLooker flaws in Google Looker Studio let attackers run cross-tenant SQL attacks on cloud data</description>
      <pubDate>Wed, 11 Mar 2026 16:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/google-looker-studios-security-gaps/</guid>
    </item>
    <item>
      <title>Compromised WordPress Sites Deliver ClickFix Attacks in Global Infostealer Campaign</title>
      <link>https://www.infosecurity-magazine.com/news/wordpress-clickfix-infostealer/</link>
      <description>Over 250 legitimate websites, including news outlets and  a US Senate candidate’s official webpage, been compromised to infect visitors with infostealers, warn Rapid7 researchers</description>
      <pubDate>Wed, 11 Mar 2026 14:45:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/wordpress-clickfix-infostealer/</guid>
    </item>
    <item>
      <title>BlackSanta EDR-Killer Targets HR Teams in CV-Themed Campaign</title>
      <link>https://www.infosecurity-magazine.com/news/blacksanta-edr-killer-targets-hr/</link>
      <description>BlackSanta malware targets HR staff with fake resumes, kills EDR and steals system data</description>
      <pubDate>Wed, 11 Mar 2026 14:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/blacksanta-edr-killer-targets-hr/</guid>
    </item>
    <item>
      <title>Researchers Discover Major Security Gaps in LLM Guardrails</title>
      <link>https://www.infosecurity-magazine.com/news/major-security-gaps-llm-guardrails/</link>
      <description>Palo Alto Networks’ Unit 42 has developed a successful attack to bypass safety guardrails in popular generative AI tools</description>
      <pubDate>Wed, 11 Mar 2026 13:35:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/major-security-gaps-llm-guardrails/</guid>
    </item>
    <item>
      <title>Cyber-Attacks on UK Firms Increase at Four Times Global Rate</title>
      <link>https://www.infosecurity-magazine.com/news/cyberattacks-uk-firms-increase/</link>
      <description>Check Point data shows attack volumes are growing much faster in the UK than worldwide</description>
      <pubDate>Wed, 11 Mar 2026 10:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/cyberattacks-uk-firms-increase/</guid>
    </item>
    <item>
      <title>Microsoft Fixes Two Publicly Disclosed Zero-Days </title>
      <link>https://www.infosecurity-magazine.com/news/microsoft-fixes-two-publicly/</link>
      <description>March Patch Tuesday sees Microsoft release updates for 79 flaws</description>
      <pubDate>Wed, 11 Mar 2026 09:20:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/microsoft-fixes-two-publicly/</guid>
    </item>
    <item>
      <title>OpenAI's Promptfoo Deal Plugs Agentic AI Testing Gap</title>
      <link>https://www.infosecurity-magazine.com/news/openai-promptfoo-deal-agentic-ai/</link>
      <description>OpenAI’s latest acquisition addresses a security need Jamieson O’Reilly, security advisor at OpenClaw, raised during an exclusive interview with Infosecurity</description>
      <pubDate>Tue, 10 Mar 2026 17:15:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/openai-promptfoo-deal-agentic-ai/</guid>
    </item>
    <item>
      <title>Only 24% Of organizations Test Identity Recovery Every Six Months</title>
      <link>https://www.infosecurity-magazine.com/news/organizations-test-identity-sec-6/</link>
      <description>Only 24% of organizations test identity disaster recovery plans every 6 months, Quest Software said</description>
      <pubDate>Tue, 10 Mar 2026 16:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/organizations-test-identity-sec-6/</guid>
    </item>
    <item>
      <title>Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds </title>
      <link>https://www.infosecurity-magazine.com/news/cloud-attackers-prefer-exploits/</link>
      <description>Google Cloud report details a sharp rise in attackers exploiting software vulnerabilities, including React2Shell</description>
      <pubDate>Tue, 10 Mar 2026 15:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/cloud-attackers-prefer-exploits/</guid>
    </item>
    <item>
      <title>Ericsson Breach Exposes Data of 15k Employees and Customers</title>
      <link>https://www.infosecurity-magazine.com/news/ericsson-breach-exposes-data-15k/</link>
      <description>Ericsson data breach affects 15k employees/customers after third-party service provider compromise</description>
      <pubDate>Tue, 10 Mar 2026 15:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/ericsson-breach-exposes-data-15k/</guid>
    </item>
    <item>
      <title>Russian Hackers Target WhatsApp and Signal Accounts of Global Military and Government Officials</title>
      <link>https://www.infosecurity-magazine.com/news/russian-hackers-target-military/</link>
      <description>Dutch intelligence reveals Russian state hackers are trying to hijack the Signal and WhatsApp accounts of key targets</description>
      <pubDate>Tue, 10 Mar 2026 10:45:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/russian-hackers-target-military/</guid>
    </item>
    <item>
      <title>ShinyHunters Targets Hundreds of Websites in New Salesforce Campaign</title>
      <link>https://www.infosecurity-magazine.com/news/shinyhunters-hundreds-websites/</link>
      <description>Prolific ShinyHunters group claims to have stolen data from nearly 400 websites in Experience Cloud attacks</description>
      <pubDate>Tue, 10 Mar 2026 10:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/shinyhunters-hundreds-websites/</guid>
    </item>
    <item>
      <title>Threat Actor Exploits Flaws and Uses Elastic Cloud SIEM to Manage Stolen Data</title>
      <link>https://www.infosecurity-magazine.com/news/elastic-cloud-siem-manage-stolen/</link>
      <description>Huntress researchers uncover campaign exploiting vulnerabilities to steal data using Elastic Cloud as a data hub</description>
      <pubDate>Mon, 09 Mar 2026 15:45:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/elastic-cloud-siem-manage-stolen/</guid>
    </item>
    <item>
      <title>Trump Administration Unveils New Cyber Strategy for America</title>
      <link>https://www.infosecurity-magazine.com/news/usa-unveils-new-cyber-strategy/</link>
      <description>US national cyber strategy focuses on stronger defenses, countering threats, fostering innovation</description>
      <pubDate>Mon, 09 Mar 2026 15:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/usa-unveils-new-cyber-strategy/</guid>
    </item>
    <item>
      <title>UK Launches New Crackdown Unit to Tackle Cyber-Fraud at the Source</title>
      <link>https://www.infosecurity-magazine.com/news/uk-new-crackdown-unit-cyber-fraud/</link>
      <description>New UK Online Crime Centre will combine expertise from a range of sources to takedown online channels cyber-scammers rely on</description>
      <pubDate>Mon, 09 Mar 2026 14:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/uk-new-crackdown-unit-cyber-fraud/</guid>
    </item>
    <item>
      <title>AI Security Startups Dominate New Cyber Innovation Awards</title>
      <link>https://www.infosecurity-magazine.com/news/ai-security-startups-cyber/</link>
      <description>Over one in five winners of IT-Harvest’s 2026 Cyber 150 are AI security companies</description>
      <pubDate>Mon, 09 Mar 2026 13:25:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/ai-security-startups-cyber/</guid>
    </item>
    <item>
      <title>TriZetto Provider Solutions Breach Hits 3.4 Million Patients</title>
      <link>https://www.infosecurity-magazine.com/news/trizetto-provider-solutions-breach/</link>
      <description>Billing services provider TriZetto Provider Solutions has begun notifying millions of patients about a data breach</description>
      <pubDate>Mon, 09 Mar 2026 10:45:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/trizetto-provider-solutions-breach/</guid>
    </item>
    <item>
      <title>Ghanaian Pleads Guilty to Role in $100m Romance Scam</title>
      <link>https://www.infosecurity-magazine.com/news/ghanaian-pleads-guilty-100m/</link>
      <description>Derrick Van Yeboah admitted he stole over $10m in romance scams as part of crime gang</description>
      <pubDate>Mon, 09 Mar 2026 10:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/ghanaian-pleads-guilty-100m/</guid>
    </item>
    <item>
      <title>Iran's MuddyWater Hackers Hit US Firms with New 'Dindoor' Backdoor</title>
      <link>https://www.infosecurity-magazine.com/news/iran-muddywater-hackers-us-firms/</link>
      <description>A bank, an airport, a non-profit and the Israeli branch of a US software company were among the targets of this new MuddyWater campaign</description>
      <pubDate>Fri, 06 Mar 2026 15:15:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/iran-muddywater-hackers-us-firms/</guid>
    </item>
    <item>
      <title>Zero‑Day Attacks on Enterprise Software Reach Record High, Google Warns</title>
      <link>https://www.infosecurity-magazine.com/news/zero-day-enterprise-record-high/</link>
      <description>Almost a quarter of the zero days detected by Google in 2025 targeted security and networking appliances</description>
      <pubDate>Fri, 06 Mar 2026 12:29:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/zero-day-enterprise-record-high/</guid>
    </item>
    <item>
      <title>AI-Driven Insider Risk Now a “Critical Business Threat,” Report Warns</title>
      <link>https://www.infosecurity-magazine.com/news/ai-insider-risk-critical-business/</link>
      <description>Malicious insiders are using misusing AI for nefarious gain, while employees cutting corners also creates risk, warns Mimecast</description>
      <pubDate>Thu, 05 Mar 2026 16:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/ai-insider-risk-critical-business/</guid>
    </item>
    <item>
      <title>ContextCrush Flaw Exposes AI Development Tools to Attacks</title>
      <link>https://www.infosecurity-magazine.com/news/contextcrush-ai-development-tools/</link>
      <description>Critical flaw "ContextCrush" in Context7 MCP Server could allow malicious instructions into AI tools</description>
      <pubDate>Thu, 05 Mar 2026 14:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/contextcrush-ai-development-tools/</guid>
    </item>
    <item>
      <title>Coruna Exploit Kit Targets Older iPhones in Multi-Stage Campaigns</title>
      <link>https://www.infosecurity-magazine.com/news/coruna-exploit-older-iphones/</link>
      <description>Exploit kit "Coruna" targets iPhones running iOS 13.0 to 17.2.1, focusing on financial data theft</description>
      <pubDate>Thu, 05 Mar 2026 12:15:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/coruna-exploit-older-iphones/</guid>
    </item>
    <item>
      <title>Zero-Click FreeScout Bug Enables Remote Code Execution</title>
      <link>https://www.infosecurity-magazine.com/news/zeroclick-freescout-bug-remote/</link>
      <description>Ox Security warns that Mail2Shell could enable threat actors to hijack FreeScout systems without user interaction</description>
      <pubDate>Thu, 05 Mar 2026 11:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/zeroclick-freescout-bug-remote/</guid>
    </item>
    <item>
      <title>Cisco Issues Patches for 48 Vulnerabilities in Enterprise Networking Products</title>
      <link>https://www.infosecurity-magazine.com/news/cisco-issues-patches-48/</link>
      <description>Two of the 48 Cisco vulnerabilities, affecting Secure Firewall Management Center, are maximum-severity flaws</description>
      <pubDate>Thu, 05 Mar 2026 10:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/cisco-issues-patches-48/</guid>
    </item>
    <item>
      <title>Europol Operation Seizes LeakBase Data Breach Site</title>
      <link>https://www.infosecurity-magazine.com/news/europol-seizes-leakbase-data/</link>
      <description>A global operation has resulted in the takedown of popular cybercrime forum LeakBase</description>
      <pubDate>Thu, 05 Mar 2026 09:45:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/europol-seizes-leakbase-data/</guid>
    </item>
    <item>
      <title>Coalition of Western Countries Launches 6G Cybersecurity Guidelines</title>
      <link>https://www.infosecurity-magazine.com/news/gcot-6g-cybersecurity-guidelines/</link>
      <description>A coalition of seven Western nations has launched guidelines to help integrate security-by-design principles into future 6G standards</description>
      <pubDate>Wed, 04 Mar 2026 16:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/gcot-6g-cybersecurity-guidelines/</guid>
    </item>
    <item>
      <title>Global Takedown Neutralizes Tycoon2FA Phishing Service</title>
      <link>https://www.infosecurity-magazine.com/news/global-takedown-tycoon2fa-phishing/</link>
      <description>Law enforcers and industry partners have taken down notorious phishing-as-a-service platform Tycoon2FA</description>
      <pubDate>Wed, 04 Mar 2026 16:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/global-takedown-tycoon2fa-phishing/</guid>
    </item>
    <item>
      <title>Surge in Attacks on Surveillance Cameras Linked to Iranian Hackers</title>
      <link>https://www.infosecurity-magazine.com/news/iran-attacks-surveillance-cameras/</link>
      <description>Increased attempts to compromise surveillance cameras linked to Iran during Middle East conflict</description>
      <pubDate>Wed, 04 Mar 2026 15:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/iran-attacks-surveillance-cameras/</guid>
    </item>
    <item>
      <title>Multi-Stage "BadPaw" Malware Campaign Targets Ukraine</title>
      <link>https://www.infosecurity-magazine.com/news/badpaw-malware-targets-ukraine/</link>
      <description>Malware campaign uses Ukrainian email service for credibility, deploying "BadPaw" to execute attacks</description>
      <pubDate>Wed, 04 Mar 2026 14:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/badpaw-malware-targets-ukraine/</guid>
    </item>
    <item>
      <title>Calls for Global Digital Estate Standard as Posthumous Deepfake Fraud Risk Grows</title>
      <link>https://www.infosecurity-magazine.com/news/digital-estate-post-death-deepfake/</link>
      <description>The OpenID Foundation warns that fragmented policies on posthumous digital accounts could open the door for fraudsters to exploit AI deepfakes</description>
      <pubDate>Wed, 04 Mar 2026 10:45:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/digital-estate-post-death-deepfake/</guid>
    </item>
    <item>
      <title>Israel: RedAlert Spyware Campaign Exploits Wartime Panic With Trojanized App</title>
      <link>https://www.infosecurity-magazine.com/news/redalert-israel-spyware-campaign/</link>
      <description>Espionage campaign exploits Israel-Iran conflict, distributing a trojanized Red Alert app via SMS</description>
      <pubDate>Tue, 03 Mar 2026 16:15:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/redalert-israel-spyware-campaign/</guid>
    </item>
    <item>
      <title>AI and Deepfakes Supercharge Sophisticated Cyber-Attacks, Says Cloudflare</title>
      <link>https://www.infosecurity-magazine.com/news/ai-deepfakes-supercharge/</link>
      <description>Cloudflare Threat Report warns that AI tools enable attackers who lacked required skills to generate effective attacks rapidly and at scale</description>
      <pubDate>Tue, 03 Mar 2026 15:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/ai-deepfakes-supercharge/</guid>
    </item>
    <item>
      <title>Leaked Database Sheds Light on Iranian Crypto Sanctions Evasion</title>
      <link>https://www.infosecurity-magazine.com/news/iranian-crypto-leaked-database/</link>
      <description>Ariomex database reveals potential sanctions evasion and capital transfers tied to Iranian actors</description>
      <pubDate>Tue, 03 Mar 2026 14:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/iranian-crypto-leaked-database/</guid>
    </item>
    <item>
      <title>Half of US CISOs Work the Equivalent of a Six-Day Week</title>
      <link>https://www.infosecurity-magazine.com/news/half-us-cisos-work-equivalent/</link>
      <description>Seemplicity finds US security leaders work 11 or more extra hours per week</description>
      <pubDate>Tue, 03 Mar 2026 14:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/half-us-cisos-work-equivalent/</guid>
    </item>
    <item>
      <title>Huge “Shadow Layer” of Organizations Hit by Supply Chain Attacks</title>
      <link>https://www.infosecurity-magazine.com/news/shadow-layer-organizations-supply/</link>
      <description>Black Kite reveals 26,000 unnamed corporate victims linked to 136 third-party breaches</description>
      <pubDate>Tue, 03 Mar 2026 11:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/shadow-layer-organizations-supply/</guid>
    </item>
    <item>
      <title>Iranian Cyber Threat Actor Targets Iraqi Government Officials in AI-Powered Campaign</title>
      <link>https://www.infosecurity-magazine.com/news/iran-cyber-threat-actor-iraq/</link>
      <description>Zscaler ThreatLabz assessed with medium to high confidence that an Iranian adversary targeted Iraq’s Ministry of Foreign Affairs in a new cyber-attack</description>
      <pubDate>Tue, 03 Mar 2026 10:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/iran-cyber-threat-actor-iraq/</guid>
    </item>
    <item>
      <title>Chrome Unveils Plan For Quantum-Safe HTTPS Certificates</title>
      <link>https://www.infosecurity-magazine.com/news/chrome-quantum-safe-https/</link>
      <description>Google Chrome initiates quantum-resistant measures via Merkle Tree Certificates to secure HTTPS</description>
      <pubDate>Mon, 02 Mar 2026 16:15:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/chrome-quantum-safe-https/</guid>
    </item>
    <item>
      <title>Expect Iran to Launch Cyber-Attacks Globally, Warns Google Head of Threat Intel</title>
      <link>https://www.infosecurity-magazine.com/news/iran-cyber-attacks-global-google/</link>
      <description>John Hultquist suggests “aggressive” Iranian cyber attackers will target the US and its Gulf allies with plausibly deniable ransomware attacks, hacktivist campaigns and more</description>
      <pubDate>Mon, 02 Mar 2026 15:45:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/iran-cyber-attacks-global-google/</guid>
    </item>
    <item>
      <title>Hybrid Middle East Conflict Triggers Surge in Global Cyber Activity</title>
      <link>https://www.infosecurity-magazine.com/news/middle-east-conflict-surge-global/</link>
      <description>Military strikes in the Middle East escalate cyber ops, raising spillover risks globally for firms</description>
      <pubDate>Mon, 02 Mar 2026 15:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/middle-east-conflict-surge-global/</guid>
    </item>
    <item>
      <title>ClawJacked Bug Enables Covert AI Agent Hijacking</title>
      <link>https://www.infosecurity-magazine.com/news/clawjacked-bug-covert-ai-agent/</link>
      <description>Oasis Security reveals how a new ClawJacked vulnerability could allow attackers to silently take over a victim’s OpenClaw agent</description>
      <pubDate>Mon, 02 Mar 2026 11:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/clawjacked-bug-covert-ai-agent/</guid>
    </item>
    <item>
      <title>Ransomware Payments Decline 8% as Attacks Surge 50%</title>
      <link>https://www.infosecurity-magazine.com/news/ransomware-payments-decline-1/</link>
      <description>Chainalysis reveals a big surge in median ransomware payment size in 2025 despite overall drop in criminal revenue</description>
      <pubDate>Mon, 02 Mar 2026 10:45:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/ransomware-payments-decline-1/</guid>
    </item>
    <item>
      <title>North Korea's APT37 Expands Toolkit to Breach Air-Gapped Networks</title>
      <link>https://www.infosecurity-magazine.com/news/north-korea-apt37-expands-toolkit/</link>
      <description>The security researchers from Zscaler ThreatLabz have also discovered five new tools deployed by the North Korean hacking group</description>
      <pubDate>Fri, 27 Feb 2026 14:15:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/north-korea-apt37-expands-toolkit/</guid>
    </item>
    <item>
      <title>UK Vulnerability Monitoring Service Cuts Unresolved Security Flaws by 75%</title>
      <link>https://www.infosecurity-magazine.com/news/uk-vuln-monitoring-service-cuts/</link>
      <description>The UK government says its new Vulnerability Monitoring Service has cut unresolved security flaws by 75% and reduced cyber-attack fix times from nearly two months to just over a week</description>
      <pubDate>Fri, 27 Feb 2026 11:45:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/uk-vuln-monitoring-service-cuts/</guid>
    </item>
    <item>
      <title>‘Project Compass’ Cracks Down on ‘The Com’: 30 Members of Notorious Cybercrime Gang Arrested </title>
      <link>https://www.infosecurity-magazine.com/news/project-compass-com-arrests/</link>
      <description>International law enforcement operation led by Europol targets network of teenagers and young adults involved in ransomware attacks, extortion and other crimes</description>
      <pubDate>Fri, 27 Feb 2026 11:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/project-compass-com-arrests/</guid>
    </item>
    <item>
      <title>Aeternum Botnet Shifts Command Control to Polygon Blockchain</title>
      <link>https://www.infosecurity-magazine.com/news/aeternum-botnet-c2-polygon/</link>
      <description>New botnet Aeternum shifted C2 operations to Polygon blockchain, complicating takedown efforts</description>
      <pubDate>Thu, 26 Feb 2026 16:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/aeternum-botnet-c2-polygon/</guid>
    </item>
    <item>
      <title>Darktrace Flags 32 Million Phishing Emails in 2025 as Identity Attacks Intensify</title>
      <link>https://www.infosecurity-magazine.com/news/32m-phishing-emails-detected-2025/</link>
      <description>2025 saw 32M phishing emails, with identity threats surpassing vulnerabilities</description>
      <pubDate>Thu, 26 Feb 2026 15:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/32m-phishing-emails-detected-2025/</guid>
    </item>
    <item>
      <title>Exploitable Vulnerabilities Present in 87% of Organizations</title>
      <link>https://www.infosecurity-magazine.com/news/exploitable-vulnerabilities-in-87/</link>
      <description>Datadog report reveals two-fifths of services are affected by exploitable bugs</description>
      <pubDate>Thu, 26 Feb 2026 14:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/exploitable-vulnerabilities-in-87/</guid>
    </item>
    <item>
      <title>UK's Data Watchdog Gets a Makeover to Match Growing Demands</title>
      <link>https://www.infosecurity-magazine.com/news/uk-data-watchdog-ico-makeover/</link>
      <description>The UK’s Information Commissioner's Office is about to ditch single-leader model for CEO and board in a major shake-up</description>
      <pubDate>Thu, 26 Feb 2026 14:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/uk-data-watchdog-ico-makeover/</guid>
    </item>
    <item>
      <title>Google Disrupts ‘Prolific’ and ‘Elusive’ China-Linked Global Hacking Campaign</title>
      <link>https://www.infosecurity-magazine.com/news/google-prolific-china-hacking/</link>
      <description>UNC2814 hit 53 victims in 42 countries with novel backdoor in decade long cyber espionage operation</description>
      <pubDate>Thu, 26 Feb 2026 12:09:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/google-prolific-china-hacking/</guid>
    </item>
    <item>
      <title>Global Cyber Agencies Urge Immediate Patching of Cisco SD-WAN Zero Day</title>
      <link>https://www.infosecurity-magazine.com/news/immediate-patch-cisco-catalyst/</link>
      <description>The US and allies are urging Cisco Catalyst SD-WAN customers to hunt for signs of exploitation</description>
      <pubDate>Thu, 26 Feb 2026 09:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/immediate-patch-cisco-catalyst/</guid>
    </item>
    <item>
      <title>44% Surge in App Exploits as AI Speeds Up Cyber-Attacks, IBM Finds</title>
      <link>https://www.infosecurity-magazine.com/news/app-exploits-surge-ai-speeds/</link>
      <description>IBM's 2026 X-Force report reveals 44% rise in cyber-attacks on public apps, driven by AI and flaws</description>
      <pubDate>Wed, 25 Feb 2026 14:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/app-exploits-surge-ai-speeds/</guid>
    </item>
    <item>
      <title>Malicious NuGet Package Targets Stripe Developers</title>
      <link>https://www.infosecurity-magazine.com/news/malicious-nuget-package-stripe-devs/</link>
      <description>Malicious NuGet package mimicking Stripe's library targeted developers</description>
      <pubDate>Wed, 25 Feb 2026 13:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/malicious-nuget-package-stripe-devs/</guid>
    </item>
    <item>
      <title>Former Defense Contractor Boss Gets 7+ Years for Selling Zero Days</title>
      <link>https://www.infosecurity-magazine.com/news/defense-contractor-boss-7-years/</link>
      <description>A former general manager of a US defense contractor has been sentenced after selling zero days to Russia</description>
      <pubDate>Wed, 25 Feb 2026 10:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/defense-contractor-boss-7-years/</guid>
    </item>
    <item>
      <title>ICO’s £14m Reddit Fine Highlights Age Check Privacy Concerns</title>
      <link>https://www.infosecurity-magazine.com/news/icos-14m-reddit-fine-age-check/</link>
      <description>The UK’s ICO has fined Reddit over £14m for failing to use children’s personal information lawfully</description>
      <pubDate>Wed, 25 Feb 2026 09:40:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/icos-14m-reddit-fine-age-check/</guid>
    </item>
    <item>
      <title>Cost of Insider Incidents Surges 20% to Nearly $20m </title>
      <link>https://www.infosecurity-magazine.com/news/cost-of-insider-incidents-surges/</link>
      <description>DTEX claims insider incidents cost $19.5m in 2025, with employee negligence most expensive</description>
      <pubDate>Tue, 24 Feb 2026 17:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/cost-of-insider-incidents-surges/</guid>
    </item>
    <item>
      <title>Multifaceted Phishing Scheme Deceives Bitpanda Customers</title>
      <link>https://www.infosecurity-magazine.com/news/bitpanda-mfa-phishing-scheme/</link>
      <description>Phishing attack mimicking Bitpanda targets users, harvesting credentials and personal information</description>
      <pubDate>Tue, 24 Feb 2026 16:05:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/bitpanda-mfa-phishing-scheme/</guid>
    </item>
    <item>
      <title>North Korean Lazarus Group Expands Ransomware Activity With Medusa</title>
      <link>https://www.infosecurity-magazine.com/news/north-korean-lazarus-group-medusa/</link>
      <description>Ransomware Medusa linked to North Korean hackers targets US healthcare amid ongoing attacks</description>
      <pubDate>Tue, 24 Feb 2026 14:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/north-korean-lazarus-group-medusa/</guid>
    </item>
    <item>
      <title>AI Accelerates Attacker Breakout Time to Just Four Minutes</title>
      <link>https://www.infosecurity-magazine.com/news/ai-accelerates-attack-breakout/</link>
      <description>ReliaQuest claims AI has reduced breakout and exfiltration time to under 10 minutes</description>
      <pubDate>Tue, 24 Feb 2026 13:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/ai-accelerates-attack-breakout/</guid>
    </item>
    <item>
      <title>Chinese AI Firms Hit Claude with Distillation Attacks, Anthropic Warns</title>
      <link>https://www.infosecurity-magazine.com/news/chinese-ai-claude-distillation/</link>
      <description>Anthropic accused DeepSeek, Moonshot and MiniMax of illicitly using Claude to steal some of the AI model’s capabilities</description>
      <pubDate>Tue, 24 Feb 2026 11:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/chinese-ai-claude-distillation/</guid>
    </item>
    <item>
      <title>AI-powered Cyber-Attacks Up Significantly in the Last Year, Warns CrowdStrike</title>
      <link>https://www.infosecurity-magazine.com/news/ai-powered-cyberattacks-up/</link>
      <description>CrowdStrike Global Threat Report warns how adversaries are leveraging AI to make campaigns more efficient and more effective</description>
      <pubDate>Tue, 24 Feb 2026 10:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/ai-powered-cyberattacks-up/</guid>
    </item>
    <item>
      <title>Shai-Hulud-Like Worm Targets Developers via npm and AI Tools</title>
      <link>https://www.infosecurity-magazine.com/news/shai-hulud-like-worm-devs-npm-ai/</link>
      <description>Supply chain worm mimicking Shai-Hulud malware spread via malicious npm packages, targeting AI tools has been identified by security researchers </description>
      <pubDate>Mon, 23 Feb 2026 16:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/shai-hulud-like-worm-devs-npm-ai/</guid>
    </item>
    <item>
      <title>Fraud Investigation Reveals Sophisticated Python Malware</title>
      <link>https://www.infosecurity-magazine.com/news/fraud-investigation-python-malware/</link>
      <description>Sophisticated Python malware uncovered in fraud probe shows obfuscation, disposable infrastructure</description>
      <pubDate>Mon, 23 Feb 2026 15:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/fraud-investigation-python-malware/</guid>
    </item>
    <item>
      <title>Russian Cyber Threat Actor Uses GenAI to Compromise Fortinet Firewalls</title>
      <link>https://www.infosecurity-magazine.com/news/russian-threat-actor-genai/</link>
      <description>A low-skilled Russian-speaking attacker has used GenAI tools to help deploy a successful attack workflow targeting FortiGate instances</description>
      <pubDate>Mon, 23 Feb 2026 12:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/russian-threat-actor-genai/</guid>
    </item>
    <item>
      <title>Leading Semiconductor Supplier Advantest Hit by Ransomware Attack</title>
      <link>https://www.infosecurity-magazine.com/news/advantest-ransomware-attack/</link>
      <description>Advantest, a Japanese specialist in testing computer chips for major semiconductor manufacturers, has deployed incident response protocols following a cybersecurity incident</description>
      <pubDate>Mon, 23 Feb 2026 11:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/advantest-ransomware-attack/</guid>
    </item>
    <item>
      <title>Jackpotting Surge Costs Banks Over $20m, Warns FBI</title>
      <link>https://www.infosecurity-magazine.com/news/jackpotting-surge-costs-banks-20m/</link>
      <description>A new FBI Flash alert claims $20m was lost to ATM jackpotting attacks in 2025 alone</description>
      <pubDate>Mon, 23 Feb 2026 10:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/jackpotting-surge-costs-banks-20m/</guid>
    </item>
    <item>
      <title>University of Mississippi Medical Center Still Offline After Ransomware Attack</title>
      <link>https://www.infosecurity-magazine.com/news/university-mississippi-medical/</link>
      <description>University of Mississippi Medical Center is still scrambling to respond to a ransomware attack last Thursday</description>
      <pubDate>Mon, 23 Feb 2026 08:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/university-mississippi-medical/</guid>
    </item>
    <item>
      <title>Dramatic Escalation in Frequency and Power of DDoS Attacks </title>
      <link>https://www.infosecurity-magazine.com/news/ddos-escalation-frequency-power/</link>
      <description>DDoS attack frequency has risen to ‘alarming levels,’ warns Radware report</description>
      <pubDate>Fri, 20 Feb 2026 12:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/ddos-escalation-frequency-power/</guid>
    </item>
    <item>
      <title>Android Malware Hijacks Google Gemini to Stay Hidden</title>
      <link>https://www.infosecurity-magazine.com/news/android-malware-hijacks-google/</link>
      <description>A new Android malware implant using Google Gemini to perform persistence tasks was discovered on VirusTotal and analyzed by ESET</description>
      <pubDate>Fri, 20 Feb 2026 11:35:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/android-malware-hijacks-google/</guid>
    </item>
    <item>
      <title>Remcos RAT Expands Real-Time Surveillance Capabilities</title>
      <link>https://www.infosecurity-magazine.com/news/remcos-rat-expands-real-time/</link>
      <description>New Remcos RAT variant enhances real-time surveillance and evasion techniques to compromise Windows</description>
      <pubDate>Thu, 19 Feb 2026 16:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/remcos-rat-expands-real-time/</guid>
    </item>
    <item>
      <title>Industrial-Scale Fake Coretax Apps Drive $2m Fraud in Indonesia</title>
      <link>https://www.infosecurity-magazine.com/news/fake-coretax-apps-fraud-indonesia/</link>
      <description>Fraud campaign exploiting Indonesia’s Coretax resulted in $1.5m to $2m in losses via malicious apps</description>
      <pubDate>Thu, 19 Feb 2026 15:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/fake-coretax-apps-fraud-indonesia/</guid>
    </item>
    <item>
      <title>Industrial Control System Vulnerabilities Hit Record Highs </title>
      <link>https://www.infosecurity-magazine.com/news/industrial-control-system-vulns/</link>
      <description>Forescout paper reveals ICS advisories hit a record 508 in 2025</description>
      <pubDate>Thu, 19 Feb 2026 13:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/industrial-control-system-vulns/</guid>
    </item>
    <item>
      <title>Starkiller: New ‘Commercial-Grade’ Phishing Kit Bypasses MFA </title>
      <link>https://www.infosecurity-magazine.com/news/starkiller-phishing-kit-bypasses/</link>
      <description>A new cybercriminal toolkit uses proxies to mimic popular online services and represents a “significant escalation in phishing infrastructure,” warn researchers at Abnormal</description>
      <pubDate>Thu, 19 Feb 2026 12:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/starkiller-phishing-kit-bypasses/</guid>
    </item>
    <item>
      <title>Flaws in Popular Software Development App Extensions Allow Data Exfiltration</title>
      <link>https://www.infosecurity-magazine.com/news/vulnerabilities-vs-code-cursor/</link>
      <description>Four serious new vulnerabilities affect Microsoft Visual Studio Code, Cursor and Windsurf extensions, three of which remain unpatched</description>
      <pubDate>Thu, 19 Feb 2026 10:45:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/vulnerabilities-vs-code-cursor/</guid>
    </item>
    <item>
      <title>Researchers Reveal Six New OpenClaw Vulnerabilities</title>
      <link>https://www.infosecurity-magazine.com/news/researchers-six-new-openclaw/</link>
      <description>Endor Labs has published details of six new vulnerabilities in popular AI assistant OpenClaw </description>
      <pubDate>Thu, 19 Feb 2026 10:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/researchers-six-new-openclaw/</guid>
    </item>
    <item>
      <title>Cryptojacking Campaign Exploits Driver to Boost Monero Mining</title>
      <link>https://www.infosecurity-magazine.com/news/cryptojacking-driver-boost-monero/</link>
      <description>Cryptojacking campaign used pirated software to deploy a persistent XMRig miner with stealth tactics</description>
      <pubDate>Wed, 18 Feb 2026 16:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/cryptojacking-driver-boost-monero/</guid>
    </item>
    <item>
      <title>AI Assistants Used as Covert Command-and-Control Relays</title>
      <link>https://www.infosecurity-magazine.com/news/ai-assistants-covert-c2-relays/</link>
      <description>AIs like Grok and Microsoft Copilot can be exploited as covert C2 channels for malware communication</description>
      <pubDate>Wed, 18 Feb 2026 15:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/ai-assistants-covert-c2-relays/</guid>
    </item>
    <item>
      <title>Record Number of Ransomware Victims and Groups in 2025</title>
      <link>https://www.infosecurity-magazine.com/news/record-number-ransomware-victims/</link>
      <description>Searchlight Cyber reports a 30% annual increase in ransomware victim numbers in 2025</description>
      <pubDate>Wed, 18 Feb 2026 11:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/record-number-ransomware-victims/</guid>
    </item>
  </channel>
</rss>