Infosecurity News

  1. Tycoon2FA Phishing Service Resumes Activity Post-Takedown

    Tycoon2FA phishing platform resumes activity post-takedown, leveraging AITM techniques to bypass MFA

  2. High-Tech Sector Overtakes Finance as Top Target for Cyber-Attacks, Mandiant Reports

    High tech was the most frequently targeted industry in Mandiant investigations in 2025, overtaking financial services which led in 2023 and 2024

  3. Trivy Supply Chain Attack Expands With New Compromised Docker Images

    New Trivy Docker images 0.69.5 and 0.69.6 compromised with TeamPCP infostealer, impacting CI/CD scans

  4. CISA Orders US Government to Patch Maximum Severity Cisco Flaw

    CISA added CVE-2026-20131 to its KEV catalog as it is being used in ransomware campaigns

  5. Operation Alice Takes Down 370,000+ Dark Web Sites

    German-led policing effort against fraud operation disrupts countless CSAM and cybercrime sites

  6. Hackers Exploit Critical Langflow Bug in Just 20 Hours

    Sysdig details how threat actors exploited a critical CVE in Langflow in less than a day

  7. NCA Boss Warns That Teens Are Being “Radicalized” Into Cybercrime Online

    The National Crime Agency’s director general warns that technology is rapidly reshaping crime

  8. Ransomware Affiliate Exposes Details of 'The Gentlemen' Operation

    Hastalamuerte leaks The Gentlemen RaaS ops: FortiGate exploits, BYOVD evasion, Qilin split tactics

  9. Financial Brands Targeted in Global Mobile Banking Malware Surge

    Mobile banking malware targets over 1200 financial apps globally, shifting fraud to user devices

  10. FCA Updates Cyber Incident and Third-Party Reporting Rules

    The UK’s financial regulator has issued new rules to make incident and third-party reporting clearer

  11. AWS Warns Hackers Have Abused Cisco Firewall Zero-Day Since January

    Notorious ransomware group Interlock has been exploiting a Cisco zero-day bug since January, AWS says

  12. UK: Regulation Drives Cyber Spending for Critical Infrastructure Orgs

    35% of security leaders working in the UK’s critical infrastructure said regulatory requirements are the primary influence on their security programs

  13. New Ubuntu Flaw Enables Local Attackers to Gain Root Access

    CVE-2026-3888 Ubuntu snap flaw lets local users escalate to root via timing-based exploit

  14. Crypto Scam "ShieldGuard" Dismantled After Malware Discovery

    ShieldGuard Chrome extension posed as a crypto security tool but stole wallets and drained user data

  15. AI-Enabled Adversaries Compress Time-to-Exploit Following Vulnerability Disclosure

    Rapid7 says median time from publication to CISA KEV inclusion dropped to five days

  16. Vidar Stealer 2.0 Exploits GitHub, Reddit to Deliver Malware via Fake Game Cheats

    The Vidar 2.0 infostealers is deployed through fake free game cheats on GitHub and Reddit

  17. AI Issues Will Drive Half of Incident Response Efforts by 2028, Says Gartner

    Gartner has urged security teams to get involved in AI projects from the start to avoid costly incident response

  18. Android OS-Level Attack Bypasses Mobile Payment Security

    Android’s LSPosed-based attack hijacks payment apps via runtime manipulation and SIM-binding bypass

  19. 'CursorJack’ Attack Path Exposes Code Execution Risk in AI Development Environment

    CursorJack shows how malicious MCP deeplinks in Cursor IDE can trigger user-approved code execution

  20. Surge in Nation State Attacks on UK Firms Amid Cyber Warfare Fears

    Armis reveals that “mutually assured disruption” is no longer preventing state-backed attacks

What’s Hot on Infosecurity Magazine?