Infosecurity News

  1. Russian-linked Malware Campaign Hides in Blender 3D Files

    Morphisec has observed a new operation embedding StealC V2 malware in Blender project files, targeting users via 3D assets and launching a multi-stage infection chain

  2. CISA Urges Patch of Actively Exploited Flaw in Oracle Identity Manager

    The US cybersecurity agency has added the critical flaw to its Known Exploited Vulnerabilities list

  3. Iberia Airlines Notifies Customers of Supply Chain Data Breach

    Spanish airline Iberia has begun emailing its customers about a supplier data breach

  4. MoD Launches World’s First Military Gaming Tournament

    The International Defence Esports Games (IDEG) will help sharpen cyber and battlefield skills for allied soldiers

  5. Cybercriminals Exploit Browser Push Notifications to Deliver Malware

    Researchers at BlackFrog have uncovered Matrix Push C2, a malicious command-and-control system that abuses web browser push notifications to deliver malware

  6. New Gainsight Supply Chain Hack Could Affect Salesforce Customers

    Salesforce believes there has been unauthorized access to its customers’ data through the Gainsight app’s connection to its platform

  7. UNC2891 Money Mule Network Reveals Full Scope of ATM Fraud Operation

    A multi-year ATM fraud campaign by UNC2891 targeted two Indonesian banks, cloning cards, recruiting money mules and coordinating cash withdrawals

  8. CISA Issues New Guidance on Bulletproof Hosting Threat

    CISA launches guide to combat cybercrime via bulletproof hosting, recommending measures for ISPs

  9. Supply Chain Breaches Impact Almost All Firms Globally, BlueVoyant Reveals

    Despite a growing maturity of third-party risk management programs, supply chain attacks impacted more organizations in 2025 than in previous years

  10. Gartner: 40% of Firms to Be Hit By Shadow AI Security Incidents

    Gartner predicts that two-fifths of organizations will suffer security and compliance incidents due to shadow AI by 2030

  11. UK, US and Australia Sanction Russian Bulletproof Hoster Media Land

    Allies sanction bulletproof hoster Media Land and four executives

  12. Europol Operation Disrupts $55m in Cryptocurrency For Piracy

    Europe-wide Cyber-Patrol Week targeted IP violations, flagging 69 sites and disrupting $55m in crypto services

  13. Eternidade Stealer Trojan Fuels Aggressive Brazil Cybercrime

    Trustwave SpiderLabs has observed new banking Trojan Eternidade Stealer targeting Brazil using WhatsApp for propagation and data theft

  14. PlushDaemon Hackers Unleash New Malware in China-Aligned Spy Campaigns

    The cyber espionage group uses a previously undocumented network implant to drop two downloaders, LittleDaemon and DaemonLogistics, which deliver a backdoor

  15. China-Linked Operation “WrtHug” Hijacks Thousands of ASUS Routers

    SecurityScorecard has revealed a new Chinese campaign targeting thousands of ASUS routers globally

  16. Half of Ransomware Access Due to Hijacked VPN Credentials

    Beazley Security data finds the top cause of initial access for ransomware in Q3 was compromised VPN credentials

  17. CISA 2015 Receives Extension, Offering Brief Relief for Cyber Information Sharing

    One US cybersecurity leader described the short-term extension of the Cybersecurity Information Sharing Act as a “temporary patch” and called for a long-term solution

  18. New npm Malware Campaign Redirects Victims to Crypto Sites

    A new malware campaign has been observed built on seven npm packages and using cloaking techniques and fake CAPTCHAs, operated by threat actor dino_reborn

  19. AI-Enhanced Tuoni Framework Targets Major US Real Estate Firm

    A major US real estate firm has been targeted with an advanced intrusion attempt using Tuoni C2, combining social engineering, steganography and in-memory attacks

  20. DoorDash Confirms Data Breach Exposing Customer Personal Information

    DoorDash has confirmed an October 2025 data breach that exposed customer names, phone numbers, addresses and email details

What’s Hot on Infosecurity Magazine?