Infosecurity News

  1. AI Accelerates Attacker Breakout Time to Just Four Minutes

    ReliaQuest claims AI has reduced breakout and exfiltration time to under 10 minutes

  2. Chinese AI Firms Hit Claude with Distillation Attacks, Anthropic Warns

    Anthropic accused DeepSeek, Moonshot and MiniMax of illicitly using Claude to steal some of the AI model’s capabilities

  3. AI-powered Cyber-Attacks Up Significantly in the Last Year, Warns CrowdStrike

    CrowdStrike Global Threat Report warns how adversaries are leveraging AI to make campaigns more efficient and more effective

  4. Shai-Hulud-Like Worm Targets Developers via npm and AI Tools

    Supply chain worm mimicking Shai-Hulud malware spread via malicious npm packages, targeting AI tools has been identified by security researchers

  5. Fraud Investigation Reveals Sophisticated Python Malware

    Sophisticated Python malware uncovered in fraud probe shows obfuscation, disposable infrastructure

  6. Russian Cyber Threat Actor Uses GenAI to Compromise Fortinet Firewalls

    A low-skilled Russian-speaking attacker has used GenAI tools to help deploy a successful attack workflow targeting FortiGate instances

  7. Leading Semiconductor Supplier Advantest Hit by Ransomware Attack

    Advantest, a Japanese specialist in testing computer chips for major semiconductor manufacturers, has deployed incident response protocols following a cybersecurity incident

  8. Jackpotting Surge Costs Banks Over $20m, Warns FBI

    A new FBI Flash alert claims $20m was lost to ATM jackpotting attacks in 2025 alone

  9. University of Mississippi Medical Center Still Offline After Ransomware Attack

    University of Mississippi Medical Center is still scrambling to respond to a ransomware attack last Thursday

  10. Dramatic Escalation in Frequency and Power of DDoS Attacks

    DDoS attack frequency has risen to ‘alarming levels,’ warns Radware report

  11. Android Malware Hijacks Google Gemini to Stay Hidden

    A new Android malware implant using Google Gemini to perform persistence tasks was discovered on VirusTotal and analyzed by ESET

  12. Remcos RAT Expands Real-Time Surveillance Capabilities

    New Remcos RAT variant enhances real-time surveillance and evasion techniques to compromise Windows

  13. Industrial-Scale Fake Coretax Apps Drive $2m Fraud in Indonesia

    Fraud campaign exploiting Indonesia’s Coretax resulted in $1.5m to $2m in losses via malicious apps

  14. Industrial Control System Vulnerabilities Hit Record Highs

    Forescout paper reveals ICS advisories hit a record 508 in 2025

  15. Starkiller: New ‘Commercial-Grade’ Phishing Kit Bypasses MFA

    A new cybercriminal toolkit uses proxies to mimic popular online services and represents a “significant escalation in phishing infrastructure,” warn researchers at Abnormal

  16. Flaws in Popular Software Development App Extensions Allow Data Exfiltration

    Four serious new vulnerabilities affect Microsoft Visual Studio Code, Cursor and Windsurf extensions, three of which remain unpatched

  17. Researchers Reveal Six New OpenClaw Vulnerabilities

    Endor Labs has published details of six new vulnerabilities in popular AI assistant OpenClaw

  18. Cryptojacking Campaign Exploits Driver to Boost Monero Mining

    Cryptojacking campaign used pirated software to deploy a persistent XMRig miner with stealth tactics

  19. AI Assistants Used as Covert Command-and-Control Relays

    AIs like Grok and Microsoft Copilot can be exploited as covert C2 channels for malware communication

  20. Record Number of Ransomware Victims and Groups in 2025

    Searchlight Cyber reports a 30% annual increase in ransomware victim numbers in 2025

What’s Hot on Infosecurity Magazine?