Infosecurity News

  1. Google API Keys Quietly Gain Access to Gemini on Android Devices

    Google API key flaw exposes mobile apps to Gemini AI access, private files and billing risks

  2. Critical Vulnerability in Ninja Forms Exposes WordPress Sites

    Ninja Forms File Upload RCE via unauthenticated arbitrary file upload; update to 3.3.27 immediately

  3. Anthropic Launches Project Glasswing to Use AI to Find and Fix Critical Software Vulnerabilities

    Anthropic launches Project Glasswing, using its Claude Mythos Preview AI to autonomously identify and fix undiscovered vulnerabilities in critical software

  4. US Thwarts DNS Hijacking Network Controlled by Russian APT28 Hackers

    The FBI deployed a method to unplug US-based routers compromised by APT28 from the threat actor’s malicious network

  5. Claude Discovers Apache ActiveMQ Bug Hidden for 13 Years

    Anthropic’s Claude AI has helped researchers find a vulnerability in Apache ActiveMQ Classic

  6. Iran‑Backed Threat Actors Hit US CNI Providers via Internet‑Facing OT Assets

    CISA has revealed Iranian attacks causing disruption and financial loss at US critical infrastructure firms

  7. Russian APT28 Hackers Hijack Routers to Steal Credentials, UK Security Agency Warns

    Newly identified malicious campaigns are linked to virtual private servers modified by APT28 to operate as malicious DNS servers

  8. GPU Rowhammer Attack Enables Privilege Escalation and Full System Compromise

    GPUBreach uses GPU Rowhammer on GDDR6 to flip bits, corrupt page tables and escalate to system root

  9. GrafanaGhost Exploit Bypasses AI Guardrails for Silent Data Exfiltration

    GrafanaGhost chains AI prompt injection and URL flaws to exfiltrate sensitive Grafana data

  10. Over $17bn Lost to Cyber Fraud in the Last Year, Warns FBI

    Cryptocurrency scams alone cost victims over $7 billion, while AI-enabled fraud threats are on the rise, says FBI

  11. Storm-1175 Exploits Flaws in High-Velocity Medusa Attacks

    Microsoft has released a new report about the Storm-1175 group and its connection to Medusa ransomware

  12. Fortinet Releases Emergency Patch After FortiClient EMS Bug Is Exploited

    Fortinet has updated its FortiClient EMS product after zero-day attacks surfaced

  13. New Phishing Platform Used in Credential Theft Campaigns Against C-Suite Execs

    A large-scale credential theft campaign targeting senior executives has been linked to a previously unknown automated phishing platform called Venom

  14. New 'Storm' Infostealer Remotely Decrypts Stolen Credentials

    This modern infostealer adopted server-side decryption of stolen credentials to bypass security controls

  15. NCSC Issues Security Alert Over Hackers Targeting WhatsApp and Signal Accounts

    The UK’s cybersecurity agency offered advice to “high-risk’ individuals” on how to protect against social engineering and cyber-attacks

  16. Apple Expands iOS 18 Security Updates Amid DarkSword Threat

    iOS/iPadOS 18.7.7 updates expanded to protect older devices from DarkSword web exploit kit

  17. Researchers Observe Sub-One-Hour Ransomware Attacks

    Halcyon says Akira is now capable of carrying out an entire ransomware attack in less than an hour

  18. GitHub Used as Covert Channel in Multi-Stage Malware Campaign

    LNK files use GitHub C2, embedded decoders and PowerShell for persistence and data exfiltration

  19. Most CNI Firms Face Up to £5m in Downtime from OT Attacks

    E2e-assure says 80% of critical infrastructure providers could face millions in downtime from cyber-attacks

  20. Google Introduces Android Dev Verification Amid Openness Debate

    Android requires dev identity verification for sideloaded apps; phased global rollout from September

What’s Hot on Infosecurity Magazine?