Attackers Abuse Virtual Private Servers to Compromise SaaS Accounts Information Security Magazine 1 month 1 week ago Darktrace observed a coordinated campaign on customer SaaS accounts, all of which involved logins from IP addresses linked to VPS providers
Apple Releases Patch for Likely Exploited Zero-Day Vulnerability Information Security Magazine 1 month 1 week ago All Apple users are encouraged to update their iPhones, iPads and macOS devices
Microsoft to Make All Products Quantum Safe by 2033 Information Security Magazine 1 month 1 week ago Microsoft has set out a roadmap to complete transition to PQC in all its products and services by 2033, with roll out beginning by 2029
Russian Espionage Group Static Tundra Targets Legacy Cisco Flaw Information Security Magazine 1 month 1 week ago Russian state-backed hackers are exploiting a seven-year-old Cisco Smart Install vulnerability (CVE-2018-0171) in end-of-life devices, prompting warnings from the FBI and Cisco Talos
Colt Admits Customer Data Likely Stolen in Cyber-Attack Information Security Magazine 1 month 1 week ago Colt customers can request a list of filenames posted on the dark web via a dedicated call center
Oregon Man Charged in Rapper Bot DDoS-for-Hire Case Information Security Magazine 1 month 1 week ago A 22-year-old Oregon man has been charged with administering the Rapper Bot DDoS-for-hire Botnet
Cybercriminal Linked to Notorious Scattered Spider Gang Gets 10-Year Sentence Information Security Magazine 1 month 1 week ago Noah Urban, linked with the Scattered Spider cybercriminal gang, will also pay $13m in restitution to victims
Orange Data Breach Raises SIM-Swapping Attack Fears Information Security Magazine 1 month 1 week ago Orange Belgium revealed that a threat actor has compromised 850,000 customer accounts, with SIM card numbers among the data accessed
“PromptFix” Attacks Could Supercharge Agentic AI Threats Information Security Magazine 1 month 1 week ago Guardio reveals a new AI take on ClickFix dubbed “PromptFix”
NIST Unveils Guidelines to Help Spot Face Morphing Attempts Information Security Magazine 1 month 1 week ago NIST has released new guidelines examining the pros and cons of detection methods for face morphing software
Pharmaceutical Company Inotiv Confirms Ransomware Attack Information Security Magazine 1 month 1 week ago Indiana-based pharmaceutical research company Inotiv has confirmed it suffered a ransomware attack, disrupting operations and compromising data
TRM Launches Industry-Wide Platform to Fight Crypto Crimes Information Security Magazine 1 month 1 week ago With Beacon Network, TRM Labs has brought together law enforcement and some of the largest crypto exchanges to fight against crypto crimes
Mule Operators in META Adopt Advanced Fraud Schemes Information Security Magazine 1 month 1 week ago A new report has mapped the tactical evolution of mule operators in the META region from VPNs to advanced fraud networks
Hackers Weaponize QR Codes in New 'Quishing' Attacks Information Security Magazine 1 month 1 week ago Researchers discovered two new phishing techniques where attackers split malicious QR codes or embed them into legitimate ones
Warlock Ransomware Hitting Victims Globally Through SharePoint ToolShell Exploit Information Security Magazine 1 month 1 week ago Trend Micro highlighted a sophisticated post-compromise attack chain to deploy the Warlock ransomware in unpatched SharePoint on-prem environments
Executives Warned About Celebrity Podcast Scams Information Security Magazine 1 month 1 week ago The Better Business Bureau is urging business owners and influencers not to fall for a new type of podcast scam
UK Retreats on Apple Encryption Backdoor Demand Following US Pressure Information Security Magazine 1 month 1 week ago US director of national intelligence, Tulsi Gabbard, stated that her government persuaded the UK to withdraw its controversial demand
Microsoft Issues Out-of-Band Update to Fix Recovery Issues Information Security Magazine 1 month 1 week ago Microsoft has issued an emergency patch to fix Windows recovery problems for some users
ISACA Launches AI-Centric Security Management Certification Information Security Magazine 1 month 1 week ago ISACA has launched the new AAISM certification to equip security leaders with AI risk management expertise
Public Exploit Released for Critical SAP NetWeaver Flaw Information Security Magazine 1 month 2 weeks ago A critical flaw in SAP NetWeaver AS Java is being widely exploited, allowing unauthenticated remote code execution