Claude Desktop Extensions Vulnerable to Web-Based Prompt Injection Information Security Magazine 5 months 1 week ago Three of Anthropic’s Claude Desktop extensions were vulnerable to command injection – flaws that have now been fixed
SMS Fraud Losses Set to Decline 11% in 2026 Information Security Magazine 5 months 1 week ago Juniper Research predicts a $9bn drop in losses to SMS fraud next year
Hundreds of Malware-Laden Apps Downloaded 42 Million Times From Google Play Information Security Magazine 5 months 1 week ago Zscaler estimates 239 malicious Android apps made it onto the official Play store over the past year
French Police Seize €1.6m Amid Crypto Scam Network Crackdown Information Security Magazine 5 months 1 week ago Nine alleged crypto scammers arrested in Cyprus, Germany and Spain
OpenAI Assistants API Exploited in 'SesameOp' Backdoor Information Security Magazine 5 months 1 week ago Instead of relying on more traditional methods, the backdoor exploits OpenAI’s Assistants API for command-and-control communications
Scattered Spider, ShinyHunters and LAPSUS$ Form Unified Collective Information Security Magazine 5 months 1 week ago Scattered Spider, ShinyHunters and LAPSUS$ have formed an enhanced coordinated threat network for extortion efforts
DragonForce Cartel Emerges as Conti-Derived Ransomware Threat Information Security Magazine 5 months 1 week ago DragonForce, a ransomware group using Conti’s code, has adopted a cartel model to expand and recruit
Identity Is Now the Top Source of Cloud Risk Information Security Magazine 5 months 1 week ago ReliaQuest data reveals identity issues were responsible for 44% of cloud security alerts in Q3
DeFi Protocol Balancer Loses Over $120m in Cyber Heist Information Security Magazine 5 months 1 week ago Digital thieves have got away with over $120m stolen from popular decentralized finance protocol Balancer
CISA and NSA Outline Best Practices to Secure Exchange Servers Information Security Magazine 5 months 1 week ago CISA and NSA have released a blueprint to enhance Microsoft Exchange Server security against cyber-attacks
New GDI Flaws Could Enable Remote Code Execution in Windows Information Security Magazine 5 months 1 week ago Flaws in Windows Graphics Device Interface (GDI) have been identified that allow remote code execution and information disclosure
Hackers Help Organized Crime Groups in Cargo Freight Heists, Researchers Find Information Security Magazine 5 months 1 week ago Proofpoint researchers have observed recent hacking campaigns supporting cargo theft
Conti Suspect in Court After Extradition From Ireland Information Security Magazine 5 months 1 week ago Ukrainian national Oleksii Oleksiyovych Lytvynenko has appeared in a US court in connection with Conti ransomware charges
Leak Site Ransomware Victims Spike 13% in a Year Information Security Magazine 5 months 1 week ago CrowdStrike data reveals a 13% annual increase in the number of European ransomware victims in 2025
Conduent Data Breach Impacts Over 10.5 Million Individuals Information Security Magazine 5 months 2 weeks ago Over 10.5 million individuals were impacted by a widespread 2024 data breach at Conduent Business Services, with customer notifications issued in October 2025
Chinese-Linked Hackers Exploit Windows Flaw to Spy on Belgian and Hungarian Diplomats Information Security Magazine 5 months 2 weeks ago A new UNC6384 campaign highlights the threat actor’s growing sophistication and geographic expansion
Facial Recognition Firm Clearview AI Hit with Criminal Complaint in Austria Information Security Magazine 5 months 2 weeks ago Clearview AI faces a criminal complaint in Austria for allegedly ignoring EU data protection rulings
Critical Flaws Found in Elementor King Addons Affect 10,000 Sites Information Security Magazine 5 months 2 weeks ago The King Addons for Elementor plugin contains two flaws allowing unauthenticated file uploads and privilege escalation
Threat Actors Utilize AdaptixC2 for Malicious Payload Delivery Information Security Magazine 5 months 2 weeks ago Cybercriminals are abusing AdaptixC2, a legitimate emulation framework, in ransomware campaigns
Shadow AI: One In Four Employees Use Unapproved AI Tools, Research Finds Information Security Magazine 5 months 2 weeks ago Over a quarter of employees work with AI tools that had not been authorized by their company