NCSC Set to Retire Web Check and Mail Check Tools Information Security Magazine 4 weeks ago The UK’s National Cyber Security Centre has urged users of its Web Check and Mail Check services to find alternatives
Russian Hacking Group Sandworm Deploys New Wiper Malware in Ukraine Information Security Magazine 1 month ago Sandworm deployed data wipers against Ukrainian governmental entities and companies in the energy, logistics and grain sectors
“I Paid Twice” Phishing Campaign Targets Booking.com Information Security Magazine 1 month ago Experts have uncovered large-scale phishing exploiting Booking.com, Airbnb and Expedia accounts, targeting hotels and customers
Multi-Turn Attacks Expose Weaknesses in Open-Weight LLM Models Information Security Magazine 1 month ago A new Cisco report exposed large language models to multi-turn adversarial attacks with 90% success rates
Hacktivist-Driven DDoS Dominates Attacks on Public Sector Information Security Magazine 1 month ago ENISA report reveals DDoS accounted for 60% of public sector security incidents last year
AI-Enabled Malware Now Actively Deployed, Says Google Information Security Magazine 1 month ago Google warns of “just-in-time AI” malware using LLMs to evade detection and generate malicious code on-demand
Google Forecasts Rise of Cyber-Physical Attacks Targeting Europe in 2026 Information Security Magazine 1 month ago Europe will likely face a combination of heightened cyber-physical attacks and information operations coming from nation-state groups in 2026
Operation Chargeback Uncovers €300m Fraud Scheme in 193 Countries Information Security Magazine 1 month ago Operation “Chargeback” has dismantled global fraud networks misusing stolen card data from more than 4.3 million victims
UNK_SmudgedSerpent Targets Academics With Political Lures Information Security Magazine 1 month ago A previously unknown cyber actor UNK_SmudgedSerpent has been observed targeting academics with phishing and malware, merging techniques from Iranian groups
Claude Desktop Extensions Vulnerable to Web-Based Prompt Injection Information Security Magazine 1 month ago Three of Anthropic’s Claude Desktop extensions were vulnerable to command injection – flaws that have now been fixed
SMS Fraud Losses Set to Decline 11% in 2026 Information Security Magazine 1 month ago Juniper Research predicts a $9bn drop in losses to SMS fraud next year
Hundreds of Malware-Laden Apps Downloaded 42 Million Times From Google Play Information Security Magazine 1 month ago Zscaler estimates 239 malicious Android apps made it onto the official Play store over the past year
French Police Seize €1.6m Amid Crypto Scam Network Crackdown Information Security Magazine 1 month ago Nine alleged crypto scammers arrested in Cyprus, Germany and Spain
OpenAI Assistants API Exploited in 'SesameOp' Backdoor Information Security Magazine 1 month ago Instead of relying on more traditional methods, the backdoor exploits OpenAI’s Assistants API for command-and-control communications
Scattered Spider, ShinyHunters and LAPSUS$ Form Unified Collective Information Security Magazine 1 month ago Scattered Spider, ShinyHunters and LAPSUS$ have formed an enhanced coordinated threat network for extortion efforts
DragonForce Cartel Emerges as Conti-Derived Ransomware Threat Information Security Magazine 1 month ago DragonForce, a ransomware group using Conti’s code, has adopted a cartel model to expand and recruit
Identity Is Now the Top Source of Cloud Risk Information Security Magazine 1 month ago ReliaQuest data reveals identity issues were responsible for 44% of cloud security alerts in Q3
DeFi Protocol Balancer Loses Over $120m in Cyber Heist Information Security Magazine 1 month ago Digital thieves have got away with over $120m stolen from popular decentralized finance protocol Balancer
CISA and NSA Outline Best Practices to Secure Exchange Servers Information Security Magazine 1 month ago CISA and NSA have released a blueprint to enhance Microsoft Exchange Server security against cyber-attacks
New GDI Flaws Could Enable Remote Code Execution in Windows Information Security Magazine 1 month ago Flaws in Windows Graphics Device Interface (GDI) have been identified that allow remote code execution and information disclosure