https://www.infosecurity-magazine.com/news/jlr-phased-restart-operations
JLR said it is in a position to start clearing its backlog of payments for suppliers, while its parts logistics center is returning to full operations
cyber attackjlrbeginsphasedrestart
https://www.infosecurity-magazine.com/news/new-linux-vulnerabilities-surge/
Nov 5, 2025 - Researchers discovered over 3000 Linux vulnerabilities in 2024, the largest of any category
in anewlinuxvulnerabilitiessurge
https://www.infosecurity-magazine.com/news/not-proud-of-hacker-past-beto-1-1/
Beto O'Rourke says he regrets his past affiliation with Cult of the Dead Cow.
proudhackerpastbetotells
https://www.infosecurity-magazine.com/white-papers/top-five-considerations-for-removable-media-securi/
The rapid growth of removable media has revolutionized the way we store and transport information, encouraging increased productivity - as well as a higher...
top fiveremovable mediasecuritymagazine
https://www.infosecurity-magazine.com/news/blue-shield-california-data-breach/
Sep 19, 2025 - A misconfigured tracking tool has exposed protected health information of 4.7 million Blue Shield members to Google Ads
blue shielddata breachcaliforniaaffectsmillion
https://www.infosecurity-magazine.com/news/security-database-aims-empower
Common Good Cyber has released a new mapping database designed to help NGOs find the security tools they need
non profitssecuritydatabaseaimsempower
https://www.infosecurity-magazine.com/webinars/how-ai-is-weaponizing-the-cyber/
In this webinar, we’ll explore how AI is being weaponized across the cyber battlefield, not in the distant future, but now
cyber defensestrategicaistayingahead
https://www.infosecurity-magazine.com/industry-appointments/
Keep up-to-date with the latest Industry Appointments trends through news, opinion and educational content from Infosecurity Magazine.
industryappointmentsnewsarticlesinfosecurity
https://www.infosecurity-magazine.com/news/flexibleferret-malware-macos-go/
Nov 28, 2025 - A new macOS malware chain using staged scripts and a Go-based backdoor has been attributed to FlexibleFerret, designed to steal credentials and maintain system...
newmalwarechaintargetsmacos
https://www.infosecurity-magazine.com/news/manufacturing-advanced-email/
Phishing attacks, business email compromise and vendor email compromise attacks on manufacturing have surged in the past 12 months
manufacturing sectorcrosshairsadvancedemailattacks
https://www.infosecurity-magazine.com/blogs/how-to-prevent-saas-data-loss/
Dec 18, 2025 - This article helps bridge the divide by showing how SaaS fundamentally changes Business Continuity and Disaster Recovery planning and data repair, particularly...
data losssaasstrategiespreventdowntime
https://www.infosecurity-magazine.com/news/bloody-wolf-expands-central-asia/
Dec 9, 2025 - A new Bloody Wolf campaign exploits legitimate remote-administration software for cyber-attacks on government targets in Central Asia
bloody wolfthreat actorcentral asiaexpandsactivity
https://www.helpnetsecurity.com/2013/03/14/fight-cybercrime-with-a-visit-to-infosecurity-europe-2013/
Over the last year we have witnessed security attacks against the worlds' largest organisations, and cyber-attacks which have increasingly been viewed as
a visitfightcybercrimeinfosecurityeurope
https://www.infosecurity-magazine.com/news/phishing-campaigns-rmm-tools
Threat actors are using multiple lures to trick users into installing RMM tools
remote accessphishingcampaignsdroprmm
https://www.infosecurity-magazine.com/news/police-crack-down-droidjack/
Police Crack Down on DroidJack Spyware with Europe-wide Arrests. Raids likely to be against malware users, not authors
crack downpolicespywareeuropewide
https://web.archive.org/all/20060513001322/http:/security.getnetwise.org/cgi-bin/redir.pl?url=http://www.ftc.gov/infosecurity
redirecthttpwwwftcgov
https://www.infosecurity-magazine.com/white-papers/jon-ramsey-podcast-transcript/
In this podcast transcript, Jon Ramsey, Chief Technology Officer at SecureWorks, addresses an array of security issues currently facing businesses, including...
jonramseypodcasttranscriptinfosecurity
https://www.infosecurity-magazine.com/news/california-shuts-health-data/
California privacy regulator, the CPPA, is cracking down on data brokers trading personal data without authorization
health datacaliforniashutsbrokersinfosecurity
https://www.infosecurity-magazine.com/blogs/five-cyber-threats-2021/?utm_source=mosaicsecurity
The five trends that will dominate the cybersecurity landscape in 2021
cyber threatsto watchfiveemerging
https://www.infosecurity-magazine.com/white-papers/gcore-ddos-attack-trends/
Feb 8, 2025 - The latest Gcore reveals alarming developments in the scale and sophistication of DDoS attacks in the second half of 2023.
ddos attackgcoreradartrendsinfosecurity
https://infosecurity-magazine.com/news/digital-certificate-lifespans-fall?utm_source=NerdNews
CA/Browser Forum members have voted in favor of shortening TLS/SSL certificate lifespans to 47 days
digital certificatefalldays
https://www.infosecurity-magazine.com/news/asahi-15-million-customers/
Dec 3, 2025 - Almost two million people may have seen their personal data exposed following a large-scale cyberattack that hit Asahi in September 2025
asahimillioncustomersaffectedmajor
https://www.infosecurity-magazine.com/news/two-critical-flaws-in-n8n-ai/
Pillar Security discovered two new critical vulnerabilities in n8n that could lead to supply chain compromise, credential harvesting and complete takeover...
found inworkflow automationtwocriticalflaws
https://www.infosecurity-magazine.com/news/owasp-data-exposure-risk-ai/?ref=mandos.io
OWASP has updated its Top 10 list of risks for LLMs and GenAI, upgrading several areas and introducing new categories
risk from aiowaspwarnsgrowingdata
https://www.infosecurity-magazine.com/news/white-house-issues-national-cyber/?utm_source=mosaicsecurity
President Trump released aggressive plans for nation cyber defense
white houseissuesnationalcyberstrategy
https://www.infosecurity-magazine.com/news/clickfix-attacks-surge-2025/
The ClickFix social engineering technique has become the second most common attack vector, behind only phishing, according to ESET research
attackssurgeinfosecuritymagazine
https://www.infosecurity-magazine.com/blogs/how-threat-actors-turn-legit-tools/
Nov 22, 2025 - Threat actors are increasingly using trusted, legitimate tools to hide malicious activity, with 84% of high-severity attacks now leveraging LotL
threatactorsturnlegitimatetools
https://www.infosecurity-magazine.com/magazine-features/zero-trust-essential-vs/
Jordon Kelly says that zero trust is needed to counter increasingly sophisticated cyber threats, but Callum Roxan believes this approach does not make sense...
the modern worldzero trustessentialvsunrealistic
https://www.infosecurity-magazine.com/news/cyber-deals-november-2025/
Dec 3, 2025 - November 2025 saw cybersecurity giants like Palo Alto Networks, Bugcrowd and Zscaler invest in AI-powered security solutions
m acyberroundupgiantsai
https://www.infosecurity-magazine.com/news/android-rat-hugging-face-host/
Bitdefender has discovered a new Android malware campaign that uses Hugging Face
hugging faceandroidratuseshost
https://www.infosecurity-magazine.com/news/uk-liability-software-providers/
Dec 6, 2025 - A new report from the UK Business and Trade Committee has called for accountability of software providers for cyber flaws amid rising attack costs
software providerukreportliabilityinsecurity
https://www.infosecurity-magazine.com/podcasts/the-sharepoint-exploit-crisis/
In this special episode of the Infosecurity Magazine podcast, we dive deep into the rapidly evolving story surrounding Microsoft SharePoint On-Premises
deep divetoolshellsharepointexploitcrisis
https://www.infosecurity-magazine.com/news/ai-supercharges-attacks-cybercrime/
Weaponized AI is fueling a new wave of cybercrime, said Group-IB in its latest report
fifth waveaisuperchargesattackscybercrime
https://www.infosecurity-magazine.com/news/researchers-call-shared-dark-web/
Researchers Call for a Shared Dark Web Taxonomy. Terbium Labs argues that current reports on pricing are inconsistent and misleading
for adark webresearcherscallshared
https://www.helpnetsecurity.com/2009/04/30/infosecurity-2009-day-two/
Here's a look at the second day of Infosecurity 2009 taking place in Earls Court - London, UK. You can watch the video from the first day here.
day twoinfosecurityhelpnet
https://www.infosecurity-magazine.com/news/bybit-140m-bounty-recover-mega/
Following the largest-ever crypto theft, Bybit is offering researchers up to 10% of recovered funds
bybitoffersbountyrecoverfunds
https://www.infosecurity-magazine.com/blogs/identity-theft-how-to-fix-it/
Nov 6, 2025 - Identity theft is primarily a data problem, not just a hacking issue, as thieves exploit readily available personal information
identity thefthackingproblemdata
https://www.infosecurity-magazine.com/news/apps-download-41-million-times/
Zscaler estimates 239 malicious Android apps made it onto the official Play store over the past year
million timeshundredsmalwareladenapps
https://www.infosecurity-magazine.com/news/160000-companies-regulator-gdpr/
DLA Piper finds 22% increase in breached firms notifying European GDPR regulators
companiesnotifyregulatorgdprbreaches
https://www.infosecurity-magazine.com/news/nk-hackers-etherhiding-steal-crypto/
Google reveals North Korean hackers are using EtherHiding, a blockchain-based technique, to deliver malware and steal cryptocurrency
north koreanhackersusestealcrypto
https://www.infosecurity-magazine.com/webinars/mastering-ai-security-isaca-aaism/
In this 30-minute session, ISACA's Kirsten Lora and Infosec Institute's Keatron Evans will unpack the new AAISM certification and share insights into mastering...
masteringaisecuritynewcertification
https://info.agilityis.uk/2017/06/join-us-for-infosecurity-week.html
Infosecurity Week is a seven day city wide event bringing together Infosecurity professionals to learn, share and have fun in and around Lon...
join usinfosecurityweek
https://www.infosecurity-magazine.com/news/scam-platform-shut-dow-by-uk/
UK authorities shut down a scam platform responsible for over 1.3 million calls to 500,000 victims, resulting in millions of pounds in losses
shut downscamplatformukauthorities
https://www.infosecurity-magazine.com/news/us-scraps-missiles-over/?utm_source=mosaicsecurity
America drops plans to adopt Iron Dome missile defense system amid cybersecurity fears
usscrapsmissilescybersecurityconcerns
https://www.infosecurity-magazine.com/news/despite-bod-1801-fed-agencies-not/
Federal agencies have yet to improve the way they handle machine identities, says Venafi.
despitebodfedagencieshttps
https://www.infosecurity-magazine.com/magazine-features/complying-to-a-false-sense-of-security/
Simply ticking the boxes to comply with legislation can give companies a false sense of security, finds Wendy M. Grossman
falsesensesecuritymagazine
https://www.infosecurity-magazine.com/news/us-warns-of-destructive-chinese/
The US claims to have discovered Chinese Volt Typhoon intrusions in multiple critical infrastructure sectors
cyber attacksuswarnsdestructivechinese
https://www.infosecurity-magazine.com/news/russian-malware-blender-3d-files/
Dec 10, 2025 - Morphisec has observed a new operation embedding StealC V2 malware in Blender project files, targeting users via 3D assets and launching a multi-stage...
malware campaignrussianlinkedhidesblender
https://www.infosecurity-magazine.com/magazine-features/would-like-to-meet/
What are the dating apps really doing with your data
dating appsyour datareally
https://www.infosecurityblueprint.com/
InfoSecurity Blueprint, LLC is Buffalo based and dedicated to providing Small & Medium Businesses (SMBs) with expert information security advising.
infosecurityblueprintllcadvising
https://www.infosecurity-magazine.com/news/ivanti-vulnerability-exploit-could/
Two NHS England trusts could see highly sensitive patient records exposed
ivantivulnerabilityexploitcouldexpose
https://www.infosecurity-magazine.com/news/global-police-black-axe-cybercrime/
Interpol claims hundreds of arrests were made as police disrupted the West African Black Axe cybercrime gang
on blackglobalpoliceswoopaxe
https://www.infosecurity-magazine.com/webinars/audit-compliance-in-the-era-of-ai/
This session explores the transformative potential of emerging technologies, including AI, automated workflows and advanced data analytics
era of aiin theemerging technologyauditcompliance
https://www.infosecurity-magazine.com/magazine-features/tiktok-cybersecurity-threat/
How much of a threat does the social media app pose to organizations and their users?
tiktoksecuritythreatbusinessmagazine
https://www.infosecurity-magazine.com/webinars/mastering-identity-access-nonhuman/
Deploying and maintaining identity and access management in the cloud presents unique challenges, especially when considering non-human identities and service...
non humanmasteringidentityaccesscloud
https://www.infosecurity-magazine.com/news/browser-push-notifications-deliver/
Dec 10, 2025 - Researchers at BlackFrog have uncovered Matrix Push C2, a malicious command-and-control system that abuses web browser push notifications to deliver malware
push notificationscybercriminalsexploitbrowserdeliver
https://www.infosecurity-magazine.com/webinars/exposing-ais-blind-spots/
This event explores the critical differences between AI Security and AI Safety, and why you should address both
blind spotsthe ageexposingsecurityvs
https://www.infosecurity-magazine.com/blogs/how-iam-control-prevent-major/
Nov 10, 2025 - Why self-service password reset with MFA is more than just a convenience – it’s a critical layer of defense
cyber attackssimpleiamcontrolcould
https://www.infosecurity-magazine.com/news/flaws-expose-risks-fluent-bit/
Dec 10, 2025 - Critical flaws in Fluent Bit threaten telemetry across platforms according to an advisory published by Oligo Security researchers
fluent bitflawsexposeriskslogging
https://www.infosecurity-magazine.com/news/deepfake-attacks-hit-twothirds-of/
Gartner research found that 62% of organizations have experienced a deepfake attack in the past 12 months
two thirdsdeepfakeattackshitbusinesses
https://www.infosecurity-magazine.com/blogs/worried-consumers-data-breach/
Nov 13, 2025 - Specops discuss the action consumers should take when they receive a data breach notification
data breachworriedconsumersreally
https://www.infosecurity-magazine.com/news/phishing-upcrypter-deploy-rat
A global phishing campaign has been identified using personalized emails and fake websites to deliver malware via UpCrypter
remote accessphishingcampaignusesdeploy
https://www.infosecurity-magazine.com/blogs/insights-ceh-hof-2025-industry/
Nov 8, 2025 - According to the CEH Hall of Fame 2025 Industry Report , 100% of CEH Hall of Fame inductees attribute their career success and enhanced workplace recognition...
from theinsightscehhofindustry
https://www.infosecurity-magazine.com/news/criminals-lookalike-domains-email
BlueVoyant found that the use of lookalike domains in email-based attacks is allowing actors to extend the types of individuals and organizations being targeted
cybercriminalsexpanduselookalikedomains
https://www.infosecurity-magazine.com/news/hackers-target-starbucks-mobile/
The ingenious scam takes advantage of the auto-refill function that tops up balances with a linked bank card.
mobile paymentshackerstargetstarbucksapp
https://www.infosecurity-magazine.com/white-papers/cloudflare-advanced-ddos-protection/
Although DoS attacks are not a recent phenomenon, the methods and resources available to conduct and mask such attacks have dramatically evolved to include...
ddos protectioncloudflareadvancedinfosecuritymagazine
https://www.infosecurity-magazine.com/podcasts/unlocking-infosecurity-europe/
Listen to this episode of the Infosecurity Magazine podcast for your comprehensive guide to Infosecurity Europe 2024, taking place at the Excel London from 4-6...
must seepro tipsunlockinginfosecurityeurope
https://www.infosecurity-magazine.com/news/ai-military-ids-north-korea/
Nov 7, 2025 - Genians observed the Kimsuky group impersonate a defense institution in a spear-phishing attack, leveraging ChatGPT to create fake military ID cards
north koreanphishing attackaiforgedmilitary
https://in4security.com/
Специализированный сервис-провайдер ИБ
infosecurity
https://www.infosecurity-magazine.com/news/chinese-ai-villager-pen-testing/
Jan 1, 2026 - AI-native Villager, which automates Kali and DeepSeek penetration tests, has reached 11,000 PyPI downloads fueling dual-use threat
chinese aipen testingvillagertoolhits
https://www.infosecurity-magazine.com/next-gen-infosec/asset-visibility-ot-security-ai/
Jul 12, 2025 - Joseph Chukwube says that the complexity of OT security has hindered organizations’ abilities to mitigate threats effectively
hybrid aiimproveassetvisibilityot
https://www.infosecurity-magazine.com/webinars/ai-agents-evolving-landscape/
Gain a deeper understanding of how AI agents interact with user identities, the evolving regulatory landscape, and the future of identity management in an...
verifiable credentialsairedefiningdigitalidentities
https://www.infosecurity-magazine.com/white-papers/13-steps-to-gdpr/
Once in force, the European Union General Data Protection Regulation (GDPR) will require every multinational company that offers products or services to...
stepsmeetingsecuritychallengesnew
https://www.infosecurity-magazine.com/news/dark-web-markets-fraudgpt-ai-tool/
The tool can craft phishing emails, create undetectable malware and identify vulnerable sites
dark webai toolmarketsoffernew
https://www.infosecurity-magazine.com/news/new-gainsight-supply-chain-hack/
Dec 3, 2025 - Salesforce believes there has been unauthorized access to its customers’ data through the Gainsight app’s connection to its platform
supply chainnewhackcouldaffect
https://www.infosecurity-magazine.com/news/half-supply-chain-incidents/
Oct 19, 2025 - Risk Ledger found that 90% of UK professionals view supply chain cyber incidents as a top concern for 2025
supply chainhalffirmssuffertwo
https://www.infosecurity-magazine.com/news/rondodox-botnet-targets-hpe/
Check Point Research has reported a surge in attacks on a vulnerability in HPE OneView, driven by the Linux-based RondoDox botnet
botnettargetshpeoneviewvulnerability
https://www.infosecurity-magazine.com/news/google-report-new-vulnerabilities/
Nov 5, 2025 - Google’s Project Zero team will provide limited details of new vulnerabilities early following discovery, in a bid to speed up end users’ patching
one weekgooglepubliclyreportnew