https://www.infosecurity-magazine.com/news/ai-military-ids-north-korea/
Nov 7, 2025 - Genians observed the Kimsuky group impersonate a defense institution in a spear-phishing attack, leveraging ChatGPT to create fake military ID cards
north koreanphishing attackaiforgedmilitary
https://www.infosecurity-magazine.com/podcasts/the-information-heist/
In our latest podcast episode, we take a closer look at the rise of infostealers and what you can do to protect yourself from these insidious threats
infosecurity magazineinformationheistcrackingcode
https://www.infosecurity-magazine.com/interviews/tarnveer-singh-cisos-ai-rollout/
Tarnveer Singh, CISO at The Exeter, speaks to Infosecurity about the steps security leaders must take to ensure secure and compliant AI deployment
responsible aisinghcisosensurerollout
https://www.infosecurity-magazine.com/?origin=https://www.13secnews.com
The award winning online magazine dedicated to the strategy, insight and technology of information security
infosecurity magazineinformationnewsresources
https://www.infosecurity-magazine.com/news/uk-firms-drowning-in-breaches/
UK Firms Drowning in Breaches. Carbon Black report reveals an average of 3.7 per organization last year
infosecurity magazineukfirmsdrowningbreaches
https://www.infosecurity-magazine.com/news/google-launches-ai-bug-bounty/
Google has introduced a new AI Vulnerability Reward Program offering up to $30,000 for bug discoveries in its AI products
bug bountygooglelaunchesaitop
https://www.infosecurity-magazine.com/news/bloody-wolf-expands-central-asia/
Dec 9, 2025 - A new Bloody Wolf campaign exploits legitimate remote-administration software for cyber-attacks on government targets in Central Asia
bloody wolfthreat actorcentral asiaexpandsactivity
https://www.infosecurity-magazine.com/blogs/how-iam-control-prevent-major/
Nov 10, 2025 - Why self-service password reset with MFA is more than just a convenience – it’s a critical layer of defense
cyber attackssimpleiamcontrolcould
https://www.infosecurity-magazine.com/white-papers/healthcare-cloud-security-build-vs/
Sep 6, 2024 - Healthcare organizations face both challenges and opportunities as data management increasingly migrates to the cloud, and in-house IT teams must determine
build vs buyhealthcare cloudinfosecurity magazine
https://www.infosecurity-magazine.com/magazine-features/the-generation-x-y-z-of/
Not all millennials approach privacy and security with the same attitudes. As Tom Brewster discovers, regardless of age, a one-sized-fits all approach to...
generation xinformation securityinfosecurity magazine
https://www.infosecurity-magazine.com/webinars/how-midmarket-can-leverage/
Learn how to unlock the full value of your existing Microsoft Security stack, harness AI for both defence and efficiency and build a culture of resilience...
mid marketmicrosoft securitybusinessesleverageproactiv
https://www.infosecurity-magazine.com/news-features/top-cyber-attacks-2023/
Infosecurity sets out the top 10 most damaging cyber-attacks that emerged in 2023
cyber attacksinfosecurity magazinetop
https://www.infosecurity-magazine.com/blogs/how-to-use-a-password-audit/
Nov 13, 2025 - This article explains how audits strengthen cybersecurity by exposing common gaps, enabling faster remediation and enforcing stronger policies
password audituseimprovecybersecurity
https://www.infosecurity-magazine.com/news/crypto-scams-reach-new-heights-fbi/
The Federal Bureau of Investigation's Internet Crime Complaint Center (IC3) reported a 45% increase in cryptocurrency-related scams in 2023
reach new heightscrypto scamsfbireports
https://www.infosecurity-magazine.com/news/number-cybersecurity-pros-surges/
Cybersecurity is now the fifth fastest-growing occupation in the UK, says Socura
four yearsnumbercybersecurityprossurges
https://www.infosecurity-magazine.com/interviews/qa-adenike-cosgrove/
People person Adenike Cosgrove shares her advice to those starting out in cyber plus her personal proudest moment
infosecurity magazineqadenikecosgrove
https://www.infosecurity-magazine.com/magazine-features/biometrics-reach-maturity/
In both the identity management and security arenas, the use of biometric technology is increasing apace. Sebastian Fox looks at how the business application...
infosecurity magazinebiometricsreachmaturity
https://www.infosecurity-magazine.com/news/clickfix-attacks-surge-2025/
The ClickFix social engineering technique has become the second most common attack vector, behind only phishing, according to ESET research
infosecurity magazineattackssurge
https://www.infosecurity-magazine.com/news/police-crack-down-droidjack/
Police Crack Down on DroidJack Spyware with Europe-wide Arrests. Raids likely to be against malware users, not authors
policecrackspywareeuropewide
https://www.infosecurity-magazine.com/blogs/worried-consumers-data-breach/
Nov 13, 2025 - Specops discuss the action consumers should take when they receive a data breach notification
data breachworriedconsumersreally
https://www.infosecurity-magazine.com/webinars/ot-security-risk-reduction/
Join this webinar to learn how to build a multi-dimensional, real-time view of your OT environment. Rockwell Automation will share strategies for proactive...
ot securityrisk reductionecosystemtargetedreporting
https://www.infosecurity-magazine.com/white-papers/how-to-comply-aus-privacy-act/
May 18, 2025 - How to comply with Australian Privacy Act changes, increase alignment with Essential Eight while improving cyber security posture
australian privacy actinfosecurity magazinecomplychanges
https://www.infosecurity-magazine.com/news/ai-voice-virtual-meeting-fraud/
Pindrop warns of 1210% increase in AI-powered fraud last year
virtual meetingaienabledvoicefraud
https://www.infosecurity-magazine.com/news/information-security-technology-not-enough/
Information security technology is of little use if employees unwittingly give up log-in details, passwords and other sensitive information to hackers using...
information securityinfosecurity magazinetechnologyenough
https://www.infosecurity-magazine.com/news/gucci-mcqueen-customer-breach/
The attack, which is linked to ShinyHunters, has reportedly compromised data relating to 7.4 million unique email addresses
alexander mcqueencustomer dataguccihitbreach
https://www.infosecurity-magazine.com/white-papers/2012-malnet-report/
Malnets (malware networks) are extensive infrastructures embedded in the Internet that are designed to deliver mass market attacks to the largest possible...
infosecurity magazinereport
https://www.infosecurity-magazine.com/news/key-provisions-uk-cyber-resilience/
Dec 10, 2025 - Shona Lester, head of the Cyber Security and Resilience Bill team, outlined some of the provisions that should be included in the future law
key provisionscyber resilienceukbillrevealed
https://www.infosecurity-magazine.com/news/168-billion-records-exposed
Flashpoint data points to a surge in data breaches fueled by compromised credentials, ransomware and exploits
data breachesbillionrecordsexposedincrease
https://www.infosecurity-magazine.com/news/microsoft-process-100-trillion/
Microsoft systems analyze over 100 trillion daily signals, suggesting dramatically increasing AI-driven cyber-threats
ai attackssurgemicrosoftprocesstrillion
https://www.infosecurity-magazine.com/news/phishers-out-in-force-con-yahoo/
Phishers Out in Force to Con Yahoo and Dropbox Users.Latest scams hit inboxes at the double
phishersforceconyahoodropbox
https://www.infosecurity-magazine.com/news/over-23-million-victims-data/
Data from the Identity Theft Resource Center reveals 23 million individuals victimized by breaches in Q3 2025
data breachesmillionvictimshit
https://www.infosecurity-magazine.com/white-papers/the-medical-device-paradox/
In 2015, the world witnessed the compromise of drug infusion pumps via the cyberattack of hospital networks, where remote hackers altered the drugs being...
medical deviceinfosecurity magazineparadox
https://www.infosecurity-magazine.com/magazine-features/the-top-ten-data-breaches-of-all/
From the number of instances and figures involved; the data breach problem is not getting any better.
top tendata breachesinfosecurity magazinetime
https://www.infosecurity-magazine.com/white-papers/rethinking-endpoint-security/
Mention endpoint security to an infosec professional and he or she will likely think of antivirus software, vulnerability scanning, and patch management.
endpoint securityinfosecurity magazinerethinking
https://www.infosecurity-magazine.com/news-features/unmasking-safepay-ransomware-group/
Infosecurity spoke with threat intelligence experts to uncover the tactics, victimology and business model of the emergent ransomware group SafePay
infosecurity magazineunmaskingsafepayransomwaregroup
https://www.infosecurity-magazine.com/news/half-supply-chain-incidents/
Oct 19, 2025 - Risk Ledger found that 90% of UK professionals view supply chain cyber incidents as a top concern for 2025
supply chainhalffirmssuffertwo
https://www.infosecurity-magazine.com/news/us-risk-iranian-cyber-attacks/
The DHS warned of a heightened risk of cyber and physical attacks on US targets by Iran in retaliation for strikes on Iranian nuclear facilities over the...
cyber attacksuswarnsriskiranian
https://www.infosecurity-magazine.com/news/attackers-abuse-ai-fake-captchas/
Trend Micro said the use of AI platforms to create and host fake CAPTCHA pages helps attackers develop more sophisticated phishing campaigns at scale and speed
ai toolsattackersabusegeneratefake
https://fidoalliance.org/infosecurity-magazine-microsoft-warns-of-adversary-in-the-middle-uptick-on-phishing-platform/?query-cdbd12d0-page=257&cst
Microsoft has observed a proliferation of adversary-in-the-middle (AiTM) techniques deployed through phishing-as-a-service (PhaaS) platforms, the company
infosecurity magazinemicrosoftwarnsadversarymiddle
https://infosecurity-magazine.com/news/digital-certificate-lifespans-fall?utm_source=NerdNews
CA/Browser Forum members have voted in favor of shortening TLS/SSL certificate lifespans to 47 days
digital certificatefalldays
https://www.infosecurity-magazine.com/news-features/owasp-top-10-llm-means-future-ai/
The OWASP foundation set the first industry standard for identifying and mitigating security risks in LLMs
owasptopllmsmeans
https://www.infosecurity-magazine.com/podcasts/unlocking-infosecurity-europe/
Listen to this episode of the Infosecurity Magazine podcast for your comprehensive guide to Infosecurity Europe 2024, taking place at the Excel London from 4-6...
infosecurity europemust seepro tipsunlockingsessions
https://www.infosecurity-magazine.com/news/despite-bod-1801-fed-agencies-not/
Federal agencies have yet to improve the way they handle machine identities, says Venafi.
despitebodfedagencieshttps
https://www.infosecurity-magazine.com/bespoke-events/building-enterprise-resilience-in/
In this in-person breakfast briefing, a panel of security experts will discuss how to managing evolving risks, setting up your organization to prepare,...
executive breakfastenterprise resiliencebuildinghybridworld
https://www.infosecurity-magazine.com/magazine-features/qa-bobbie-stempfley-1-1/
Bobbie Stempfley talks about her likes and loves in her cybersecurity career
infosecurity magazineqbobbie
https://www.infosecurity-magazine.com/blogs/insights-ceh-hof-2025-industry/
Nov 8, 2025 - According to the CEH Hall of Fame 2025 Industry Report , 100% of CEH Hall of Fame inductees attribute their career success and enhanced workplace recognition...
industry reportinfosecurity magazineinsightscehhof
https://www.infosecurity-magazine.com/webinars/cisos-thrive-complex-cyber/
Join us for an engaging webinar where we explore the essential strategies and tools that CISOs need to thrive in today's challenging cybersecurity environment
cisosurvivethrivecomplex
https://www.infosecurity-magazine.com/news/china-apt-blackwood-nspx30-implant/
ESET said Blackwood has been actively engaged in cyber-espionage since at least 2018
infosecurity magazinechinaalignedaptgroup
https://www.infosecurity-magazine.com/news/silk-road-shut-down-and-dread-pirate-roberts/
Silk Road is perhaps the most infamous illicit marketplace on the hidden (dark) web. It has been seized and shutdown by the feds; and its owner, allegedly Ross...
dread pirate robertssilk roadshutarrestedinfosecurity
https://www.infosecurity-magazine.com/magazine-features/the-truth-about-dlp/
Data loss prevention: the term that fills marketing managers with joy, and infosec managers with dread. Preventing a data leak may be the top priority for the...
infosecurity magazinetruthdlp
https://www.infosecurity-magazine.com/white-papers/deal-with-security-attacks/
Understand the unique capabilities of indicators of compromise and attack, the differences between them, and the steps to configure a SIEM solution to detect...
infosecurity magazineusingindicatorsdealattacks
https://www.infosecurity-magazine.com/next-gen-infosec/asset-visibility-ot-security-ai/
Jul 12, 2025 - Joseph Chukwube says that the complexity of OT security has hindered organizations’ abilities to mitigate threats effectively
asset visibilityot securityhybrid aiimprovecloud
https://www.infosecurity-magazine.com/news/china-gives-police-new-powers/
Recorded Future warns of growing security threat for multi-nationals
chinagivespolicenewpowers