Robuta

https://www.infosecurity-magazine.com/news/police-arrest-1000-suspected-money/
Global police arrest 1000 money mule suspects and identify thousands more in a major crackdown on money laundering
money mulesinfosecurity magazinepolicearrestssuspected
https://www.infosecurity-magazine.com/news/wp-plugin-user-submitted-posts/
Apr 12, 2025 - With over 20,000 active installations, the plugin is used for user-generated content submissions
wordpress pluginuser submittedinfosecurity magazinevulnerabilityexposed
https://www.infosecurity-magazine.com/white-papers/effective-insider-threat-management/
White paper offers practical advice to ensure success.
insider threat managementinfosecurity magazineeffective
https://www.infosecurity-magazine.com/news/ai-military-ids-north-korea/
Nov 7, 2025 - Genians observed the Kimsuky group impersonate a defense institution in a spear-phishing attack, leveraging ChatGPT to create fake military ID cards
north koreanphishing attackaiforgedmilitary
https://www.infosecurity-magazine.com/news/dish-network-hit-lawsuits/
Pay TV firm accused of misleading investors
securities class actiondish networkhitmultiplelawsuits
https://www.infosecurity-magazine.com/digital-editions/q2-2021/
magazine digital editioninfosecurity
https://www.infosecurity-magazine.com/news/phishing-campaigns-targets-russia/
A large-scale phishing campaign using DarkWatchman and Sheriff malware has been observed targeting companies in Russia and Ukraine
large scaleinfosecurity magazinephishingcampaignstarget
https://www.infosecurity-magazine.com/white-papers/features-of-a-modern-siem/
10 must have features of modern SIEMs
infosecurity magazinetenmustfeaturesmodern
https://www.infosecurity-magazine.com/podcasts/the-information-heist/
In our latest podcast episode, we take a closer look at the rise of infostealers and what you can do to protect yourself from these insidious threats
infosecurity magazineinformationheistcrackingcode
https://www.infosecurity-magazine.com/interviews/tarnveer-singh-cisos-ai-rollout/
Tarnveer Singh, CISO at The Exeter, speaks to Infosecurity about the steps security leaders must take to ensure secure and compliant AI deployment
responsible aisinghcisosensurerollout
https://www.infosecurity-magazine.com/?origin=https://www.13secnews.com
The award winning online magazine dedicated to the strategy, insight and technology of information security
infosecurity magazineinformationnewsresources
https://www.infosecurity-magazine.com/webinars/mastering-emerging-regulations/
Understand how you can harness technology to advance compliance and set your organization apart from the rest
emerging regulationsai actmasteringdoracompliance
https://www.infosecurity-magazine.com/news/uk-firms-drowning-in-breaches/
UK Firms Drowning in Breaches. Carbon Black report reveals an average of 3.7 per organization last year
infosecurity magazineukfirmsdrowningbreaches
https://www.infosecurity-magazine.com/news/national-cyber-authorities-ot/
The Five Eyes countries, Germany and the Netherlands are launching a standard for managing OT security
ot securityinfosecurity magazinenationalcyberauthorities
https://www.infosecurity-magazine.com/news/google-launches-ai-bug-bounty/
Google has introduced a new AI Vulnerability Reward Program offering up to $30,000 for bug discoveries in its AI products
bug bountygooglelaunchesaitop
https://www.infosecurity-magazine.com/news/bloody-wolf-expands-central-asia/
Dec 9, 2025 - A new Bloody Wolf campaign exploits legitimate remote-administration software for cyber-attacks on government targets in Central Asia
bloody wolfthreat actorcentral asiaexpandsactivity
https://www.infosecurity-magazine.com/news/gainsight-cyberattack-more/
Dec 4, 2025 - The CEO of the customer support platform said “a handful of customers” saw their data exposed after the breach
cyber attackinfosecurity magazinegainsightaffectssalesforce
https://www.infosecurity-magazine.com/profile/suzy-feine/
marketing communicationsinfosecurity magazinesuzydirector
https://www.infosecurity-magazine.com/news/uk-spooks-give-green-light-to-1/
NCSC says cyber risk can be managed, according to reports
green lightinfosecurity magazineukspooksgive
https://www.infosecurity-magazine.com/blogs/how-iam-control-prevent-major/
Nov 10, 2025 - Why self-service password reset with MFA is more than just a convenience – it’s a critical layer of defense
cyber attackssimpleiamcontrolcould
https://www.infosecurity-magazine.com/news/paradise-ransomware-uses-iqy/?utm_source=mosaicsecurity
Latest campaign weaponizes unusual Office file format
infosecurity magazineparadiseransomwareusesattachments
https://www.infosecurity-magazine.com/editorial/
Keep up to date with the latest Information Security and IT Security News & Articles - Infosecurity Magazine
information securityinfosecurity magazineeditorial
https://www.infosecurity-magazine.com/white-papers/healthcare-cloud-security-build-vs/
Sep 6, 2024 - Healthcare organizations face both challenges and opportunities as data management increasingly migrates to the cloud, and in-house IT teams must determine
build vs buyhealthcare cloudinfosecurity magazine
https://www.infosecurity-magazine.com/news/palo-alto-networks-patches-series/
The cybersecurity provider also implemented recent fixes in Chromium that affected its Prisma Access Browser
palo alto networksinfosecurity magazinepatchesseriesvulnerabilities
https://www.infosecurity-magazine.com/white-papers/data-protection-and-compliance-in-complex-environm/
Today's businesses are often under the gun to meet certain data protection requirements. Unfortunately, many companies lack a cohesive strategy for...
data protectioninfosecurity magazinecompliancecomplexenvironments
https://www.infosecurity-magazine.com/webinars/
Watch the latest Information Security and IT Security Webinars - Infosecurity Magazine
information securityinfosecurity magazinewebinars
https://www.infosecurity-magazine.com/profile/david-treacher-1/
cybersecurity analystinfosecurity magazinedavidtreacherconsulting
https://www.infosecurity-magazine.com/magazine-features/the-generation-x-y-z-of/
Not all millennials approach privacy and security with the same attitudes. As Tom Brewster discovers, regardless of age, a one-sized-fits all approach to...
generation xinformation securityinfosecurity magazine
https://www.infosecurity-magazine.com/webinars/how-midmarket-can-leverage/
Learn how to unlock the full value of your existing Microsoft Security stack, harness AI for both defence and efficiency and build a culture of resilience...
mid marketmicrosoft securitybusinessesleverageproactiv
https://www.infosecurity-magazine.com/news-features/top-cyber-attacks-2023/
Infosecurity sets out the top 10 most damaging cyber-attacks that emerged in 2023
cyber attacksinfosecurity magazinetop
https://www.infosecurity-magazine.com/blogs/how-to-use-a-password-audit/
Nov 13, 2025 - This article explains how audits strengthen cybersecurity by exposing common gaps, enabling faster remediation and enforcing stronger policies
password audituseimprovecybersecurity
https://www.infosecurity-magazine.com/news/crypto-scams-reach-new-heights-fbi/
The Federal Bureau of Investigation's Internet Crime Complaint Center (IC3) reported a 45% increase in cryptocurrency-related scams in 2023
reach new heightscrypto scamsfbireports
https://www.infosecurity-magazine.com/news/number-cybersecurity-pros-surges/
Cybersecurity is now the fifth fastest-growing occupation in the UK, says Socura
four yearsnumbercybersecurityprossurges
https://www.infosecurity-magazine.com/interviews/qa-adenike-cosgrove/
People person Adenike Cosgrove shares her advice to those starting out in cyber plus her personal proudest moment
infosecurity magazineqadenikecosgrove
https://www.infosecurity-magazine.com/magazine-features/biometrics-reach-maturity/
In both the identity management and security arenas, the use of biometric technology is increasing apace. Sebastian Fox looks at how the business application...
infosecurity magazinebiometricsreachmaturity
https://www.infosecurity-magazine.com/news/vulnerabilities-tplink-vpn-routers/
Forescout researchers discovered critical and high-severity vulnerabilities in several TP-Link VPN routers
vpn routersinfosecurity magazinemajorvulnerabilitiesfound
https://www.infosecurity-magazine.com/news/clickfix-attacks-surge-2025/
The ClickFix social engineering technique has become the second most common attack vector, behind only phishing, according to ESET research
infosecurity magazineattackssurge
https://www.infosecurity-magazine.com/news/police-crack-down-droidjack/
Police Crack Down on DroidJack Spyware with Europe-wide Arrests. Raids likely to be against malware users, not authors
policecrackspywareeuropewide
https://www.infosecurity-magazine.com/blogs/worried-consumers-data-breach/
Nov 13, 2025 - Specops discuss the action consumers should take when they receive a data breach notification
data breachworriedconsumersreally
https://www.infosecurity-magazine.com/webinars/ot-security-risk-reduction/
Join this webinar to learn how to build a multi-dimensional, real-time view of your OT environment. Rockwell Automation will share strategies for proactive...
ot securityrisk reductionecosystemtargetedreporting
https://www.infosecurity-magazine.com/white-papers/how-to-comply-aus-privacy-act/
May 18, 2025 - How to comply with Australian Privacy Act changes, increase alignment with Essential Eight while improving cyber security posture
australian privacy actinfosecurity magazinecomplychanges
https://www.infosecurity-magazine.com/news/ai-voice-virtual-meeting-fraud/
Pindrop warns of 1210% increase in AI-powered fraud last year
virtual meetingaienabledvoicefraud
https://www.infosecurity-magazine.com/opinions/score-rethinking-vulnerability/
Action1's Gene Moody argues that managing vulnerabilities goes far beyond chasing high CVSS scores
vulnerability managementbeyondscorerethinkingcontextual
https://www.infosecurity-magazine.com/opinions/microsegmentation-zero-trust/
Venkata Nedunoori discusses the connection between microsegmentation and zero trust, and how to implement this component successfully
zero trust securityrolemicrosegmentationstrengtheninginfosecurity
https://www.infosecurity-magazine.com/white-papers/top-five-considerations-for-removable-media-securi/
The rapid growth of removable media has revolutionized the way we store and transport information, encouraging increased productivity - as well as a higher...
removable media securitytop fiveinfosecurity magazineconsiderations
https://www.infosecurity-magazine.com/news/information-security-technology-not-enough/
Information security technology is of little use if employees unwittingly give up log-in details, passwords and other sensitive information to hackers using...
information securityinfosecurity magazinetechnologyenough
https://www.infosecurity-magazine.com/news/openai-was-not-breached-say/
Kela researchers explain that infostealers are to blame for compromised OpenAI logins
infosecurity magazineopenaibreachedsayresearchers
https://www.infosecurity-magazine.com/news/gucci-mcqueen-customer-breach/
The attack, which is linked to ShinyHunters, has reportedly compromised data relating to 7.4 million unique email addresses
alexander mcqueencustomer dataguccihitbreach
https://www.infosecurity-magazine.com/white-papers/2012-malnet-report/
Malnets (malware networks) are extensive infrastructures embedded in the Internet that are designed to deliver mass market attacks to the largest possible...
infosecurity magazinereport
https://www.infosecurity-magazine.com/news/key-provisions-uk-cyber-resilience/
Dec 10, 2025 - Shona Lester, head of the Cyber Security and Resilience Bill team, outlined some of the provisions that should be included in the future law
key provisionscyber resilienceukbillrevealed
https://www.infosecurity-magazine.com/news/168-billion-records-exposed
Flashpoint data points to a surge in data breaches fueled by compromised credentials, ransomware and exploits
data breachesbillionrecordsexposedincrease
https://www.infosecurity-magazine.com/podcasts/unpacking-trumps-cybersecurity/
In this Infosecurity podcast episode, the team dive into the details of Donald Trump's June 2025 Cybersecurity Executive Order
executive orderinfosecurity magazineunpackingtrumpcybersecurity
https://www.infosecurity-magazine.com/news/us-government-shutdown-federal/
The US government shutdown is estimated to result in around 65% of CISA staff being furloughed, with fears that threat actors will exploit critical security...
us government shutdownfederal cybersecurityinfosecurity magazineslashstaff
https://www.infosecurity-magazine.com/cloud-security/
Keep up-to-date with the latest Cloud Security trends through news, opinion and educational content from Infosecurity Magazine.
cloud securityinfosecurity magazinenewsarticles
https://www.infosecurity-magazine.com/news/microsoft-process-100-trillion/
Microsoft systems analyze over 100 trillion daily signals, suggesting dramatically increasing AI-driven cyber-threats
ai attackssurgemicrosoftprocesstrillion
https://www.infosecurity-magazine.com/news/phishers-out-in-force-con-yahoo/
Phishers Out in Force to Con Yahoo and Dropbox Users.Latest scams hit inboxes at the double
phishersforceconyahoodropbox
https://www.infosecurity-magazine.com/news/uk-lags-europe-exploited/
UK organizations are less likely than their European peers to have known exploited bugs but take longer to fix them
vulnerability remediationinfosecurity magazineuklagseurope
https://www.infosecurity-magazine.com/blogs/threats-opportunities-ai/
Raef Meeuwisse says organizations must stay abreast of rapid changes in AI to maintain effective cybersecurity
emerging threatsai cybersecurityopportunitiesrevolutioninfosecurity
https://www.infosecurity-magazine.com/news/over-23-million-victims-data/
Data from the Identity Theft Resource Center reveals 23 million individuals victimized by breaches in Q3 2025
data breachesmillionvictimshit
https://www.infosecurity-magazine.com/white-papers/the-medical-device-paradox/
In 2015, the world witnessed the compromise of drug infusion pumps via the cyberattack of hospital networks, where remote hackers altered the drugs being...
medical deviceinfosecurity magazineparadox
https://www.infosecurity-magazine.com/news/what-healthcare-should-learn-from/
Changing security requirements for healthcare are opening up big new challenges for the sector.
infosecurity magazinehealthcarelearnchsheartbleed
https://www.infosecurity-magazine.com/magazine-features/the-top-ten-data-breaches-of-all/
From the number of instances and figures involved; the data breach problem is not getting any better.
top tendata breachesinfosecurity magazinetime
https://www.infosecurity-magazine.com/white-papers/rethinking-endpoint-security/
Mention endpoint security to an infosec professional and he or she will likely think of antivirus software, vulnerability scanning, and patch management.
endpoint securityinfosecurity magazinerethinking
https://www.infosecurity-magazine.com/news-features/unmasking-safepay-ransomware-group/
Infosecurity spoke with threat intelligence experts to uncover the tactics, victimology and business model of the emergent ransomware group SafePay
infosecurity magazineunmaskingsafepayransomwaregroup
https://www.infosecurity-magazine.com/
The award winning online magazine dedicated to the strategy, insight and technology of information security
infosecurity magazineinformationnewsresources
https://www.infosecurity-magazine.com/news/critical-wordpress-plugin-bugs/
Wordfence says threat actors are trying to exploit three critical vulnerabilities from 2024
wordpress pluginen masseinfosecurity magazinecriticalbugs
https://www.infosecurity-magazine.com/news/half-supply-chain-incidents/
Oct 19, 2025 - Risk Ledger found that 90% of UK professionals view supply chain cyber incidents as a top concern for 2025
supply chainhalffirmssuffertwo
https://www.infosecurity-magazine.com/news/us-risk-iranian-cyber-attacks/
The DHS warned of a heightened risk of cyber and physical attacks on US targets by Iran in retaliation for strikes on Iranian nuclear facilities over the...
cyber attacksuswarnsriskiranian
https://www.infosecurity-magazine.com/news/fraudsters-band-together-shift-to-1/
Fraud rings on the rise, increasing attacks on e-commerce.
band togetherbot attacksinfosecurity magazinefraudstersshift
https://www.infosecurity-magazine.com/news/phishing-scams-exploit-browser/
Phishing Scams Exploit Browser-in-the-Browser Attacks to Steal Facebook Passwords
phishing scamsexploitbrowserattackssteal
https://www.infosecurity-magazine.com/news/attackers-abuse-ai-fake-captchas/
Trend Micro said the use of AI platforms to create and host fake CAPTCHA pages helps attackers develop more sophisticated phishing campaigns at scale and speed
ai toolsattackersabusegeneratefake
https://fidoalliance.org/infosecurity-magazine-microsoft-warns-of-adversary-in-the-middle-uptick-on-phishing-platform/?query-cdbd12d0-page=257&cst
Microsoft has observed a proliferation of adversary-in-the-middle (AiTM) techniques deployed through phishing-as-a-service (PhaaS) platforms, the company
infosecurity magazinemicrosoftwarnsadversarymiddle
https://www.infosecurity-magazine.com/news/iranian-hacking-group-leaks/
Aug 10, 2025 - Hundreds of thousands of Israelis affected by ransom breach
hacking groupinfosecurity magazineiranianleakspatient
https://infosecurity-magazine.com/news/digital-certificate-lifespans-fall?utm_source=NerdNews
CA/Browser Forum members have voted in favor of shortening TLS/SSL certificate lifespans to 47 days
digital certificatefalldays
https://www.infosecurity-magazine.com/news-features/owasp-top-10-llm-means-future-ai/
The OWASP foundation set the first industry standard for identifying and mitigating security risks in LLMs
owasptopllmsmeans
https://www.infosecurity-magazine.com/news/deadlock-polygon-smart-contracts/
A new DeadLock ransomware operation uses Polygon blockchain smart contracts to manage proxy server addresses
smart contractsproxy rotationdeadlockransomwareuses
https://www.infosecurity-magazine.com/podcasts/unlocking-infosecurity-europe/
Listen to this episode of the Infosecurity Magazine podcast for your comprehensive guide to Infosecurity Europe 2024, taking place at the Excel London from 4-6...
infosecurity europemust seepro tipsunlockingsessions
https://www.infosecurity-magazine.com/news/kubernetes-hit-kubeflow
Microsoft spots unusual threat vector as machine learning toolkit is targeted
kubernetes clusterscrypto mininginfosecurity magazinehitkubeflow
https://www.infosecurity-magazine.com/news/despite-bod-1801-fed-agencies-not/
Federal agencies have yet to improve the way they handle machine identities, says Venafi.
despitebodfedagencieshttps
https://www.infosecurity-magazine.com/news/scattered-lapsus-hunters-zendesk/
Dec 4, 2025 - New phishing domains point to a campaign from the notorious Scattered Lapsus$ Hunters collective
take aiminfosecurity magazinescatteredlapsushunters
https://www.infosecurity-magazine.com/bespoke-events/building-enterprise-resilience-in/
In this in-person breakfast briefing, a panel of security experts will discuss how to managing evolving risks, setting up your organization to prepare,...
executive breakfastenterprise resiliencebuildinghybridworld
https://www.infosecurity-magazine.com/magazine-features/qa-bobbie-stempfley-1-1/
Bobbie Stempfley talks about her likes and loves in her cybersecurity career
infosecurity magazineqbobbie
https://www.infosecurity-magazine.com/news/pfizer-insider-stole-vaccine-docs/?&web_view=true
Individual reportedly transferred 12,000 files to Google Drive account
infosecurity magazinepfizerallegesinsiderstole
https://www.infosecurity-magazine.com/news/staggering-800-rise-infostealer/
Nov 8, 2025 - Flashpoint data reveals an 800% increase in credentials stolen via infostealers in just six months
credential theftinfosecurity magazinestaggeringriseinfostealer
https://www.infosecurity-magazine.com/news/browser-push-notifications-deliver/
Dec 10, 2025 - Researchers at BlackFrog have uncovered Matrix Push C2, a malicious command-and-control system that abuses web browser push notifications to deliver malware
push notificationsinfosecurity magazinecybercriminalsexploitbrowser
https://www.infosecurity-magazine.com/magazine-features/retail-security-lessons-learned/
Looking back at 2014's retail security breaches, and lessons learned
looking backretail securitybreacheslessons
https://www.infosecurity-magazine.com/news/fifth-of-businesses-cyber-attack/
Nov 8, 2025 - Attacks surge 12% in 2021, according to insurer
cyber attackfifthbusinessessaynearly
https://www.infosecurity-magazine.com/blogs/insights-ceh-hof-2025-industry/
Nov 8, 2025 - According to the CEH Hall of Fame 2025 Industry Report , 100% of CEH Hall of Fame inductees attribute their career success and enhanced workplace recognition...
industry reportinfosecurity magazineinsightscehhof
https://www.infosecurity-magazine.com/webinars/cisos-thrive-complex-cyber/
Join us for an engaging webinar where we explore the essential strategies and tools that CISOs need to thrive in today's challenging cybersecurity environment
cisosurvivethrivecomplex
https://www.infosecurity-magazine.com/next-gen-infosec/finding-fixing-blind-iot/
IoT devices are created with the primary aim of efficiency, while security takes a back seat
enterprise iot securityblind spotsfindingfixinginfosecurity
https://www.infosecurity-magazine.com/news/china-apt-blackwood-nspx30-implant/
ESET said Blackwood has been actively engaged in cyber-espionage since at least 2018
infosecurity magazinechinaalignedaptgroup
https://www.infosecurity-magazine.com/news/microsoft-three-zerodays-busy/
Microsoft has patched three zero-day vulnerabilities in the first patch Tuesday of 2026, including one under active exploitation
zero dayspatch tuesdayinfosecurity magazinethreefixed
https://www.infosecurity-magazine.com/news/submarine-cables-risk-cyber-attacks/
A report from Recorded Future highlights how digital cable management systems are vulnerable to nation-state attacks
submarine cablescyber attacksinfosecurity magazinegrowingrisk
https://www.infosecurity-magazine.com/news/silk-road-shut-down-and-dread-pirate-roberts/
Silk Road is perhaps the most infamous illicit marketplace on the hidden (dark) web. It has been seized and shutdown by the feds; and its owner, allegedly Ross...
dread pirate robertssilk roadshutarrestedinfosecurity
https://www.infosecurity-magazine.com/magazine-features/the-truth-about-dlp/
Data loss prevention: the term that fills marketing managers with joy, and infosec managers with dread. Preventing a data leak may be the top priority for the...
infosecurity magazinetruthdlp
https://www.infosecurity-magazine.com/white-papers/deal-with-security-attacks/
Understand the unique capabilities of indicators of compromise and attack, the differences between them, and the steps to configure a SIEM solution to detect...
infosecurity magazineusingindicatorsdealattacks
https://www.infosecurity-magazine.com/news/russian-state-hackers-collaborate
ESET found that the FSB-affiliated groups, Gamaredon and Turla, are sharing tools to help conduct espionage attacks against Ukrainian organizations
russian stateinfosecurity magazinehackerscollaborateattacks
https://www.infosecurity-magazine.com/next-gen-infosec/asset-visibility-ot-security-ai/
Jul 12, 2025 - Joseph Chukwube says that the complexity of OT security has hindered organizations’ abilities to mitigate threats effectively
asset visibilityot securityhybrid aiimprovecloud
https://www.infosecurity-magazine.com/news/china-gives-police-new-powers/
Recorded Future warns of growing security threat for multi-nationals
chinagivespolicenewpowers
https://www.infosecurity-magazine.com/white-papers/cloud-threat-report-2019-1/
Cloud Threat Report 2019
threat reportinfosecurity magazinecloud