Skip to content
InfosecToday.com
  • Cybersecurity Glossary
InfosecToday.com

Cybersecurity

APT37 Cybercriminals Utilize JPEG Images to Target Windows Systems Exploiting “mspaint.exe”
Cybersecurity

APT37 Cybercriminals Utilize JPEG Images to Target Windows Systems Exploiting “mspaint.exe”

Interlock Ransomware Utilizes ClickFix Method to Execute Harmful Commands on Windows Systems
Cybersecurity

Interlock Ransomware Utilizes ClickFix Method to Execute Harmful Commands on Windows Systems

The Microsoft PlayReady digital rights management system, utilized by platforms like Netflix, Amazon, and Disney+, has been exposed online.
Cybersecurity

The Microsoft PlayReady digital rights management system, utilized by platforms like Netflix, Amazon, and Disney+, has been exposed online.

SafePay ransomware has compromised over 260 victims in various nations.
Cybersecurity

SafePay ransomware has compromised over 260 victims in various nations.

Lazarus Hackers Exploit 234 Packages on npm and PyPI to Compromise Developers
Cybersecurity

Lazarus Hackers Exploit 234 Packages on npm and PyPI to Compromise Developers

Akira Ransomware is actively exploiting a zero-day vulnerability in SonicWall Firewall devices.
Cybersecurity

Akira Ransomware is actively exploiting a zero-day vulnerability in SonicWall Firewall devices.

A new undetectable malware strain is targeting Linux servers to establish lasting SSH access.
Cybersecurity

A new undetectable malware strain is targeting Linux servers to establish lasting SSH access.

Summary of Cybersecurity Updates – Vulnerabilities in Chrome and Gemini, malware targeting Linux, and a new Man-in-the-Prompt attack.
Cybersecurity

Summary of Cybersecurity Updates – Vulnerabilities in Chrome and Gemini, malware targeting Linux, and a new Man-in-the-Prompt attack.

Echo Secures $15 Million in Seed Capital to Create Vulnerability-Free Container Images
Cybersecurity

Echo Secures $15 Million in Seed Capital to Create Vulnerability-Free Container Images

Cyber attackers are exploiting counterfeit OAuth applications in conjunction with the Tycoon Kit to compromise Microsoft 365 accounts.
Cybersecurity

Cyber attackers are exploiting counterfeit OAuth applications in conjunction with the Tycoon Kit to compromise Microsoft 365 accounts.

The Cursor AI Code Editor has addressed a vulnerability that permitted attackers to execute commands through prompt injection.
Cybersecurity | Remote Code Execution (RCE)

The Cursor AI Code Editor has addressed a vulnerability that permitted attackers to execute commands through prompt injection.

A new backdoor called ‘Plague’ has emerged that compromises critical Linux systems, allowing for covert theft of credentials.
Cybersecurity

A new backdoor called ‘Plague’ has emerged that compromises critical Linux systems, allowing for covert theft of credentials.

Cyber risk management company Safe has secured $70 million in funding.
Cybersecurity

Cyber risk management company Safe has secured $70 million in funding.

According to Microsoft, Russian cyberspies are conducting AitM attacks on foreign embassies located in Moscow.
Cybersecurity

According to Microsoft, Russian cyberspies are conducting AitM attacks on foreign embassies located in Moscow.

Microsoft Enhances .NET Bounty Program –  Increases Max Reward to $40,000
Cybersecurity

Microsoft Enhances .NET Bounty Program – Increases Max Reward to $40,000

Gen Z Targeted: Cybercriminals Turn Their Attention to Tech-Savvy Young Professionals
Cybersecurity

Gen Z Targeted: Cybercriminals Turn Their Attention to Tech-Savvy Young Professionals

Dark Reading News Desk Celebrates 10 Years at Black Hat USA 2025 
Cybersecurity

Dark Reading News Desk Celebrates 10 Years at Black Hat USA 2025 

AI-Generated Code from LLMs: A Major Security Risk 
Cybersecurity

AI-Generated Code from LLMs: A Major Security Risk 

Creating the Ultimate Post-Security Incident Review Playbook: A Comprehensive Guide for Enhanced Cybersecurity Practices 
Cybersecurity

Creating the Ultimate Post-Security Incident Review Playbook: A Comprehensive Guide for Enhanced Cybersecurity Practices 

Resilient Women Thrive in the Male-Dominated Cybersecurity Industry 
Cybersecurity

Resilient Women Thrive in the Male-Dominated Cybersecurity Industry 

Introducing the New ‘Shade BIOS’ Technique: Outperforming All Security Measures 
Cybersecurity

Introducing the New ‘Shade BIOS’ Technique: Outperforming All Security Measures 

ISC2 Introduces New Security Certification Focused on AI Expertise 
Cybersecurity

ISC2 Introduces New Security Certification Focused on AI Expertise 

Are SIEMs Facing Obsolescence or Ready for an AI Transformation? 
Cybersecurity

Are SIEMs Facing Obsolescence or Ready for an AI Transformation? 

CISA Launches Free Thorium Malware Analysis Tool for Enhanced Cybersecurity Insights 
Cybersecurity

CISA Launches Free Thorium Malware Analysis Tool for Enhanced Cybersecurity Insights 

Gen Z is Twice as Likely to Fall for Scams Compared to Older Generations 
Cybersecurity

Gen Z is Twice as Likely to Fall for Scams Compared to Older Generations 

DragonForce Ransom Cartel: Profiting from Competitors’ Downfall 
Cybersecurity

DragonForce Ransom Cartel: Profiting from Competitors’ Downfall 

SafePay Claims: Ingram Micro Data Breach Sets Ransom Deadline 
Cybersecurity

SafePay Claims: Ingram Micro Data Breach Sets Ransom Deadline 

3 Essential Insights for CFOs on Mitigating Financial Threats 
Cybersecurity

3 Essential Insights for CFOs on Mitigating Financial Threats 

Russia’s Secret Blizzard APT Gains Access to Embassies Through Internet Service Providers 
Cybersecurity

Russia’s Secret Blizzard APT Gains Access to Embassies Through Internet Service Providers 

Conducting a Cybersecurity Vibe Check on Vibe Coding: Ensuring Your Digital Safety 
Cybersecurity

Conducting a Cybersecurity Vibe Check on Vibe Coding: Ensuring Your Digital Safety 

Page navigation

Previous PagePrevious 1 2 3 4 Next PageNext

© 2025 InfosecToday.com - WordPress Theme by Kadence WP

  • Cybersecurity Glossary
Search