Skip to content
InfosecToday.com
  • Cybersecurity News
  • Cybersecurity Articles
  • Cybersecurity Glossary
  • Contact
  • Login
InfosecToday.com
CISA has issued a warning regarding vulnerabilities in D-Link products that are currently being exploited in attacks.
Cybersecurity Vulnerabilities  | D-Link Devices | Federal Agency Mandates 

CISA has issued a warning regarding vulnerabilities in D-Link products that are currently being exploited in attacks.

Over 10,000 harmful TikTok Shop websites are targeting users to obtain login details and distribute malware.
Cybercrime | E-commerce Security | Phishing Attacks 

Over 10,000 harmful TikTok Shop websites are targeting users to obtain login details and distribute malware.

The Compliance Checklist for Network Security: 25 Controls That Are Mapped and Prepared for Auditing
Cybersecurity Compliance | Incident Response Management  | Network Security Controls

The Compliance Checklist for Network Security: 25 Controls That Are Mapped and Prepared for Auditing

The ClickFix malware campaign takes advantage of CAPTCHAs to facilitate cross-platform infection spread.
Evasion Techniques | Malware Propagation Methods | Social Engineering Tactics

The ClickFix malware campaign takes advantage of CAPTCHAs to facilitate cross-platform infection spread.

How to Obtain Real-Time Indicators of Compromise from Incidents in 15,000 Security Operations Centers.
Data Quality | Proactive Threat Detection  | Threat Intelligence Feeds

How to Obtain Real-Time Indicators of Compromise from Incidents in 15,000 Security Operations Centers.

How Poor Certificate Management Creates Vulnerabilities for Phishing and Man-in-the-Middle Attacks
Certificate Management | Phishing Techniques  | Security Risks

How Poor Certificate Management Creates Vulnerabilities for Phishing and Man-in-the-Middle Attacks

A newly identified MCPoison attack utilizes the Cursor IDE’s MCP validation process to run arbitrary commands within the system.
AI Development Tools  | Cybersecurity | Software Vulnerabilities

A newly identified MCPoison attack utilizes the Cursor IDE’s MCP validation process to run arbitrary commands within the system.

Microsoft’s Project Ire independently reverse engineers software to detect malware.
AI Technology | Cybersecurity | Malware Detection 

Microsoft’s Project Ire independently reverse engineers software to detect malware.

A vulnerability in the Cursor AI Code Editor allows for remote code execution (RCE) by swapping in a malicious MCP file after it has been approved.
AI Development Risks | Cybersecurity Vulnerabilities  | Remote Code Execution

A vulnerability in the Cursor AI Code Editor allows for remote code execution (RCE) by swapping in a malicious MCP file after it has been approved.

Google’s August update addresses two Qualcomm vulnerabilities that have been actively exploited.
Android Updates | Qualcomm Exploits  | Security Vulnerabilities

Google’s August update addresses two Qualcomm vulnerabilities that have been actively exploited.

Cisco Experienced a Security Breach – Cybercriminals Obtained User Profile Information from Cisco.com
Cybersecurity Incident | Data Breach | Social Engineering

Cisco Experienced a Security Breach – Cybercriminals Obtained User Profile Information from Cisco.com

Cloudflare has accused Perplexity AI of circumventing firewalls and scraping websites by modifying its user agent.
Evasion Tactics | Legal and Ethical Implications  | Web Scraping Techniques

Cloudflare has accused Perplexity AI of circumventing firewalls and scraping websites by modifying its user agent.

A newly discovered vulnerability in Streamlit enables cybercriminals to execute cloud account takeover attacks.
Cloud Security Risks | Financial Data Manipulation  | Vulnerability Exploitation

A newly discovered vulnerability in Streamlit enables cybercriminals to execute cloud account takeover attacks.

APT36 Hackers Targeting Indian Government Organizations to Harvest Login Information
Credential Theft  | Cybersecurity Threats | Phishing Campaign

APT36 Hackers Targeting Indian Government Organizations to Harvest Login Information

Cisco announces that user information was compromised during a CRM breach.
Cybersecurity Incident | Data Breach | User Accounts

Cisco announces that user information was compromised during a CRM breach.

North Korean cybercriminals are exploiting NPM packages to pilfer cryptocurrency and confidential information.
Cybersecurity Threats | Malware Distribution | Supply Chain Attacks

North Korean cybercriminals are exploiting NPM packages to pilfer cryptocurrency and confidential information.

SonicWall has issued a warning about a rise in cyberattacks aimed at their Generation 7 firewalls over the past 72 hours.
Cybersecurity Threats | Mitigation Strategies  | Vulnerability Management 

SonicWall has issued a warning about a rise in cyberattacks aimed at their Generation 7 firewalls over the past 72 hours.

Kimsuky APT hackers are utilizing LNK files as a means to deploy reflective malware, successfully evading detection by Windows Defender.
Cyber Espionage | Malware Techniques  | Social Engineering

Kimsuky APT hackers are utilizing LNK files as a means to deploy reflective malware, successfully evading detection by Windows Defender.

Approov Secures $6.7 Million in Funding to Enhance Mobile App Security
API Security Solutions | Mobile Application Security | Series A Funding 

Approov Secures $6.7 Million in Funding to Enhance Mobile App Security

Vibe Coding: If Everyone Becomes a Developer, Who is Responsible for Code Security?
Application Security | Non-Developer Challenges  | Software Development Accessibility

Vibe Coding: If Everyone Becomes a Developer, Who is Responsible for Code Security?

A summary of the key announcements from vendors at Black Hat USA 2025 (Part 1).
Cybersecurity Innovations | Industry Trends  | Product Launches

A summary of the key announcements from vendors at Black Hat USA 2025 (Part 1).

Misconfigurations Should Not Be Considered Vulnerabilities: The Expensive Misunderstanding Surrounding Security Threats.
Misconfiguration | Shared Responsibility Model  | Vulnerability

Misconfigurations Should Not Be Considered Vulnerabilities: The Expensive Misunderstanding Surrounding Security Threats.

Cybercriminals have the ability to access IIS machine keys by taking advantage of a vulnerability in SharePoint’s deserialization process.
Cybersecurity Threats | Remote Code Execution | Vulnerability Exploitation

Cybercriminals have the ability to access IIS machine keys by taking advantage of a vulnerability in SharePoint’s deserialization process.

The August 2025 update for Android addresses a Qualcomm vulnerability that has been exploited.
Mobile Technology  | Security Updates | Vulnerability Management 

The August 2025 update for Android addresses a Qualcomm vulnerability that has been exploited.

How Leading CISOs Manage Their SOCs to Avoid Alert Overload and Ensure No Genuine Incidents are Overlooked
Automation in SOCs | Incident Response Efficiency  | Threat Analysis

How Leading CISOs Manage Their SOCs to Avoid Alert Overload and Ensure No Genuine Incidents are Overlooked

Well-known Chollima APT hackers are targeting job applicants and organizations to distribute JavaScript-based malware.
Cybersecurity Threats | Malware Distribution Techniques  | Social Engineering Tactics

Well-known Chollima APT hackers are targeting job applicants and organizations to distribute JavaScript-based malware.

Chanel, a leading fashion brand, has been targeted in a series of cyberattacks linked to vulnerabilities in Salesforce.
Customer Data Protection | Cybersecurity Breaches | Social Engineering Attacks 

Chanel, a leading fashion brand, has been targeted in a series of cyberattacks linked to vulnerabilities in Salesforce.

SonicWall is actively searching for zero-day vulnerabilities following a significant increase in attacks targeting firewalls.
Firewall Exploitation  | Ransomware Attacks  | Zero-Day Vulnerabilities

SonicWall is actively searching for zero-day vulnerabilities following a significant increase in attacks targeting firewalls.

Microsoft is providing a $5 million prize at the Zero Day Quest hacking competition.
AI Security  | Cloud Security | Hacking Competitions 

Microsoft is providing a $5 million prize at the Zero Day Quest hacking competition.

A campaign utilizing artificial intelligence has created 15,000 counterfeit TikTok Shop websites that distribute malware and steal cryptocurrency.
Cybersecurity Threats | E-commerce Fraud  | Phishing and Malware Campaigns

A campaign utilizing artificial intelligence has created 15,000 counterfeit TikTok Shop websites that distribute malware and steal cryptocurrency.

Page navigation

Previous PagePrevious 1 … 8 9 10 11 12 13 Next PageNext

© 2026 InfosecToday.com - WordPress Theme by Kadence WP

How cybersecure is your business? Take our free quiz and find out
Cyber risk scorecard
  • Cybersecurity News
  • Cybersecurity Articles
  • Cybersecurity Glossary
  • Contact
  • Login
Search