Skip to content
InfosecToday.com
  • Cybersecurity News
  • Cybersecurity Articles
  • Cybersecurity Glossary
  • Contact
  • Login
InfosecToday.com
  • white robot
    AI Security Threats | Countermeasures for AI Agents  | Malicious Web Attacks

    Parallel-Poisoned Web Attack presents poisoned web pages to AI web bots

  • Close-up view of computer motherboard connectors.
    SAP Software Security  | Vulnerability Management 

    SAP S/4HANA vulnerability CVE-2025-42957 actively exploited

  • pink and black wallpaper
    AI Supply Chain Vulnerabilities | Code Execution Risks  | Malicious Model Deployment

    AI-driven supply chain attack using model namespace reuse

  • black flat screen computer monitor
    Cyber Insurance  | Software Security  | Vulnerability Management 

    Importance of the CVE matrix for cybersecurity

  • a computer screen with a blue background
    macOS Security Threats  | Malware Campaigns | Phishing Attacks 

    Hidden SVG files launch base64-encoded phishing sites

  • control center, internet, cybersecurity, science fiction, network, monitor, computer, technology, cybersecurity, cybersecurity, cybersecurity, cybersecurity, cybersecurity
    AI in Cybersecurity Strategies  | Data Leakage Prevention | File Security Risks

    File security risks increasing due to insider threats, malware, and AI

  • black laptop computer keyboard in closeup photo
    Cyber Threats  | Malware | SEO Fraud 

    GhostRedirector compromises Windows servers utilizing Rungan backdoor and Gamshen IIS module

  • Flags are displayed in a modern building window.
    Cybersecurity Threats | Data Exfiltration  | Malware Techniques 

    Russian cyberespionage group APT28 targets NATO member firms with Outlook “NotDoor” backdoor

  • photo of steel wool against black background
    Cybersecurity Threats | Malvertising Techniques | Social Media Exploitation 

    Cybercriminals distributing malware via ‘Grokking’

  • black flat screen computer monitor
    Risk Management | SBOM Adoption | Software Supply Chain Security

    USA and allies advocating Software Bill of Materials (SBOMs)

  • black and white computer keyboard
    DDoS Attack Trends | Geopolitical Influences | Hacktivism and Automation 

    DDoS attacks act as tools for political leverage and chaos

  • blue and white light in dark room
    Cybersecurity Vulnerabilities  | Device Security | Network Protection 

    The US Cybersecurity Agency has highlighted a vulnerability in Wi-Fi range extenders that is currently being exploited.

  • person facing computer desktop
    AI-Driven Security Tools | Cybersecurity Threats | Exploitation of Vulnerabilities

    Malicious actors using HexStrike AI to create Citrix exploits

  • orange bokeh photography
    Cloud Infrastructure  | DDoS Attacks | IoT Security

    Cloudflare successfully thwarts unprecedented DDoS attack

  • ai generated, computers, programmer, hacker, cybersecurity, map, earth, international, global, security, fraud, scam, hacking, phishing, cyber, internet, technology, cybersecurity, cybersecurity, cybersecurity, cybersecurity, cybersecurity, fraud, scam
    Career Development | Cybersecurity Training  | Gaming Skills

    How a background in gaming can benefit a career in cybersecurity

  • red and black card on brown wooden table
    Spyware Attacks  | Vulnerabilities

    WhatsApp Zero-day vulnerabilities utilised for iOS attacks

  • a laptop computer sitting on top of a wooden desk
    Cybersecurity Threats | Malware Deployment Strategies  | Vulnerable Drivers

    Silver Fox using WatchDog driver to distribute ValleyRAT malware

  • a close up of a cell phone with a bitcoin on it
    Cryptocurrency Security | Malicious Software | npm Package Vulnerabilities 

    Nodemailer imitator nodejs-smtp clips Atomic and Exodus wallets

  • a person holding a cell phone in their hand
    Brute-Force Attacks | Cybersecurity Threats | Malicious Infrastructure

    Ukrainian group FDN3 initiates large-scale brute-force attacks against SSL VPN and RDP systems.

  • green frog iphone case beside black samsung android smartphone
    Android Malware | Dropper Apps | Security Measures 

    Android Droppers distributing banking trojans, SMS stealers and spyware

  • turned-on MacBook Pro
    Browser Security Strategies | Credential Theft Prevention  | Cybersecurity Threats

    Considering Browsers as a Vulnerability Target: Reevaluating Security for Scattered Spider

  • data theft, data breach, cybercrime, input, output, arrows, hood, hacker, malware, phishing, encryption, decryption, vulnerability, security, network, firewall, intrusion, privacy, confidential, access
    Espionage Activities  | Malware Delivery  | Phishing Campaigns

    ScarCruft’s “Operation HanKook Phantom” targeting South Korean academics with RokRAT malware

  • MacBook Pro with images of computer language codes
    Cyber Attack Techniques | Remote Access Tools  | Use of Legitimate Software for Malicious Purposes

    Velociraptor forensic tool used for command and control tunneling

  • city building during daytime
    Cyber Espionage | Malware Distribution | Targeted Attacks 

    Abandoned Sogou Zhuyin update server compromised and repurposed for Taiwan espionage operation

  • blue and white bokeh lights
    Cybersecurity Threats | Phishing Techniques  | State-Sponsored Hacking

    Amazon disrupts APT29 watering hole attack using Microsoft Device Code Authentication

  • closeup photography of computer keyboard
    VoIP Systems  | Vulnerability Management 

    FreePBX servers exploited by zero-day vulnerability

  • people sitting on chair in front of computer
    Data Loss Prevention | Generative AI Monitoring | Network Detection and Response 

    Can your security system monitor your employee’s generative AI prompts?

  • a circuit board with many small components
    Cloud Security Vulnerabilities  | Cybersecurity Threats | Ransomware Tactics

    Storm-0501 utilizes Entra ID to extract and erase Azure data during hybrid cloud attacks

  • black and white computer keyboard
    AI-Powered Ransomware | Cross-Platform Malware | Cybersecurity Threats

    First AI-driven ransomware leveraging OpenAI model

  • closeup photo of turned-on blue and white laptop computer
    AI as an Operational Tool | AI in the Attack Lifecycle | AI-Driven Fraud 

    Anthropic AI used for cybercrime

Page navigation

Previous PagePrevious 1 2 3 4 … 13 Next PageNext

© 2026 InfosecToday.com - WordPress Theme by Kadence WP

How cybersecure is your business? Take our free quiz and find out
Cyber risk scorecard
  • Cybersecurity News
  • Cybersecurity Articles
  • Cybersecurity Glossary
  • Contact
  • Login
Search