Skip to content
InfosecToday.com
  • D3f3ndo
  • Articles
  • Cybersecurity Glossary
  • Contact
  • Login
InfosecToday.com
File security risks increasing due to insider threats, malware, and AI
AI in Cybersecurity Strategies  | Data Leakage Prevention | File Security Risks

File security risks increasing due to insider threats, malware, and AI

GhostRedirector compromises Windows servers utilizing Rungan backdoor and Gamshen IIS module
Cyber Threats  | Malware | SEO Fraud 

GhostRedirector compromises Windows servers utilizing Rungan backdoor and Gamshen IIS module

Russian cyberespionage group APT28 targets NATO member firms with Outlook “NotDoor” backdoor
Cybersecurity Threats | Data Exfiltration  | Malware Techniques 

Russian cyberespionage group APT28 targets NATO member firms with Outlook “NotDoor” backdoor

Cybercriminals distributing malware via ‘Grokking’
Cybersecurity Threats | Malvertising Techniques | Social Media Exploitation 

Cybercriminals distributing malware via ‘Grokking’

USA and allies advocating Software Bill of Materials (SBOMs)
Risk Management | SBOM Adoption | Software Supply Chain Security

USA and allies advocating Software Bill of Materials (SBOMs)

DDoS attacks act as tools for political leverage and chaos
DDoS Attack Trends | Geopolitical Influences | Hacktivism and Automation 

DDoS attacks act as tools for political leverage and chaos

The US Cybersecurity Agency has highlighted a vulnerability in Wi-Fi range extenders that is currently being exploited.
Cybersecurity Vulnerabilities  | Device Security | Network Protection 

The US Cybersecurity Agency has highlighted a vulnerability in Wi-Fi range extenders that is currently being exploited.

Malicious actors using HexStrike AI to create Citrix exploits
AI-Driven Security Tools | Cybersecurity Threats | Exploitation of Vulnerabilities

Malicious actors using HexStrike AI to create Citrix exploits

Cloudflare successfully thwarts unprecedented DDoS attack
Cloud Infrastructure  | DDoS Attacks | IoT Security

Cloudflare successfully thwarts unprecedented DDoS attack

How a background in gaming can benefit a career in cybersecurity
Career Development | Cybersecurity Training  | Gaming Skills

How a background in gaming can benefit a career in cybersecurity

WhatsApp Zero-day vulnerabilities utilised for iOS attacks
Spyware Attacks  | Vulnerabilities

WhatsApp Zero-day vulnerabilities utilised for iOS attacks

Silver Fox using WatchDog driver to distribute ValleyRAT malware
Cybersecurity Threats | Malware Deployment Strategies  | Vulnerable Drivers

Silver Fox using WatchDog driver to distribute ValleyRAT malware

Nodemailer imitator nodejs-smtp clips Atomic and Exodus wallets
Cryptocurrency Security | Malicious Software | npm Package Vulnerabilities 

Nodemailer imitator nodejs-smtp clips Atomic and Exodus wallets

Ukrainian group FDN3 initiates large-scale brute-force attacks against SSL VPN and RDP systems.
Brute-Force Attacks | Cybersecurity Threats | Malicious Infrastructure

Ukrainian group FDN3 initiates large-scale brute-force attacks against SSL VPN and RDP systems.

Android Droppers distributing banking trojans, SMS stealers and spyware
Android Malware | Dropper Apps | Security Measures 

Android Droppers distributing banking trojans, SMS stealers and spyware

Considering Browsers as a Vulnerability Target: Reevaluating Security for Scattered Spider
Browser Security Strategies | Credential Theft Prevention  | Cybersecurity Threats

Considering Browsers as a Vulnerability Target: Reevaluating Security for Scattered Spider

ScarCruft’s “Operation HanKook Phantom” targeting South Korean academics with RokRAT malware
Espionage Activities  | Malware Delivery  | Phishing Campaigns

ScarCruft’s “Operation HanKook Phantom” targeting South Korean academics with RokRAT malware

Velociraptor forensic tool used for command and control tunneling
Cyber Attack Techniques | Remote Access Tools  | Use of Legitimate Software for Malicious Purposes

Velociraptor forensic tool used for command and control tunneling

Abandoned Sogou Zhuyin update server compromised and repurposed for Taiwan espionage operation
Cyber Espionage | Malware Distribution | Targeted Attacks 

Abandoned Sogou Zhuyin update server compromised and repurposed for Taiwan espionage operation

Amazon disrupts APT29 watering hole attack using Microsoft Device Code Authentication
Cybersecurity Threats | Phishing Techniques  | State-Sponsored Hacking

Amazon disrupts APT29 watering hole attack using Microsoft Device Code Authentication

FreePBX servers exploited by zero-day vulnerability
VoIP Systems  | Vulnerability Management 

FreePBX servers exploited by zero-day vulnerability

Can your security system monitor your employee’s generative AI prompts?
Data Loss Prevention | Generative AI Monitoring | Network Detection and Response 

Can your security system monitor your employee’s generative AI prompts?

Storm-0501 utilizes Entra ID to extract and erase Azure data during hybrid cloud attacks
Cloud Security Vulnerabilities  | Cybersecurity Threats | Ransomware Tactics

Storm-0501 utilizes Entra ID to extract and erase Azure data during hybrid cloud attacks

First AI-driven ransomware leveraging OpenAI model
AI-Powered Ransomware | Cross-Platform Malware | Cybersecurity Threats

First AI-driven ransomware leveraging OpenAI model

Anthropic AI used for cybercrime
AI as an Operational Tool | AI in the Attack Lifecycle | AI-Driven Fraud 

Anthropic AI used for cybercrime

Counterfeit PDF editing software downloads TamperedChef malware
Cybercrime Campaign | Information Theft | Malware Distribution

Counterfeit PDF editing software downloads TamperedChef malware

Visual Studio Code vulnerability allows deleted extension takeover
Cybersecurity Vulnerabilities  | Malicious Software Development  | Software Supply Chain Security

Visual Studio Code vulnerability allows deleted extension takeover

s1ngularity Nx attack exposes GitHub credentials
Malicious Software | Supply Chain Attack | Vulnerability Exploitation

s1ngularity Nx attack exposes GitHub credentials

Git vulnerability CVE-2025-48384 allows remote code execution
Remote Code Execution | Software Update Recommendations  | Vulnerability Exploitation

Git vulnerability CVE-2025-48384 allows remote code execution

Over 300,000 Plex Media Server installations remain susceptible to exploitation due to CVE-2025-34158
Cybersecurity Vulnerabilities  | Media Server Security  | Raspberry Pi

Over 300,000 Plex Media Server installations remain susceptible to exploitation due to CVE-2025-34158

Page navigation

Previous PagePrevious 1 2 3 4 … 13 Next PageNext

© 2026 InfosecToday.com - WordPress Theme by Kadence WP

  • D3f3ndo
  • Articles
  • Cybersecurity Glossary
  • Contact
  • Login
Search