Skip to content
InfosecToday.com
  • Defendo
  • Articles
  • Cybersecurity Glossary
  • Contact
  • Login
InfosecToday.com
Hacktivist sentenced to 20 months imprisonment in UK.
Hacktivism | Legal Consequences

Hacktivist sentenced to 20 months imprisonment in UK.

Gambling tech company Bragg hit by cyberattack
Corporate Operations | Gaming Technology 

Gambling tech company Bragg hit by cyberattack

TPG Telecom in Australia is looking into the recent hacking incident involving iiNet.
Cybersecurity Incident | Telecommunications Security  | Unauthorized Access 

TPG Telecom in Australia is looking into the recent hacking incident involving iiNet.

Microsoft Analyzes  PipeMagic Modular Backdoor
Cybersecurity Threats | Malware Framework | Persistent Access

Microsoft Analyzes PipeMagic Modular Backdoor

Interconnected SAP exploits allow remote code execution
Cybersecurity Threats | Remote Code Execution | SAP Vulnerabilities

Interconnected SAP exploits allow remote code execution

The Importance of Security Culture in Reducing Cyber Risk
Human Behavior | Organizational Responsibility  | Security Culture

The Importance of Security Culture in Reducing Cyber Risk

PyPI blocks expired email addresses to prevent malicious account takeovers
Account Management  | Supply Chain Security

PyPI blocks expired email addresses to prevent malicious account takeovers

Microsoft Windows vulnerability used to distribute PipeMagic RansomExx malware
Cybersecurity Threats | Malware Exploitation | Ransomware Attacks 

Microsoft Windows vulnerability used to distribute PipeMagic RansomExx malware

Chinese APT groups targeting Taiwanese web hosting companies
APT Activities | Cybersecurity Threats | Targeted Attacks 

Chinese APT groups targeting Taiwanese web hosting companies

Noodlophile malware operation using copyright-related phishing tactics
Cybersecurity Threats | Malware Development | Phishing Attacks 

Noodlophile malware operation using copyright-related phishing tactics

New NIST guide explains how to detect morphed images
Detection Techniques | Face Morphing Software | Security Guidelines 

New NIST guide explains how to detect morphed images

How security teams are currently utilizing AI.
AI-Assisted Investigations  | Alert Management | Incident Response Optimization

How security teams are currently utilizing AI.

Workday data breach linked to Salesforce hack
Data Breach | Salesforce Security 

Workday data breach linked to Salesforce hack

New 5G vulnerability bypasses need for malicious base station
5G Security | Network Attacks | Traffic Sniffing 

New 5G vulnerability bypasses need for malicious base station

How Evolving Remote Access Trojans (RATs) Are Transforming Enterprise Security Threats 
Behavior-Aware Security | Improved Security Outcomes  | Unified Detection Methods

How Evolving Remote Access Trojans (RATs) Are Transforming Enterprise Security Threats 

Cofense Vision 3.0 detects how users interact with phishing messages
Human-Centric Cybersecurity  | Incident Response Enhancement | Phishing Threat Detection

Cofense Vision 3.0 detects how users interact with phishing messages

GodRAT Trojan with Gh0st RAT code uses steganography to target brokerage firms
Cybersecurity Threats | Financial Sector Vulnerabilities  | Malware Distribution Techniques 

GodRAT Trojan with Gh0st RAT code uses steganography to target brokerage firms

ERMAC V3.0 Banking Trojan source code reveals complete malware infrastructure
Cybersecurity Threats | Data Exfiltration Techniques  | Malware Analysis

ERMAC V3.0 Banking Trojan source code reveals complete malware infrastructure

Zero Trust and Artificial Intelligence: Safeguarding Privacy in the Era of Autonomous AI.
Ethical Implications of AI  | Privacy Dynamics | Trust and Agency

Zero Trust and Artificial Intelligence: Safeguarding Privacy in the Era of Autonomous AI.

The United States imposes sanctions on Garantex and Grinex due to ransomware involvement
Cryptocurrency Exchanges  | Cybercrime | Sanctions

The United States imposes sanctions on Garantex and Grinex due to ransomware involvement

Cyber insurance sector showing signs of maturity
Claims and Coverage Challenges | Market Growth and Adoption Trends | Premium Increases and Denial Reasons 

Cyber insurance sector showing signs of maturity

Vulnerabilities addressed in Rockwell’s FactoryTalk, Micro800, and ControlLogix products
Industrial Automation Security | Software Patching  | Vulnerability Management 

Vulnerabilities addressed in Rockwell’s FactoryTalk, Micro800, and ControlLogix products

Norway and Poland Accuse Russian Actors of Targeting Water Systems During Cyberattack
Cybersecurity | Infrastructure Vulnerability | Nation-State Threats 

Norway and Poland Accuse Russian Actors of Targeting Water Systems During Cyberattack

Open-Source Obot MCP Gateway for secure MCP server management
IT Governance | MCP Server Management | User Access and Discovery 

Open-Source Obot MCP Gateway for secure MCP server management

Taiwan Web Servers Breached by UAT-7237 using Open-Source Hacking Tools
Advanced Persistent Threats  | Cybersecurity Threats | Malware Techniques 

Taiwan Web Servers Breached by UAT-7237 using Open-Source Hacking Tools

Employee-Created personalized AI applications pose security dangers
Agentic AI | Generative AI Platforms | On-Premises AI Deployment  | Shadow AI

Employee-Created personalized AI applications pose security dangers

New Crypto24 Ransomware Attacks Bypass EDR 
Cybercrime Techniques | Technical Proficiency  | Threat Escalation

New Crypto24 Ransomware Attacks Bypass EDR 

Google announces Android pKVM framework SESIP Level 5 certification
Android Technology  | Certification Standards | Mobile Security

Google announces Android pKVM framework SESIP Level 5 certification

Malicious actors exploiting video download site to distribute Proxyware malware
Bandwidth Theft  | Cybersecurity Threats | Malware Distribution

Malicious actors exploiting video download site to distribute Proxyware malware

Recent developments in phishing attacks are emerging as cybercriminals increasingly leverage AI to enhance their tactics.
AI-Powered Phishing Techniques | Deepfake Technology in Cybercrime | Evasion Tactics Using Legitimate Services 

Recent developments in phishing attacks are emerging as cybercriminals increasingly leverage AI to enhance their tactics.

Page navigation

Previous PagePrevious 1 2 3 4 … 13 Next PageNext

© 2025 InfosecToday.com - WordPress Theme by Kadence WP

  • Defendo
  • Articles
  • Cybersecurity Glossary
  • Contact
  • Login
Search