Skip to content
InfosecToday.com
  • Defendo
  • Articles
  • Cybersecurity Glossary
  • Contact
  • Login
InfosecToday.com
In July, Qilin Ransomware has emerged as a significant threat, claiming over 70 victims.
Ransomware Trends | Targeted Sectors  | Vulnerability Exploitation

In July, Qilin Ransomware has emerged as a significant threat, claiming over 70 victims.

New FireWood malware targeting Linux systems
Linux Security Threats | Malware Variants | Remote Access Trojans 

New FireWood malware targeting Linux systems

Cisco Secure Firewall vulnerability enables remote shell command injections
Cisco Products | Mitigation Strategies  | Security Vulnerability

Cisco Secure Firewall vulnerability enables remote shell command injections

CVE-2025-8088 – WinRAR path traversal vulnerability exploited to run malicious software
Cybersecurity Threats | Malware Exploitation | Software Vulnerabilities

CVE-2025-8088 – WinRAR path traversal vulnerability exploited to run malicious software

EncryptHub using Brave Support Platform to weaponise MMC vulnerability
Attack Methodologies | Cyber Threats  | Vulnerability Exploitation

EncryptHub using Brave Support Platform to weaponise MMC vulnerability

Brivo’s Visitor Management system, enhanced by Envoy, enhances security at the front desk.
Enhanced Security Solutions | Streamlined Workplace Experience  | Visitor Management Integration

Brivo’s Visitor Management system, enhanced by Envoy, enhances security at the front desk.

Hacked police and government emails for sale: $40 ono
Account Compromise Methods | Cybersecurity Threats | Institutional Trust Exploitation 

Hacked police and government emails for sale: $40 ono

How ShinyHunters Infiltrated Google, Adidas, Louis Vuitton, and Other Brands
Collaborative Threat Actors  | Cybercriminal Tactics | Data Breaches 

How ShinyHunters Infiltrated Google, Adidas, Louis Vuitton, and Other Brands

SmartLoader malware spread through GitHub repositories
Cybersecurity Threats | Malware Distribution | Software Exploitation 

SmartLoader malware spread through GitHub repositories

Cybercriminals using CrossC2 to extend Cobalt Strike beacons to Linux and macOS
Command-and-Control Frameworks | Cybersecurity Threats | Malware Analysis

Cybercriminals using CrossC2 to extend Cobalt Strike beacons to Linux and macOS

Weaknesses in the Xerox Print Orchestration Product allow remote code execution
Remote Code Execution | Security Patches | Vulnerabilities

Weaknesses in the Xerox Print Orchestration Product allow remote code execution

Canadian House of Commons targeted by SharePoint Toolshell cyberattack
Cybersecurity Breach | Government Cyber Threats  | Microsoft Vulnerabilities

Canadian House of Commons targeted by SharePoint Toolshell cyberattack

Apache Tomcat vulnerabilities allow Denial of Service (DoS) attacks
Denial of Service | Security Vulnerability | Software Update 

Apache Tomcat vulnerabilities allow Denial of Service (DoS) attacks

Android malware targeting banking applications through NFC relay scams and call hijacking
Cybercrime | Financial Fraud  | Malware

Android malware targeting banking applications through NFC relay scams and call hijacking

MadeYouReset vulnerability in HTTP2 facilitates large-scale DDoS attacks
Cybersecurity Threats | DDoS Attacks | HTTP/2 Vulnerabilities 

MadeYouReset vulnerability in HTTP2 facilitates large-scale DDoS attacks

Bypassing Passkey Login through Manipulation of the WebAuthn Process
Authentication Vulnerabilities | Cybersecurity | WebAuthn Exploits 

Bypassing Passkey Login through Manipulation of the WebAuthn Process

Hackers using specialized phishing tools for downgrade attacks on FIDO authentication
Authentication Vulnerabilities | Cybersecurity Threats | Phishing Techniques 

Hackers using specialized phishing tools for downgrade attacks on FIDO authentication

AI-assisted SOC boosts efficiency and cuts investigation time
AI Integration in Security Operations | Challenges in SOC Efficiency | Enhancements in Threat Detection and Response 

AI-assisted SOC boosts efficiency and cuts investigation time

Croatian research institute targeted by ToolShell ransomware attack
Cybersecurity Incident | Data Protection Measures  | Ransomware Attack

Croatian research institute targeted by ToolShell ransomware attack

Microsoft has addressed the “BadSuccessor” Kerberos vulnerability identified as CVE-2025-53779.
Exploitation Risks | Patch Management  | Security Vulnerabilities

Microsoft has addressed the “BadSuccessor” Kerberos vulnerability identified as CVE-2025-53779.

NIST releases lightweight cryptography standard for IoT devices
Cybersecurity Standards  | Internet of Things (IoT) | Lightweight Cryptography

NIST releases lightweight cryptography standard for IoT devices

Manpower has reported that a data breach resulting from a ransomware attack has affected 140,000 individuals.
Data Breach | Information Security

Manpower has reported that a data breach resulting from a ransomware attack has affected 140,000 individuals.

New Zoom and Xerox security updates address privilege escalation and remote code execution (RCE)
Remote Code Execution | Security Vulnerabilities | Software Updates

New Zoom and Xerox security updates address privilege escalation and remote code execution (RCE)

AWS CISO explains cloud-native security
Cloud-Native Security | Security Management  | Shared Responsibility Model 

AWS CISO explains cloud-native security

Adobe patches 60+ security flaws in 13 products
Product Patching  | Security Vulnerabilities | Software Updates

Adobe patches 60+ security flaws in 13 products

Fortinet and Ivanti issue new security updates
Patch Updates | Security Advisories | Vulnerability Management 

Fortinet and Ivanti issue new security updates

Fortinet Products Under Increased Scrutiny Once More 
Cybersecurity Vulnerabilities  | Exploit Development | Malicious Traffic Trends 

Fortinet Products Under Increased Scrutiny Once More 

How an AI-Driven Penetration Tester Emerged as a Leading Bug Hunter on HackerOne 
Automated Security Tools | Cybersecurity Achievements  | Penetration Testing

How an AI-Driven Penetration Tester Emerged as a Leading Bug Hunter on HackerOne 

PS1Bot malware executes multi-stage attacks
Information Theft Techniques  | Malvertising Campaigns | Modular Malware Frameworks

PS1Bot malware executes multi-stage attacks

Urgent Patch Required: Cybercriminals Exploit Critical RCE Vulnerability in OT Networks 
Critical Infrastructure Security | Erlang-based Platform Risks 

Urgent Patch Required: Cybercriminals Exploit Critical RCE Vulnerability in OT Networks 

Page navigation

Previous PagePrevious 1 2 3 4 5 … 13 Next PageNext

© 2025 InfosecToday.com - WordPress Theme by Kadence WP

  • Defendo
  • Articles
  • Cybersecurity Glossary
  • Contact
  • Login
Search