Skip to content
InfosecToday.com
  • D3f3ndo
  • Articles
  • Cybersecurity Glossary
  • Contact
  • Login
InfosecToday.com
ShadowSilk attacks Asia-Pacific government targets via Telegram bots
Command-and-Control | Data Exfiltration  | Energy | Government Entities | manufacturing | Retail | ShadowSilk | Spear Phishing | SturgeonPhisher | Web Shells  | YoroTrooper

ShadowSilk attacks Asia-Pacific government targets via Telegram bots

Energy industry needs to be vigilant about cyberattacks
Cybersecurity Threats | Energy Demand and Technology  | Infrastructure Vulnerabilities

Energy industry needs to be vigilant about cyberattacks

AI agents vulnerable to prompt injection via image scaling attacks
AI Vulnerabilities | Image Processing Attacks | Security Threats 

AI agents vulnerable to prompt injection via image scaling attacks

ShadowCaptcha distributing ransomware & cryptominers via compromised WordPress sites
Cybercrime | Malware Distribution | Social Engineering

ShadowCaptcha distributing ransomware & cryptominers via compromised WordPress sites

HOOK Android Trojan incorporates ransomware overlays & 107 remote commands
Android Banking Trojans | Malware Evolution | Ransomware Tactics

HOOK Android Trojan incorporates ransomware overlays & 107 remote commands

Docker vulnerability (CVE-2025-9074) allows container escape, assigned CVSS of 9.3
Container Isolation  | Docker Desktop | Security Vulnerability

Docker vulnerability (CVE-2025-9074) allows container escape, assigned CVSS of 9.3

Diplomats targeted by UNC6384 through captive portal hijacking
Advanced Persistent Threats  | Cybersecurity Threats | Social Engineering Techniques 

Diplomats targeted by UNC6384 through captive portal hijacking

Phishing Attack Employs UpCrypter in Fraudulent Voicemail Emails to Distribute RAT Payloads.
Malware Distribution | Phishing Campaigns | Remote Access Tools 

Phishing Attack Employs UpCrypter in Fraudulent Voicemail Emails to Distribute RAT Payloads.

Transparent Tribe spear-phishing Indian government using weaponised desktop shortcuts
Cybersecurity Threats | Malware Techniques  | Targeted Attacks 

Transparent Tribe spear-phishing Indian government using weaponised desktop shortcuts

MixShell malware spreading through US supply chains via contact forms
Cybersecurity Threats | Social Engineering Tactics | Supply Chain Vulnerabilities

MixShell malware spreading through US supply chains via contact forms

Reasons Behind SIEM Rule Failures and Solutions: Lessons Learned from 160 Million Attack Simulations
Log Collection Failures | Misconfigured Detection Rules | Threat Detection Gaps 

Reasons Behind SIEM Rule Failures and Solutions: Lessons Learned from 160 Million Attack Simulations

Is an SSH brute-force Go module stealing your credentials?
Credential Exfiltration | Cybersecurity Threats | Malicious Software

Is an SSH brute-force Go module stealing your credentials?

Robust MLSecOps vital for managing vulnerabilities
Agentic AI | Machine Learning | MLSecOps | Model Complexity | Security Transparency  | Threat Landscape

Robust MLSecOps vital for managing vulnerabilities

AI Agents have hidden security flaws
Agentic AI | AI Security Risks  | Historical Comparisons | Organizational Safeguards 

AI Agents have hidden security flaws

Lightweight LLMs decrease incident response time using decision theoretic planning
Hallucination Mitigation  | Incident Response Planning | LLM Integration

Lightweight LLMs decrease incident response time using decision theoretic planning

Apple releases fix for CVE-2025-43300 zero-day vulnerability
Security Vulnerabilities | Software Updates | Targeted Attacks 

Apple releases fix for CVE-2025-43300 zero-day vulnerability

AI boosts ransomware impacts
Attacks on Managed Service Providers (MSPs) | Exploitation of Collaboration Tools  | Ransomware Threats

AI boosts ransomware impacts

Chinese hacker groups Murky, Genesis, and Glacial Panda targeting cloud computing and telecommunications
Cloud Security Threats | Cyber Espionage | Vulnerability Exploitation

Chinese hacker groups Murky, Genesis, and Glacial Panda targeting cloud computing and telecommunications

Linux RAR malware bypasses antivirus software
Malware Delivery Techniques | Phishing Attacks  | Remote Access Tools 

Linux RAR malware bypasses antivirus software

Automation is transforming how penetration testing services are provided.
Pentesting Automation | Real-time Insights | Vulnerability Management 

Automation is transforming how penetration testing services are provided.

Increasing municipal infrastructure hacking risk
Critical Infrastructure Vulnerabilities | Cybersecurity Threats | Funding and Resource Challenges 

Increasing municipal infrastructure hacking risk

OSINT helps financial institutions combat money laundering
KYC and Due Diligence Enhancement | Monitoring Money Laundering Trends  | OSINT Tools for Financial Investigations

OSINT helps financial institutions combat money laundering

Commvault pre-auth exploit chain allows remote code execution
Cybersecurity Updates  | Remote Code Execution | Vulnerabilities

Commvault pre-auth exploit chain allows remote code execution

ClickFix & fake CAPTCHAs facilitate CORNFLAKE.V3 deployment
Cybersecurity Threats | Malware Development | Social Engineering Tactics

ClickFix & fake CAPTCHAs facilitate CORNFLAKE.V3 deployment

QuirkyLoader distributes Agent Tesla, AsyncRAT, Snake Keylogger and other malware
Cybersecurity Threats | Malware Delivery Techniques | Phishing Tactics

QuirkyLoader distributes Agent Tesla, AsyncRAT, Snake Keylogger and other malware

DOJ charges 22-year-old accused RapperBot botmaster
Botnet Infrastructure  | Cybercrime | DDoS Attacks

DOJ charges 22-year-old accused RapperBot botmaster

Apache ActiveMQ exploit allows DripDropper installation on Linux cloud systems
Cybersecurity Vulnerabilities  | Malware Deployment | Threat Actor Tactics 

Apache ActiveMQ exploit allows DripDropper installation on Linux cloud systems

AWS Trusted Advisor vulnerability hides public S3 buckets
S3 Access Control Mechanisms | Security Best Practices  | Trusted Advisor Limitations

AWS Trusted Advisor vulnerability hides public S3 buckets

FBI alleges Russian APT group exploiting old Cisco vulnerability (CVE-2018-0171)
3D Product Configurators | Network Security Risks  | State-Sponsored Cyber Threats | Vulnerability Exploitation

FBI alleges Russian APT group exploiting old Cisco vulnerability (CVE-2018-0171)

Git version 2.51: Getting ready for the future by incorporating SHA-256.
Cryptographic Security | Performance Improvements  | Version Control Modernization

Git version 2.51: Getting ready for the future by incorporating SHA-256.

Page navigation

Previous PagePrevious 1 2 3 4 5 … 13 Next PageNext

© 2025 InfosecToday.com - WordPress Theme by Kadence WP

  • D3f3ndo
  • Articles
  • Cybersecurity Glossary
  • Contact
  • Login
Search