Skip to content
InfosecToday.com
  • D3f3ndo
  • Articles
  • Cybersecurity Glossary
  • Contact
  • Login
InfosecToday.com
VPN applications for Android, widely utilized by millions of users, are secretly maintaining connections and are vulnerable to security issues.
Security Flaws | User Privacy Concerns  | VPN Provider Families

VPN applications for Android, widely utilized by millions of users, are secretly maintaining connections and are vulnerable to security issues.

United Kingdom government withdraws Apple backdoor request
Data Privacy  | Encryption Policy | Government Surveillance

United Kingdom government withdraws Apple backdoor request

URL-based and QR code phishing increasing
Credential Phishing | Mobile Threats  | URL-Based Threats

URL-based and QR code phishing increasing

CISOs must consider potential risks before hastily adopting AI technologies.
Cloud Complexity | Cybersecurity Posture | Innovation and Readiness 

CISOs must consider potential risks before hastily adopting AI technologies.

AI browsers scammed by PromptFix attacks run malicious hidden prompts
AI Vulnerabilities | Cybersecurity Threats | Social Engineering Techniques 

AI browsers scammed by PromptFix attacks run malicious hidden prompts

Healthcare cybersecurity risks increasing – especially password management
Cybersecurity Training Challenges | Healthcare Compliance Issues  | Password Security Risks

Healthcare cybersecurity risks increasing – especially password management

Pharmaceutical company Inotiv hit by ransomware attack
Business Impact  | Ransomware

Pharmaceutical company Inotiv hit by ransomware attack

Regional Australian councils expose confidential information due to Workhorse vulnerability
Australia | Data Security | Information Exposure | Software Vulnerabilities

Regional Australian councils expose confidential information due to Workhorse vulnerability

SAP Netweaver exploits CVE-2025-31324 and CVE-2025-42999 publicly released
Cybersecurity Threats | SAP Security Risks  | Vulnerability Exploitation

SAP Netweaver exploits CVE-2025-31324 and CVE-2025-42999 publicly released

North Korean hackers target diplomats via GitHub spearphishing attack
Cyber Espionage | Malware Delivery  | Spear-Phishing Attacks

North Korean hackers target diplomats via GitHub spearphishing attack

Hacktivist sentenced to 20 months imprisonment in UK.
Hacktivism | Legal Consequences

Hacktivist sentenced to 20 months imprisonment in UK.

Gambling tech company Bragg hit by cyberattack
Corporate Operations | Gaming Technology 

Gambling tech company Bragg hit by cyberattack

TPG Telecom in Australia is looking into the recent hacking incident involving iiNet.
Cybersecurity Incident | Telecommunications Security  | Unauthorized Access 

TPG Telecom in Australia is looking into the recent hacking incident involving iiNet.

Microsoft Analyzes  PipeMagic Modular Backdoor
Cybersecurity Threats | Malware Framework | Persistent Access

Microsoft Analyzes PipeMagic Modular Backdoor

Interconnected SAP exploits allow remote code execution
Cybersecurity Threats | Remote Code Execution | SAP Vulnerabilities

Interconnected SAP exploits allow remote code execution

The Importance of Security Culture in Reducing Cyber Risk
Human Behavior | Organizational Responsibility  | Security Culture

The Importance of Security Culture in Reducing Cyber Risk

PyPI blocks expired email addresses to prevent malicious account takeovers
Account Management  | Supply Chain Security

PyPI blocks expired email addresses to prevent malicious account takeovers

Microsoft Windows vulnerability used to distribute PipeMagic RansomExx malware
Cybersecurity Threats | Malware Exploitation | Ransomware Attacks 

Microsoft Windows vulnerability used to distribute PipeMagic RansomExx malware

Chinese APT groups targeting Taiwanese web hosting companies
APT Activities | Cybersecurity Threats | Targeted Attacks 

Chinese APT groups targeting Taiwanese web hosting companies

Noodlophile malware operation using copyright-related phishing tactics
Cybersecurity Threats | Malware Development | Phishing Attacks 

Noodlophile malware operation using copyright-related phishing tactics

New NIST guide explains how to detect morphed images
Detection Techniques | Face Morphing Software | Security Guidelines 

New NIST guide explains how to detect morphed images

How security teams are currently utilizing AI.
AI-Assisted Investigations  | Alert Management | Incident Response Optimization

How security teams are currently utilizing AI.

Workday data breach linked to Salesforce hack
Data Breach | Salesforce Security 

Workday data breach linked to Salesforce hack

New 5G vulnerability bypasses need for malicious base station
5G Security | Network Attacks | Traffic Sniffing 

New 5G vulnerability bypasses need for malicious base station

Cofense Vision 3.0 detects how users interact with phishing messages
Human-Centric Cybersecurity  | Incident Response Enhancement | Phishing Threat Detection

Cofense Vision 3.0 detects how users interact with phishing messages

GodRAT Trojan with Gh0st RAT code uses steganography to target brokerage firms
Cybersecurity Threats | Financial Sector Vulnerabilities  | Malware Distribution Techniques 

GodRAT Trojan with Gh0st RAT code uses steganography to target brokerage firms

ERMAC V3.0 Banking Trojan source code reveals complete malware infrastructure
Cybersecurity Threats | Data Exfiltration Techniques  | Malware Analysis

ERMAC V3.0 Banking Trojan source code reveals complete malware infrastructure

Zero Trust and Artificial Intelligence: Safeguarding Privacy in the Era of Autonomous AI.
Ethical Implications of AI  | Privacy Dynamics | Trust and Agency

Zero Trust and Artificial Intelligence: Safeguarding Privacy in the Era of Autonomous AI.

The United States imposes sanctions on Garantex and Grinex due to ransomware involvement
Cryptocurrency Exchanges  | Cybercrime | Sanctions

The United States imposes sanctions on Garantex and Grinex due to ransomware involvement

Cyber insurance sector showing signs of maturity
Claims and Coverage Challenges | Market Growth and Adoption Trends | Premium Increases and Denial Reasons 

Cyber insurance sector showing signs of maturity

Page navigation

Previous PagePrevious 1 2 3 4 5 6 … 13 Next PageNext

© 2025 InfosecToday.com - WordPress Theme by Kadence WP

  • D3f3ndo
  • Articles
  • Cybersecurity Glossary
  • Contact
  • Login
Search