Skip to content
InfosecToday.com
  • Cybersecurity News
  • Cybersecurity Articles
  • Cybersecurity Glossary
  • Contact
  • Login
InfosecToday.com
GodRAT Trojan with Gh0st RAT code uses steganography to target brokerage firms
Cybersecurity Threats | Financial Sector Vulnerabilities  | Malware Distribution Techniques 

GodRAT Trojan with Gh0st RAT code uses steganography to target brokerage firms

ERMAC V3.0 Banking Trojan source code reveals complete malware infrastructure
Cybersecurity Threats | Data Exfiltration Techniques  | Malware Analysis

ERMAC V3.0 Banking Trojan source code reveals complete malware infrastructure

Zero Trust and Artificial Intelligence: Safeguarding Privacy in the Era of Autonomous AI.
Ethical Implications of AI  | Privacy Dynamics | Trust and Agency

Zero Trust and Artificial Intelligence: Safeguarding Privacy in the Era of Autonomous AI.

The United States imposes sanctions on Garantex and Grinex due to ransomware involvement
Cryptocurrency Exchanges  | Cybercrime | Sanctions

The United States imposes sanctions on Garantex and Grinex due to ransomware involvement

Cyber insurance sector showing signs of maturity
Claims and Coverage Challenges | Market Growth and Adoption Trends | Premium Increases and Denial Reasons 

Cyber insurance sector showing signs of maturity

Vulnerabilities addressed in Rockwell’s FactoryTalk, Micro800, and ControlLogix products
Industrial Automation Security | Software Patching  | Vulnerability Management 

Vulnerabilities addressed in Rockwell’s FactoryTalk, Micro800, and ControlLogix products

Open-Source Obot MCP Gateway for secure MCP server management
IT Governance | MCP Server Management | User Access and Discovery 

Open-Source Obot MCP Gateway for secure MCP server management

Taiwan Web Servers Breached by UAT-7237 using Open-Source Hacking Tools
Advanced Persistent Threats  | Cybersecurity Threats | Malware Techniques 

Taiwan Web Servers Breached by UAT-7237 using Open-Source Hacking Tools

Employee-Created personalized AI applications pose security dangers
Agentic AI | Generative AI Platforms | On-Premises AI Deployment  | Shadow AI

Employee-Created personalized AI applications pose security dangers

Google announces Android pKVM framework SESIP Level 5 certification
Android Technology  | Certification Standards | Mobile Security

Google announces Android pKVM framework SESIP Level 5 certification

Malicious actors exploiting video download site to distribute Proxyware malware
Bandwidth Theft  | Cybersecurity Threats | Malware Distribution

Malicious actors exploiting video download site to distribute Proxyware malware

Recent developments in phishing attacks are emerging as cybercriminals increasingly leverage AI to enhance their tactics.
AI-Powered Phishing Techniques | Deepfake Technology in Cybercrime | Evasion Tactics Using Legitimate Services 

Recent developments in phishing attacks are emerging as cybercriminals increasingly leverage AI to enhance their tactics.

In July, Qilin Ransomware has emerged as a significant threat, claiming over 70 victims.
Ransomware Trends | Targeted Sectors  | Vulnerability Exploitation

In July, Qilin Ransomware has emerged as a significant threat, claiming over 70 victims.

New FireWood malware targeting Linux systems
Linux Security Threats | Malware Variants | Remote Access Trojans 

New FireWood malware targeting Linux systems

Cisco Secure Firewall vulnerability enables remote shell command injections
Cisco Products | Mitigation Strategies  | Security Vulnerability

Cisco Secure Firewall vulnerability enables remote shell command injections

CVE-2025-8088 – WinRAR path traversal vulnerability exploited to run malicious software
Cybersecurity Threats | Malware Exploitation | Software Vulnerabilities

CVE-2025-8088 – WinRAR path traversal vulnerability exploited to run malicious software

EncryptHub using Brave Support Platform to weaponise MMC vulnerability
Attack Methodologies | Cyber Threats  | Vulnerability Exploitation

EncryptHub using Brave Support Platform to weaponise MMC vulnerability

Brivo’s Visitor Management system, enhanced by Envoy, enhances security at the front desk.
Enhanced Security Solutions | Streamlined Workplace Experience  | Visitor Management Integration

Brivo’s Visitor Management system, enhanced by Envoy, enhances security at the front desk.

Hacked police and government emails for sale: $40 ono
Account Compromise Methods | Cybersecurity Threats | Institutional Trust Exploitation 

Hacked police and government emails for sale: $40 ono

How ShinyHunters Infiltrated Google, Adidas, Louis Vuitton, and Other Brands
Collaborative Threat Actors  | Cybercriminal Tactics | Data Breaches 

How ShinyHunters Infiltrated Google, Adidas, Louis Vuitton, and Other Brands

SmartLoader malware spread through GitHub repositories
Cybersecurity Threats | Malware Distribution | Software Exploitation 

SmartLoader malware spread through GitHub repositories

Cybercriminals using CrossC2 to extend Cobalt Strike beacons to Linux and macOS
Command-and-Control Frameworks | Cybersecurity Threats | Malware Analysis

Cybercriminals using CrossC2 to extend Cobalt Strike beacons to Linux and macOS

Weaknesses in the Xerox Print Orchestration Product allow remote code execution
Remote Code Execution | Security Patches | Vulnerabilities

Weaknesses in the Xerox Print Orchestration Product allow remote code execution

Canadian House of Commons targeted by SharePoint Toolshell cyberattack
Cybersecurity Breach | Government Cyber Threats  | Microsoft Vulnerabilities

Canadian House of Commons targeted by SharePoint Toolshell cyberattack

Apache Tomcat vulnerabilities allow Denial of Service (DoS) attacks
Denial of Service | Security Vulnerability | Software Update 

Apache Tomcat vulnerabilities allow Denial of Service (DoS) attacks

Android malware targeting banking applications through NFC relay scams and call hijacking
Cybercrime | Financial Fraud  | Malware

Android malware targeting banking applications through NFC relay scams and call hijacking

MadeYouReset vulnerability in HTTP2 facilitates large-scale DDoS attacks
Cybersecurity Threats | DDoS Attacks | HTTP/2 Vulnerabilities 

MadeYouReset vulnerability in HTTP2 facilitates large-scale DDoS attacks

Bypassing Passkey Login through Manipulation of the WebAuthn Process
Authentication Vulnerabilities | Cybersecurity | WebAuthn Exploits 

Bypassing Passkey Login through Manipulation of the WebAuthn Process

Hackers using specialized phishing tools for downgrade attacks on FIDO authentication
Authentication Vulnerabilities | Cybersecurity Threats | Phishing Techniques 

Hackers using specialized phishing tools for downgrade attacks on FIDO authentication

AI-assisted SOC boosts efficiency and cuts investigation time
AI Integration in Security Operations | Challenges in SOC Efficiency | Enhancements in Threat Detection and Response 

AI-assisted SOC boosts efficiency and cuts investigation time

Page navigation

Previous PagePrevious 1 … 3 4 5 6 7 … 13 Next PageNext

© 2026 InfosecToday.com - WordPress Theme by Kadence WP

How cybersecure is your business? Take our free quiz and find out
Cyber risk scorecard
  • Cybersecurity News
  • Cybersecurity Articles
  • Cybersecurity Glossary
  • Contact
  • Login
Search