Skip to content
InfosecToday.com
  • Cybersecurity News
  • Cybersecurity Articles
  • Cybersecurity Glossary
  • Contact
  • Login
InfosecToday.com
  • hacking, hacker, computer, internet, security, data, technology, network, password, crime, hack, protection, spyware, spy, privacy, pc, firewall, computer security, cyber, data security, code, black computer, black technology, black laptop, black data, black network, black internet, black security, black code, black coding, hacking, hacking, hacking, hacking, hacker, hacker, hacker, hacker, hacker, hack, spyware, spy, firewall, cyber, cyber
    Cybercrime | Data Breach | Tax Fraud

    A hacker has been extradited to the United States for his involvement in tax fraud schemes that resulted in the theft of more than $2.5 million.

  • black computer keyboard on brown wooden desk
    Cybersecurity Threats | Malware Distribution Methods  | Phishing Techniques 

    Cybercriminals are exploiting SVG files by embedding harmful JavaScript to deploy malware on Windows systems.

  • social media, network, security, data protection, communication, social network, community, tiktok, social networks, social networking, social media icons, technology, blue technology, blue data, blue facebook, blue network, blue community, blue communication, blue security, blue social, blue media
    Cybercrime Operations | Malware Distribution | Traffic Distribution Systems

    SocGholish malware is distributed through advertising tools and provides access to various groups such as LockBit and Evil Corp.

  • shallow focus photography of computer codes
    Cybersecurity Threats | Malicious Software | Supply Chain Attacks

    WhatsApp developers are facing threats from malicious npm packages that come with a remote kill switch.

  • closeup photo of turned-on blue and white laptop computer
    Customer Guidance  | Cybersecurity Vulnerabilities  | Ransomware Attacks 

    SonicWall has verified that there are no new zero-day vulnerabilities in SSLVPN, stating that the recent ransomware attack is associated with an older vulnerability.

  • red and black laptop computer
    Email Security Exploitation | Social Engineering Techniques  | Spear Phishing

    Microsoft 365’s Direct Send feature has been exploited to circumvent email security measures.

  • digital, binary code, abstract, background, matrix, display, technology, information, tech-savvy, computer, data, network, cyberspace, programming, coding, encryption, concept, cybersecurity, matrix background, digital matrix, binary digits, tech world, digital world, information age, ai generated, cybersecurity, cybersecurity, cybersecurity, cybersecurity, cybersecurity
    Cybersecurity Threats | Malware Development | Ransomware Evolution

    The ScarCruft hacker group has initiated a new malware campaign that utilizes Rust programming language and the PubNub service.

  • black and gray computer motherboard
    Command and Control Techniques  | Cybersecurity Threats | Web Conferencing Exploits

    Recent “Ghost Calls” attacks exploit web conferencing tools for secret command and control operations.

  • Colorful software or web code on a computer monitor
    Cybersecurity Vulnerabilities  | Remote Code Execution | Video Surveillance Security 

    A total of 6,500 Axis servers are found to have the Remoting Protocol open, with 4,000 of them located in the United States susceptible to potential exploits.

  • background pattern
    Cross-Platform Vulnerabilities  | Malicious Software | Supply Chain Risks

    Malicious Go and npm packages are spreading cross-platform malware that can initiate remote data erasure.

  • ai generated, hacker, woman, hacktivist, internet, hoodie, cybersecurity, technology, gamer, gaming
    Critical Infrastructure Threats  | Cyber Warfare | State-Sponsored Cyberattacks

    IRGC-affiliated hacking groups are launching attacks on specific financial institutions, government entities, and media organizations.

  • laptop compute displaying command prompt
    Cybersecurity Threats | Global Espionage  | Malware Techniques 

    Advanced DevilsTongue Windows spyware monitors users around the world.

  • digital, binary code, abstract, background, matrix, display, technology, information, tech-savvy, computer, data, network, cyberspace, programming, coding, encryption, concept, cybersecurity, matrix background, digital matrix, binary digits, tech world, digital world, information age, ai generated, matrix, cybersecurity, cybersecurity, cybersecurity, cybersecurity, cybersecurity
    Cybersecurity Vulnerabilities  | Memory Corruption | Software Updates

    Weaknesses in Rockwell Arena Simulation allow attackers to run harmful code from a distance.

  • MacBook Pro on white surface
    Browser-Based Attacks | Cross-Platform Threats  | Malware Campaigns

    CAPTCHAgeddon – A New ClickFix Attack Uses Phony CAPTCHA to Distribute Malware

  • red and black laptop computer
    Cybersecurity | Remote Code Execution | Vulnerabilities

    Vulnerabilities in CyberArk Conjur have led to the exposure of sensitive enterprise information.

  • ai generated, cyber, digital, technology, network, internet, futuristic, hacker, security, cybersecurity, information, networking, innovation, communication, computer, data
    AI-Powered Investigations  | Cybersecurity | Identity Threat Protection

    SpyCloud Improves Its Investigations Solution by Incorporating AI-Driven Insights – Transforming the Analysis of Insider Threats and Cybercrime.

  • black and white road during night time
    Credential Harvesting  | Remote Access Tools  | Social Engineering

    Cybercriminals Employ Social Engineering Tactics to Secure Remote Access in 300 Seconds.

  • technology, background, desktop backgrounds, metaverse, 4k wallpaper 1920x1080, cybersecurity, cyber, wallpaper, beautiful wallpaper, abstract, circle, fiction, mac wallpaper, windows wallpaper, fantasy, computer, free wallpaper, wallpaper 4k, hd wallpaper, full hd wallpaper, free background, laptop wallpaper, internet, cool backgrounds, 4k wallpaper, digital, wallpaper hd, data
    Cybersecurity Vulnerability | Microsoft Exchange Server | Privilege Escalation 

    A newly discovered vulnerability in Microsoft Exchange Server allows attackers to acquire administrative privileges.

  • technology, big brother, protection, control, guard, digital, surveillance, security, spy, privacy, monitoring, observer, cyber, spying, cybersecurity, big brother, cybersecurity, cybersecurity, cybersecurity, cybersecurity, cybersecurity
    AI Security Risks  | Data Theft | Prompt Manipulation

    Leading enterprise AI assistants are susceptible to misuse, which could lead to data theft and manipulation.

  • black and red laptop keyboard
    Cloud Security | Cybersecurity Vulnerabilities  | Privilege Escalation Techniques 

    Scientists have discovered a vulnerability in ECScape related to Amazon ECS that allows for the theft of credentials across different tasks.

  • person holding black iphone 4
    Attack Techniques  | Ransomware Operations | Targeted Industries

    Akira and Lynx ransomware are targeting Managed Service Providers (MSPs) by exploiting stolen login credentials and existing vulnerabilities.

  • a satellite in orbit with the earth in the background
    Cybersecurity Threats | Malware Distribution Techniques  | Social Engineering Tactics

    Lazarus Hackers deceive users into thinking their camera or microphone is disabled in order to deploy the PyLangGhost RAT.

  • PC components sit on a cluttered desk.
    Ad Fraud  | Malicious Apps | Subscription Scams

    Fraudulent VPN and spam blocking applications associated with VexTrio are being utilized for advertisement deception and subscription scams.

  • cyber security, hacker, security, internet, protection, secure, padlock, firewall, protect, password, safety, lock, technology, computer, network, access, privacy, gray computer, gray technology, gray laptop, gray network, gray internet, gray security, gray safety, cybersecurity, cyber security, cyber security, cybersecurity, cybersecurity, cybersecurity, cybersecurity, cybersecurity
    Cybersecurity Threats | Data Breaches  | Social Engineering Tactics

    Google’s Salesforce accounts have been compromised in a continuing cyber attack, resulting in the theft of user information by hackers.

  • white and black building with glass walls
    Cybersecurity Vulnerabilities  | Software Patching  | Threat Actor Exploits

    Trend Micro has released patches for vulnerabilities in Apex One that were being exploited in the wild.

  • black computer keyboard on brown wooden desk
    Criminal Activity | Scam Prevention | Social Media Security 

    According to Meta, WhatsApp has removed 6.8 million accounts associated with criminal scam operations.

  • light decorations in dark area
    Advanced Persistent Threats  | Cybersecurity Threats | Malware Distribution Techniques 

    Mustang Panda is targeting Windows users with malware known as ToneShell, which disguises itself as Google Chrome.

  • technology, cyber, security, hacker, data, network, digital, secure, hacking, privacy, protection, spy, futuristic, crime, cybersecurity, cyber, hacker, hacker, hacking, cybersecurity, cybersecurity, cybersecurity, cybersecurity, cybersecurity
    AI Security Solutions  | Behavioral Fingerprinting | Intrusion Detection

    PLoB: A Framework for Behavioral Fingerprinting to Detect Malicious Login Attempts.

  • A close up of a computer with a fan and wires
    Cybersecurity Threats | Ethereum Scams | Smart Contract Obfuscation 

    Malicious actors exploit smart contracts to siphon over $900,000 from user cryptocurrency wallets.

  • person using macbook pro on white table
    AI-Enhanced Tactics | Government Impersonation  | Phishing Operations

    Threat actors are using Generative AI to carry out phishing attacks by impersonating government websites.

Page navigation

Previous PagePrevious 1 … 6 7 8 9 10 … 13 Next PageNext

© 2026 InfosecToday.com - WordPress Theme by Kadence WP

How cybersecure is your business? Take our free quiz and find out
Cyber risk scorecard
  • Cybersecurity News
  • Cybersecurity Articles
  • Cybersecurity Glossary
  • Contact
  • Login
Search