New 'Storm' Infostealer Remotely Decrypts Stolen Credentials Information Security Magazine 1 day 5 hours ago This modern infostealer adopted server-side decryption of stolen credentials to bypass security controls
NCSC Issues Security Alert Over Hackers Targeting WhatsApp and Signal Accounts Information Security Magazine 1 day 6 hours ago The UK’s cybersecurity agency offered advice to “high-risk’ individuals” on how to protect against social engineering and cyber-attacks
Apple Expands iOS 18 Security Updates Amid DarkSword Threat Information Security Magazine 1 day 7 hours ago iOS/iPadOS 18.7.7 updates expanded to protect older devices from DarkSword web exploit kit
GitHub Used as Covert Channel in Multi-Stage Malware Campaign Information Security Magazine 1 day 7 hours ago LNK files use GitHub C2, embedded decoders and PowerShell for persistence and data exfiltration
Researchers Observe Sub-One-Hour Ransomware Attacks Information Security Magazine 1 day 7 hours ago Halcyon says Akira is now capable of carrying out an entire ransomware attack in less than an hour
Most CNI Firms Face Up to £5m in Downtime from OT Attacks Information Security Magazine 1 day 12 hours ago E2e-assure says 80% of critical infrastructure providers could face millions in downtime from cyber-attacks
Google Introduces Android Dev Verification Amid Openness Debate Information Security Magazine 2 days 5 hours ago Android requires dev identity verification for sideloaded apps; phased global rollout from September
New Venom Stealer MaaS Platform Automates Continuous Data Theft Information Security Magazine 2 days 7 hours ago Venom Stealer malware-as-a-service automates ClickFix social engineering, credential and crypto exfiltration
Chinese Hackers Target European Governments in Espionage Campaigns Information Security Magazine 2 days 8 hours ago Chinese state-backed group TA416 had suspended its cyber espionage operations in Europe since 2023, noted Proofpoint
Eight in 10 UK Manufacturers Hit by Cyber Incident in a Year Information Security Magazine 2 days 11 hours ago Most UK manufacturers compromised last year suffered financial loss, says ESET
Hackers Hijack Axios npm Package to Spread RATs Information Security Magazine 2 days 11 hours ago Threat actors hijacked the popular npm package axios to spread RAT malware after compromising an open‑source maintainer’s account, researchers warn
Maryland Man Charged Over $53m Uranium Finance Crypto Hack Information Security Magazine 3 days 5 hours ago Maryland man accused of $53m Uranium Finance hack, exploited smart contract flaws, laundered funds
Phantom Project Bundles Infostealer, Crypter and RAT For Sale Information Security Magazine 3 days 6 hours ago Phantom Stealer .NET harvests browser credentials, cookies, cards, sessions, as stealer-as-a-service
ChatGPT Security Issue Enabled Data Theft via Single Prompt Information Security Magazine 3 days 7 hours ago OpenAI has patched vulnerability, which Check Point said was because of a DNS loophole
TeamPCP Explores Ways to Exploit Stolen Supply Chain Secrets Information Security Magazine 3 days 8 hours ago TeamPCP is exploring ways to monetize the secrets harvested during supply chain attacks, with identified ties to the Lapsus$ and Vect ransomware gangs
Employee Data Breaches Surge to Seven-Year High Information Security Magazine 3 days 10 hours ago Analysis from law firm Nockolds suggests non-cyber incidents are driving up employee data breaches
NCSC Urges Immediate Patching of F5 BIG-IP Bug Information Security Magazine 3 days 12 hours ago The National Cyber Security Centre wants UK firms to patch CVE-2025-53521
Cybercriminals Exploit Tax Season With New Phishing Tactics Information Security Magazine 4 days 5 hours ago Tax-season phishing floods deliver RMM malware, credential theft, BEC and tax-form scams
Lloyds IT Glitch Exposed Data of Nearly 500,000 Banking Customers Information Security Magazine 4 days 6 hours ago Lloyds app glitch exposed up to 447,936 customers’ transactions and personal data during update
DeepLoad Malware Combines ClickFix With AI-Generated Code to Avoid Detection Information Security Magazine 4 days 8 hours ago Researchers at ReliaQuest warn of persistent malware campaign targeting enterprise credentials