GrafanaGhost Exploit Bypasses AI Guardrails for Silent Data Exfiltration Information Security Magazine 1 month 2 weeks ago GrafanaGhost chains AI prompt injection and URL flaws to exfiltrate sensitive Grafana data
Over $17bn Lost to Cyber Fraud in the Last Year, Warns FBI Information Security Magazine 1 month 2 weeks ago Cryptocurrency scams alone cost victims over $7 billion, while AI-enabled fraud threats are on the rise, says FBI
Storm-1175 Exploits Flaws in High-Velocity Medusa Attacks Information Security Magazine 1 month 2 weeks ago Microsoft has released a new report about the Storm-1175 group and its connection to Medusa ransomware
Fortinet Releases Emergency Patch After FortiClient EMS Bug Is Exploited Information Security Magazine 1 month 2 weeks ago Fortinet has updated its FortiClient EMS product after zero-day attacks surfaced
New Phishing Platform Used in Credential Theft Campaigns Against C-Suite Execs Information Security Magazine 1 month 2 weeks ago A large-scale credential theft campaign targeting senior executives has been linked to a previously unknown automated phishing platform called Venom
New 'Storm' Infostealer Remotely Decrypts Stolen Credentials Information Security Magazine 1 month 2 weeks ago This modern infostealer adopted server-side decryption of stolen credentials to bypass security controls
NCSC Issues Security Alert Over Hackers Targeting WhatsApp and Signal Accounts Information Security Magazine 1 month 2 weeks ago The UK’s cybersecurity agency offered advice to “high-risk’ individuals” on how to protect against social engineering and cyber-attacks
Apple Expands iOS 18 Security Updates Amid DarkSword Threat Information Security Magazine 1 month 2 weeks ago iOS/iPadOS 18.7.7 updates expanded to protect older devices from DarkSword web exploit kit
GitHub Used as Covert Channel in Multi-Stage Malware Campaign Information Security Magazine 1 month 2 weeks ago LNK files use GitHub C2, embedded decoders and PowerShell for persistence and data exfiltration
Researchers Observe Sub-One-Hour Ransomware Attacks Information Security Magazine 1 month 2 weeks ago Halcyon says Akira is now capable of carrying out an entire ransomware attack in less than an hour
Most CNI Firms Face Up to £5m in Downtime from OT Attacks Information Security Magazine 1 month 2 weeks ago E2e-assure says 80% of critical infrastructure providers could face millions in downtime from cyber-attacks
Google Introduces Android Dev Verification Amid Openness Debate Information Security Magazine 1 month 2 weeks ago Android requires dev identity verification for sideloaded apps; phased global rollout from September
New Venom Stealer MaaS Platform Automates Continuous Data Theft Information Security Magazine 1 month 2 weeks ago Venom Stealer malware-as-a-service automates ClickFix social engineering, credential and crypto exfiltration
Chinese Hackers Target European Governments in Espionage Campaigns Information Security Magazine 1 month 2 weeks ago Chinese state-backed group TA416 had suspended its cyber espionage operations in Europe since 2023, noted Proofpoint
Eight in 10 UK Manufacturers Hit by Cyber Incident in a Year Information Security Magazine 1 month 2 weeks ago Most UK manufacturers compromised last year suffered financial loss, says ESET
Hackers Hijack Axios npm Package to Spread RATs Information Security Magazine 1 month 2 weeks ago Threat actors hijacked the popular npm package axios to spread RAT malware after compromising an open‑source maintainer’s account, researchers warn
Maryland Man Charged Over $53m Uranium Finance Crypto Hack Information Security Magazine 1 month 3 weeks ago Maryland man accused of $53m Uranium Finance hack, exploited smart contract flaws, laundered funds
Phantom Project Bundles Infostealer, Crypter and RAT For Sale Information Security Magazine 1 month 3 weeks ago Phantom Stealer .NET harvests browser credentials, cookies, cards, sessions, as stealer-as-a-service
ChatGPT Security Issue Enabled Data Theft via Single Prompt Information Security Magazine 1 month 3 weeks ago OpenAI has patched vulnerability, which Check Point said was because of a DNS loophole
TeamPCP Explores Ways to Exploit Stolen Supply Chain Secrets Information Security Magazine 1 month 3 weeks ago TeamPCP is exploring ways to monetize the secrets harvested during supply chain attacks, with identified ties to the Lapsus$ and Vect ransomware gangs