Nation-State Hackers Embrace Gemini AI for Malicious Campaigns, Google Finds Information Security Magazine 1 month 2 weeks ago Google researchers found that government-backed hackers now use AI throughout the whole attack lifecycle
AI Skills Represent Dangerous New Attack Surface, Says TrendAI Information Security Magazine 1 month 2 weeks ago New TrendAI report warns that most security tools can’t protect against attacks on AI skills artifacts
Time to Exploit Plummets as N-Day Flaws Dominate Information Security Magazine 1 month 2 weeks ago Flashpoint warns of a dramatic drop in the average time between vulnerability disclosure and exploitation
North Korean Hackers Use Deepfake Video Calls to Target Crypto Firms Information Security Magazine 1 month 2 weeks ago Campaign combines stolen Telegram accounts, fake Zoom calls and ClickFix attacks to deploy infostealer malware
US Court Hands Crypto Scammer 20 Years in $73m Case Information Security Magazine 1 month 2 weeks ago A federal court has sentenced crypto-scammer Daren Li to 20 years in absentia
FIRST Forecasts Record-Breaking 50,000+ CVEs in 2026 Information Security Magazine 1 month 2 weeks ago This year should break all the records in terms of vulnerability disclosed, reaching or even surpassing 50,000 new CVEs disclosed
Microsoft Fixes Six Zero Day Vulnerability in February Patch Tuesday Information Security Magazine 1 month 2 weeks ago Six actively exploited zero-day bug have been patched by Microsoft
Phorpiex Phishing Delivers Low-Noise Global Group Ransomware Information Security Magazine 1 month 2 weeks ago High-volume phishing campaign delivers Phorpiex malware via malicious Windows Shortcut files
New Mobile Spyware ZeroDayRAT Targets Android and iOS Information Security Magazine 1 month 2 weeks ago ZeroDayRAT is a new mobile spyware targeting Android and iOS, offering attackers persistent access
“Digital Parasite” Warning as Attackers Favor Stealth for Extortion Information Security Magazine 1 month 2 weeks ago Picus Security warns of the increasingly sophisticated ways malicious activity is staying hidden
Singapore Takes Down Chinese Hackers Targeting Telco Networks Information Security Magazine 1 month 2 weeks ago Operation Cyber Guardian was Singapore’s largest and longest running anti-cyber threat law enforcement operation
NCSC Issues Warning Over “Severe” Cyber-Attacks Targeting Critical National Infrastructure Information Security Magazine 1 month 2 weeks ago NCSC call firms to ‘act now’ following disruptive malware attacks targeting Polish energy providers
European Governments Breached in Zero-Day Attacks Targeting Ivanti Information Security Magazine 1 month 3 weeks ago The European Commission and government agencies in Finland and the Netherlands have suffered potentially related breaches
New Zero-Click Flaw in Claude Desktop Extensions, Anthropic Declines Fix Information Security Magazine 1 month 3 weeks ago Security researchers from LayerX identified a new flaw in 50 Claude Desktop Extensions that could lead to unauthorized remote code execution
Two Connecticut Men Charged In Alleged $3m Gambling Fraud Scheme Information Security Magazine 1 month 3 weeks ago Two Connecticut men face federal charges for a $3m scheme targeting online gambling platforms
VoidLink Malware Exhibits Multi-Cloud Capabilities and AI Code Information Security Magazine 1 month 3 weeks ago VoidLink, a Linux-based C2 framework, facilitates credential theft, data exfiltration across clouds
BridgePay Confirms Ransomware Attack, No Card Data Compromised Information Security Magazine 1 month 3 weeks ago The services of Florida-based payments platform BridgePay are offline due to a ransomware attack
Social Media Platforms Earn Billions from Scam Ads Information Security Magazine 1 month 3 weeks ago Revolut claims social media sites make £3.8bn annually from scam ads targeting European users
Researchers Find 40,000+ Exposed OpenClaw Instances Information Security Magazine 1 month 3 weeks ago SecurityScorecard has identified over 40,000 OpenClaw deployments exposed to potential attack
US Agencies Told to Scrap End of Support Edge Devices Information Security Magazine 1 month 3 weeks ago CISA has issued a new directive requiring federal agencies to decommission all end of support edge devices within 12 months to reduce ongoing exploitation risks