#Infosec2025 Cloud-Native Technology Prompts New Security Approaches Information Security Magazine 2 months 1 week ago Moving to cloud-native architecture and modern platforms is allowing enterprises to automate operations and improve security
#Infosec2025: Cybersecurity Support Networks Too Fragmented for SMBs, Say Experts Information Security Magazine 2 months 1 week ago Experts argue the case for “communities of support” to boost SMB cyber-resilience
#Infosec2025: Simplicity Should Guide Cybersecurity Purchasing Decisions Information Security Magazine 2 months 1 week ago Experts argue that CISOs should avoid product duplication and simplify their language to ensure budget is spent wisely
#Infosec2025: Concern Grows Over Agentic AI Security Risks Information Security Magazine 2 months 1 week ago Agentic AI systems could threaten security and data privacy, unless organizations test each model and component
#Infosec2025: UK Retail Hack Was 'Subtle, Not Complex,' Says River Island CISO Information Security Magazine 2 months 1 week ago The attacks on UK retailers are “a wake-up call” for the industry, said River Island’s Information Security Officer
Phishing Campaign Uses Fake Booking.com Emails to Deliver Malware Information Security Magazine 2 months 1 week ago A phishing campaign spoofing Booking.com has been observed targeting hospitality sector, using ClickFix to install malware
Widespread Campaign Targets Cybercriminals and Gamers Information Security Magazine 2 months 1 week ago Sophos has uncovered a scheme planting malicious code in 130+ GitHub repositories, targeting hackers and gamers
#Infosec2025: Device Theft Causes More Data Loss Than Ransomware Information Security Magazine 2 months 1 week ago Stolen devices are a bigger cause of data loss than stolen credentials or ransomware, according to a new Blancco study
#Infosec2025: Startups Focus on Visibility and Governance, not AI Information Security Magazine 2 months 1 week ago Startups at Infosecurity Europe focus on attack surface management and improving security data, even as some new vendors avoid AI-led marketing
#Infosec2025: Majority of Compromises Caused by Stolen Credentials, No MFA Information Security Magazine 2 months 1 week ago Rapid7 found that 56% of all compromises in Q1 2025 resulted from the theft of valid account credentials with no MFA in place
#Infosec2025: Channel Bridges Security Skills Gap Information Security Magazine 2 months 1 week ago Resellers and channel partners can add value, fill gaps in security teams and offer expertise in niche markets
#Infosec2025: Good Cybersecurity Enabled Ukraine’s Surprise Attack on Russia, Says NCSC Information Security Magazine 2 months 1 week ago Effective cybersecurity played a key role Ukraine drone attack on Russian strategic bombers, a leading government security expert has claimed
Trump Budget Plan to Cut Nearly 1000 Jobs at Cyber Agency CISA Information Security Magazine 2 months 1 week ago CISA is facing $495m budget cut, losing 1000 employees and reducing staff to 2324
#Infosec2025: Demand More of Your Vendors to Ease Quantum Transition, Say Experts Information Security Magazine 2 months 1 week ago CISOs should demand more of their vendors and use regulation as an ally to persuade board members to accelerate the transition to post-quantum safety
Fake Docusign Pages Deliver Multi-Stage NetSupport RAT Malware Information Security Magazine 2 months 1 week ago Malware campaign used fake DocuSign pages to deploy NetSupport RAT through clipboard manipulation
#Infosec2025: VEC Attacks Alarmingly Effective at Driving Engagement Information Security Magazine 2 months 1 week ago Abnormal AI found that engagement rates with VEC attacks globally is “worrisomely high”, overtaking BEC in the EMEA region
#Infosec2025: Half of Firms Suffer Two Supply Chain Incidents in Past Year Information Security Magazine 2 months 1 week ago Risk Ledger found that 90% of UK professionals view supply chain cyber incidents as a top concern for 2025
New Linux Vulnerabilities Expose Password Hashes via Core Dumps Information Security Magazine 2 months 1 week ago Two local information disclosure flaws in Linux crash-reporting tools have been identified exposing system data to attackers
Sophisticated Malware Campaign Targets Windows and Linux Systems Information Security Magazine 2 months 1 week ago A new malware campaign targeting Windows and Linux systems has been identified, deploying tools for evasion and credential theft
Cryptojacking Campaign Targets DevOps Servers Including Nomad Information Security Magazine 2 months 1 week ago Wiz finds new threat group running cryptojacking campaign via exploited and misconfigured DevOps assets