France Fines National Employment Agency €5m Over 2024 Data Breach Information Security Magazine 2 weeks 4 days ago The French data protection regulator said that France Travail’s response to a 2024 data breach violated GDPR
New CISA Guidance Targets Insider Threat Risks Information Security Magazine 2 weeks 4 days ago CISA urges action against insider threats with publication of a new infographic offering strategies to manage risks
FBI Takes Down RAMP Ransomware Forum Information Security Magazine 2 weeks 4 days ago The dark web forum administrator confirmed the takedown and said they had “no plans to rebuild”
Ransomware Victim Numbers Rise, Despite Drop in Active Extortion Groups Information Security Magazine 2 weeks 4 days ago Ransomware victims surged in Q4 2025 despite fewer active extortion groups, with data leaks rising 50%, ReliaQuest researchers report
US Data Breaches Hit Record High but Victim Numbers Decline Information Security Magazine 2 weeks 4 days ago Non-profit ITRC says the number of data breaches increased 5% annually to reach a record total in 2025
Number of Cybersecurity Pros Surges 194% in Four Years Information Security Magazine 2 weeks 4 days ago Cybersecurity is now the fifth fastest-growing occupation in the UK, says Socura
Cybersecurity Teams Embrace AI, Just Not at the Scale Marketing Suggests Information Security Magazine 2 weeks 4 days ago Despite the seemingly widespread adoption of AI for security operations, security leaders primarily use it for “relatively basic use cases,” said a Sumo Logic study
Autonomous System Uncovers Long-Standing OpenSSL Flaws Information Security Magazine 2 weeks 5 days ago A recent update has fixed 12 vulnerabilities in OpenSSL, some existing in the codebase for years
Critical and High Severity n8n Sandbox Flaws Allow RCE Information Security Magazine 2 weeks 5 days ago Two critical security flaws in n8n have exposed sandboxing vulnerabilities, enabling remote code execution for attackers
Emojis in PureRAT’s Code Point to AI-Generated Malware Campaign Information Security Magazine 2 weeks 5 days ago Researchers discover that PureRAT’s code now contains emojis – indicating it has been written by AI based-on comments ripped from social media.
AI Security Threats Loom as Enterprise Usage Jumps 91% Information Security Magazine 2 weeks 5 days ago Zscaler analysts found critical vulnerabilities in 100% of enterprise AI systems, with 90% compromised in under 90 minutes
Researchers Uncover 454,000+ Malicious Open Source Packages Information Security Magazine 2 weeks 5 days ago Sonatype warns that open source threats became industrialized with a surge in malicious packages in 2025
Chinese Money Launderers Drive Global Ecosystem Worth $82bn Information Security Magazine 2 weeks 5 days ago Chainalysis claims Chinese money launderers now account for 20% of global activity
Pyodide Sandbox Escape Enables Remote Code Execution in Grist-Core Information Security Magazine 2 weeks 6 days ago Critical sandbox escape vulnerability in Grist-Core enables remote code execution via a malicious formula
PeckBirdy Framework Tied to China-Aligned Cyber Campaigns Information Security Magazine 2 weeks 6 days ago PeckBirdy command-and-control framework targeting gambling, government sectors in Asia since 2023 has been linked to China-aligned APTs
Over 80% of Ethical Hackers Now Use AI Information Security Magazine 2 weeks 6 days ago Bugcrowd study reveals 82% of security researchers now use AI, a big increase from 2023 figures
Microsoft Releases Patch for Office Zero Day Amid Evidence of Exploitation Information Security Magazine 2 weeks 6 days ago Microsoft urged customers running Microsoft Office 2016 and 2019 to apply the patch to be protected
World Leaks Ransomware Group Claims 1.4TB Nike Data Breach Information Security Magazine 2 weeks 6 days ago Nike is investigating after the World Leaks ransomware group posted a 1.4TB data dump
eScan Antivirus Supply Chain Breach Delivers Signed Malware Information Security Magazine 3 weeks ago Supply chain breach in eScan antivirus distributes multi-stage malware via legitimate updates
CISA Releases List of Post-Quantum Cryptography Product Categories Information Security Magazine 3 weeks ago CISA released initial list of PQC-capable hardware and software to guide companies amid quantum threats