What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
InfoSecurityMag.webp 2025-01-17 12:05:00 Star Blizzard Targets WhatsApp in New Campaign (lien direct) Microsoft highlighted a new Star Blizzard campaign targeting WhatsApp accounts, as the group adapts its TTPs following the takedown of its infrastructure by law enforcement
Microsoft highlighted a new Star Blizzard campaign targeting WhatsApp accounts, as the group adapts its TTPs following the takedown of its infrastructure by law enforcement
Legislation ★★★
InfoSecurityMag.webp 2025-01-17 11:00:00 Noyb Files GDPR Complaints Against TikTok and Five Chinese Tech Giants (lien direct) AliExpress, Shein, Temu, TikTok, WeChat and Xiaomi are accused of operating unlawful data transfers to China
AliExpress, Shein, Temu, TikTok, WeChat and Xiaomi are accused of operating unlawful data transfers to China
★★★
InfoSecurityMag.webp 2025-01-17 09:35:00 DORA Takes Effect: Financial Firms Still Navigating Compliance Headwinds (lien direct) The EU\'s DORA regulation is in effect as of January 17, with mixed evidence around compliance levels among financial firms
The EU\'s DORA regulation is in effect as of January 17, with mixed evidence around compliance levels among financial firms
★★★
InfoSecurityMag.webp 2025-01-16 17:45:00 Middle Eastern Real Estate Fraud Grows with Online Listings (lien direct) Middle East real estate scams are surging as fraudsters exploit online listings and bypassed due diligence checks
Middle East real estate scams are surging as fraudsters exploit online listings and bypassed due diligence checks
Threat ★★
InfoSecurityMag.webp 2025-01-16 17:00:00 Trump\\'s Truth Social Users Targeted by Rampant Scams Online (lien direct) Truth Social, launched by the Trump Media & Technology Group in 2022, has become a hotspot for scams like phishing and investment fraud
Truth Social, launched by the Trump Media & Technology Group in 2022, has become a hotspot for scams like phishing and investment fraud
★★★
InfoSecurityMag.webp 2025-01-16 16:14:00 Biden Tightens Software Supply Chain Security Requirements Ahead of Trump Takeover (lien direct) The US President\'s second cybersecurity Executive Order will impose stricter security standards on software providers
The US President\'s second cybersecurity Executive Order will impose stricter security standards on software providers
★★
InfoSecurityMag.webp 2025-01-16 14:45:00 DORA Compliance Costs Soar Past €1m for Many UK and EU Businesses (lien direct) Compliance with the Digital Operational Resilience Act (DORA) has cost many businesses over €1 million, according to research from Rubrik
Compliance with the Digital Operational Resilience Act (DORA) has cost many businesses over €1 million, according to research from Rubrik
★★
InfoSecurityMag.webp 2025-01-16 12:50:00 New Hacking Group Leaks Configuration of 15,000 Fortinet Firewalls (lien direct) The leak likely comes from a zero-day exploit affecting Fortinet\'s products
The leak likely comes from a zero-day exploit affecting Fortinet\'s products
Vulnerability Threat ★★
InfoSecurityMag.webp 2025-01-16 12:05:00 GoDaddy Accused of Serious Security Failings by FTC (lien direct) A proposed settlement order from the FTC will require GoDaddy to strengthen its security practices following multiple data breaches at the web hosting giant
A proposed settlement order from the FTC will require GoDaddy to strengthen its security practices following multiple data breaches at the web hosting giant
★★★
InfoSecurityMag.webp 2025-01-16 09:01:00 Hackers Use Image-Based Malware and GenAI to Evade Email Security (lien direct) HP Wolf highlighted novel techniques used by attackers to bypass email protections, including embedding malicious code inside images and utilizing GenAI
HP Wolf highlighted novel techniques used by attackers to bypass email protections, including embedding malicious code inside images and utilizing GenAI
Malware ★★★
InfoSecurityMag.webp 2025-01-16 08:30:00 EU To Launch New Support Centre by 2026 to Boost Healthcare Cybersecurity (lien direct) A new EU action plan will be structured around four pillars: prevention, threat detection and identification, response to cyber-attacks and deterrence
A new EU action plan will be structured around four pillars: prevention, threat detection and identification, response to cyber-attacks and deterrence
Threat Medical ★★★
InfoSecurityMag.webp 2025-01-15 16:30:00 CISA Launches Playbook to Boost AI Cybersecurity Collaboration (lien direct) CISA launched the JCDC AI Cybersecurity Playbook to enhance collaboration on AI cybersecurity risks
CISA launched the JCDC AI Cybersecurity Playbook to enhance collaboration on AI cybersecurity risks
★★
InfoSecurityMag.webp 2025-01-15 14:00:00 Multi-Cloud Adoption Surges Amid Rising Security Concerns (lien direct) A new report from Fortinet reveals increased adoption of multi-cloud strategies and hybrid implementations combining on-premises and public cloud infrastructure
A new report from Fortinet reveals increased adoption of multi-cloud strategies and hybrid implementations combining on-premises and public cloud infrastructure
Cloud ★★
InfoSecurityMag.webp 2025-01-15 14:00:00 Chinese PlugX Malware Deleted in Global Law Enforcement Operation (lien direct) The FBI deleted Chinese PlugX malware from thousands of devices in the US, using a technique developed by French cybersecurity firm Sekoia.io
The FBI deleted Chinese PlugX malware from thousands of devices in the US, using a technique developed by French cybersecurity firm Sekoia.io
Malware Legislation ★★★
InfoSecurityMag.webp 2025-01-15 13:00:00 Illicit Crypto-Inflows Set to Top $51bn in a Year (lien direct) Chainalysis estimates threat actors made at least $51bn through crypto crime in 2024
Chainalysis estimates threat actors made at least $51bn through crypto crime in 2024
Threat ★★★
InfoSecurityMag.webp 2025-01-15 12:00:00 Fortinet Confirms Critical Zero-Day Vulnerability in Firewalls (lien direct) The security provider published mitigation measures to prevent exploitation
The security provider published mitigation measures to prevent exploitation
Vulnerability Threat ★★★
InfoSecurityMag.webp 2025-01-15 11:20:00 Secureworks Exposes North Korean Links to Fraudulent Crowdfunding (lien direct) Secureworks Counter Threat Unit (CTU) has identified links between North Korean IT workers and fraudulent crowdfunding activities, with the group known as Nickle Tapestry orchestrating scams to support North Korean interests
Secureworks Counter Threat Unit (CTU) has identified links between North Korean IT workers and fraudulent crowdfunding activities, with the group known as Nickle Tapestry orchestrating scams to support North Korean interests
Threat ★★★
InfoSecurityMag.webp 2025-01-15 10:00:00 Microsoft Patches Eight Zero-Days to Start the Year (lien direct) Patch Tuesday saw Microsoft fix eight zero-days, three of which are being actively exploited
Patch Tuesday saw Microsoft fix eight zero-days, three of which are being actively exploited
★★★
InfoSecurityMag.webp 2025-01-14 16:30:00 New AI Rule Aims to Prevent Misuse of US Technology (lien direct) A new Interim Final Rule on Artificial Intelligence Diffusion issued in the US strengthens security, streamlines chip sales and prevents misuse of AI technology
A new Interim Final Rule on Artificial Intelligence Diffusion issued in the US strengthens security, streamlines chip sales and prevents misuse of AI technology
★★★
InfoSecurityMag.webp 2025-01-14 15:00:00 Browser-Based Cyber-Threats Surge as Email Malware Declines (lien direct) Browser-based cyber-threats surged in 2024, with credential abuse and infostealers on the rise
Browser-based cyber-threats surged in 2024, with credential abuse and infostealers on the rise
Malware ★★★
InfoSecurityMag.webp 2025-01-14 12:30:00 Manchester Law Firm Leads 15,000 to Sue Google and Microsoft over AI Data (lien direct) Barings Law is planning to sue the two tech giants over numerous alleged violations of data misuse, including for AI training
Barings Law is planning to sue the two tech giants over numerous alleged violations of data misuse, including for AI training
★★★
InfoSecurityMag.webp 2025-01-14 11:30:00 UK Considers Ban on Ransomware Payments by Public Bodies (lien direct) A UK government consultation has proposed banning public sector and critical infrastructure organizations from making ransomware payments to disincentivize attackers from targeting these services
A UK government consultation has proposed banning public sector and critical infrastructure organizations from making ransomware payments to disincentivize attackers from targeting these services
Ransomware ★★★
InfoSecurityMag.webp 2025-01-14 10:15:00 Remediation Times Drop Sharply as Cyber Hygiene Take Up Surges (lien direct) CISA claims US critical infrastructure providers are improving cyber hygiene and remediation activities
CISA claims US critical infrastructure providers are improving cyber hygiene and remediation activities
★★★
InfoSecurityMag.webp 2025-01-14 09:45:00 UK Registry Nominet Breached Via Ivanti Zero-Day (lien direct) The .uk registry Nominet has been breached by a recently disclosed zero-day vulnerability in Ivanti products
The .uk registry Nominet has been breached by a recently disclosed zero-day vulnerability in Ivanti products
Vulnerability Threat ★★★
InfoSecurityMag.webp 2025-01-14 09:12:00 Critical Infrastructure Urged to Scrutinize Product Security During Procurement (lien direct) A joint government advisory has set out steps critical infrastructure firms should take to ensure any OT products they purchase are secure by design
A joint government advisory has set out steps critical infrastructure firms should take to ensure any OT products they purchase are secure by design
Industrial ★★★
InfoSecurityMag.webp 2025-01-13 16:30:00 Russian Malware Campaign Hits Central Asian Diplomatic Files (lien direct) Diplomatic entities in Kazakhstan and Central Asia have been targeted by UAC-0063 using weaponized Word docs deploying HATVIBE malware
Diplomatic entities in Kazakhstan and Central Asia have been targeted by UAC-0063 using weaponized Word docs deploying HATVIBE malware
Malware ★★★
InfoSecurityMag.webp 2025-01-13 14:15:00 Microsoft 365 MFA Outage Fixed (lien direct) Microsoft confirmed an outage of its multi-factor authentication system impacting access to Microsoft 365, causing login failures and service disruption
Microsoft confirmed an outage of its multi-factor authentication system impacting access to Microsoft 365, causing login failures and service disruption
★★★
InfoSecurityMag.webp 2025-01-13 13:00:00 New Ransomware Group Uses AI to Develop Nefarious Tools (lien direct) Researchers at Check Point said FunkSec operators appear to use AI for malware development
Researchers at Check Point said FunkSec operators appear to use AI for malware development
Ransomware Malware Tool ★★★
InfoSecurityMag.webp 2025-01-13 12:00:00 WEF Warns of Growing Cyber Inequity Amid Escalating Complexities in Cyberspace (lien direct) A new WEF report highlighted growing disparities in the cyber capabilities of different types of organizations and regions
A new WEF report highlighted growing disparities in the cyber capabilities of different types of organizations and regions
★★★
InfoSecurityMag.webp 2025-01-13 10:45:00 Three Russians Charged with Crypto Mixer Money Laundering (lien direct) Three Russian men have been indicted on money laundering charges connected to cryptocurrency mixers
Three Russian men have been indicted on money laundering charges connected to cryptocurrency mixers
★★★
InfoSecurityMag.webp 2025-01-13 10:00:00 Telefonica Breach Hits 20,000 Employees and Exposes Jira Details (lien direct) Telefonica has confirmed a breach of its internal ticketing system exposing more than 236,000 lines of customer data
Telefonica has confirmed a breach of its internal ticketing system exposing more than 236,000 lines of customer data
★★★
InfoSecurityMag.webp 2025-01-10 15:30:00 Cybercriminals Use Fake CrowdStrike Job Offers to Distribute Cryptominer (lien direct) CrowdStrike warned it had observed a phishing campaign impersonating the firm\'s recruitment process to lure victims into downloading cryptominer
CrowdStrike warned it had observed a phishing campaign impersonating the firm\'s recruitment process to lure victims into downloading cryptominer
★★
InfoSecurityMag.webp 2025-01-10 14:45:00 Slovakia Hit by Historic Cyber-Attack on Land Registry (lien direct) A large-scale cyber-attack has targeted the information system of Slovakia\'s land registry, impacting the management of land and property records
A large-scale cyber-attack has targeted the information system of Slovakia\'s land registry, impacting the management of land and property records
★★★
InfoSecurityMag.webp 2025-01-10 10:25:00 Medusind Breach Exposes Sensitive Patient Data (lien direct) The US medical billing firm is notifying over 360,000 customers that their personal, financial and medical data may have been exposed
The US medical billing firm is notifying over 360,000 customers that their personal, financial and medical data may have been exposed
Medical ★★★
InfoSecurityMag.webp 2025-01-10 09:15:00 Fake PoC Exploit Targets Security Researchers with Infostealer (lien direct) Trend Micro detailed how attackers are using a fake proof-of-concept for a critical Microsoft vulnerability, designed to steal sensitive data from security researchers
Trend Micro detailed how attackers are using a fake proof-of-concept for a critical Microsoft vulnerability, designed to steal sensitive data from security researchers
Vulnerability Threat Prediction ★★★
InfoSecurityMag.webp 2025-01-09 17:15:00 Fancy Product Designer Plugin Flaws Expose WordPress Sites (lien direct) Critical Fancy Product Designer plugin flaws risk remote code execution and SQL injection attacks on WordPress sites
Critical Fancy Product Designer plugin flaws risk remote code execution and SQL injection attacks on WordPress sites
★★★
InfoSecurityMag.webp 2025-01-09 16:30:00 Japan Faces Prolonged Cyber-Attacks Linked to China\\'s MirrorFace (lien direct) Cyber-attacks by China-linked MirrorFace targeted Japan\'s national security information in major campaigns operating since 2019
Cyber-attacks by China-linked MirrorFace targeted Japan\'s national security information in major campaigns operating since 2019
★★★
InfoSecurityMag.webp 2025-01-09 16:00:00 PowerSchool Reportedly Pays Ransom to Prevent Student Data Leak (lien direct) A school district said that PowerSchool paid a ransom to prevent the attackers releasing data it accessed of students and teachers in North America
A school district said that PowerSchool paid a ransom to prevent the attackers releasing data it accessed of students and teachers in North America
★★★
InfoSecurityMag.webp 2025-01-09 11:30:00 EU Commission Liable for Breaching EU\\'s Own Data Protection Rules (lien direct) A court has ruled the EU Commission infringed an individual\'s right to the protection of their personal data by transferring their details to the US
A court has ruled the EU Commission infringed an individual\'s right to the protection of their personal data by transferring their details to the US
★★★
InfoSecurityMag.webp 2025-01-09 10:30:00 Government Launches £1.9m Initiative to Boost UK\\'s Cyber Resilience (lien direct) The UK government has pledged nearly £2m to 30 new Cyber Local projects designed to enhance cyber resilience
The UK government has pledged nearly £2m to 30 new Cyber Local projects designed to enhance cyber resilience
★★★
InfoSecurityMag.webp 2025-01-09 09:45:00 Critical Ivanti Zero-Day Exploited in the Wild (lien direct) Ivanti customers are urged to patch two new bugs in the security vendor\'s products, one of which is being actively exploited
Ivanti customers are urged to patch two new bugs in the security vendor\'s products, one of which is being actively exploited
Vulnerability Threat ★★★
InfoSecurityMag.webp 2025-01-08 16:30:00 Green Bay Packers Pro Shop Data Breach Compromises Customers (lien direct) The Green Bay Packers disclosed on Monday that their official online store was breached and customer information stolen
The Green Bay Packers disclosed on Monday that their official online store was breached and customer information stolen
Data Breach ★★★
InfoSecurityMag.webp 2025-01-08 15:20:00 US Launches Cyber Trust Mark for IoT Devices (lien direct) The voluntary Cyber Trust Mark labeling program will allow consumers to assess the cybersecurity of IoT devices when making purchasing decisions
The voluntary Cyber Trust Mark labeling program will allow consumers to assess the cybersecurity of IoT devices when making purchasing decisions
★★★
InfoSecurityMag.webp 2025-01-08 14:00:00 Scammers Exploit Microsoft 365 to Target PayPal Users (lien direct) A new PayPal phishing scam used genuine money requests, bypassing security checks to deceive recipients
A new PayPal phishing scam used genuine money requests, bypassing security checks to deceive recipients
Threat ★★★
InfoSecurityMag.webp 2025-01-08 11:30:00 Casio Admits Security Failings as Attackers Leak Employee and Customer Data (lien direct) Electronics firm Casio revealed that ransomware attackers have leaked the personal data of employees, customers and business partners
Electronics firm Casio revealed that ransomware attackers have leaked the personal data of employees, customers and business partners
Ransomware ★★
InfoSecurityMag.webp 2025-01-08 10:45:00 New Mirai Botnet Exploits Zero-Days in Routers and Smart Devices (lien direct) A newly identified Mirai botnet exploits over 20 vulnerabilities, including zero-days, in industrial routers and smart home devices
A newly identified Mirai botnet exploits over 20 vulnerabilities, including zero-days, in industrial routers and smart home devices
Vulnerability Industrial ★★
InfoSecurityMag.webp 2025-01-08 09:45:00 Fake Government Officials Use Remote Access Tools for Card Fraud (lien direct) Group-IB has observed scammers impersonating government officials to trick disaffected consumers into divulging card details
Group-IB has observed scammers impersonating government officials to trick disaffected consumers into divulging card details
Tool ★★
InfoSecurityMag.webp 2025-01-07 17:15:00 New Research Highlights Vulnerabilities in MLOps Platforms (lien direct) New research by Security Intelligence has revealed security risks in MLOps platforms including Azure ML, BigML and Google Vertex AI
New research by Security Intelligence has revealed security risks in MLOps platforms including Azure ML, BigML and Google Vertex AI
Vulnerability ★★
InfoSecurityMag.webp 2025-01-07 16:30:00 Moxa Urges Immediate Updates for Security Vulnerabilities (lien direct) Moxa has reported two critical vulnerabilities in its routers and network security appliances that could allow system compromise and arbitrary code execution
Moxa has reported two critical vulnerabilities in its routers and network security appliances that could allow system compromise and arbitrary code execution
Vulnerability ★★★
InfoSecurityMag.webp 2025-01-07 12:00:00 Phishing Click Rates Triple in 2024 (lien direct) Netskope observed a 190% growth in enterprise users clicking phishing links as attackers become more creative in delivering effective lures
Netskope observed a 190% growth in enterprise users clicking phishing links as attackers become more creative in delivering effective lures
Studies ★★★
Last update at: 2025-05-10 12:07:58
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter