Infosecurity Magazine

Infosecurity Magazine

Publication
2 followers

Award-winning publication dedicated to information security strategy and insights for security professionals.

Eight in 10 UK Manufacturers Hit by Cyber Incident in a Year
NewsApr 1, 2026

Eight in 10 UK Manufacturers Hit by Cyber Incident in a Year

New ESET research shows 78% of UK manufacturers suffered a serious cyber incident in the past year, with 95% reporting direct business impact. Over half (53%) incurred financial losses, averaging six‑figure amounts, while 44% faced supply‑chain disruptions and 39% missed...

By Infosecurity Magazine
ChatGPT Security Issue Enabled Data Theft via Single Prompt
NewsMar 31, 2026

ChatGPT Security Issue Enabled Data Theft via Single Prompt

Security researchers at Check Point uncovered a vulnerability in ChatGPT that allows a single crafted prompt to create a covert data‑exfiltration channel. The flaw leveraged a hidden DNS side‑channel from the model's isolated container, enabling both data leakage and remote...

By Infosecurity Magazine
Employee Data Breaches Surge to Seven-Year High
NewsMar 31, 2026

Employee Data Breaches Surge to Seven-Year High

Employee data breach reports to the UK Information Commissioner’s Office reached 3,872 incidents in 2025, the highest level in at least seven years. That marks a 5% rise from the previous year and a 29% increase versus 2019, when reporting...

By Infosecurity Magazine
UK Cracks Down on Chinese Crypto Marketplace for Funding Southeast Asia Scam Hubs
NewsMar 27, 2026

UK Cracks Down on Chinese Crypto Marketplace for Funding Southeast Asia Scam Hubs

On 26 March the UK government announced sanctions against Xinbi, the region’s largest illicit cryptocurrency marketplace that moved roughly $19.7 billion in fraudulent funds. Xinbi, based in China, is tied to the #8 Park scam compound in Cambodia, which houses up to 20,000...

By Infosecurity Magazine
Security Researchers Sound the Alarm on Vulnerabilities in AI-Generated Code
NewsMar 26, 2026

Security Researchers Sound the Alarm on Vulnerabilities in AI-Generated Code

Georgia Tech’s Vibe Security Radar identified 35 new AI‑generated code vulnerabilities in March 2026, raising the quarterly total to 74 confirmed CVEs linked to AI coding tools. The project tracks roughly 50 AI‑assisted development platforms, with Anthropic’s Claude Code accounting for...

By Infosecurity Magazine
EtherRAT Techniques Bypass Security Via Ethereum Smart Contracts
NewsMar 26, 2026

EtherRAT Techniques Bypass Security Via Ethereum Smart Contracts

Researchers at eSentire disclosed a new EtherRAT campaign that hides command‑and‑control (C2) addresses inside Ethereum smart contracts, a technique they call EtherHiding. The malware, delivered via Node.js backdoors after initial access through Teams support scams and ClickFix attacks, retrieves C2...

By Infosecurity Magazine
OpenAI Expands Bug Bounty to Cover AI Abuse and 'Safety' Concerns
NewsMar 26, 2026

OpenAI Expands Bug Bounty to Cover AI Abuse and 'Safety' Concerns

OpenAI announced a Safety Bug Bounty program on March 26, hosted on Bugcrowd, to solicit disclosures of AI abuse and safety risks beyond traditional security flaws. The initiative complements its existing Security Bug Bounty, which has already rewarded 409 vulnerabilities since...

By Infosecurity Magazine
Invoice Fraud Costs UK Construction Sector Millions, NCA Warns
NewsMar 26, 2026

Invoice Fraud Costs UK Construction Sector Millions, NCA Warns

UK’s National Crime Agency, together with the National Federation of Builders, has launched an awareness campaign targeting invoice‑fraud in the construction sector. In September 2025, fraudulent invoices cost the industry almost £4 million (≈$5.3 million) across 83 reported cases, and construction plus...

By Infosecurity Magazine
Cloud Phones Linked to Rising Financial Fraud Threat
NewsMar 25, 2026

Cloud Phones Linked to Rising Financial Fraud Threat

A Group‑IB report released on March 25 reveals that cloud phones—remote‑access Android devices hosted in data centres—are being weaponized for financial fraud. Because they replicate genuine smartphones, they bypass conventional device‑fingerprinting tools, allowing fraudsters to create and operate dropper accounts...

By Infosecurity Magazine
Hackers Exploit Compromised Enterprise Identities at Industrial Scale, Warns SentinelOne
NewsMar 25, 2026

Hackers Exploit Compromised Enterprise Identities at Industrial Scale, Warns SentinelOne

SentinelOne’s 2026 Annual Threat Report warns that identity‑based attacks have escalated to an industrial scale, with threat actors exploiting legitimate enterprise credentials to bypass traditional defenses. Attackers are using social‑engineering, MFA‑bypass kits, and brute‑force tactics to hijack high‑privilege accounts, even...

By Infosecurity Magazine
Experts Sound Alarm Over “Prompt Poaching” Browser Extensions
NewsMar 25, 2026

Experts Sound Alarm Over “Prompt Poaching” Browser Extensions

Security firm Expel reported a surge in malicious Chrome extensions that silently capture users’ AI conversations, a practice dubbed “prompt poaching.” The extensions monitor open tabs, intercept API calls or scrape the DOM, then transmit prompts and responses to external...

By Infosecurity Magazine
Silver Fox Cyber Campaigns Show Shift Toward Dual Espionage
NewsMar 24, 2026

Silver Fox Cyber Campaigns Show Shift Toward Dual Espionage

Silver Fox, a cyber intrusion group, shifted its tactics from 2025 to early 2026, blending espionage with financially motivated crime. The campaigns targeted finance staff across Taiwan, Japan, and eight South Asian nations using tax‑authority phishing lures. Attack vectors progressed...

By Infosecurity Magazine
Former Ukrainian Foreign Minister Dmytro Kuleba to Address the New Cyber Frontline at Infosecurity Europe
NewsMar 24, 2026

Former Ukrainian Foreign Minister Dmytro Kuleba to Address the New Cyber Frontline at Infosecurity Europe

Infosecurity Europe will feature former Ukrainian foreign minister Dmytro Kuleba as the headline keynote at its June 2‑4, 2026 conference in London. Kuleba will discuss “Ukraine’s Hybrid War and the New Cyber Frontline,” sharing lessons from Russia’s coordinated cyber‑attacks and the shift...

By Infosecurity Magazine
Ransomware Affiliate Exposes Details of 'The Gentlemen' Operation
NewsMar 19, 2026

Ransomware Affiliate Exposes Details of 'The Gentlemen' Operation

An affiliate known as ‘hastalamuerte’ disclosed internal details of the emerging ransomware‑as‑a‑service group The Gentlemen, revealing its dual‑extortion tactics, multi‑platform targets, and sophisticated evasion methods. Group‑IB’s March 19 report shows the group exploits FortiGate VPN devices, uses PowerShell, BYOVD drivers, and...

By Infosecurity Magazine
FCA Updates Cyber Incident and Third-Party Reporting Rules
NewsMar 19, 2026

FCA Updates Cyber Incident and Third-Party Reporting Rules

The UK Financial Conduct Authority has unveiled new cyber‑incident reporting rules that clarify what events firms must disclose and streamline the submission process via a single portal shared with the PRA and Bank of England. The guidance narrows reporting thresholds,...

By Infosecurity Magazine
UK: Regulation Drives Cyber Spending for Critical Infrastructure Orgs
NewsMar 19, 2026

UK: Regulation Drives Cyber Spending for Critical Infrastructure Orgs

Bridewell’s 2026 Cybersecurity in CNI report shows regulatory compliance has become the leading catalyst for cyber investment among UK critical infrastructure firms, rising to 35% of security leaders. New mandates such as the UK Cyber Security Resilience Bill, the EU...

By Infosecurity Magazine
Crypto Scam "ShieldGuard" Dismantled After Malware Discovery
NewsMar 18, 2026

Crypto Scam "ShieldGuard" Dismantled After Malware Discovery

Okta Threat Intelligence dismantled the ShieldGuard browser extension, a fraudulent crypto‑security tool that harvested user data. The extension collected wallet addresses, transaction histories, and browsing activity from platforms like Binance, Coinbase, and MetaMask, and executed remote code via a command‑and‑control...

By Infosecurity Magazine
AI Issues Will Drive Half of Incident Response Efforts by 2028, Says Gartner
NewsMar 18, 2026

AI Issues Will Drive Half of Incident Response Efforts by 2028, Says Gartner

Gartner warns that custom‑built AI applications will consume at least half of enterprise incident‑response resources by 2028 unless security teams are involved early. The analyst urges a “shift‑left” approach to embed controls from the start and highlights a surge in...

By Infosecurity Magazine
Android OS-Level Attack Bypasses Mobile Payment Security
NewsMar 17, 2026

Android OS-Level Attack Bypasses Mobile Payment Security

CloudSEK researchers uncovered an Android attack that leverages the LSPosed framework to manipulate the runtime environment rather than tampering with app code. By injecting malicious modules at the OS level, the technique hijacks legitimate payment applications while preserving their signatures,...

By Infosecurity Magazine
'CursorJack’ Attack Path Exposes Code Execution Risk in AI Development Environment
NewsMar 17, 2026

'CursorJack’ Attack Path Exposes Code Execution Risk in AI Development Environment

Proofpoint researchers identified a new attack called CursorJack that abuses Model Context Protocol (MCP) deeplinks in the Cursor AI‑focused IDE. By crafting a malicious link, an attacker can trick a developer into clicking it and approving an installation, causing the...

By Infosecurity Magazine
Average Number of Daily API Attacks Up 113% Annually
NewsMar 17, 2026

Average Number of Daily API Attacks Up 113% Annually

Akamai’s 2025 State of the Internet report shows API attacks more than doubled, rising 113% to an average of 258 incidents per organization. Unauthorized workflows now account for 61% of attacks, indicating a shift toward behavior‑based exploits. The most common...

By Infosecurity Magazine
UK Cyber Monitoring Centre Sets Its Sights on US Expansion One Year After Launch
NewsMar 17, 2026

UK Cyber Monitoring Centre Sets Its Sights on US Expansion One Year After Launch

The UK Cyber Monitoring Centre (CMC), launched in February 2025, quantifies the economic impact of major cyber incidents using a proprietary 0‑to‑5 scale. In its first year it assessed two high‑profile breaches: a Category 2 attack on Marks & Spencer and the Co‑op...

By Infosecurity Magazine
Security Flaw in AWS Bedrock Code Interpreter Raises Alarms
NewsMar 16, 2026

Security Flaw in AWS Bedrock Code Interpreter Raises Alarms

Security researchers at Phantom Labs demonstrated a DNS‑based data exfiltration technique targeting AWS Bedrock AgentCore Code Interpreter. By embedding malicious instructions in a CSV file, attackers can force the interpreter to issue DNS queries that act as a covert command‑and‑control...

By Infosecurity Magazine
CISA Issues Emergency Directive Over Exploited Cisco SD-WAN Flaws
NewsMar 12, 2026

CISA Issues Emergency Directive Over Exploited Cisco SD-WAN Flaws

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued Emergency Directive 26‑03, warning that attackers are exploiting a critical authentication‑bypass flaw (CVE‑2026‑20127) in Cisco Catalyst SD‑WAN devices used across federal networks. The vulnerability carries a CVSS score of 10, potentially granting...

By Infosecurity Magazine
France: National Cybersecurity Agency Reports Ransomware Attack Drop in 2025
NewsMar 11, 2026

France: National Cybersecurity Agency Reports Ransomware Attack Drop in 2025

The French cybersecurity agency ANSSI reported a modest decline in ransomware incidents in 2025, with 128 attacks versus 141 in 2024. The drop is attributed to proactive cyber‑defense measures and large‑scale law‑enforcement actions such as Operation Endgame. While overall ransomware...

By Infosecurity Magazine
Researchers Discover Major Security Gaps in LLM Guardrails
NewsMar 11, 2026

Researchers Discover Major Security Gaps in LLM Guardrails

Unit 42 researchers revealed that safety guardrails in generative AI, termed “AI Judges,” can be bypassed using a novel prompt‑injection technique. Their custom fuzzer, AdvJudge‑Zero, automatically discovers low‑perplexity token sequences that shrink the logit gap between “allow” and “block,” achieving a...

By Infosecurity Magazine
Cyber-Attacks on UK Firms Increase at Four Times Global Rate
NewsMar 11, 2026

Cyber-Attacks on UK Firms Increase at Four Times Global Rate

Check Point’s February 2026 report shows UK organisations faced a 36% year‑on‑year rise in cyber‑attacks, far outpacing the 9.8% global increase. Despite the surge, UK firms averaged 1,504 attacks per week, still below the global mean of 2,086. Education, energy,...

By Infosecurity Magazine
Only 24% Of Organizations Test Identity Recovery Every Six Months
NewsMar 10, 2026

Only 24% Of Organizations Test Identity Recovery Every Six Months

Identity and access management now underpins modern enterprises, linking users, applications, automation tools, and cloud services. Quest Software’s survey shows only 24 % of organizations test their identity disaster‑recovery plans every six months, while 24 % never test at all. Companies that...

By Infosecurity Magazine
Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds
NewsMar 10, 2026

Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds

Google Cloud’s H1 2026 Threat Horizons Report reveals a marked shift in attacker tactics, with software‑vulnerability exploits overtaking credential‑based attacks as the primary entry method into cloud environments. Third‑party vulnerabilities accounted for 44.5% of initial accesses in H2 2025, up from 2.9%...

By Infosecurity Magazine
Threat Actor Exploits Flaws and Uses Elastic Cloud SIEM to Manage Stolen Data
NewsMar 9, 2026

Threat Actor Exploits Flaws and Uses Elastic Cloud SIEM to Manage Stolen Data

Researchers at Huntress uncovered a campaign where a threat actor exploited vulnerabilities in enterprise software, including SolarWinds Web Help Desk, to harvest system data and funnel it into a free‑trial Elastic Cloud SIEM instance. The attacker used an encoded PowerShell...

By Infosecurity Magazine
UK Launches New Crackdown Unit to Tackle Cyber-Fraud at the Source
NewsMar 9, 2026

UK Launches New Crackdown Unit to Tackle Cyber-Fraud at the Source

The UK Home Office and National Crime Agency announced the creation of an Online Crime Centre, set to begin operations in April. The unit will pool expertise from police, intelligence, banks, mobile networks and major tech firms to identify and...

By Infosecurity Magazine
ContextCrush Flaw Exposes AI Development Tools to Attacks
NewsMar 5, 2026

ContextCrush Flaw Exposes AI Development Tools to Attacks

Security researchers at Noma Labs disclosed a critical flaw named ContextCrush affecting the Context7 MCP Server, a popular component that feeds documentation to AI coding assistants. The vulnerability stems from unsanitized custom‑rule entries, allowing attackers to embed malicious instructions that...

By Infosecurity Magazine
Global Takedown Neutralizes Tycoon2FA Phishing Service
NewsMar 4, 2026

Global Takedown Neutralizes Tycoon2FA Phishing Service

Investigators led by Microsoft and Europol dismantled the Tycoon2FA phishing‑as‑a‑service operation, seizing over 300 associated domains. The service, launched in August 2023, offered subscription‑based MFA bypass using adversary‑in‑the‑middle attacks, attracting roughly 2,000 criminal users and leveraging more than 24,000 domains....

By Infosecurity Magazine
Surge in Attacks on Surveillance Cameras Linked to Iranian Hackers
NewsMar 4, 2026

Surge in Attacks on Surveillance Cameras Linked to Iranian Hackers

Check Point Research has identified a coordinated surge in attempts to compromise internet‑connected surveillance cameras across the Middle East, targeting Hikvision and Dahua devices. The campaign, which intensified on February 28, aligns with Iranian threat actors and exploits CVE‑2021‑33044 and CVE‑2017‑7921....

By Infosecurity Magazine
Multi-Stage "BadPaw" Malware Campaign Targets Ukraine
NewsMar 4, 2026

Multi-Stage "BadPaw" Malware Campaign Targets Ukraine

ClearSky researchers have uncovered a new malware campaign dubbed “BadPaw” that exploits the Ukrainian email provider ukr.net to lend credibility to phishing messages. The attack delivers a ZIP archive that actually contains a hidden HTA application, which checks system age...

By Infosecurity Magazine
Calls for Global Digital Estate Standard as Posthumous Deepfake Fraud Risk Grows
NewsMar 4, 2026

Calls for Global Digital Estate Standard as Posthumous Deepfake Fraud Risk Grows

The OpenID Foundation released a report urging the creation of a global digital‑estate framework to protect deceased users’ online accounts. It warns that the absence of consistent standards leaves devices, social media, email and cryptocurrency vulnerable to fraud, especially as...

By Infosecurity Magazine
Israel: RedAlert Spyware Campaign Exploits Wartime Panic With Trojanized App
NewsMar 3, 2026

Israel: RedAlert Spyware Campaign Exploits Wartime Panic With Trojanized App

CloudSEK has uncovered a sophisticated Android espionage campaign dubbed RedAlert, which distributes a trojanized version of Israel’s official Red Alert rocket‑warning app via SMS phishing. The fake app mimics the legitimate interface, delivers real alerts, and silently requests high‑risk permissions...

By Infosecurity Magazine
Leaked Database Sheds Light on Iranian Crypto Sanctions Evasion
NewsMar 3, 2026

Leaked Database Sheds Light on Iranian Crypto Sanctions Evasion

A leaked database from Iranian exchange Ariomex shows the platform may have facilitated sanctions evasion and large capital transfers between 2022 and 2025. The data, analyzed by Resecurity, identified 27 users with potential sanctions matches and revealed that 70% of...

By Infosecurity Magazine
Huge “Shadow Layer” Of Organizations Hit by Supply Chain Attacks
NewsMar 3, 2026

Huge “Shadow Layer” Of Organizations Hit by Supply Chain Attacks

Black Kite’s 2025 Third‑Party Breach Report reveals a massive "shadow layer" of supply‑chain attacks, with 136 verified breaches exposing 719 downstream companies and 433 million individuals. Vendors reported an additional 26,000 unnamed corporate victims, suggesting even higher impact. Software‑services providers accounted...

By Infosecurity Magazine
Iranian Cyber Threat Actor Targets Iraqi Government Officials in AI-Powered Campaign
NewsMar 3, 2026

Iranian Cyber Threat Actor Targets Iraqi Government Officials in AI-Powered Campaign

Iran‑linked threat actor Dust Specter launched a sophisticated phishing campaign against Iraqi government officials in January 2026, masquerading as the Ministry of Foreign Affairs. The operation deployed previously unseen malware families—including SplitDrop, TwinTask, TwinTalk and GhostForm—some of which were assembled with...

By Infosecurity Magazine
Aeternum Botnet Shifts Command Control to Polygon Blockchain
NewsFeb 26, 2026

Aeternum Botnet Shifts Command Control to Polygon Blockchain

Aeternum, a newly discovered botnet loader, has moved its command‑and‑control (C2) infrastructure onto the Polygon blockchain, using smart contracts to issue instructions. By writing commands as immutable blockchain transactions, the botnet eliminates the traditional servers and domains that law‑enforcement typically...

By Infosecurity Magazine
Malicious NuGet Package Targets Stripe Developers
NewsFeb 25, 2026

Malicious NuGet Package Targets Stripe Developers

Security researchers discovered a malicious NuGet package, StripeApi.Net, that mimics Stripe's official .NET library. The typosquatting campaign generated over 180,000 artificial downloads across 506 versions to appear legitimate. Embedded code silently captured Stripe API keys and a machine identifier, sending...

By Infosecurity Magazine
Cost of Insider Incidents Surges 20% to Nearly $20m
NewsFeb 24, 2026

Cost of Insider Incidents Surges 20% to Nearly $20m

The DTEX Cost of Insider Risks 2026 report, based on 8,750 security practitioners, finds average insider‑related losses of $19.5 million per organization, with employee negligence—largely driven by shadow AI—accounting for 53% of that cost. Negligence losses rose 17% year‑on‑year, pushing total...

By Infosecurity Magazine
Multifaceted Phishing Scheme Deceives Bitpanda Customers
NewsFeb 24, 2026

Multifaceted Phishing Scheme Deceives Bitpanda Customers

Cybersecurity firm Cofense uncovered a sophisticated phishing campaign that impersonates cryptocurrency broker Bitpanda. The fake site replicates Bitpanda’s login and adds a counterfeit multi‑factor authentication flow to harvest credentials, names, phone numbers, addresses, and birth dates. Attackers host the clone...

By Infosecurity Magazine
Shai-Hulud-Like Worm Targets Developers via Npm and AI Tools
NewsFeb 23, 2026

Shai-Hulud-Like Worm Targets Developers via Npm and AI Tools

Security researchers have uncovered a supply‑chain worm, dubbed SANDWORM_MODE, spreading through at least 19 malicious npm packages that employ typosquatting. The malware not only steals developer and CI credentials but also injects rogue servers into AI coding assistants such as...

By Infosecurity Magazine
Dramatic Escalation in Frequency and Power of DDoS Attacks
NewsFeb 20, 2026

Dramatic Escalation in Frequency and Power of DDoS Attacks

The Radware 2026 Global Threat Analysis Report reveals a 168% jump in DDoS attacks in 2025 versus 2024, with customers averaging 139 attempted incidents per day. Technology, telecommunications and financial services bore the brunt, the tech sector alone accounting for...

By Infosecurity Magazine
Remcos RAT Expands Real-Time Surveillance Capabilities
NewsFeb 19, 2026

Remcos RAT Expands Real-Time Surveillance Capabilities

A newly observed Remcos RAT variant now streams webcam footage and transmits keystrokes in real time, shifting from local data storage to direct, encrypted communication with attacker‑controlled servers. The malware decrypts its configuration only at runtime, loads critical Windows APIs...

By Infosecurity Magazine
Industrial-Scale Fake Coretax Apps Drive $2m Fraud in Indonesia
NewsFeb 19, 2026

Industrial-Scale Fake Coretax Apps Drive $2m Fraud in Indonesia

Group‑IB uncovered a sophisticated fraud campaign that spoofed Indonesia’s Coretax tax platform by distributing counterfeit Android apps. The scheme combined phishing websites, WhatsApp impersonation of tax officers, and voice‑phishing calls to install RATs such as Gigabud.RAT and MMRat, leading to...

By Infosecurity Magazine
Industrial Control System Vulnerabilities Hit Record Highs
NewsFeb 19, 2026

Industrial Control System Vulnerabilities Hit Record Highs

Forescout’s 2026 report shows industrial control system (ICS) advisories surpassed 500 in 2025, the highest level since tracking began. The 2,155 CVEs tied to those advisories pushed average CVSS scores above 8.0, reflecting increasingly critical flaws. Manufacturing and energy assets...

By Infosecurity Magazine