Tag: www.infosecurity-magazine.com

UK: Tax Refund-Themed Phishing Slows in 2025

Reports of email phishing attempts impersonating the UK’s HM Revenue & Customs plummeted in the first half of 2025 This article has been indexed from www.infosecurity-magazine.com Read the original article: UK: Tax Refund-Themed Phishing Slows in 2025

JLR Extends Production Halt After Cyber-Attack

Jaguar Land Rover (JLR) has confirmed that its pause in production will last until at least Wednesday, September 24 This article has been indexed from www.infosecurity-magazine.com Read the original article: JLR Extends Production Halt After Cyber-Attack

FinWise Bank Warns of Insider Data Breach

An insider data breach at FinWise may have impacted 689,000 customers This article has been indexed from www.infosecurity-magazine.com Read the original article: FinWise Bank Warns of Insider Data Breach

SEO Poisoning Targets Chinese Users with Fake Software Sites

SEO poisoning attack has been observed targeting Chinese Windows users via lookalike domains, installing Hiddengh0st and Winos This article has been indexed from www.infosecurity-magazine.com Read the original article: SEO Poisoning Targets Chinese Users with Fake Software Sites

HybridPetya Mimics NotPetya, Adds UEFI Compromise

HybridPetya ransomware mimics Petya/NotPetya, with an added UEFI bootkit and Secure Boot bypass This article has been indexed from www.infosecurity-magazine.com Read the original article: HybridPetya Mimics NotPetya, Adds UEFI Compromise

AI-Forged Military IDs Used in North Korean Phishing Attack

Genians observed the Kimsuky group impersonate a defense institution in a spear-phishing attack, leveraging ChatGPT to create fake military ID cards This article has been indexed from www.infosecurity-magazine.com Read the original article: AI-Forged Military IDs Used in North Korean Phishing…

Attackers Adopting Novel LOTL Techniques to Evade Detection

HP Wolf has reported the use of multiple, uncommon binaries and novel uses of legitimate image files in recent malicious campaigns This article has been indexed from www.infosecurity-magazine.com Read the original article: Attackers Adopting Novel LOTL Techniques to Evade Detection