Dvuln researchers highlighted the growing impact of infostealers on the cybercrime landscape, enabling attackers to bypass traditional defenses This article has been indexed from www.infosecurity-magazine.com Read the original article: Infostealers Harvest Over 30,000 Australian Banking Credentials
Tag: www.infosecurity-magazine.com
Zero-Day Exploitation Figure Surges 19% in Two Years
Google claims 19% more zero-day bugs were exploited in 2024 than 2022 as threat actors focus on security products This article has been indexed from www.infosecurity-magazine.com Read the original article: Zero-Day Exploitation Figure Surges 19% in Two Years
Europol Creates “Violence-as-a-Service” Taskforce
Europol has launched a new initiative designed to combat recruitment of youngsters into violent organized crime groups This article has been indexed from www.infosecurity-magazine.com Read the original article: Europol Creates “Violence-as-a-Service” Taskforce
Uyghur Diaspora Group Targeted with Remote Surveillance Malware
Members of the World Uyghur Congress living in exile were targeted with a spear phishing campaign deploying surveillance malware, according to the Citizen Lab This article has been indexed from www.infosecurity-magazine.com Read the original article: Uyghur Diaspora Group Targeted with…
Half of Mobile Devices Run Outdated Operating Systems
50% of mobile devices run outdated operating systems, increasing vulnerability to cyber-attacks, according to the latest report from Zimperium This article has been indexed from www.infosecurity-magazine.com Read the original article: Half of Mobile Devices Run Outdated Operating Systems
Researchers Note 16.7% Increase in Automated Scanning Activity
According to the 2025 Global Threat Landscape Report from FortiGuard, threat actors are executing 36,000 scans per second This article has been indexed from www.infosecurity-magazine.com Read the original article: Researchers Note 16.7% Increase in Automated Scanning Activity
ISACA Highlights Critical Lack of Quantum Threat Mitigation Strategies
An ISACA survey found that just 5% of organizations have a defined strategy to defend against quantum-enabled threats This article has been indexed from www.infosecurity-magazine.com Read the original article: ISACA Highlights Critical Lack of Quantum Threat Mitigation Strategies
FBI Asks for Help Tracking Chinese Salt Typhoon Actors
The US authorities have asked the public to help them unmask China’s Salt Typhoon threat actors This article has been indexed from www.infosecurity-magazine.com Read the original article: FBI Asks for Help Tracking Chinese Salt Typhoon Actors
Government Set to Ban SIM Farms in European First
The UK government says it will ban the possession or supply of SIM farms, in a fraud crackdown This article has been indexed from www.infosecurity-magazine.com Read the original article: Government Set to Ban SIM Farms in European First
Law Enforcement Crackdowns Drive Novel Ransomware Affiliate Schemes
Increased law enforcement pressure has forced ransomware groups like DragonForce and Anubis to move away from traditional affiliate models This article has been indexed from www.infosecurity-magazine.com Read the original article: Law Enforcement Crackdowns Drive Novel Ransomware Affiliate Schemes