Skip to content
InfosecToday.com
  • Cybersecurity News
  • Cybersecurity Articles
  • Cybersecurity Glossary
  • Contact
  • Login
InfosecToday.com
The new Sturnus Android Trojan discreetly records encrypted conversations and takes control of devices.
Android Banking Trojan | Credential Theft  | Malware Features 

The new Sturnus Android Trojan discreetly records encrypted conversations and takes control of devices.

Ways to Manage AI Entities and Non-Human Identities
AI Agents | Non-Human Identities | Service Accounts

Ways to Manage AI Entities and Non-Human Identities

ShadowRay 2.0 Takes Advantage of an Unresolved Ray Vulnerability to Create a Self-Replicating GPU Cryptomining Botnet.
Cryptocurrency Mining | Cybersecurity Threats | Exploitation of Vulnerabilities

ShadowRay 2.0 Takes Advantage of an Unresolved Ray Vulnerability to Create a Self-Replicating GPU Cryptomining Botnet.

Hackers connected to Iran analyzed ship AIS data just days before a missile strike attempt occurred in the real world.
Cyber-Enabled Kinetic Targeting | Intelligence Gathering for Physical Attacks  | State-Sponsored Cyber Warfare

Hackers connected to Iran analyzed ship AIS data just days before a missile strike attempt occurred in the real world.

Vulnerability in WordPress Backup Plugin Leaves 800,000 Sites Open to Remote Code Execution Exploits
Cybersecurity | Remote Code Execution (RCE) | WordPress Security | WordPress Vulnerabilities

Vulnerability in WordPress Backup Plugin Leaves 800,000 Sites Open to Remote Code Execution Exploits

KillSec ransomware targeting healthcare IT systems
Cybersecurity | Data Exfiltration  | Healthcare | Healthcare Security  | Ransomware

KillSec ransomware targeting healthcare IT systems

HiddenGh0st, Winos, and kkRAT using SEO strategies and GitHub pages
Cybersecurity Threats | Malware Distribution | SEO Manipulation 

HiddenGh0st, Winos, and kkRAT using SEO strategies and GitHub pages

Runtime visibility indispensable in cloud-native security
Cloud-Native Security Challenges | Role of AI in Cloud Security  | Runtime Visibility and Prioritization

Runtime visibility indispensable in cloud-native security

Cursor AI Code Editor getting hammered through compromised repositories
AI-Powered Development Tools | Security Vulnerabilities | Supply Chain Risks

Cursor AI Code Editor getting hammered through compromised repositories

Chinese APT group infiltrated Philippine military with EggStreme fileless malware
Cybersecurity Threats | Espionage Techniques  | Malware Frameworks

Chinese APT group infiltrated Philippine military with EggStreme fileless malware

Akira ransomware attackers actively exploiting SonicWall SSL VPN
Attack Mitigation Strategies  | Cybersecurity Vulnerabilities  | Ransomware Threats

Akira ransomware attackers actively exploiting SonicWall SSL VPN

Counterfeit Madgicx Plus and SocialMetrics extensions hijacking Meta business accounts
Data Theft Techniques  | Malvertising Campaigns | Rogue Browser Extensions

Counterfeit Madgicx Plus and SocialMetrics extensions hijacking Meta business accounts

AsyncRAT Takes Advantage of ConnectWise ScreenConnect to Capture Credentials and Cryptocurrency
Cyberattack Techniques | Fileless Malware  | Remote Access Trojans 

AsyncRAT Takes Advantage of ConnectWise ScreenConnect to Capture Credentials and Cryptocurrency

CHILLYHELL macOS Backdoor and ZynorRAT remote access trojan threat to all operating systems
Espionage Threats | macOS Security  | Malware Families

CHILLYHELL macOS Backdoor and ZynorRAT remote access trojan threat to all operating systems

APT41 hackers targeting US trade officials as talks with China approach
Cyber Espionage | Phishing Attacks  | U.S.-China Relations

APT41 hackers targeting US trade officials as talks with China approach

New phishing tool Salty2FA bypasses two-factor authentication
Phishing Techniques  | Targeted Industries | Two-Factor Authentication Bypass 

New phishing tool Salty2FA bypasses two-factor authentication

Cryptojacking attack using TOR infiltrates misconfigured Docker APIs
Cryptojacking | Docker Security | Malware Propagation 

Cryptojacking attack using TOR infiltrates misconfigured Docker APIs

GPUGate malware using Google Ads and counterfeit GitHub commits
Cybersecurity Threats | Malware Campaigns | Social Engineering Techniques 

GPUGate malware using Google Ads and counterfeit GitHub commits

Chinese agents reportedly posed as US congressman to transmit malware
Cyber Espionage | Malware Delivery  | Trade Negotiations 

Chinese agents reportedly posed as US congressman to transmit malware

GitHub workflow breaches impact multiple repositories
Cybersecurity Threats | Data Breaches  | Supply Chain Attacks

GitHub workflow breaches impact multiple repositories

Lazarus Group boosts malware tools with PondRAT, ThemeForestRAT, & RemotePE
Cybersecurity Threats | Malware Types | Social Engineering Attacks 

Lazarus Group boosts malware tools with PondRAT, ThemeForestRAT, & RemotePE

Remote hiring fraud increasing quickly
Hiring Fraud | Identity Deception  | Remote Work Vulnerabilities

Remote hiring fraud increasing quickly

MystRodX backdoor uses DNS and ICMP triggers for covert manipulation
Backdoor Techniques  | Cyber Espionage | Malware

MystRodX backdoor uses DNS and ICMP triggers for covert manipulation

Can AI agents identify threats that your Security Operations Center overlooks?
AI-Driven Network Monitoring | Distributed Security Architecture | Hybrid Threat Detection 

Can AI agents identify threats that your Security Operations Center overlooks?

Iranian cybercriminals compromise over 100 diplomatic email accounts
Cyber Espionage | Geopolitical Tensions | Spear-Phishing Campaigns

Iranian cybercriminals compromise over 100 diplomatic email accounts

BruteForceAI: New AI-powered Github tool
Brute-Force Attack Tools | Ethical Hacking  | Penetration Testing

BruteForceAI: New AI-powered Github tool

Connected vehicles are intelligent, user-friendly, and vulnerable to cyberattack
Consumer Accountability | Cybersecurity Concerns | Vehicle Safety Risks 

Connected vehicles are intelligent, user-friendly, and vulnerable to cyberattack

Fake npm packages stealing Ethereum wallet keys
Cryptocurrency Theft | Malicious Packages | Software Supply Chain Attacks 

Fake npm packages stealing Ethereum wallet keys

North Korean fake job interview schemes
Cyber Threat Intelligence | Cybersecurity Attacks | Infrastructure Vulnerability

North Korean fake job interview schemes

TAG-150 creates CastleRAT using Python and C, broadening the capabilities of CastleLoader malware.
Malware-as-a-Service | Phishing Attacks  | Remote Access Trojans 

TAG-150 creates CastleRAT using Python and C, broadening the capabilities of CastleLoader malware.

Page navigation

1 2 3 … 13 Next PageNext

© 2026 InfosecToday.com - WordPress Theme by Kadence WP

How cybersecure is your business? Take our free quiz and find out
Cyber risk scorecard
  • Cybersecurity News
  • Cybersecurity Articles
  • Cybersecurity Glossary
  • Contact
  • Login
Search