Infosecurity Magazine

ENISA Probes Space Threat Landscape in New Report

The EU’s leading cybersecurity agency has published a detailed new report outlining the threat landscape and recommended steps to mitigate the most acute risks in the space sector.

ETSI Publishes New Quantum-Safe Encryption Standards

New quantum-safe encryption standards have been published by the European Telecommunications Standards Institute (ETSI). The specification defines a scheme for key encapsulation mechanisms with access control (KEMAC), called Covercrypt.

NCSC Urges Domain Registrars to Improve Security

The UK’s National Cyber Security Centre (NCSC) has published new guidance to minimize malicious domain registrations and hijacking. The agency said countering domain abuses is a vital first step to tackling the phishing threat.

CoffeeLoader Malware Loader Linked to SmokeLoader Operations

Unlike traditional malware loaders, CoffeeLoader incorporates multiple techniques to avoid detection. It employs Armoury, a GPU-based packer that impersonates ASUS’ Armoury Crate utility, making analysis in virtual environments more challenging.

Cybercriminals Exploit Check Point Driver Flaws in Malicious Campaign

A security researcher found that a component of Check Point’s ZoneAlarm antivirus software is being exploited by threat actors in malicious campaigns to bypass Windows security measures.

Report: Rooted Devices 250 Times More Vulnerable to Compromise

A new analysis of mobile security threats by Zimperium has revealed that rooted and jailbroken devices are 250 times more vulnerable to system compromise incidents than standard devices.

Attackers use Fake CAPTCHAs to Deploy Lumma Stealer RAT

HP's latest Threat Insights Report has revealed a surge in malicious CAPTCHA campaigns, where users are tricked into running PowerShell commands that install the Lumma Stealer remote access trojan (RAT).

Albabat Ransomware Evolves to Target Linux and macOS

Trend Micro researchers said the Albabat ransomware version 2.0 not only targets Microsoft Windows but also gathers system and hardware information on Linux and macOS systems.

Security Researcher Proves GenAI Tools can Develop Chrome Infostealers

A cyber threat intelligence researcher at Cato Networks has discovered a new technique to utilize the most popular large language models (LLMs) for coding information-stealing malware.

Large-Scale Malicious App Campaign Bypasses Android Security to Conduct Ad Fraud

A large-scale ad fraud campaign has resulted in more than 60 million downloads of malicious Android apps from the Google Play Store, according to a new analysis by Bitdefender.

Defend Against Threats with Cyber Fusion

Cyware is the leading provider of cyber fusion solutions that power threat intelligence sharing , end-to-end automation and 360-degree threat response.

Trending Tags