News

1.
Infosecurity Magazine
infosecurity-magazine.com-magazine.com

The Evolving Cybersecurity Challenge for Critical Infrastructure

The Evolving Cybersecurity Challenge for Critical Infrastructure3+ hour, 13+ min ago  (859+ words) In April 2025, cyber attackers took over the control system of a small dam in Western Norway and opened a valve for four hours. Norway's security services later publicly attributed the incident to pro-Russian hackers. Reports suggest attackers used weak credentials,…...

2.
Infosecurity Magazine
infosecurity-magazine.com-magazine.com

From Black Hole to Black Box: Forensics and Investigation Is the New Cyber Frontline

From Black Hole to Black Box: Forensics and Investigation Is the New Cyber Frontline20+ hour, 43+ min ago  (382+ words) Falling victim to a cyberattack is now an inevitability rather than a possibility. Organizations can no longer rely solely on prevention, they must be ready to respond quickly and effectively when breaches occur. As attack patterns evolve and breaches become…...

3.
Infosecurity Magazine
infosecurity-magazine.com-magazine.com

From Gatekeepers to Collaborators: The New Face of Information Security

From Gatekeepers to Collaborators: The New Face of Information Security6+ day, 2+ hour ago  (994+ words) Head of Information Security, bet365 Information security used to be a game of rules, not relationships. The job was simple: protect the system by sticking to the rulebook. Security teams were like referees on the pitch " watching for fouls, enforcing the…...

4.
Infosecurity Magazine
infosecurity-magazine.com-magazine.com

Top Ransomware Trends of 2025

Top Ransomware Trends of 20251+ week, 2+ day ago  (344+ words) The past year was much quieter than 2024 in ransomware takedown and anti-cybercrime law enforcement operations. Additionally, less organized collectives such as Scattered Spider, Lapsus$ and ShinyHunters grabbed many of the headlines in 2025. However, traditional ransomware syndicates continued to be active…...

5.
Infosecurity Magazine
infosecurity-magazine.com-magazine.com

New BeaverTail Malware Variant Linked to Lazarus Group

New BeaverTail Malware Variant Linked to Lazarus Group2+ week, 10+ hour ago  (355+ words) A newly observed variant of the BeaverTail malware has been tied to'hackers associated with North Korea. The findings come from Darktrace's latest The State of Cybersecurity report, which links BeaverTail activity to DPRK threat clusters assessed to be part of…...

6.
infosecurity-magazine.com
infosecurity-magazine.com-magazine.com

New “Lies-in-the-Loop” Attack Undermines AI Safety Dialogs

New “Lies-in-the-Loop” Attack Undermines AI Safety Dialogs2+ week, 22+ hour ago  (440+ words) A novel attack technique that undermines a common safety mechanism in agentic AI systems has been detailed by security researchers, showing how human approval prompts can be manipulated to execute malicious code. The issue, observed by Checkmarx researchers, centers on…...

7.
Infosecurity Magazine
infosecurity-magazine.com-magazine.com

DeadLock Ransomware Uses BYOVD to Evade Security Measures

DeadLock Ransomware Uses BYOVD to Evade Security Measures3+ week, 2+ day ago  (338+ words) A new set of tactics linked to a financially motivated threat actor deploying DeadLock ransomware has been observed by cybersecurity researchers. Detailed in'the'latest analysis from Cisco Talos, published today, the campaign used a Bring Your Own Vulnerable Driver (BYOVD) technique…...

8.
Infosecurity Magazine
infosecurity-magazine.com-magazine.com

UK NCSC Raises Alarms Over Prompt Injection Attacks

UK NCSC Raises Alarms Over Prompt Injection Attacks3+ week, 2+ day ago  (487+ words) Prompt injection vulnerabilities may never be fully mitigated as a category and network defenders should instead focus on ways to reduce their impact, government security experts have warned. Then National Cyber Security Centre (NCSC) technical director for platforms research, David…...

9.
Infosecurity Magazine
infosecurity-magazine.com-magazine.com

Securing AI for Cyber Resilience: Building Trustworthy and Secure AI

Securing AI for Cyber Resilience: Building Trustworthy and Secure AI3+ week, 3+ day ago  (655+ words) SVP, Head of Cybersecurity Strategic Technology Centre, ST Engineering As artificial intelligence (AI) becomes woven into the fabric of daily life " powering automation, analytics, and decision-making " it simultaneously opens new vulnerabilities for attackers to exploit. Ensuring the security of AI…...

10.
Infosecurity Magazine
infosecurity-magazine.com-magazine.com

China-Linked Warp Panda Targets North American Firms in Espionage Camp

China-Linked Warp Panda Targets North American Firms in Espionage Camp3+ week, 6+ day ago  (381+ words) The previously unknown threat actor exhibits a high level of technical sophistication, advanced operations security (OPSEC) skills and extensive knowledge of cloud and virtual machine (VM) environments, according to information shared by CrowdStrike. The cybersecurity firm said during the summer of…...