News

Orange, France’s leading telecommunications company with a presence in Africa and the Middle East, has confirmed it is dealing with a cyber-attack. In a public statement issued on July 28, the ...
A sophisticated and highly targeted cyber-attack campaign has been identified by security researchers in Google’s Threat Intelligence Group (GTIG). A new report has revealed how the financially ...
Insurance provider Allianz Life has suffered a major data breach affecting the majority of its 1.4 million US customers, as well as financial professionals and select employees. Allianz Life, a ...
More than 10,000 WordPress sites have been left vulnerable to full site takeover due to three critical security flaws discovered in the HT Contact Form Widget for Elementor Page Builder & Gutenberg ...
A prolonged Chinese cyber espionage campaign is targeting VMware appliances to gain access to target networks, according to Sygnia researchers. The campaign has been tracked since early 2025. The ...
A Chinese-based threat actor has been observed using the flaws in Microsoft SharePoint to deploy ransomware on compromised systems. In an incident update on July 23, Microsoft revealed that a group ...
James Coker Deputy Editor Follow on Twitter: @ReporterCoker James Coker is the Deputy Editor for Infosecurity Magazine, joining the team after several years writing about the healthcare industry ...
The UK government has confirmed it is pressing ahead with a proposed ban on ransomware payments by public sector and critical national infrastructure (CNI) organizations. This follows three-quarters ...
A cyber-attack on a US-based accounting firm in May 2025 has been observed delivering the PureRAT remote access Trojan using a sophisticated crypter called Ghost Crypt. According to researchers at ...
The US Cybersecurity and Infrastructure Security Agency (CISA) has released a number of advisories related to vulnerabilities in products related to Industrial Control Systems (ICS). The ICS ...
Microsoft has highlighted Scattered Spider’s evolving tactics and confirmed that the group has been observed using new tactics to gain access to cloud environments. Typically, the group, tracked by ...
A renewed call to transition to memory safe languages (MSLs) has been issued by the National Security Agency (NSA) and the Cybersecurity and Infrastructure Security Agency (CISA). A new joint report, ...