The PlugX worm, often linked to Mustang Panda, can spread through infected flash drives, making it highly pervasive. After ...
DoubleClickjacking bypasses X-Frame-Options and SameSite cookies in double-click sequences, exposing UI authentication flaws ...
The US government has set out proposals to increase security obligations on healthcare providers to protect patient data amid ...
The State of Rhode Island has confirmed that cybercriminals have begun publishing data stolen from its social services portal ...
Security researchers have warned users of Google Chrome extensions to be on their guard after uncovering a major campaign focused on data theft. At least 36 compromised Chrome extensions have been ...
Chinese state-backed hackers have compromised US Treasury computers and accessed unclassified information, after targeting a ...
As we look towards 2025, it's clear that the cybersecurity landscape will be characterised by both exciting advancements and ...
Infosecurity consulted top counter-threat intelligence experts to analyze the tumultuous cyber threat landscape of 2024 and ...
Sushila Nair sets out the key areas that should be included to craft an effective cybersecurity budget in 2025 ...
Infosecurity has curated a collection of the best tips and guidance from CISOs and cybersecurity professionals we've ...
Cybersecurity M&A activity in 2024 has been driven by resurgent private equity activity and a trend towards broader product ...
Kevin Curran says 2025 will be a year of reckoning for AI in cybersecurity as people improve their understanding of the ...