Kevin Bocek highlights similarities between the shift to shorter public certificate lifespans and the transition to ...
The Lumma Stealer infostealer malware is increasingly sought after by cybercriminals, according to cybersecurity firm ESET ...
Infosecurity has been covering the impact GenAI has had on cybersecurity from how the models can be compromised and what use ...
Infosecurity has selected the 10 most significant law enforcement operations against cybercriminal activity in 2024 ...
Japan alert attributed North Korean hackers with a May 2024 crypto heist worth $308m from Japan-based company DMM ...
Researchers at iProov have discovered a dark web group compiling identity documents and biometric data to bypass KYC checks ...
Judge Phyllis Hamilton said on Friday that NSO Group broke state and federal laws and WhatsApp’s terms of service, by using ...
The vulnerabilities, now patched, posed significant risks, including unauthorized file uploads, privilege escalation and SQL ...
US healthcare giant Ascension revealed that 5.6 million individuals have had their personal, medical and financial ...
As 2024 draws to a close, Infosecurity has compiled the top 10 most read cybersecurity news article by our own readership ...
Threat actors implanted cryptomining malware in packages associated with rspack, a JavaScript bundler, and vant, a Vue UI ...
Top cybersecurity leaders tell Infosecurity what they believe to be the biggest successes in the industry today ...