
Infosecurity Magazine
@InfosecurityMag
Followers
242K
Following
3K
Media
13K
Statuses
70K
The only magazine dedicated to the strategy and technology of information security, delivering critical business and technical information for IT professionals.
London and New York
Joined April 2009
Service accounts and non-human identities make cloud Identity and access management (IAM) uniquely challenging This session from our recent Cloud Security Virtual Summit explored why these identities pose such a challenge & how to protect them effectively. Register here:
1
0
11
Teen Tied to Russian Hackers in Dutch Cyber Espionage Probe
infosecurity-magazine.com
Dutch prosecutors suspect three teens of aiding a foreign power, with one allegedly linked to a Russian-affiliated hacker group
0
2
2
The CISO's Crucible – Finding Strength in Control
infosecurity-magazine.com
Deloitte's Peter Gooch discusses how CISOs can overcome the immense strains and challenges of their roles
0
1
1
For many years, organizations have struggled to find the right equilibrium between robust cybersecurity measures and minimal user friction. @specopssoftware's article advocates for the straightforward yet highly effective method to enhance password security is by performing
0
1
3
Prosper Data Breach Exposes 17 Million Customers' Personal Info
infosecurity-magazine.com
The US lending platform said early investigations found no evidence of unauthorized account access or fund theft
0
1
2
Security Teams Must Deploy Anti-Infostealer Defenses Now
infosecurity-magazine.com
At ISACA Europe 2025, cybersecurity consultant Tony Gee shared some technical measures security teams could implement to fight against the infostealer scourge
0
3
6
New Rootkit Campaign Exploits Cisco SNMP Flaw to Gain Persistence
infosecurity-magazine.com
Trend Micro have reported a campaign exploiting a flaw in Cisco SNMP to install Linux rootkits on devices
1
1
3
AI Attacks Surge as Microsoft Process 100 Trillion Signals Daily
infosecurity-magazine.com
Microsoft systems analyze over 100 trillion daily signals, suggesting dramatically increasing AI-driven cyber-threats
0
1
3
LastPass Warns Customers It Has Not Been Hacked Amid Phishing Email Scam
infosecurity-magazine.com
LastPass warns customers it has not been breached, after phishing emails falsely claim a hack and urge users to update their desktop app
0
1
5
Over 23 Million Victims Hit by Data Breaches in Q3
infosecurity-magazine.com
Data from the Identity Theft Resource Center reveals 23 million individuals victimized by breaches in Q3 2025
0
4
5
F5 Reveals Nation State Breach and Urges Immediate Patching
infosecurity-magazine.com
F5 has admitted a nation state actor has stolen source code and information on undisclosed vulnerabilities
1
3
8
North Korea-backed threat actors have stolen more than $2bn in cryptocurrency this year. These funds are believed to be directly supporting the regime’s missile and nuclear weapons programs. The findings are part of Elliptic 's new report by which also highlights a significant
0
2
4
Flaw in Slider Revolution Plugin Exposed 4m WordPress Sites
infosecurity-magazine.com
A flaw in the Slider Revolution plugin has exposed millions of WordPress sites to unauthorized file access
0
1
0
Whisper 2FA Behind One Million Phishing Attempts Since July
infosecurity-magazine.com
Whisper 2FA is now one of the most active PhaaS tools alongside Tycoon and EvilProxy, responsible for one million attacks since July 2025
0
0
1
Join @ROKAutomation's webinar on October 16 for a 30-minute session and discover how to: - Overcome data collection challenges in OT security - Build a comprehensive OT environment perspective - Conduct contextual risk assessments with automated analysis - Explore real-world
0
0
3
Last Windows 10 Patch Tuesday Features Six Zero Days
infosecurity-magazine.com
Microsoft has fixed over 170 CVEs in October’s Patch Tuesday, including six zero-day vulnerabilities
0
0
4
Capita Fined £14m After 2023 Breach that Hit 6.6 Million People
infosecurity-magazine.com
Outsourcing giant Capita has been fined £14m by the ICO after a major data breach in 2023
1
0
1
UK, US Sanction Southeast Asia-Based Online Scam Network
infosecurity-magazine.com
Investigations found that the network operates scam centers in Cambodia, Myanmar and across Southeast Asia
0
0
1
Legacy Windows Protocols Still Expose Networks to Credential Theft
infosecurity-magazine.com
Legacy Windows protocols are still exposing organizations to credential theft, Resecurity found
0
2
3
Hacker Group TA585 Emerges With Advanced Attack Infrastructure
infosecurity-magazine.com
A newly identified cybercrime group TA585 is running an advanced cyber operation distributing MonsterV2 malware
1
2
4
Senior Execs Falling Short on Cyber-Attack Preparedness, NCSC Warns
infosecurity-magazine.com
In a joint warning letter, UK ministers urged FTSE 350 CEOs to bolster cyber defenses
0
0
1