Information Security and IT Security News - Infosecurity Magazine (2025)

Table of Contents
Change Healthcare Breach Affects 100 Million Americans Ukraine Warns of Mass Phishing Campaign Targeting Citizens Data Irish Data Protection Watchdog Fines LinkedIn $336m Inequity Challenges Women in Digital Trust, But Progress is Being Made MacOS-Focused Ransomware Attempts Leverage LockBit Brand Lazarus Group Exploits Google Chrome Flaw in New Campaign Penn State Settles for $1.25M Over Cybersecurity Violations White House Issues AI National Security Memo Fortinet Confirms Exploitation of Critical FortiManager Zero-Day Vulnerability UK Government Introduces New Data Governance Legislation Cybersecurity Teams Largely Ignored in AI Policy Development UK Government Urges Organizations to Get Cyber Essentials Certified New Malware WarmCookie Targets Users with Malicious Links Embargo Ransomware Gang Deploys Customized Defense Evasion Tools Former British PM Cameron Calls for Tech Engagement with China Despite Cyber Threats 70% of Leaders See Cyber Knowledge Gap in Employees Internet Archive Secures Zendesk Account, Works Toward Full-Service Restoration US Government Pledges to Cyber Threat Sharing Via TLP Protocol UK Government Weighs Review of Computer Misuse Act to Combat Cybercrime US Energy Sector Vulnerable to Supply Chain Attacks Why not watch? Reinforcing Firewall Security: The Need to Adapt to Persistent Cyber Threats Identifying Concentration Risk and Securing the Supply Chain Mastering Australian Privacy Act and Essential Eight While Improving Cybersecurity Posture How to Manage Your Risks and Protect Your Financial Data What’s hot on Infosecurity Magazine? US Government Pledges to Cyber Threat Sharing Via TLP Protocol 70% of Leaders See Cyber Knowledge Gap in Employees Internet Archive Secures Zendesk Account, Works Toward Full-Service Restoration LLMjacking and Open-Source Tool Abuse Surge in 2024 Cloud Attacks FIN7 Gang Hides Malware in AI “Deepnude” Sites Phishing Attack Impacts Over 92,000 Transak Users New Cyber Regulations: What it Means for UK and EU Businesses The Future of Fraud: Defending Against Advanced Account Attacks Bouncing Back: Building Organizational Resilience in the Face of Cyber-Attack Learn Key Strategies for Industrial Data Security Reinforcing Firewall Security: The Need to Adapt to Persistent Cyber Threats How to Proactively Remediate Rising Web Application Threats #CyberMonth: Software Updates, A Double-Edged Sword for Cybersecurity Professionals Russia's SVR Targets Zimbra, TeamCity Servers for Cyber Espionage #CyberMonth: How to Outsmart Novel Phishing Tactics and Techniques Ivanti: Three CSA Zero-Days Are Being Exploited in Attacks #CyberMonth: How to Protect Your Digital Life, Six Ways to Stay Safe Online 31 New Ransomware Groups Join the Ecosystem in 12 Months References
  1. Information Security and IT Security News - Infosecurity Magazine (1)

    Change Healthcare Breach Affects 100 Million Americans

    Updated figures from the HHS revealed that 100 million patients have been notified that their data was breached in the Change Healthcare ransomware attack

  2. Information Security and IT Security News - Infosecurity Magazine (2)

    Ukraine Warns of Mass Phishing Campaign Targeting Citizens Data

    CERT-UA said the phishing campaign lures victims into downloading malware used to exfiltrate files containing sensitive personal data

  3. Information Security and IT Security News - Infosecurity Magazine (3)

    Irish Data Protection Watchdog Fines LinkedIn $336m

    LinkedIn violated the EU’s GDPR in how it processes its users personal data for behavioral purposes

  4. Information Security and IT Security News - Infosecurity Magazine (4)

    Inequity Challenges Women in Digital Trust, But Progress is Being Made

    A new ISACA study reveals that pay inequity and a lack of female leadership are significant issues noted by women in the digital trust sector

  5. Information Security and IT Security News - Infosecurity Magazine (5)

    MacOS-Focused Ransomware Attempts Leverage LockBit Brand

    An unidentified threat actor has attempted to develop ransomware targeting macOS devices, posing as LockBit

  6. Information Security and IT Security News - Infosecurity Magazine (6)

    Lazarus Group Exploits Google Chrome Flaw in New Campaign

    Lazarus Group exploited Google Chrome zero-day, infecting systems with Manuscrypt malware

  7. Information Security and IT Security News - Infosecurity Magazine (7)

    Penn State Settles for $1.25M Over Cybersecurity Violations

    Penn State will pay $1.25m for failing federal cybersecurity standards in DoD and NASA contracts

  8. Information Security and IT Security News - Infosecurity Magazine (8)

    White House Issues AI National Security Memo

    The National Security Memorandum on AI sets out actions for the federal government to ensure the safe, secure and trustworthy development of AI

  9. Information Security and IT Security News - Infosecurity Magazine (9)

    Fortinet Confirms Exploitation of Critical FortiManager Zero-Day Vulnerability

    This high-severity flaw, dubbed FortiJump by security researcher Kevin Beaumont, has been added to CISA’s KEV catalog

  10. Information Security and IT Security News - Infosecurity Magazine (10)

    UK Government Introduces New Data Governance Legislation

    The Data (Use and Access) Bill governs digital verification services and the use of personal data in public services, and will revamp the Information Commissioner’s Office

  11. Information Security and IT Security News - Infosecurity Magazine (11)

    Cybersecurity Teams Largely Ignored in AI Policy Development

    A new ISACA study has revealed that cybersecurity professionals are often overlooked in the development of AI policies

  12. Information Security and IT Security News - Infosecurity Magazine (12)

    UK Government Urges Organizations to Get Cyber Essentials Certified

    On the 10th anniversary since Cyber Essentials was introduced, the UK government has highlighted the impact the scheme has had in preventing attacks

  13. Information Security and IT Security News - Infosecurity Magazine (13)

    New Malware WarmCookie Targets Users with Malicious Links

    WarmCookie malware, aka BadSpace, spreads via malspam, malvertising and enables persistent access

  14. Information Security and IT Security News - Infosecurity Magazine (14)

    Embargo Ransomware Gang Deploys Customized Defense Evasion Tools

    The recently discovered Embargo ransomware group is using Rust-based custom tools to overcome victims’ security defenses, ESET researchers have observed

  15. Information Security and IT Security News - Infosecurity Magazine (15)

    Former British PM Cameron Calls for Tech Engagement with China Despite Cyber Threats

    Former UK PM David Cameron called for stronger defenses against Chinese cyber espionage while advocating collaboration with Beijing, coinciding with the BRICS Summit

  16. Information Security and IT Security News - Infosecurity Magazine (16)

    70% of Leaders See Cyber Knowledge Gap in Employees

    70% of leaders see cyber knowledge gap; AI attacks are harder to detect, 60% expect more victims

  17. Information Security and IT Security News - Infosecurity Magazine (17)

    Internet Archive Secures Zendesk Account, Works Toward Full-Service Restoration

    While Internet Archive’s services slowly resume, the data breach reveals the non-profit’s security failures

  18. Information Security and IT Security News - Infosecurity Magazine (18)

    US Government Pledges to Cyber Threat Sharing Via TLP Protocol

    The US government has issued guidance for federal agencies on the use of Traffic Light Protocol, designed to boost intelligence sharing with the cybersecurity community

  19. Information Security and IT Security News - Infosecurity Magazine (19)

    UK Government Weighs Review of Computer Misuse Act to Combat Cybercrime

    The British Minister for Security Dan Jarvis said at Recorded Future’s Predict 2024 that the new government was considering reforming the 1990 legislation

  20. Information Security and IT Security News - Infosecurity Magazine (20)

    US Energy Sector Vulnerable to Supply Chain Attacks

    45% of security breaches in the energy sector in the past year were third-party related, according to a report by Security Scorecard and KPMG

Newer123456Older

Why not watch?

  1. Reinforcing Firewall Security: The Need to Adapt to Persistent Cyber Threats

    Information Security and IT Security News - Infosecurity Magazine (21)

  2. Identifying Concentration Risk and Securing the Supply Chain

    Information Security and IT Security News - Infosecurity Magazine (22)

  3. Mastering Australian Privacy Act and Essential Eight While Improving Cybersecurity Posture

    Information Security and IT Security News - Infosecurity Magazine (23)

  4. How to Manage Your Risks and Protect Your Financial Data

    Information Security and IT Security News - Infosecurity Magazine (24)

What’s hot on Infosecurity Magazine?

US Government Pledges to Cyber Threat Sharing Via TLP Protocol

News

1

70% of Leaders See Cyber Knowledge Gap in Employees

News

2

Internet Archive Secures Zendesk Account, Works Toward Full-Service Restoration

News

3

LLMjacking and Open-Source Tool Abuse Surge in 2024 Cloud Attacks

News

4

FIN7 Gang Hides Malware in AI “Deepnude” Sites

News

5

Phishing Attack Impacts Over 92,000 Transak Users

News

6

New Cyber Regulations: What it Means for UK and EU Businesses

Webinar

1

The Future of Fraud: Defending Against Advanced Account Attacks

Webinar

2

Bouncing Back: Building Organizational Resilience in the Face of Cyber-Attack

Webinar

3

Learn Key Strategies for Industrial Data Security

Webinar

4

Reinforcing Firewall Security: The Need to Adapt to Persistent Cyber Threats

Webinar

5

How to Proactively Remediate Rising Web Application Threats

Webinar

6

#CyberMonth: Software Updates, A Double-Edged Sword for Cybersecurity Professionals

News Feature

1

Russia's SVR Targets Zimbra, TeamCity Servers for Cyber Espionage

News

2

#CyberMonth: How to Outsmart Novel Phishing Tactics and Techniques

News Feature

3

Ivanti: Three CSA Zero-Days Are Being Exploited in Attacks

News

4

#CyberMonth: How to Protect Your Digital Life, Six Ways to Stay Safe Online

News Feature

5

31 New Ransomware Groups Join the Ecosystem in 12 Months

News

6

Information Security and IT Security News - Infosecurity Magazine (2025)

References

Top Articles
Latest Posts
Recommended Articles
Article information

Author: Melvina Ondricka

Last Updated:

Views: 6081

Rating: 4.8 / 5 (68 voted)

Reviews: 91% of readers found this page helpful

Author information

Name: Melvina Ondricka

Birthday: 2000-12-23

Address: Suite 382 139 Shaniqua Locks, Paulaborough, UT 90498

Phone: +636383657021

Job: Dynamic Government Specialist

Hobby: Kite flying, Watching movies, Knitting, Model building, Reading, Wood carving, Paintball

Introduction: My name is Melvina Ondricka, I am a helpful, fancy, friendly, innocent, outstanding, courageous, thoughtful person who loves writing and wants to share my knowledge and understanding with you.