π¨ International security chiefs to convene in Glasgow for flagship CYBERUK conference π¨
π Read more.
π Via "UK NCSC"
----------
ποΈ Seen on @cibsecurity
CYBERUK will be delivered by the NCSC and sponsors across four distinct tracks of activity Resilience, Technology, Threat, and Ecosystem.π Read more.
π Via "UK NCSC"
----------
ποΈ Seen on @cibsecurity
National Cyber Security Centre - NCSC.GOV.UK
International security chiefs to convene in Glasgow for flagship CYBERUK conference
CYBERUK will be delivered by the NCSC and sponsors across four distinct tracks of activity: Resilience, Technology, Threat, and Ecosystem.
π Face value: What it takes to fool facial recognition π
π Read more.
π Via "ESET - WeLiveSecurity"
----------
ποΈ Seen on @cibsecurity
ESETs Jake Moore used smart glasses, deepfakes and face swaps to hack widelyused facial recognition systems and he'll demo it all at RSAC 2026.π Read more.
π Via "ESET - WeLiveSecurity"
----------
ποΈ Seen on @cibsecurity
Welivesecurity
Face value: What it takes to fool facial recognition
ESETβs Jake Moore used smart glasses, deepfakes and face swaps to βhackβ widely-used facial recognition systems β and he'll demo it all at RSAC 2026.
π Cyber fallout from the Iran war: What to have on your radar π
π Read more.
π Via "ESET - WeLiveSecurity"
----------
ποΈ Seen on @cibsecurity
The cybersecurity implications of the war in the Middle East extend far beyond the region. Heres where to focus your defenses.π Read more.
π Via "ESET - WeLiveSecurity"
----------
ποΈ Seen on @cibsecurity
Welivesecurity
Cyber fallout from the Iran war: What to have on your radar
The cybersecurity implications of the war in the Middle East extend far beyond the region. Hereβs where to focus your defenses.
π Sednit reloaded: Back in the trenches π
π Read more.
π Via "ESET - WeLiveSecurity"
----------
ποΈ Seen on @cibsecurity
The resurgence of one of Russias most notorious APT groups.π Read more.
π Via "ESET - WeLiveSecurity"
----------
ποΈ Seen on @cibsecurity
Welivesecurity
Sednit reloaded: Back in the trenches
ESET researchers document how the Sednit APT group has reemerged with a modern toolkit centered on two paired implants β BeardShell and Covenant.
π Interpol's 'Operation Synergia III' Nets 94 Arrests in Major Cybercrime Sweep π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
A new law enforcement operation against phishing and ransomware operators led to the takedown of 45,000 malicious IP addresses.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
π Law Enforcement Dismantles SocksEscort Proxy Network in Operation Lightning π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Operation Lightning sees international law enforcement partners shut down SocksEscort, a major malicious proxy service used by cybercriminals worldwide.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Law Enforcement Dismantles SocksEscort Proxy Network
Operation Lightning sees international law enforcement partners shut down βSocksEscort,β a major malicious proxy service used by cybercriminals worldwide
π PixRevolution Malware Hijacks Brazil's PIX Transfers in Real Time π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
PixRevolution Android trojan hijacks Brazils PIX payments in real time using accessibility abuse.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
PixRevolution Malware Hijacks Brazil's PIX Transfers in Real Time
PixRevolution Android trojan hijacks Brazilβs PIX payments in real time using accessibility abuse
π Critical Zero-Click Flaw in n8n Allows Full Server Compromise π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
The critical vulnerability affecting both cloud and selfhosted n8n instances requires no authentication or even n8n account to be exploited.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
π CISA Issues Emergency Directive Over Exploited Cisco SD-WAN Flaws π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
CISA issued urgent directive as attackers exploit Cisco SDWAN flaw granting admin access to networks.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
CISA Issues Emergency Directive Over Exploited Cisco SD-WAN Flaws
CISA issued urgent directive as attackers exploit Cisco SD-WAN flaw granting admin access to networks
π Police Scotland Fined After Sharing Victimβs Phone Data π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
The ICO has fined Police Scotland after it shared the entire contents of a victims phone with her alleged attacker.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Police Scotland Fined After Sharing Victimβs Phone Data
The ICO has fined Police Scotland after it shared the entire contents of a victimβs phone with her alleged attacker
π Iran Claims Massive Cyber-Attack on MedTech Firm Stryker π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
The proIran Handala group claims to have wiped 200,000 systems in destructive wiper malware attack on US firm Stryker.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Iran Claims Massive Cyber-Attack on MedTech Firm Stryker
The pro-Iran Handala group claims to have wiped 200,000 systems in destructive cyber-attack on US firm Stryker
π France: National Cybersecurity Agency Reports Ransomware Attack Drop in 2025 π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
French small and medium businesses remained the organizations most targeted by ransomware in 2025.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
π Interpol's 'Operation Synergia III' Nets 94 Arrests in Major Cybercrime Sweep π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
A new law enforcement operation against phishing and ransomware operators led to the takedown of 45,000 malicious IP addresses.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
π Infosecurity Europe Announces 2026 Keynote Line Up π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Europe 2026 reveals its keynote lineup, featuring Jason Fox, Shlomo Kramer, Cynthia Kaiser and more, with sessions on AI, cloud security and post quantum threats.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Infosecurity Europe Announces 2026 Keynote Line Up
Infosecurity Europe 2026 reveals its keynote line-up, featuring Jason Fox, Shlomo Kramer, Cynthia Kaiser and more, with sessions on AI, cloud security and post quantum threats
π Law Enforcement Dismantles SocksEscort Proxy Network in Operation Lightning π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Operation Lightning sees international law enforcement partners shut down SocksEscort, a major malicious proxy service used by cybercriminals worldwide.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Law Enforcement Dismantles SocksEscort Proxy Network
Operation Lightning sees international law enforcement partners shut down βSocksEscort,β a major malicious proxy service used by cybercriminals worldwide
π Researchers Uncover βLeakyLookerβ Vulnerabilities in Google Looker Studio π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
LeakyLooker flaws in Google Looker Studio let attackers run crosstenant SQL attacks on cloud data.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Researchers Uncover βLeakyLookerβ Vulnerabilities in Google Looker
LeakyLooker flaws in Google Looker Studio let attackers run cross-tenant SQL attacks on cloud data
π PixRevolution Malware Hijacks Brazil's PIX Transfers in Real Time π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
PixRevolution Android trojan hijacks Brazils PIX payments in real time using accessibility abuse.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
PixRevolution Malware Hijacks Brazil's PIX Transfers in Real Time
PixRevolution Android trojan hijacks Brazilβs PIX payments in real time using accessibility abuse
π Compromised WordPress Sites Deliver ClickFix Attacks in Global Infostealer Campaign π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Over 250 legitimate websites, including news outlets and a US Senate candidates official webpage, been compromised to infect visitors with infostealers, warn Rapid7 researchers.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Compromised WordPress Sites Deliver ClickFix Attacks
Over 250 legitimate websites, including news outlets and a US Senate candidateβs official webpage, been compromised to infect visitors with infostealers, warn Rapid7 researchers
π Critical Zero-Click Flaw in n8n Allows Full Server Compromise π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
The critical vulnerability affecting both cloud and selfhosted n8n instances requires no authentication or even n8n account to be exploited.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
π BlackSanta EDR-Killer Targets HR Teams in CV-Themed Campaign π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
BlackSanta malware targets HR staff with fake resumes, kills EDR and steals system data.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
BlackSanta EDR-Killer Targets HR Teams in CV-Themed Campaign
BlackSanta malware targets HR staff with fake resumes, kills EDR and steals system data
π CISA Issues Emergency Directive Over Exploited Cisco SD-WAN Flaws π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
CISA issued urgent directive as attackers exploit Cisco SDWAN flaw granting admin access to networks.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
CISA Issues Emergency Directive Over Exploited Cisco SD-WAN Flaws
CISA issued urgent directive as attackers exploit Cisco SD-WAN flaw granting admin access to networks