News

Infosecurity Magazine
infosecurity-magazine. com-magazine. com

How Businesses Should Approach the PQC Transition

6+ mon, 1+ day ago  (1823+ words) Recently standardized by the US National Institute of Standards and Technology (NIST), post-quantum cryptography (PQC) empowers organizations to secure their systems against the "harvest now, decrypt later" threat. This threat consists in threat actors collecting encrypted files and data today…...

Infosecurity Magazine
infosecurity-magazine. com-magazine. com

Google Introduces Unique AI Agent Identities in New Gemini Enterprise

6+ day, 20+ hour ago  (920+ words) Google is betting big on agentic AI and wants professionals to track their AI agents on its new hub Gemini Enterprise Agent Platform. Introduced a few months after the launch of Gemini Enterprise, the Agent Platform is Google's new hub…...

Infosecurity Magazine
infosecurity-magazine. com-magazine. com

Shai-Hulud-Like Worm Targets Developers via npm and AI Tools

2+ mon, 1+ week ago  (240+ words) A supply chain worm resembling earlier Shai-Hulud malware has been discovered spreading through malicious npm packages. According to Socket's Threat Research Team, the campaign, tracked as SANDWORM_MODE, has been identified across at least 19 npm packages published under two aliases, official334 and javaorg....

Infosecurity Magazine
infosecurity-magazine. com-magazine. com

Cyber is the Number One Global "People Risk," Says Marsh

4+ hour, 1+ min ago  (386+ words) Cyber-related challenges dominate the top 10 people risks highlighted in a new global survey from Marsh. The insurance broker's 2026 People Risks report is compiled from interviews with over 4500 HR and risk professionals in 26 global markets. Technological change and disruption was cited…...

Infosecurity Magazine
infosecurity-magazine. com-magazine. com

CISA Closes Ten Emergency Directives After Federal Cyber Reviews

3+ mon, 2+ week ago  (332+ words) Ten Emergency Directives issued between 2019 and 2024 have been formally retired by the US Cybersecurity and Infrastructure Security Agency (CISA) following a review that found their objectives had been met. The decision marks the most significant number of Emergency Directives closed…...

Infosecurity Magazine
infosecurity-magazine. com-magazine. com

Attackers Exploit DVR Command Injection Flaw to Deploy Botnet

1+ week, 2+ day ago  (558+ words) A newly identified malware campaign has been observed exploiting a command injection flaw in digital video recorder (DVR) devices to deploy a Mirai-based botnet, according to analysis by Forti Guard Labs. The activity targets CVE-2024-3721 in TBK DVR systems, enabling…...

Infosecurity Magazine
infosecurity-magazine. com-magazine. com

Utilities Tech Supplier Itron Discloses Cyber-Attack

2+ day, 22+ hour ago  (280+ words) Itron, a global technology provider for the utilities industry, has disclosed it suffered a cybersecurity breach. In an 8-K form filed to the US Securities and Exchange Commission (SEC) on April 24, the US-based firm revealed its IT systems were breached…...

Infosecurity Magazine
infosecurity-magazine. com-magazine. com

Black File Group Targets Retail and Hospitality with Vishing Attacks

2+ day, 23+ hour ago  (444+ words) Security researchers have revealed details of a new extortion group that has been actively targeting retail and hospitality businesses since February 2026. Palo Alto Networks" Unit 42 teamed up with the Retail and Hospitality Information Security and Analysis Center (RH-ISAC)to publish…...

Infosecurity Magazine
infosecurity-magazine. com-magazine. com

Soft Market, Hard Choices: The State of Cyber Insurance

3+ mon, 4+ week ago  (1062+ words) In 2025, high-profile cyber-attacks against retail brands, airlines and car manufacturers have thrown the risks associated with devastating cyber incidents into sharp relief. They have also put the spotlight on how organizations protect themselves, including through cyber insurance. The attack against…...

Infosecurity Magazine
infosecurity-magazine. com-magazine. com

Researchers Uncover 10 In-the-Wild Indirect Prompt Injection Attacks

1+ week, 2+ hour ago  (542+ words) Security researchers have discovered 10 new indirect prompt injection (IPI) payloads targeting AI agents with malicious instructions designed to achieve financial fraud, data destruction, API key theft and more. Threat actors achieve IPI by poisoning web content so that when an…...