Cyber (In)Security and Surveillance (4 March 2026)

Global Takedown Neutralizes Tycoon2FA Phishing Service

(Phil Muncaster – Infosecurity Magazine) Investigators claimed today to have taken out another key player in the global cybercrime supply chain after seizing infrastructure linked to phishing-as-a-service (PhaaS) operation Tycoon 2FA. The effort was led by Microsoft and Europol and supported by a range of industry partners, including TrendAI, Cloudflare, Coinbase, Crowell, eSentire, Health-ISAC, Intel471, Proofpoint, Resecurity, The Shadowserver Foundation, and SpyCloud. Over 300 domains linked to Tycoon2FA were seized in the operation, according to TrendAI. – https://www.infosecurity-magazine.com/news/global-takedown-tycoon2fa-phishing/

Surge in Attacks on Surveillance Cameras Linked to Iranian Hackers

(Alessandro Mascellino – Infosecurity Magazine) A surge in attempts to compromise internet-connected surveillance cameras across the Middle East has been identified during the ongoing regional conflict, with activity attributed to infrastructure linked to Iranian threat actors. The targeting, which began intensifying on February 28, has affected Israel, Qatar, Bahrain, Kuwait, the UAE and Cyprus, with additional focused activity observed in parts of Lebanon on March 1. The findings, released by Check Point Research (CPR), point to a coordinated campaign against devices manufactured by Hikvision and Dahua. The researchers said the pattern of activity aligns with Iran’s established military doctrine of using compromised cameras to support operational planning and battle damage assessment following missile strikes. – https://www.infosecurity-magazine.com/news/iran-attacks-surveillance-cameras/

Multi-Stage “BadPaw” Malware Campaign Targets Ukraine

(Alessandro Mascellino – Infosecurity Magazine) A newly identified malware campaign leveraging a Ukrainian email service to build credibility has been uncovered by cybersecurity researchers. The operation begins with an email sent from an address hosted on ukr[.]net, a popular Ukrainian provider previously abused by the Russian-linked threat actor APT28 in past campaigns. According to an advisory by researchers at ClearSky,  who have named the malware “BadPaw,” the attack is triggered when a recipient clicks a link claiming to host a ZIP archive. Instead of initiating a direct download, the victim is redirected to a domain that loads a tracking pixel, allowing the attacker to confirm engagement. A second redirect then delivers the ZIP file. – https://www.infosecurity-magazine.com/news/badpaw-malware-targets-ukraine/

AI Raises the Cybersecurity Stakes — But People Still Open the Door

(John Eccleshare – Infosecurity Magazine) When people think about cybersecurity, they often picture a hooded figure in a dark room, hammering away at a keyboard, trying to break through a digital perimeter. It’s a familiar image, and an increasingly misleading one. Today’s reality isn’t man vs. machine; it’s human vs. human. What is different today, is you no longer need to be deeply technical or exceptionally skilled to play the attacker. It’s here that AI is lowering the barrier to entry and changing the rules of engagement. Yes, generative AI has given security professionals new ways to accelerate detection and response. But it’s also given bad actors a powerful upgrade in their ability to deceive. Well-written phishing emails, deepfake voice calls, and highly targeted social engineering attacks are now faster to produce and harder to detect. The tools of the trade are persuasion, misdirection, and manipulation, which means your people, not your perimeter, continue to be the most exposed surface area. – https://www.infosecurity-magazine.com/opinions/ai-cybersecurity-people-open-door/

Calls for Global Digital Estate Standard as Posthumous Deepfake Fraud Risk Grows

(Phil Muncaster – Infosecurity Magazine) A lack of standardization in the way governments and tech firms handle the digital accounts of the deceased could invite fraud and exploitation, the OpenID Foundation has warned. The standards body released a report yesterday calling for a new framework to close systemic gaps across platforms, jurisdictions and industries. The Unfinished Digital Estate, warned that no consistent global standards exist to ensure that devices and email, social media, cryptocurrency and other accounts are both accessible to the right people and protected after the account owner dies. – https://www.infosecurity-magazine.com/news/digital-estate-post-death-deepfake/

Adecco Group Global Head of IT Security Alex Gomez on Balancing Cybersecurity, AI and Innovation

(Danny Palmer – Infosecurity Magazine) As one of the largest human resources and recruitment firms in the world, The Adecco Group depends on highly secure and efficient systems to support its global operations. With more than 35,000 employees, over 100,000 client organizations, and two million people placed into temporary and permanent roles every year, Adecco operates on a global scale. At the helm of the group’s global IT security, risk and compliance operation is Alex Gomez who has responsibility for ensuring that employees, contractors and clients stay secure in an environment where emails and file sharing are key to business. – https://www.infosecurity-magazine.com/interviews/adeccos-alex-gomez-interview/

Deepfake scams target Indian global executives

(DigWatch) A deepfake video of Bombay Stock Exchange chief executive Sundararaman Ramamurthy circulated on social media in India, falsely offering stock advice to investors. The exchange moved quickly to report and remove the content, warning the public not to trust fake investment clips. Cybersecurity experts say such cases are rising sharply, with one US firm estimating a 3,000 percent increase in deepfake incidents over two years. Executives in the US and the UK have also been impersonated using AI-generated audio and video. – https://dig.watch/updates/deepfake-scams-target-indian-global-executives

AI Cybersecurity stability framework unlocks advanced Non Human Identity management

(DigWatch) AI is increasingly positioned as a key driver of cybersecurity stability. By analysing large volumes of data and detecting anomalies in real time, AI helps organisations strengthen defence systems and respond faster to evolving digital threats. Modern cybersecurity challenges are closely linked to the rise of Non-Human Identities (NHIs), including machine accounts, tokens, and automated credentials. These identities require continuous monitoring and secure lifecycle management to prevent unauthorised access and data breaches. – https://dig.watch/updates/ai-cybersecurity-stability-framework-unlocks-advanced-non-human-identity-management

Latest articles

Related articles