Tag: crimes
-
UK Police Are Ill-Equipped to Tackle AI Crimes
by
in SecurityNewsNew Turing Institute Report Urges Government to Create AI Crime Task Force. British law enforcement agencies are ill-equipped to tackle artificial intelligence-enabled cybercrime, a report by The Alan Turing Institute says, pointing to an enormous gap between police technical capabilities and the growing sophistication of threat actors. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/uk-police-are-ill-equipped-to-tackle-ai-crimes-a-27888
-
Microsoft Busts Hackers Selling Illegal Azure AI Access
LLMjacking operation leveraged illicit access GenAI services to produce explicit celebrity images and other harmful content, Microsoft’s digital crimes unit says. First seen on darkreading.com Jump to article: www.darkreading.com/application-security/microsoft-openai-hackers-selling-illicit-access-azure-llm-services
-
How Banks Can Adapt to the Rising Threat of Financial Crime
Banking fraud and financial crimes are growing more sophisticated every day. By understanding the threats and building strong collaborations, banks can protect themselves and their clients. First seen on darkreading.com Jump to article: www.darkreading.com/cyber-risk/how-banks-adapt-rising-threat-financial-crime
-
Unusual attack linked to Chinese APT group combines espionage and ransomware
by
in SecurityNews
Tags: apt, attack, breach, china, cloud, country, credentials, crime, crimes, crypto, cyber, cybercrime, cyberespionage, data, encryption, espionage, exploit, finance, firewall, government, group, hacker, infection, insurance, intelligence, korea, microsoft, network, north-korea, ransom, ransomware, russia, software, tactics, technology, threat, veeam, vulnerabilityThe attacker demanded a $2-million ransom: The attack that resulted in the deployment of the RA World ransomware program, as well as data exfiltration, had the same chain: the toshdpdb.exe loading toshdpapi.dll then decrypting toshdp.dat which resulted in the PlugX variant being deployed. The difference is the attacker then chose to deploy the RA World…
-
The Loneliness Epidemic Is a Security Crisis
by
in SecurityNewsRomance scams cost victims hundreds of millions of dollars a year. As people grow increasingly isolated, and generative AI helps scammers scale their crimes, the problem could get worse. First seen on wired.com Jump to article: www.wired.com/story/loneliness-epidemic-romance-scams-security-crisis/
-
Police arrest teenager suspected of hacking NATO and numerous Spanish institutions
by
in SecurityNewsSpain’s National Police, in a joint operation with the Civil Guard, has arrested an 18-year-old suspected of being the hacker going by aliases including “Natohub,” and known for hacking the computer services of private companies and Spanish institutions such as the Civil Guard, the Ministry of Defense, the National Mint, and the Ministry of Education,…
-
Microsoft sues overseas threat actor group over abuse of OpenAI service
by
in SecurityNewsMicrosoft has filed suit against 10 unnamed people (“Does”), who are apparently operating overseas, for misuse of its Azure OpenAI platform, asking the Eastern District of Virginia federal court for damages and injunctive relief.The suit was filed in late December but was not made public until last Friday, when the initial sealed filings were revealed.…
-
Microsoft Sues Hacking Group Exploiting Azure AI for Harmful Content Creation
by
in SecurityNewsMicrosoft has revealed that it’s pursuing legal action against a “foreign-based threatactor group” for operating a hacking-as-a-service infrastructure to intentionally get around the safety controls of its generative artificial intelligence (AI) services and produce offensive and harmful content.The tech giant’s Digital Crimes Unit (DCU) said it has observed the threat actors “develop First seen on…
-
Hackers Brute Force Your Passwords?
by
in SecurityNewsCybercrimes have always existed as a result of internet usage in our society. Traversing the wide web, hackers are trying to exploit any nooks and crannies in the system. While many new types of crimes are arising on the internet, brute-force attacks are still the most common. Based on recent research, they have grown from…
-
792 Syndicate Suspects Arrested in Massive Crypto and Romance Scam: The Rise of Cybercrime as a Corporate Enterprise
by
in SecurityNewsThe Economic and Financial Crimes Commission (EFCC) recently executed a landmark operation in Lagos, Nigeria, arresting 792 suspects for their alleged involvement in a cryptocurrency investment fraud and romance scam. The raid, conducted at an imposing seven-storey building in Victoria Island, sheds light on the systematic infrastructure and advanced methods employed by these fraud networks…
-
Nigeria Cracks Down on Cryptocurrency Investment Fraud and Romance Scams
by
in SecurityNewsThe suspects were apprehended in a surprise operation at their hideout in Lagos following intelligence received by Nigeria’s Economic and Financial Crimes Commission First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/nigeria-cracks-down-cryptocurrency/
-
Next-gen cybercrime: The need for collaboration in 2025
by
in SecurityNews
Tags: ai, attack, awareness, cloud, crime, crimes, cyber, cyberattack, cybercrime, cybersecurity, defense, exploit, framework, group, healthcare, infrastructure, intelligence, risk, service, strategy, tactics, technology, threat, training, vulnerabilityCybercrime is a relentless and evolving threat to organizations worldwide. However, with the right insights, we can significantly enhance our security, mitigate risks, and stay ahead of these criminals.FortiGuard Labs’ Cyberthreat Predictions for 2025 report is designed to provide exactly these insights. It identifies emerging threat trends for the coming year and offers actionable guidance…
-
Cybercrime techniques leveraged for child-targeted crimes
by
in SecurityNewsFirst seen on scworld.com Jump to article: www.scworld.com/brief/cybercrime-techniques-leveraged-for-child-targeted-crimes
-
European law enforcement breaks high-end encryption app used by suspects
by
in SecurityNews
Tags: awareness, backdoor, ciso, communications, computing, crime, crimes, cryptography, data, defense, encryption, endpoint, exploit, flaw, group, hacker, infrastructure, international, jobs, law, malware, monitoring, service, technology, threat, tool, vulnerabilityA group of European law enforcement agencies were able to crack a high-level encryption app that a group of suspects created to avoid law enforcement monitoring, according to a statement issued Tuesday by Europol. Europol, understandably, did not provide any specifics about how they broke the app, but encryption experts said that the most likely method…