Tag: cybercrime
-
Senators re-up bill to expand Secret Service’s financial cybercrime authorities
by
in SecurityNewsThe bipartisan legislation would strengthen the agency’s authorities to investigate criminal activity tied to digital assets. First seen on cyberscoop.com Jump to article: cyberscoop.com/secret-service-financial-cybercrimes-senate-bill/
-
EncryptHub Ransomware Uncovered Through ChatGPT Use and OPSEC Failures
by
in SecurityNewsEncryptHub, a rapidly evolving cybercriminal entity, has come under intense scrutiny following revelations of operational security (OPSEC) failures and extensive reliance on ChatGPT for its operations. This emerging threat actor has been linked to ransomware campaigns, data theft, and the development of advanced malware tools, including EncryptRAT. However, critical mistakes in their operational infrastructure have…
-
Beware! Fake Unpaid Tolls Messages Used in Phishing Attack to Steal Login Credentials
by
in SecurityNewsA surge in phishing text messages claiming unpaid tolls has been linked to a massive phishing-as-a-service (PhaaS) operation. These scams, which have been hitting users’ phones in waves, are part of a sophisticated campaign leveraging a platform called Lucid. Cybercriminals behind this scheme are exploiting legitimate communication technologies like Apple iMessage and Android RCS to…
-
Cybercriminals are trying to loot Australian pension accounts in new campaign
by
in SecurityNewsHackers over the weekend targeted Australian superannuation funds, investment accounts into which portions of employees’ wages are compulsorily placed. First seen on therecord.media Jump to article: therecord.media/cybercriminals-australia-hacking-campaign-pension
-
Malicious PDFs Responsible for 22% of All Email-Based Cyber Threats
by
in SecurityNewsMalicious PDF files have emerged as a dominant threat vector in email-based cyberattacks, accounting for 22% of all malicious email attachments, according to a recent report by Check Point Research. With over 87% of organizations relying on PDFs for business communication, the ubiquitous file format has become a prime target for cybercriminals, who exploit its…
-
OPSEC Failure Exposes Coquettte’s Malware Campaigns on Bulletproof Hosting Servers
by
in SecurityNewsA novice cybercrime actor has been observed leveraging the services of a Russian bulletproof hosting (BPH) provider called Proton66 to facilitate their operations.The findings come from DomainTools, which detected the activity after it discovered a phony website named cybersecureprotect[.]com hosted on Proton66 that masqueraded as an antivirus service.The threat intelligence firm said it First seen…
-
For healthcare orgs, DR means making sure docs can save lives during ransomware infections
by
in SecurityNewsOrganizational, technological resilience combined defeat the disease that is cybercrime First seen on theregister.com Jump to article: www.theregister.com/2025/04/02/disaster_recovery_healthcare/
-
CISA warns of Fast Flux DNS evasion used by cybercrime gangs
by
in SecurityNewsCISA, the FBI, the NSA, and international cybersecurity agencies are calling on organizations and DNS providers to mitigate the “Fast Flux” cybercrime evasion technique used by state-sponsored threat actors and ransomware gangs. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/cisa-warns-of-fast-flux-dns-evasion-used-by-cybercrime-gangs/
-
3 Leading Computer Monitoring Software for Schools
by
in SecurityNewsCybercriminals commonly target K-12 schools. 71% of UK secondary schools reported a breach or attack in the previous year alone, mirrored by schools across the U.S. This, paired with internal threats, requires schools to adopt advanced computer monitoring tools. In this article, we’ll cover key features to consider in computer monitoring software and three ……
-
3 Leading Computer Monitoring Software for Schools
by
in SecurityNewsCybercriminals commonly target K-12 schools. 71% of UK secondary schools reported a breach or attack in the previous year alone, mirrored by schools across the U.S. This, paired with internal threats, requires schools to adopt advanced computer monitoring tools. In this article, we’ll cover key features to consider in computer monitoring software and three ……
-
Hackerangriff auf Heilbronner Marketing
by
in SecurityNewsHacker haben die IT-Systeme der Heilbronn Marketing verschlüsselt.Laut einem Bericht des Südwestrundfunk (SWR) haben Cyberkriminelle kürzlich die IT-Systeme der Heilbronn Marketing GmbH (HMG) verschlüsselt und einen Erpresserbrief hinterlassen. Bisher ist unklar, ob dabei auch Daten gestohlen wurden. Da das Unternehmen unter anderem Feste und Events für die Stadt Heilbronn organisiert und Tickets verkauft, sind auch…
-
EvilCorp and RansomHub Collaborate to Launch Worldwide Attacks on Organizations
by
in SecurityNewsEvilCorp, a sanctioned Russia-based cybercriminal enterprise, has been observed collaborating with RansomHub, one of the most active ransomware-as-a-service (RaaS) operations. This partnership has heightened the threat landscape, as both entities leverage advanced tools and techniques to target organizations across the globe. EvilCorp: A History of Cybercrime EvilCorp, led by Maksim Yakubets, has long been notorious…
-
Hunters International Ransomware Gang Rebranding, Shifting Focus
by
in SecurityNewsThe notorious cybercrime group Hunters International is dropping ransomware to focus on data theft and extortion. The post Hunters International Ransomware Gang Rebranding, Shifting Focus appeared first on SecurityWeek. First seen on securityweek.com Jump to article: www.securityweek.com/hunters-international-ransomware-gang-rebranding-shifting-focus/
-
Amateur Hacker Leverages Russian Bulletproof Hosting Server to Spread Malware
by
in SecurityNewsThe cybercriminal uses the service of Proton66, an infamous Russian-based bulletproof hosting provider, to deploy malware First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/coquettte-hacker-malware-bph/
-
AI Threats Are Evolving Fast, Learn Practical Defense Tactics in this Expert Webinar
by
in SecurityNewsThe rules have changed. Again. Artificial intelligence is bringing powerful new tools to businesses. But it’s also giving cybercriminals smarter ways to attack. They’re moving quicker, targeting more precisely, and slipping past old defenses without being noticed.And here’s the harsh truth: If your security strategy hasn’t evolved with AI in mind, you’re already behind.But you’re…
-
Hackers Selling SnowDog RAT Malware With Remote Control Capabilities Online
by
in SecurityNewsA sophisticated remote access trojan (RAT) dubbedSnowDoghas surfaced on underground cybercrime forums, prompting alarms among cybersecurity experts. Advertised as a tool for “corporate espionage and advanced intrusions,” the malware is being sold by an unidentified threat actor with claims of stealth, evasion, and remote control capabilities. The SnowDog RAT: Features and Risks The seller claims…
-
677.000 Euro von einem Pharmaunternehmen in Österreich gestohlen
by
in SecurityNews
Tags: cybercrimeMarinomed Biotech AG wurde Opfer von Cyberkriminalität First seen on marinomed.com Jump to article: www.marinomed.com/de/news/news-details/adhoc-marinomed-biotech-ag-wurde-opfer-von-cyberkriminalitaet
-
Cybercriminals exfiltrate data in just three days
by
in SecurityNewsIn 56% of Sophos managed detection and response (MDR) and incident response (IR) cases, attackers gained initial access to networks by exploiting external remote services, … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/04/03/breach-median-time/
-
New advanced FIN7’s Anubis backdoor allows to gain full system control on Windows
by
in SecurityNewsFIN7 cybercrime group has been linked to Anubis, a Python-based backdoor that provides remote access to compromised Windows systems. The threat actor FIN7, also known as Savage Ladybug, has developed a new Python-based malware, named Anubis Backdoor, which allows attackers to gain full remote control over infected Windows systems. It executes shell commands and system…
-
Empower Your Team with Efficient Secrets Rotation
by
in SecurityNewsAre Your Secrets Safe? Think Again! Data breaches and cybercrimes are major concerns. It’s an unfortunate reality that security breaches have become increasingly common. You might think your organization’s secrets are well-guarded, but are you confident they won’t fall into the wrong hands? Non-Human Identities (NHIs) and their Secrets Security Management have proven vital for……
-
Cybercriminals target auto industry with sophisticated hacks
by
in SecurityNews
Tags: cybercrimeFirst seen on scworld.com Jump to article: www.scworld.com/brief/cybercriminals-target-auto-industry-with-sophisticated-hacks
-
Medical Imaging Practice Notifying Patients of Recent Hack
by
in SecurityNewsLawsuits Allege Cybercrime Gang Medusa Stole Data of 132,000 People. An Arizona-based medical imaging practice with locations in 11 states is notifying patients that their data was compromised in a January cyberattack. Litigation filed against the company allege ransomware gang Medusa stole sensitive data pertaining to at least 132,000 people in the incident. First seen…
-
Threat-informed defense for operational technology: Moving from information to action
by
in SecurityNews
Tags: access, ai, attack, automation, blueteam, cloud, control, crime, cyber, cyberattack, cybercrime, cybersecurity, data, defense, detection, exploit, finance, fortinet, framework, group, incident response, infrastructure, intelligence, law, malicious, malware, mitre, network, phishing, PurpleTeam, ransomware, RedTeam, resilience, risk, service, soar, strategy, tactics, technology, threat, tool, usaThe rise of cybercrime-as-a-service Today’s macro threat landscape is a flourishing ecosystem of cybercrime facilitated by crime-as-a-service (CaaS) models. Cybercriminal networks now operate like legitimate businesses, with specialized units dedicated to activities such as money laundering, malware development, and spear phishing. This ecosystem lowers the barrier to entry for cybercrime, enabling low-skilled adversaries to launch…
-
AI Giving Rise of the ‘Zero-Knowledge’ Threat Actor
by
in SecurityNewsThe rise of zero-knowledge threat actors powered by AI marks a turning point in the business of cybercrime where sophisticated attacks are no longer confined to skilled attackers. The post AI Giving Rise of the ‘Zero-Knowledge’ Threat Actor appeared first on SecurityWeek. First seen on securityweek.com Jump to article: www.securityweek.com/ai-giving-rise-of-the-zero-knowledge-threat-actor/
-
Prince Ransomware An Automated Open-Source Ransomware Builder Freely Available on GitHub
by
in SecurityNews
Tags: attack, cyber, cybercrime, cybersecurity, exploit, github, healthcare, open-source, programming, ransomware, toolThe cybersecurity landscape has witnessed a concerning development with the emergence of >>Prince Ransomware,
-
For healthcare orgs, disaster recovery means making sure docs can save lives during ransomware infection
by
in SecurityNewsOrganizational, technological resilience combined defeat the disease that is cybercrime First seen on theregister.com Jump to article: www.theregister.com/2025/04/02/disaster_recovery_healthcare/
-
Hacker Leaks 270,000 Samsung Customer Records”, Stolen Credentials Were Left Unchecked for Years
by
in SecurityNewsIn a troubling security breach, a hacker exposed the personal data of over 270,000 Samsung customers in Germany, freely dumping it on the internet. The hack, attributed to a cybercriminal operating under the alias “GHNA,” occurred when the attacker accessed a system used by Samsung’s German customer service. According to cybersecurity firm Hudson Rock, the…