Tag: cybercrime
-
Top cyber attacks of 2024: Lessons from the year’s biggest breaches
by
in SecurityNewsThe cyber attacks of 2024 were memorable to say the least. This year, cybercriminals targeted critical industries and high-profile organizations, using increasingly sophisticated tactics to exploit First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/12/top-cyber-attacks-of-2024-lessons-from-the-years-biggest-breaches/
-
Multi-Cloud, Immutable Solutions und Virtualisierungsmigration als Backup-Trends 2025
by
in SecurityNewsDie SEP wirft einen Blick in die Zukunft der Backup-Branche. Basierend auf umfangreichem Feedback von Partnern und Kunden benennt der deutsche Hersteller von Backup- und Disaster-Recovery-Software »Made in Germany«, die fünf wichtigsten Trends für 2025. Dazu zählen Multi-Cloud, Schutz gegen Cyberkriminalität und eine hohe Dynamik durch die Suche nach alternativen Virtualisierungslösungen wie Proxmox. Multi-Cloud-Strategien… First…
-
How Nation-State Cybercriminals Are Targeting the Enterprise
by
in SecurityNewsCombating nation-state threat actors at the enterprise level requires more than just cyber readiness and investment, it calls for a collaborative effort. First seen on darkreading.com Jump to article: www.darkreading.com/vulnerabilities-threats/how-nation-state-cybercriminals-target-enterprise
-
US unseals complaint against Russian-Israeli accused of working for LockBit
by
in SecurityNewsRostislav Panev is facing 40 counts for allegedly working for the cybercrime group as a software developer from 2019 up until February 2024, the same month that law enforcement disrupted the LockBit scheme by seizing its darknet website and infrastructure.]]> First seen on therecord.media Jump to article: therecord.media/us-unseals-lockbit-complaint-israel
-
AI is becoming the weapon of choice for cybercriminals
by
in SecurityNewsAI changes how organizations look at cybersecurity GenAI is compromising security while promising efficiency This article highlights key findings from 2024 reports on AI and … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2024/12/20/ai-technologies-challenges-2024/
-
Healthcare in the Cross Hairs: Cybercriminals Have Found Another High-Value Target
by
in SecurityNewsHere at ColorTokens, we’ve recently been engaged with a leading cancer center to improve its cybersecurity posture. After phase one of the deployment, they shared with us that the benefit they derived is gaining the peace of mind that their “critical digital operations have the resilience they need to continue to seamlessly deliver patient care……
-
New Mobile Phishing Targets Executives with Fake DocuSign Links
by
in SecurityNewsCybercriminals are using advanced techniques to target executives with mobile-specific phishing attacks. First seen on hackread.com Jump to article: hackread.com/mobile-phishing-executives-fake-docusign-links/
-
US eyes ban on TP-Link routers amid cybersecurity concerns
by
in SecurityNews
Tags: attack, business, china, compliance, computer, corporate, country, cyber, cyberattack, cybercrime, cybersecurity, ddos, defense, espionage, exploit, flaw, government, hacking, infrastructure, intelligence, law, malicious, microsoft, network, risk, router, technology, threat, vulnerability, wifiThe US government is investigating TP-Link, a Chinese company that supplies about 65% of routers for American homes and small businesses, amid concerns about national security risks. Reports suggest these routers have vulnerabilities that cybercriminals exploit to compromise sensitive enterprise data.Investigations by the Commerce, Defense, and Justice Departments indicate that the routers may have been…
-
BADBOX Botnet Hacked 74,000 Android Devices With Customizable Remote Codes
by
in SecurityNewsBADBOX is a cybercriminal operation infecting Android devices like TV boxes and smartphones with malware before sale, which are often sold through reputable retailers and pose a significant threat to users due to their pre-installed malicious software, making detection challenging. It previously thought eradicated has resurfaced with a significantly expanded reach, infecting over 192,000 Android…
-
Raccoon Stealer malware operator gets 5 years in prison after guilty plea
by
in SecurityNewsUkrainian national Mark Sokolovsky was sentenced today to five years in prison for his involvement in the Raccoon Stealer malware cybercrime operation. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/raccoon-stealer-malware-operator-gets-5-years-in-prison-after-guilty-plea/
-
A new ransomware regime is now targeting critical systems with weaker networks
by
in SecurityNews
Tags: access, attack, authentication, breach, control, corporate, credentials, cybercrime, data, defense, exploit, extortion, finance, flaw, fortinet, group, infrastructure, law, lockbit, malware, mfa, network, ransomware, risk, tactics, usa, vmware, vpn, vulnerability, zyxelThe year 2024’s ransomware shake-up, fueled by law enforcement crackdowns on giants like LockBit, has shifted focus to critical operations, with major attacks this year hitting targets like Halliburton, TfL, and Arkansas water plant.A Dragos study for the third quarter of 2024 highlighted a surge in activity from new groups like RansomHub, Play, and Fog,…
-
Cybercriminals Exploit Google Calendar and Drawings in Phishing Campaigns
by
in SecurityNewsAttackers are ingeniously exploiting Google Calendar and Google Drawings in phishing campaigns, targeting unsuspecting individuals and organizations. Leveraging the inherent trust in Google’s widely used tools, cybercriminals are successfully deceiving users into revealing sensitive information and compromising their accounts. Google Calendar: A Trusted Tool Turned Target Google Calendar, a widely used scheduling tool with over…
-
Consumers wrongly attribute all data breaches to cybercriminals
by
in SecurityNewsBreaches in 2024 had less impact on consumers’ trust in brands compared to the previous year (a 6.5% decrease from 62% in 2023 to 58% in 2024), according to a recent Vercara … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2024/12/18/data-breach-consumers-trust/
-
Identity crisis: Cybercriminals are exploiting trust faster than you can defend it
by
in SecurityNewsFirst seen on scworld.com Jump to article: www.scworld.com/feature/identity-crisis-cybercriminals-are-exploiting-trust-faster-than-you-can-defend-it
-
Winnti-Like ‘Glutton’ Backdoor Targets Cybercriminals
by
in SecurityNewsMalware Exploits Cybercrime Ecosystem for Profit. Hackers are using a variant of a backdoor that’s the hallmark of a Chinese threat actor suspected of ties to Beijing in order to target the cybercriminal underground. The malware t shares near-complete similarity with a backdoor exclusively used by the Winnti Group. First seen on govinfosecurity.com Jump to…
-
5 Modern Computer Safety Tips You Should Know About
by
in SecurityNewsProtecting your computer in the hyper-connected world of today goes beyond merely preventing bothersome viruses. Smarter, quicker, and far more invasive than ever before are modern dangers. Cybercriminals no longer depend on simple strategies; they leverage flaws, fool unsuspecting consumers,… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/12/5-modern-computer-safety-tips-you-should-know-about/
-
Next-gen cybercrime: The need for collaboration in 2025
by
in SecurityNews
Tags: ai, attack, awareness, cloud, crime, crimes, cyber, cyberattack, cybercrime, cybersecurity, defense, exploit, framework, group, healthcare, infrastructure, intelligence, risk, service, strategy, tactics, technology, threat, training, vulnerabilityCybercrime is a relentless and evolving threat to organizations worldwide. However, with the right insights, we can significantly enhance our security, mitigate risks, and stay ahead of these criminals.FortiGuard Labs’ Cyberthreat Predictions for 2025 report is designed to provide exactly these insights. It identifies emerging threat trends for the coming year and offers actionable guidance…
-
Cybercriminals Exploit Google Calendar to Spread Malicious Links
by
in SecurityNewsCheck Point research reveals cybercriminals are using Google Calendar and Drawings to send malicious links, bypassing traditional email security First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/cybercriminals-exploit-google/
-
To Defeat Cybercriminals, Understand How They Think
by
in SecurityNewsGetting inside the mind of a threat actor can help security pros understand how they operate and what they’re looking for, in essence, what makes a soft target. First seen on darkreading.com Jump to article: www.darkreading.com/vulnerabilities-threats/defeat-cybercriminals-understand-how-they-think
-
Beware of Malicious Ads on Captcha Pages that Deliver Password Stealers
by
in SecurityNewsMalicious actors have taken cybercrime to new heights by exploiting captcha verification pages, a typically harmless security feature, to launch large-scale malware distribution campaigns. This startling revelation uncovers how these fake captchas, interlaced with malicious advertising, are infecting users with password-stealing malware. Over the past several weeks, cybercriminals have been leveraging fake captcha pages to…
-
Winnti-Like Glutton Backdoor Targets Cybercriminals
by
in SecurityNewsMalware Exploits Cybercrime Ecosystem for Profit. Hackers are using a variant of a backdoor that’s the hallmark of a Chinese threat actor suspected of ties to Beijing in order to target the cybercriminal underground. The malware t shares near-complete similarity with the a backdoor exclusively used by the Winnti Group. First seen on govinfosecurity.com Jump…
-
Thousands Affected by Data Theft Hack of Smallest US State
by
in SecurityNewsBrain Cipher Gang Claims Credit for Hit on State of Rhode Island’s Vendor Deloitte. Potentially hundreds of thousands of Rhode Islanders are affected by an attack on RIBridges, the state’s IT system for health and human service benefits, including Medicaid. Cybercriminal group Brain Cipher claims to have stolen 1 terabyte of data from Deloitte, which…
-
5 Things To Know On The Cleo Data Theft Attacks
by
in SecurityNewsThe cybercriminal group Clop, previously responsible for the widely felt MOVEit data theft attacks of 2023, has reportedly claimed responsibility for the recent attacks exploiting Cleo file transfer tools. First seen on crn.com Jump to article: www.crn.com/news/security/2024/5-things-to-know-on-the-cleo-data-theft-attacks
-
Namibia’s state telecom provider says hackers leaked data after it refused to pay ransom
by
in SecurityNewsThe company didn’t specify what kind of data was stolen by the cybercriminals, but according to local media reports, the hackers accessed over 400,000 files, including personal and financial data belonging to some high-ranking government officials and Telecom Namibia’s clients.]]> First seen on therecord.media Jump to article: therecord.media/namibia-state-telecom-provider-data-leaked-after-ransom-refusal
-
Rydox cybercrime marketplace seized by law enforcement, suspected admins arrested
by
in SecurityNewsRydox, an online marketplace used by cybercriminals to sell hacked personal information and tools to commit fraud, has been seized in an international law enforcement operation and its suspected administrators arrested. First seen on bitdefender.com Jump to article: www.bitdefender.com/en-us/blog/hotforsecurity/rydox-cybercrime-marketplace-seixed-by-law-enforcement-suspected-admins-arrested