Tag: cybercrime
-
Prince Ransomware An Automated Open-Source Ransomware Builder Freely Available on GitHub
by
in SecurityNews
Tags: attack, cyber, cybercrime, cybersecurity, exploit, github, healthcare, open-source, programming, ransomware, toolThe cybersecurity landscape has witnessed a concerning development with the emergence of >>Prince Ransomware,
-
For healthcare orgs, disaster recovery means making sure docs can save lives during ransomware infection
by
in SecurityNewsOrganizational, technological resilience combined defeat the disease that is cybercrime First seen on theregister.com Jump to article: www.theregister.com/2025/04/02/disaster_recovery_healthcare/
-
Hacker Leaks 270,000 Samsung Customer Records”, Stolen Credentials Were Left Unchecked for Years
by
in SecurityNewsIn a troubling security breach, a hacker exposed the personal data of over 270,000 Samsung customers in Germany, freely dumping it on the internet. The hack, attributed to a cybercriminal operating under the alias “GHNA,” occurred when the attacker accessed a system used by Samsung’s German customer service. According to cybersecurity firm Hudson Rock, the…
-
New Surge of IRS-Themed Attacks Targets Taxpayers’ Mobile Devices
by
in SecurityNewsAs the U.S. tax filing deadline approaches, cybercriminals are intensifying their efforts to exploit taxpayers through a new wave of IRS-themed scams. Research from McAfee Labs has revealed a sharp increase in fraudulent activities targeting mobile devices, with scammers using deceptive text messages and fake IRS websites to steal personal and financial information. Mobile Attacks…
-
Cybercriminals Expand Use of Lookalike Domains in Email Attacks
by
in SecurityNewsBlueVoyant found that the use of lookalike domains in email-based attacks is allowing actors to extend the types of individuals and organizations being targeted First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/criminals-lookalike-domains-email/
-
Cyberkriminalität befeuert durch KI: Endend-Sicherheit ist gefragt
by
in SecurityNewsFast 70 Prozent der deutschen Unternehmen spüren die Auswirkungen der offensiven Nutzung künstlicher Intelligenz durch Cyberkriminelle. Doch noch fehlen den meisten die Konzepte, um den teils völlig neuartigen Bedrohungsszenarien durch KI zu begegnen. Das sind Ergebnisse des aktuellsten »State of AI Cybersecurity«-Report von Darktrace [1]. KI ermöglicht nämlich auch nur mittelmäßig ausgebildeten Angreifern raffinierte und……
-
The human side of insider threats: People, pressure, and payback
by
in SecurityNewsWhile cybercriminals are often in the spotlight, one of the most dangerous threats to your company might be hiding in plain sight, within your own team. Employees, … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/04/01/insider-threats-why-people-turn-on-their-employers/
-
Cybercrime wird steuerpflichtig – Bundesfinanzministerium kündigt Darknet-Steuer an
by
in SecurityNewsFirst seen on security-insider.de Jump to article: www.security-insider.de/bundesfinanzministerium-kuendigt-darknet-steuer-an-a-f26c7dc867d574a80f2a323d42398028/
-
UK Police Are Ill-Equipped to Tackle AI Crimes
by
in SecurityNewsNew Turing Institute Report Urges Government to Create AI Crime Task Force. British law enforcement agencies are ill-equipped to tackle artificial intelligence-enabled cybercrime, a report by The Alan Turing Institute says, pointing to an enormous gap between police technical capabilities and the growing sophistication of threat actors. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/uk-police-are-ill-equipped-to-tackle-ai-crimes-a-27888
-
DarkCloud: An Advanced Stealer Malware Sold on Telegram to Target Windows Data
by
in SecurityNewsDarkCloud, a highly advanced stealer malware, has emerged as a significant threat to Windows systems since its debut in 2022. Initially gaining traction through underground forums, the malware is now widely sold on Telegram, making it accessible to cybercriminals worldwide. DarkCloud employs a variety of distribution techniques, with phishing campaigns being the most prevalent. Attackers…
-
Mangelndes Risikobewusstsein für Cyberbedrohungen besonders in KMU
by
in SecurityNewsCyberkriminalität kann jedes Unternehmen treffen vom kleinen Handwerksbetrieb bis zum internationalen Konzern 43 Prozent der Angestellten in Deutschland halten ihr Unternehmen für kein attraktives Angriffsziel. Das Bewusstsein der Mitarbeitenden für Cyberrisiken steigt mit der Unternehmensgröße insbesondere in KMU wird die Gefahr aber unterschätzt. Für Cyberkriminelle zählt nicht, wie groß oder bekannt eine… First seen on…
-
Beers with Talos: Year in Review episode
by
in SecurityNewsIn this podcast, Joe, Hazel, Bill and Dave break down Talos’ Year in Review 2024 and discuss how and why cybercriminals have been leaning so heavily on attacks that are routed in stealth in simplicity. First seen on blog.talosintelligence.com Jump to article: blog.talosintelligence.com/beers-with-talos-year-in-review-episode/
-
Inside Daisy Cloud: 30K Stolen Credentials Exposed
by
in SecurityNewsVeriti research recently analyzed stolen data that was published in a telegram group named “Daisy Cloud” (potentially associated with the RedLine Stealer), exposing the inner workings of a cybercrime marketplace. This group offers thousands of stolen credentials in an ongoing basis across a wide range of services, from crypto exchanges to government portals, at disturbingly……
-
Lucid: The Rising Threat of Phishing-as-a-Service
by
in SecurityNewsIn the ever-evolving landscape of cyber threats, Phishing-as-a-Service (PhAAS) platforms have emerged as a significant concern, enabling cybercriminals First seen on securityonline.info Jump to article: securityonline.info/lucid-the-rising-threat-of-phishing-as-a-service/
-
Top 5 Web Application Penetration Testing Companies UK
by
in SecurityNewsWeb Application Penetration Testing (WAPT) is a methodical approach to security that involves ethical hackers simulating real-world cyber-attacks on your web application to uncover vulnerabilities. By mimicking the tactics of cybercriminals, these professionals can identify weaknesses before malicious actors can exploit them. This proactive process allows businesses to address security flaws early and maintain a…
-
KI, Wearables und VR kurbeln Cyberkriminalität an
by
in SecurityNewsDer aktuelle Bericht von Trend Micro offenbart, wie Cyberkriminelle moderne Technologien nutzen, um ihre Betrugsmethoden zu optimieren. Besonders im Fokus stehen Künstliche Intelligenz, Wearables, Virtual Reality (VR) und Augmented Reality (AR) sowie Chatbots. First seen on it-daily.net Jump to article: www.it-daily.net/it-sicherheit/cybercrime/ki-vr-cyberkriminalitaet
-
Gefährlich bequem: So treiben professionelle Phishing-Dienste die Bedrohung in die Höhe
by
in SecurityNewsEin neuer Bericht zeigt: Ransomware-Bedrohungen haben sich im letzten Jahr vervierfacht vor allem durch den Boom krimineller Ransomware-as-a-Service-Angebote. Auch Phishing-Attacken nehmen wieder deutlich zu, ebenfalls angetrieben durch diese ‘Cybercrime-as-a-Service”-Modelle. First seen on itsicherheit-online.com Jump to article: www.itsicherheit-online.com/news/cybersecurity/gefaehrlich-bequem-so-treiben-professionelle-phishing-dienste-die-bedrohung-in-die-hoehe/
-
Unbefugter Zugriff bei einer Justizbehörde in Australien
by
in SecurityNewsCybercrime detectives investigating data breach – Strike Force Pardey First seen on police.nsw.gov.au Jump to article: www.police.nsw.gov.au/news/news
-
New ‘Lucid’ Phishing Platform Abuses iMessage, Android RCS to Slip Past Defenses
by
in SecurityNewsA sophisticated cybercrime service known as >>Lucid
-
Cybercrime ring previously assisted by DOGE staffer
by
in SecurityNews
Tags: cybercrimeFirst seen on scworld.com Jump to article: www.scworld.com/brief/cybercrime-ring-previously-assisted-by-doge-staffer
-
DOGE Staffer Previously Assisted a Cybercrime Ring
by
in SecurityNews
Tags: cybercrimeFirst seen on scworld.com Jump to article: www.scworld.com/brief/doge-staffer-previously-assisted-a-cybercrime-ring
-
Malicious AI tools, AI jailbreaks increasingly sought by cybercriminals
by
in SecurityNewsFirst seen on scworld.com Jump to article: www.scworld.com/brief/malicious-ai-tools-ai-jailbreaks-increasingly-sought-by-cybercriminals
-
Security shop pwns ransomware gang, passes insider info to authorities
by
in SecurityNewsResearchers say ‘proactive’ approach is needed to combat global cybercrime First seen on theregister.com Jump to article: www.theregister.com/2025/03/27/security_shop_pwns_ransomware_gang/
-
Fake DeepSeek Ads Spread Malware to Google Users
by
in SecurityNewsPopularity of the generative AI platform makes it an obvious choice for cybercriminals abusing Google-sponsored search results, according to researchers. First seen on darkreading.com Jump to article: www.darkreading.com/vulnerabilities-threats/fake-deepseek-ads-spread-malware-google
-
Russia arrests three for allegedly creating Mamont malware, tied to over 300 cybercrimes
by
in SecurityNewsRussian authorities said they arrested three people and seized hardware in an operation against Mamont malware, which specializes in stealing money from Android device users. First seen on therecord.media Jump to article: therecord.media/mamont-banking-malware-arrests-russia
-
Crooks target DeepSeek users with fake sponsored Google ads to deliver malware
by
in SecurityNewsCybercriminals are exploiting the popularity of DeepSeek by using fake sponsored Google ads to distribute malware. While DeepSeek is rising in popularity, threat actors are attempting to exploit it by using fake sponsored Google ads to distribute malware, Malwarebytes researchers warn. Crooks are using DeepSeek as a lure to trap unsuspecting Google searchers. >>Unfortunately, we…
-
Massive Data Breach Hits NSW Online Registry: 9,000+ Files Stolen
by
in SecurityNewsA major cybersecurity incident has struck the New South Wales court system, as cybercrime detectives investigate a significant data breach affecting the Department of Communities and Justice (DCJ). The breach targeted the NSW Online Registry Website (ORW), a critical platform that houses sensitive information related to both civil and criminal cases across the state. The…