Tag: crimes
-
Enterprise-specific zero-day exploits on the rise, Google warns
Tags: access, apple, apt, attack, china, cisco, cloud, crime, crimes, cyberespionage, detection, endpoint, exploit, finance, flaw, google, group, Hardware, incident response, injection, Internet, ivanti, korea, lessons-learned, mandiant, microsoft, mitigation, network, north-korea, remote-code-execution, russia, service, strategy, technology, threat, tool, update, vpn, vulnerability, zero-daySurge in network edge device exploitation: Of the 33 zero-day vulnerabilities in enterprise-specific products, 20 targeted hardware appliances typically located at the network edge, such as VPNs, security gateways, and firewalls. Notable targets last year included Ivanti Cloud Services Appliance, Palo Alto Networks’ PAN-OS, Cisco Adaptive Security Appliance, and Ivanti Connect Secure VPN.Targeted attacks against…
-
FBI Reports ₹1.38 Lakh Crore Loss in 2024, a 33% Surge from 2023
The FBI’s Internet Crime Complaint Center (IC3) has reported a record-breaking loss of $16.6 billion (approximately ₹1.38 lakh crore) due to cyber-enabled crimes in 2024, marking a staggering 33% increase from the previous year. Established 25 years ago, IC3 has evolved into the primary hub for reporting cyber fraud and threats, processing over 9 million…
-
CEO of cybersecurity firm charged with installing malware on hospital systems
Veritaco CEO Jeffrey Bowie faces charges for allegedly installing malware on hospital computers, violating Oklahoma’s Computer Crimes Act. Jeffrey Bowie, CEO of the cybersecurity firm Veritaco, is facing two counts of violating Oklahoma’s Computer Crimes Act for allegedly infecting employee computers at the Oklahoma City St. Anthony Hospital. The man is accused of having installed…
-
U.S. Secret Service Reveals Ways to Identify Credit Card Skimmers
With credit card skimming crimes escalating nationwide, the U.S. Secret Service’s Washington Field Office is sharing essential tips for the public to protect themselves from this growing threat, shared by Officials in LinkedIn post. According to the agency, credit card skimming involves criminals installing illicit devices to steal card information, has become a “low-risk, high-reward”…
-
UK Police Are Ill-Equipped to Tackle AI Crimes
New Turing Institute Report Urges Government to Create AI Crime Task Force. British law enforcement agencies are ill-equipped to tackle artificial intelligence-enabled cybercrime, a report by The Alan Turing Institute says, pointing to an enormous gap between police technical capabilities and the growing sophistication of threat actors. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/uk-police-are-ill-equipped-to-tackle-ai-crimes-a-27888
-
Microsoft Busts Hackers Selling Illegal Azure AI Access
LLMjacking operation leveraged illicit access GenAI services to produce explicit celebrity images and other harmful content, Microsoft’s digital crimes unit says. First seen on darkreading.com Jump to article: www.darkreading.com/application-security/microsoft-openai-hackers-selling-illicit-access-azure-llm-services
-
How Banks Can Adapt to the Rising Threat of Financial Crime
Banking fraud and financial crimes are growing more sophisticated every day. By understanding the threats and building strong collaborations, banks can protect themselves and their clients. First seen on darkreading.com Jump to article: www.darkreading.com/cyber-risk/how-banks-adapt-rising-threat-financial-crime
-
Unusual attack linked to Chinese APT group combines espionage and ransomware
Tags: apt, attack, breach, china, cloud, country, credentials, crime, crimes, crypto, cyber, cybercrime, cyberespionage, data, encryption, espionage, exploit, finance, firewall, government, group, hacker, infection, insurance, intelligence, korea, microsoft, network, north-korea, ransom, ransomware, russia, software, tactics, technology, threat, veeam, vulnerabilityThe attacker demanded a $2-million ransom: The attack that resulted in the deployment of the RA World ransomware program, as well as data exfiltration, had the same chain: the toshdpdb.exe loading toshdpapi.dll then decrypting toshdp.dat which resulted in the PlugX variant being deployed. The difference is the attacker then chose to deploy the RA World…
-
The Loneliness Epidemic Is a Security Crisis
Romance scams cost victims hundreds of millions of dollars a year. As people grow increasingly isolated, and generative AI helps scammers scale their crimes, the problem could get worse. First seen on wired.com Jump to article: www.wired.com/story/loneliness-epidemic-romance-scams-security-crisis/
-
Police arrest teenager suspected of hacking NATO and numerous Spanish institutions
Spain’s National Police, in a joint operation with the Civil Guard, has arrested an 18-year-old suspected of being the hacker going by aliases including “Natohub,” and known for hacking the computer services of private companies and Spanish institutions such as the Civil Guard, the Ministry of Defense, the National Mint, and the Ministry of Education,…
-
Microsoft sues overseas threat actor group over abuse of OpenAI service
Microsoft has filed suit against 10 unnamed people (“Does”), who are apparently operating overseas, for misuse of its Azure OpenAI platform, asking the Eastern District of Virginia federal court for damages and injunctive relief.The suit was filed in late December but was not made public until last Friday, when the initial sealed filings were revealed.…
-
Microsoft Sues Hacking Group Exploiting Azure AI for Harmful Content Creation
Microsoft has revealed that it’s pursuing legal action against a “foreign-based threatactor group” for operating a hacking-as-a-service infrastructure to intentionally get around the safety controls of its generative artificial intelligence (AI) services and produce offensive and harmful content.The tech giant’s Digital Crimes Unit (DCU) said it has observed the threat actors “develop First seen on…
-
Hackers Brute Force Your Passwords?
Cybercrimes have always existed as a result of internet usage in our society. Traversing the wide web, hackers are trying to exploit any nooks and crannies in the system. While many new types of crimes are arising on the internet, brute-force attacks are still the most common. Based on recent research, they have grown from…
-
792 Syndicate Suspects Arrested in Massive Crypto and Romance Scam: The Rise of Cybercrime as a Corporate Enterprise
The Economic and Financial Crimes Commission (EFCC) recently executed a landmark operation in Lagos, Nigeria, arresting 792 suspects for their alleged involvement in a cryptocurrency investment fraud and romance scam. The raid, conducted at an imposing seven-storey building in Victoria Island, sheds light on the systematic infrastructure and advanced methods employed by these fraud networks…
-
Nigeria Cracks Down on Cryptocurrency Investment Fraud and Romance Scams
The suspects were apprehended in a surprise operation at their hideout in Lagos following intelligence received by Nigeria’s Economic and Financial Crimes Commission First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/nigeria-cracks-down-cryptocurrency/
-
Next-gen cybercrime: The need for collaboration in 2025
Tags: ai, attack, awareness, cloud, crime, crimes, cyber, cyberattack, cybercrime, cybersecurity, defense, exploit, framework, group, healthcare, infrastructure, intelligence, risk, service, strategy, tactics, technology, threat, training, vulnerabilityCybercrime is a relentless and evolving threat to organizations worldwide. However, with the right insights, we can significantly enhance our security, mitigate risks, and stay ahead of these criminals.FortiGuard Labs’ Cyberthreat Predictions for 2025 report is designed to provide exactly these insights. It identifies emerging threat trends for the coming year and offers actionable guidance…
-
Cybercrime techniques leveraged for child-targeted crimes
First seen on scworld.com Jump to article: www.scworld.com/brief/cybercrime-techniques-leveraged-for-child-targeted-crimes
-
European law enforcement breaks high-end encryption app used by suspects
Tags: awareness, backdoor, ciso, communications, computing, crime, crimes, cryptography, data, defense, encryption, endpoint, exploit, flaw, group, hacker, infrastructure, international, jobs, law, malware, monitoring, service, technology, threat, tool, vulnerabilityA group of European law enforcement agencies were able to crack a high-level encryption app that a group of suspects created to avoid law enforcement monitoring, according to a statement issued Tuesday by Europol. Europol, understandably, did not provide any specifics about how they broke the app, but encryption experts said that the most likely method…
-
Notorious ransomware developer charged with computer crimes in Russia
Mikhail Matveev, better known as Wazawaka, was in court last week. First seen on cyberscoop.com Jump to article: cyberscoop.com/mikhail-matveev-wazawaka-russia-charges/
-
$400M seized, 5,500 arrested in global operation targeting cyber fraud
A coordinated international operation involving law enforcement agencies from 40 countries led to the arrest of over 5,500 individuals linked to financial crimes and the … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2024/12/02/haechi-v-interpol-global-operation-targeting-cyber-fraud/
-
INTERPOL Arrests 5,500 in Global Cybercrime Crackdown, Seizes Over $400 Million
A global law enforcement operation has led to the arrest of more than 5,500 suspects involved in financial crimes and the seizure of more than $400 million in virtual assets and government-backed currencies.The coordinated exercise saw the participation of authorities from 40 countries, territories, and regions as part of the latest wave of Operation HAECHI-V,…
-
CyFI: An Essential Paradigm for Financial Crimes Compliance and Risk Management in the 21st Century
First seen on resecurity.com Jump to article: www.resecurity.com/blog/article/cyfi-an-essential-paradigm-for-financial-crimes-compliance-and-risk-management-in-the-21st-century
-
UK Justice System Failing Cybercrime Victims, Cyber Helpline Finds
A report from the charity the Cyber Helpline found that 98% of cyber enabled crimes result in no further action from the police or justice system First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/uk-justice-cybercrime-victims/
-
FBI pierces ‘anonymity’ of cryptocurrency, secret domain registrars in Scattered Spider probe
The US Justice Department on Wednesday announced the arrest of five suspected members of the notorious Scattered Spider phishing crew, but the most interesting part of the case was a US Federal Bureau of Investigation (FBI) document detailing how easily the feds were able to track the phishers’ movements and activities. In recent years, services that push…

