Tag: cybercrime
-
Cybercriminals Exploit Fake Avast Website to Steal Users Credit Card Information
Cybercriminals have launched a convincing phishing operation by building a fake Avast website designed to steal credit card information from unsuspecting visitors. The fraudulent page mimics Avast’s official portal almost perfectly, complete with the genuine Avast logo pulled directly from the company’s content delivery network. It displays regular navigation links like “Home,” “My Account,” and…
-
Operation Red Card 2.0 Leads to 651 Arrests in Africa
In the latest operation targeting cybercrime groups, African law enforcement agencies cooperated with Interpol and cybersecurity firms to recover more than USD 4.3 million. First seen on darkreading.com Jump to article: www.darkreading.com/cybersecurity-operations/operation-red-card-2-0-leads-to-651-arrests-in-africa
-
Threat groups move at record speeds, as AI helps scale attacks
A report by CrowdStrike shows cybercrime groups are outpacing security teams and increasingly abusing legitimate tools. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/threat-groups-record-speeds-ai-attacks/812965/
-
Threat groups moving at record speeds, as AI helps scale attacks
A report by CrowdStrike shows cybercrime groups are outpacing security teams and increasingly abusing legitimate tools. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/threat-groups-record-speeds-ai-attacks/812965/
-
Cybercriminals Exploit Windows Management Instrumentation WMI to Maintain Stealthy Access and Silent Control
Tags: access, control, cyber, cybercrime, exploit, infrastructure, malware, startup, strategy, windowsWindows Management Instrumentation (WMI) is a critical utility built into the Windows operating system designed to help administrators monitor status and automate routine tasks. However, cybercriminals have increasingly weaponized this legitimate infrastructure to maintain persistent access to compromised networks. Unlike traditional malware strategies that rely on visible startup folders or registry run keys, WMI abuse…
-
AI Arms Race Shrinks Breakout Time to 29 Minutes as Adversaries Turn GenAI on the Enterprise
Artificial intelligence is no longer just a defensive tool; it is now a core accelerant for cybercriminals and nation-state actors alike. That is the central message from CrowdStrike’s newly released 2026 Global Threat Report, which paints 2025 as the “year of the evasive adversary”, defined by speed, identity abuse and direct attacks on AI systems…
-
Odido Faces Alleged Data Breach as ShinyHunters Claims 21M Records Exposed
A notorious cybercriminal group, ShinyHunters, has claimed responsibility for a massive data breach involving Odido and BEN, exposing millions of customer records. The group asserts that Odido, a Dutch telecommunications provider, was not truthful in its initial disclosure of the incident. This development suggests the breach may be significantly larger and more severe than initially…
-
AWS says more than 600 FortiGate firewalls hit in AI-augmented campaign
Off-the-shelf tools helped Russian-speaking cybercrime group run riot First seen on theregister.com Jump to article: www.theregister.com/2026/02/23/aws_fortigate_firewalls/
-
AI-powered campaign compromises 600 FortiGate systems worldwide
A Russian-speaking cybercriminal used commercial generative AI tools to hack over 600 FortiGate devices across 55 countries. Amazon Threat Intelligence reports that a Russian-speaking, financially motivated threat actor used commercial generative AI services to compromise more than 600 FortiGate devices in 55 countries. The activity, observed between January 11 and February 18, 2026, highlights how…
-
Police seize 100,000 stolen Facebook credentials in cybercrime raid
Officers from Poland’s Central Bureau for Combating Cybercrime (CBZC) dismantled an organized group that used phishing to seize Facebook accounts and extract BLIK payment … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/02/23/poland-cybercrime-facebook-phishing-ring/
-
Attacker Breached 600 FortiGate Appliances in AI-Assisted Campaign: Amazon
An single threat actor used AI tools to create and run a campaign that compromised more then 600 Fortinet FortiGate appliances around the world over five weeks, according to Amazon threat researchers, the latest example of how cybercriminals are using the technology in their attacks. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/02/attacker-breached-600-fortigate-appliances-in-ai-assisted-campaign-amazon/
-
Mississippi Healthcare System Shuts Down Clinics After Ransomware Attack
The University of Mississippi Medical Center shut down operations at its 35 medical clinics around the state following a ransomware attack. Healthcare facilities are top targets for cybercriminals, who look to steal the sensitive data they hold for both money and intelligence gathering. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/02/mississippi-healthcare-system-shuts-down-clinics-after-ransomware-attack/
-
ISMG Editors: No Honor Among Ransomware Thieves
Also: AI, Machine Identity Risks; Europe’s Digital Sovereignty Push. In this week’s panel, four ISMG editors examined how cybercriminals may be turning on each other, what security leaders are really saying about machine identities and AI risk, and how shifting U.S.-Europe dynamics are reshaping technology resilience and digital sovereignty. First seen on govinfosecurity.com Jump to…
-
Criminals create business website to sell RAT disguised as RMM tool
A RAT masquerading as legitimate remote monitoring and management (RMM) software is being sold to cybercriminals as a service, Proofpoint researchers recently discovered. The … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/02/20/trustconnect-docconnect-fake-rmm/
-
651 arrested, $4.3 million recovered in African cybercrime sweep
Operation Red Card 2.0, supported by INTERPOL and involving law enforcement agencies from 16 African countries, led to 651 arrests and the recovery of more than $4.3 million … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/02/20/interpol-operation-red-card-2-0-africa-cybercrime/
-
INTERPOL Operation Red Card 2.0 Arrests 651 in African Cybercrime Crackdown
An international cybercrime operation against online scams has led to 651 arrests and recovered more than $4.3 million as part of an effort led by law enforcement agencies from 16 African countries.The initiative, codenamed Operation Red Card 2.0, took place between December 8, 2025 and January 30, 2026, according to INTERPOL. It targeted infrastructure and…
-
AI-generated passwords are a security risk
AI-generated passwords are “highly predictable” and aren’t truly random, making them easier for cybercriminals to crack. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/02/ai-generated-passwords-are-a-security-risk/
-
Hunderte Online-Betrüger verhaftet und Server beschlagnahmt
Tags: cybercrimeMehrere Betrügerorganisationen haben Millionenschäden bei den Opfern angerichtet. Polizei-Behörden konnten zuletzt über 600 Verdächtige festnehmen. First seen on golem.de Jump to article: www.golem.de/news/interpol-gegen-cybercrime-651-festnahmen-bei-razzien-gegen-online-scammer-2602-205612.html
-
Ransomware gang threatens Cheyenne and Arapaho Tribes after shutting down schools
The government of the Cheyenne and Arapaho Tribes in Oklahoma is being extorted by cybercriminals after a ransomware attack shut down its schools and critical systems in January. First seen on therecord.media Jump to article: therecord.media/cheyenne-arapaho-ransomware-rhysida
-
Interpol gegen Cybercrime: 651 Festnahmen bei Razzien gegen Online-Scammer
Mehrere Betrügerorganisationen haben Millionenschäden bei den Opfern angerichtet. Polizei-Behörden konnten zuletzt über 600 Verdächtige verhaften. First seen on golem.de Jump to article: www.golem.de/news/interpol-gegen-cybercrime-651-festnahmen-bei-razzien-gegen-online-scammer-2602-205612.html
-
Explosion in drei Stufen Die Folgen der KI-Disruption
Künstliche Intelligenz treibt den organisatorischen Wandel in einer Weise voran, wie wir es seit dem Aufkommen des Internets nicht mehr gesehen haben. Aber jede Disruption dieser Art bringt auch Warnsignale mit sich. Bei der KI-Disruption blinken sie alle gleichzeitig in der Softwareentwicklung, in der Cyberkriminalität und in der Regulatorik. Das Problem: Wir behandeln jedes […]…
-
Starkiller: New ‘Commercial-Grade’ Phishing Kit Bypasses MFA
A new cybercriminal toolkit uses proxies to mimic popular online services and represents a “significant escalation in phishing infrastructure,” warn researchers at Abnormal First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/starkiller-phishing-kit-bypasses/
-
Starkiller: New ‘Commercial-Grade’ Phishing Kit Bypasses MFA
A new cybercriminal toolkit uses proxies to mimic popular online services and represents a “significant escalation in phishing infrastructure,” warn researchers at Abnormal First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/starkiller-phishing-kit-bypasses/
-
Police arrests 651 suspects in African cybercrime crackdown
African authorities arrested 651 suspects and recovered over $4.3 million in a joint operation targeting investment fraud, mobile money scams, and fake loan applications. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/police-arrests-651-suspects-in-african-cybercrime-crackdown/
-
Police arrests 651 suspects in African cybercrime crackdown
African authorities arrested 651 suspects and recovered over $4.3 million in a joint operation targeting investment fraud, mobile money scams, and fake loan applications. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/police-arrests-651-suspects-in-african-cybercrime-crackdown/

