Tag: cybercrime
-
Hackers Allegedly Leak HSBC USA Customer and Financial Information
A threat actor has claimed responsibility for breaching HSBC USA, the American division of the global investment bank and financial services holding company. The cybercriminal posted an extensive database for sale on underground forums, alleging it contains fresh and comprehensive customer data stolen from the financial institution. Massive Collection of Sensitive Customer Data According to…
-
KI 2030: Wenn Maschinen Cybercrime neu erfinden
Bis 2030 werden viele Ransomware- und Datendiebstahlkampagnen vollständig von autonomen KI-Systemen durchgeführt rund um die Uhr, ohne menschliches Zutun. First seen on infopoint-security.de Jump to article: www.infopoint-security.de/ki-2030-wenn-maschinen-cybercrime-neu-erfinden/a42523/
-
BKA-Bundeslagebild Cybercrime 2024 und Cyber-Resilience – ‘Unternehmen müssen sich auf den Ernstfall vorbereiten”
First seen on security-insider.de Jump to article: www.security-insider.de/unternehmen-muessen-sich-auf-den-ernstfall-vorbereiten-a-0354a808e25a0cd700bad0435c16df51/
-
New Atroposia RAT Uses Hidden Remote Desktop, Vulnerability Scanning and Advanced Persistence
Tags: access, credentials, cyber, cyberattack, cybercrime, malware, marketplace, network, rat, theft, vulnerabilityA sophisticated new remote access trojan called Atroposia has emerged in underground cybercrime marketplaces, offering attackers a comprehensive toolkit for hidden remote desktop access, credential theft, and network manipulation at an accessible price point. Security researchers at Varonis recently discovered the malware being promoted on underground forums, highlighting how advanced cyberattack capabilities are increasingly packaged…
-
Atroposia malware kit lowers the bar for cybercrime, and raises the stakes for enterprise defenders
Tags: apt, authentication, automation, ciso, credentials, crime, cybercrime, defense, detection, dns, endpoint, infrastructure, mail, malicious, malware, mfa, monitoring, rat, service, spam, threat, tool, update, vulnerabilityRAT toolkits proliferating: Atroposia is one of a growing number of RAT tools targeting enterprises; Varonis has also recently discovered SpamGPT and MatrixPDF, a spam-as-a-service platform and malicious PDF builder, respectively.Shipley noted that these types of packages which identify additional avenues to maintain persistence have been around for some time; Mirai, which goes back to…
-
Rethinking Identity Security in the Age of AI
Tags: access, ai, api, attack, authentication, automation, awareness, best-practice, breach, business, captcha, ceo, container, control, credentials, cyber, cybercrime, cybersecurity, data, deep-fake, defense, detection, email, endpoint, exploit, finance, fraud, Hardware, iam, identity, login, malware, mfa, monitoring, passkey, password, phishing, risk, risk-management, scam, threat, tool, vulnerabilityRethinking Identity Security in the Age of AI madhav Tue, 10/28/2025 – 06:35 Traditional identity protections were never designed for the age of AI. They can’t stop the lightning-fast, highly convincing identity attacks AI facilitates. There’s a reason that nearly 60% of businesses say compromised credentials are the leading cause of breaches. Data Security Marco…
-
Rethinking Identity Security in the Age of AI
Tags: access, ai, api, attack, authentication, automation, awareness, best-practice, breach, business, captcha, ceo, container, control, credentials, cyber, cybercrime, cybersecurity, data, deep-fake, defense, detection, email, endpoint, exploit, finance, fraud, Hardware, iam, identity, login, malware, mfa, monitoring, passkey, password, phishing, risk, risk-management, scam, threat, tool, vulnerabilityRethinking Identity Security in the Age of AI madhav Tue, 10/28/2025 – 06:35 Traditional identity protections were never designed for the age of AI. They can’t stop the lightning-fast, highly convincing identity attacks AI facilitates. There’s a reason that nearly 60% of businesses say compromised credentials are the leading cause of breaches. Data Security Marco…
-
New Atroposia malware comes with a local vulnerability scanner
A new malware-as-a-service (MaaS) platform named Atroposia provides cybercriminals a remote access trojan that combines capabilities for persistent access, evasion, data theft, and local vulnerability scanning. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/new-atroposia-malware-comes-with-a-local-vulnerability-scanner/
-
Attackers Sell Turnkey Remote Access Trojan ‘Atroposia’
Atroposia, a new RAT malware, offers low-level cybercriminal affiliates the ability to utilize sophisticated stealth and persistence capabilities. First seen on darkreading.com Jump to article: www.darkreading.com/vulnerabilities-threats/attackers-sell-turnkey-remote-access-trojan-atroposia
-
Attackers Sell Turnkey Remote Access Trojan ‘Atroposia’
Atroposia, a new RAT malware, offers low-level cybercriminal affiliates the ability to utilize sophisticated stealth and persistence capabilities. First seen on darkreading.com Jump to article: www.darkreading.com/vulnerabilities-threats/attackers-sell-turnkey-remote-access-trojan-atroposia
-
New Atroposia malware comes with a local vulnerability scanner
A new malware-as-a-service (MaaS) platform named Atroposia provides cybercriminals a remote access trojan that combines capabilities for persistent access, evasion, data theft, and local vulnerability scanning. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/new-atroposia-malware-comes-with-a-local-vulnerability-scanner/
-
UN’s First Global Cybercrime Treaty Sparks Debate Over Privacy and Surveillance
While many governments have celebrated the treaty’s adoption, rights organizations and technology firms have expressed concern. The post UN’s First Global Cybercrime Treaty Sparks Debate Over Privacy and Surveillance appeared first on TechRepublic. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/news-un-cybercrime-treaty/
-
CCB’s Cyber Crime Wing Busts ₹47 Crore ($5.6 Million) International Cybercrime Racket Linked to Dubai
Bengaluru’s Central Crime Branch (CCB) has dismantled a major international cybercrime racket, revealing a hacking operation that siphoned off ₹47 crore (approximately $5.6 million) from a private finance company in just two and a half hours. The Cyber Crime Wing of the CCB confirmed the arrest of two individuals involved in the scam, while the primary…
-
‘Herodotus’ Android Trojan Mimics Human Sluggishness
Trojan Poised for Use in Campaigns Across the Globe. Android malware advertised as Herodotus on cybercrime forums injects a randomized pause of up to three seconds whenever a hacker bypasses the keyboard on an infected device to enter account credentials. Systems that rely on indicators such as input timing may wave through the transaction. First…
-
‘Herodotus’ Android Trojan Mimics Human Sluggishness
Trojan Poised for Use in Campaigns Across the Globe. Android malware advertised as Herodotus on cybercrime forums injects a randomized pause of up to three seconds whenever a hacker bypasses the keyboard on an infected device to enter account credentials. Systems that rely on indicators such as input timing may wave through the transaction. First…
-
Beware of Free Video Game Cheats that Deliver Infostealer Malwares
The competitive gaming landscape has become a breeding ground for cybercriminals who exploit players’ desire to gain an unfair advantage. While major esports tournaments like last year’s CS2 PGL Major in Copenhagen boast prize pools reaching $1.25 million, the temptation to cheat extends far beyond professional competition. The industry noted one of its most notorious…
-
US declines to join more than 70 countries in signing UN cybercrime treaty
Tags: cybercrimeMore than 70 countries signed the landmark UN Convention against Cybercrime in Hanoi this weekend, a significant step in the yearslong effort to create a global mechanism to counteract digital crime. First seen on therecord.media Jump to article: therecord.media/us-declines-signing-cybercrime-treaty
-
UN member states sign cybercrime agreement despite industry, activist opposition
Tags: cybercrimeCritics say the new convention is ripe for abuse by authoritarian countries. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/un-cybercrime-convention-signing-ceremony/803867/
-
72 states sign first global UN Convention against Cybercrime
Tags: cybercrimeThe world’s first global convention to prevent and respond to cybercrime opened for signature today in Hanoi, Vietnam, and will remain open at United Nations Headquarters in … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/10/27/un-convention-against-cybercrime/
-
âš¡ Weekly Recap: WSUS Exploited, LockBit 5.0 Returns, Telegram Backdoor, F5 Breach Widens
Security, trust, and stability, once the pillars of our digital world, are now the tools attackers turn against us. From stolen accounts to fake job offers, cybercriminals keep finding new ways to exploit both system flaws and human behavior.Each new breach proves a harsh truth: in cybersecurity, feeling safe can be far more dangerous than…
-
72 states sign first global UN Convention against Cybercrime
Tags: cybercrimeThe world’s first global convention to prevent and respond to cybercrime opened for signature today in Hanoi, Vietnam, and will remain open at United Nations Headquarters in … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/10/27/un-convention-against-cybercrime/
-
Predatory Sparrow Strikes: Coordinated Cyberattacks Seek to Cripple Critical Infrastructure
A sophisticated cyber-sabotage group known as Predatory Sparrow has emerged as one of the most destructive threat actors targeting Iranian critical infrastructure over the past several years. Unlike traditional cybercriminal operations focused on financial gain, this group executes highly disruptive campaigns designed to cripple essential services, destroy sensitive data, and send provocative political messages. Security…
-
Predatory Sparrow Strikes: Coordinated Cyberattacks Seek to Cripple Critical Infrastructure
A sophisticated cyber-sabotage group known as Predatory Sparrow has emerged as one of the most destructive threat actors targeting Iranian critical infrastructure over the past several years. Unlike traditional cybercriminal operations focused on financial gain, this group executes highly disruptive campaigns designed to cripple essential services, destroy sensitive data, and send provocative political messages. Security…
-
Predatory Sparrow Strikes: Coordinated Cyberattacks Seek to Cripple Critical Infrastructure
A sophisticated cyber-sabotage group known as Predatory Sparrow has emerged as one of the most destructive threat actors targeting Iranian critical infrastructure over the past several years. Unlike traditional cybercriminal operations focused on financial gain, this group executes highly disruptive campaigns designed to cripple essential services, destroy sensitive data, and send provocative political messages. Security…
-
UN Cybercrime Treaty wins dozens of signatories, to go with its many critics
Allows surveillance and cross-border evidence sharing, which worries human rights groups First seen on theregister.com Jump to article: www.theregister.com/2025/10/27/un_cybercrime_convention_signed/
-
US to attend UN cybercrime treaty signing in Hanoi despite industry concerns
Tags: cybercrimeAfter years of negotiations, officials from around the world will convene in Hanoi this weekend for the signing of the landmark UN cybercrime convention. First seen on therecord.media Jump to article: therecord.media/cybercrime-treaty-signing-hanoi

