Tag: cybercrime
-
Cybercrime-Intelligence: Hudson Rock bietet proaktiven Schutz gegen Infostealer
Infostealer-Malware gehört zu den stillen, aber äußerst effektiven Werkzeugen in der Cyberkriminalität. Anstatt sofort großen Schaden anzurichten, zieht sie sensible Daten, wie Zugangsdaten, Passwörter, Tokens, etc. – aus infizierten Systemen. First seen on infopoint-security.de Jump to article: www.infopoint-security.de/cybercrime-intelligence-hudson-rock-bietet-proaktiven-schutz-gegen-infostealer/a42321/
-
How Cybercriminal Organizations Weaponize Exposed Secrets
The threat GitGuardian has long-anticipated is now a reality: criminal groups are executing systematic attacks targeting hardcoded credentials and over-permissive IAM configurations. The situation escalated when Shiny Hunters and Crimson Collective formed an alliance to coordinate efforts. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/10/how-cybercriminal-organizations-weaponize-exposed-secrets/
-
How Cybercriminal Organizations Weaponize Exposed Secrets
The threat GitGuardian has long-anticipated is now a reality: criminal groups are executing systematic attacks targeting hardcoded credentials and over-permissive IAM configurations. The situation escalated when Shiny Hunters and Crimson Collective formed an alliance to coordinate efforts. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/10/how-cybercriminal-organizations-weaponize-exposed-secrets/
-
How Cybercriminal Organizations Weaponize Exposed Secrets
The threat GitGuardian has long-anticipated is now a reality: criminal groups are executing systematic attacks targeting hardcoded credentials and over-permissive IAM configurations. The situation escalated when Shiny Hunters and Crimson Collective formed an alliance to coordinate efforts. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/10/how-cybercriminal-organizations-weaponize-exposed-secrets/
-
Cops nuke BreachForums (again) amid cybercrime supergroup extortion blitz
US and French fuzz pull the plug on Scattered Lapsus$ Hunters’ latest leak shop targeting Salesforce First seen on theregister.com Jump to article: www.theregister.com/2025/10/10/cops_seize_breachforums/
-
The Rise of AI-Powered Phishing How to Spot New Attacks
In today’s digital age, cybercriminals are leveraging AI to craft more convincing phishing scams. Recently, I encountered a sophisticated phishing attempt that underscores the growing threat of AI-powered fraud. Here’s what you need to know to protect yourself. The phishing email I received included detailed information about my career, likely scraped from my LinkedIn profile…
-
The Rise of AI-Powered Phishing How to Spot New Attacks
In today’s digital age, cybercriminals are leveraging AI to craft more convincing phishing scams. Recently, I encountered a sophisticated phishing attempt that underscores the growing threat of AI-powered fraud. Here’s what you need to know to protect yourself. The phishing email I received included detailed information about my career, likely scraped from my LinkedIn profile…
-
Authorities Dismantle BreachForums’ Reemerged Clearnet Marketplace
In a coordinated effort, international law enforcement agencies seized the clearnet domain breachforums[.]hn, shutting down yet another incarnation of the notorious cybercrime marketplace BreachForums. The domain now displays a joint seizure notice from the U.S. Department of Justice (DOJ) and the Federal Bureau of Investigation (FBI), alongside French authorities, including the Brigade de Lutte Contre…
-
Authorities Dismantle BreachForums’ Reemerged Clearnet Marketplace
In a coordinated effort, international law enforcement agencies seized the clearnet domain breachforums[.]hn, shutting down yet another incarnation of the notorious cybercrime marketplace BreachForums. The domain now displays a joint seizure notice from the U.S. Department of Justice (DOJ) and the Federal Bureau of Investigation (FBI), alongside French authorities, including the Brigade de Lutte Contre…
-
Authorities Dismantle BreachForums’ Reemerged Clearnet Marketplace
In a coordinated effort, international law enforcement agencies seized the clearnet domain breachforums[.]hn, shutting down yet another incarnation of the notorious cybercrime marketplace BreachForums. The domain now displays a joint seizure notice from the U.S. Department of Justice (DOJ) and the Federal Bureau of Investigation (FBI), alongside French authorities, including the Brigade de Lutte Contre…
-
Cyberkriminalität wird zum Erfolgsmodell
Tags: cybercrimeWas früher nach Gelegenheitskriminalität aussah, hat sich zu einem professionellen Markt entwickelt. First seen on it-daily.net Jump to article: www.it-daily.net/it-sicherheit/cybercrime/cyberkriminalitaet-erfolgsmodell
-
Cyberkriminalität wird zum Erfolgsmodell
Tags: cybercrimeWas früher nach Gelegenheitskriminalität aussah, hat sich zu einem professionellen Markt entwickelt. First seen on it-daily.net Jump to article: www.it-daily.net/it-sicherheit/cybercrime/cyberkriminalitaet-erfolgsmodell
-
Hackers target universities in “payroll pirate” attacks
A cybercrime gang tracked as Storm-2657 has been targeting university employees in the United States to hijack salary payments in “pirate payroll” attacks since March 2025. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/hackers-target-university-hr-employees-in-payroll-pirate-attacks/
-
Hackers target universities in “payroll pirate” attacks
A cybercrime gang tracked as Storm-2657 has been targeting university employees in the United States to hijack salary payments in “pirate payroll” attacks since March 2025. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/hackers-target-university-hr-employees-in-payroll-pirate-attacks/
-
Discord says 70,000 users had government IDs exposed in third-party breach
The social media platform Discord said about 70,000 users had their government IDs stolen by cybercriminals, as the company sought to dispel claims by the purported hackers of a larger breach. First seen on therecord.media Jump to article: therecord.media/discord-government-docs-exposed-breach
-
Discord says 70,000 users had government IDs exposed in third-party breach
The social media platform Discord said about 70,000 users had their government IDs stolen by cybercriminals, as the company sought to dispel claims by the purported hackers of a larger breach. First seen on therecord.media Jump to article: therecord.media/discord-government-docs-exposed-breach
-
LockBit, DragonForce, and Qilin form a ‘cartel’ to dictate ransomware market conditions
Tags: access, attack, breach, control, credentials, cybercrime, data, firewall, group, infrastructure, law, leak, lockbit, network, ransomware, service, technology, vpnCritical infrastructure declared fair game: As part of LockBit’s return announcement, the group revealed that critical infrastructure sectors previously considered off-limits would now be permissible targets for its affiliates. “It is permissible to attack critical infrastructure such as nuclear power plants, thermal power plants, hydroelectric power plants, and other similar organizations,” the group stated, according…
-
LockBit, DragonForce, and Qilin form a ‘cartel’ to dictate ransomware market conditions
Tags: access, attack, breach, control, credentials, cybercrime, data, firewall, group, infrastructure, law, leak, lockbit, network, ransomware, service, technology, vpnCritical infrastructure declared fair game: As part of LockBit’s return announcement, the group revealed that critical infrastructure sectors previously considered off-limits would now be permissible targets for its affiliates. “It is permissible to attack critical infrastructure such as nuclear power plants, thermal power plants, hydroelectric power plants, and other similar organizations,” the group stated, according…
-
Discord Data Breach Exposes 1.5 TB of Data and 2 Million Government ID Photos
The popular communication platform Discord is confronting a major extortion attempt after cybercriminals breached one of its third-party customer service providers, compromising sensitive user data including government identification photos used for age verification. Threat actors claim to have exfiltrated1.5 terabytesof sensitive information, including over2.1 million government-issued identification photos. However, Discord disputes these figures, stating that…
-
Discord Data Breach Exposes 1.5 TB of Data and 2 Million Government ID Photos
The popular communication platform Discord is confronting a major extortion attempt after cybercriminals breached one of its third-party customer service providers, compromising sensitive user data including government identification photos used for age verification. Threat actors claim to have exfiltrated1.5 terabytesof sensitive information, including over2.1 million government-issued identification photos. However, Discord disputes these figures, stating that…
-
Vampire Bot Malware Sinks Fangs Into Job Hunters
The campaign is the latest by BatShadow, one of a growing number of cybercrime groups operating out of Vietnam. First seen on darkreading.com Jump to article: www.darkreading.com/cyberattacks-data-breaches/vampire-bot-malware-job-hunters
-
Red Hat Hackers Team Up With Scattered Lapsus$ Hunters
Crimson Collective, which recently breached the GitLab instance of Red Hat Consulting, has teamed up with the notorious cybercriminal collective. First seen on darkreading.com Jump to article: www.darkreading.com/threat-intelligence/red-hat-hackers-team-up-scattered-lapsus-hunters
-
Top 10 Best Digital Footprint Monitoring Tools for Organizations in 2025
Tags: attack, business, cloud, cyber, cybercrime, cybersecurity, exploit, monitoring, network, strategy, threat, toolIn today’s hyperconnected business environment, organizations are under constant threat from cybercriminals who exploit digital footprints, shadow IT, cloud misconfigurations, and external exposures. Digital footprint monitoring has become one of the most critical aspects of a cybersecurity strategy in 2025. Organizations not only need to defend their internal networks but also proactively monitor external attack…
-
Top 10 Best Digital Footprint Monitoring Tools for Organizations in 2025
Tags: attack, business, cloud, cyber, cybercrime, cybersecurity, exploit, monitoring, network, strategy, threat, toolIn today’s hyperconnected business environment, organizations are under constant threat from cybercriminals who exploit digital footprints, shadow IT, cloud misconfigurations, and external exposures. Digital footprint monitoring has become one of the most critical aspects of a cybersecurity strategy in 2025. Organizations not only need to defend their internal networks but also proactively monitor external attack…
-
Top 10 Best Digital Footprint Monitoring Tools for Organizations in 2025
Tags: attack, business, cloud, cyber, cybercrime, cybersecurity, exploit, monitoring, network, strategy, threat, toolIn today’s hyperconnected business environment, organizations are under constant threat from cybercriminals who exploit digital footprints, shadow IT, cloud misconfigurations, and external exposures. Digital footprint monitoring has become one of the most critical aspects of a cybersecurity strategy in 2025. Organizations not only need to defend their internal networks but also proactively monitor external attack…

