Tag: cybercrime
-
Discord says 70,000 users had government IDs exposed in third-party breach
The social media platform Discord said about 70,000 users had their government IDs stolen by cybercriminals, as the company sought to dispel claims by the purported hackers of a larger breach. First seen on therecord.media Jump to article: therecord.media/discord-government-docs-exposed-breach
-
LockBit, DragonForce, and Qilin form a ‘cartel’ to dictate ransomware market conditions
Tags: access, attack, breach, control, credentials, cybercrime, data, firewall, group, infrastructure, law, leak, lockbit, network, ransomware, service, technology, vpnCritical infrastructure declared fair game: As part of LockBit’s return announcement, the group revealed that critical infrastructure sectors previously considered off-limits would now be permissible targets for its affiliates. “It is permissible to attack critical infrastructure such as nuclear power plants, thermal power plants, hydroelectric power plants, and other similar organizations,” the group stated, according…
-
LockBit, DragonForce, and Qilin form a ‘cartel’ to dictate ransomware market conditions
Tags: access, attack, breach, control, credentials, cybercrime, data, firewall, group, infrastructure, law, leak, lockbit, network, ransomware, service, technology, vpnCritical infrastructure declared fair game: As part of LockBit’s return announcement, the group revealed that critical infrastructure sectors previously considered off-limits would now be permissible targets for its affiliates. “It is permissible to attack critical infrastructure such as nuclear power plants, thermal power plants, hydroelectric power plants, and other similar organizations,” the group stated, according…
-
Discord Data Breach Exposes 1.5 TB of Data and 2 Million Government ID Photos
The popular communication platform Discord is confronting a major extortion attempt after cybercriminals breached one of its third-party customer service providers, compromising sensitive user data including government identification photos used for age verification. Threat actors claim to have exfiltrated1.5 terabytesof sensitive information, including over2.1 million government-issued identification photos. However, Discord disputes these figures, stating that…
-
Discord Data Breach Exposes 1.5 TB of Data and 2 Million Government ID Photos
The popular communication platform Discord is confronting a major extortion attempt after cybercriminals breached one of its third-party customer service providers, compromising sensitive user data including government identification photos used for age verification. Threat actors claim to have exfiltrated1.5 terabytesof sensitive information, including over2.1 million government-issued identification photos. However, Discord disputes these figures, stating that…
-
Vampire Bot Malware Sinks Fangs Into Job Hunters
The campaign is the latest by BatShadow, one of a growing number of cybercrime groups operating out of Vietnam. First seen on darkreading.com Jump to article: www.darkreading.com/cyberattacks-data-breaches/vampire-bot-malware-job-hunters
-
Red Hat Hackers Team Up With Scattered Lapsus$ Hunters
Crimson Collective, which recently breached the GitLab instance of Red Hat Consulting, has teamed up with the notorious cybercriminal collective. First seen on darkreading.com Jump to article: www.darkreading.com/threat-intelligence/red-hat-hackers-team-up-scattered-lapsus-hunters
-
Top 10 Best Digital Footprint Monitoring Tools for Organizations in 2025
Tags: attack, business, cloud, cyber, cybercrime, cybersecurity, exploit, monitoring, network, strategy, threat, toolIn today’s hyperconnected business environment, organizations are under constant threat from cybercriminals who exploit digital footprints, shadow IT, cloud misconfigurations, and external exposures. Digital footprint monitoring has become one of the most critical aspects of a cybersecurity strategy in 2025. Organizations not only need to defend their internal networks but also proactively monitor external attack…
-
Top 10 Best Digital Footprint Monitoring Tools for Organizations in 2025
Tags: attack, business, cloud, cyber, cybercrime, cybersecurity, exploit, monitoring, network, strategy, threat, toolIn today’s hyperconnected business environment, organizations are under constant threat from cybercriminals who exploit digital footprints, shadow IT, cloud misconfigurations, and external exposures. Digital footprint monitoring has become one of the most critical aspects of a cybersecurity strategy in 2025. Organizations not only need to defend their internal networks but also proactively monitor external attack…
-
Top 10 Best Digital Footprint Monitoring Tools for Organizations in 2025
Tags: attack, business, cloud, cyber, cybercrime, cybersecurity, exploit, monitoring, network, strategy, threat, toolIn today’s hyperconnected business environment, organizations are under constant threat from cybercriminals who exploit digital footprints, shadow IT, cloud misconfigurations, and external exposures. Digital footprint monitoring has become one of the most critical aspects of a cybersecurity strategy in 2025. Organizations not only need to defend their internal networks but also proactively monitor external attack…
-
Cybercrime crew claims attack on Japanese brewer as it restarts operations
As Asahi said it had restarted production of Super Dry beer in Japan, the Qilin ransomware gang posted screenshots of documents it said were from the company’s internal networks. First seen on therecord.media Jump to article: therecord.media/qilin-ransomware-gang-alleged-asahi-hackers
-
Cybercrime crew claims attack on Japanese brewer as it restarts operations
As Asahi said it had restarted production of Super Dry beer in Japan, the Qilin ransomware gang posted screenshots of documents it said were from the company’s internal networks. First seen on therecord.media Jump to article: therecord.media/qilin-ransomware-gang-alleged-asahi-hackers
-
Cybercrime crew claims attack on Japanese brewer as it restarts operations
As Asahi said it had restarted production of Super Dry beer in Japan, the Qilin ransomware gang posted screenshots of documents it said were from the company’s internal networks. First seen on therecord.media Jump to article: therecord.media/qilin-ransomware-gang-alleged-asahi-hackers
-
No Time to Waste: Embedding AI to Cut Noise and Reduce Risk
Artificial intelligence is reshaping cybersecurity on both sides of the battlefield. Cybercriminals are using AI-powered tools to accelerate and automate attacks at a scale defenders have never faced before. Security teams are overwhelmed by an explosion of vulnerability data, tool outputs, and alerts, all while operating with finite human resources. The irony is that while…
-
No Time to Waste: Embedding AI to Cut Noise and Reduce Risk
Artificial intelligence is reshaping cybersecurity on both sides of the battlefield. Cybercriminals are using AI-powered tools to accelerate and automate attacks at a scale defenders have never faced before. Security teams are overwhelmed by an explosion of vulnerability data, tool outputs, and alerts, all while operating with finite human resources. The irony is that while…
-
Developing economies are falling behind in the fight against cybercrime
Cybercrime is a global problem, but not every country is equally equipped to fight it. In many developing economies, cybersecurity is still seen as a luxury, something nice to … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/10/08/developing-countries-fight-cybercrime/
-
Developing economies are falling behind in the fight against cybercrime
Cybercrime is a global problem, but not every country is equally equipped to fight it. In many developing economies, cybersecurity is still seen as a luxury, something nice to … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/10/08/developing-countries-fight-cybercrime/
-
GoAnywhere MFT zero-day used by Storm-1175 in Medusa ransomware campaigns
Tags: attack, cve, cybercrime, exploit, flaw, group, ransomware, remote-code-execution, vulnerability, zero-dayStorm-1175 exploits GoAnywhere MFT flaw CVE-2025-10035 in Medusa attacks, allowing easy remote code execution via License Servlet bug. A cybercrime group, tracked as Storm-1175, has been actively exploiting a maximum severity GoAnywhere MFT vulnerability (CVE-2025-10035) in Medusa ransomware attacks for nearly a month. The vulnerability CVE-2025-10035 is a deserialization issue in the License Servlet of…
-
GoAnywhere MFT zero-day used by Storm-1175 in Medusa ransomware campaigns
Tags: attack, cve, cybercrime, exploit, flaw, group, ransomware, remote-code-execution, vulnerability, zero-dayStorm-1175 exploits GoAnywhere MFT flaw CVE-2025-10035 in Medusa attacks, allowing easy remote code execution via License Servlet bug. A cybercrime group, tracked as Storm-1175, has been actively exploiting a maximum severity GoAnywhere MFT vulnerability (CVE-2025-10035) in Medusa ransomware attacks for nearly a month. The vulnerability CVE-2025-10035 is a deserialization issue in the License Servlet of…
-
Credential stuffing: £2.31 million fine shows passwords are still the weakest link
How recycled passwords and poor security habits are fueling a cybercrime gold rush First seen on theregister.com Jump to article: www.theregister.com/2025/10/07/credential_stuffing_231_million/
-
Hackers Exploit RMM Tools to Deploy Malware
Tags: access, attack, cybercrime, defense, exploit, hacker, malware, monitoring, msp, ransomware, supply-chain, toolAttacks on RMM Tools Surged in 2025, With 51 Solutions Flagged as Targets. Cybercriminals are hijacking trusted remote monitoring and management tools to bypass defenses, gain persistent access and quietly stage ransomware attacks. Experts warn MSPs and enterprises that supply chain exposure amplifies the scale of these intrusions. First seen on govinfosecurity.com Jump to article:…
-
Hackers Exploit RMM Tools to Deploy Malware
Tags: access, attack, cybercrime, defense, exploit, hacker, malware, monitoring, msp, ransomware, supply-chain, toolAttacks on RMM Tools Surged in 2025, With 51 Solutions Flagged as Targets. Cybercriminals are hijacking trusted remote monitoring and management tools to bypass defenses, gain persistent access and quietly stage ransomware attacks. Experts warn MSPs and enterprises that supply chain exposure amplifies the scale of these intrusions. First seen on govinfosecurity.com Jump to article:…
-
Hackers Exploit RMM Tools to Deploy Malware
Tags: access, attack, cybercrime, defense, exploit, hacker, malware, monitoring, msp, ransomware, supply-chain, toolAttacks on RMM Tools Surged in 2025, With 51 Solutions Flagged as Targets. Cybercriminals are hijacking trusted remote monitoring and management tools to bypass defenses, gain persistent access and quietly stage ransomware attacks. Experts warn MSPs and enterprises that supply chain exposure amplifies the scale of these intrusions. First seen on govinfosecurity.com Jump to article:…

