Tag: cybercrime
-
Pro-Iranian Nasir Security is targeting energy companies in the Gulf
Resecurity tracks Iran-linked Nasir Security targeting Middle East energy firms amid ongoing regional cyber and military threats. Resecurity (USA) is tracking a relatively new cybercriminal group called Nasir Security, presumably associated with Iran, that is targeting energy organizations in the Middle East. The energy sector is one of the most impacted areas because of the…
-
Police Shut Down 373,000 Dark Web Sites in Single-Operator CSAM Network
Police shut down 373K dark web sites in a one-man CSAM and cybercrime network run by a 35-year-old man in China, with global probe ongoing. First seen on hackread.com Jump to article: hackread.com/police-shut-down-dark-web-sites-csam-network/
-
Dokumentarfilm zur Cyberkriminalität ‘Don’t Go to the Police”
Mit einer neuen Dokumentation sensibilisiert Orange Cyberdefense gezielt für die Gefahren der Cyberkriminalität. Der 56-minütige Film ‘Don’t Go to the Police” unter der Regie von Ludoc bietet einen detaillierten Einblick in die Jagd auf Lockbit, eines der aktivsten Cybercrime-Netzwerke zwischen 2019 und 2024. Der Dokumentarfilm zeigt, wie ‘Cyber-Mafia>>-Netzwerke und hacktivistische Kollektive operieren und dient zugleich…
-
MioLab MacOS Stealer Expands With ClickFix, Wallet Theft, Team APIs
As Apple’s macOS footprint grows in both consumer and enterprise environments, dedicated infostealers like MioLab (aka Nova) show that Macs are no longer a niche target but a priority for cybercrime ecosystems. Marketed as a premium Malware”‘as”‘a”‘Service (MaaS) on Russian”‘language forums, MioLab combines an evasive macOS binary with a mature web panel, new ClickFix delivery…
-
Oblivion RAT Masquerades as Play Store Update to Spy on Android Users
A newly discovered Android remote access trojan (RAT) called Oblivion RAT is raising concerns across the mobile threat landscape. Marketed as a malware-as-a-service (MaaS) platform, it is sold on cybercrime forums with subscription plans starting at $300 per month. Unlike typical mobile malware, Oblivion RAT comes with a web-based APK builder, a dropper generator, and…
-
Oblivion RAT Masquerades as Play Store Update to Spy on Android Users
A newly discovered Android remote access trojan (RAT) called Oblivion RAT is raising concerns across the mobile threat landscape. Marketed as a malware-as-a-service (MaaS) platform, it is sold on cybercrime forums with subscription plans starting at $300 per month. Unlike typical mobile malware, Oblivion RAT comes with a web-based APK builder, a dropper generator, and…
-
Oblivion RAT Masquerades as Play Store Update to Spy on Android Users
A newly discovered Android remote access trojan (RAT) called Oblivion RAT is raising concerns across the mobile threat landscape. Marketed as a malware-as-a-service (MaaS) platform, it is sold on cybercrime forums with subscription plans starting at $300 per month. Unlike typical mobile malware, Oblivion RAT comes with a web-based APK builder, a dropper generator, and…
-
Oblivion RAT Masquerades as Play Store Update to Spy on Android Users
A newly discovered Android remote access trojan (RAT) called Oblivion RAT is raising concerns across the mobile threat landscape. Marketed as a malware-as-a-service (MaaS) platform, it is sold on cybercrime forums with subscription plans starting at $300 per month. Unlike typical mobile malware, Oblivion RAT comes with a web-based APK builder, a dropper generator, and…
-
Operation Alice Takes Down 370,000+ Dark Web Sites
German-led policing effort against fraud operation disrupts countless CSAM and cybercrime sites First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/operation-alice-370000-dark-web/
-
Justice Department disrupts botnet networks that hijacked 3 million devices
The Aisuru, Kimwolf, JackSkid and Mossad botnets enabled cybercriminals to initiate thousands of attacks. A crackdown targeting large-scale botnets continues amid growing challenges. First seen on cyberscoop.com Jump to article: cyberscoop.com/botnet-disruption-aisuru-kimwolf-jackskid-mossad/
-
DDoS-Attacken: Schlag gegen internationale Cyberkriminelle
Tags: android, botnet, cyberattack, cybercrime, ddos, germany, hacker, infrastructure, router, service, usaDDos bleibt ein Evergreen unter den Security-Bedrohungen. Karsten Kunert mit ChatGPTIn einem großangelegten Schlag gegen ein internationales Hacker-Netzwerk haben Sicherheitsbehörden in Nordamerika und Deutschland die beiden weltgrößten Botnetze zerschlagen. Die Infrastruktur der Kriminellen war vor allem für sogenannte Denial-of-Services-Attacken (DDoS), verwendet worden, teilte das Bundeskriminalamt mit. Dabei versuchen die Cyberkriminellen, die Webseiten und Apps ihrer…
-
The Importance of Behavioral Analytics in AI-Enabled Cyber Attacks
Artificial Intelligence (AI) is changing how individuals and organizations conduct many activities, including how cybercriminals carry out phishing attacks and iterate on malware. Now, cybercriminals are using AI to generate personalized phishing emails, deepfakes and malware that evade traditional detection by impersonating normal user activity and bypassing legacy security models. As a result, First seen…
-
NCA Boss Warns That Teens Are Being “Radicalized” Into Cybercrime Online
The National Crime Agency’s director general warns that technology is rapidly reshaping crime First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/nca-boss-warns-teens-radicalized/
-
Android Malware Campaign Targets Indian Users via Fake eChallan Alerts
A new Android malware campaign targeting Indian users has been reported by the Indian Computer Emergency Response Team, CERT-In. According to the agency, multiple reports indicate a coordinated effort by cybercriminals to steal sensitive financial and personal data through deceptive mobile applications and phishing techniques. First seen on thecyberexpress.com Jump to article: thecyberexpress.com/android-malware-campaign-rto-challan/
-
CISA Warns Cisco Secure Firewall Management Center 0-Day Is Being Exploited in Ransomware Attacks
Tags: attack, cisa, cisco, cloud, control, cve, cyber, cybercrime, cybersecurity, exploit, firewall, flaw, infrastructure, ransomware, vulnerability, zero-dayThe Cybersecurity and Infrastructure Security Agency has issued an urgent warning regarding a critical zero-day vulnerability affecting heavily relied-upon Cisco security products. Tracked officially as CVE-2026-20131, this severe flaw is actively being exploited by cybercriminals in targeted ransomware campaigns. Organizations relying on Cisco Secure Firewall Management Center and Cisco Security Cloud Control must take immediate…
-
CISA Warns Cisco Secure Firewall Management Center 0-Day Is Being Exploited in Ransomware Attacks
Tags: attack, cisa, cisco, cloud, control, cve, cyber, cybercrime, cybersecurity, exploit, firewall, flaw, infrastructure, ransomware, vulnerability, zero-dayThe Cybersecurity and Infrastructure Security Agency has issued an urgent warning regarding a critical zero-day vulnerability affecting heavily relied-upon Cisco security products. Tracked officially as CVE-2026-20131, this severe flaw is actively being exploited by cybercriminals in targeted ransomware campaigns. Organizations relying on Cisco Secure Firewall Management Center and Cisco Security Cloud Control must take immediate…
-
Orange Cyberdefense Doku ‘Don’t Go to the Police” blickt hinter die Kulissen der Cybercrime-Welt
Tags: cybercrime“Don’t Go to the Police” ist mehr als eine Dokumentation – es ist ein eindringlicher Appell. Der Film zeigt, wie schnell aus einem kleinen Fehler ein globales Problem werden kann. First seen on infopoint-security.de Jump to article: www.infopoint-security.de/orange-cyberdefense-doku-dont-go-to-the-police-blickt-hinter-die-kulissen-der-cybercrime-welt/a44211/
-
SpyCloud’s 2026 Identity Exposure Report Reveals Explosion of Non-Human Identity Theft
Tags: ai, authentication, automation, breach, cloud, credentials, cybercrime, cybersecurity, dark-web, data, data-breach, government, identity, malware, monitoring, password, phishing, ransomware, supply-chain, theft, threat, tool67 / sixseven: 140.4Msweet / cookie / candy / cake / pie: 5.7Mchiefs / kansas city chiefs: 5M2025: 4.1Mapple / banana / orange / strawberry / fruit: 2.6MPassword reuse remains widespread, and the report also identified 1.1 million password manager master passwords circulating in underground sources, raising concerns about vault-level compromise when master credentials are…
-
SpyCloud’s 2026 Identity Exposure Report Reveals Explosion of Non-Human Identity Theft
Tags: ai, authentication, automation, breach, cloud, credentials, cybercrime, cybersecurity, dark-web, data, data-breach, government, identity, malware, monitoring, password, phishing, ransomware, supply-chain, theft, threat, tool67 / sixseven: 140.4Msweet / cookie / candy / cake / pie: 5.7Mchiefs / kansas city chiefs: 5M2025: 4.1Mapple / banana / orange / strawberry / fruit: 2.6MPassword reuse remains widespread, and the report also identified 1.1 million password manager master passwords circulating in underground sources, raising concerns about vault-level compromise when master credentials are…
-
Cybercriminals are Winning with AI
AI has become the most powerful tool for financial fraud since the dawn of the Internet. As predicted, criminals are exploiting it faster, more effectively, and at scale. According to the latest Interpol Global Financial Fraud Report, AI-enhanced fraud is now 4.5 times more profitable than traditional schemes. That’s a significant shift and we’re still…
-
Minderjährig – und Teil eines wachsenden DDoS-Geschäfts
DDoS-Angriffe nehmen weltweit stark zu – und bringen selbst große Anbieter an ihre Grenzen. Der Fall aus Polen zeigt, wie niedrig die Einstiegshürden sind. First seen on golem.de Jump to article: www.golem.de/news/ddos-angriffe-mehr-angriffe-politische-motive-juengere-taeter-2603-206635.html
-
Cybercriminals scale up, government sector hit hardest
Government agencies faced the highest volume of cyberattack campaigns in 2025, according to new findings from HPE Threat Labs, which tracked 1,186 active campaigns over the … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/03/18/government-agencies-cyberattack-campaigns-volume/
-
Storm-2561 Uses Fake Fortinet, Ivanti VPN Sites to Drop Hyrax Infostealer
In mid-January 2026, Microsoft Defender Experts identified a devious way that cybercriminals are tricking people into giving away… First seen on hackread.com Jump to article: hackread.com/storm-2561-fake-fortinet-ivanti-vpn-sites-hyrax-infostealer/
-
CISA Issues Alert on Wing FTP Server Vulnerability Used in Attacks
Tags: attack, cisa, cyber, cybercrime, cybersecurity, exploit, flaw, infrastructure, kev, network, vulnerabilityThe Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent security alert regarding a critical vulnerability in the Wing FTP Server. On March 16, 2026, the agency officially added this security flaw to its Known Exploited Vulnerabilities (KEV) catalog. This addition serves as a clear warning to network defenders that cybercriminals are actively exploiting…
-
Cybercrime has skyrocketed 245% since the start of the Iran war
Hacktivists use proxy services from Russia, China for ‘billions of designed-for-abuse connection attempts’ First seen on theregister.com Jump to article: www.theregister.com/2026/03/16/cybercrime_iran_war_245_percent_rise/
-
AI finally delivers those elusive productivity gains… for cybercriminals
Interpol says fraud schemes using the tech are 4.5x more profitable First seen on theregister.com Jump to article: www.theregister.com/2026/03/16/interpol_ai_fraud/
-
LiveChat Abuse: How Phishers Are Exploiting SaaS Support Tools to Steal Sensitive Data
Tags: attack, credentials, credit-card, cybercrime, data, email, exploit, finance, mfa, phishing, saas, service, threat, toolThreat actors are abusing the LiveChat SaaS platform to impersonate brands like PayPal and Amazon in phishing campaigns designed to steal credentials, credit card details, MFA codes, and other sensitive data. Victims are lured through phishing emails and directed to LiveChat pages where attackers use chat interactions to request personal and financial information. The campaign…
-
Washington is right: Cybercrime is organized crime. Now we need to shut down the business model
The executive order finally calls cyber-enabled fraud what it is: transnational organized crime. Now the U.S. has to act like it”, and the private sector has to stop settling for defense-only while the criminal infrastructure stays intact. First seen on cyberscoop.com Jump to article: cyberscoop.com/executive-order-cyber-enabled-fraud-transnational-criminal-organizations/

