Tag: cybercrime
-
Beers with Talos: Year in Review episode
In this podcast, Joe, Hazel, Bill and Dave break down Talos’ Year in Review 2024 and discuss how and why cybercriminals have been leaning so heavily on attacks that are routed in stealth in simplicity. First seen on blog.talosintelligence.com Jump to article: blog.talosintelligence.com/beers-with-talos-year-in-review-episode/
-
Inside Daisy Cloud: 30K Stolen Credentials Exposed
Veriti research recently analyzed stolen data that was published in a telegram group named “Daisy Cloud” (potentially associated with the RedLine Stealer), exposing the inner workings of a cybercrime marketplace. This group offers thousands of stolen credentials in an ongoing basis across a wide range of services, from crypto exchanges to government portals, at disturbingly……
-
Lucid: The Rising Threat of Phishing-as-a-Service
In the ever-evolving landscape of cyber threats, Phishing-as-a-Service (PhAAS) platforms have emerged as a significant concern, enabling cybercriminals First seen on securityonline.info Jump to article: securityonline.info/lucid-the-rising-threat-of-phishing-as-a-service/
-
Top 5 Web Application Penetration Testing Companies UK
Web Application Penetration Testing (WAPT) is a methodical approach to security that involves ethical hackers simulating real-world cyber-attacks on your web application to uncover vulnerabilities. By mimicking the tactics of cybercriminals, these professionals can identify weaknesses before malicious actors can exploit them. This proactive process allows businesses to address security flaws early and maintain a…
-
KI, Wearables und VR kurbeln Cyberkriminalität an
Der aktuelle Bericht von Trend Micro offenbart, wie Cyberkriminelle moderne Technologien nutzen, um ihre Betrugsmethoden zu optimieren. Besonders im Fokus stehen Künstliche Intelligenz, Wearables, Virtual Reality (VR) und Augmented Reality (AR) sowie Chatbots. First seen on it-daily.net Jump to article: www.it-daily.net/it-sicherheit/cybercrime/ki-vr-cyberkriminalitaet
-
Gefährlich bequem: So treiben professionelle Phishing-Dienste die Bedrohung in die Höhe
Ein neuer Bericht zeigt: Ransomware-Bedrohungen haben sich im letzten Jahr vervierfacht vor allem durch den Boom krimineller Ransomware-as-a-Service-Angebote. Auch Phishing-Attacken nehmen wieder deutlich zu, ebenfalls angetrieben durch diese ‘Cybercrime-as-a-Service”-Modelle. First seen on itsicherheit-online.com Jump to article: www.itsicherheit-online.com/news/cybersecurity/gefaehrlich-bequem-so-treiben-professionelle-phishing-dienste-die-bedrohung-in-die-hoehe/
-
Unbefugter Zugriff bei einer Justizbehörde in Australien
Cybercrime detectives investigating data breach – Strike Force Pardey First seen on police.nsw.gov.au Jump to article: www.police.nsw.gov.au/news/news
-
New ‘Lucid’ Phishing Platform Abuses iMessage, Android RCS to Slip Past Defenses
A sophisticated cybercrime service known as >>Lucid
-
Cybercrime ring previously assisted by DOGE staffer
Tags: cybercrimeFirst seen on scworld.com Jump to article: www.scworld.com/brief/cybercrime-ring-previously-assisted-by-doge-staffer
-
DOGE Staffer Previously Assisted a Cybercrime Ring
Tags: cybercrimeFirst seen on scworld.com Jump to article: www.scworld.com/brief/doge-staffer-previously-assisted-a-cybercrime-ring
-
Malicious AI tools, AI jailbreaks increasingly sought by cybercriminals
First seen on scworld.com Jump to article: www.scworld.com/brief/malicious-ai-tools-ai-jailbreaks-increasingly-sought-by-cybercriminals
-
Security shop pwns ransomware gang, passes insider info to authorities
Researchers say ‘proactive’ approach is needed to combat global cybercrime First seen on theregister.com Jump to article: www.theregister.com/2025/03/27/security_shop_pwns_ransomware_gang/
-
Fake DeepSeek Ads Spread Malware to Google Users
Popularity of the generative AI platform makes it an obvious choice for cybercriminals abusing Google-sponsored search results, according to researchers. First seen on darkreading.com Jump to article: www.darkreading.com/vulnerabilities-threats/fake-deepseek-ads-spread-malware-google
-
Russia arrests three for allegedly creating Mamont malware, tied to over 300 cybercrimes
Russian authorities said they arrested three people and seized hardware in an operation against Mamont malware, which specializes in stealing money from Android device users. First seen on therecord.media Jump to article: therecord.media/mamont-banking-malware-arrests-russia
-
Crooks target DeepSeek users with fake sponsored Google ads to deliver malware
Cybercriminals are exploiting the popularity of DeepSeek by using fake sponsored Google ads to distribute malware. While DeepSeek is rising in popularity, threat actors are attempting to exploit it by using fake sponsored Google ads to distribute malware, Malwarebytes researchers warn. Crooks are using DeepSeek as a lure to trap unsuspecting Google searchers. >>Unfortunately, we…
-
Massive Data Breach Hits NSW Online Registry: 9,000+ Files Stolen
A major cybersecurity incident has struck the New South Wales court system, as cybercrime detectives investigate a significant data breach affecting the Department of Communities and Justice (DCJ). The breach targeted the NSW Online Registry Website (ORW), a critical platform that houses sensitive information related to both civil and criminal cases across the state. The…
-
Lucid PhAAS Platform Uses RCS and iMessage to Evade Detection
The cybersecurity landscape has been disrupted by the emergence of Lucid, a sophisticated Phishing-as-a-Service (PhAAS) platform developed by Chinese-speaking threat actors. This advanced toolkit enables cybercriminals to conduct large-scale phishing campaigns, targeting 169 entities across 88 countries globally. Lucid’s innovation lies in its exploitation of Rich Communication Services (RCS) and Apple’s iMessage protocol to circumvent…
-
Malicious Google Ads Target DeepSeek Users to Spread Malware
Cybersecurity threats continue to evolve, with malicious actors exploiting popular platforms like Google Ads to spread malware. Recently, a sophisticated campaign targeting DeepSeek users has been uncovered, highlighting the ongoing risks associated with sponsored search results. The Threat Landscape DeepSeek, a rising platform, has become a lure for cybercriminals who are using fake sponsored Google…
-
12 Cybercriminals Arrested After Ghost Communication Platform Shutdown
Law enforcement agencies have successfully dismantled a clandestine communication platform known as >>Ghost,
-
Thousands of NSW court files including AVOs leaked in ‘major data breach’
Investigation under way after around 9,000 documents including sensitive affidavits exposed<ul><li><a href=”https://www.theguardian.com/australia-news/live/2025/mar/27/australia-politics-live-fuel-excise-cost-of-living-tax-cuts-salmon-election-anthony-albanese-peter-dutton-ntwnfb”>Follow our Australia news live blog for latest updates</li><li>Get our <a href=”https://www.theguardian.com/email-newsletters?CMP=cvau_sfl”>breaking news email, <a href=”https://app.adjust.com/w4u7jx3″>free app or <a href=”https://www.theguardian.com/australia-news/series/full-story?CMP=cvau_sfl”>daily news podcast</li></ul>About 9,000 court files, including sensitive documents such as apprehended violence orders and affidavits, have been leaked in a data breach of the…
-
Malicious Android Apps Evade Detection: McAfee
Cybersecurity Firm Finds Rash of Apps Coded With Microsoft .NET MAUI. Cybercriminals are using a Microsoft cross-platform app development framework to create Android malware that bypasses security measures, evades detection and steals user data. Malicious apps spotted by McAfee researchers aren’t traditional Android malware. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/malicious-android-apps-evade-detection-mcafee-a-27836
-
‘Lucid’ Phishing-as-a-Service Exploits Faults in iMessage, Android RCS
Cybercriminals in China have figured out how to undermine the strengths of mobile messaging protocols. First seen on darkreading.com Jump to article: www.darkreading.com/threat-intelligence/lucid-phishing-exploits-imessage-android-rcs
-
New Atlantis AIO platform automates credential stuffing on 140 services
A new cybercrime platform named ‘Atlantis AIO’ provides an automated credential stuffing service against 140 online platforms, including email services, e-commerce sites, banks, and VPNs. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/new-atlantis-aio-automates-credential-stuffing-on-140-services/
-
Threat Actors Use “Atlantis AIO” Tool to Automate Credential Stuffing Attacks
In a concerning development for cybersecurity professionals, threat actors are increasingly utilizing a powerful tool called Atlantis AIO to automate and scale credential stuffing attacks across more than 140 platforms. This multi-checker tool, designed to exploit stolen user credentials, has emerged as a formidable weapon in the cybercriminal arsenal, enabling attackers to test millions of…
-
B1ack’s Stash Marketplace Actors Set to Release 4 Million Stolen Credit Card Records for Free
In a significant escalation of illicit activities, B1ack’s Stash, a notorious dark web carding marketplace, has announced plans to release an additional 4 million stolen credit card records for free. This move is part of a broader strategy to attract cybercriminals and establish credibility within the underground economy. The marketplace first gained attention in April…
-
Public-Private Ops Net Big Wins Against African Cybercrime
Three cybersecurity firms worked with Interpol and authorities in Nigeria, South Africa, Rwanda, and four other African nations to arrest more than 300 cybercriminals. First seen on darkreading.com Jump to article: www.darkreading.com/threat-intelligence/public-private-ops-big-wins-african-cybercrime
-
AI vs. Cybercriminals: Who Wins the Race in Next-Gen Threat Detection?
AI allows cybercriminals to circumvent traditional detection systems, and they continue to develop sophisticated methods to enable this. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/03/ai-vs-cybercriminals-who-wins-the-race-in-next-gen-threat-detection/
-
Hackers Using E-Crime Tool Atlantis AIO for Credential Stuffing on 140+ Platforms
Threat actors are leveraging an e-crime tool called Atlantis AIO Multi-Checker to automate credential stuffing attacks, according to findings from Abnormal Security.Atlantis AIO “has emerged as a powerful weapon in the cybercriminal arsenal, enabling attackers to test millions of stolen credentials in rapid succession,” the cybersecurity company said in an analysis.Credential stuffing is a First…
-
Understanding RDAP: The Future of Domain Registration Data Access
Tags: access, api, attack, authentication, china, compliance, control, cyber, cybercrime, cybersecurity, data, detection, exploit, framework, fraud, GDPR, incident response, infrastructure, intelligence, Internet, law, malicious, malware, phishing, privacy, regulation, service, threat, tool, vulnerability

