Tag: cybercrime
-
Cobalt Strike abuse by cybercriminals slashed 80%
Tags: cybercrimeFirst seen on scworld.com Jump to article: www.scworld.com/news/cobalt-strike-abuse-by-cybercriminals-slashed-80
-
How to spot and avoid AI-generated scams
As AI technology advances, cybercriminals create more personalized and convincing scams. This includes mimicking voices, deepfake videos, and highly convincing phishing emails … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/03/11/how-to-spot-ai-generated-scams/
-
The AI race: Dark AI is in the lead, but good AI is catching up
Cybercriminals are using AI for help in planning and conducting cyberattacks”, but cybersecurity vendors are fighting back. Learn from Acronis Threat Research Unit about how AI-powered security solutions are closing the gap in the battle against AI-driven cyber threats. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/the-ai-race-dark-ai-is-in-the-lead-but-good-ai-is-catching-up/
-
AI Becomes a Powerful Weapon for Cybercriminals to Launch Attacks at High Speed
Artificial intelligence (AI) has emerged as a potent tool in the arsenal of cybercriminals, enabling them to execute attacks with unprecedented speed, precision, and scale. The integration of AI in cybercrime is transforming the landscape of digital threats, making traditional security measures increasingly ineffective. Cybercriminals are leveraging AI to automate attacks, which can now be…
-
AI-Generated Fake GitHub Repositories Steal Login Credentials
Tags: ai, credentials, cyber, cybercrime, cybersecurity, exploit, github, login, malicious, malware, tactics, threatA concerning cybersecurity threat has emerged with the discovery of AI-generated fake GitHub repositories designed to distribute malware, including the notorious SmartLoader and Lumma Stealer. These malicious repositories, crafted to appear legitimate, exploit GitHub’s trusted reputation to deceive users into downloading ZIP files containing malicious code. The campaign highlights the evolving tactics cybercriminals employ to…
-
Durchsuchungen: Bayern geht massiv gegen illegale Pay-TV-Anbietergruppe vor
Tags: cybercrimeDie Zentralstelle Cybercrime Bayern hat drei Verdächtige verhaftet und 35.000 Euro in Kryptowährung beschlagnahmt. Mehrere Server sind offline gegangen. First seen on golem.de Jump to article: www.golem.de/news/durchsuchungen-massives-vorgehen-gegen-illegale-pay-tv-anbietergruppe-2503-194153.html
-
Steganography Explained: How XWorm Hides Inside Images
Inside the most innocent-looking image, a breathtaking landscape, or a funny meme, something dangerous could be hiding, waiting for its moment to strike.No strange file names. No antivirus warnings. Just a harmless picture, secretly concealing a payload that can steal data, execute malware, and take over your system without a trace.This is steganography, a cybercriminal’s…
-
Durchsuchungen: Massives Vorgehen gegen illegale Pay-TV-Anbietergruppe
Tags: cybercrimeDie Zentralstelle Cybercrime Bayern hat drei Verdächtige verhaftet und 35.000 Euro in Kryptowährung beschlagnahmt. Mehrere Server sind offline gegangen. First seen on golem.de Jump to article: www.golem.de/news/durchsuchungen-massives-vorgehen-gegen-illegale-pay-tv-anbietergruppe-2503-194153.html
-
Rhysida Hacking Group Strikes More Healthcare Providers
Mental Health Provider, Kansas Clinics Are Latest Victims of Cybercriminal Gang. A Kansas-based medical practice and a Rhode lsland-based provider of mental health and addiction counseling and related services are the latest victims in a growing list of healthcare organizations reporting major data breaches by cybercriminal gang Rhysida. First seen on govinfosecurity.com Jump to article:…
-
Threat Actors Exploit EncryptHub for Multi-Stage Malware Attacks
EncryptHub, a rising cybercriminal entity, has been under scrutiny by multiple threat intelligence teams, including Outpost24’s KrakenLabs. Recent investigations have uncovered previously unseen aspects of EncryptHub’s infrastructure and tactics, revealing a sophisticated multi-stage malware campaign. The threat actor’s operational security (OPSEC) lapses have provided valuable insights into their attack chain and methodologies. EncryptHub’s campaigns utilize…
-
SIM Swapping Fraud Surges in the Middle East
SIM swapping fraud surges in the Middle East as cybercriminals exploit websites mimicking legitimate services to steal personal data First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/sim-swapping-fraud-surges-middle/
-
Why The Modern Google Workspace Needs Unified Security
The Need For Unified SecurityGoogle Workspace is where teams collaborate, share ideas, and get work done. But while it makes work easier, it also creates new security challenges. Cybercriminals are constantly evolving, finding ways to exploit misconfigurations, steal sensitive data, and hijack user accounts. Many organizations try to secure their environment by piecing together different…
-
UK Cybersecurity Weekly News Roundup 9 March 2025
Tags: android, attack, backdoor, breach, china, cloud, compliance, computer, cyber, cyberattack, cybercrime, cybersecurity, data, espionage, exploit, government, group, hacker, infrastructure, international, malware, microsoft, network, ransomware, regulation, resilience, service, skills, software, theft, update, vulnerabilityWelcome to this week’s edition of our cybersecurity news roundup, bringing you the latest developments and insights from the UK and beyond. Microsoft Engineer’s Transition to Cybersecurity Ankit Masrani, a 36-year-old software engineer, successfully transitioned into a cybersecurity role at Microsoft. With a background in IT and a Master’s degree in computer science, Masrani secured…
-
GUEST ESSAY: Four essential strategies to bolster cyber resilience in critical infrastructure
In 2023, victims reported nearly 900,000 cybercrime complaints to the FBI. Altogether, losses eclipsed $12.5 billion, a significant 22% increase from the losses in 2022. Related: Closing the resiliency gap Unsurprisingly, experts predict this trend will continue to grow… (more”¦) First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/03/guest-essay-four-essential-strategies-to-bolster-cyber-resilience-in-critical-infrastructure/
-
Beware of Trojanized Apps: EncryptHub Targets Cryptocurrency Wallets and Corporate Networks
A newly cybercriminal entity, EncryptHub, has gained attention from multiple threat intelligence teams, including Outpost24’s KrakenLabs. Their latest First seen on securityonline.info Jump to article: securityonline.info/beware-of-trojanized-apps-encrypthub-targets-cryptocurrency-wallets-and-corporate-networks/
-
SilentCryptoMiner Infects 2,000 Russian Users via Fake VPN and DPI Bypass Tools
A new mass malware campaign is infecting users with a cryptocurrency miner named SilentCryptoMiner by masquerading it as a tool designed to circumvent internet blocks and restrictions around online services.Russian cybersecurity company Kaspersky said the activity is part of a larger trend where cybercriminals are increasingly leveraging Windows Packet Divert (WPD) tools to distribute malware…
-
Cybercriminals go old school with snail mail ransomware scheme
First seen on scworld.com Jump to article: www.scworld.com/news/cybercriminals-go-old-school-with-snail-mail-ransomware-scheme
-
YouTubers extorted via copyright strikes to spread malware
Cybercriminals are sending bogus copyright claims to YouTubers to coerce them into promoting malware and cryptocurrency miners on their videos. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/youtubers-extorted-via-copyright-strikes-to-spread-malware/
-
Cybercriminals Allegedly Used a StubHub Backdoor to Steal Taylor Swift Tickets
Plus: The world’s “largest illicit online marketplace” gets hit by regulators, police seize the Garantex crypto exchange, and scammers trick targets by making up ransomware attacks. First seen on wired.com Jump to article: www.wired.com/story/stubhub-backdoor-stolen-taylor-swift-tickets/
-
Are Efforts to Help Secure Rural Hospitals Doing Any Good?
Biden-Era Cyber Aid Programs Are Still Available, But Future is Uncertain. Even though rural hospitals and other small healthcare providers don’t have deep pockets, cybercriminals continue to target them with ransomware, often causing serious disruption and compromises affecting large swaths of patients. What can be done to help them strengthen cybersecurity? First seen on govinfosecurity.com…
-
Malicious use of Cobalt Strike down 80% after crackdown, Fortra says
An effort launched in 2023 to curb the longstanding issue of pirated Cobalt Strike software being used by cybercriminals appears to have borne fruit. First seen on therecord.media Jump to article: therecord.media/malicious-cobalt-strike-use-down
-
Cybersecurity Snapshot: CSA Outlines Data Security Challenges and Best Practices, While ISACA Offers Tips To Retain IT Pros
Tags: advisory, ai, awareness, banking, best-practice, business, cloud, compliance, corporate, crime, crypto, cve, cyber, cybercrime, cybersecurity, data, defense, exploit, extortion, finance, fraud, governance, government, group, healthcare, infrastructure, iot, jobs, mail, malicious, microsoft, mitigation, monitoring, network, nis-2, privacy, qr, ransom, ransomware, regulation, resilience, risk, risk-assessment, risk-management, scam, service, strategy, technology, threat, tool, vmware, vulnerability, vulnerability-management, zero-dayCheck out best practices for shoring up data security and reducing cyber risk. Plus, get tips on how to improve job satisfaction among tech staff. Meanwhile, find out why Congress wants federal contractors to adopt vulnerability disclosure programs. And get the latest on cyber scams; zero-day vulnerabilities; and critical infrastructure security. Dive into six things…
-
Cybercrime’s Cobalt Strike Use Plummets 80% Worldwide
Fortra, Microsoft, and Health-ISAC have combined forces to claw back one of hackers’ most prized attack tools, with massive takedowns. First seen on darkreading.com Jump to article: www.darkreading.com/threat-intelligence/cybercrime-cobalt-strike-use-plummets-worldwide
-
Fake Tax Claims Scam Stealing Over $10,000 from Victims
Tax season has become a breeding ground for sophisticated AI-powered scams, with nearly half of Americans reporting fraudulent IRS-related communications, according to McAfee’s 2025 survey. Cybercriminals are leveraging deepfake audio, phishing emails, and spoofed websites to steal identities and funds, costing victims up to $10,000 in losses”, and in some cases, far more. Escalating Threats…
-
FIN7, FIN8, and Others Use Ragnar Loader for Persistent Access and Ransomware Operations
Threat hunters have shed light on a “sophisticated and evolving malware toolkit” called Ragnar Loader that’s used by various cybercrime and ransomware groups like Ragnar Locker (aka Monstrous Mantis), FIN7, FIN8, and Ruthless Mantis (ex-REvil).”Ragnar Loader plays a key role in keeping access to compromised systems, helping attackers stay in networks for long-term operations,” Swiss…
-
Bitkom veröffentlicht düstere Cybercrime-Bilanz
Tags: cybercrimeDeutlich mehr als die Hälfte der Internetnutzer wurde in den vergangenen zwölf Monaten Opfer von Cyberkriminalität doch nur jeder Vierte erstattete Anzeige. Der durchschnittliche Schaden: 219 Euro. Das ergab eine repräsentative Umfrage des Digitalverbands Bitkom unter 1.021 Internetnutzern ab 16 Jahren in Deutschland. First seen on itsicherheit-online.com Jump to article: www.itsicherheit-online.com/news/cybersecurity/bitkom-veroeffentlicht-duestere-cybercrime-bilanz/
-
PrintSteal: Unmasking a Large-Scale KYC Document Fraud Operation
A recent investigation by CloudSEK has exposed PrintSteal, a vast cybercriminal operation engaged in the fraudulent generation and First seen on securityonline.info Jump to article: securityonline.info/printsteal-unmasking-a-large-scale-kyc-document-fraud-operation/
-
‘EncryptHub’ OPSEC Failures Reveal TTPs & Big Plans
Tags: cybercrimeIs EncryptHub the most prolific cybercriminal in recent history? Or, as new information suggests, a bumbling amateur? First seen on darkreading.com Jump to article: www.darkreading.com/threat-intelligence/encrypthub-opsec-failures-ttps-big-plans

