Tag: cybercrime
-
Salesforce Sounds Alarm Over Fresh Data Extortion Campaign
CRM-Obsessed ShinyHunters Gang Exploits Misconfigured Customer Experience Portals. A prolific and noisy cybercrime gang with a penchant for stealing Salesforce customers’ data and holding it ransom is taking advantage of misconfigured guest accounts meant to provide public access to services meant to remain private, using a Google scanning tool to identify vulnerable accounts. First seen…
-
Cybercrime isn’t just a cover for Iran’s government goons – it’s a key part of their operations
Ransomware, malware-as-a-service, infostealers benefit MOIS, too First seen on theregister.com Jump to article: www.theregister.com/2026/03/10/cybercrime_iran_mois/
-
U.S. military contractor likely built iPhone hacking tools used by Russian spies in Ukraine
Google found a series of hacking tools they said were used by a Russian espionage group and a cybercriminal group in China. Sources from a U.S. government defense contractor said some of those hacking tools were theirs. First seen on techcrunch.com Jump to article: techcrunch.com/2026/03/10/us-military-contractor-likely-built-iphone-hacking-tools-used-by-russian-spies-in-ukraine/
-
An iPhone-hacking toolkit used by Russian spies likely came from US military contractor
Google found a series of hacking tools they said were used by a Russian espionage group and a cybercriminal group in China. Sources from a U.S. government defense contractor said some of those hacking tools were theirs. First seen on techcrunch.com Jump to article: techcrunch.com/2026/03/09/an-iphone-hacking-toolkit-used-by-russian-spies-likely-came-from-u-s-military-contractor/
-
New KadNap botnet hijacks ASUS routers to fuel cybercrime proxy network
A newly discovered botnet malware called KadNap is targeting ASUS routers and other edge networking devices to turn them into proxies for malicious traffic. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/new-kadnap-botnet-hijacks-asus-routers-to-fuel-cybercrime-proxy-network/
-
Cybercriminals impersonating city officials to steal permit payments, FBI says
In a notice on Monday, the agency said people and businesses with active applications for the permits are being targeted with phishing emails that often include detailed, accurate information “including property addresses, case numbers, and the true names of city and county officials.” First seen on therecord.media Jump to article: therecord.media/cybercriminals-impersonate-city-officials-permit-payments
-
Telekommunikation ist die Königsklasse für die Cyberkriminalität
Cyberattacken auf Telekommunikations-infrastrukturen treffen nicht nur einzelne Anbieter, sondern eine wichtige Lebensader für Wirtschaft, Gesellschaft und Politik. Die dramatischen Auswirkungen wurden kürzlich wieder deutlich, als Cyberkriminelle im Februar 2026 in die Systeme von Odido, dem größten Mobilfunkanbieter der Niederlande, eindrangen und Daten von 6,2 Millionen Kunden stahlen. Die Angreifer erbeuteten Namen, Adressen, Bankverbindungen sowie teilweise…
-
Telekommunikation ist die Königsklasse für die Cyberkriminalität
Cyberattacken auf Telekommunikationsinfrastrukturen treffen nicht nur einzelne Anbieter, sondern eine wichtige Lebensader für Wirtschaft, Gesellschaft und Politik. First seen on it-daily.net Jump to article: www.it-daily.net/it-sicherheit/cybercrime/telekommunikatio-cyberkriminalitat
-
Teen crew caught selling DDoS attack tools
Seven minors who distributed online programs designed to facilitate DDoS attacks have been identified by Poland’s Central Bureau for Combating Cybercrime (CBZC). They were … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/03/10/poland-minors-identified-distributing-ddos-attack-tools/
-
Phishing campaign spoofs local officials to steal permit fees
The FBI is warning about a phishing scheme in which cybercriminals impersonate city and county officials to solicit fraudulent payments for planning and zoning permits. … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/03/10/fbi-phishing-scheme-planning-zoning-permit-fees/
-
SurxRAT Android Malware Uses LLMs for Phishing and Data Theft
Tags: access, android, control, credentials, cyber, cybercrime, data, LLM, malware, phishing, ransomware, theftA new Android Remote Access Trojan (RAT) named SurxRAT, which is being sold as a commercial malware platform through a Telegram-based malware”‘as”‘a”‘service (MaaS) ecosystem. The malware, marketed under the SURXRAT V5 branding, enables cybercriminals to create customized Android malware builds capable of surveillance, credential theft, remote device control, and ransomware-style device locking. The malware appears…
-
The people behind cyber extortion are often in their forties
Many cybercrime investigations end with arrests or indictments that reveal little about the people behind the operations. When authorities do disclose demographic details, the … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/03/10/cyber-extortion-cybercrime-age-profile/
-
An iPhone-hacking toolkit used by Russian spies likely came from U.S military contractor
Google found a series of hacking tools they said were used by a Russian espionage group and a cybercriminal group in China. Sources from a U.S. government defense contractor said some of those hacking tools were theirs. First seen on techcrunch.com Jump to article: techcrunch.com/2026/03/09/an-iphone-hacking-toolkit-used-by-russian-spies-likely-came-from-u-s-military-contractor/
-
President Trump’s Cyber Strategy for America: What It Means for the U.S. and Why It Matters Globally
Tags: access, ai, awareness, business, ceo, cloud, compliance, computing, cryptography, cyber, cybercrime, cybersecurity, data, defense, exploit, governance, government, healthcare, incident response, infrastructure, intelligence, international, malicious, network, regulation, resilience, risk, skills, startup, strategy, supply-chain, technology, threat, tool, training, usa, vulnerability, zero-trustPresident Trump’s Cyber Strategy for America signals a shift toward risk-based security and cooperation across emerging technologies. While centered on U.S. interests, the strategy provides a blueprint to collectively strengthen global cyber resilience. Key takeaways Cybersecurity as a global security imperative: The strategy signals that cybersecurity has evolved beyond a mere “IT issue” to become…
-
An AI-Powered Poly-Crisis Is Here, and It Is Rewriting Cyber Postures. Are You Breach Ready Yet?
Unless you have been living under a rock over the past few days, you would have seen that AI-powered adversaries are significantly altering how we view cyberattacks and breaches. We are no longer just fighting human adversaries; we are fighting the “new hotness” in cybercrime: agentic AI. As first reported by Bloomberg, a hacker exploited……
-
Cybercrime Group in Vietnam Enables Massive Fraudulent Signups
A wave of fraudulent account registrations to a cybercrime ecosystem operating out of Vietnam. These fake accounts are not just spam; they underpin large-scale financial fraud, phishing, and interpersonal scams that erode trust in online platforms. Attackers scripted mass “puppet” signups on victim services, triggered SMS messages to premium-rate numbers, and then monetized the telecom…
-
Trump Administration Lays Out a High-Level Strategy to Combat Cybercrime
The Trump Administration released is long-anticipated national cybersecurity strategy that calls for an aggressive approach to attackers, use of AI and quantum, and protecting critical infrastructure. It’s full of rhetoric and proposals, but is short on details. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/03/trump-administration-lays-out-a-high-level-strategy-to-combat-cybercrime/
-
Cybercrime kennt kein Geschlecht, aber oft ein Ziel
Tags: cybercrimeDer Weltfrauentag feiert dieses Jahr sein 115. Jubiläum. Einerseits macht er aufmerksam auf die Fortschritte in Sachen Gleichberechtigung. First seen on it-daily.net Jump to article: www.it-daily.net/it-sicherheit/cybercrime/cybercrime-kennt-kein-geschlecht
-
Cybercrime kennt kein Geschlecht, aber oft ein Ziel
Tags: cybercrimeDer Weltfrauentag feiert dieses Jahr sein 115. Jubiläum. Einerseits macht er aufmerksam auf die Fortschritte in Sachen Gleichberechtigung. First seen on it-daily.net Jump to article: www.it-daily.net/it-sicherheit/cybercrime/cybercrime-kennt-kein-geschlecht
-
CBP Used Online Ad Data to Track Phone Locations
Plus: Proton helped the FBI identify a protester, the Leakbase cybercrime forum was busted in an international operation, and more. First seen on wired.com Jump to article: www.wired.com/story/cbp-used-online-ad-data-to-track-phone-locations/
-
Trump Pledges Action on Cybercrime and Cyberspace Threats
Trump Signs Executive Order and Publishes Cyberspace Strategy. U.S. President Donald Trump signed Friday afternoon an executive order directing federal prosecutors, cyber defense officials and diplomats to ramp up efforts to combat cybercriminal gangs. Trump signed the order in tandem with publishing a five-page cybersecurity strategy. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/trump-pledges-action-on-cybercrime-cyberspace-threats-a-30942
-
The long-awaited Trump cyber strategy has arrived
The administration also released an executive order on cybercrime and fraud. First seen on cyberscoop.com Jump to article: cyberscoop.com/trump-cybersecurity-strategy/
-
CyberProof 2026 Report Warns of Rising Identity and AI Cyberattacks
The CyberProof 2026 report warns that cybercriminals are increasingly using stolen identities and AI to launch faster, more scalable attacks. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/threats/cyberproof-2026-report-warns-of-rising-identity-and-ai-cyberattacks/
-
Teenage hacker myth primed for a middle-age criminal makeover
Tags: access, breach, business, corporate, crypto, cyber, cybercrime, cybersecurity, data, detection, extortion, finance, group, hacker, hacking, infrastructure, jobs, malware, network, penetration-testing, programming, ransomware, service, skills, software, technology, threat, vulnerabilityCybercrime cartels: Dray Agha, senior security operations manager at managed detection and response services firm Huntress, said the analysis illustrates that the “Hollywood image of a teenage lone wolf hacking for bragging rights” is vastly outdated since the threat landscape is dominated by “highly organised, profit-driven syndicates.””While young people may still engage in digital vandalism…
-
What Is Address Poisoning
As cryptocurrency adoption continues to grow, so do the tactics used by cybercriminals to exploit users. One of the emerging threats in the blockchain ecosystem is address poisoning, a subtle yet highly deceptive attack designed to trick users into sending funds to fraudulent wallet addresses. Unlike traditional hacking methods that rely on breaching systems,… First…
-
LeakBase marketplace unplugged by cops in 14 countries
Tags: banking, breach, credentials, cybercrime, data, germany, infrastructure, international, Internet, law, marketplace, phishing, service, theftGlobal effort: Thanks to international co-operation, a number of criminal marketplaces have been seized in recent years, including BreachForums and RaidForums.Law enforcement agencies involved in various ways in this week’s takedown came from Australia, Belgium, Canada, Germany, Greece, Kosovo, Malaysia, Netherlands, Poland, Portugal, Romania, Spain, the United Kingdom and the US.News of the seizure comes…
-
Microsoft, Europol disrupt global phishing platform Tycoon 2FA
The service helped cybercriminals bypass multifactor authentication and led to business email compromise and ransomware. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/microsoft-europol-disrupt-phishing-tycoon-2fa/813904/

