Tag: theft
-
FBI links cybercriminals to sharp surge in cargo theft attacks
The U.S. Federal Bureau of Investigation (FBI) warned the transportation and logistics industry of a sharp rise in cyber-enabled cargo theft, with estimated losses in the United States and Canada reaching nearly $725 million in 2025. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/fbi-links-cybercriminals-to-sharp-surge-in-cargo-theft-attacks/
-
FBI links cybercriminals to sharp surge in cargo theft attacks
The U.S. Federal Bureau of Investigation (FBI) warned the transportation and logistics industry of a sharp rise in cyber-enabled cargo theft, with estimated losses in the United States and Canada reaching nearly $725 million in 2025. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/fbi-links-cybercriminals-to-sharp-surge-in-cargo-theft-attacks/
-
Moldova’s health insurance agency reports possible data leak after cyberattack
The agency said the incident occurred several weeks ago and that technical assessments indicated a possible theft of limited information. First seen on therecord.media Jump to article: therecord.media/moldova-health-insurance-agency-reports-possible-data-leak-cyberattack
-
It’s Not the Computer, Stupid. It’s the Information in It. Two Recent Indictments Stretch the Limits of >>Theft<< of Information.
The legal system persists in framing “computer crime” through the archaic lens of tangible property”, theft and conversion”, despite the fact that information is non-rivalrous and easily duplicated without depriving the original owner of possession. Recent federal indictments, such as the Van Dyke and SPLC matters, reveal a “doctrinally aggressive” expansion where the government claims…
-
It’s Not the Computer, Stupid. It’s the Information in It. Two Recent Indictments Stretch the Limits of >>Theft<< of Information.
The legal system persists in framing “computer crime” through the archaic lens of tangible property”, theft and conversion”, despite the fact that information is non-rivalrous and easily duplicated without depriving the original owner of possession. Recent federal indictments, such as the Van Dyke and SPLC matters, reveal a “doctrinally aggressive” expansion where the government claims…
-
It’s Not the Computer, Stupid. It’s the Information in It. Two Recent Indictments Stretch the Limits of >>Theft<< of Information.
The legal system persists in framing “computer crime” through the archaic lens of tangible property”, theft and conversion”, despite the fact that information is non-rivalrous and easily duplicated without depriving the original owner of possession. Recent federal indictments, such as the Van Dyke and SPLC matters, reveal a “doctrinally aggressive” expansion where the government claims…
-
ODNI to CISOs on threat assessments: You’re on your own
Tags: access, ai, china, ciso, computer, control, credentials, cyber, cybercrime, data, defense, detection, disinformation, encryption, finance, framework, government, healthcare, identity, infrastructure, intelligence, iran, jobs, korea, metric, resilience, risk, russia, service, strategy, technology, theft, threat, tool, warfareThe bifurcated framework: Operational reporting vs. homeland focus: The report now operates on two distinct tracks that risk narrowing the threat horizon for CROs. In a departure from traditional probabilistic forecasting, the IC has transitioned toward active operational reporting. This shift prioritizes immediate success metrics, such as a significant drop in border encounters and fentanyl…
-
ODNI to CISOs on threat assessments: You’re on your own
Tags: access, ai, china, ciso, computer, control, credentials, cyber, cybercrime, data, defense, detection, disinformation, encryption, finance, framework, government, healthcare, identity, infrastructure, intelligence, iran, jobs, korea, metric, resilience, risk, russia, service, strategy, technology, theft, threat, tool, warfareThe bifurcated framework: Operational reporting vs. homeland focus: The report now operates on two distinct tracks that risk narrowing the threat horizon for CROs. In a departure from traditional probabilistic forecasting, the IC has transitioned toward active operational reporting. This shift prioritizes immediate success metrics, such as a significant drop in border encounters and fentanyl…
-
CISA flags data-theft bug in NSA-built OT networking tool
GrassMarlin leaks sensitive information, provided your targeting phishing skills are sharp enough First seen on theregister.com Jump to article: www.theregister.com/2026/04/29/cisa_flags_datatheft_bug_in/
-
Cursor AI Extension Flaw Exposes Developer Tokens to Credential Theft
Security researchers at LayerX have uncovered a high-severity vulnerability in the popular AI-powered development environment, Cursor. Dubbed >>CursorJacking,<< this flaw carries a CVSS score of 8.2 and exposes developers to immediate credential theft. Any installed extension can silently access a user's API keys and session tokens without requiring special permissions or user interaction. Standard security…
-
Chinese-Backed Smishing Rings Scale Credential Theft via SMS and OTT Apps
Chinese-language phishing-as-a-service (PhaaS) platforms are rapidly expanding their global reach by leveraging SMS and over-the-top (OTT) messaging channels such as iMessage and Rich Communication Services (RCS). Over the past several months, researchers have conducted large-scale analysis to identify and track some of the most active Chinese-backed phishing ecosystems. Their findings reveal highly organized operations that…
-
Medtronic discloses security incident after ShinyHunters claimed theft of 9M+ records
Medtronic confirmed a breach of its IT systems after ShinyHunters claimed the theft of over 9 million records. Medtronic confirmed a cyberattack on its corporate IT systems after the hacker group ShinyHunters claimed to have stolen over 9 million records. The company did not share details on the security breach. Medtronic is an international medical…
-
BlackFile actively extorting data-theft victims in retail and hospitality sector
Some attackers, which researchers link to The Com, have swatted company executives to increase leverage and pressure victims to pay their ransom demands. First seen on cyberscoop.com Jump to article: cyberscoop.com/blackfile-data-theft-extortion-retail-unit-42-rh-isac/
-
Medtronic confirms breach after hackers claim 9 million records theft
Medical device giant Medtronic disclosed last week that hackers breached its network and accessed data in “certain corporate IT systems.” First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/medtronic-confirms-breach-after-hackers-claim-9-million-records-theft/
-
BlackFile Group Targets Retail and Hospitality with Vishing Attacks
Researchers uncover a new data theft and extortion group dubbed “BlackFile” First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/blackfile-group-targets-retail/
-
BlackFile Group Targets Retail and Hospitality with Vishing Attacks
Researchers uncover a new data theft and extortion group dubbed “BlackFile” First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/blackfile-group-targets-retail/
-
BlackFile Group Targets Retail and Hospitality with Vishing Attacks
Researchers uncover a new data theft and extortion group dubbed “BlackFile” First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/blackfile-group-targets-retail/
-
New BlackFile extortion group linked to surge of vishing attacks
A new financially motivated hacking group tracked as BlackFile has been linked to a wave of data theft and extortion attacks against retail and hospitality organizations since February 2026. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/new-blackfile-extortion-gang-targets-retail-and-hospitality-orgs/
-
North Korea’s Lazarus Targets macOS Users via ClickFix
Lazarus continues leveraging ClickFix for initial access and data theft, in this case, against Mac-centric organizations and their high-value leaders. First seen on darkreading.com Jump to article: www.darkreading.com/threat-intelligence/north-koreas-lazarus-targets-macos-users-clickfix
-
Community-Tool zur Erkennung von Credential-Theft mit Defense-First-AI
Arctic Wolf gibt die Einführung von Decipio bekannt. Dabei handelt es sich um ein defensives Cybersecurity-Tool, das Security-Teams dabei unterstützt, Angreifer genau in dem Moment zu erkennen, in dem sie Zugangsdaten innerhalb eines Netzwerks stehlen wollen. Der Diebstahl von Zugangsdaten zählt weiterhin zu den häufigsten Arten von Cyberangriffen, gleichzeitig stellt sich deren frühzeitige Erkennung als besonders schwer dar. Der jährliche Threat-Report von Arctic Wolf zeigt wiederholt,…
-
French Police Arrest HexDex Hacker Over Mass Data Theft and Leaks
French police arrest HexDex hacker, a 20-year-old suspect accused of mass data theft and leaks targeting government, sports groups, and firms. First seen on hackread.com Jump to article: hackread.com/french-police-arrest-hexdex-hacker-data-leak-leaks/
-
Ransomware Gang Unveils Custom Data-Theft Tool
Ransomware operators introduced a custom-built data exfiltration tool, signaling a notable evolution in attack techniques. Unlike most ransomware groups that rely on publicly available utilities such as Rclone or MegaSync, Trigona affiliates are now using a proprietary tool to steal sensitive data with greater precision and stealth. Trigona, active since late 2022, operates as a…
-
Cryptohack Roundup: US-Sanctioned Grinex Hacked
Also: Updates in KelpDAO, Drift, Hyperbridge Hacks. This week, Grinex was exploited, a hacker laundered KelpDAO funds, Circle was sued over $280M Drift hack, Rhea Finance and Volo Protocol were exploited, update in Hyperbridge hack, sentencing in art scam case, a French home invasion for crypto theft and eth.limo hijack thwarted. First seen on govinfosecurity.com…
-
Offer customers passkeys by default, UK’s NCSC tells enterprises
How passkeys change the attack model: The NCSC added that passkeys reduce risk by removing reliance on shared secrets and binding authentication to the legitimate service.According to the agency, this prevents credential reuse and relay attacks, as authentication cannot be intercepted and reused by an attacker.Passkeys use cryptographic key pairs stored on a user’s device,…
-
UK’s NCSC calls passkeys the default, says passwords are no longer fit for the purpose
How passkeys change the attack model: The NCSC added that passkeys reduce risk by removing reliance on shared secrets and binding authentication to the legitimate service.According to the agency, this prevents credential reuse and relay attacks, as authentication cannot be intercepted and reused by an attacker.Passkeys use cryptographic key pairs stored on a user’s device,…
-
Xinference PyPI Breach Exposes Developers to Cloud Credential Theft
A severe supply chain attack has compromised the popular Python package Xinference, exposing developers to massive data theft. Threat actors uploaded malicious versions of the tool to the Python Package Index (PyPI), embedding a heavily obfuscated infostealer into the code. Xinference has over 600,000 total downloads, making this a significant security event for the software…

