cybercrime

The Zoom attack you didn’t see coming

The Zoom attack you didn’t see coming 2025-04-18 at 17:02 By Zeljka Zorz Did you know that when participating in a Zoom call, you can grant permission to other participants to control your computer remotely? While this feature may come in handy when dealing with trusted family, friends and colleagues, threat actors have started abusing […]

React to this headline:

Loading spinner

The Zoom attack you didn’t see coming Read More »

In Other News: 4chan Hacked, Android Auto-Reboot, Nemesis Admin Charged

In Other News: 4chan Hacked, Android Auto-Reboot, Nemesis Admin Charged 2025-04-18 at 14:34 By SecurityWeek News Noteworthy stories that might have slipped under the radar: 4chan hacked, auto-reboot security feature coming to Android, Iranian administrator of Nemesis charged in US. The post In Other News: 4chan Hacked, Android Auto-Reboot, Nemesis Admin Charged appeared first on

React to this headline:

Loading spinner

In Other News: 4chan Hacked, Android Auto-Reboot, Nemesis Admin Charged Read More »

When ransomware strikes, what’s your move?

When ransomware strikes, what’s your move? 2025-04-18 at 08:37 By Sinisa Markovic Should we negotiate? Should we pay? These are the questions every organization faces when cybercriminals lock their data. By the time attackers have encrypted your systems, the focus shifts from prevention to response. It’s no longer about how it happened, it’s about what

React to this headline:

Loading spinner

When ransomware strikes, what’s your move? Read More »

Widely available AI tools signal new era of malicious bot activity

Widely available AI tools signal new era of malicious bot activity 2025-04-18 at 07:34 By Help Net Security Rise in accessible AI tools significantly lowered the barrier to entry for cyber attackers, enabling them to create and deploy malicious bots at scale, according to Thales. Automated bot traffic surpassed human-generated traffic for the first time

React to this headline:

Loading spinner

Widely available AI tools signal new era of malicious bot activity Read More »

Man Helped Chinese Nationals Get Jobs Involving Sensitive US Government Projects

Man Helped Chinese Nationals Get Jobs Involving Sensitive US Government Projects 2025-04-17 at 19:40 By Ionut Arghire Minh Phuong Ngoc Vong pleaded guilty to defrauding US companies of roughly $1 million in a fake IT worker scheme. The post Man Helped Chinese Nationals Get Jobs Involving Sensitive US Government Projects appeared first on SecurityWeek. This

React to this headline:

Loading spinner

Man Helped Chinese Nationals Get Jobs Involving Sensitive US Government Projects Read More »

Inside PlugValley: How this AI vishing-as-a-service group operates

Inside PlugValley: How this AI vishing-as-a-service group operates 2025-04-17 at 07:41 By Help Net Security In this Help Net Security video, Alexis Ober, Threat Intel Analyst at Fortra, discusses the threat actor group PlugValley, which is now offering AI-powered vishing-as-a-service. Rather than requiring technical skills or large budgets, PlugValley’s service lets any cybercriminal launch vishing

React to this headline:

Loading spinner

Inside PlugValley: How this AI vishing-as-a-service group operates Read More »

New ‘ResolverRAT’ Targeting Healthcare, Pharmaceutical Organizations

New ‘ResolverRAT’ Targeting Healthcare, Pharmaceutical Organizations 2025-04-14 at 16:49 By Ionut Arghire Organizations in the healthcare and pharmaceutical sectors have been targeted with ResolverRAT, a new malware family with advanced capabilities. The post New ‘ResolverRAT’ Targeting Healthcare, Pharmaceutical Organizations appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source React to

React to this headline:

Loading spinner

New ‘ResolverRAT’ Targeting Healthcare, Pharmaceutical Organizations Read More »

Malicious NPM Packages Target Cryptocurrency, PayPal Users

Malicious NPM Packages Target Cryptocurrency, PayPal Users 2025-04-14 at 13:45 By Ionut Arghire Threat actors are publishing malicious NPM packages to steal PayPal credentials and hijack cryptocurrency transfers. The post Malicious NPM Packages Target Cryptocurrency, PayPal Users appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source React to this headline:

React to this headline:

Loading spinner

Malicious NPM Packages Target Cryptocurrency, PayPal Users Read More »

In Other News: Scattered Spider Still Active, EncryptHub Unmasked, Rydox Extraditions

In Other News: Scattered Spider Still Active, EncryptHub Unmasked, Rydox Extraditions 2025-04-11 at 15:17 By SecurityWeek News Noteworthy stories that might have slipped under the radar: Scattered Spider still active despite arrests, hacker known as EncryptHub unmasked, Rydox admins extradited to US.  The post In Other News: Scattered Spider Still Active, EncryptHub Unmasked, Rydox Extraditions

React to this headline:

Loading spinner

In Other News: Scattered Spider Still Active, EncryptHub Unmasked, Rydox Extraditions Read More »

Ransomware groups push negotiations to new levels of uncertainty

Ransomware groups push negotiations to new levels of uncertainty 2025-04-11 at 08:18 By Help Net Security Ransomware attacks increased by nearly 20% in 2024, and the severity rose by 13%, according to At-Bay. The blast radius of ransomware continues to grow as businesses impacted by attacks on vendors and partners increased 43%, while the average

React to this headline:

Loading spinner

Ransomware groups push negotiations to new levels of uncertainty Read More »

From likes to leaks: How social media presence impacts corporate security

From likes to leaks: How social media presence impacts corporate security 2025-04-10 at 08:07 By Help Net Security From a psychological standpoint, we all crave attention, and likes and comments fuel that need, encouraging us to share even more on social media. In the corporate world, this risk grows exponentially because it’s not just our

React to this headline:

Loading spinner

From likes to leaks: How social media presence impacts corporate security Read More »

AI Now Outsmarts Humans in Spear Phishing, Analysis Shows

AI Now Outsmarts Humans in Spear Phishing, Analysis Shows 2025-04-09 at 20:02 By Kevin Townsend Agentic AI has improved spear phishing effectiveness by 55% since 2023, research shows. The post AI Now Outsmarts Humans in Spear Phishing, Analysis Shows appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source React to

React to this headline:

Loading spinner

AI Now Outsmarts Humans in Spear Phishing, Analysis Shows Read More »

Suspected Scattered Spider Hacker Pleads Guilty

Suspected Scattered Spider Hacker Pleads Guilty 2025-04-07 at 13:19 By Eduard Kovacs A 20-year-old arrested last year and charged alongside others believed to be members of Scattered Spider has pleaded guilty. The post Suspected Scattered Spider Hacker Pleads Guilty appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source React to

React to this headline:

Loading spinner

Suspected Scattered Spider Hacker Pleads Guilty Read More »

Phishers are increasingly impersonating electronic toll collection companies

Phishers are increasingly impersonating electronic toll collection companies 2025-04-03 at 14:31 By Zeljka Zorz Steam was the most imitated brands by phishers in the first quarter of 2025, followed by Microsoft and Facebook/Meta, Guardio researchers have revealed. “Historically, the #1 spot has been dominated by the usual suspects – big tech companies like Meta, Microsoft,

React to this headline:

Loading spinner

Phishers are increasingly impersonating electronic toll collection companies Read More »

Beware fake AutoCAD, SketchUp sites dropping malware

Beware fake AutoCAD, SketchUp sites dropping malware 2025-04-03 at 09:47 By Help Net Security Malware peddlers are saddling users with the TookPS downloader and the Lapmon and TeviRat backdoors via malicious sites that mimic official ones and ostensibly offer legitimate software for download, Kaspersky researchers have warned. Malicious websites (Source: Kaspersky) The list of impersonated

React to this headline:

Loading spinner

Beware fake AutoCAD, SketchUp sites dropping malware Read More »

Cybercriminals exfiltrate data in just three days

Cybercriminals exfiltrate data in just three days 2025-04-03 at 08:14 By Industry News In 56% of Sophos managed detection and response (MDR) and incident response (IR) cases, attackers gained initial access to networks by exploiting external remote services, including edge devices such as firewalls and VPNs, and by leveraging valid accounts. Compromised credentials remain the

React to this headline:

Loading spinner

Cybercriminals exfiltrate data in just three days Read More »

Open-source malware doubles, data exfiltration attacks dominate

Open-source malware doubles, data exfiltration attacks dominate 2025-04-03 at 07:02 By Help Net Security There’s been a notable shift in the types of threats targeting software developers, with a total of 17,954 open source malware packages identified in Q1 2025, according to Sonatype. Quarterly breakdown (Source: Sonatype) The Q1 figure represents a significant decrease from

React to this headline:

Loading spinner

Open-source malware doubles, data exfiltration attacks dominate Read More »

AI Giving Rise of the ‘Zero-Knowledge’ Threat Actor

AI Giving Rise of the ‘Zero-Knowledge’ Threat Actor 2025-04-02 at 17:18 By Etay Maor The rise of zero-knowledge threat actors powered by AI marks a turning point in the business of cybercrime where sophisticated attacks are no longer confined to skilled attackers. The post AI Giving Rise of the ‘Zero-Knowledge’ Threat Actor appeared first on

React to this headline:

Loading spinner

AI Giving Rise of the ‘Zero-Knowledge’ Threat Actor Read More »

North Korea’s IT Operatives Are Exploiting Remote Work Globally

North Korea’s IT Operatives Are Exploiting Remote Work Globally 2025-04-02 at 16:32 By Kevin Townsend The global rise of North Korean IT worker infiltration poses a serious cybersecurity risk—using fake identities, remote access, and extortion to compromise organizations. The post North Korea’s IT Operatives Are Exploiting Remote Work Globally appeared first on SecurityWeek. This article

React to this headline:

Loading spinner

North Korea’s IT Operatives Are Exploiting Remote Work Globally Read More »

Check Point Responds to Hacking Claims

Check Point Responds to Hacking Claims 2025-04-01 at 14:04 By Ionut Arghire Check Point has responded to a hacker’s claims of sensitive data theft, confirming an incident but saying that it had limited impact. The post Check Point Responds to Hacking Claims appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original

React to this headline:

Loading spinner

Check Point Responds to Hacking Claims Read More »

Scroll to Top