cybercrime

How to recognize employment fraud before it becomes a security issue

How to recognize employment fraud before it becomes a security issue 2024-11-26 at 07:39 By Help Net Security The combination of remote work, the latest technologies, and never physically meeting your employees has made it very easy for job applicants to mask their true identities from their employer and commit employment fraud. Motivations for this […]

React to this headline:

Loading spinner

How to recognize employment fraud before it becomes a security issue Read More »

Cybercriminals turn to pen testers to test ransomware efficiency

Cybercriminals turn to pen testers to test ransomware efficiency 2024-11-22 at 07:04 By Help Net Security Ransomware gangs recruit pen testers to improve attack reliability Threat actors employ pen testers to improve ransomware effectiveness Threat actors are recruiting pen testers to test and improve the reliability of their ransomware for affiliate programs, according to Cato

React to this headline:

Loading spinner

Cybercriminals turn to pen testers to test ransomware efficiency Read More »

Deepfake attacks occur every five minutes

Deepfake attacks occur every five minutes 2024-11-22 at 06:35 By Help Net Security As cybercriminals continue to adapt their techniques to find new ways through defenses, AI-assisted fraud is growing increasingly sophisticated and frequent, according to Entrust. The findings reveal a deepfake attack happened every five minutes in 2024, while digital document forgeries increased 244%

React to this headline:

Loading spinner

Deepfake attacks occur every five minutes Read More »

US charges five alleged members of Scattered Spider gang

US charges five alleged members of Scattered Spider gang 2024-11-21 at 18:03 By Help Net Security Law enforcement unsealed criminal charges against five alleged members of Scattered Spider, who allegedly targeted employees of companies nationwide with phishing text messages and then used the harvested employee credentials to log in and steal non-public company data and

React to this headline:

Loading spinner

US charges five alleged members of Scattered Spider gang Read More »

Phobos ransomware administrator faces US cybercrime charges

Phobos ransomware administrator faces US cybercrime charges 2024-11-19 at 12:33 By Help Net Security The Justice Department unsealed criminal charges against Evgenii Ptitsyn, 42, a Russian national, for allegedly administering the sale, distribution, and operation of Phobos ransomware. Ptitsyn made his initial appearance in the US District Court for the District of Maryland on Nov.

React to this headline:

Loading spinner

Phobos ransomware administrator faces US cybercrime charges Read More »

How and where to report cybercrime: What you need to know

How and where to report cybercrime: What you need to know 2024-11-18 at 06:03 By Help Net Security Cybercrime reporting mechanisms vary across the globe, with each country offering different methods for citizens to report cybercrime, including online fraud, identity theft, and other cyber-related offenses. Victims are usually instructed to complete an online form that

React to this headline:

Loading spinner

How and where to report cybercrime: What you need to know Read More »

Cybercriminals hijack DNS to build stealth attack networks

Cybercriminals hijack DNS to build stealth attack networks 2024-11-15 at 16:05 By Help Net Security Hijacking domains using a ‘Sitting Ducks attack’ remains an underrecognized topic in the cybersecurity community. Few threat researchers are familiar with this attack vector, and knowledge is scarce. However, the prevalence of these attacks and the risk to organizations are

React to this headline:

Loading spinner

Cybercriminals hijack DNS to build stealth attack networks Read More »

GoIssue phishing tool targets GitHub developer credentials

GoIssue phishing tool targets GitHub developer credentials 2024-11-13 at 15:49 By Mirko Zorz Researchers discovered GoIssue, a new phishing tool targeting GitHub users, designed to extract email addresses from public profiles and launch mass email attacks. Marketed on a cybercrime forum, GoIssue allows attackers to send bulk emails while keeping their identity hidden using proxies.

React to this headline:

Loading spinner

GoIssue phishing tool targets GitHub developer credentials Read More »

Infostealers increasingly impact global security

Infostealers increasingly impact global security 2024-11-13 at 15:18 By Help Net Security Check Point Software’s latest threat index reveals a significant rise in infostealers like Lumma Stealer, while mobile malware like Necro continues to pose a significant threat, highlighting the evolving tactics used by cybercriminals across the globe. Last month researchers discovered an infection chain

React to this headline:

Loading spinner

Infostealers increasingly impact global security Read More »

Social engineering scams sweep through financial institutions

Social engineering scams sweep through financial institutions 2024-11-13 at 06:04 By Help Net Security North American financial institutions fielded 10 times more reports of social engineering scams in 2024 than they did a year ago, according to BioCatch. The data shows scams now represent 23% of all digital banking fraud. Growing danger of deepfake and

React to this headline:

Loading spinner

Social engineering scams sweep through financial institutions Read More »

Sophos mounted counter-offensive operation to foil Chinese attackers

Sophos mounted counter-offensive operation to foil Chinese attackers 2024-10-31 at 16:04 By Help Net Security Sophos conducted defensive and counter-offensive operation over the last five years with multiple interlinked nation-state adversaries based in China targeting perimeter devices, including Sophos Firewalls. Espionage campaigns tied to Chinese hacking groups The attackers used a series of campaigns with

React to this headline:

Loading spinner

Sophos mounted counter-offensive operation to foil Chinese attackers Read More »

Lottie Player supply chain compromise: Sites, apps showing crypto scam pop-ups

Lottie Player supply chain compromise: Sites, apps showing crypto scam pop-ups 2024-10-31 at 14:38 By Zeljka Zorz A supply chain compromise involving Lottie Player, a widely used web component for playing site and app animations, has made popular decentralized finance apps show pop-ups urging users to connect their wallets, TradingView has reported. The pop-up (Source:

React to this headline:

Loading spinner

Lottie Player supply chain compromise: Sites, apps showing crypto scam pop-ups Read More »

99% of CISOs work extra hours every week

99% of CISOs work extra hours every week 2024-10-31 at 06:06 By Help Net Security The most common challenge for CISOs is resource constraints: not enough staff, budget or technology to support the security program needed or meet compliance requirements, according to DirectDefense. Cybersecurity industry faces ongoing talent shortage The World Economic Forum claims there’s

React to this headline:

Loading spinner

99% of CISOs work extra hours every week Read More »

Fraudsters revive old tactics mixed with modern technology

Fraudsters revive old tactics mixed with modern technology 2024-10-28 at 07:04 By Help Net Security Threat actors continue to probe the payments ecosystem for vulnerabilities and were successful in conducting fraud schemes affecting multiple financial institutions, technologies, and processes, according to Visa. The resurgence of physical theft Scammers are going back to basics with an

React to this headline:

Loading spinner

Fraudsters revive old tactics mixed with modern technology Read More »

AI and deepfakes fuel phishing scams, making detection harder

AI and deepfakes fuel phishing scams, making detection harder 2024-10-24 at 06:03 By Help Net Security AI impersonation is now the hardest vector for cybersecurity professionals to protect companies against, according to Teleport. The study, which surveyed 250 senior US and UK decision-makers, shows that social engineering remains one of the top tactics cybercriminals use

React to this headline:

Loading spinner

AI and deepfakes fuel phishing scams, making detection harder Read More »

Phishing scams and malicious domains take center stage as the US election approaches

Phishing scams and malicious domains take center stage as the US election approaches 2024-10-22 at 07:03 By Help Net Security Phishing scams aimed at voters, malicious domain registrations impersonating candidates, and other threat activity designed to exploit unassuming victims take center stage as the US election approaches, according to Fortinet. “As the 2024 US presidential

React to this headline:

Loading spinner

Phishing scams and malicious domains take center stage as the US election approaches Read More »

Evolving cybercriminal tactics targeting SMBs

Evolving cybercriminal tactics targeting SMBs 2024-10-21 at 07:01 By Help Net Security A recent Todyl report revealed a 558% increase in BEC (Business Email Compromise), AiTM (Adversary-in-the-Middle), and ATO (Account Takeover) attacks in 2024. In this Help Net Security video, David Langlands, Chief Security Officer at Todyl, discusses these evolving cyber threats. Here are the

React to this headline:

Loading spinner

Evolving cybercriminal tactics targeting SMBs Read More »

Vietnamese Threat Actor’s Multi-Layered Strategy on Digital Marketing Professionals

Vietnamese Threat Actor’s Multi-Layered Strategy on Digital Marketing Professionals 2024-10-18 at 12:48 By rohansinhacyblecom Key takeaways Overview Cyble Research and Intelligence Lab (CRIL) has uncovered an advanced attack campaign that likely originates from spam emails containing phishing attachments. These emails include an archive file with an LNK file disguised as a PDF file. The attack

React to this headline:

Loading spinner

Vietnamese Threat Actor’s Multi-Layered Strategy on Digital Marketing Professionals Read More »

What to do if your iPhone or Android smartphone gets stolen?

What to do if your iPhone or Android smartphone gets stolen? 2024-10-18 at 07:01 By Help Net Security A lost, stolen, or compromised smartphone today means we are in serious trouble. Most people have everything related to their personal and professional lives stored on their phones, a fact that criminals are well aware of. Cybersecurity

React to this headline:

Loading spinner

What to do if your iPhone or Android smartphone gets stolen? Read More »

Cybercrime’s constant rise is becoming everyone’s problem

Cybercrime’s constant rise is becoming everyone’s problem 2024-10-18 at 06:31 By Help Net Security Cybercrime in recent years shows no signs of slowing down, with phishing attacks surging and ransomware tactics becoming more advanced, forcing organizations to constantly adapt their defenses. The rise of deepfake technology, especially in creating realistic audio impersonations, poses new dangers.

React to this headline:

Loading spinner

Cybercrime’s constant rise is becoming everyone’s problem Read More »

Scroll to Top