cybercriminals

Cybercriminal adoption of browser fingerprinting

Cybercriminal adoption of browser fingerprinting 2024-04-05 at 08:01 By Help Net Security Browser fingerprinting is one of many tactics phishing site authors use to evade security checks and lengthen the lifespan of malicious campaigns. While browser fingerprinting has been used by legitimate organizations to uniquely identify web browsers for nearly 15 years, it is now […]

React to this headline:

Loading spinner

Cybercriminal adoption of browser fingerprinting Read More »

RaaS groups increasing efforts to recruit affiliates

RaaS groups increasing efforts to recruit affiliates 2024-03-20 at 16:46 By Zeljka Zorz Smaller RaaS groups are trying to recruit new and “displaced” LockBit and Alphv/BlackCat affiliates by foregoing deposits and paid subscriptions, offering better payout splits, 24/7 support, and other “perks”. Cybercriminals wanted RaaS operations usually consist of a core group that develops the

React to this headline:

Loading spinner

RaaS groups increasing efforts to recruit affiliates Read More »

Outsmarting cybercriminal innovation with strategies for enterprise resilience

Outsmarting cybercriminal innovation with strategies for enterprise resilience 2024-03-19 at 07:19 By Mirko Zorz In this Help Net Security interview, Pedro Cameirão, Head of Cyber Defense Center at Nokia, discusses emerging cybersecurity trends for 2024 and advises enterprises on preparation strategies. Cameirão will speak at GISEC Global 2024 in Dubai, a conference and exhibition bringing

React to this headline:

Loading spinner

Outsmarting cybercriminal innovation with strategies for enterprise resilience Read More »

Cybercriminals harness AI for new era of malware development

Cybercriminals harness AI for new era of malware development 2024-03-01 at 08:31 By Help Net Security The alliance between ransomware groups and initial access brokers (IABs) is still the powerful engine for cybercriminal industry, as evidenced by the 74% year-on-year increase in the number of companies that had their data uploaded on dedicated leak sites

React to this headline:

Loading spinner

Cybercriminals harness AI for new era of malware development Read More »

Clean links and sophisticated scams mark new era in email attacks

Clean links and sophisticated scams mark new era in email attacks 2024-02-20 at 06:05 By Help Net Security Analysis of 7 billion emails shows clean links are duping users, malicious EML attachments increased 10-fold in Q4, and social engineering attacks are at all-time highs, according to VIPRE Security. The rise of the EML file attachments

React to this headline:

Loading spinner

Clean links and sophisticated scams mark new era in email attacks Read More »

iOS users beware: GoldPickaxe trojan steals your facial data

iOS users beware: GoldPickaxe trojan steals your facial data 2024-02-15 at 12:16 By Help Net Security Group-IB uncovered a new iOS trojan designed to steal users’ facial recognition data, identity documents, and intercept SMS. The trojan, dubbed GoldPickaxe.iOS by Group-IB’s Threat Intelligence unit, has been attributed to a Chinese-speaking threat actor codenamed GoldFactory, responsible for

React to this headline:

Loading spinner

iOS users beware: GoldPickaxe trojan steals your facial data Read More »

How to take control of personal data

How to take control of personal data 2024-02-14 at 07:01 By Help Net Security Cybercriminals increasingly use open-source intelligence (OSINT) to craft convincing backstories, often by mining social media profiles for details on a target’s profession, interests, and routines. Armed with these personal insights, these malicious actors leverage chatbots to compose highly persuasive messages. Additionally,

React to this headline:

Loading spinner

How to take control of personal data Read More »

Hacking the flow: The consequences of compromised water systems

Hacking the flow: The consequences of compromised water systems 2024-02-12 at 07:31 By Help Net Security In this Help Net Security video, Andy Thompson, Offensive Cybersecurity Research Evangelist at CyberArk, discusses the dire consequences of hacking water systems and why their cybersecurity must be prioritized. From contaminating water supplies to disrupting essential services, the impact

React to this headline:

Loading spinner

Hacking the flow: The consequences of compromised water systems Read More »

Cybercriminals embrace smarter strategies, less effort

Cybercriminals embrace smarter strategies, less effort 2024-01-29 at 06:33 By Help Net Security 2024 is shaping up to be a record-breaking year for data breaches, according to Experian. Despite 2023 being labeled as a ‘successful’ year for malicious actors, the upcoming months may bring forth developments that could further disrupt the cybersecurity landscape. Supply chain

React to this headline:

Loading spinner

Cybercriminals embrace smarter strategies, less effort Read More »

Out with the old and in with the improved: MFA needs a revamp

Out with the old and in with the improved: MFA needs a revamp 2024-01-19 at 08:02 By Help Net Security From AI to ZTA (zero-trust architecture), the technology responsible for protecting your company’s data has evolved immensely. Despite the advances, cybercriminals repeatedly find new and creative ways to gain access to sensitive information. This can

React to this headline:

Loading spinner

Out with the old and in with the improved: MFA needs a revamp Read More »

Hackers employ nuanced tactics to evade detection

Hackers employ nuanced tactics to evade detection 2024-01-02 at 07:01 By Help Net Security Threat actors evolved tactics, opting for a more nuanced approach that spread attacks across a broader timeframe to blend in with legitimate traffic and evade detection during peak holiday shopping times, according to Cequence Security. 2023 holiday season unveiled alarming realities

React to this headline:

Loading spinner

Hackers employ nuanced tactics to evade detection Read More »

5 pivotal cybersecurity trends for 2024

5 pivotal cybersecurity trends for 2024 2023-12-28 at 07:01 By Help Net Security In 2023, cyberattacks surged both in terms of frequency and sophistication. The proliferation of cutting-edge hacking tools and technologies – now more accessible than ever thanks to advances in generative AI – created an environment conducive for cyber threats to flourish, forcing

React to this headline:

Loading spinner

5 pivotal cybersecurity trends for 2024 Read More »

Cybercrime operation that sold millions of fraudulent Microsoft accounts disrupted

Cybercrime operation that sold millions of fraudulent Microsoft accounts disrupted 14/12/2023 at 12:19 By Help Net Security Microsoft disrupted an alleged threat actor group that built viable cybercrime-as-a-service (CaaS) businesses. Dubbed Storm-1152 by Microsoft, the group bilked enterprises and consumers globally out of millions of dollars. Images of Storm-1152’s illicit websites. Source: Microsoft Cybercrime-as-a-service is

React to this headline:

Loading spinner

Cybercrime operation that sold millions of fraudulent Microsoft accounts disrupted Read More »

Organizations can’t ignore the surge in malicious web links

Organizations can’t ignore the surge in malicious web links 30/11/2023 at 07:02 By Help Net Security Despite the rising adoption of collaboration and instant messaging software, email remains a significant area of concern regarding cyber attacks, particularly the increasing threat of cybercriminals employing harmful web links in emails, according to Hornetsecurity. Attack techniques used in

React to this headline:

Loading spinner

Organizations can’t ignore the surge in malicious web links Read More »

Ukrainian ransomware gang behind high-profile attacks dismantled

Ukrainian ransomware gang behind high-profile attacks dismantled 28/11/2023 at 13:46 By Help Net Security Law enforcement and judicial authorities from seven countries have joined forces with Europol and Eurojust to dismantle and apprehend in Ukraine key figures behind significant ransomware operations. On 21 November, 30 properties were searched in the regions of Kyiv, Cherkasy, Rivne

React to this headline:

Loading spinner

Ukrainian ransomware gang behind high-profile attacks dismantled Read More »

AI and contextual threat intelligence reshape defense strategies

AI and contextual threat intelligence reshape defense strategies 24/11/2023 at 07:01 By Help Net Security AI continues to evolve to improve both cyber defense and cyber criminal activities, while regulatory pressures, continued consolidation, and geopolitical concerns will drive more proactive cybersecurity efforts with contextual threat intelligence, according to Cybersixgill. As organizations increasingly adopt Threat Exposure

React to this headline:

Loading spinner

AI and contextual threat intelligence reshape defense strategies Read More »

Outsmarting cybercriminals is becoming a hard thing to do

Outsmarting cybercriminals is becoming a hard thing to do 20/11/2023 at 07:01 By Help Net Security Cybercriminals have evolved into organized and highly adaptive networks, collaborating globally to exploit weaknesses in cybersecurity defenses. Their motivations range from financial gain and information theft to political espionage and ideological warfare. Cybercriminals, now more than ever, are exploiting

React to this headline:

Loading spinner

Outsmarting cybercriminals is becoming a hard thing to do Read More »

Transforming cybersecurity from reactive to proactive with attack path analysis

Transforming cybersecurity from reactive to proactive with attack path analysis 17/11/2023 at 08:03 By Help Net Security An attack path is important to prioritize potential risks in cloud environments. The attack path offers the ability to look at cloud environments from the attacker’s perspective. With today’s general awareness and concerted effort toward cybersecurity, cybercriminals rarely

React to this headline:

Loading spinner

Transforming cybersecurity from reactive to proactive with attack path analysis Read More »

Telemetry gaps leave networks vulnerable as attackers move faster

Telemetry gaps leave networks vulnerable as attackers move faster 16/11/2023 at 09:01 By Help Net Security Telemetry logs are missing in nearly 42% of the attack cases studied, according to Sophos. In 82% of these cases, cybercriminals disabled or wiped out the telemetry to hide their tracks. Gaps in telemetry decrease much-needed visibility into organizations’

React to this headline:

Loading spinner

Telemetry gaps leave networks vulnerable as attackers move faster Read More »

Scroll to Top