cybercriminals

iOS users beware: GoldPickaxe trojan steals your facial data

iOS users beware: GoldPickaxe trojan steals your facial data 2024-02-15 at 12:16 By Help Net Security Group-IB uncovered a new iOS trojan designed to steal users’ facial recognition data, identity documents, and intercept SMS. The trojan, dubbed GoldPickaxe.iOS by Group-IB’s Threat Intelligence unit, has been attributed to a Chinese-speaking threat actor codenamed GoldFactory, responsible for […]

React to this headline:

Loading spinner

iOS users beware: GoldPickaxe trojan steals your facial data Read More »

How to take control of personal data

How to take control of personal data 2024-02-14 at 07:01 By Help Net Security Cybercriminals increasingly use open-source intelligence (OSINT) to craft convincing backstories, often by mining social media profiles for details on a target’s profession, interests, and routines. Armed with these personal insights, these malicious actors leverage chatbots to compose highly persuasive messages. Additionally,

React to this headline:

Loading spinner

How to take control of personal data Read More »

Hacking the flow: The consequences of compromised water systems

Hacking the flow: The consequences of compromised water systems 2024-02-12 at 07:31 By Help Net Security In this Help Net Security video, Andy Thompson, Offensive Cybersecurity Research Evangelist at CyberArk, discusses the dire consequences of hacking water systems and why their cybersecurity must be prioritized. From contaminating water supplies to disrupting essential services, the impact

React to this headline:

Loading spinner

Hacking the flow: The consequences of compromised water systems Read More »

Cybercriminals embrace smarter strategies, less effort

Cybercriminals embrace smarter strategies, less effort 2024-01-29 at 06:33 By Help Net Security 2024 is shaping up to be a record-breaking year for data breaches, according to Experian. Despite 2023 being labeled as a ‘successful’ year for malicious actors, the upcoming months may bring forth developments that could further disrupt the cybersecurity landscape. Supply chain

React to this headline:

Loading spinner

Cybercriminals embrace smarter strategies, less effort Read More »

Out with the old and in with the improved: MFA needs a revamp

Out with the old and in with the improved: MFA needs a revamp 2024-01-19 at 08:02 By Help Net Security From AI to ZTA (zero-trust architecture), the technology responsible for protecting your company’s data has evolved immensely. Despite the advances, cybercriminals repeatedly find new and creative ways to gain access to sensitive information. This can

React to this headline:

Loading spinner

Out with the old and in with the improved: MFA needs a revamp Read More »

Hackers employ nuanced tactics to evade detection

Hackers employ nuanced tactics to evade detection 2024-01-02 at 07:01 By Help Net Security Threat actors evolved tactics, opting for a more nuanced approach that spread attacks across a broader timeframe to blend in with legitimate traffic and evade detection during peak holiday shopping times, according to Cequence Security. 2023 holiday season unveiled alarming realities

React to this headline:

Loading spinner

Hackers employ nuanced tactics to evade detection Read More »

5 pivotal cybersecurity trends for 2024

5 pivotal cybersecurity trends for 2024 2023-12-28 at 07:01 By Help Net Security In 2023, cyberattacks surged both in terms of frequency and sophistication. The proliferation of cutting-edge hacking tools and technologies – now more accessible than ever thanks to advances in generative AI – created an environment conducive for cyber threats to flourish, forcing

React to this headline:

Loading spinner

5 pivotal cybersecurity trends for 2024 Read More »

Cybercrime operation that sold millions of fraudulent Microsoft accounts disrupted

Cybercrime operation that sold millions of fraudulent Microsoft accounts disrupted 14/12/2023 at 12:19 By Help Net Security Microsoft disrupted an alleged threat actor group that built viable cybercrime-as-a-service (CaaS) businesses. Dubbed Storm-1152 by Microsoft, the group bilked enterprises and consumers globally out of millions of dollars. Images of Storm-1152’s illicit websites. Source: Microsoft Cybercrime-as-a-service is

React to this headline:

Loading spinner

Cybercrime operation that sold millions of fraudulent Microsoft accounts disrupted Read More »

Organizations can’t ignore the surge in malicious web links

Organizations can’t ignore the surge in malicious web links 30/11/2023 at 07:02 By Help Net Security Despite the rising adoption of collaboration and instant messaging software, email remains a significant area of concern regarding cyber attacks, particularly the increasing threat of cybercriminals employing harmful web links in emails, according to Hornetsecurity. Attack techniques used in

React to this headline:

Loading spinner

Organizations can’t ignore the surge in malicious web links Read More »

Ukrainian ransomware gang behind high-profile attacks dismantled

Ukrainian ransomware gang behind high-profile attacks dismantled 28/11/2023 at 13:46 By Help Net Security Law enforcement and judicial authorities from seven countries have joined forces with Europol and Eurojust to dismantle and apprehend in Ukraine key figures behind significant ransomware operations. On 21 November, 30 properties were searched in the regions of Kyiv, Cherkasy, Rivne

React to this headline:

Loading spinner

Ukrainian ransomware gang behind high-profile attacks dismantled Read More »

AI and contextual threat intelligence reshape defense strategies

AI and contextual threat intelligence reshape defense strategies 24/11/2023 at 07:01 By Help Net Security AI continues to evolve to improve both cyber defense and cyber criminal activities, while regulatory pressures, continued consolidation, and geopolitical concerns will drive more proactive cybersecurity efforts with contextual threat intelligence, according to Cybersixgill. As organizations increasingly adopt Threat Exposure

React to this headline:

Loading spinner

AI and contextual threat intelligence reshape defense strategies Read More »

Outsmarting cybercriminals is becoming a hard thing to do

Outsmarting cybercriminals is becoming a hard thing to do 20/11/2023 at 07:01 By Help Net Security Cybercriminals have evolved into organized and highly adaptive networks, collaborating globally to exploit weaknesses in cybersecurity defenses. Their motivations range from financial gain and information theft to political espionage and ideological warfare. Cybercriminals, now more than ever, are exploiting

React to this headline:

Loading spinner

Outsmarting cybercriminals is becoming a hard thing to do Read More »

Transforming cybersecurity from reactive to proactive with attack path analysis

Transforming cybersecurity from reactive to proactive with attack path analysis 17/11/2023 at 08:03 By Help Net Security An attack path is important to prioritize potential risks in cloud environments. The attack path offers the ability to look at cloud environments from the attacker’s perspective. With today’s general awareness and concerted effort toward cybersecurity, cybercriminals rarely

React to this headline:

Loading spinner

Transforming cybersecurity from reactive to proactive with attack path analysis Read More »

Telemetry gaps leave networks vulnerable as attackers move faster

Telemetry gaps leave networks vulnerable as attackers move faster 16/11/2023 at 09:01 By Help Net Security Telemetry logs are missing in nearly 42% of the attack cases studied, according to Sophos. In 82% of these cases, cybercriminals disabled or wiped out the telemetry to hide their tracks. Gaps in telemetry decrease much-needed visibility into organizations’

React to this headline:

Loading spinner

Telemetry gaps leave networks vulnerable as attackers move faster Read More »

Success eludes the International Counter Ransomware Initiative

Success eludes the International Counter Ransomware Initiative 13/11/2023 at 09:46 By Help Net Security A swing and a miss by the 50 member countries of the International Counter Ransomware Initiative (CRI), headlined by the US, who have confirmed a commitment to collectively address ransomware. Ransomware, as predicted, is growing at tremendous rates and focusing on

React to this headline:

Loading spinner

Success eludes the International Counter Ransomware Initiative Read More »

Open-source vulnerability disclosure: Exploitable weak spots

Open-source vulnerability disclosure: Exploitable weak spots 09/11/2023 at 15:17 By Zeljka Zorz Flaws in the vulnerability disclosure process of open-source projects could be exploited by attackers to harvest the information needed to launch attacks before patches are made available, Aqua Security researchers worry. The risk arises from “half-day” and “0.75-day” vulnerabilities “Half-day” vulnerabilities are known

React to this headline:

Loading spinner

Open-source vulnerability disclosure: Exploitable weak spots Read More »

How cybercriminals adapt and thrive amidst changing consumer trends

How cybercriminals adapt and thrive amidst changing consumer trends 03/11/2023 at 08:36 By Help Net Security The email threat landscape is experiencing a profound transformation, adapting to new challenges and exploiting emerging vulnerabilities with speed and sophistication. In this Help Net Security video, Usman Choudhary, CPTO at VIPRE Security Group, discusses how cybercriminals modify their

React to this headline:

Loading spinner

How cybercriminals adapt and thrive amidst changing consumer trends Read More »

Healthcare’s road to redefining cybersecurity with modern solutions

Healthcare’s road to redefining cybersecurity with modern solutions 03/11/2023 at 08:07 By Help Net Security The rate of data encryption following a ransomware attack in healthcare was the highest in the last three years, according to Sophos. Ransomware attacks continue to grow in sophistication Among those organizations surveyed, cybercriminals successfully encrypted data in nearly 75%

React to this headline:

Loading spinner

Healthcare’s road to redefining cybersecurity with modern solutions Read More »

IoT security threats highlight the need for zero trust principles

IoT security threats highlight the need for zero trust principles 27/10/2023 at 07:31 By Help Net Security The high number of attacks on IoT devices represents a 400% increase in malware compared to the previous year, according to Zscaler. The increasing frequency of malware attacks targeting IoT devices is a significant concern for OT security,

React to this headline:

Loading spinner

IoT security threats highlight the need for zero trust principles Read More »

Scroll to Top