Cyber Crime

Cyber Crime

image provided by pixabay

The illegal darknet marketplace Nemesis Market, based in Germany and Lithuania, was recently seized by the Frankfurt Main Public Prosecutor’s Office, the Central Office...
image provided by pixabay

Russia is reportedly using a new and extremely capable malware variant to target Ukrainian telecommunication networks. Cybersecurity threat intelligence platform SentinelLabs reports the new Russian...
images provided by pixabay

The healthcare industry needs to wake up and focus on securing its infrastructure. We have reported on many cyberattacks on various health infrastructures, hospitals, and...
image provided by pixabay

North Korea’s nuclear threats are reportedly being used and exploited by North Korean hackers as a “lure” to make victims open malicious files and...
images provided by pixabay

The hacktivist group ‘Anonymous’ has claimed a recent breach of Israel’s nuclear facility networks in Dimona as a protest against the war with Gaza....
image provided by pixabay

Microsoft set to release Copilot for Security AI tool to help cybersecurity workers produce summaries of suspicious incidents and identify hackers’ methods to conceal...
image provided by pixabay

Software company Salt Labs reveals that ChatGPT plugins that let it interact with external programs and services have vulnerabilities that could be exploited during...
image provided by pixabay

Several government departments in France fell victim to multiple cyberattacks of "unprecedented intensity,” and hacktivist group Anonymous Sudan is claiming responsibility. The French Prime Minister’s...
image provided by pixabay

North Korean hackers have stolen vital microchip information from South Korean chip makers, according to reports from South Korea’s National Intelligence Service (NIS). “We believe...
image provided by pixabay

Quantum computers can solve complex problems exponentially faster than classical computers and are hailed as the future of computing; however, they are still vulnerable...
image provided by pixabay

Many companies are integrating generative AI tools into their products to reduce the human workload and make hard tasks easier, which is both transformative...
images provided by pixabay

Canada’s Supreme Court rules that the Canadian police won’t be able to access an IP address without a search warrant. This case was brought to...
image provided by pixabay

Cybersecurity company Cybereason reveals that the actual price of a ransomware attack on a business includes much more than the ransom itself. When choosing whether...
Images provided by pixabay

China reportedly intends to improve the data security of its industrial sector in order to effectively contain any “major risks,” a process that is...
image provided by pixabay

Malicious romance cybercriminal steals close to a quarter million dollars from a victim in a months-long online scam. This type of online scam is also...
images provided by pixabay

Security experts from the University of Florida worked with CertiK and found a certain class of cyberattacks that could cause a smartphone to catch...
Image provided by pixabay

The expansion of the digital realm into space has opened new frontiers for cyber threats, posing unprecedented challenges. The satellites orbiting Earth are crucial for...
image provided by pixabay

Hackers can now create clones of WiFi hotspots and intercept data, as well as enable unauthorized access to protected home Wi-Fi networks and expose...
Fingerprint. image provided by pixabay

Nowadays, fingerprints are one of the most popular forms of personal identification, whether it’s unlocking your phone, approving online payments, access control, and many...
image provided by pixabay

UK and US law enforcement led an international operation, successfully disrupting the Russian-linked ransomware specialist LockBit, one of the most harmful cybercrime groups in...
cyber security. image by pixabay

A series of robberies in Minneapolis led police to believe that burglars are using WiFi jammers to block off security system signals from reaching...
image provided by pixabay

The US Department of Justice claims to have taken down a global botnet controlled by GRU, Russia’s military intelligence agency. The botnet reportedly consisted...