Cyber Crime

Cyber Crime

images provided by pixabay

HP Wolf Security’s latest threat insights disclosure put a spotlight on DarkGate – a group of web-based criminals using legal advertising tools to enhance...
images provided by pixabay

Lurie Children's Hospital in Chicago has been disabled by a cyberattack for over a week, blocking doctors and nurses from accessing digital patient records, and...
images provided by pixabay

Microsoft claims US adversaries like Iran, North Korea, Russia, and China are beginning to use generative AI to organize offensive cyber operations. The tech giant...
image provided by pixabay

Social media platforms on the internet are constantly flooded with huge amounts of content, and this vast ocean of material needs to be constantly...
image provided by pixabay

Artificial intelligence tools for the general public (ChatGPT, Bard, Dall-E) are being widely used for many everyday tasks, but users with malicious intentions can...
image provided by pixabay

US regulators declared last week that scam "robocalls" made using voices created with artificial intelligence are now illegal. This phenomenon gained attention last month after...
image provided by pixabay

Security cameras are our first line of defense in many fields of life, from our homes to the bank. But what if they aren't...
data and cyber. image by pixabay

A mere misconfigured database has exposed more than two million user records on LectureNotes Learning App, a platform for sharing class notes. Back in December...
image provided by pixabay

The rise of ransomware-as-a-service gangs has brought with it a surge of 68% in known ransomware attacks last year, a record level, according to...
image provided by pixabay

Flysmart+ is an iOS app for pilots to calculate aircraft takeoff performance, weight, and balance, developed by the Airbus subsidiary Navblue. It was recently...
image provided by pixabay

Study finds that businesses with cybersecurity insurance face significantly higher ransom payments compared to businesses that are not insured. According to Dutch victim data, the...
image provided by pixabay

Charles Harry is a former National Security Agency cyberwarfare expert and director of the University of Maryland's Center for Governance of Technology and Systems,...
image provided by pixabay

The growing trend of AI-generated content and deep fakes is making us lose our trust in the internet. Can identity decentralization be the solution?...
image provided by pixabay

Account takeover attacks consist of a hacker gaining unauthorized access to online accounts. Computer science researchers developed a new way to identify security weaknesses...
image provided by pixabay

Microsoft was attacked by the Russian hacking group Midnight Blizzard, which reportedly broke into its corporate networks on January 12 and stole some sensitive...
image provided by pixabay

Large language models (known as LLMs) are deep learning-based models that are trained to generate, summarize, translate, and process written texts. While such models...
image provided by pixabay

Multiple extortion attempts were conducted by threat actors who posed as legitimate security researchers and promised to hack into the infrastructure of original ransomware...
image provided by pixabay

Researchers found records containing the private data of hundreds of millions of Brazilian citizens, fully accessible online on Elasticsearch, available to threat actors, and...
image provided by pixabay

Project Mockingbird is computer security company McAfee's latest breakthrough designed to arm consumers against the growing threat of online deepfake scams and was revealed...
image provided by pixabay

A new report by TRM Labs reveals the culprits responsible for nearly 33% of all cryptocurrencies stolen through hacking incidents in 2023 – North Korea. The report...
image provided by pixabay

A new report by Computer scientists from the National Institute of Standards and Technology presents new kinds of cyberattacks that can “poison” AI systems. AI...
Cyber intelligence. image by pixabay

As threat actors use artificial intelligence to their advantage, it’s essential that organizations evolve along with them to respond to and prevent these threats. One...