Cyber Crime

Cyber Crime

image provided by pixabay

Many GPT-based tools like WormGPT and FraudGPT became popular on underground forums and were assumed to be helping deliver new strains of malware and...
image provided by pixabay

Law enforcement agencies from seven countries have recently busted “key figures” behind an international ransomware operation that was operating from several locations inside Ukraine. Over...
image provided by pixabay

Microsoft has alerted the software company CyberLink regarding the misuse of its software by the North Korean group “Diamond Sleet”, a cyber gang that...
image provided by pixabay

A new twist has been introduced to the DDoS attack narrative, with novel approaches allowing cybercriminals to bypass geoblocking defenses, flooding servers more frequently...
Image provided by pixabay

Close to a million files containing sensitive private information of minors were left completely exposed to anyone on the internet, thus posing a threat...
image provided by pixabay

In a strange and surprising turn of events, the former chief operating officer of the cybersecurity company admitted to hacking two US hospitals in...
image provided by pixabay

A recent report shows that diplomatic relations do not necessarily extend to cyberspace- most cyberattacks on Russia are apparently coming from its allies. Turns...
image provided by pixabay

The FBI is warning organizations of the ransomware group “Scattered Spider” that has for the past year breached dozens of American firms and stolen...
image provided by pixabay

This threat actor is now using an infection chain based on delivering a new initial access downloader dubbed IronWind, as was observed by cybersecurity...
images provided by pixabay

A new malware campaign targeting visitors of the “Windows Report” portal was uncovered by security experts at the cyber firm Malwarebytes. In this campaign,...
image provided by pixabay

QR code-based phishing attacks (also called “quishing”) are rising, with threat actors using malicious QR codes to steal valuable data and money. Furthermore, experts...
image provided by pixabay

Is there honor among thieves? Don’t be so sure- cybersecurity firm HP Wolf Security has detected fake malware designed to lure wannabe digital crooks...
Password, image by pixabay

44% of users worldwide reportedly reuse their passwords on multiple accounts, putting tons of sensitive data at risk. Dashlane is a password manager, and its...
image provided by pixabay

In an alliance led by the US, forty countries pledge to never pay ransoms, leaving cybercriminals without one of their main funding mechanisms. The...
image provided by pixabay

A group of digital security researchers at the University of Wisconsin–Madison discovered that contrary to popular belief, our data is not always protected when...
image provided by pixabay

Not long after the public was introduced to artificial intelligence models like ChatGPT, scammers launched programs like FraudGPT to assist criminals by crafting an...
image provided by pixabay

This September marks a never-before-seen level of ransomware attacks, with 514 victims exposed in leak sites and new threat actors emerging, as revealed by...
images provided by pixabay

New research from IBM proves how closely AI-enabled tools have perfected the art of writing phishing emails and fooling victims. Cybersecurity professionals and government...
image provided by pixabay

The International Criminal Court (ICC) has reportedly fallen victim to a sophisticated cyberattack suspected to be an espionage operation. The court has taken mitigating...
image provided by pixabay

Criminals are increasingly using fake browser updates that mimic notifications from Google Chrome, Mozilla Firefox, and Microsoft Edge in order to install malware on...
image provided by pixabay

The telecommunications company AT&T warns of a new cybercrime trend of embedding malicious QR codes into phishing attempts. This new type of attack was demonstrated...
image provided by pixabay

Australian researchers have developed an AI algorithm to detect and stop a cyberattack on a military robot in seconds using deep-learning neural networks. Deep learning...