Cyber Crime

Cyber Crime

images provided by pixabay

New research from IBM proves how closely AI-enabled tools have perfected the art of writing phishing emails and fooling victims. Cybersecurity professionals and government...
image provided by pixabay

The International Criminal Court (ICC) has reportedly fallen victim to a sophisticated cyberattack suspected to be an espionage operation. The court has taken mitigating...
image provided by pixabay

Criminals are increasingly using fake browser updates that mimic notifications from Google Chrome, Mozilla Firefox, and Microsoft Edge in order to install malware on...
image provided by pixabay

The telecommunications company AT&T warns of a new cybercrime trend of embedding malicious QR codes into phishing attempts. This new type of attack was demonstrated...
image provided by pixabay

Australian researchers have developed an AI algorithm to detect and stop a cyberattack on a military robot in seconds using deep-learning neural networks. Deep learning...
image provided by pixabay

This cyberattack campaign is targeting thousands of routers and turning them into bots for DDoS attacks. There were thirteen payloads in this variant of Mirai,...
image provided by pixabay

Malicious actors claim to have acquired a large amount of private user data from one of the most popular genetic testing services “23andMe”. There...
image provided by pixabay

As we become increasingly reliant on digital platforms, so grow the threats, and one of the main fundamentals of cybersecurity is understanding potential vulnerabilities....
image provided by pixabay

Newly launched platform for managing all port operations in India left public access to sensitive data, posing the risk of a potential takeover by...
images provided by pixabay

As can be seen reported across many news medias, Microsoft does not seem to be in a good spot at the moment, when it...
image provided by pixabay

DarkBeam is a digital risk protection firm, which left its interface unprotected and so exposed records with user emails and passwords from previously reported...
image provided by pixabay

Academic researchers from four US universities used artificial intelligence and machine learning in a technique called Side Eye to extract audio from static photos...
images provided by pixabay

Canadian Flair Airlines has left credentials to sensitive databases and email addresses open for at least seven months, increasing the risk of passengers’ personal...
image provided by pixabay

We all experience a sort of “visual hallucination” when we confuse the silhouette of a chair or a clothing rack out of the corner...
image provided by pixabay

Microsoft’s AI research team has accidentally exposed sensitive private data while publishing open-source training data on GitHub. “Robust-models-transfer”, which is the name of Microsoft’s GitHub...
image provided by pixabay

The International Criminal Court (ICC) was hit last week in an ongoing cyberattack that is still being investigated. A spokesman for ICC released a statement...
image provided by pixabay

Threat actor USDoD is behind the recent cyberattacks on the FBI and Airbus. He later claimed his targets are “not political”, but stated he...
images provided by pixabay

A new threat report from Europol states that malware-based ransomware cyberattacks have been a major threat, and that ransomware affiliate programs have established themselves...
images provided by pixabay

Microsoft Teams is reportedly being used by a threat actor known for working with ransomware groups to distribute phishing lures through the chats. The financially...
image provided by pixabay

Researchers from universities in China and Singapore revealed a security gap that permits malicious snoops to steal your password through keystroke identification, in what...
image provided by pixabay

A new cyber threat labeled ‘web app engaged’ (WAE) malware is hiding within popular applications like Dropbox and Discord, and has apparently seen an...
image provided by pixabay

Sending an email with a fake address is now easier than ever due to flaws in the process of email forwarding, according to a...

Latest