Scammers take to GitHub to hoodwink other cybercriminals
Scammers take to GitHub to hoodwink other cybercriminals.....»»
Log4Shell shows no sign of fading, spotted in 30% of CVE exploits
Organizations continue to run insecure protocols across their wide access networks (WAN), making it easier for cybercriminals to move across networks, according to a Cato Networks survey. Enterprises are too trusting within their networks The Cato CT.....»»
Log4J shows no sign of fading, spotted in 30% of CVE exploits
Organizations continue to run insecure protocols across their wide access networks (WAN), making it easier for cybercriminals to move across networks, according to a Cato Networks survey. Enterprises are too trusting within their networks The Cato CT.....»»
Cybercriminals are getting faster at exploiting vulnerabilities
Cybercriminals are targeting the ever-increasing number of new vulnerabilities resulting from the exponential growth in the number and variety of connected devices and an explosion in new applications and online services, according to Fortinet. It’.....»»
These dangerous scammers don’t even bother to hide their crimes
Cybercriminals openly run dozens of scams across social media and messaging apps. Enlarge (credit: Kuzmik_A/Getty Images) Most scammers and cybercriminals operate in the digital shadows and don’t want you to know how.....»»
Hacker free-for-all fights for control of home and office routers everywhere
How and why nation-state hackers and cybercriminals coexist in the same router botnet. Enlarge (credit: Aurich Lawson / Ars Technica) Cybercriminals and spies working for nation-states are surreptitiously coexisting insi.....»»
AI is creating a new generation of cyberattacks
Most businesses see offensive AI fast becoming a standard tool for cybercriminals, with 93% of security leaders expecting to face daily AI-driven attacks, according to Netacea. Offensive AI in cyberattacks The research, “Cyber security in the age o.....»»
No more refunds after 100 hours: Steam closes Early Access playtime loophole
It's largely a win against scammers, but a simple policy doesn't fit all games. Enlarge (credit: Getty Images) "Early Access" was once a novel, quirky thing, giving a select set of Steam PC games a way to involve enthusi.....»»
AI set to play key role in future phishing attacks
A staggering increase in QR code phishing (quishing) attacks during 2023 saw them skyrocket up the list of concerns for cyber teams globally, according to Egress. Attacks were both prolific and highly successful, demonstrating how cybercriminals effe.....»»
Security Bite: Cybercriminals take advantage of Apple Store Online’s third-party pickup
At this year’s annual hacking conference, Black Hat Asia, a team of security researchers revealed how cybercriminals are sneakily using........»»
No longer possible to hide the blue badge of shame on X [U]
Ah, the saga of X’s blue checkmarks! Originally a sign that someone was who they claimed to be, and later sold so that cryptocurrency scammers could see their posts boosted, the company is now coming full circle with some journalists. Update: Af.....»»
Plex Asks GitHub to Take Down ‘Reshare’ Repository Over Piracy Fears
Plex is a multi-functional streaming platform that allows users to watch, organize, and curate their favorite media entertainment. Sharing Plex libraries is also an option; one that comes with piracy concerns. In an effort to "avoid the growth of pir.....»»
How to remove personal information from the internet -- and why you should
Internet scammers, scorned lovers turned stalkers, greedy salespeople, and shady organizations are looking for your private information. Your online activity is a blazing beacon inviting unwanted data collection.Delete your personal info from the int.....»»
How can the energy sector bolster its resilience to ransomware attacks?
Since it plays a vital role in every functioning society, the energy sector has always been a prime target for state-backed cybercriminals. The cyber threats targeting this industry have grown significantly in recent years, as geopolitical tensions h.....»»
X blue checkmarks being forced on journalists who don’t want them
Ah, the saga of X’s blue checkmarks! Originally a sign that someone was who they claimed to be, and later sold so that cryptocurrency scammers could see their posts boosted, the company is now coming full circle with some journalists. Elon Musk.....»»
Impersonation scams cost US victims over a billion dollars last year
A new report from the FTC shows the cost of spoofing scams, and the new methods cybercriminals are adopting......»»
Infosec products of the month: March 2024
Here’s a look at the most interesting products from the past month, featuring releases from: Appdome, AuditBoard, Bedrock Security, Cado Security, Check Point, CyberArk, Cynerio, DataDome, Delinea, Drata, Exabeam, GitGuardian, GitHub, GlobalSign, L.....»»
AI abuse and misinformation campaigns threaten financial institutions
Though generative AI offers financial firms remarkable business and cybersecurity utility, cyberthreats relating to GenAI in financial services are a consistent concern, according to FS-ISAC. Cybercriminals exploit AI for data exfiltration The cybers.....»»
Cybercriminals use cheap and simple infostealers to exfiltrate data
The rise in identity-based attacks can be attributed to a rapid increase in malware, according to SpyCloud. Researchers found that 61% of data breaches in 2023, involving over 343 million stolen credentials, were infostealer malware-related. Of these.....»»
Attackers leverage weaponized iMessages, new phishing-as-a-service platform
Scammers are leveraging the Darcula phishing-as-a-service platform, iMessages and Google Messages to great effect. The platform allows them to impersonate a variety of brands based in over 100 different countries: postal services, public and private.....»»
Scammers exploit tax season anxiety with AI tools
25% of Americans has lost money to online tax scams, according to McAfee. Of the people who clicked on fraudulent links from supposed tax services, 68% lost money. Among those, 29% lost more than $2,500, and 17% lost more than $10,000. Moreover, 76%.....»»