Five Scattered Spider suspects indicted for crypto heists
A US indictment names five members of the cyber-gang Scattered Spider accused of stealing millions in cryptocurrency through phishing and ransomware tactics.
Feds charge 5 hackers tied to notorious Scattered Spider group - here's how they stole from big companies
The case against Scattered Spider marks a significant crackdown on a prominent hacker group targeting US companies and individuals through phishing scams.
Five Scattered Spider suspects indicted for crypto heists
A US indictment names five members of the cyber-gang Scattered Spider accused of stealing millions in cryptocurrency through phishing and ransomware tactics.
Feds charge 5 hackers tied to notorious Scattered Spider group - here's how they stole from big companies
The case against Scattered Spider marks a significant crackdown on a prominent hacker group targeting US companies and individuals through phishing scams.
Cybercriminals are using AI to enhance their attack strategies, creating sophisticated phishing schemes and generating malware at unprecedented speeds.
Man gets 10 years for stealing $20M in nest eggs from 400 US home buyers
A Nigerian man was sentenced for a phishing scheme that defrauded US home buyers of over $20 million.
From Misuse to Abuse: AI Risks and Attacks
Cybercriminals are beginning to use AI, but its current role in cybercrime is often inflated and lacks advanced capabilities.
How AI poses a threat to election security
Election security is critical due to increased media attention, making elections prime targets for cybercriminals and necessitating enhanced safeguards.
Expect a rise in disinformation and phishing attacks as the 2024 elections approach, focused on voter misinformation.
US charges five accused of multi-year hacking spree targeting tech and crypto giants | TechCrunch
The DOJ charged five individuals linked to a hacking group for targeting tech firms and cryptocurrency owners, stealing millions through phishing and SIM swapping.
Europol Shuts Down Major Phishing Scheme Targeting Mobile Phone Credentials
A major international criminal network has been dismantled due to its phishing-as-a-service platform, iServer, which targeted mobile phone security.
Operation Kaerb led to the arrest of key individuals involved in a significant phishing syndicate linking various South American and European nations.
Why AI is a double-edged sword for cybersecurity
Cybercriminals are using AI to enhance their attack strategies, creating sophisticated phishing schemes and generating malware at unprecedented speeds.
Man gets 10 years for stealing $20M in nest eggs from 400 US home buyers
A Nigerian man was sentenced for a phishing scheme that defrauded US home buyers of over $20 million.
From Misuse to Abuse: AI Risks and Attacks
Cybercriminals are beginning to use AI, but its current role in cybercrime is often inflated and lacks advanced capabilities.
How AI poses a threat to election security
Election security is critical due to increased media attention, making elections prime targets for cybercriminals and necessitating enhanced safeguards.
Expect a rise in disinformation and phishing attacks as the 2024 elections approach, focused on voter misinformation.
US charges five accused of multi-year hacking spree targeting tech and crypto giants | TechCrunch
The DOJ charged five individuals linked to a hacking group for targeting tech firms and cryptocurrency owners, stealing millions through phishing and SIM swapping.
Europol Shuts Down Major Phishing Scheme Targeting Mobile Phone Credentials
A major international criminal network has been dismantled due to its phishing-as-a-service platform, iServer, which targeted mobile phone security.
Operation Kaerb led to the arrest of key individuals involved in a significant phishing syndicate linking various South American and European nations.
Cybercriminals Use Excel Exploit to Spread Fileless Remcos RAT Malware
A phishing campaign is spreading a fileless variant of Remcos RAT, allowing attackers to control compromised computers and extract sensitive data.
Iranian Hackers Set Up New Network to Target U.S. Political Campaigns
Iranian threat actors, linked to GreenCharlie, are targeting U.S. political campaigns using advanced phishing tactics and dynamic DNS for malicious infrastructure.
Over 90% of phishing campaigns lead victims to malware
Phishing remains the primary method for attackers, requiring improved anti-phishing technologies and user education.
Malicious actors are exploiting DocuSign to send fake invoices
Malicious actors are exploiting DocuSign APIs to create fake invoices, bypassing conventional security by utilizing legitimate accounts.
Cybercriminals Exploit HTTP Headers for Credential Theft via Large-Scale Phishing Attacks
Ongoing phishing campaigns exploit HTTP header refresh entries to deliver spoofed email login pages and harvest user credentials.
Microsoft builds fake IT environments to lure hackers
Microsoft uses realistic honeypots to attract hackers and gather intelligence on phishing operations.
Cybercriminals Use Excel Exploit to Spread Fileless Remcos RAT Malware
A phishing campaign is spreading a fileless variant of Remcos RAT, allowing attackers to control compromised computers and extract sensitive data.
Iranian Hackers Set Up New Network to Target U.S. Political Campaigns
Iranian threat actors, linked to GreenCharlie, are targeting U.S. political campaigns using advanced phishing tactics and dynamic DNS for malicious infrastructure.
Over 90% of phishing campaigns lead victims to malware
Phishing remains the primary method for attackers, requiring improved anti-phishing technologies and user education.
Malicious actors are exploiting DocuSign to send fake invoices
Malicious actors are exploiting DocuSign APIs to create fake invoices, bypassing conventional security by utilizing legitimate accounts.
Cybercriminals Exploit HTTP Headers for Credential Theft via Large-Scale Phishing Attacks
Ongoing phishing campaigns exploit HTTP header refresh entries to deliver spoofed email login pages and harvest user credentials.
Microsoft builds fake IT environments to lure hackers
Microsoft uses realistic honeypots to attract hackers and gather intelligence on phishing operations.