cybercrime
![cybersecurity threats](https://img.helpnetsecurity.com/wp-content/uploads/2024/06/17113455/cybersecurity_threats-400x200.webp)
The changes in the cyber threat landscape in the last 12 months
When it comes to the cyber threat landscape, change is the only constant: the inevitable interplay between cybercriminals and law enforcement agencies makes it inevitable. …
![EvilVideo Telegram](https://img.helpnetsecurity.com/wp-content/uploads/2024/07/23104758/evilvideo_telegram-400x200.webp)
Vulnerability in Telegram app for Android allows sending malicious files disguised as videos
ESET researchers discovered a zero-day exploit, which targets the Telegram app for Android, that appeared for sale for an unspecified price in an underground forum post from …
![cyber insurance](https://img.helpnetsecurity.com/wp-content/uploads/2023/09/26141847/cyber-insurance-400x200.jpg)
Cyber insurance 2.0: The systemic changes required for future security
Digitalization has evolved into a systemic risk for organizations – and, therefore, cyber insurers. With the global cost of cybercrime skyrocketing, something has to change. …
![dark web](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/28085705/darkweb-400x200.jpg)
FIN7 sells improved EDR killer tool
The cybercrime-focused enterprise known as FIN7 (aka the Carbanak group) has come up with yet another trick to assure the effectiveness of its “EDR killer” tool, …
![data breaches 2024](https://img.helpnetsecurity.com/wp-content/uploads/2024/07/15145626/data_breaches_2024-400x200.webp)
Major data breaches that have rocked organizations in 2024
This article provides an overview of the major data breaches we covered in 2024 so far, highlighting incidents involving Trello, AnyDesk, France Travail, Nissan, MITRE, …
![AT&T](https://img.helpnetsecurity.com/wp-content/uploads/2024/03/31150800/att-1500-400x200.webp)
Hackers stole call, text records of “nearly all” of AT&T’s cellular customers
Hackers leveraging stolen Snowflake account credentials have stolen records of calls and texts made by “nearly all” of AT&T’s cellular customers from May to …
![Android](https://img.helpnetsecurity.com/wp-content/uploads/2024/06/24133618/android-danger-400x200.webp)
GuardZoo spyware used by Houthis to target military personnel
Lookout discovered GuardZoo, Android spyware targeting Middle Eastern military personnel. This campaign leverages malicious apps with military and religious themes to lure …
![cybercrime](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/04145410/cybercrime-man-1400-400x200.jpg)
Infostealing malware masquerading as generative AI tools
Over the past six months, there has been a notable surge in Android financial threats – malware targeting victims’ mobile banking funds, whether in the form of …
![world](https://img.helpnetsecurity.com/wp-content/uploads/2024/05/31190412/world-400x200.webp)
New ransomware, infostealers pose growing risk in 2024
BlackBerry detected and stopped 3.1 million cyberattacks (37,000 per day) in the first quarter of 2024. Between January and March 2024, BlackBerry detected 630,000 malicious …
![cracking down on cybercrime](https://img.helpnetsecurity.com/wp-content/uploads/2024/06/20155853/cracking_down_on_cybercrime-1500-400x200.webp)
Cracking down on cybercrime: Who you gonna call?
As cybercrime continues to grow, law enforcement agencies worldwide face increased challenges in safeguarding organizations and individuals. In this article, we highlight law …
![malware](https://img.helpnetsecurity.com/wp-content/uploads/2023/05/02135403/malware-400x200.jpg)
Malware peddlers love this one social engineering trick!
Attackers are increasingly using a clever social engineering technique to get users to install malware, Proofpoint researchers are warning. The message warns of a problem but …
![email threats](https://img.helpnetsecurity.com/wp-content/uploads/2024/05/03124429/email-threats-1500-400x200.webp)
Malicious emails trick consumers into false election contributions
Major regional and global events – such as military exercises, political or economic summits, political conventions, and elections – drove cyber threat activities, according …
Featured news
Sponsored
Don't miss
- Progress fixes critical RCE flaw in Telerik Report Server, upgrade ASAP! (CVE-2024-6327)
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege