cybercrime
![Android](https://img.helpnetsecurity.com/wp-content/uploads/2018/07/09100623/android-biohazard-400x200.jpg)
Legitimate Android app transforms into data-snooping malware
ESET researchers have discovered a trojanized Android app named iRecorder – Screen Recorder. It was available on Google Play as a legitimate app in September 2021, with …
![mobile user](https://img.helpnetsecurity.com/wp-content/uploads/2018/03/09101502/mobile_user-400x200.jpg)
Online scams target bargain-hunting holiday travelers
30% of adults have fallen victim or know someone who has fallen victim to an online scam while trying to save money when booking travel, according to McAfee. 34% of those who …
![email](https://img.helpnetsecurity.com/wp-content/uploads/2020/02/31160247/email-smoke-red-400x200.jpg)
Malicious links and misaddressed emails slip past security controls
The majority of organizations use six or more communication tools, across channels, with email remaining the channel seen as the most vulnerable to attacks (38%), according to …
![malware](https://img.helpnetsecurity.com/wp-content/uploads/2021/12/01155324/malware_6_01122021-400x200.jpg)
Infamous cybercrime marketplace offers pre-order service for stolen credentials
Infostealer malware, which consist of code that infects devices without the user’s knowledge and steals data, remains widely available to buy through underground forums and …
![danger](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111248/danger-2-400x200.jpg)
New trends in ransomware attacks shape the future of cybersecurity
Corvus Insurance analyzed data from the dark web and ransomware leak sites. Researchers uncovered a 60% increase in ransomware victims in March 2023, marking the highest …
![Eyes](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112400/laptop-eyes-technology-computer-400x200.jpg)
Fraud victims risk more than money
Digital fraud has significant financial and psychological repercussions on victims, according to Telesign. Businesses may find a new reason to fear digital fraud as the …
![snake, threat](https://img.helpnetsecurity.com/wp-content/uploads/2022/03/21113121/snake-coiled-400x200.jpg)
Turla’s Snake malware network disrupted by Five Eyes’ authorities
The US Justice Department announced the completion of court-authorized operation MEDUSA, to disrupt a global peer-to-peer network of computers compromised by sophisticated …
![malware](https://img.helpnetsecurity.com/wp-content/uploads/2021/12/01144104/malware_2_01122021-400x200.jpg)
56,000+ cloud-based apps at risk of malware exfiltration
The technology sector had the highest number of malware-infected employees, most exposed corporate credentials and the majority of all stolen cookies, according to SpyCloud. …
![criminal](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113635/criminal-400x200.png)
Think your data has no value? Scammers disagree
In the first quarter of 2023 there was a significant increase in cyberattacks exploiting trust in established tech brands Microsoft and Adobe, according to Avast. The Avast …
![insider threat](https://img.helpnetsecurity.com/wp-content/uploads/2019/10/09093017/insider_threat-400x200.jpg)
The costly threat that many businesses fail to address
Insider attacks such as fraud, sabotage, and data theft plague 71% of U.S. businesses, according to Capterra. These schemes can cost companies hundreds of thousands of dollars …
![bot](https://img.helpnetsecurity.com/wp-content/uploads/2018/09/09100155/bot-400x200.jpg)
Cybercriminals use proxies to legitimize fraudulent requests
Bot attacks were previously seen as relatively inconsequential type of online fraud, and that mentality has persisted even as threat actors have gained the ability to cause …
![ransomware](https://img.helpnetsecurity.com/wp-content/uploads/2022/07/31190026/ransomware-keyboard-400x200.jpg)
New coercive tactics used to extort ransomware payments
The increase in reported ransomware victims across Q1 2023 reflects the continued prevalence of ransomware as a worldwide, industry agnostic threat, according to GuidePoint …
Featured news
Sponsored
Don't miss
- Progress fixes critical RCE flaw in Telerik Report Server, upgrade ASAP! (CVE-2024-6327)
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege