Please turn on your JavaScript for this page to function normally.
dark web
FIN7 sells improved EDR killer tool

The cybercrime-focused enterprise known as FIN7 (aka the Carbanak group) has come up with yet another trick to assure the effectiveness of its “EDR killer” tool, …

data breaches 2024
Major data breaches that have rocked organizations in 2024

This article provides an overview of the major data breaches we covered in 2024 so far, highlighting incidents involving Trello, AnyDesk, France Travail, Nissan, MITRE, …

AT&T
Hackers stole call, text records of “nearly all” of AT&T’s cellular customers

Hackers leveraging stolen Snowflake account credentials have stolen records of calls and texts made by “nearly all” of AT&T’s cellular customers from May to …

Android
GuardZoo spyware used by Houthis to target military personnel

Lookout discovered GuardZoo, Android spyware targeting Middle Eastern military personnel. This campaign leverages malicious apps with military and religious themes to lure …

cybercrime
Infostealing malware masquerading as generative AI tools

Over the past six months, there has been a notable surge in Android financial threats – malware targeting victims’ mobile banking funds, whether in the form of …

world
New ransomware, infostealers pose growing risk in 2024

BlackBerry detected and stopped 3.1 million cyberattacks (37,000 per day) in the first quarter of 2024. Between January and March 2024, BlackBerry detected 630,000 malicious …

cracking down on cybercrime
Cracking down on cybercrime: Who you gonna call?

As cybercrime continues to grow, law enforcement agencies worldwide face increased challenges in safeguarding organizations and individuals. In this article, we highlight law …

malware
Malware peddlers love this one social engineering trick!

Attackers are increasingly using a clever social engineering technique to get users to install malware, Proofpoint researchers are warning. The message warns of a problem but …

email threats
Malicious emails trick consumers into false election contributions

Major regional and global events – such as military exercises, political or economic summits, political conventions, and elections – drove cyber threat activities, according …

online fraud
Modern fraud detection need not rely on PII

Trends in online fraud detection often act as the canary in the coal mine when it comes to understanding and combating the next generation of online scams, fraud and …

cyber threat
Chinese attackers leverage previously unseen malware for espionage

Sophos released its report, “Operation Crimson Palace: Threat Hunting Unveils Multiple Clusters of Chinese State-Sponsored Activity Targeting Southeast Asia,” which details a …

STEM
No summer break for cybercrime: Why educational institutions need better cyber resilience

The education system isn’t equipped to handle today’s cyberthreats. I’m not just talking about cybersecurity education in schools shaping the technical workforce of the future …

Don't miss

Cybersecurity news