cybercrime
Internet crime: The continuing rise of the BEC scam
Through its website, the FBI’s Internet Crime Complaint Center (IC3) accepts complaints about Internet-facilitated criminal activity, and forwards them to the …
Forget about the malware, go after attackers’ tactics, techniques and procedures
The cybercriminal’s options for monetizing attacks has never been broader, less complex, or less risky, and attempts to detect intrusions by detecting the malware they …
Fostering a safe place for businesses to work in
It’s no secret that in the past few years, business leaders have begun to realise the potential of digital transformation to give their organisation a competitive edge. …
Cybersecurity trends: Fight against cybercrime shows both improvements and downsides
Trustwave released the 2017 Trustwave Global Security Report which reveals the top cybercrime, data breach and security threat trends from 2016. The report demonstrates both …
Hackers extorted a cool $1 million from South Korean web hosting provider
Whether through ransomware, or simply by breaking into computer systems and exfiltrating and deleting the data found on them with other means, cyber extortionists are going …
Cyber extortionists target North American companies
A group of financially motivated hackers is targeting networks and systems of North American companies, threatening to leak the stolen information and cripple the company by …
US restaurants targeted with fileless malware
Morphisec researchers have spotted another attack campaign using fileless malware that is believed to be mounted by the infamous FIN7 hacking group. The goal of the campaign …
Differences in personal security behaviors of US and UK workers
Wombat surveyed more than 2,000 working adults — 1,000 in the US and 1,000 in the UK — about cyber security topics and best practices that are fundamental to network and data …
Why people are at the heart of your information security success
In this podcast, Perry Carpenter, Chief Evangelist and Strategy Officer at KnowBe4, talks about the human side of security. Are humans the weakest link? Why do people fall for …
Police dismantle organised crime network suspected of online payment scams
The Polish National Police, working in close cooperation with its law enforcement counterparts in Croatia, Germany, Romania and Sweden, alongside Europol’s European Cybercrime …
Fireball malware infected 250 million computers worldwide
Check Point researchers discovered a high volume Chinese threat operation which has infected over 250 million computers worldwide. The installed malware, named Fireball, takes …
Hackers hosted tools on a Stanford University website for months
Compromising legitimate websites and the web servers that store and deliver them is a time-honoured tactic of opportunistic hackers, and a failure to keep them out can result …
Featured news
Resources
Don't miss
- How AI agents are turning security inside-out
- Security teams are paying more attention to the energy cost of detection
- Recently fixed HPE OneView flaw is being exploited (CVE-2025-37164)
- PoC released for unauthenticated RCE in Trend Micro Apex Central (CVE-2025-69258)
- Cybercriminals are scaling phishing attacks with ready-made kits