cybercriminals
![](https://img.helpnetsecurity.com/wp-content/uploads/2023/11/03124019/microsoft-soc-400x200.jpg)
Cybercrime operation that sold millions of fraudulent Microsoft accounts disrupted
Microsoft disrupted an alleged threat actor group that built viable cybercrime-as-a-service (CaaS) businesses. Dubbed Storm-1152 by Microsoft, the group bilked enterprises and …
![email](https://img.helpnetsecurity.com/wp-content/uploads/2023/11/03110956/email-400x200.jpg)
Organizations can’t ignore the surge in malicious web links
Despite the rising adoption of collaboration and instant messaging software, email remains a significant area of concern regarding cyber attacks, particularly the increasing …
![handcuffs](https://img.helpnetsecurity.com/wp-content/uploads/2023/11/28114801/handcuffs-400x200.jpg)
Ukrainian ransomware gang behind high-profile attacks dismantled
Law enforcement and judicial authorities from seven countries have joined forces with Europol and Eurojust to dismantle and apprehend in Ukraine key figures behind significant …
![artificial intelligence](https://img.helpnetsecurity.com/wp-content/uploads/2023/05/22145259/laptop-ai-400x200.png)
AI and contextual threat intelligence reshape defense strategies
AI continues to evolve to improve both cyber defense and cyber criminal activities, while regulatory pressures, continued consolidation, and geopolitical concerns will drive …
![cybercriminals](https://img.helpnetsecurity.com/wp-content/uploads/2023/11/08105601/cybercriminals-400x200.jpg)
Outsmarting cybercriminals is becoming a hard thing to do
Cybercriminals have evolved into organized and highly adaptive networks, collaborating globally to exploit weaknesses in cybersecurity defenses. Their motivations range from …
![path](https://img.helpnetsecurity.com/wp-content/uploads/2016/12/09105453/path-400x200.jpg)
Transforming cybersecurity from reactive to proactive with attack path analysis
An attack path is important to prioritize potential risks in cloud environments. The attack path offers the ability to look at cloud environments from the attacker’s …
![GenAI](https://img.helpnetsecurity.com/wp-content/uploads/2023/10/27101941/genai3-400x200.jpg)
Rise in automated attacks troubles ecommerce industry
Automated attacks on application business logic, carried out by sophisticated bad bots, were the leading threat for online retailers, according to Imperva. In addition, …
![cyber threat](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/25143233/cyber-threat2-400x200.jpg)
Telemetry gaps leave networks vulnerable as attackers move faster
Telemetry logs are missing in nearly 42% of the attack cases studied, according to Sophos. In 82% of these cases, cybercriminals disabled or wiped out the telemetry to hide …
![ransomware](https://img.helpnetsecurity.com/wp-content/uploads/2022/06/17130642/ransomware-1600-400x200.jpg)
Nuclear and oil & gas are major targets of ransomware groups in 2024
Resecurity, Inc. (USA) protecting major Fortune 100 and government agencies globally has identified an alarming rise in ransomware operators targeting the energy sector, …
![ransomware](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/27171236/ransomware-2-400x200.jpg)
Success eludes the International Counter Ransomware Initiative
A swing and a miss by the 50 member countries of the International Counter Ransomware Initiative (CRI), headlined by the US, who have confirmed a commitment to collectively …
![open-source software](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/07185811/open-source_software-400x200.jpg)
Open-source vulnerability disclosure: Exploitable weak spots
Flaws in the vulnerability disclosure process of open-source projects could be exploited by attackers to harvest the information needed to launch attacks before patches are …
![email](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/19153422/email3-400x200.jpg)
How cybercriminals adapt and thrive amidst changing consumer trends
The email threat landscape is experiencing a profound transformation, adapting to new challenges and exploiting emerging vulnerabilities with speed and sophistication. In this …
Featured news
Sponsored
Don't miss
- Progress fixes critical RCE flaw in Telerik Report Server, upgrade ASAP! (CVE-2024-6327)
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege