menu
techminis

A naukri.com initiative

google-web-stories
Home

>

Cyber Crime News

Cyber Crime News

source image

Medium

4w

read

44

img
dot

Types of cyberattacks: A Comprehensive Guide

  • Malware Attacks: Viruses, worms, trojan horses, and ransomware are common types of malware attacks.
  • Phishing Attacks: Email phishing, smishing, and vishing are common types of phishing attacks.
  • Denial-of-Service (DoS) Attacks: DoS attacks overwhelm a system or network with traffic, making it inaccessible.
  • Man-in-the-Middle (MitM) Attacks: Intercepting communication to steal sensitive information.

Read Full Article

like

2 Likes

source image

Securityaffairs

4w

read

0

img
dot

Image Credit: Securityaffairs

Security Affairs newsletter Round 499 by Pierluigi Paganini – INTERNATIONAL EDITION

  • A cyberattack on gambling giant IGT disrupted portions of its IT systems
  • China-linked APT Gelsemium uses a new Linux backdoor dubbed WolfsBane
  • Microsoft seized 240 sites used by the ONNX phishing service
  • U.S. CISA adds Apple, Oracle Agile PLM bugs to its Known Exploited Vulnerabilities catalog

Read Full Article

like

Like

source image

Securityaffairs

4w

read

370

img
dot

Image Credit: Securityaffairs

DoJ seized credit card marketplace PopeyeTools and charges its administrators

  • The U.S. seized the stolen credit card marketplace PopeyeTools and charged its operators.
  • PopeyeTools was a dark web marketplace specializing in selling stolen credit cards and cybercrime tools.
  • The operators of PopeyeTools are charged with conspiracy to commit access device fraud, trafficking access devices, and solicitation of another person to offer access devices.
  • US authorities seized $283,000 in cryptocurrency and took down the PopeyeTools domains.

Read Full Article

like

22 Likes

source image

Securityaffairs

4w

read

66

img
dot

Image Credit: Securityaffairs

A cyberattack on gambling giant IGT disrupted portions of its IT systems

  • A cyberattack on gambling giant IGT disrupted its systems, forcing the company to take certain services offline.
  • IGT detected a cyberattack on November 17 and immediately initiated its incident response procedures.
  • As a multinational gambling company, IGT produces slot machines and gambling technology.
  • To contain the threat, IGT took some of the impacted systems offline and is working on bringing them back online.

Read Full Article

like

4 Likes

source image

Neuways

4w

read

378

img
dot

Image Credit: Neuways

Defend Your Business Against Zero-Day Social Media and OneDrive Phishing

  • Phishing attacks are evolving rapidly with techniques like stealth redirects and zero-day phishing links.
  • Phishing attempts targeting social media platforms and document-sharing services are increasing in frequency and effectiveness.
  • Neuways, a cyber security provider, offers expert guidance, proactive defences, and tailored support to defend businesses against these attacks.
  • Neuways provides proactive threat monitoring, holistic security coverage, employee training, tailored solutions, and rapid incident response to protect against phishing attacks.

Read Full Article

like

22 Likes

source image

TechCrunch

4w

read

427

img
dot

Image Credit: TechCrunch

The rise and fall of the ‘Scattered Spider’ hackers

  • After evading capture for more than two years, U.S. authorities have caught some of the hackers responsible for a hacking spree targeting major tech companies.
  • The hacking group, known as 'Scattered Spider' or '0ktapus', targeted over 130 organizations through a sophisticated phishing campaign.
  • Their most notable attack was against MGM Resorts, costing the company at least $100 million.
  • Several members of the group, mostly English-speaking teenagers, have been identified and charged by authorities in the U.S. and the U.K.

Read Full Article

like

25 Likes

source image

Securityaffairs

4w

read

187

img
dot

Image Credit: Securityaffairs

Microsoft seized 240 sites used by the ONNX phishing service

  • Microsoft disrupted the ONNX phishing service, seizing 240 sites and naming an Egyptian man as the operator behind the operation.
  • Microsoft identified Abanoub Nady as the man behind the ONNX phishing service who developed and sold phishing kits.
  • Phishing heavily targets financial services and Microsoft observed a 146% increase in Adversary-in-the-Middle attacks.
  • Through a civil court order, Microsoft has redirected the malicious technical infrastructure, permanently stopping the use of these domains for phishing attacks.

Read Full Article

like

11 Likes

source image

Bitcoinist

4w

read

325

img
dot

Image Credit: Bitcoinist

North Korea Linked To 2019 Ethereum Theft Worth $55.7M, Say South Korean Authorities

  • South Korean authorities have identified North Korean hackers as the culprits behind a significant Ethereum theft in 2019, worth $55.7 million.
  • The hackers infiltrated a South Korea-based exchange and stole 342,000 Ethereum tokens.
  • The stolen funds were laundered through self-operated crypto exchanges and dispersed across 51 other exchanges globally.
  • This is not the first time North Korean hackers have targeted cryptocurrency platforms, with the regime suspected of orchestrating roughly 97 crypto hacks between 2017 and 2024.

Read Full Article

like

19 Likes

source image

Young Upstarts

4w

read

281

img
dot

Image Credit: Young Upstarts

Understanding The Role Of Threat Detection In Modern Business Strategies

  • Threat detection has become crucial in modern business strategies due to increasing security threats in the digital era.
  • Hackers are constantly developing new tactics to exploit vulnerabilities, making proactive security measures essential.
  • Threat detection involves monitoring and analyzing an organization's digital ecosystem to identify suspicious activity.
  • Threat detection is a vital component of a holistic security approach, along with prevention, incident response, and recovery.

Read Full Article

like

16 Likes

source image

TechCrunch

4w

read

272

img
dot

Image Credit: TechCrunch

Hackers break into Andrew Tate’s online ‘university,’ steal user data and flood chats with emojis

  • Hackers have breached an online course founded by Andrew Tate, leaking data on close to 800,000 users.
  • The hackers flooded the course's chatroom with emojis, including a transgender flag and a feminist fist.
  • The hacked data was provided to The Daily Dot and shared with data breach notification site Have I Been Pwned and DDoSecrets.
  • Andrew Tate, the founder of the online course, is currently under house arrest in Romania awaiting trial on human trafficking and rape charges.

Read Full Article

like

16 Likes

source image

Securityaffairs

4w

read

196

img
dot

Image Credit: Securityaffairs

Ransomhub ransomware gang claims the hack of Mexican government Legal Affairs Office

  • Mexico is investigating a ransomware attack targeting its legal affairs office.
  • The ransomware gang Ransomhub claimed responsibility for the attack.
  • Stolen files include contracts, insurance, and financial documents.
  • This is not the first time Mexico's government has been targeted in a hack involving sensitive information.

Read Full Article

like

11 Likes

source image

Securityintelligence

4w

read

348

img
dot

Image Credit: Securityintelligence

Airplane cybersecurity: Past, present, future

  • With most aviation processes now digitized, airlines and the aviation industry as a whole must prioritize cybersecurity.
  • To improve security in the aviation industry, the FAA recently proposed new rules to tighten cybersecurity on airplanes.
  • Cybersecurity attacks and data breaches have touched all parts of the aviation industry for the past several decades.
  • The aviation industry currently receives a B grade, according to The Cyber Risk Landscape of the Global Aviation Industry, 2024 report.
  • Ransomware attacks remain a top threat.
  • The focus of the new rules is on the cybersecurity of the actual airplane.
  • The proposed rules state that applicants for product certifications must ensure that each airplane’s equipment, systems and networks are protected from IUEIs that may result in an adverse effect on the safety of the airplane.
  • When a cybersecurity incident occurs, the airline, airport or third-party vendors typically go offline, which causes delays.
  • Aviation organizations should begin planning for the new guidelines.
  • Requirements for advanced technologies like threat detection and endpoint protection are crucial.

Read Full Article

like

20 Likes

source image

Socprime

4w

read

232

img
dot

Image Credit: Socprime

Fickle Stealer Malware Detection: New Rust-Based Stealer Disguises as Legitimate Software to Steal Data from Compromised Devices

  • A new Rust-based stealer malware called Fickle Stealer has emerged.
  • Fickle Stealer disguises itself as GitHub Desktop software for Windows.
  • The malware employs various anti-malware and detection evasion techniques.
  • Fickle Stealer poses a significant threat to compromised devices and data.

Read Full Article

like

13 Likes

source image

Mcafee

4w

read

75

img
dot

How to Protect Your Personal Info

  • Your personal info is something that needs protecting, so let’s check out several ways you can protect it.
  • Personal info is any information that can be used to identify you directly or indirectly.
  • Your personal info can be found in the accounts and apps you use, as well as in the data you create- whether through online banking, shopping, or browsing the internet.
  • To protect your personal info, you should use a complete security platform that also protects your privacy, use a VPN, keep a close grip on your social security number, and protect your files with encryption.
  • You should also avoid taking internet quizzes and be on the lookout for phishing attacks, keep your social media profile private, and look for HTTPS when you browse.
  • Additionally, lock your devices, keep tabs on your credit, and consider identity theft protection.
  • Protecting your personal info is essential because cybercriminals can use it for identity theft, financial fraud, and invasion of privacy.
  • Personal info can create a high-resolution snapshot of who you are, what you’re doing, when you’re doing it, and even where you’re doing it.
  • Use these quick and easy tips to keep your personal info safe in today’s digital age and protect your identity and privacy.
  • McAfee+ offers comprehensive online protection software that defends you against the latest virus, malware, spyware, and ransomware attacks and can also provide strong password protection.

Read Full Article

like

4 Likes

source image

Securityaffairs

4w

read

111

img
dot

Image Credit: Securityaffairs

Threat actor sells data of over 750,000 patients from a French hospital

  • A threat actor had access to the electronic patient record system of an unnamed French hospital, compromising the health data of 750,000 patients.
  • The stolen data includes personal information such as names, dates of birth, addresses, phone numbers, and medical information like prescriptions and attending physicians.
  • The breach seems to be a supply chain attack, with the hacker compromising the MediBoard platform provided by Softway Medical Group.
  • The exposure of medical data puts patients at risk of identity theft, fraud, and can lead to misdiagnoses or medical errors.

Read Full Article

like

6 Likes

For uninterrupted reading, download the app