menu
techminis

A naukri.com initiative

google-web-stories
Home

>

Cyber Crime News

Cyber Crime News

source image

Securityaffairs

1M

read

358

img
dot

Image Credit: Securityaffairs

Node.js malvertising campaign targets crypto users

  • Microsoft warns of a malvertising campaign using Node.js to deliver info-stealing malware via fake crypto trading sites like Binance and TradingView.
  • Threat actors are increasingly using Node.js to deploy malware, bypass security tools, and persist in systems.
  • In these attacks, malvertising is used to lure users to fake sites, and once executed, a malicious DLL collects system data and delivers further payloads.
  • Microsoft has provided recommendations to mitigate threats related to the misuse of Node.js.

Read Full Article

like

21 Likes

source image

Cybersecurity-Insiders

1M

read

174

img
dot

Zoom Video Conferencing App down by DDoS Attack

  • Zoom, the widely popular video conferencing platform, experienced a significant outage due to a DDoS cyber-attack.
  • The attack was global in nature and was claimed by the hacking group Dark Storm.
  • The Zoom service was down for a brief period, but services were rapidly restored.
  • Zoom's recent security incident highlights the need for continuous improvement in digital security.

Read Full Article

like

10 Likes

source image

Hackernoon

1M

read

233

img
dot

Image Credit: Hackernoon

SquareX To Uncover Data Splicing Attacks At BSides San Francisco, A Major DLP Flaw

  • SquareX researchers Jeswin Mathai and Audrey Adeline will present data splicing attack techniques at BSides San Francisco 2025, bypassing major DLP vendors through browser vulnerabilities.
  • Data breaches can lead to IP loss, fines, and reputational damage, with browsers being a prime target due to the shift of data storage to the cloud.
  • Browser-related challenges include data lineage management, multiple SaaS apps, and unauthorized software installations by employees.
  • Data splicing attacks exploit newer browser features, evading traditional DLP solutions and posing serious threats to organizations using browsers.
  • SquareX will release an open-source toolkit, 'Angry Magpie', for testing DLP stacks against data splicing attacks after the BSides San Francisco presentation.
  • The research aims to raise awareness about browser vulnerabilities and prompt enterprises and vendors to enhance their data loss protection strategies.
  • Speakers Jeswin Mathai and Audrey Adeline will also present at RSAC 2025 and offer further insights at Booth S-2361, South Expo.
  • SquareX's Chief Architect Jeswin Mathai has a history of presenting at renowned cybersecurity events and creating popular open-source projects.
  • Researcher Audrey Adeline heads the Year of Browser Bugs project at SquareX, focusing on disclosing critical browser vulnerabilities.
  • SquareX's Browser Detection and Response (BDR) helps organizations defend against web attacks targeting employees in real-time.

Read Full Article

like

14 Likes

source image

Silicon

1M

read

76

img
dot

Image Credit: Silicon

China Names US Operatives For Alleged Cyberattacks

  • China has publicly named three US citizens accused of carrying out cyberattacks on Chinese infrastructure.
  • China alleged that the US operatives worked through the National Security Agency (NSA).
  • The attacks targeted the systems managing the Asian Games and critical infrastructure in Heilongjiang province.
  • China has expressed concerns and urged the US to adopt a responsible attitude on cybersecurity issues.

Read Full Article

like

4 Likes

source image

Securityaffairs

1M

read

323

img
dot

Image Credit: Securityaffairs

Chinese Android phones shipped with malware-laced WhatsApp, Telegram apps

  • Cheap Chinese Android phones are being shipped with trojanized WhatsApp and Telegram clones designed to steal cryptocurrencies through address swapping.
  • The campaign targets low-end phones resembling well-known models and embeds malware in pre-installed apps.
  • Attackers spoof device specifications to make phones appear as Android 14 with better hardware, fooling users and apps.
  • The malware, dubbed Shibai, uses hidden modules to hijack updates, replace crypto wallet addresses, and exfiltrate chat data.

Read Full Article

like

18 Likes

source image

Silicon

1M

read

85

img
dot

Image Credit: Silicon

AI in Cybersecurity: Double-Edged Sword or Game-Changer?

  • AI is reshaping cybersecurity, providing defenders with enhanced detection capabilities and automating incident responses.
  • However, cybercriminals are leveraging AI for more sophisticated attacks, including AI-enhanced phishing and voice deepfakes.
  • Generative AI tools are enabling cybercriminals to conduct reconnaissance, automate malware development, and mimic individuals convincingly.
  • Despite the advancements in AI-driven attacks, AI is also being used by defenders to detect abnormal patterns and automate low-level threat responses.
  • AI-driven tools like GenAI are assisting security teams in SIEM rule generation and identifying vulnerabilities before hackers exploit them.
  • While AI enhances cybersecurity, it comes with limitations such as data bias, false positives, and the inability to comprehend intent without human oversight.
  • Concerns regarding privacy, bias, and ethical use of AI in cybersecurity highlight the importance of human judgment in tandem with AI systems.
  • Organizations deploying AI for security must prioritize transparency, data privacy, and human accountability in decision-making processes.
  • When selecting AI-based cybersecurity tools, organizations should prioritize native AI solutions, question vendors on model training and explainability, and assess integration capabilities.
  • AI's impact on cybersecurity is a high-stakes game, where thoughtful integration with human expertise can be a force multiplier in staying ahead of evolving cyber threats.

Read Full Article

like

5 Likes

source image

Securityaffairs

1M

read

265

img
dot

Image Credit: Securityaffairs

Cyber Threats Against Energy Sector Surge as Global Tensions Mount

  • Rising cyberattacks on the energy sector, linked to large-scale campaigns targeting national infrastructure for geopolitical aims, have been identified.
  • Cybersecurity experts warn about the increase in targeted cyberattacks against enterprises in the energy sector worldwide.
  • The vulnerability of American power grids to cyberattacks is a growing concern, as the number of susceptible points in electrical networks continues to increase.
  • Technological advancements, such as cloud adoption and AI integration, have further increased cyber-risk scenarios for the energy sector.

Read Full Article

like

15 Likes

source image

Securityaffairs

1M

read

206

img
dot

Image Credit: Securityaffairs

Government contractor Conduent disclosed a data breach

  • Conduent, a business services provider, disclosed a data breach to the SEC.
  • The cyberattack, which occurred in January, resulted in the theft of personal data including names and Social Security numbers.
  • The company has restored operations and is investigating the full impact of data exfiltration, while notifying affected clients.
  • No major operational impact was reported, but Conduent incurred costs for notifications and holds cyber insurance.

Read Full Article

like

12 Likes

source image

Cybersecurity-Insiders

1M

read

215

img
dot

Crafty Threat Actors Unleash Ingenious Phishing Ploys

  • Crafty threat actors and scammers deploy various ingenious phishing tactics to deceive individuals and organizations.
  • A tax-themed phishing campaign uses Microsoft Common Console document files to deliver malicious payloads and exploit victims.
  • Gamers are targeted with fake game beta test messages, leading to the extraction of sensitive information through infostealers.
  • Amazon Prime customers face phishing emails pretending their membership is expiring, stealing personal and financial data.
  • A surge in smishing campaigns impersonating the USPS prompts victims to divulge personal and credit card details.
  • Facebook users are targeted by fake copyright violation emails, tricking victims into divulging login credentials to scammers.
  • Preventive measures against phishing include staying informed, conducting phish training, implementing multi-factor authentication, and using email filters.
  • Regular monitoring of accounts for unusual activity and suspicious transactions is crucial to combat evolving phishing scams.
  • Vigilance, employee training, and stringent security practices are vital to mitigate the risks posed by phishing attacks.
  • Phishing scams are a significant threat that continues to evolve, emphasizing the importance of maintaining awareness and implementing robust security measures.

Read Full Article

like

12 Likes

source image

Medium

1M

read

440

img
dot

Image Credit: Medium

Phishing: You Know What It Is But Will You Know When It Happens To You?

  • Phishing scams have become increasingly sophisticated, imitating the familiar logos and login pages of legitimate companies.
  • Scammers use various tactics to create a sense of urgency, like freezing accounts, fake tax refunds, or threatening arrest.
  • People, including children, are vulnerable to scams and phishing attempts, particularly when distracted or enticed by promises of gaming benefits.
  • To stay safe, it's crucial not to enter personal information unless the authenticity of the sender has been firmly validated.

Read Full Article

like

26 Likes

source image

Digitaltrends

1M

read

152

img
dot

Image Credit: Digitaltrends

Used Hertz? You might want to keep an eye on your credit

  • Hertz, the car rental company, has sent a notice to customers about a data breach that occurred between October and December 2024.
  • Personal data including names, contact information, credit card details, driver's license information, and more, may have been exposed.
  • Customers are advised to monitor their credit reports and remain vigilant for any unauthorized activity.
  • Hertz has not received any reports of damages caused by the data breach but encourages individuals to take precautions to prevent fraud.

Read Full Article

like

9 Likes

source image

Securityaffairs

1M

read

368

img
dot

Image Credit: Securityaffairs

Hertz disclosed a data breach following 2024 Cleo zero-day attack

  • Car rental giant Hertz Corporation disclosed a data breach that impacted its Hertz, Thrifty, and Dollar brands.
  • Threat actors gained access to customer data via Cleo zero-day exploits in late 2024.
  • The breach exposed customer data, including names, contacts, DOB, credit card information, and driver's license information.
  • Hertz confirmed Cleo addressed the breach, notified law enforcement and regulators, and offers 2 years of free Kroll identity monitoring.

Read Full Article

like

22 Likes

source image

Cybersafe

1M

read

215

img
dot

Image Credit: Cybersafe

Hertz Data Breach: Driver’s Licenses and Financial Details at Risk

  • Hertz Corporation confirms data breach compromising personal information.
  • Breach resulted from zero-day vulnerabilities in Cleo's managed file transfer platforms.
  • Exposed data includes names, contact details, credit card numbers, driver's license information, and more.
  • Clop ransomware group claims responsibility and leaks Hertz's data.

Read Full Article

like

12 Likes

source image

Cybersecurity-Insiders

1M

read

350

img
dot

Image Credit: Cybersecurity-Insiders

Why Shutting Down Systems After a Cyberattack is Not Recommended

  • Shutting down systems after a cyberattack may complicate recovery efforts and lead to unforeseen consequences.
  • It can result in the loss of crucial forensic evidence needed to understand the attack and prevent future breaches.
  • Hindering the investigation process by removing access to real-time data and potential digital breadcrumbs left by attackers.
  • Shutting down systems abruptly can cause data loss, file corruption, and irreversible damage to databases.
  • There's a risk of exposing the network to additional risks if malware spreads when systems are shut down.
  • Lack of real-time mitigation capabilities when systems are powered off, making it harder to apply countermeasures during an attack.
  • Restoring systems after a shutdown can be complex and time-consuming, potentially reintroducing malware into the environment.
  • Cybersecurity professionals recommend isolating compromised systems instead of immediate shutdown for better containment and investigation.
  • Isolating systems helps monitor ongoing activity, preserve evidence, and develop a clearer understanding of the attack for a thorough investigation.
  • A measured response focusing on containment, forensic investigation, and real-time mitigation strategies is crucial for minimizing the impact of cyberattacks.

Read Full Article

like

21 Likes

source image

Cybersecurity-Insiders

1M

read

193

img
dot

Image Credit: Cybersecurity-Insiders

China accuses NSA for launching advanced Cyber Attacks on its infrastructure

  • China has accused the U.S. National Security Agency (NSA) of conducting advanced cyberattacks on critical Chinese infrastructure, marking a significant shift in the narrative of cyber warfare dynamics between the two global superpowers.
  • China's state-run media outlet Xinhua named three NSA agents, Robert Snelling, Stephen Johnson, and Katheryn Wilson, in connection with the cyberattacks on the Asian Winter Games and other critical infrastructure within China.
  • These accusations challenge the long-standing narrative of the U.S. being innocent in cyber conflicts, highlighting the complex dynamics of cyber warfare and escalating tensions between the two nations.
  • Accusations come amidst a fierce trade war between the U.S. and China, with high tariffs impacting both countries. The cyber conflict is now intertwined with economic pressure as non-traditional methods of power assertion.
  • China's accusations reflect a shift in global cyber power dynamics, with both nations engaging in offensive cyber operations. The involvement of academic institutions like the University of California and Virginia Tech complicates the cyber landscape.
  • Allegations against the NSA agents and academic institutions reveal the sophistication of cyberattacks targeting major international events and tech giants, further straining U.S.-China relations over cybersecurity and intellectual property issues.
  • The accusations challenge the prevailing one-sided narrative of China and Russia as primary cyber aggressors, presenting China as a victim of U.S. cyber tactics and signaling a shift in how nations perceive and respond to cyber threats.
  • As the U.S. and China navigate the complexities of the trade war and cybersecurity tensions, the global community faces uncertainty in international relations, cybersecurity, and the economy.
  • With accusations of cyberattacks on both sides and the trade war intensifying, traditional diplomatic tools are insufficient to address the complexities of modern geopolitical relations entrenched in cyber and economic warfare.
  • This development represents a new chapter in the cyber cold war between the U.S. and China, emphasizing the blurred lines between offense and defense in digital conflict and highlighting the lasting implications for global affairs.

Read Full Article

like

11 Likes

For uninterrupted reading, download the app