menu
techminis

A naukri.com initiative

google-web-stories
Home

>

Cyber Crime News

Cyber Crime News

source image

Securityaffairs

2d

read

168

img
dot

Image Credit: Securityaffairs

Security Affairs newsletter Round 517 by Pierluigi Paganini – INTERNATIONAL EDITION

  • FBI and DOJ seize $8.2 Million in romance baiting crypto fraud scheme
  • Experts warn of the new sophisticate Crocodilus mobile banking Trojan
  • Russian authorities arrest three suspects behind Mamont Android banking trojan
  • Mozilla fixed critical Firefox vulnerability CVE-2025-2857

Read Full Article

like

10 Likes

source image

Securityaffairs

2d

read

136

img
dot

Image Credit: Securityaffairs

Sam’s Club Investigates Alleged Cl0p Ransomware Breach

  • Sam's Club, a Walmart-owned membership warehouse club chain, is investigating the alleged Cl0p ransomware security breach.
  • The Cl0p ransomware group listed Sam's Club among its victims, accusing the company of ignoring security.
  • Sam's Club announced that it is actively investigating the matter, but has seen no evidence of a breach.
  • In December 2024, the Cl0p ransomware group claimed to have breached multiple companies through the Cleo file transfer software vulnerability.

Read Full Article

like

8 Likes

source image

Securityaffairs

3d

read

333

img
dot

Image Credit: Securityaffairs

FBI and DOJ seize $8.2 Million in romance baiting crypto fraud scheme

  • The U.S. DOJ seized over $8.2 million in USDT stolen through ‘romance baiting’ scams.
  • Fraudsters tricked victims into fake investments promising high returns.
  • The FBI used blockchain intelligence to trace the flow of funds through various platforms and networks.
  • The seizure provides restitution for victims as the FBI traces additional addresses.

Read Full Article

like

20 Likes

source image

Securityaffairs

3d

read

342

img
dot

Image Credit: Securityaffairs

Experts warn of the new sophisticate Crocodilus mobile banking Trojan

  • The new Android trojan Crocodilus exploits accessibility features and targets users in Spain and Turkey.
  • Crocodilus uses overlay attacks, keylogging, and remote access to steal banking and crypto credentials.
  • The trojan supports advanced keylogger capabilities and a wide range of bot and RAT commands.
  • Crocodilus is linked to the threat actor 'sybra' and poses a significant threat to banks and cryptocurrency wallets.

Read Full Article

like

20 Likes

source image

Gizchina

3d

read

183

img
dot

Image Credit: Gizchina

Hackers Steal Data and Blackmail U.S. Hospitals in Oracle Breach

  • Hackers breached Oracle's servers, stole sensitive patient data, and blackmailed several US medical institutions.
  • The breach highlights security concerns in the healthcare sector and the need for improved security protocols for patient records.
  • Oracle notified affected firms and authorities are investigating the ransom demands.
  • The incident emphasizes the importance of collaboration between healthcare and technology companies to protect patient data and privacy.

Read Full Article

like

11 Likes

source image

Guardian

3d

read

332

img
dot

Image Credit: Guardian

Birthday freebies: how to cash in on UK retailers’ gifts and discounts

  • Signing up for loyalty programs and newsletters can help access freebies and discounts from retailers on your birthday.
  • Various retailers offer free treats on birthdays with certain conditions, such as Greggs providing a free treat through their app.
  • Beauty brands like Space NK and Rituals offer free gifts for birthdays upon joining their loyalty programs.
  • Hotel Chocolat and Lindt provide discounts or free chocolates on birthdays through their membership programs.
  • Restaurants like Burger King and Zizzi offer free meals or discounts on birthdays upon joining their rewards programs.
  • Fashion retailers like H&M and Nike provide discounts on birthdays through their membership programs.
  • Signing up for these programs may lead to data collection and potential privacy risks.
  • Experts recommend using caution, creating separate email addresses for sign-ups, and being aware of terms and conditions.
  • Taking steps like strong passwords, reading terms, and controlling app permissions can help protect personal information.
  • Uninstalling unnecessary apps is advised to prevent ongoing data collection without consent.

Read Full Article

like

19 Likes

source image

Securityaffairs

3d

read

285

img
dot

Image Credit: Securityaffairs

Crooks are reviving the Grandoreiro banking trojan

  • Crooks are reviving the Grandoreiro banking trojan.
  • Grandoreiro is a modular backdoor with various capabilities including keylogging, command execution, and web-injects.
  • The trojan has been active since 2016 and initially targeted Brazil but expanded to Mexico, Portugal, and Spain.
  • The recent phishing campaigns use VPS hosting, obfuscation, and malicious ZIP files to evade detection and steal credentials.

Read Full Article

like

17 Likes

source image

Cybersecurity-Insiders

4d

read

286

img
dot

Image Credit: Cybersecurity-Insiders

Oracle Health data breach related to hospitals

  • Oracle Health, formerly known as Cerner, experienced a data breach that led to the leak of over 6 million records.
  • The breach occurred on legacy servers and the leaked data is linked to Cerner, a healthcare software services provider, which was acquired by Oracle in 2022.
  • The attacker compromised the servers, potentially copying sensitive information, including patient data from electronic health records to a remote server.
  • The breach poses significant risks to both the organization and the affected individuals, with potential consequences such as social engineering attacks, phishing schemes, identity theft, and reputational damage.

Read Full Article

like

17 Likes

source image

Silicon

4d

read

125

img
dot

Image Credit: Silicon

EU To Invest €1.3bn in AI, Cybersecurity, Digital Skills

  • The European Union plans to invest €1.3 billion in AI, cybersecurity, and digital skills.
  • The funding will be allocated to deploy critical technologies that are strategically important for the future of Europe and the continent's tech sovereignty.
  • The areas of focus include AI, cloud and data, cyber resilience, and digital skills.
  • The EU aims to improve the availability of generative AI applications, support digital innovation hubs, boost cyber resilience, and develop digital skills in the workforce.

Read Full Article

like

7 Likes

source image

Medium

4d

read

364

img
dot

How AI is Changing the Cybersecurity Game: The Rise of Autonomous Threat Detection

  • AI-driven cybersecurity solutions enable proactive threat hunting and real-time incident response.
  • Agentic AI, used by companies like Microsoft, CrowdStrike, and Darktrace, operates autonomously without human intervention.
  • AI platforms reduce response times and detect abnormal behavior to prevent data exfiltration.
  • Challenges faced by AI in cybersecurity include deepfake phishing, data quality, privacy concerns, and responsible AI governance.

Read Full Article

like

21 Likes

source image

Cybersecurity-Insiders

4d

read

267

img
dot

Image Credit: Cybersecurity-Insiders

BlackLock Ransomware gang infrastructure breached and info passed to law enforcement

  • A team of security researchers successfully infiltrated the network of the BlackLock ransomware gang.
  • Law enforcement received crucial insights into the gang's activities, allowing them to preemptively neutralize threats.
  • Researchers discovered unencrypted records of the gang's earnings and future attack plans.
  • Cybersecurity firms' involvement in disrupting ransomware operations raises questions about combating cybercrime.

Read Full Article

like

16 Likes

source image

Dataprivacyandsecurityinsider

4d

read

77

img
dot

Image Credit: Dataprivacyandsecurityinsider

Pennsylvania Teacher’s Union Faces Class Action over Data Breach

  • The Pennsylvania State Education Association (PSEA) is facing a class action over a data breach that occurred in July 2024.
  • The proposed class includes current and former PSEA members, as well as employees and their family members.
  • The lawsuit alleges negligence and breach of fiduciary duty by the union for failing to protect personal information, including Social Security numbers and medical data.
  • The class is seeking various damages, including credit monitoring services, punitive damages, and attorneys’ fees.

Read Full Article

like

4 Likes

source image

Dataprivacyandsecurityinsider

4d

read

325

img
dot

Image Credit: Dataprivacyandsecurityinsider

Phishing Attacks – Anyone Can Get Pwned

  • The creator of the HaveIBeenPwned website, Troy Hunt, fell victim to a phishing attack.
  • Hunt received an email supposedly from Mailchimp, leading him to a fake Mailchimp domain.
  • The phishing attack compromised Hunt's personal Mailchimp account and resulted in the theft of approximately 16,000 records.
  • Lessons learned from this incident include being cautious of emails creating a sense of urgency and considering the circumvention of password managers as a potential sign of a spoofed domain.

Read Full Article

like

19 Likes

source image

Medium

5d

read

40

img
dot

Image Credit: Medium

The Dark Shift in Ransomware in 2024: Less Money, More Menace

  • Ransomware payments have fallen by 35%, indicating improved defenses among organizations.
  • Attackers have shifted their tactics, employing intense psychological pressure.
  • They personalize threats, targeting personal information, relationships, and reputations of key individuals.
  • The focus on psychological coercion highlights the need for a holistic cybersecurity strategy.

Read Full Article

like

2 Likes

source image

Cybersecurity-Insiders

5d

read

122

img
dot

Image Credit: Cybersecurity-Insiders

Trump Administration Faces Data Breach Controversy Amid Signal Group Chat Scandal

  • The Trump Administration is facing a data breach controversy following a Signal group chat leak.
  • German news outlet Der Spiegel reported a new data leak involving sensitive information of key security advisors.
  • The leaked data includes email addresses, passwords, and phone numbers of high-ranking officials.
  • The breach raises concerns regarding privacy, potential security risks, and the need for improved cybersecurity measures.

Read Full Article

like

7 Likes

For uninterrupted reading, download the app