Cyber Crime

Ex-Cybersecurity Consultant Jailed For Trading Confidential DataEx-Cybersecurity Consultant Jailed For Trading Confidential Data

Ex-Cybersecurity Consultant Jailed For Trading Confidential Data

Vincent Cannady, a professional who used to work as a consultant in the cybersecurity field, has been taken into custody…

11 months ago
GoldDigger Malware Using Deep Fake AI Photos To Hijack Bank AccountsGoldDigger Malware Using Deep Fake AI Photos To Hijack Bank Accounts

GoldDigger Malware Using Deep Fake AI Photos To Hijack Bank Accounts

Hackers use deep fake AI photos to impersonate individuals online, allowing them to deceive, manipulate, or gain unauthorized access to…

11 months ago
Alert! Cisco Releases Critical Security Updates to Fix 2 ASA Firewall 0-DaysAlert! Cisco Releases Critical Security Updates to Fix 2 ASA Firewall 0-Days

Alert! Cisco Releases Critical Security Updates to Fix 2 ASA Firewall 0-Days

Cisco has released critical security updates to address multiple vulnerabilities in its Adaptive Security Appliance (ASA) devices and Firepower Threat…

11 months ago
Ransomware Victims Who Opt To Pay Ransom Hits Record LowRansomware Victims Who Opt To Pay Ransom Hits Record Low

Ransomware Victims Who Opt To Pay Ransom Hits Record Low

Law enforcement operations disrupted BlackCat and LockBit RaaS operations, including sanctions on LockBit members aiming to undermine affiliate confidence. In…

11 months ago
Hacker Offers Upto $300 To Mobile Networks Staff For Illegal SIM SwapsHacker Offers Upto $300 To Mobile Networks Staff For Illegal SIM Swaps

Hacker Offers Upto $300 To Mobile Networks Staff For Illegal SIM Swaps

A SIM Swap Scam or SIM Cloning Scam exploits a vulnerability in a two-factor authentication (2FA) system that relies on…

12 months ago
Hackers Group Claims To Have Broke Into IDF & Stolen DocumentsHackers Group Claims To Have Broke Into IDF & Stolen Documents

Hackers Group Claims To Have Broke Into IDF & Stolen Documents

Anonymous claims a successful cyberattack against the Israeli Defence Force (IDF), gaining access to 20 gigabytes of data, which allegedly…

12 months ago
Russian APT44 – The Most Notorious Cyber Sabotage Group GloballyRussian APT44 – The Most Notorious Cyber Sabotage Group Globally

Russian APT44 – The Most Notorious Cyber Sabotage Group Globally

As Russia's invasion of Ukraine enters its third year, the formidable Sandworm (aka FROZENBARENTS, APT44) cyber threat group remains highly…

12 months ago
Phishing-as-a-Service Platform LabHost Seized by AuthoritiesPhishing-as-a-Service Platform LabHost Seized by Authorities

Phishing-as-a-Service Platform LabHost Seized by Authorities

Authorities have dismantled LabHost, a notorious cybercrime platform that facilitated widespread phishing attacks across the globe. The crackdown on LabHost,…

12 months ago
North Korean Hackers Abuse DMARC To Legitimize Their EmailsNorth Korean Hackers Abuse DMARC To Legitimize Their Emails

North Korean Hackers Abuse DMARC To Legitimize Their Emails

DMARC is targeted by hackers as this serves to act as a preventative measure against email spoofing and phishing attempts. …

12 months ago
INC Ransom Group Exfiltrates Data Before Encrypting & Threatens Public ExposureINC Ransom Group Exfiltrates Data Before Encrypting & Threatens Public Exposure

INC Ransom Group Exfiltrates Data Before Encrypting & Threatens Public Exposure

Hackers exfiltrate data first before encrypting it to increase their bargaining power during ransom negotiations.  Threats of public exposure of…

12 months ago