Please turn on your JavaScript for this page to function normally.
ransomware
Rebrand, regroup, ransomware, repeat

Changes witnessed over the last few years have led to larger ransomware groups breaking into smaller units, posing more considerable challenges for law enforcement. Ransomware …

extortion
Fraud tactics and the growing prevalence of AI scams

In the first six months of 2024, Hiya flagged nearly 20 billion calls as suspected spam – more than 107 million spam calls everyday. The data showed spam flag rates of more …

ransomware
The changing dynamics of ransomware as law enforcement strikes

After peaking in late 2023, the ransomware industry is beginning to stabilize in productivity, with notable developments in ransomware targets, and industry dynamics, …

Android
Android malware uses NFC to steal money at ATMs

ESET researchers uncovered NGate malware, which can relay data from victims’ payment cards via a malicious app installed on their Android devices to the attacker’s rooted …

ransomware
Most ransomware attacks occur between 1 a.m. and 5 a.m.

There’s been an alarming increase in ransomware attacks over the past year, alongside significant shifts in the tactics and strategies employed by cybercriminals that …

DDoS
Average DDoS attack costs $6,000 per minute

2023 saw a surge in the frequency and duration of DDoS attacks, and in the first half of 2024, it’s clear that surge has become the new normal, according to Zayo. DDoS attack …

phishing
New phishing method targets Android and iPhone users

ESET researchers discovered an uncommon type of phishing campaign targeting Android and iPhone users. They analyzed a case observed in the wild that targeted clients of a …

deepfakes
Organizations turn to biometrics to counter deepfakes

The risk of deepfakes is rising with 47% of organizations having encountered a deepfake and 70% of them believing deepfake attacks which are created using generative AI tools, …

phishing
Cybercriminals exploit file sharing services to advance phishing attacks

Threat actors use popular file-hosting or e-signature solutions as a disguise to manipulate their targets into revealing private information or downloading malware, according …

Chrome, Edge
Chrome, Edge users beset by malicious extensions that can’t be easily removed

A widespread campaign featuring a malicious installer that saddles users with difficult-to-remove malicious Chrome and Edge browser extensions has been spotted by researchers. …

Android
SMS Stealer malware targeting Android users: Over 105,000 samples identified

Zimperium’s zLabs team has uncovered a new and widespread threat dubbed SMS Stealer. Detected during routine malware analysis, this malicious software has been found in …

cybersecurity threats
The changes in the cyber threat landscape in the last 12 months

When it comes to the cyber threat landscape, change is the only constant: the inevitable interplay between cybercriminals and law enforcement agencies makes it inevitable. …

Don't miss

Cybersecurity news