cybercriminals
![IoT](https://img.helpnetsecurity.com/wp-content/uploads/2016/12/09105628/IoT-400x200.jpg)
Most IoT devices are being compromised by exploiting rudimentary vulnerabilities
Cybercriminals are looking for ways to use trusted devices to gain control of Internet of Things (IoT) devices via password cracking and exploiting other vulnerabilities, such …
![money](https://img.helpnetsecurity.com/wp-content/uploads/2019/01/09095455/money-400x200.jpg)
Criminal groups promising salaries averaging $360,000 per year to accomplices
New research from Digital Shadows reveals that criminal groups are promising salaries averaging the equivalent of $360,000 per year to accomplices who can help them target …
![Password](https://img.helpnetsecurity.com/wp-content/uploads/2019/01/09095338/password_field-400x200.jpg)
Indicators of poor password hygiene exposed
The recovered compromised credentials and personally identifiable information (PII) as well as the identified trends in online security habits and the data criminals tend to …
![person](https://img.helpnetsecurity.com/wp-content/uploads/2018/02/09101915/person-400x200.jpg)
Impersonation, sender forgery and corporate email spoofing top the charts
This Q4 of 2018 was a busy period for phishing scammers. INKY researchers saw a spike in email volume this time of year as people use email to gather their receipts from …
![target](https://img.helpnetsecurity.com/wp-content/uploads/2017/09/09103023/target-400x200.jpg)
Cybercriminals increasingly taking aim at businesses
2018 has been the year when cryptominers first dethroned ransomware as the most prevalent threat due to a meteoric spike in Bitcoin value in late 2017, then slowly trailed off …
![DDoS](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110633/ddos-world-400x200.jpg)
Researchers analyze DDoS attacks as coordinated gang activities
In a new report, NSFOCUS introduced the IP Chain-Gang concept, in which each chain-gang is controlled by a single threat actor or a group of related threat actors and exhibit …
![identity](https://img.helpnetsecurity.com/wp-content/uploads/2018/01/09102125/identity2-400x200.jpeg)
A law enforcement view of emerging cybercrime threats
Cybercriminals are adopting creative new techniques to target their victims at an unprecedented pace and are constantly seeking methods to avoid law enforcement detection. To …
![biohazard](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112826/biohazard-400x200.jpg)
Cybercriminals shift tools, tactics and procedures to improve infection rates
Trend Micro released its Midyear Security Roundup 2018, revealing that cybercriminals are moving away from attention-grabbing ransomware attacks to more covert methods …
![Microsoft impersonate](https://img.helpnetsecurity.com/wp-content/uploads/2018/07/09100534/microsoft-impersonate-400x200.jpg)
Microsoft tops list of brands impersonated by phishers
The number one brand spoofed by phishers in Q2 2018 in North America was Microsoft, says email security company Vade Secure. The company credits the surging of adoption of …
![arrest](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09105159/arrest-400x200.jpg)
Masterminds behind prolific CEO fraud ring arrested
It took two years and a collaborative effort of French, Belgian, Romanian and Israeli law enforcement agencies to take down an organised crime group that was behind at least …
![SWIFT](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112502/swift-400x200.jpg)
Russian, Indian banks lose millions to hackers
The Russian central bank’s Financial Sector Computer Emergency Response Team (FinCERT) disclosed on Friday that hackers compromised a computer at a Russian bank and used …
![professional](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113757/business-400x200.jpg)
UK shipbroker Clarksons refuses to pay hackers ransom for stolen data
London-based shipbroking firm Clarksons has suffered a data breach and refuses to pay the attackers to prevent the stolen data from being publicly released. About the …
Featured news
Resources
Don't miss
- Attackers compromise IIS servers by leveraging exposed ASP.NET machine keys
- Self-sovereign identity could transform fraud prevention, but…
- Ghidra 11.3 released: New features, performance improvements, bug fixes
- Ransomware payments plummet as more victims refuse to pay
- The overlooked risks of poor data hygiene in AI-driven organizations