cybercriminals
![ATM](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112424/atm-400x200.jpg)
ATM hackers switch to network-based attacks
More and more attacks against ATMs are network-based, Trend Micro researchers have found. Since the discovery of the first ATM malware back in 2009, criminals have …
![danger](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111946/danger-400x200.jpg)
Cybercriminals deploying assortment of banking Trojans and ransomware
Check Point revealed that banking trojans were extensively used by cybercriminals during August, with three variants appearing in the company’s latest Global Threat Impact …
![person](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09104053/person-400x200.jpg)
NanoCore RAT creator pleads guilty
26-year-old Taylor Huddleston, of Hot Springs, Arkansas, pleaded guilty today to charges of aiding and abetting computer intrusions. According to the statement of facts filed …
![person](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09104053/person-400x200.jpg)
Operators of decade-old Malware-as-a-Service outfit charged
As Crackas With Attitude hacker “Incursio” got handed a 2-year prison sentence for gaining unauthorized access to government computers and online accounts of a …
![abstract](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105427/abstract-400x200.jpg)
Rudimentary attacks pose the greatest risk to midsized organizations
Rudimentary attacks, such as intrusion attempts, information gathering, and policy violations pose the greatest risk to midsized organizations, according to eSentire. Attacks …
![hand](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09105157/hand-400x200.jpeg)
What motivates youngsters to get into cybercrime?
A UK National Crime Agency report, which is based on debriefs with offenders and those on the fringes of criminality, explores why young people assessed as unlikely to commit …
![healthcare](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110026/healthcare-400x200.jpg)
Cyber criminals targeting healthcare orgs’ FTP servers
FBI’s Cyber Division has sent out another notification to healthcare organizations, alerting them to the danger of cyber criminals using their FTP servers for various …
![](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195728/laptop-eyes-technology-computer-400x200.jpg)
Cyber espionage topping the list of largest security concerns
20 percent of global organizations rank cyber espionage as the most serious threat to their business, with 26 percent struggling to keep up with the rapidly evolving threat …
![fish phishing](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09114006/fish-400x200.jpg)
Clever spear-phishing emails hit employees involved in SEC filings
FireEye has flagged a sophisticated spear-phishing campaign hitting US-based businesses with emails purportedly coming from the US Securities and Exchange Commission (SEC). …
![MySQL](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110647/mysql-400x200.jpg)
Cyber extortionists hold MySQL databases for ransom
Ransomware has become cyber crooks’ favorite attack methodology for hitting businesses, but not all cyber extortion attempts are effected with this particular type of …
![Deutsche Telekom](https://img.helpnetsecurity.com/wp-content/uploads/2016/11/09105718/deutsche-telekom-400x200.jpg)
Suspected Deutsche Telekom router hacker arrested
A 29-year-old British national, believed to be the mastermind behind last November’s unsuccessful hijacking attempt of Deutsche Telekom users’ routers, was …
![ransomware](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111830/ransomware-400x200.jpg)
Russian-speaking cybercriminals created over 75% of all crypto ransomware
According to the Kaspersky Lab’s telemetry, in 2016 more than 1,445,000 users (including businesses) around the globe were attacked by 54 thousand modifications of 60+ …
Featured news
Resources
Don't miss
- Attackers compromise IIS servers by leveraging exposed ASP.NET machine keys
- Self-sovereign identity could transform fraud prevention, but…
- Ghidra 11.3 released: New features, performance improvements, bug fixes
- Ransomware payments plummet as more victims refuse to pay
- The overlooked risks of poor data hygiene in AI-driven organizations