dark web
![GenAI](https://img.helpnetsecurity.com/wp-content/uploads/2024/05/27142024/genai-3-1500-400x200.webp)
How AI helps decode cybercriminal strategies
With terms like “AI washing” making their way into mainstream business consciousness, the hype surrounding AI is making it harder to differentiate between the true …
![faking data breaches](https://img.helpnetsecurity.com/wp-content/uploads/2024/06/21135908/faking_data_breaches-1500-400x200.webp)
Why are threat actors faking data breaches?
Earlier this year Europcar discovered a hacker selling info on its 50 million customers on the dark web. The European car rental company immediately launched an investigation, …
![cheap ransomware](https://img.helpnetsecurity.com/wp-content/uploads/2024/04/17182513/cheap_ransomware-1500-400x200.webp)
Cheap ransomware for sale on dark web marketplaces is changing the way hackers operate
Since June 2023, Sophos X-Ops has discovered 19 junk gun ransomware variants — cheap, independently produced, and crudely constructed — on the dark web. The developers of …
![ransomware](https://img.helpnetsecurity.com/wp-content/uploads/2020/03/04082432/ransomware-400x200.jpg)
RaaS groups increasing efforts to recruit affiliates
Smaller RaaS groups are trying to recruit new and “displaced” LockBit and Alphv/BlackCat affiliates by foregoing deposits and paid subscriptions, offering better …
![STEM](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/14121234/stem-education-400x200.jpg)
Securing the future: Addressing cybersecurity challenges in the education sector
In this Help Net Security video, Kory Daniels, CISO at Trustwave, shines a light on the impact the current threat environment can have for both universities and students. Key …
![AI](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/27124629/ai-eye-1400-400x200.webp)
Cybercriminals harness AI for new era of malware development
The alliance between ransomware groups and initial access brokers (IABs) is still the powerful engine for cybercriminal industry, as evidenced by the 74% year-on-year increase …
![digital identity](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/20132925/digital_identity2-400x200.jpg)
Why identity fraud costs organizations millions
92% of respondents to a recent report shared that their organization had been a victim of identity fraud, costing an average of $4.3 million over the last 12 months. Even so, …
![cyber threat](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/25143238/cyber-threat1-400x200.jpg)
Hundreds of network operators’ credentials found circulating in Dark Web
After the recent incident involving Orange España and the leakage of credentials from the RIPE NCC portal, which led to a major outage, the cybersecurity community needs to …
![Cyberbunker](https://img.helpnetsecurity.com/wp-content/uploads/2023/11/14095432/cyberbunker-400x200.jpg)
Review: Cyberbunker: The Criminal Underworld
Written and directed by Kilian Lieb and Max Rainer, Cyberbunker is a Netflix documentary about a group of hackers that enabled the proliferation of dark web forums where …
![data analytics](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/11203448/data_analytics2-400x200.jpg)
Infostealers and the high value of stolen data
The risk of personal and professional data being stolen by nefarious actors looms larger than ever, according to Trend Micro. Understanding the risks associated with data …
![keyboard](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/25133912/ai-security-400x200.jpg)
Protecting against FraudGPT, ChatGPT’s evil twin
FraudGPT is the evil counterpart to ChatGPT. Criminals use it to target businesses with phishing emails and scams with speed and accuracy like never before. The AI can be …
![data analytics](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/11203445/data_analytics1-400x200.jpg)
Why California’s Delete Act matters for the whole country
The California State Legislature passed Senate Bill 362, known as the Delete Act, to simplify the process for consumers to ask to remove their personal data gathered by data …
Featured news
Sponsored
Don't miss
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD
- Realm: Open-source adversary emulation framework
- Discover the growing threats to data security
- Encrypted traffic: A double-edged sword for network defenders