Please turn on your JavaScript for this page to function normally.
eye
Assessing the habits and tactics of organized credit card fraud gangs

By analyzing hundreds of criminal forums, Digital Shadows discovered a new trend in the form of remote learning ‘schools’. Available to Russian speakers only, these six-week …

Trojan
Swiss users targeted with Windows, macOS banking Trojan

Swiss users are once again hit with emails delivering banking malware, for both Windows and macOS systems. Trend Micro researchers believe the campaign to have been mounted by …

phishing
Man stole bitcoin by phishing individuals on the dark web

Michael Richo, a 35-year-old from Connecticut, had the brilliant idea of stealing bitcoin from people involved in illegal deals through dark web marketplaces. Perhaps he …

ATM
Cross-border action dismantles network of payment card fraudsters

A successful operation that took down an international criminal network of payment card fraudsters was carried out thanks to cross-border cooperation in Europe. 31 suspects …

phishing
Analyzing phishing attacks against 500,000 mailboxes at 100 organizations

Phishing has evolved from a mere nuisance into a global epidemic in which organizations of all sizes and across all industries are being negatively impacted at high frequency. …

explode
Data breach activity reaches all-time high

With over 1,200 breaches and over 3.4 billion records exposed, 2017 is already on pace to be yet another “worst year on record” for data breach activity, according to Risk …

hand
Major international crackdown on tech support scams

The FTC, along with federal, state and international law enforcement partners, announced Operation Tech Trap, a nationwide and international crackdown on tech support scams …

target
Brands increasingly targeted by false websites and phishing

DomainTools released the names of the top U.S.-based retail companies whose brands are frequently abused by criminals creating look-alike domains for phishing. The research …

danger
Know your enemy: Defining the new taxonomy of malicious emails

Just as it is the default tool for most businesses, email’s capacity for rapid, mass communication has made it a favourite instrument of criminals. As a result, malicious …

architecture
Cybercrime can come in any shape or size, and not always the form you’d expect

Cyberespionage is now the most common type of attack seen in manufacturing, the public sector and now education, warns the Verizon 2017 Data Breach Investigations Report. Much …

world
Modern threat landscape: Seismic shifts in motivation and focus

Cybercriminals revealed new levels of ambition in 2016 – a year marked by extraordinary attacks, including multi-million dollar virtual bank heists and overt attempts to …

vulnerability
NoTrove threat actor delivering millions of scam ads

Researchers at RiskIQ have identified NoTrove, a threat actor that is delivering millions of scam ads that threaten consumers and further undermine the digital advertising …

Don't miss

Cybersecurity news