Cyber Crime

Related News

U.S. State Department Issues Level 3 Travel Advisory For Popular Cruise Destination

  • Emma Kenner
  • Published date: 2025-03-31 15:31:16

The U.S. State Department had issued a Level 3 travel advisory for a popular cruise port. The post U.S. State Department Issues Level 3 Travel Advisory For Popular Cruise Destination appeared first on AllEars.Net.

On March 31st, 2025, the U.S. State Department updated a warning a popular Caribbean Cruise destination. The Disney Wish. If you are traveling to Trinidad and Tobago, the travel advisory has been a… [+2257 chars]

Cybercriminals Use Atlantis AIO to Target 140+ Platforms

  • Alessandro Mascellino
  • Published date: 2025-03-25 16:30:00

Cybercriminals are increasingly leveraging Atlantis AIO, which automates credential stuffing attacks across more than 140 platforms

Cybercriminals have been observed increasingly leveraging Atlantis AIO, a sophisticated tool designed to automate credential stuffing attacks across more than 140 platforms. This software enables at… [+2675 chars]

Fake job postings on social media leave India Inc. worried

  • Devina Sengupta, Suneera Tandon
  • Published date: 2025-03-20 23:50:20

Global financial and risk advisory firm Kroll says at least 2 out of 10 job postings are fake. Candidates are often asked to pay ₹50,000 to ₹1 lakh for a job by scamsters.

Mumbai/New Delhi: A fake job post on LinkedIn forced Nestlé India Ltd chairman and managing director Suresh Narayanan to debunk the scam. The menace, however, is far bigger, as multiple companies hav… [+5018 chars]

⚡ THN Weekly Recap: Router Hacks, PyPI Attacks, New Ransomware Decryptor, and More

From sophisticated nation-state campaigns to stealthy malware lurking in unexpected places, this week’s cybersecurity landscape is a reminder that attackers are always evolving. Advanced threat groups are exploiting outdated hardware, abusing legitimate tools…

From sophisticated nation-state campaigns to stealthy malware lurking in unexpected places, this week's cybersecurity landscape is a reminder that attackers are always evolving. Advanced threat group… [+25145 chars]

Lazarus Group deceives developers with 6 new malicious NPM packages

  • Matt Kapko
  • Published date: 2025-03-14 23:59:15

Socket researchers said the malware-ridden packages were collectively downloaded over 330 times. GitHub removed all of the malicious packages Wednesday.

Skip to main content Nominations can be submitted for the 2025 CyberScoop 50 awards! Click here! Close Socket researchers said the malware-ridden packages were collectively downloaded over 330 ti… [+3056 chars]

FBI’s warning to iPhone, Android users: Delete these ‘smishing’ texts now

  • Ariel Zilber
  • Published date: 2025-03-12 13:45:28

"Smishing" is a combination of "SMS" and "phishing," referring to deceptive tactics used to manipulate individuals into providing confidential info.

The FBI has issued a nationwide warning about a new wave of “smishing” attacks spreading across the United States. Smishing texts are fraudulent messages sent via SMS (Short Message Service) or text… [+5542 chars]

Lazarus Group Hid Backdoor in Fake npm Packages in Latest Attack

  • Waqas
  • Published date: 2025-03-12 00:15:21

Lazarus Group targets developers with malicious npm packages, stealing credentials, crypto, and installing backdoor. Stay alert to protect your projects.

The notorious Lazarus Group, a North Korean state-backed hacking group, is back at it again. This time, they’re sneaking malicious code into the popular npm software repository, a vital resource for … [+4459 chars]

Show HN: A daily editorialization of Hacker News (with RSS)

  • jensmtg
  • Published date: 2025-03-08 12:55:52

"Vibe HN" presents Hacker News in a format resembling a newspaper or a collection of executive summaries, while also capturing the essence of the comments. It was created as a small side project to experiment with LLM APIs and to help me refine my news consum…

NewsCultureOpinionProductsScienceHealth Feds Link $150M Cyberheist to 2022 LastPass Hacks (krebsonsecurity.com | comments) The FBI has connected a substantial $150 million cyberheist to vulnerabili… [+10258 chars]

From Event to Insight: Unpacking a B2B Business Email Compromise (BEC) Scenario

  • Jay Yaneza
  • Published date: 2025-03-05 00:00:00

Trend Micro™ Managed XDR assisted in an investigation of a B2B BEC attack that unveiled an entangled mesh weaved by the threat actor with the help of a compromised server, ensnaring three business partners in a scheme that spanned for days. This article featu…

In the second phase, the threat actor has fully inserted themselves to separate the conversations between the two companies. It is important to note that there are about 4-6 recipients in this runnin… [+18328 chars]

North Korean hackers behind largest ever financial theft

  • John Pike
  • Published date: 2025-02-28 09:08:36

The largest known financial heist in history has been perpetrated by a North Korean state-backed hacker group, according to experts.

The Pyongyang-backed Lazarus Group is believed by experts to have stolen $1.5billion from a cryptocurrency exchange. By Jamin Anderson for RFA Korean 2025.02.27 -- The largest known financial heist … [+3838 chars]

Cyber-attack surge plunges Thailand into security crisis

  • Suchit Leesa-nguansuk
  • Published date: 2025-02-18 21:00:00

<p>Thailand's cybersecurity landscape faces a crisis as attacks here are 70% higher than the global average, mainly phishing and banking scams, according to global cybersecurity firm Check Point Software Technologies.</p>

Thailand's cybersecurity landscape faces a crisis as attacks here are 70% higher than the global average, mainly phishing and banking scams, according to global cybersecurity firm Check Point Softwar… [+3105 chars]

Florida Government Issues Emergency Shutdown of Tolls After Millions of Disney World Guests Scammed

  • Emmanuel Detres
  • Published date: 2025-02-15 15:51:30

Given the high volume of visitors to Walt Disney World Resort, millions of tourists may have unknowingly been targeted by a State-wide scam involving the toll roads. Disney World Guests at Risk: The SunPass Scam Exposed Scams are an unfortunate reality of mod…

Given the high volume of visitors to Walt Disney World Resort, millions of tourists may have unknowingly been targeted by a State-wide scam involving the toll roads. Credit: Inside The Magic Disney… [+4701 chars]

FTC And FBI Warn Android And iOS Users About A Widespread Phishing Scam Demanding Immediate Payment For Fake Tolls

  • Ezza Ijaz
  • Published date: 2025-02-09 21:35:47

Scam calls and text messages are becoming increasingly common, especially with scammers coming up with novel ways to make users fall prey to such activities and confuse unsolicited messages with legitimate ones. An urgency is created to take action immediatel…

Scam calls and text messages are becoming increasingly common, especially with scammers coming up with novel ways to make users fall prey to such activities and confuse unsolicited messages with legi… [+2481 chars]

DeepSeek App Transmits Sensitive User and Device Data Without Encryption

  • Ravie Lakshmanan
  • Published date: 2025-02-07 14:58:00

A new audit of DeepSeek's mobile app for the Apple iOS operating system has found glaring security issues, the foremost being that it sends sensitive data over the internet sans any encryption, exposing it to interception and manipulation attacks. The assessm…

A new audit of DeepSeek's mobile app for the Apple iOS operating system has found glaring security issues, the foremost being that it sends sensitive data over the internet sans any encryption, expos… [+3402 chars]

5 Signs Your Computer Or Laptop Is Hacked – And What To Do

  • Emma Woollacott, Senior Contributor, Emma Woollacott, Senior Contributor https://www.forbes.com/sites/emmawoollacott/
  • Published date: 2025-01-26 14:00:00

Find out how to spot the signs of a hacked computer and take immediate action to protect your data and regain control of your device.

Restoring a hacked computer to normal can be a time-consuming process, but it is generally doable. getty Hackers are a busy bunch, with more than 300 million computers hacked every year and there's… [+9182 chars]

CERT-UA Warns of Cyber Scams Using Fake AnyDesk Requests for Fraudulent Security Audits

The Computer Emergency Response Team of Ukraine (CERT-UA) is warning of ongoing attempts by unknown threat actors to impersonate the cybersecurity agency by sending AnyDesk connection requests. The AnyDesk requests claim to be for conducting an audit to asses…

The Computer Emergency Response Team of Ukraine (CERT-UA) is warning of ongoing attempts by unknown threat actors to impersonate the cybersecurity agency by sending AnyDesk connection requests. The … [+3543 chars]

Lazarus Group Targets Web3 Developers with Fake LinkedIn Profiles in Operation 99

  • Ravie Lakshmanan
  • Published date: 2025-01-15 15:37:00

The North Korea-linked Lazarus Group has been attributed to a new cyber attack campaign dubbed Operation 99 that targeted software developers looking for freelance Web3 and cryptocurrency work to deliver malware. "The campaign begins with fake recruiters, pos…

The North Korea-linked Lazarus Group has been attributed to a new cyber attack campaign dubbed Operation 99 that targeted software developers looking for freelance Web3 and cryptocurrency work to del… [+3073 chars]

Mark Zuckerberg Doesn’t Get Amnesty For His Anti-American Censorship Schemes

  • Kylee Griswold
  • Published date: 2025-01-08 10:21:00

Until Mark Zuckerberg faces a reckoning for his republic-destroying actions, there should be no amnesty for him.

Mark Zuckerberg announced on Tuesday that Meta is super-duper apologetic for censoring its political enemies for years on end. He promises to do better because his tech behemoth is actually a huge fa… [+5624 chars]

The risk of online convenience

  • GERARD GIMINO
  • Published date: 2025-01-05 16:00:00

PETALING JAYA: As Malaysians are increasingly shopping online for everything from minor items to branded goods, including expensive gadgets or designer handbags, cybersecurity experts have warned of the risk of data breaches in the seemingly convenient practi…

PETALING JAYA: As Malaysians are increasingly shopping online for everything from minor items to branded goods, including expensive gadgets or designer handbags, cybersecurity experts have warned of … [+3432 chars]

Winnti hackers target other threat actors with new Glutton PHP backdoor

  • Bill Toulas
  • Published date: 2024-12-15 15:19:29

​The Chinese Winnti hacking group is using a new PHP backdoor named 'Glutton' in attacks on organizations in China and the U.S., and also in attacks on other cybercriminals. [...]

​The Chinese Winnti hacking group is using a new PHP backdoor named 'Glutton' in attacks on organizations in China and the U.S., and also in attacks on other cybercriminals. Chinese security firm QA… [+3997 chars]

New stealthy Pumakit Linux rootkit malware spotted in the wild

  • Bill Toulas
  • Published date: 2024-12-12 22:35:24

A new Linux rootkit malware called Pumakit has been discovered that uses stealth and advanced privilege escalation techniques to hide its presence on systems. [...]

A new Linux rootkit malware called Pumakit has been discovered that uses stealth and advanced privilege escalation techniques to hide its presence on systems. The malware is a multi-component set th… [+3341 chars]

RomCom exploits Firefox and Windows zero days in the wild

  • None
  • Published date: 2024-11-28 00:49:06

ESET Research details the analysis of a previously unknown vulnerability in Mozilla products exploited in the wild and another previously unknown Microsoft Windows vulnerability, combined in a zero-click exploit.

ESET researchers discovered a previously unknown vulnerability in Mozilla products, exploited in the wild by Russia-aligned group RomCom. This is at least the second time that RomCom has been caught … [+28637 chars]

Meta Finally Breaks Its Silence on Pig Butchering

  • Lily Hay Newman, Matt Burgess
  • Published date: 2024-11-21 18:00:00

The company gave details for the first time on its approach to combatting organized criminal networks behind the devastating scams.

Since roughly 2020, when the earliest pig butchering scams started to emerge, more than 200,000 people have been trafficked and held in compoundsmost in Myanmar, Cambodia, or Laoswhere they are force… [+2262 chars]

How Businesses Can Navigate Cyber Fraud After Natural Disasters

  • Morey Haber, Forbes Councils Member, Morey Haber, Forbes Councils Member https://www.forbes.com/councils/forbestechcouncil/people/moreyhaber/
  • Published date: 2024-11-19 12:30:00

While businesses and residents of these communities focus on recovery, cybercriminals see opportunity.

Morey Haber, Chief Security Advisor at BeyondTrust, is an identity and technical evangelist with over 25 years of IT industry experience. getty The 2024 hurricane season has tested the southeast of… [+5564 chars]

Mint Primer | Flight scare: Why hoax calls are untraceable

  • Shouvik Das
  • Published date: 2024-11-06 00:00:06

Modern-day hoax and scam calls use the Internet, meaning they aren’t delivered through a conventional telephone line or SIM card that can be physically traced.

A huge number of hoax calls crippled many flights last month. Internet-driven threats are not only difficult to trace, they also defy cross-border regulations, making matters geopolitically complicat… [+3040 chars]