This week, a vodka maker in bankruptcy cited its ransomware attack, no ransomware at the Spanish tax agency and cable cuttings in Finland. Data stolen from Japanese shoppers, Chemonics International and law firm KYL. A sweep of Asian cybercrime, trends in the U.K. and ENGlobal ransomware attack.
A Russian state hacking group hijacked the command and control infrastructure of a Pakistan-based espionage network as part of an ongoing intelligence-gathering operation targeting victims in Asia, finds a report from Microsoft and Black Lotus Labs.
Security researchers warn of a newly discovered zero-day vulnerability in widely used VoIP telephony software, a discovery that comes as the United States struggles to evict Chinese nation-state hackers from telecom networks. The software is the MiCollab software suite from Canada-based Mitel.
An international investigation led by the U.K. busted Russian money cash-for-crypto laundering networks in an operation that's led to the arrest of 84 individuals and U.S. sanctions against others. One of the network allegedly laundered extortion money paid to the Ryuk ransomware group.
Nation-state attackers pose a growing cybersecurity threat driven by specific geopolitical or economic objectives. These actors often target organizations with valuable data, using advanced techniques such as reconnaissance, said Ryan Roobian, global solutions architect, Google Cloud.
German police arrested the suspected administrator of the largest German-speaking underground markets for illegal goods and services. Crimenetwork, online since 2012, was used to sell stolen data, drugs and forged documents. The platform had more than 100,000 users and 100 sellers.
Hackers can potentially use AI to manipulate data that's generated and shared by some health apps, diminishing the data's accuracy and integrity, said Sina Yazdanmehr and Lucian Ciobotaru of cybersecurity firm Aplite, describing a recent research project involving Google Health Connect.
Le commerce d’espèces sauvages se place en quatrième position des activités criminelles à l’échelle mondiale. Sa valeur est estimée à 20 milliards de dollars par an.
Le trafic d’espèces sauvages est une menace constante et à plusieurs facettes pour notre société qui porte atteinte à l’échelle...
A malware campaign targeting Russian retailers and service businesses aims to deploy remote access tools and install infostealer malware. Kaspersky dubbed the campaign "Horns&Hooves," after a fake organization set up by fraudsters in the 1931 Soviet satirical novel "The Little Golden Calf."
French and Dutch police led the takedown of an encrypted messaging platform used in international drug and arms trafficking. Dutch police discovered the app, named Matrix, on the phone of a criminal convicted in 2021 of murdering a journalist.
GoodRx has reached a $25 million preliminary settlement of proposed class action litigation alleging the telehealth company violated privacy and an assortment of other laws and statutes when it previously collected and shared consumers' information with third parties through online tracking tools.
A South Korean company exported 240,000 satellite receivers with distributed denial-of-service attack capabilities, leading to the arrest of its CEO by the Korean National Police Agency. The company and its employees face criminal prosecution for allegedly violating South Korea's cybersecurity laws.
The founder of the notorious darknet market Hydra has been sentenced by a Moscow judge to serve a life sentence in one of the country's harsh penal colonies, together with 15 of his associates. Following its April 2022 disruption by Western law enforcement, other darknet markets replaced Hydra.
The payments industry, which has operated on established frameworks for decades, is adapting - or forced to adapt - to a new kind of intelligence. For industry heavyweights Visa and Mastercard, AI is becoming a tool to drive fraud detection, customer experience and operational agility.
According to Gartner, “The perimeter security paradigm led organizations to assume that entities were secure within a network protected by perimeter controls designed to keep the 'bad guys' out."
However, attackers took advantage of the assumption that an internal IP...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.eu, you agree to our use of cookies.