Tag: Cyber Crime
-
INC Ransom claims responsibility for attack on NHS Scotland
NHS Scotland says it managed to contain a ransomware group’s malware to a regional branch, preventing the spread of infection across the …
-
INC Ransomware Hits NHS Scotland, Threatens Leak of 3TB Patient Data
The INC Ransomware gang claims a cyberattack on NHS Scotland, potentially compromising 3 terabytes of patient data — The dark web group …
-
International Sting Takes Down Major Dark Web Marketplace “Nemesis Market”
Nemesis Market, a major darknet marketplace for illegal goods, shut down by joint international law enforcement action – Servers seized, …
-
Hackers Transform the Raspberry Pi into an Online Anonymity Tool
GEOBOX, was advertised on the Dark Web that utilizes Raspberry Pi devices for fraud and anonymization, allowing users to spoof GPS …
-
Hackers Selling GlorySprout Malware with Anti-VM Features in underground Fourm for $300
GlorySprout stealer, advertised on the XSS forum in early March 2024, is a C++ stealer sold for $300 with lifetime access and temporary …
-
900+ websites Exposing 10M+ Passwords: Most in Plaintext
Over 900 websites inadvertently expose over 10 million passwords, many of which are in plaintext, alongside sensitive billing information …
-
Hackers Using Weaponized SVG Files in Cyber Attacks
Cybercriminals have repurposed Scalable Vector Graphics (SVG) files to deliver malware, a technique that has evolved significantly with the …
-
Dark Web Tool Arms Ransomware Gangs: E-commerce & Aviation Industries Targeted
Cybersecurity researchers have published two concerning reports where the first report highlights the surge in cyber attacks against the …
-
ShadowSyndicate Hackers Exploiting Aiohttp Vulnerability To Access Sensitive Data
A new Aiohttp vulnerability has been discovered, which the threat actor ShadowSyndicate exploits. Aiohttp is an asynchronous HTTP …
-
New Malware “BunnyLoader 3.0” Steals Credentials and Crypto
New high-performance malware “BunnyLoader 3.0” steals logins, crypto & lurks undetected. Palo Alto Unit 42 reveals its tricks to help …
-
Combining Threat Intelligence Platforms & Sandboxes for Efficient Security Operations – A DFIR Guide
Analysts use them to execute potentially malicious software without exposing their systems to the risk of infection. Sandbox analysis aims …
-
EquiLend Employee Data Breached After January Ransomware Attack
EquiLend, a financial technology firm, experienced a data breach following a January ransomware attack – EquiLend is offering credit …
●●●