Tag: Cybercriminals
-
Cybercriminals use cheap and simple infostealers to exfiltrate data
The rise in identity-based attacks can be attributed to a rapid increase in malware, according to SpyCloud. Researchers found that 61% of …
-
Cybercriminals can leverage March Madness as bait for attacks
Major events can be used by malicious actors to bait the general public. Events that gain traffic among consumers can be leveraged to …
-
Cybercriminals use ChatGPT’s prompts as weapons
Developed by OpenAI, ChatGPT has garnered attention across industries for its ability to generate relevant responses to various queries. …
-
APIs Drive the Majority of Internet Traffic and Cybercriminals are Taking Advantage
Application programming interfaces (APIs) are the connective tissue behind digital modernization, helping applications and databases …
-
Cybercriminals Beta Test New Attack to Bypass AI Security
Hackers develop a new attack (Conversation Overflow) to bypass AI security. Learn how this technique fools Machine Learning and what …
-
Cybercriminals Hacking Systems with 10+ Legitimate Data-Extraction Tools
In recent months, the cybersecurity landscape has witnessed a significant evolution in ransomware attacks, with perpetrators deploying an …
-
Cybercriminals Using Novel DNS Hijacking Technique for Investment Scams
A new DNS threat actor dubbed Savvy Seahorse is leveraging sophisticated techniques to entice targets into fake investment platforms and …
-
How Cybercriminals are Exploiting India’s UPI for Money Laundering Operations
Cybercriminals are using a network of hired money mules in India using an Android-based application to orchestrate a massive money …
-
Cybercriminals harness AI for new era of malware development
The alliance between ransomware groups and initial access brokers (IABs) is still the powerful engine for cybercriminal industry, as …
-
Cybercriminals Weaponizing Open-Source SSH-Snake Tool for Network Attacks
A recently open-sourced network mapping tool called SSH-Snake has been repurposed by threat actors to conduct malicious activities. …
-
IBM: Identity Compromises Surge as Top Initial Access Method for Cybercriminals
Cybercriminals are ditching hacking into corporate networks and are instead using legitimate credentials to access and compromise them, …
-
New ‘VietCredCare’ Stealer Targeting Facebook Advertisers in Vietnam
Facebook advertisers in Vietnam are the target of a previously unknown information stealer dubbed VietCredCare at least since August 2022. …
●●●