Cyber Crime

Related News

How Hackers Are Using Fake Captchas to Spread Lumma Stealer Malware

  • Simon Chandler
  • Published date: 2025-08-18 17:48:22

The malware scours infected devices for sensitive information including passwords, 2FA tokens and crypto wallet data.

In brief <ul><li>Hackers are using fake Captchas to distribute Lumma Stealer malware, new research has found.</li><li>Once installed by an unsuspecting user, the malware searches infected devices fo… [+4853 chars]

Hackers Using Fake Captchas to Spread Lumma Stealer Malware

  • Simon Chandler
  • Published date: 2025-08-18 16:56:33

The malware scours infected devices for sensitive information including passwords, 2FA tokens and crypto wallet data.

In brief <ul><li>Hackers are using fake Captchas to distribute Lumma Stealer malware, new research has found.</li><li>Once installed by an unsuspecting user, the malware searches infected devices fo… [+5223 chars]

OpenAI unveils ChatGPT Agent: AI for complex tasks with a higher risk of financial theft and bioweapon creation

  • David Chien
  • Published date: 2025-07-18 21:19:00

ChatGPT OpenAI Agent has computer and web access to complete complex tasks on its own, with improved AI LLM performance versus prior models. However, the AI is also potentially more dangerous, including the possibility of unauthorized bitcoin transfers and bi…

OpenAI has released ChatGPT Agent, a new AI combining the ability to conduct deep research with full access to computer files, terminal shells, and the Internet. It is able to answer complex question… [+1679 chars]

Warning to anyone watching Usyk vs Dubois illegally via IPTV or firesticks

  • Emma Rosemurgey
  • Published date: 2025-07-18 14:20:12

A cyber security expert as warned anyone streaming the Usyk vs Dubois boxing match could be impacting their online safety

Boxing fans are being warned against watching the Oleksandr Usyk vs Daniel Dubois match illegally using IPTV on 'dodgy' firesticks. The pair will go head to head at Wembley Stadium tomorrow night (1… [+2555 chars]

Talos IR ransomware engagements and the significance of timeliness in incident response

  • Aliza Johnson
  • Published date: 2025-07-16 10:00:01

The decision between immediate action and delayed response made the difference between ransomware prevention and complete encryption in these two real-world Talos IR engagements.

<ul><li>Cisco Talos routinely responds to ransomware engagements where the impact could have been mitigated or wholly prevented if the victim organization had initiated remediation efforts earlier in… [+21737 chars]

North Korean hackers release malware-ridden packages into npm registry

  • Sead Fadilpašić
  • Published date: 2025-07-15 15:58:00

A second wave of tainted packages was spotted on npm, likely part of a larger campaign.

<ul><li>Security researchers spotted 67 malicious packages on npm</li><li>The packages are part of the Contagious Interview campaign</li><li>They are most likely deployed by North Korean attackers</l… [+2523 chars]

Inside the billion-dollar identity fraud ecosystem

  • Liron Levy
  • Published date: 2025-07-08 08:47:11

The evolving battle against fraud and what organizations must do now.

Identity theft has evolved rapidly into a high-stakes battlefield, one where criminals operate like well-funded startups with R&amp;D budgets, strategic playbooks, and sophisticated technology. What … [+9294 chars]

Crims are posing as insurance companies to steal health records and payment info

  • Jessica Lyons
  • Published date: 2025-06-27 22:59:14

Taking advantage of the ridiculously complex US healthcare billing system Criminals masquerading as insurers are tricking patients and healthcare providers into handing over medical records and bank account information via emails and text messages, according …

Criminals masquerading as insurers are tricking patients and healthcare providers into handing over medical records and bank account information via emails and text messages, according to the FBI. I… [+3486 chars]

Democratized cybercrime: a new lower bar for hackers and higher stakes for security

  • Matt Aldridge
  • Published date: 2025-06-27 08:03:54

The rise and evolution of phishing attacks, and how technologies such as AI continue to lower the bar for threat actors to execute attacks.

Phishing has long been a staple of cybercrime, historically betrayed by clumsy spelling, suspicious URLs and poor formatting. Today, however, the rules have changed. What once required technical know… [+6322 chars]

The 16 Billion Password Leak Is Not What You Think: What It Means and How to Stay Safe

  • Krishi Chowdhary
  • Published date: 2025-06-23 14:36:20

16 billion login credentials have been found across various datasets, making it one of the largest cybersecurity breaches in history. This is not a ‘new leak’ but a collection of previously leaked credentials stuffed into various datasets. Poor password hygie…

Key Takeaways <ul><li>16 billion login credentials have been found across various datasets, making it one of the largest cybersecurity breaches in history.</li><li>This is not a ‘new leak’ but a col… [+6112 chars]

BlueNoroff Deepfake Zoom Scam Hits Crypto Employee with MacOS Backdoor Malware

The North Korea-aligned threat actor known as BlueNoroff has been observed targeting an employee in the Web3 sector with deceptive Zoom calls featuring deepfaked company executives to trick them into installing malware on their Apple macOS devices. Huntress, …

The North Korea-aligned threat actor known as BlueNoroff has been observed targeting an employee in the Web3 sector with deceptive Zoom calls featuring deepfaked company executives to trick them into… [+6889 chars]

#Infosec2025: Threat Actors Weaponizing Hardware Devices to Exploit Fortified Environments

  • James Coker
  • Published date: 2025-06-05 14:00:00

Sophisticated nation-state and cybercriminal groups are using insiders to infect targets via hardware devices, despite a lack of reporting of this threat

Threat actors are weaponizing legitimate hardware devices to compromise even the most fortified targets, warned Bentsi Benatar, CMO and Co-Founder of Sepio during a talk at Infosecurity Europe 2025. … [+2272 chars]

Banks Asking For Customer’s Voice Samples

  • Keith Mizuguchi
  • Published date: 2025-06-03 16:09:17

Cybersecurity experts warn that more available personal data can contribute to financial theft.

Eight Bay Area representatives were among 23 California Democrats who signed a letter criticizing the “terminations, hiring freezes, and vacancies” that led the weather service to reduce services at … [+1696 chars]

Microsoft takes down malware found on 394,000 Windows PCs

  • Kurt Knutsson, CyberGuy Report
  • Published date: 2025-06-01 14:00:20

Microsoft's takedown of Lumma Stealer marks a significant victory against infostealer malware, safeguarding millions of devices from data theft and breaches.

Infostealer malware has been on the rise recently, and that's evident from the billions of user records leaked online in the past year alone . This type of malware targets everything from your name,… [+7982 chars]

LLMs in Long-Running Vending Business Simulation Go Berserk

  • lunchlady55
  • Published date: 2025-05-27 02:38:31

A pair of researchers investigating the ability of LLMs to coherently operate a simulated vending machine business have recorded hilariously unhinged behavior in many of current "advanced" LLMs. These were setup with several "tools" (code the AI can call as s…

A pair of researchers investigating the ability of LLMs to coherently operate a simulated vending machine business have recorded hilariously unhinged behavior in many of current "advanced" LLMs. Thes… [+3605 chars]

Senior Security

  • Lyn Never
  • Published date: 2025-05-15 00:55:54

How do I remotely hire and supervise a helper for my elderly mother without putting her at risk? Am I being the right amount of paranoid, too much, or not enough?Mom's 80, living alone and independently, but I need to get someone to help her with some errands…

Mom's 80, living alone and independently, but I need to get someone to help her with some errands and two-person tasks and occasional medical-related transportation.As far as I understand it, she doe… [+2299 chars]

US Raises Travel Risk For Caribbean Countries

  • Jasmine Laws
  • Published date: 2025-05-08 12:05:12

Cuba was one of the 41 countries that featured on an internal memo seen by Reuters that were being considered for a full visa suspension by the White House.

The U.S. has updated its travel advisory levels for several Caribbean nations, including Cuba and Trinidad and Tobago, citing heightened concerns over crime, civil unrest, and strained diplomatic rel… [+4403 chars]

Browser-stored passwords: Why it is a bad idea to do it

  • Faith Leroux
  • Published date: 2025-05-02 06:12:20

It's not as safe and secure as a third-party password manager, even if Chrome and Firefox have security measures built-in to it

Storing your password on your browser provides ease of use. However, using your browser's built-in password manager puts your credentials at risk. There are security trade-offs to using your browser'… [+5358 chars]

Why cybersecurity matters for small and medium-sized businesses

  • Computerworld
  • Published date: 2025-04-23 14:35:37

Online threats are prevalent and technology is advancing at a rapid pace, making cybersecurity an urgent requirement in safeguarding the digital assets of small and medium-sized businesses (SMBs).  By protecting vital data, sensitive customer information…

Online threats are prevalent and technology is advancing at a rapid pace, making cybersecurity an urgent requirement in safeguarding the digital assets of small and medium-sized businesses (SMBs).  … [+3857 chars]

Morrison & Foerster Discusses DOJ’s New Digital Asset Enforcement Policy

  • Deborah L. Connor, William Frentzen, Haimavathi V. Marlier, Haydn Forrest and Colbie Holderness
  • Published date: 2025-04-23 04:01:14

On April 7, 2025, Deputy Attorney General Todd Blanche issued a memo (the “Blanche Memo”) announcing the Trump administration’s Department of Justice (“DOJ”) refocus of enforcement policies related to investigations and prosecutions of individuals and entitie…

On April 7, 2025, Deputy Attorney General Todd Blanche issued a memo (the Blanche Memo) announcing the Trump administrations Department of Justice (DOJ) refocus of enforcement policies related to inv… [+8657 chars]

Chinese Smishing Kit Powers Widespread Toll Fraud Campaign Targeting U.S. Users in 8 States

Cybersecurity researchers are warning of a "widespread and ongoing" SMS phishing campaign that's been targeting toll road users in the United States for financial theft since mid-October 2024. "The toll road smishing attacks are being carried out by multiple …

Cybersecurity researchers are warning of a "widespread and ongoing" SMS phishing campaign that's been targeting toll road users in the United States for financial theft since mid-October 2024. "The … [+5418 chars]

Unraveling the U.S. toll road smishing scams

  • Azim Khodjibaev
  • Published date: 2025-04-10 14:30:43

Cisco Talos has observed a widespread and ongoing financial theft SMS phishing (smishing) campaign since October 2024 that targets toll road users in the United States of America.

<ul><li>Cisco Talos has observed a widespread and ongoing financial theft SMS phishing (smishing) campaign since October 2024 that targets toll road users in the United States of America.  </li><li>W… [+10047 chars]

U.S. State Department Issues Level 3 Travel Advisory For Popular Cruise Destination

  • Emma Kenner
  • Published date: 2025-03-31 15:31:16

The U.S. State Department had issued a Level 3 travel advisory for a popular cruise port. The post U.S. State Department Issues Level 3 Travel Advisory For Popular Cruise Destination appeared first on AllEars.Net.

On March 31st, 2025, the U.S. State Department updated a warning a popular Caribbean Cruise destination. The Disney Wish. If you are traveling to Trinidad and Tobago, the travel advisory has been a… [+2257 chars]

Cybercriminals Use Atlantis AIO to Target 140+ Platforms

  • Alessandro Mascellino
  • Published date: 2025-03-25 16:30:00

Cybercriminals are increasingly leveraging Atlantis AIO, which automates credential stuffing attacks across more than 140 platforms

Cybercriminals have been observed increasingly leveraging Atlantis AIO, a sophisticated tool designed to automate credential stuffing attacks across more than 140 platforms. This software enables at… [+2675 chars]

Fake job postings on social media leave India Inc. worried

  • Devina Sengupta, Suneera Tandon
  • Published date: 2025-03-20 23:50:20

Global financial and risk advisory firm Kroll says at least 2 out of 10 job postings are fake. Candidates are often asked to pay ₹50,000 to ₹1 lakh for a job by scamsters.

Mumbai/New Delhi: A fake job post on LinkedIn forced Nestlé India Ltd chairman and managing director Suresh Narayanan to debunk the scam. The menace, however, is far bigger, as multiple companies hav… [+5018 chars]