North Korean Hackers Create Fake US Firms to Target Crypto Developers In the ever-evolving landscape of cybersecurity threats, North Korean hackers have once again demonstrated their cunning tactics by resorting to a new scheme targeting crypto developers. By utilizing false identities and job listings, these hackers have managed to deceive unsuspecting developers into installing malware […]
FBI reports $9.3 billion lost to cryptocurrency fraud in 2024
FBI Reports $9.3 Billion Lost to Cryptocurrency Fraud in 2024 In the ever-expanding world of cryptocurrency, where digital assets and decentralized finance reign supreme, the risks of falling victim to fraud have become increasingly prevalent. The Federal Bureau of Investigation (FBI) recently revealed a staggering statistic – a whopping $9.3 billion was lost to cryptocurrency […]
Researchers report espionage campaign targeting government and critical sectors in Southeast Asia
Government Agencies and Critical Sectors in Southeast Asia Targeted by Billbug Group Cyber Espionage Campaign In a recent report by Symantec, alarming findings have come to light regarding a sustained cyber espionage campaign orchestrated by the notorious Billbug group. The targets? Government agencies and critical sectors in Southeast Asia, highlighting a significant threat to regional […]
Microsoft expands rewards for reporting AI vulnerabilities
Microsoft Expands Rewards for Reporting AI Vulnerabilities Microsoft is taking a proactive approach to cybersecurity by incentivizing ethical hackers to uncover and report artificial intelligence (AI) vulnerabilities in their enterprise products. The tech giant has recently announced that individuals who discover security flaws in AI-powered solutions such as Copilot Studio and PowerApps can now earn […]
Ransomware decline masks growing threat
Ransomware Decline Masks Growing Threat In the realm of cybersecurity, the ebb and flow of threats is a constant battle. Recent reports have indicated a 32% decrease in ransomware attacks in March, a seemingly positive trend in the ever-evolving landscape of cyber threats. However, beneath this apparent decline lies a more ominous reality – incidents […]
JusticeLink breach leads to arrest in Sydney
JusticeLink Breach Leads to Arrest in Sydney In a recent turn of events, the JusticeLink system faced a severe breach that has led to significant consequences. The breach, orchestrated by a hacker who managed to access files over two months before being detected and shut out of the system, has raised concerns about the security […]
Russian hackers target NGOs with fake video calls
Russian Hackers Target NGOs with Fake Video Calls Amidst the increasing digital threats faced by organizations worldwide, a new insidious tactic has come to light. Recent reports from cybersecurity researchers have unveiled a targeted phishing campaign aimed at non-governmental organizations (NGOs) working on Ukraine and human rights issues. The attackers behind this campaign, suspected to […]
SK Telecom probes cyberattack after weekend breach
SK Telecom Probes Cyberattack After Weekend Breach South Korea’s leading telecommunications company, SK Telecom, is currently under intense scrutiny following a recent cyberattack that compromised customer data. The breach, which occurred over the weekend, has raised significant concerns about the company’s cybersecurity measures and its ability to protect sensitive information. In response to the breach, […]
Adyen services disrupted by cyber blitz
Adyen Services Disrupted by Cyber Blitz Adyen, a leading payment service provider, found itself in the eye of the storm recently as it faced a series of Distributed Denial of Service (DDoS) attacks. On a fateful Monday, the company’s payment services were hit by not one, not two, but three successive DDoS attacks, causing severe […]
Google spoofed in sophisticated phishing attack
Google Spoofed in Sophisticated Phishing Attack In the ever-evolving landscape of cybersecurity threats, a recent phishing attack has caught the attention of experts for its sophisticated approach. The attack successfully impersonated Google emails, using a valid DKIM signature to make the malicious messages appear legitimate. This maneuver not only duped unsuspecting recipients but also bypassed […]