Cybercriminals

7 Articles
Billions of views weaponized: how cybercriminals use stolen YouTube and Instagram accounts and malicious sponsorships to launch mass-scale scams
Tech

Billions of views weaponized: how cybercriminals use stolen YouTube and Instagram accounts and malicious sponsorships to launch mass-scale scams

Scammers exploit trending topics to trick viewers into losing crypto Bitdefender warns millions at risk from hijacked content creator accounts Cyberattacks now target...

Cybercriminals used vendor backdoor to steal almost 0,000 of Taylor Swift tickets
Tech

Cybercriminals used vendor backdoor to steal almost $600,000 of Taylor Swift tickets

Two cybercriminals have stolen over $600,000 worth of tickets The tickets were primarily Taylor Swift concert tickets The criminals used a backdoor into...

Microsoft names cybercriminals who created explicit deepfakes
Tech

Microsoft names cybercriminals who created explicit deepfakes

A lawsuit against criminal gang Storm-2139 has been updated Four defendants have been named by Microsoft The group is allegedly responsible for creating...

SVG files are offering cybercriminals an easy way in with new phishing attacks
Tech

SVG files are offering cybercriminals an easy way in with new phishing attacks

Sophos says the use of SVG files in phishing is on the rise SVG files bypass email protection and can display malicious hyperlinks...

Racing against time on a menacing caldera: survey finds majority of organizations take days to tackle critical vulnerabilities, each of them a potential open goal for cybercriminals
Tech

Racing against time on a menacing caldera: survey finds majority of organizations take days to tackle critical vulnerabilities, each of them a potential open goal for cybercriminals

Survey finds nearly 70% of orgs leave critical vulnerabilities unresolved for 24 hours or more Managing vulnerability fog is a major challenge, as...

Dark Web cybercriminals are buying up ID to bypass KYC methods
Tech

Dark Web cybercriminals are buying up ID to bypass KYC methods

Researchers from iProov found a group buying up ID data from consumers The data is being used to bypass KYC processes Companies will...

Cybercriminals are using virtual hard drives to drop RATs in phishing attacks
Tech

Cybercriminals are using virtual hard drives to drop RATs in phishing attacks

Virtual hard drives are being abused in phishing campaigns, experts warn The virtual drives are used to drop RAT malware into unsuspecting inboxes...