Top

Category: Cyber-crime


Cyber-crime, Malware

Malware Gangs Partner Up in Double-Punch Security Threat

February 26, 2021

Via: Threat Post

Cybergangs are joining forces under the guise of affiliate groups and “as-a-service” models, warns Maya Horowitz, the director of threat intelligence research with Check Point Research. She said the trend is driving a new and thriving cybercriminal underground economy. Several […]


Cyber warfare, Cyber-crime

Ukraine Says Russian Cyberspies Targeted Gov Agencies in Supply Chain Attack

February 25, 2021

Via: Security Week

One of them, issued on Wednesday, said the agency’s National Coordination Center for Cybersecurity (NCCC) had observed attempts to deliver malicious documents through the System of Electronic Interaction of Executive Bodies (SEI EB), which is used by many government organizations […]


Cyber-crime, Data loss, Malware, Threats & Malware

Airplane manufacturer Bombardier has disclosed a security breach, data leaked online

February 24, 2021

Via: Security Affairs

Hackers exploited vulnerabilities in Accellion FTA file-sharing legacy servers to steal data from the airplane maker Bombardier and leak data on the site operated by the Clop ransomware gang. The wave of attacks exploiting multiple zero-day vulnerabilities in the Accellion […]


Cyber-crime, Identity theft

How to Fight Business Email Compromise (BEC) with Email Authentication?

February 22, 2021

Via: The Hacker News

An ever-evolving and rampant form of cybercrime that targets emails as the potential medium to conduct fraud is known as Business Email Compromise. Targeting commercial, government as well as non-profit organizations, BEC can lead to huge amounts of data loss, […]


Cyber warfare, Cyber-crime, Network security, Security

Biden will act on cyber security to fix SolarWinds mess

February 19, 2021

Via: Computer Weekly

President Biden looks set to sign off an executive action to address gaps in the US’s national cyber security posture that were left painfully exposed by the December 2020 SolarWinds incident. The cyber attack first came to light via cyber […]


Cyber-crime, Phishing

Phishers tricking users via fake LinkedIn Private Shared Document

February 18, 2021

Via: Help Net Security

Phishers are trying to trick users into opening a “LinkedIn Private Shared Document” and entering their login credentials into a fake LinkedIn login page, security researcher JB Bowers warns. The phishing attack The phishing message is delivered via LinkedIn’s internal […]


Cyber-crime, Malware

France to Boost Cyberdefense After Hospital Malware Attacks

February 18, 2021

Via: Security Week

The attacks at the hospitals in Dax and Villefranche-sur-Saone prompted the transfer of some patients to other facilities as the French health care system is under pressure from the coronavirus pandemic. Macron discussed the attacks with officials and workers from […]


Application security, Cyber-crime, Identity theft, Security

Solving 5 Challenges of Contact Tracing Apps

February 16, 2021

Via: Security Intelligence

Contact tracing apps are designed to help public health agencies connect the dots by linking confirmed carriers of novel coronavirus to recent, close-proximity interactions. In theory, this creates a protective safety net — a way for countries to manage the […]


Cyber-crime, Phishing

IRS Warns Tax Professionals of Phishing Campaign Targeting EFINs

February 15, 2021

Via: Hot for Security

The Internal Revenue Service (IRS) began accepting tax-return applications last Friday. As millions of citizens prepare for what may be the most challenging tax season to date, identity thieves got a head start, deploying phishing campaigns impersonating the agency as […]


Cyber-crime, Phishing, Threats & Malware

Spam and phishing in 2020

February 15, 2021

Via: Securelist

Contact us to lose your money or account! In their email campaigns, scammers who imitated major companies, such as Amazon, PayPal, Microsoft, etc., increasingly tried to get users to contact them. Various pretexts were given for requesting the user to […]