Digital money is energizing Southeast Asian organized crime as a method for money laundering and as a way of reaping new revenue, warn experts who say that tether plays a heavy role in the rapidly evolving state of law-breaking in Myanmar, Thailand and elsewhere.
Cryptocurrency phishing scams designed to send crypto owners to fake versions of legitimate sites, recently disseminated via hijacked high-profile social media accounts, highlight the ongoing use of drainer scam-as-a-service offerings, which researchers say last year led to $295 million in losses.
Estimates of the number of devices affected by a duo of zero-days in a popular corporate VPN made by software developer Ivanti have skyrocketed from fewer than 10 to over 1,700. The flaws affect the firm's Connect Secure VPN appliance, formerly known as Pulse Secure, and Ivanti Policy Secure.
Robert Blumofe, executive vice president and CTO at Akamai, expects social engineering, phishing, extortion and AI-driven attacks to dominate the threat landscape. He advised enterprises to use FIDO2-based MFA, zero trust, microsegmentation and API security to reduce risks.
Extended Detection and Response (XDR) has evolved significantly over the past few years, becoming more critical than ever for organizations in need of enhanced capabilities. But so, too, have the accompanying managed services evolved. Port53 Technologies President Omar Zarabi explains.
Thermostats sold across the globe by German multinational engineering company Bosch contained a flaw allowing hackers to cut power to the heating system and override the firmware, warn researchers from cybersecurity firm Bitdefender. Bosch pushed an over-the-air update in October.
Consumer groups continue to fight for banks to reimburse victims of authorized push payment scams, but regulators in some countries including the United Kingdom and Australia are looking for ways to tighten controls, said Ken Palla, fraud expert and retired director at MUFG Union Bank.
A cloud services firm has turned over to a New York hospital alliance the patient data stolen in a ransomware attack by LockBit. The hospital group had filed a lawsuit against LockBit as a legal maneuver to force the storage firm to return data the cybercriminals had stashed on the vendor's servers.
A Mississippi health system is notifying nearly 253,000 individuals that their data was potentially compromised in a "malicious and sophisticated ransomware" attack last August that also took IT systems offline. The cybercriminal gang Rhysida had claimed responsibility for the assault.
Artificial intelligence-enabled voter misinformation campaigns and voter database hacking are some of the largest threats to election security in a year when more than half of the world's populace will take to the ballot box in elections ranging from free to flawed.
Cryptocurrency schemes continue to generate alleged returns for criminals, as two separate cases highlight. One centers on a Ukrainian accused of earning $2 million via cryptojacking, while another involves a U.S. Air Force cyber analyst charged with perpetrating an UndeadApes NFT rug pull.
Hackers have found ways to intercept SMS messages, so companies must explore more secure MFA options to ensure their users' safety. Your smartphone can still hold some different answers for secure OTP, but undoubtedly, SMS OTP is no longer safe. It’s time to flip the switch.
The Department of Defense released a 60-page strategy that aims to modernize the defense industrial ecosystem and focuses on four long-term strategic priorities: improving supply chain resilience, enhancing workforce readiness, streamlining acquisitions and refining economic deterrence measures.
Amazon in a Luxembourg court Tuesday contested a once-record privacy fine levied against the e-commerce giant for its advertising practices by the diminutive country's data protection authority. The fine of 746 million euros stems from a 2018 complaint by French privacy group La Quadrature du Net.
A Chinese state hacking group is attacking superseded Cisco routers to target government entities in the United States, the United Kingdom and Australia. Beijing cyberespionage hackers dubbed "Volt Typhoon" are using vulnerabilities that were first disclosed in early 2019.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.in, you agree to our use of cookies.