Tag: criminals

  • Slashdot: $1M Stolen in ‘Industrial-Scale Crypto Theft’ Using AI-Generated Code

    Source URL: https://yro.slashdot.org/story/25/08/11/0037258/1m-stolen-in-industrial-scale-crypto-theft-using-ai-generated-code?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: $1M Stolen in ‘Industrial-Scale Crypto Theft’ Using AI-Generated Code Feedly Summary: AI Summary and Description: Yes Summary: The text discusses a sophisticated cybercrime operation, GreedyBear, which utilizes a highly coordinated strategy, weaponizing browser extensions and phishing sites to facilitate industrial-scale crypto theft. The group’s innovative techniques, including the modification…

  • Krebs on Security: Who Got Arrested in the Raid on the XSS Crime Forum?

    Source URL: https://krebsonsecurity.com/2025/08/who-got-arrested-in-the-raid-on-the-xss-crime-forum/ Source: Krebs on Security Title: Who Got Arrested in the Raid on the XSS Crime Forum? Feedly Summary: On July 22, 2025, the European police agency Europol said a long-running investigation led by the French Police resulted in the arrest of a 38-year-old administrator of XSS, a Russian-language cybercrime forum with more than…

  • The Register: Tested: Microsoft Recall can still capture credit cards and passwords, a treasure trove for crooks

    Source URL: https://www.theregister.com/2025/08/01/microsoft_recall_captures_credit_card_info/ Source: The Register Title: Tested: Microsoft Recall can still capture credit cards and passwords, a treasure trove for crooks Feedly Summary: Our tests have shown there are ways to get around the promised security improvements exclusive Microsoft Recall, the AI app that takes screenshots of what you do on your PC so…

  • Cisco Talos Blog: The Booker Prize Longlist and Hacker Summer Camp

    Source URL: https://blog.talosintelligence.com/the-booker-prize-longlist-and-hacker-summer-camp/ Source: Cisco Talos Blog Title: The Booker Prize Longlist and Hacker Summer Camp Feedly Summary: This week Bill connects the hype of literary awards to cybersecurity conference season. We highlight key insights from the Q2 2025 IR Trends report, including phishing trends, new ransomware strains, and top targeted sectors. Finally, check out…

  • CSA: Quishing is Here, and It’s Hiding in Plain Sight

    Source URL: https://cloudsecurityalliance.org/articles/quishing-is-here-and-it-s-hiding-in-plain-sight Source: CSA Title: Quishing is Here, and It’s Hiding in Plain Sight Feedly Summary: AI Summary and Description: Yes **Summary:** The text highlights the emerging threat of “quishing,” where malicious QR codes deceive users into accessing phishing sites. It emphasizes the ease with which attackers can exploit public spaces, the low-security environments,…

  • CSA: How to Spot and Stop E-Skimming

    Source URL: https://www.vikingcloud.com/blog/how-to-spot-and-stop-e-skimming-before-it-hijacks-your-customers–and-your-credibility Source: CSA Title: How to Spot and Stop E-Skimming Feedly Summary: AI Summary and Description: Yes Summary: The text explores the growing threat of e-skimming attacks on e-commerce platforms, detailing how cybercriminals exploit JavaScript injections to harvest payment data. It emphasizes the critical need for compliance with PCI DSS v4.x to mitigate…

  • CSA: Homoglyph Attacks & Domain Squatting

    Source URL: https://cloudsecurityalliance.org/articles/homoglyph-attacks-domain-squatting-the-hidden-risk-to-your-brand Source: CSA Title: Homoglyph Attacks & Domain Squatting Feedly Summary: AI Summary and Description: Yes Summary: The text highlights the escalating threat posed by homoglyph-based domain squatting, emphasizing its potential impact on brand trust and cloud security. It underscores the need for proactive DNS posture management to detect and mitigate these risks,…