Tag: cybercriminal
-
Schneier on Security: A Cyberattack Victim Notification Framework
Source URL: https://www.schneier.com/blog/archives/2025/09/a-cyberattack-victim-notification-framework.html Source: Schneier on Security Title: A Cyberattack Victim Notification Framework Feedly Summary: Interesting analysis: When cyber incidents occur, victims should be notified in a timely manner so they have the opportunity to assess and remediate any harm. However, providing notifications has proven a challenge across industry. When making notifications, companies often do…
-
The Register: Hijacker helper VoidProxy boosts Google, Microsoft accounts on demand
Source URL: https://www.theregister.com/2025/09/11/voidproxy_phishing_service/ Source: The Register Title: Hijacker helper VoidProxy boosts Google, Microsoft accounts on demand Feedly Summary: Okta uncovers new phishing-as-a-service operation with ‘multiple entities’ falling victim Multiple attackers using a new phishing service dubbed VoidProxy to target organizations’ Microsoft and Google accounts have successfully stolen users’ credentials, multi-factor authentication codes, and session tokens…
-
Krebs on Security: Bulletproof Host Stark Industries Evades EU Sanctions
Source URL: https://krebsonsecurity.com/2025/09/bulletproof-host-stark-industries-evades-eu-sanctions/ Source: Krebs on Security Title: Bulletproof Host Stark Industries Evades EU Sanctions Feedly Summary: In May 2025, the European Union levied financial sanctions on the owners of Stark Industries Solutions Ltd., a bulletproof hosting provider that materialized two weeks before Russia invaded Ukraine and quickly became a top source of Kremlin-linked cyberattacks and…
-
The Register: More packages poisoned in npm attack, but would-be crypto thieves left pocket change
Source URL: https://www.theregister.com/2025/09/09/npm_supply_chain_attack/ Source: The Register Title: More packages poisoned in npm attack, but would-be crypto thieves left pocket change Feedly Summary: Miscreants cost victims time rather than money During the two-hour window on Monday in which hijacked npm versions were available for download, malware-laced packages reached one in 10 cloud environments, according to Wiz…
-
The Register: It looks like you’re ransoming data. Would you like some help?
Source URL: https://www.theregister.com/2025/09/03/ransomware_ai_abuse/ Source: The Register Title: It looks like you’re ransoming data. Would you like some help? Feedly Summary: AI-powered ransomware, extortion chatbots, vibe hacking … just wait until agents replace affiliates It’s no secret that AI tools make it easier for cybercriminals to steal sensitive data and then extort victim organizations. But two…
-
The Register: Crims laud Claude to plant ransomware and fake IT expertise
Source URL: https://www.theregister.com/2025/08/27/anthropic_security_report_flags_rogue/ Source: The Register Title: Crims laud Claude to plant ransomware and fake IT expertise Feedly Summary: AI lowers the bar for cybercrime, Anthropic admits comment Anthropic, a maker of AI tools, says that AI tools are now commonly used to commit cybercrime and facilitate remote worker fraud.… AI Summary and Description: Yes…