To collect information about the victim, crooks used special “breakout” services in telegram channels or on underground hacker forums.
Employees of the Moscow criminal investigation department, with the assistance of Group-IB experts, detained the organizers of a criminal group specializing...
Even if you disable the activity tracking function in the web and applications in the settings, Google still monitors activity.
Google captures user interactions with applications, even if they set their recommended settings, which should block this possibility. This was reported in a...
Diebold Nixdorf experts have warned of a new variation of the black box attacks on ATMs, which began to be used by attackers in Belgium.
Black box attacks are a form of jackpotting attacks in which cybercriminals literally force an ATM to spit out money.
Such an attack can be carried out using...
Cybercriminals who claimed responsibility for the incident could bribe a social network employee.
Twitter has reported new data on an unprecedented massive cyber attack on celebrity accounts.
Recall that on Wednesday, July 15, cybercriminals involved in cryptocurrency fraud, hacked into...
the procedure, you only need the signature of the head of the investigating authority.
Anatoly Vyborny, a member of the State Duma’s Committee on Security and Anti-Corruption, on Thursday, July 16, will send a bill to the government that can give law enforcement agencies the right to listen to...
The price of a database called citrix_leads_vivo is 2.15 bitcoin.
A hacker posted an ad on a clandestine darknet forum selling a database allegedly owned by Citrix, an American software maker. According to the seller, he gained access to more than 2 million records of the company's...
Presumably, software called FinFly ISP from FinFisher will be used for surveillance.
German authorities proposed a bill granting all 19 federal state special services of the country the right to spy on German citizens with the help of trojans. According to the document, Internet providers will...
A cybercriminal using the alias NightLion reported hacking the internal servers of the American is firm Night Lion Security. The hacker allegedly stole information from the "data leak detection" service DataViper, owned by Night Lion Security. The stolen information includes more than 8,225...
Citrix previously fixed 11 vulnerabilities in its Citrix ADC, Citrix Gateway, and Citrix SD-WAN WANOP products.
Cybercriminals allegedly scan the Internet for Citrix systems containing recently discovered vulnerabilities. A few days ago, SecurityLab wrote that Citrix fixed 11 vulnerabilities...
Hackers using malicious software unauthorized interfered in the work of banks and appropriated several million hryvnia. After the announcement of suspicion of a series of cybercrimes, the organizer was hiding from law enforcement, then he was put on the wanted list.
Cyberpolice found that the...
About a hundred organizations and experts signed an open letter in which they opposed the adoption of the LAEDA law in the United States.
The draft Law on Lawful Access to Encrypted Data Act (LAEDA) introduced by the US Congress could be the strongest in a series of attacks on encryption, a...
The highest cost are financial accounts and accounts with high privileges.
Specialists from Digital Shadows found 15 billion credentials on various underground trading floors on the darknet. Compromised credentials were stolen as a result of more than 100 thousand hacks and provide access to...
The report says: "During the events, the Kiev police cyberpolice, together with the investigators of the Pechersk police department of Kiev, under the procedural leadership of the capital’s prosecutor’s office, exposed the man who sold information with limited access in the messenger. The...
Criminals used legitimate websites to steal credit card information and disguise their transactions.
Sansec specialists reported a large-scale malicious campaign to steal payment card data from customers of large retailers in the US and Europe. In fraudulent activities that researchers...
Attackers began to exploit the vulnerability in F5 BIG-IP three days after its disclosure.
NCC Group security researcher Rich Warren has documented a series of cyber attacks on F5 BIG-IP network devices. According to the expert, attackers exploit a vulnerability in the configuration...
On the Thai island of Samui, 35-year-old Vadim Valeev was arrested, suspected of using fake bank cards. During the detention, he found 8 fake "credit cards" belonging to other persons, as well as a device for reading data from cards. A bank official contacted Surat Thani Province police who...
LocalBitcoins claims that darknet-related transactions on the platforum dropped 70% after it adopted AML and KYC regulations
LocalBitcoins, a major peer-to-peer (P2P) cryptocurrency exchange, has purportedly managed to significantly cut the amount of criminal funds on its platform in 2020.
The...