Attackers "cloned" well-known online stores and stole customers' bank data.
Employees of the department for combating crimes in the field of computer technology of the Main Directorate of the Ministry of Internal Affairs of Russia in St. Petersburg and the Leningrad Region detained three...
The FBI asked Saber to monitor in real time suspected cybercriminals.
The Federal Bureau of Investigation used information obtained from the Saber travel agency to conduct surveillance. As reported by Forbes, employees of the department asked the company to "actively spy" on individuals...
To collect information about the victim, crooks used special “breakout” services in telegram channels or on underground hacker forums.
Employees of the Moscow criminal investigation department, with the assistance of Group-IB experts, detained the organizers of a criminal group specializing...
Even if you disable the activity tracking function in the web and applications in the settings, Google still monitors activity.
Google captures user interactions with applications, even if they set their recommended settings, which should block this possibility. This was reported in a...
Diebold Nixdorf experts have warned of a new variation of the black box attacks on ATMs, which began to be used by attackers in Belgium.
Black box attacks are a form of jackpotting attacks in which cybercriminals literally force an ATM to spit out money.
Such an attack can be carried out using...
Researchers at cybersecurity company ESET have identified malware masquerading as cryptocurrency trading applications and distributed among macOS users.
twitter.com
Attackers copied the interface of the Kattana trading platform. On the fake pages, they offered to download cryptocurrency...
Cybercriminals who claimed responsibility for the incident could bribe a social network employee.
Twitter has reported new data on an unprecedented massive cyber attack on celebrity accounts.
Recall that on Wednesday, July 15, cybercriminals involved in cryptocurrency fraud, hacked into...
the procedure, you only need the signature of the head of the investigating authority.
Anatoly Vyborny, a member of the State Duma’s Committee on Security and Anti-Corruption, on Thursday, July 16, will send a bill to the government that can give law enforcement agencies the right to listen to...
The price of a database called citrix_leads_vivo is 2.15 bitcoin.
A hacker posted an ad on a clandestine darknet forum selling a database allegedly owned by Citrix, an American software maker. According to the seller, he gained access to more than 2 million records of the company's...
Presumably, software called FinFly ISP from FinFisher will be used for surveillance.
German authorities proposed a bill granting all 19 federal state special services of the country the right to spy on German citizens with the help of trojans. According to the document, Internet providers will...
A cybercriminal using the alias NightLion reported hacking the internal servers of the American is firm Night Lion Security. The hacker allegedly stole information from the "data leak detection" service DataViper, owned by Night Lion Security. The stolen information includes more than 8,225...
Fraudsters simply play on the person’s desire to get rich
Fraudsters began to use non-targeted financial advertisements to lure citizens to their networks, which are addressed not to a specific, but to a wide audience, do not contain specific information about the type of earnings or...
Citrix previously fixed 11 vulnerabilities in its Citrix ADC, Citrix Gateway, and Citrix SD-WAN WANOP products.
Cybercriminals allegedly scan the Internet for Citrix systems containing recently discovered vulnerabilities. A few days ago, SecurityLab wrote that Citrix fixed 11 vulnerabilities...
Over the past four years, scammers of various stripes have emptied the pockets of their victims by $ 38 million in bitcoins. At the same time, $ 24 million of this amount fell in the first half of 2020, according to a new report by Whale Alert.
In preparing the report, a new blockchain crime...
Hackers using malicious software unauthorized interfered in the work of banks and appropriated several million hryvnia. After the announcement of suspicion of a series of cybercrimes, the organizer was hiding from law enforcement, then he was put on the wanted list.
Cyberpolice found that the...
About a hundred organizations and experts signed an open letter in which they opposed the adoption of the LAEDA law in the United States.
The draft Law on Lawful Access to Encrypted Data Act (LAEDA) introduced by the US Congress could be the strongest in a series of attacks on encryption, a...
The highest cost are financial accounts and accounts with high privileges.
Specialists from Digital Shadows found 15 billion credentials on various underground trading floors on the darknet. Compromised credentials were stolen as a result of more than 100 thousand hacks and provide access to...
The report says: "During the events, the Kiev police cyberpolice, together with the investigators of the Pechersk police department of Kiev, under the procedural leadership of the capital’s prosecutor’s office, exposed the man who sold information with limited access in the messenger. The...
Cybercriminals also accidentally left in the public domain more than 184 thousand stolen payment card data.
Over the past three years, the Keeper cybercrime group has carried out about 570 hacking e-commerce sites. Attackers cracked the backends of online stores, changed their source code...
Criminals used legitimate websites to steal credit card information and disguise their transactions.
Sansec specialists reported a large-scale malicious campaign to steal payment card data from customers of large retailers in the US and Europe. In fraudulent activities that researchers...