Federal authorities have arrested more than 35 suspects on charges that include selling illicit substances via darknet marketplaces - such as AlphaBay, Dream and Hansa - thanks in part to undercover agents posing as cryptocurrency money launderers. Authorities say the year-long investigation is continuing.
Cyber extortion group Rex Mundi has been shut down following the arrest of seven suspects in France and a French national in Thailand, police say. Investigators began pursuing the group last year after it stole customer data from a British firm and demanded $770,000 to not publicly release it.
As bitcoin continues its massive price fluctuations, a new report says criminals have continued their push to get extortion and ransom payments in more stable cryptocurrencies. But bitcoins remain a top target for hackers, who most often choose to directly target cryptocurrency exchanges.
It's likely not a matter of if, but when your company will fall
prey to targeted attack involving malware, ransomware, data
exfiltration, or phishing. In fact, 70% of organizations reported
a security incident that negatively impacted their business in
the past year. Learn more about the realities of...
The era of the underground marketplace may be ending as concerns over law enforcement infiltration rise, says threat intelligence company Digital Shadows. Cybercriminals' deals are shifting toward encrypted chat and other decentralized services, the company says.
Hackers have reportedly demanded a ransom from Bank of Montreal and Simplii Financial in exchange for not dumping 90,000 customers' account details on a fraud forum. The FBI says online extortion and ransomware remain the top two types of cybercrime it's seeing today.
Mexico's central bank says attackers attempted to hack its interbank electronic transfer system, but says no client money was lost. It's activated "contingency measures" at the targeted banks and says payment transfers could slow as a result.
Police have taken down Webstresser, a leading stresser/booter service tied to 4 million on-demand DDoS attacks, which could be used for as little as $15 per month. Six of the site's administrators have been arrested, as have some of the site's top users, authorities say.
Are you a fraudster craving an easy way to generate Microsoft Office documents with embedded malicious macros designed to serve as droppers that install banking Trojans onto a victim's PC? Say hello to a toolkit that debuted in February called Rubella Macro Builder.
The U.S. Federal Government wants its agencies to modernize their IT systems, primarily by maximizing the use of cloud platforms. But IT teams are finding this transformation challenging. Investing in IT modernization can lead to more agility, improved resilience and security and, in the long term, better citizen...
Art Coviello, ex-CEO of RSA, is concerned about fraud trends and social media vulnerabilities. But he also is bullish on the opportunity for artificial intelligence and DevOps security to stop attacks before they cause harm.
The year's CrowdStrike® Global Threat Report offers one of the industry's most comprehensive reports on today's most damaging cyberattacks and dangerous adversaries. It contains valuable insights into the evolving threat landscape and includes recommendations that will help you be better prepared for the security...
The alleged leader of a cybercrime gang tied to more than $1 billion in losses has been arrested in Alicante, Spain. Authorities say "Denis K." is a Ukrainian national who led a gang that developed Carbanak and Cobalt malware to infect PCs as well as perpetrate ATM jackpotting attacks.
The U.K. government concurs with allegations contained in a U.S. Department of Justice indictment, which charges nine Iranians, plus the Mabna Institute, with perpetrating a five-year hacking campaign designed to steal scientific secrets for Iran's military and private industry.
Ransomware is vicious malware that locks users out of their devices or blocks access to files until a sum of money or ransom is paid. Attacks cause downtime, data loss, possible intellectual property theft, and in certain industries, an attack is considered a data breach. Phishing emails, compromised websites and free...