Security News

How cybercriminals exploit psychological triggers in social engineering attacks
2025-05-06 05:00

Most attacks don’t start with malware; they begin with a message that seems completely normal, whether it comes through email, a phone call, or a chat, and that is exactly what makes them so...

Darcula Adds GenAI to Phishing Toolkit, Lowering the Barrier for Cybercriminals
2025-04-24 11:27

The threat actors behind the Darcula phishing-as-a-service (PhaaS) platform have released new updates to their cybercrime suite with generative artificial intelligence (GenAI) capabilities. "This...

When confusion becomes a weapon: How cybercriminals exploit economic turmoil
2025-04-23 06:00

It begins with a simple notification: “Markets in Free Fall.” Within moments, the headlines multiply: new tariffs, emergency actions, plummeting consumer confidence. Across boardrooms and break...

Cybercriminals blend AI and social engineering to bypass detection
2025-04-21 05:00

Attackers are focusing more on stealing identities. Because of this, companies need to use zero trust principles. They should also verify user identities more carefully, says DirectDefense....

Cybercriminal groups embrace corporate structures to scale, sustain operations
2025-04-15 05:30

In this Help Net Security interview, Sandy Kronenberg, CEO of Netarx, discusses how cybercriminal groups are adopting corporate structures and employee incentives to scale operations, retain...

Cybersecurity firm buying hacker forum accounts to spy on cybercriminals
2025-04-14 19:36

Swiss cybersecurity firm Prodaft has launched a new initiative called 'Sell your Source' where the company purchases verified and aged accounts on hacking forums to to spy on cybercriminals. [...]

EncryptHub's dual life: Cybercriminal vs Windows bug-bounty researcher
2025-04-07 21:39

EncryptHub, a notorious threat actor linked to breaches at 618 organizations, is believed to have reported two Windows zero-day vulnerabilities to Microsoft, revealing a conflicted figure...

Cybercriminals exfiltrate data in just three days
2025-04-03 04:30

In 56% of Sophos managed detection and response (MDR) and incident response (IR) cases, attackers gained initial access to networks by exploiting external remote services, including edge devices...

Cybercriminals Exploit CSS to Evade Spam Filters and Track Email Users' Actions
2025-03-17 11:52

Malicious actors are exploiting Cascading Style Sheets (CSS), which are used to style and format the layout of web pages, to bypass spam filters and track users' actions. That's according to new...

Microsoft Exposes LLMjacking Cybercriminals Behind Azure AI Abuse Scheme
2025-02-28 10:33

Microsoft on Thursday unmasked four of the individuals that it said were behind an Azure Abuse Enterprise scheme that involves leveraging unauthorized access to generative artificial intelligence...