Latest from todaynewsUS charges 12 Chinese hackers in major government-backed espionage campaignJustice Department unveils indictments against Silk Typhoon group members, seizes domains in escalating cybersecurity standoff.By Gyana Swain06 Mar 20255 minsCybercrimeSecurity news Microsoft files lawsuit against LLMjacking gang that bypassed AI safeguardsBy Lucian Constantin28 Feb 20254 minsCybercrimeGenerative AIThreat and Vulnerability Managementnews Fake captcha attacks are increasing, say expertsBy Howard Solomon20 Feb 20256 minsCyberattacksCybercrimeMalware newsAuthorities seize Phobos and 8Base ransomware servers, arrest 4 suspectsBy Lucian Constantin 11 Feb 20253 minsCybercrimeRansomware newsPolice arrest cybercriminal who hacked NATO and numerous Spanish institutionsBy Computerworld España 06 Feb 20252 minsCybercrimeSecurity featureHow law enforcement agents gain access to encrypted devicesBy John Leyden 31 Jan 20259 minsCybercrimeEncryptionSecurity newsFBI takes down Cracked.to and Nulled.to in a global law enforcement operationBy Shweta Sharma 30 Jan 20253 minsCybercrimeSecurity newsDOJ indicts North Korean conspirators for remote IT work schemeBy Jon Gold 24 Jan 20252 minsCybercrimeFraudLegal newsUS hits back against China’s Salt Typhoon groupBy Howard Solomon 17 Jan 20256 minsCybercrimeGovernment ArticlesnewsEuropol shutters 27 DDoS sites in major crackdownNew attacks were planned for the Christmas holiday.By Mikael Markander 12 Dec 2024 2 minsCybercrimeDDoSnewsEuropean law enforcement breaks high-end encryption app used by suspectsA group of European law enforcement agencies broke a cyberthief-created secure messaging app and monitored their discussions in real time. The implications for CISOs: However little you now trust encryption, trust it a lot less.By Evan Schuman 04 Dec 2024 7 minsCSO and CISOCybercrimeEncryptionnewsAustralia’s first Cyber Security Act passes parliamentAfter a year of consultation, discussions and amendments, the Cyber Security Act which requires certain businesses to report ransom payments has passed by the parliament.By Samira Sarraf 25 Nov 2024 4 minsCybercrimeRansomwareRegulationnewsFBI pierces ‘anonymity’ of cryptocurrency, secret domain registrars in Scattered Spider probeWhen the US Justice Department unsealed documents on Wednesday revealing the arrests of key Scattered Spider suspects, it showed how easily they were able to cut through the gang’s anonymization efforts.By Evan Schuman 21 Nov 2024 7 minsCybercrimePhishingSecuritynewsFive-country attack on cybercrooks welcomed by security expertArrest of 41 suspects more important than takedown of 22,000 malicious IP addresses, he argues.By Howard Solomon 06 Nov 2024 6 minsCybercrimeLegalfeature10 ways hackers will use machine learning to launch attacksAI and machine learning are improving cybersecurity, helping human analysts triage threats and close vulnerabilities quicker. But they are also helping threat actors launch bigger, more complex attacks.By Maria Korolov 05 Nov 2024 11 minsCybercrimeHackingMachine Learningnews analysisNation state actors increasingly hide behind cybercriminal tactics and malwareMicrosoft’s Digital Defense Report offers new insights into a rising trend that sees lines blurring between cyberespionage and cybercriminal activity.By Lucian Constantin 01 Nov 2024 8 minsAdvanced Persistent ThreatsCyberattacksThreat and Vulnerability ManagementinterviewHow Interpol is adapting to the ever-evolving cybercrime landscapeInterpol Director of Cybercrime Neal Jetton discusses how the international police organization is collaborating across borders and sectors to fight cybercrime as technological innovations continue to emerge and the battle for talent wages on.By Mario Moreno 25 Oct 2024 8 minsCyberattacksGovernmentGovernment ITnewsLockbit dismantling progressesPolice departments have dealt another blow to Lockbit's ransomware infrastructure.By Florian Maier 02 Oct 2024 2 minsCybercrimeRansomwarefeature9 types of phishing attacks and how to identify themDo you know your spear phishing and vishing from your whaling and clone phishing? We explain how to recognize each type of threat as AI inaugurates the deepfake era of impersonation scams.By Fahmida Rashid and John Leyden 01 Oct 2024 11 minsCybercrimeData and Information SecurityPhishingnewsGerman police dismantles illegal crypto exchangesIn the course of its ‘Final Exchange’ operation, the German Federal Criminal Police Office shut down 47 service platforms through which cybercriminals were able to launder illegal funds.By Florian Maier 20 Sep 2024 2 minsCryptocurrencyCybercrimenewsAustralian cops bust underworld app through compromised software updatesThe authorities infiltrated Ghost’s distribution channel and modified updates to gain access to subscribers’ phones. By Shweta Sharma 18 Sep 2024 4 minsCybercrimeHacking Show more Show less View all Resources whitepaper Real-Time, All the Time: Fuelling AI success through a continuous data stream With AI dominating conversations everywhere, practitioners and executives are seeking answers: How to succeed with GenAI? Delivering on AI initiatives requires the right strategy, platform and data stack. The post Real-Time, All the Time: Fuelling AI success through a continuous data stream appeared first on Whitepaper Repository –. By StreamSets 26 Aug 2024Artificial IntelligenceData and Information SecurityData Management View all Video on demand videoAn inside look at hybrid Office 365 phishing attacks | Salted Hash Ep 41In this episode, Steve Ragan shows what a hybrid phishing attack looks like as it starts off on one service, and quickly moves to another. 08 Aug 2018 10 minsCybercrimeEmail ClientsPhishing What is a phishing kit? Watch this in-depth explainer | Salted Hash Ep 39 07 Aug 2018 15 minsCybercrimeEmail ClientsPhishing An introduction to Kit Hunter, a phishing kit detector | Salted Hash Ep 40 06 Aug 2018 7 minsCybercrimeEmail ClientsPhishing Phishing problems: 3.2M emails blocked in a month | Salted Hash Ep 37 30 Jul 2018 CybercrimeEmail ClientsPhishingSee all videos Explore a topic Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management View all topics Show me morePopularArticlesPodcastsVideos news Linux, macOS users infected with malware posing as legitimate Go packages By Shweta Sharma 07 Mar 20253 mins MalwareSecurity feature 8 obstacles women still face when seeking a leadership role in IT By Christina Wood 07 Mar 20258 mins CareersIT Leadership feature What is risk management? Quantifying and mitigating uncertainty By Josh Fruhlinger 07 Mar 202510 mins IT Governance FrameworksIT LeadershipRisk Management podcast CSO Executive Sessions: How cybersecurity impacts company ratings – A fey factor for investors and consumers 12 Feb 202527 mins Security podcast CSO Executive Sessions: Guardians of the Games – How to keep the Olympics and other major events cyber safe 07 Aug 202417 mins CSO and CISO podcast CSO Executive Session India with Dr Susil Kumar Meher, Head Health IT, AIIMS (New Delhi) 17 Jul 202417 mins CSO and CISO video CSO Executive Sessions: How cybersecurity impacts company ratings – A fey factor for investors and consumers 12 Feb 202527 mins Security video CSO Executive Sessions: How should software solution providers keep themselves and their enterprise clients safe? 26 Jan 202518 mins Security video CSO Executive Sessions: Open Source Institute’s Eric Nguyen on supply chain risks to critical infrastructure (Part 2) 14 Nov 202415 mins Critical InfrastructureIT GovernanceSupply Chain