9 links
tagged with all of: security + cybercrime
Click any tag below to further narrow down your results
Links
macOS, while generally secure due to built-in protections like Keychain, SIP, TCC, and Gatekeeper, remains a target for cybercriminals who exploit vulnerabilities. The article details these security mechanisms, common attack methods, and emphasizes the importance of monitoring and managing access to sensitive data to thwart potential threats.
The LockBit 4.0 leak provides critical insights into the chaotic nature of ransomware-as-a-service (RaaS) groups, revealing that many affiliates operate without oversight and often act unpredictably. This disorganization complicates defenses and incident response efforts, emphasizing the necessity of proactive preparation over negotiation. The evolving landscape suggests increasing fragmentation among ransomware groups, making them harder to attribute and defend against.
Dutch police have identified 126 individuals linked to the now-defunct Cracked.io cybercrime forum, which facilitated the trade of stolen data and hacking tools. Many of those identified are young, with some being as young as 11 years old, and the police are engaging with them to highlight the long-term consequences of their online activities. The forum's infrastructure was dismantled in January 2025, but a new version of the site has since emerged.
Attackers are exploiting artificial intelligence to create fake CAPTCHAs, bypassing security measures that are designed to differentiate between human users and bots. This emerging tactic poses significant risks to online platforms and underscores the need for more robust security protocols.
Europol has successfully dismantled six major DDoS-for-hire services that were responsible for numerous cyberattacks across Europe. The operation involved multiple law enforcement agencies and aimed to curb the growing trend of cybercriminals offering DDoS attacks as a service. This crackdown is part of ongoing efforts to enhance cybersecurity and reduce online threats.
Microsoft and Cloudflare have collaborated to take down the Raccoon365 phishing service, which targeted Microsoft 365 users. This operation aimed to protect users from credential theft and enhance overall cybersecurity measures against such phishing threats. The dismantling of Raccoon365 marks a significant step in combating cybercrime related to phishing schemes.
AT&T has introduced a new security feature called "Wireless Lock" to help protect customers from SIM swapping attacks by preventing unauthorized changes to account information and number porting. This feature, which can be managed through the AT&T app or website, enhances security by restricting access even to AT&T employees, although it arrives later than similar offerings from competitors like Verizon. SIM swap attacks have become increasingly common, leading to significant financial losses and breaches of personal accounts.
Cybercriminals are increasingly exploiting the Lovable AI website builder to create phishing pages and fraudulent sites that impersonate well-known brands. Despite Lovable's efforts to detect and eliminate malicious content, the rising number of AI site generators is lowering the barriers for cybercrime. Recent campaigns have targeted organizations and individuals through sophisticated phishing schemes, resulting in significant data theft and malware distribution.
Phishing attacks that bypass multifactor authentication (MFA) are becoming increasingly accessible, with tools available that allow even non-technical users to create convincing phishing sites. These attacks utilize a method called "adversary in the middle," where attackers set up proxy servers to intercept login credentials and MFA codes from victims. The rise of phishing-as-a-service toolkits makes it easier for criminals to launch these attacks, posing a significant threat to online security.