Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
SOC -CSIRT – Incidents & Attacks Notepad
Vendors & – MSSP Ecosystem
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
Home
Cyber Crime
Page 5
Cyber Crime
SecurityAffairs.com
DoJ charged Tornado Cash founders with laundering more than $1 billion – Source: securityaffairs.com
SecurityAffairs.com
Akira ransomware gang spotted targeting Cisco VPN products to hack organizations – Source: securityaffairs.com
SecurityAffairs.com
Snatch gang claims the hack of the Department of Defence South Africa – Source: securityaffairs.com
SecurityAffairs.com
BlackCat ransomware group claims the hack of Seiko network – Source: securityaffairs.com
Cyber Talk
Africa Cyber Surge II: $40 million, 20,000 networks & 25 countries – Source: www.cybertalk.org
SecurityAffairs.com
Massive phishing campaign targets users of the Zimbra Collaboration email server – Source: securityaffairs.com
SecurityAffairs.com
Africa Cyber Surge II law enforcement operation has led to the arrest of 14 suspects...
SecurityAffairs.com
A massive campaign delivered a proxy server application to 400,000 Windows systems – Source: securityaffairs.com
SecurityAffairs.com
Cleaning Products manufacturer Clorox Company took some systems offline after a cyberattack – Source: securityaffairs.com
SecurityAffairs.com
A massive phishing campaign using QR codes targets the energy sector – Source: securityaffairs.com
SecurityAffairs.com
Credentials for cybercrime forums found on roughly 120K computers infected with info stealers – Source:...
SecurityAffairs.com
Monti Ransomware gang launched a new Linux encryptor – Source: securityaffairs.com
SecurityAffairs.com
QwixxRAT, a new Windows RAT appears in the threat landscape – Source: securityaffairs.com
SecurityAffairs.com
Ongoing Xurum attacks target Magento 2 e-stores – Source: securityaffairs.com
SecurityAffairs.com
Police dismantled bulletproof hosting service provider Lolek Hosted – Source: securityaffairs.com
SecurityAffairs.com
Power Generator in South Africa hit with DroxiDat and Cobalt Strike – Source: securityaffairs.com
SecurityAffairs.com
Gafgyt botnet is targeting EoL Zyxel routers – Source: securityaffairs.com
SecurityAffairs.com
Balada Injector still at large – new domains discovered – Source: securityaffairs.com
SecurityAffairs.com
EvilProxy used in massive cloud account takeover scheme – Source: securityaffairs.com
SecurityAffairs.com
LockBit threatens to leak medical data of cancer patients stolen from Varian Medical Systems –...
Cyber Talk
How ransomware attacks can be a test of leadership – Source: www.cybertalk.org
SecurityAffairs.com
A new sophisticated SkidMap variant targets unsecured Redis servers – Source: securityaffairs.com
SecurityAffairs.com
FBI warns of crooks posing as NFT developers in fraudulent schema – Source: securityaffairs.com
SecurityAffairs.com
Married couple pleaded guilty to laundering billions in cryptocurrency stolen from Bitfinex in 2016 –...
SecurityAffairs.com
Attackers use dynamic code loading to bypass Google Play store’s malware detections – Source: securityaffairs.com
SecurityAffairs.com
NodeStealer 2.0 takes over Facebook Business accounts and targets crypto wallets – Source: securityaffairs.com
SecurityAffairs.com
WikiLoader malware-as-a-service targets Italian organizations – Source: securityaffairs.com
SecurityAffairs.com
Experts discovered a previously undocumented initial access vector used by P2PInfect worm – Source: securityaffairs.com
SecurityAffairs.com
Now Abyss Locker also targets VMware ESXi servers – Source: securityaffairs.com
SecurityAffairs.com
CoinsPaid blames North Korea-linked APT Lazarus for theft of $37M worth of cryptocurrency – Source:...
Posts navigation
1
…
4
5
6
…
11
Latest Cyber News
Data Breach Today
What Kind of People Do Cybersecurity for a Living? – Source: www.databreachtoday.com
10/07/2024
Data Breach Today
Cryptocurrency Theft Haul Surges Alongside Crypto Value – Source: www.databreachtoday.com
09/07/2024
Data Breach Today
How CISA Plans to Measure Trust in Open-Source Software – Source: www.databreachtoday.com
09/07/2024
Data Breach Today
Reports: Florida Health Department Dealing With Data Heist – Source: www.databreachtoday.com
09/07/2024
Data Breach Today
OnDemand | Secure Your Applications: Learn How to Prevent AI-Generated Code Risk – Source: www.databreachtoday.com
09/07/2024
Data Breach Today
Taking an AI-First Approach to Securing Your Organization – Source: www.databreachtoday.com
09/07/2024
Data Breach Today
What’s the Best Strategy for Exploiting Flaws in Ransomware? – Source: www.databreachtoday.com
09/07/2024
Data Breach Today
New Zealand Fitness Retailer Hit By DragonForce Ransomware – Source: www.databreachtoday.com
06/07/2024
Data Breach Today
Health Benefits Administrator Reports 3rd-Party Hack to SEC – Source: www.databreachtoday.com
06/07/2024