Tag: Cybercriminals
-
Cybercriminals Exploit Browser Push Notifications to Deliver Malware
Cybercriminals are delivering malware via web browser features using a newly discovered command-and-control (C2) platform dubbed Matrix …
-
Cybercriminals Use Fake Invoices to Deploy XWorm and Steal Login Credentials
Cybercriminals are deploying sophisticated phishing campaigns that weaponize seemingly legitimate invoice emails to …
-
English-Speaking Cybercriminal Network ‘The COM’ Drives Global Cyberattacks
The English-speaking cybercriminal ecosystem known as “The COM” has evolved from a niche underground culture into a sophisticated, …
-
Cybercriminals have built a business on YouTube’s blind spots
The days when YouTube was just a place for funny clips and music videos are behind us. With 2.53 billion active users, it has become a …
-
Cybercriminals Exploit RMM Tools to Target Trucking Firms and Hijack Freight
Cybercriminals are orchestrating sophisticated attacks against trucking and freight companies in elaborate schemes designed to steal cargo …
-
Cybercriminals Exploit Remote Monitoring Tools to Infiltrate Logistics and Freight Networks
Bad actors are increasingly training their sights on trucking and logistics companies with an aim to infect them with remote monitoring and …
-
Cybercriminals Launch Flood of Fake Forex Platforms to Harvest Logins
Fraudulent investment platforms impersonating legitimate cryptocurrency and forex exchanges have emerged as the primary financial threat …
-
Google Warns of Cybercriminals Using Fake Job Postings to Spread Malware and Steal Credentials
Google’s Threat Intelligence Group (GTIG) has uncovered a sophisticated social engineering campaign orchestrated by financially motivated …
-
Cybercriminals Impersonate Aid Agencies to Lure Victims with Fake Financial Offers
Scammers have intensified their efforts to defraud vulnerable populations through sophisticated impersonation schemes and fraudulent …
-
Cybercriminals turn on each other: the story of Lumma Stealer’s collapse
Why have I been blocked? This website is using a security service to protect itself from online …
-
Cybercriminals Impersonate HR Departments to Harvest Your Gmail Login Details
A seemingly legitimate Zoom document share from “HR” redirected victims through a fake bot-protection gate into a Gmail login phish. …
-
Acreed Infostealer Gaining Popularity Among Cybercriminals for C2 via Steam Platform
Acreed, a novel infostealer first observed in February 2025, has rapidly gained traction among threat actors seeking discreet credential …
●●●
