Tag: Cybercriminals
-
Cybercriminals hijack DNS to build stealth attack networks
During a Sitting Ducks attack, the malicious actor gains control of a domain by taking over its DNS configurations. Cybercriminals have …
-
Cybercriminals Launch SEO Poisoning Attack to Lure Shoppers to Fake Online Stores
The research revealed how threat actors exploit SEO poisoning to redirect unsuspecting users to malicious e-commerce websites, leveraging …
-
Cybercriminal devoid of boundaries gets 10-year prison sentence
A rampant cybercrook and repeat attacker of medical facilities in the US is being sentenced to a decade in prison, around seven years after …
-
Cybercriminals Use Excel Exploit to Spread Fileless Remcos RAT Malware
Cybersecurity researchers have discovered a new phishing campaign that spreads a new fileless variant of known commercial malware called …
-
Cybercriminals Exploit DocuSign APIs to Send Fake Invoices
Cybersecurity researchers have identified a growing trend where cybercriminals exploit DocuSign APIs to send convincing fake invoices. …
-
Cybercriminals Pose a Greater Threat of Disruptive US Election Hacks Than Russia or China
A report distributed by the US Department of Homeland Security warned that financially motivated cybercriminals are more likely to attack …
-
Cybercriminals Pose a Greater Threat of Disruptive US Election Hacks Than Russian or China
A report distributed by the US Department of Homeland Security warned that financially motivated cybercriminals are more likely to attack …
-
Cybercriminals Use Webflow to Deceive Users into Sharing Sensitive Login Credentials
Cybersecurity researchers have warned of a spike in phishing pages created using a website builder tool called Webflow, as threat actors …
-
Cybercriminals Exploiting Docker API Servers for SRBMiner Crypto Mining Attacks
Bad actors have been observed targeting Docker remote API servers to deploy the SRBMiner crypto miner on compromised instances, according …
-
Microsoft: Nation-States Team Up with Cybercriminals for Attacks
Nation-state threat actors have ramped up cooperation with cybercriminals in the past year to advance their political and military goals, …
-
Cybercriminals Use Unicode to Hide Mongolian Skimmer in E-Commerce Platforms
Cybersecurity researchers have shed light on a new digital skimmer campaign that leverages Unicode obfuscation techniques to conceal a …
-
Cybercriminals capitalize on poorly configured cloud environments
Off-the-shelf offensive security tools and poorly configured cloud environments create openings in the attack surface, according to …
●●●