Infostealers increasingly impact global security

Check Point Software’s latest threat index reveals a significant rise in infostealers like Lumma Stealer, while mobile malware like Necro continues to pose a significant threat, highlighting the evolving tactics used by cybercriminals across the globe…. Continue reading Infostealers increasingly impact global security

Social engineering scams sweep through financial institutions

North American financial institutions fielded 10 times more reports of social engineering scams in 2024 than they did a year ago, according to BioCatch. The data shows scams now represent 23% of all digital banking fraud. Growing danger of deepfake and… Continue reading Social engineering scams sweep through financial institutions

DHS nominee Kristi Noem stood alone for rejecting department cyber grants to state, local governments

But the South Dakota governor has touted cybersecurity as her state’s “next big industry” and signed cyber legislation into law.

The post DHS nominee Kristi Noem stood alone for rejecting department cyber grants to state, local governments appeared first on CyberScoop.

Continue reading DHS nominee Kristi Noem stood alone for rejecting department cyber grants to state, local governments

North Korean-linked hackers were caught experimenting with new macOS malware

Researchers can’t tell if the malware was used in a campaign, or North Korean operatives were caught before they could deploy it in the wild.

The post North Korean-linked hackers were caught experimenting with new macOS malware appeared first on CyberScoop.

Continue reading North Korean-linked hackers were caught experimenting with new macOS malware

What Telegram’s recent policy shift means for cyber crime

Since its launch in August 2013, Telegram has become the go-to messaging app for privacy-focused users. To start using the app, users can sign up using either their real phone number or an anonymous number purchased from the Fragment blockchain marketplace. In the case of the latter, Telegram cannot be linked to the user’s real […]

The post What Telegram’s recent policy shift means for cyber crime appeared first on Security Intelligence.

Continue reading What Telegram’s recent policy shift means for cyber crime

Schneider Electric reports cyberattack, its third incident in 18 months

The ransomware group HellCat claims responsibility for the cyberattack and threatens to dump 40GB.

The post Schneider Electric reports cyberattack, its third incident in 18 months appeared first on CyberScoop.

Continue reading Schneider Electric reports cyberattack, its third incident in 18 months

Sophos mounted counter-offensive operation to foil Chinese attackers

Sophos conducted defensive and counter-offensive operation over the last five years with multiple interlinked nation-state adversaries based in China targeting perimeter devices, including Sophos Firewalls. Espionage campaigns tied to Chinese hacking g… Continue reading Sophos mounted counter-offensive operation to foil Chinese attackers

Lottie Player supply chain compromise: Sites, apps showing crypto scam pop-ups

A supply chain compromise involving Lottie Player, a widely used web component for playing site and app animations, has made popular decentralized finance apps show pop-ups urging users to connect their wallets, TradingView has reported. The pop-up (So… Continue reading Lottie Player supply chain compromise: Sites, apps showing crypto scam pop-ups