Exclusive: Feds are probing 764, The Com’s use of cybercriminal tactics to carry out violent crimes

Documents reviewed by CyberScoop show that law enforcement is tracking these violent criminal groups’ use of malicious cyber tools to cause harm to children.

The post Exclusive: Feds are probing 764, The Com’s use of cybercriminal tactics to carry out violent crimes appeared first on CyberScoop.

Continue reading Exclusive: Feds are probing 764, The Com’s use of cybercriminal tactics to carry out violent crimes

Four Delaware men charged in international sextortion scheme that netted nearly $2 million

The group, along with others, targeted thousands of victims across the U.S., U.K., and Canada, prosecutors allege.

The post Four Delaware men charged in international sextortion scheme that netted nearly $2 million appeared first on CyberScoop.

Continue reading Four Delaware men charged in international sextortion scheme that netted nearly $2 million

Sextortion Scams Now Include Photos of Your Home

An old but persistent email scam known as “sextortion” has a new personalized touch: The missives, which claim that malware has captured webcam footage of recipients pleasuring themselves, now include a photo of the target’s home in a bid to make threats about publishing the videos more frightening and convincing. Continue reading Sextortion Scams Now Include Photos of Your Home

The changes in the cyber threat landscape in the last 12 months

When it comes to the cyber threat landscape, change is the only constant: the inevitable interplay between cybercriminals and law enforcement agencies makes it inevitable. Europol’s recently released Internet Organised Crime Threat Assessment (IO… Continue reading The changes in the cyber threat landscape in the last 12 months

The link between home, family and company security

It’s no surprise that cyber criminals target high-profile individuals or those with access privilege. Malicious actors often use social engineering and whale phishing attacks against these people to breach systems. But households and family members of company executives may also be the target of cyberattacks. In some cases, such as sextortion attempts, criminals demand monetary […]

The post The link between home, family and company security appeared first on Security Intelligence.

Continue reading The link between home, family and company security

Smashing Security podcast #331: Boris Johnson’s WhatsApps, and sextorting party girls

Former Prime Minister Boris Johnson wants to hand over his WhatsApp messages – or does he? And a couple of fun-loving girls from Aberdeen have come up with a sinister twist on sextortion scams.

All this and more is discussed in the latest edition o… Continue reading Smashing Security podcast #331: Boris Johnson’s WhatsApps, and sextorting party girls

Same code, different ransomware? Leaks kick-start myriad of new variants

Threat landscape trends demonstrate the impressive flexibility of cybercriminals as they continually seek out fresh methods of attack, including exploiting vulnerabilities, gaining unauthorized access, compromising sensitive information, and defrauding… Continue reading Same code, different ransomware? Leaks kick-start myriad of new variants

Smashing Security podcast #295: Slushygate, sextortion, and nano-targeting

What is slushygate and how does it link to sextortion in the States? What is the most impersonated brand when it comes to delivering phishing emails? And what the flip is nano-targeting?

All this and much more is discussed in the latest edition of … Continue reading Smashing Security podcast #295: Slushygate, sextortion, and nano-targeting