Cyber Crime
Latest about Cyber Crime

LockBit developer snared in latest blow for infamous hacker group
By Solomon Klappholz published
News An individual charged with developing the malware used by the notorious ransomware group is now in custody awaiting extradition to the US

US charges 14 members of North Korean IT worker scam that bagged $88 million in six years
By Solomon Klappholz published
News The group is accused of infiltrating US organizations posing as remote workers

Warning issued after Chinese hacker group breaches telco firms in "dozens of countries"
By Solomon Klappholz published
News President Biden’s deputy national security advisor said the campaign has breached at least eight US telcos

Hackers are using a LinkedIn recruitment scam to snare unsuspecting jobseekers
By Solomon Klappholz published
News Taking a leaf out of North Korean threat actors’ playbook, Iranian hackers are tricking jobseekers using fake job offers

Researchers sound alarm over hackers exploiting critical ProjectSend vulnerability
By Solomon Klappholz published
News A critical flaw in ProjectSend was patched last year, but researchers warn exploitation is still likely

Security agencies issue fresh warning over encryption-less ransomware
By Solomon Klappholz published
News Experts say encryption-less attacks use less time and reduce the risk of being detected on the victims networks

‘Adversary in the middle attacks’ are becoming hackers’ go-to method to bypass MFA
By Solomon Klappholz published
News Microsoft has warned businesses to be wary of an industry-wide shift in phishing tactics to get around MFA

Firms warned to beware of fake IT workers
By Emma Woollacott published
News SentinelLabs has uncovered a network of front companies supplying North Korean remote workers under false identities
Get the ITPro. daily newsletter
Receive our latest news, industry updates, featured resources and more. Sign up today to receive our FREE report on AI cyber crime & security - newly updated for 2024.