cybercrime

  1. How Phishers Abuse URL Wrapping and Trust in Enterprise Email Security Tools

    An alarming new wave of cybercrime has emerged, leveraging the very security tools designed to shield organizations from harm. Recent research reveals that phishing actors are now abusing link-wrapping and URL-rewriting services—trusted pillars of enterprise email protection—to sneak malicious...
  2. Cybersecurity Week in Review: Major Breaches, Ransomware Takedowns & Data Sovereignty Battles

    In a week marked by both mounting threats and significant shifts in the cybersecurity landscape, some of the world’s most recognizable organizations and agencies faced unprecedented security challenges. From ransomware attacks and data breaches exposing millions of personal records to new...
  3. New QR Code Phishing Campaign Targets Microsoft 365 Users with Sophisticated MFA Scam

    In recent developments, cybersecurity firm East Security has identified a sophisticated phishing campaign that impersonates Microsoft's multi-factor authentication (MFA) processes. This attack leverages QR codes to deceive users into divulging their Microsoft 365 credentials, highlighting the...
  4. AI-Driven Phishing: The New Era of Cyber Threats and How to Defend Against Them

    Cybersecurity professionals worldwide have watched for years as the battle between defenders and attackers has grown increasingly sophisticated. But a new wave of threats is now on the horizon—one where generative AI acts as the great equalizer, equipping even novice cybercriminals with the...
  5. How to Detect and Prevent Calendar Phishing Attacks in Microsoft 365

    In recent years, cybercriminals have increasingly exploited digital calendars to orchestrate sophisticated phishing attacks, particularly targeting Microsoft 365 users. These scams often involve deceptive calendar invitations that appear legitimate but are designed to steal sensitive information...
  6. DEVMAN Ransomware: New Threat Targeting Windows 10/11 with Unique Behaviors

    A new ransomware variant named DEVMAN has recently emerged, targeting Windows 10 and 11 systems. This malware is a derivative of the DragonForce ransomware family, itself based on the Conti framework, but introduces unique behaviors that distinguish it from its predecessors. Technical Analysis...
  7. How Microsoft 365 Direct Send Exploitation Leads to Sophisticated Phishing Attacks

    In recent months, a sophisticated phishing campaign has exploited Microsoft 365's Direct Send feature, targeting over 70 organizations across the United States. This attack method allows cybercriminals to impersonate internal users and deliver phishing emails that bypass traditional security...
  8. Protect Your Organization: Combating Phishing Attacks Exploiting Microsoft 365's Direct Send

    In recent months, a sophisticated phishing campaign has exploited Microsoft 365's "Direct Send" feature, targeting over 70 organizations, primarily in the United States. This attack method allows cybercriminals to impersonate internal users and deliver phishing emails without compromising...
  9. Ransomware Rise: How the YES24 Cyberattack Reveals Global Digital Security Risks

    Four days of total digital silence. That was the stark reality for the 20 million users of YES24, South Korea’s largest online bookstore, after a catastrophic ransomware attack forced the entire platform—website and app—offline. Orders for books, reservations for concerts, and access to digital...
  10. Huge 16 Billion Login Credentials Data Breach: Protect Your Online Accounts Now

    In a recent and unprecedented cybersecurity event, researchers have uncovered a massive data breach exposing approximately 16 billion login credentials from major platforms, including Google, Facebook, and Telegram. This breach, identified by the Cybernews research team, is being hailed as one...
  11. Anubis Ransomware: The Destructive Threat with Data Wiper Capabilities in 2025

    Anubis ransomware has emerged as a formidable threat in the cybersecurity landscape, employing a destructive wiper module that ensures victims lose their data irretrievably, even if they comply with ransom demands. This evolution in ransomware tactics underscores the increasing sophistication...
  12. Nytheon AI: The Dark Side of Open-Source Generative AI Empowering Cybercrime

    In the dim and often misunderstood world of the dark web, a new phenomenon is reshaping the landscape of cybercrime: illicit, highly capable, generative AI platforms built atop legitimate open-source models. The emergence of Nytheon AI, detailed in a recent investigation by Cato Networks and...
  13. Twitter Data Breach 2022: Key Insights, Impact, and Security Lessons

    When Twitter confirmed that a hacker exploited a significant security vulnerability, it set off alarm bells not just within the company, but across the wider digital landscape. Such incidents underscore the growing concerns around data privacy, cybersecurity, and the responsibility that tech...
  14. Shadow AI Risks: Protect Your Business from Data Breaches and Cyber Threats

    The rapid integration of artificial intelligence (AI) into business operations has revolutionized productivity and innovation. However, the unsanctioned use of AI tools by employees—often referred to as "shadow AI"—has introduced significant data security risks. This phenomenon exposes...
  15. Global Tech and Law Enforcement Join Forces to Combat AI-Powered Tech Support Scams

    Collaboration between global tech companies and law enforcement has reached new heights as the digital threat landscape evolves. The recent joint operation between Microsoft, India's Central Bureau of Investigation (CBI), and Japan’s Cybercrime Control Center (JC3) marks a significant advance in...
  16. Global Collapse of Transnational Scam Networks Targeting Seniors in Cybercrime Takedown

    Cross-border law enforcement efforts achieved a notable breakthrough as Microsoft and international authorities joined forces to dismantle a far-reaching transnational scam network targeting older adults. The collaborative operation exemplifies how coordinated interventions, advanced...
  17. Chaos RAT Evolution: The Rise of Open-Source Tools as Cyber Threats

    The story of Chaos RAT is emblematic of a larger cybersecurity trend: the migration of benign open-source tools into the shadowy corners of the cyber threat landscape. Once celebrated for their technical flexibility and communal development, these tools increasingly become the foundation for...
  18. Playcrypt Ransomware Group: Evolving Threats, Attack Tactics, and Defense Strategies in 2025

    The Play ransomware group, more commonly referred to in cybersecurity circles as “Playcrypt,” has carved out a chilling reputation across the digital threat landscape since its emergence in mid-2022. This ransomware-as-a-service operation has evolved from relative obscurity to become one of the...
  19. Massive Data Breach 2024: How to Protect Your Digital Identity

    A staggering wave of panic has rippled across the United States in the wake of what experts are calling one of the largest security breaches in digital history. More than 184 million passwords—alongside user emails and other sensitive personal data—have potentially been exposed, implicating some...
  20. Dadsec and Tycoon2FA: The Rising Threat of Sophisticated Phishing-as-a-Service Platforms

    The rapid evolution of cybercrime has brought forth a new era of sophisticated phishing operations, with attackers now leveraging complex “Phishing-as-a-Service” (PhaaS) platforms to target lucrative enterprise networks. One such operation, identified in research as Storm-1575 and more widely...