After years of quiet escalation, business leaders are finally beginning to grasp just how serious the threat of fraud has become. Today, nearly half of all fraud attempts (41%) now involve artificial intelligence. Nowhere is this more evident than in the payments industry. Fraudsters can use AI to generate convincing fake invoices, purchase orders, and payment instructions that mirror legitimate business documents. I’ve seen examples that are indistinguishable from the real thing, which is a
All Articles (2790)
Imagine if a hacker could gain full control of your smartphone and stream everything on its screen to their own device? Well, a new Android banking trojan allows them to do just that, but they can also tap, swipe, type and navigate through hijacked smartphones in real time. According to a new blog post from the cybersecurity site Malwarebytes, security researchers at the online fraud management firm Cleafy have discovered a new Android malware family called Albiriox. Despite being fairly new,
A long-running malware operation that has evolved over several years has been turning browser extensions in Chrome and Edge into spyware through updates that added malicious functionalities. According to a report from Koi Security, the ShadyPanda campaign affects 4.3 million users who downloaded these now compromised browser extensions.
The ShadyPanda campaign consists of 20 malicious extensions on the Chrome Web Store and 125 in Edge; initial submissions of the extensions appeared in 2018, and
Cybercriminals have targeted 700Credit, the largest provider of credit, identity, and compliance services for dealerships, breaching sensitive data of approximately 5.6 million customers and nearly 18,000 dealerships in North America. This incident occurred in late October and involved names, addresses, Social Security numbers, and employment information.
The breach, confirmed by Managing Director Ken Hill, resulted from a compromise of the 700Dealer.com website. A third-party vendor’s API con
Red Sky Alliance monthly queries our backend databases, identifying all new data containing Motor Vessel (MV) and Motor Tanker (MT) in the subject line of malicious emails. Malicious actors use emails with Motor Vessel (MV) or Motor Tanker (MT) in the subject line as a lure to entice users in the maritime industry to open emails containing malicious attachments. Red Sky Alliance is providing this list of Motor Vessels in which we directly observed the vessel being impersonated, with associate
A former technical manager employed by the wind farm operator Nordex has been sentenced to 120 hours of community service by a Dutch court. The sentence follows the discovery that the employee had used company infrastructure to power a clandestine cryptocurrency mining operation across two renewable energy sites. The rogue employee, a man in his forties, exploited his privileged access to the company’s internal systems between August and November 2022.
According to court proceedings in Assen,
A new spin on the ClickFix attack is making the rounds, and it is designed to circumvent some of the strategies organizations have for mitigating them. ClickFix and its slightly more elegant offshoot, FileFix, are notorious for being almost inexplicably manipulative. Attackers persuade victims to run commands on their computers that they never otherwise would and may never have before. Now there's a new variant, deemed "JackFix," that gives more logical context to those strange actions victims
A prolific cybercriminal group that calls itself “Scattered LAPSUS$ Hunters” has dominated headlines this year by regularly stealing data from and publicly mass extorting dozens of major corporations. But the tables seem to have turned somewhat for “Rey,” the moniker chosen by the technical operator and public face of the hacker group: Last week, Rey confirmed his real life identity and agreed to an interview after KrebsOnSecurity tracked him down and contacted his father.
Scattered LAPSUS$ Hu
eBPF (Extended Berkeley Packet Filter) is a very interesting kernel technology that lets users load tiny, sandboxed programs into the Linux kernel to inspect or modify network packets, system calls, and more. The technology was introduced in 2015 to replace the “old” BPF technology of 1992, which was no longer compatible with modern computer architectures (e.g., 64-bit). As usual, the technology was quickly noticed by malware authors, leading to the Bvp47 malware in 2015 and a collection of ro
In the modern digital ecosystem, subscribing to a calendar series has become a routine convenience. Whether it is a retailer sharing dates for upcoming sales, a sports association like FIFA publishing match schedules, or a government body listing public holidays, the standard ‘ICS’ web calendar format, also known as iCalendars, allows third parties to integrate events directly into a user’s device. A new report indicates that this functionality is being weaponized by cybercriminals to distribu
A series of big-game hunting incidents and double extortion attacks carried out by Kraken, a Russian-speaking operation that has emerged from the ashes of the HelloKitty cartel, was observed in August 2025 by Cisco Talos and detailed in an advisory published recently. The group has been linked to intrusions where Server Message Block (SMB) flaws were abused for entry, followed using Cloudflare for persistence and SSH Filesystem (SSHFS) for data theft before encryption. Kraken’s toolkit spans W
Zorin OS experienced a significant increase in downloads following the release of Windows 10. Within a two-day stretch, Zorin OS had over 100,000 downloads, which was a record for the distribution. Meanwhile, Linux Mint has been one of the most popular distributions for some time. Given that both of these distributions are enjoying a continued rise in popularity, along with the end of Windows 10 support, you might be looking at one or the other to serve as either your first or your next Linux
After years of quiet escalation, business leaders are finally beginning to grasp just how serious the threat of fraud has become. Today, almost half of all fraud attempts (41%) involve artificial intelligence. Nowhere is this more evident than in the payments industry. Fraudsters can use AI to generate convincing fake invoices, purchase orders, and payment instructions that mirror legitimate business documents. I’ve seen examples that are indistinguishable from the real thing, which is a tre
What is a “honeypot” in the context of cybersecurity? The term first appeared in the 1980s and 1990s, when it was used to describe precisely that, a honey trap that lured in unsuspecting hackers, putting them on the back foot. Clifford Stoll’s 1989 book The Cuckoo’s Egg is the first official documentation of a honeypot in the cyber world. Stoll tells the story of using what he called a “honeypot” to find a German hacker who had infiltrated U.S. military computers. Now the term is used in cybe
Every year, the holiday season brings a predictable spike in online activity. But in 2025, the volume of newly created malicious infrastructure, account compromise activity, and targeted exploitation of e-commerce systems is markedly higher. Attackers began preparing months in advance, leveraging industrialized tools and services that enable them to scale attacks across multiple platforms, geographies, and merchant categories.
For retailers, financial institutions, and any business operating a
Get advice and information to help protect your children from dangers lurking in both the online and offline worlds. Learn how to contact us and report child abductions and sexual exploitation.
How to report a missing child or online child exploitation - The FBI has jurisdiction to immediately investigate any reported mysterious disappearance or kidnapping involving a child. Do not wait to report a missing child. Call your local law enforcement and FBI field office or the closest internation
OpenAI is alerting some ChatGPT API customers that limited personally identifiable information (PII) was exposed after its third-party analytics provider, Mixpanel, was breached. The compromise, stemming from a smishing campaign detected on 8 November, affected “limited analytics data related to some users of the API”, but did not compromise ChatGPT or other OpenAI products.[1]
While OpenAI confirmed that sensitive information such as credentials, API keys, requests, and usage data, payment and
Any car dealership is a significant investment. Not just in terms of financial capital, but also in toil and sweat from the Sales floor to the Dealer Principal’s office. All of the effort that makes these businesses successful can be neutralized by a single cyber-attack.
CDK has surveyed dealership leadership for five years to understand their approach to cybersecurity and where they see the industry addressing this integral threat to their business. This year, there are clear indicators that
As consumers took advantage of Black Friday and Cyber Monday deals, historical analysis from TransUnion (NYSE: TRU) and found that 4.6% of attempted ecommerce transactions globally were suspected of being digital fraud from this Thanksgiving to Cyber Monday. Based on insights from TransUnion’s intelligence network, TransUnion found that the global suspected Digital Fraud rate “was down from 6.0% during the same period in 2023.”[1]
For attempted ecommerce transactions where the consumer was in t