Cybercriminals pose as legitimate travel agents to steal money as the New Year holidays near. Their scheme is simple: fake websites, phone impersonations, and requests for duplicate wire transfers ...
Unit 42 describes Landfall as an implant exploiting a zero-day vulnerability in the Galaxy software component, identified as CVE-2025-21042. The exploit relied on sending a specially crafted image.
The UK has just closed one of its largest crypto money-laundering cases. Zhimin Qian, also known as Yadi Zhang, turned the proceeds of 128,000 Chinese victims into Bitcoin. A seven-year Met Police ...
Beijing launched a sweeping crackdown in 2023 on scam networks operating from northern Myanmar after thousands of Chinese citizens were targeted by online fraud. The Kokang region, dominated by ethnic ...
Six former managers and compliance officers from payment firms in Germany, Canada, and Austria allegedly colluded with the network, enabling fraudulent transactions to blend into legitimate payment ...
Since Monday, the state’s algorithmic pricing law requires companies to disclose if they use consumers’ personal data to adjust prices. California passed a similar bill, but it hasn’t taken effect yet ...
Israeli surveillance firm NSO Group, infamous for its Pegasus spyware, is under new leadership. David Friedman, former diplomat and Donald Trump’s attorney, aims to restore ties with Washington and ...
At the heart of the Cyber Security and Resilience Bill lies the protection of vital UK infrastructure. Hospitals, water networks, and transport operators must strengthen their cyber defences to avoid ...
Asahi Group Holdings Ltd., Japan’s largest brewer, has been crippled by a ransomware attack that halted production and slashed shipments to 10% of normal levels. The disruption strikes during Asahi’s ...
British retailer Marks & Spencer (M&S) reported a dramatic profit collapse in early 2025 after a major cyberattack crippled its online sales. The incident, linked to hacker group Scattered Spider, ...
Each vulnerability starts with a CVSS base score, then incorporates factors like autonomy and tool usage. The total is halved and adjusted by an environmental factor. Ken Huang, AI security researcher ...
New phishing campaigns target iPhone users who reported their devices as lost. According to the UK’s National Cyber Security Centre (NCSC), criminals send fake SMS or iMessage texts claiming the phone ...