The detection rate of cybercrime in the Republic of Belarus for the first four months of 2024 increased by 19% compared to the same period last year, said Alexander Ringevich, Deputy Head of the Main Department for Combating Cybercrime of the Ministry of Internal Affairs of the country.
"Since...
Who is more at risk of becoming a victim of cyber fraudsters and what is the typical portrait of a "digital swindler", how the Investigative Department of the Ministry of Internal Affairs managed to achieve a high detection rate of cybercrime and what advice the department gives to avoid risks...
The Israeli cybersecurity company Cybersiixgill, which specializes in research on the "dark" and "deep" parts of the Network, checked Telegram. The researchers concluded that messenger has become a platform for cybercriminals and many services from the "dark Internet" have moved to Telegram...
Over the past 10 years, criminals have been actively moving online, using the information benefits of humanity for personal gain at someone else's expense. Despite the fact that the Internet appeared back in 1969, and the debut crime in the information environment occurred 20 years later, but in...
In recent years, to organize a cyberattack, you no longer need to understand malicious software and the design of security systems. The underground market offers services for any request: from a simple DDoS attack to complex campaigns using zero-day vulnerabilities. How this sphere works, read...
Social engineering is an insidious and manipulative art that can penetrate the most protected areas of our lives. However, how justified is it to call it a cybercrime? On the one hand, social engineers use psychological techniques and deception to gain access to confidential information and...
Cyberspace crime is one of the most complex challenges facing the international community in recent years. And the number of crimes increases along with the number of users of computer networks. Therefore, every user of computer networks should know what cybercrime is, what types of crimes...
What was more important – the dignity or confidentiality of customers?
In France, the Simone Weil Hospital (CHC-SV) experienced a cyberattack in April that disrupted the facility and forced staff to switch to using paper for record keeping.
Now the hospital reports that the LockBit group...
Group-IB conducted a large-scale study of the underground market, identifying key hotbeds of threats to business and the public sector. In the Hi-Tech Crime Trends report, analysts record the merging of cybercrime groups within the framework of partner programs that are put on stream.
They are...
In 2023, four thousand IT crimes were recorded.
Since 2020, the number of IT crimes committed by minors in Russia has increased 74 times. This was announced by Artem Babintsev, Senior Inspector for Special Assignments of the Main Department for Public Order Protection of the Ministry of...
It is only a matter of minutes between informing and attacking hackers.
Experts from Palo Alto Networks revealed that attackers have recently increasingly switched to so-called "scanning attacks" initiated by malware to identify vulnerabilities in target networks. Moreover, the source of the...
Prosecutors have uncovered a scheme to earn Meta money by stealing business accounts.
Attorneys General of 41 US states have addressed Meta*, highlighting the sharp increase in complaints about hijacking of Facebook and Instagram user accounts across the country and stating the need for...
The international operation Kronos is bearing fruit.
As part of the international operation Kronos, which began on Monday, February 19, at least three accomplices of the well-known extortion gang LockBit were arrested in Poland and Ukraine. These arrests followed the dismantling of the LockBit...
The London conference raises topical issues in the fight against hackers for hire.
A unique international conference has kicked off in London, the capital of the United Kingdom, bringing together representatives from 35 countries, as well as key business and technology players. The main purpose...
Everyone can now run their own malicious campaign.
Cybersecurity experts draw attention to the" democratization " of the phishing ecosystem due to the transformation of Telegram into the epicenter of cybercrime, which allows attackers to organize mass attacks for relatively little money...
The final round of negotiations is already close. Whose position will be stronger?
The US government is firmly committed to its desire for a much narrower version of the UN treaty on cybercrime than the draft published in November. The final round of negotiations on this agreement is expected...
This week, the final preparatory consultations of the UN Ad Hoc Committee on the development of a universal convention to combat cybercrime took place in Vienna. Russia has been promoting the idea of developing such a document since 2017, and now at the end of January - beginning of February...
The Royal and Akira victims were subjected to repeated extortion attacks from a benevolent security researcher.
The Arctic Wolf Labs team has discovered a new fraud scheme targeting victims of ransomware. According to Arctic Wolf, those affected by the actions of the Royal and Akira groups were...
The growing popularity of malicious methods was studied and disclosed by researchers.
Carlo Zanki, a cybersecurity expert at ReversingLabs, has discovered a new trend that many cybercriminals have been using lately. The essence of the trend is the malicious use of the GitHub platform to...
The efforts of OLVX administrators allow it to exist on the open Internet and attract customers.
ZeroFOX has discovered the growing popularity of the OLVX cybercrime platform, which provides tools for online fraud and cyber attacks. The platform differs from traditional shadow markets in that...