Cyber Security A Day in the Life of a Prolific Voice Phishing Crew Jan 7, 2025 krebsonsecurity.com Besieged by scammers seeking to phish user accounts over the telephone, Apple and Google frequently caution that they will never…
Cyber Security U.S. Army Soldier Arrested in AT&T, Verizon Extortions Dec 30, 2024 krebsonsecurity.com Federal authorities have arrested and indicted a 20-year-old U.S. Army soldier on suspicion of being Kiberphant0m, a cybercriminal who has…
Cyber Security The Dark Nexus Between Harm Groups and ‘The Com’ Sep 13, 2024 krebsonsecurity.com A cyberattack that shut down some of the top casinos in Las Vegas last year quickly became one of the…
Cyber Security Hackers Claim They Breached T-Mobile More Than 100 Times in 2022 Feb 28, 2023 krebsonsecurity.com Three different cybercriminal groups claimed access to internal networks at communications giant T-Mobile in more than 100 separate incidents throughout…
Cyber Security Thinking of Hiring or Running a Booter Service? Think Again. Jan 17, 2023 krebsonsecurity.com Most people who operate DDoS-for-hire services attempt to hide their true identities and location. Proprietors of these so-called “booter” or…
Cyber Security Researchers Quietly Cracked Zeppelin Ransomware Keys Nov 17, 2022 krebsonsecurity.com Peter is an IT manager for a technology manufacturer that got hit with a Russian ransomware strain called “Zeppelin” in…
Cyber Security Hackers Gaining Power of Subpoena Via Fake “Emergency Data Requests” Mar 29, 2022 krebsonsecurity.com There is a terrifying and highly effective "method" that criminal hackers are now using to harvest sensitive customer data from…
A Day in the Life of a Prolific Voice Phishing Crew
Besieged by scammers seeking to phish user accounts over the telephone, Apple and Google frequently caution that they will never…
U.S. Army Soldier Arrested in AT&T, Verizon Extortions
Federal authorities have arrested and indicted a 20-year-old U.S. Army soldier on suspicion of being Kiberphant0m, a cybercriminal who has…
The Dark Nexus Between Harm Groups and ‘The Com’
A cyberattack that shut down some of the top casinos in Las Vegas last year quickly became one of the…
Hackers Claim They Breached T-Mobile More Than 100 Times in 2022
Three different cybercriminal groups claimed access to internal networks at communications giant T-Mobile in more than 100 separate incidents throughout…
Thinking of Hiring or Running a Booter Service? Think Again.
Most people who operate DDoS-for-hire services attempt to hide their true identities and location. Proprietors of these so-called “booter” or…
Researchers Quietly Cracked Zeppelin Ransomware Keys
Peter is an IT manager for a technology manufacturer that got hit with a Russian ransomware strain called “Zeppelin” in…
Hackers Gaining Power of Subpoena Via Fake “Emergency Data Requests”
There is a terrifying and highly effective "method" that criminal hackers are now using to harvest sensitive customer data from…