Cryptocurrency scams metastasize into new forms
Credit to Author: gallagherseanm| Date: Fri, 02 Feb 2024 11:00:13 +0000
“DeFi mining” scams adopted by pig-butchering rings create more problems for those trying to defend against them.
Read moreCredit to Author: gallagherseanm| Date: Fri, 02 Feb 2024 11:00:13 +0000
“DeFi mining” scams adopted by pig-butchering rings create more problems for those trying to defend against them.
Read moreCredit to Author: Andrew Brandt| Date: Tue, 19 Dec 2023 11:00:33 +0000
Social engineering drives password-stealing malware attack against the front desk
Read moreCredit to Author: Matt Wixey| Date: Wed, 13 Dec 2023 11:00:25 +0000
Sophos X-Ops explores the symbiotic – but often uneasy – relationship between ransomware gangs and the media, and how threat actors are increasingly seeking to wrest control of the narrative
Read moreCredit to Author: Matt Wixey| Date: Tue, 28 Nov 2023 11:00:13 +0000
Despite concern over illicit applications of ChatGPT and similar models, Sophos X-Ops’ exploration of cybercrime forums suggests many threat actors are still skeptical – and wrestling with the same issues and problems as the rest of us
Read moreCredit to Author: Matt Wixey| Date: Thu, 09 Nov 2023 13:46:19 +0000
Sophos X-Ops takes an in-depth look at memory scanning and why it matters
Read moreCredit to Author: rajeshnataraj| Date: Thu, 19 Oct 2023 11:00:35 +0000
Multiple LockBit knock-off attacks in September targeting obsolete software foiled, exposing tactics and tools.
Read moreCredit to Author: gallagherseanm| Date: Mon, 18 Sep 2023 10:15:27 +0000
Liquidity mining scam puts cruel new spin on Chinese cryptocurrency fraud, with a dash of AI chat
Read moreCredit to Author: Matt Wixey| Date: Tue, 29 Aug 2023 10:00:17 +0000
We explore some of the entries in recent cybercrime research competitions, and what they say about threat actor innovation and priorities
Read more