Skip to content
information security Page 6

information security

Europol Dismantles 0 Million Cryptocurrency Fraud Network, Arrests Five Suspects

Europol Dismantles $540 Million Cryptocurrency Fraud Network, Arrests Five Suspects

Europol on Monday announced the takedown of a cryptocurrency investment fraud ring that laundered €460 million ($540 million) from more than 5,000 victims across the world. The operation, the agency said, was carried out by… 

Blind Eagle Uses Proton66 Hosting for Phishing, RAT Deployment on Colombian Banks

Blind Eagle Uses Proton66 Hosting for Phishing, RAT Deployment on Colombian Banks

Jun 30, 2025Ravie LakshmananCybercrime / Vulnerability The threat actor known as Blind Eagle has been attributed with high confidence to the use of the Russian bulletproof hosting service Proton66. Trustwave SpiderLabs, in a report published… 

FBI Warns of Scattered Spider’s Expanding Attacks on Airlines Using Social Engineering

FBI Warns of Scattered Spider’s Expanding Attacks on Airlines Using Social Engineering

The U.S. Federal Bureau of Investigation (FBI) has revealed that it has observed the notorious cybercrime group Scattered Spider broadening its targeting footprint to strike the airline sector. To that end, the agency said it’s… 

Facebook’s New AI Tool Asks to Upload Your Photos for Story Ideas, Sparking Privacy Concerns

Facebook’s New AI Tool Asks to Upload Your Photos for Story Ideas, Sparking Privacy Concerns

Jun 28, 2025Ravie LakshmananPrivacy / Data Protection Facebook, the social network platform owned by Meta, is asking for users to upload pictures from their phones to suggest collages, recaps, and other ideas using artificial intelligence… 

Over 1,000 SOHO Devices Hacked in China-linked LapDogs Cyber Espionage Campaign

Over 1,000 SOHO Devices Hacked in China-linked LapDogs Cyber Espionage Campaign

Jun 27, 2025Ravie LakshmananThreat Hunting / Vulnerability Threat hunters have discovered a network of more than 1,000 compromised small office and home office (SOHO) devices that have been used to facilitate a prolonged cyber espionage… 

PUBLOAD and Pubshell Malware Used in Mustang Panda’s Tibet-Specific Attack

PUBLOAD and Pubshell Malware Used in Mustang Panda’s Tibet-Specific Attack

Jun 27, 2025Ravie LakshmananVulnerability / Cyber Espionage A China-linked threat actor known as Mustang Panda has been attributed to a new cyber espionage campaign directed against the Tibetan community. The spear-phishing attacks leveraged topics related…