IT Brief India - Technology news for CIOs & IT decision-makers

Cybercrime stories - Page 10

Any use of network connected electronic devices such as computers or smartphones for criminal activity is classified as cybercrime. With a long history starting with the misuse of telephone systems (such as ‘phreaking’), cybercrime today includes the creation and distribution of viruses, ransomware, keyloggers and other malware, the download and use of malware produced by others, social engineering tactics such as phishing or (physical) impersonation, the theft and use of credentials for accessing computer systems or networks, and the theft of privileged data. Cybercrime is a broad and dynamic field, with cybercriminals constantly adapting their methods in pursuit of usually financial goals, but also occasionally seeking to disrupt, embarrass or shame their targets.
Global digital security globe with shields locks and cybercriminals network

Fortinet & Crime Stoppers launch global cybercrime bounty scheme

Wed, 19th Nov 2025
#
firewalls
#
advanced persistent threat protection
#
breach prevention
Fortinet and Crime Stoppers International launch a global Cybercrime Bounty to anonymously report threats and boost law enforcement efforts worldwide.
Modern workplace automation robots computers tech professionals collaborating

Kaseya predicts AI risks, job shifts & MSP growth as IT evolves

Tue, 18th Nov 2025
#
data analytics
#
digital transformation
#
hyperscale
Kaseya forecasts AI risks, job cuts, and growth opportunities as managed service providers adapt to evolving tech, cybersecurity, and sustainability demands.
Darkened computer server room masked figures laptops malware ai cybercrime investigation

Cybercrime crackdown disrupts malware, exposes AI attack risks

Tue, 18th Nov 2025
#
malware
#
ransomware
#
supply chain
Law enforcement and cybersecurity firms have disrupted major malware networks amid rising risks from AI-driven cyberattacks and escalating supply chain breaches globally.
Old computer frayed wires dust warning symbols digital data leak cyber fraud risks obsolete tech

Cyber fraud risks rise as focus shifts to obsolete technology

Mon, 17th Nov 2025
#
mfa
#
breach prevention
#
ai
Fraud risks rise as firms overlook obsolete tech; underinvestment in end-of-life IT assets could cost USD $27.1m per breach, warns Iron Mountain's Asia Pacific GM.
Realistic smartphone showing cash coins shadowy hands online scam symbol

Instagram posts fuel surge in money mule recruitment schemes

Thu, 13th Nov 2025
#
risk & compliance
#
payment technologies
#
facebook
Nearly 24% of Instagram posts tagged as 'quick-money' offers are linked to money mule recruitment, posing major challenges for law enforcement and platforms.
Retail store digital lock warning icons shadowy hands network connections supply chain cybersecurity vulnerability

Retailers face surge in AI-driven cyber threats & supply chain risks

Thu, 13th Nov 2025
#
digital transformation
#
advanced persistent threat protection
#
supply chain
Nearly half of retailers face rising AI-driven cyber attacks, with just 25% prepared for these sophisticated threats amid growing supply chain security concerns.
Photorealistic hooded figure at computer with floating digital locks warnings cybercrime

AI & ransomware reshape cyber threat landscape, report finds

Thu, 13th Nov 2025
#
malware
#
ransomware
#
phishing
Rapid7's report reveals cyber threats evolving with AI-powered phishing, rising ransomware alliances, and faster exploitation of vulnerabilities worldwide.
Realistic hand holding smartphone fake login screen phishing attack business office

Phishing attacks surge as criminals exploit trusted platforms in 2025

Wed, 12th Nov 2025
#
mfa
#
phishing
#
advanced persistent threat protection
Phishing attacks surged in 2025, with a 67% rise exploiting trusted platforms like Zoom and PayPal, and a 449% increase in phone-based vishing incidents targeting businesses.
Cloud security multiple padlocks open broken people keys digital network

Cloud breaches driven by identity failures & process flaws

Thu, 6th Nov 2025
#
malware
#
cloud security
#
phishing
ReliaQuest reveals identity compromises and process flaws, not zero-day exploits, drive most cloud breaches, with 99% of cloud identities still over-privileged.
Cargo truck data theft laptop shadowy figure global digital lines flowing

Cybercriminals exploit remote tools to steal global cargo worth USD $34 billion

Wed, 5th Nov 2025
#
malware
#
firewalls
#
digital transformation
Cybercriminals exploit remote monitoring tools to steal USD $34 billion in cargo globally, targeting trucking firms amid growing digital supply chain risks.
Dimly lit industrial control room multiple screens warning symbols cyber attack disruption

Ransomware attacks surge 28% in September as Industrials sector hit hardest

Thu, 30th Oct 2025
#
ransomware
#
advanced persistent threat protection
#
supply chain
Global ransomware attacks surged 28% in September, with Industrials hardest hit, as cyber criminals ramp up efforts ahead of the busy holiday season.
Stressed businessperson office desk locked computer digital padlocks masked figures

Ransom payment rates drop to historic low as attackers adapt

Thu, 30th Oct 2025
#
ransomware
#
crypto
#
phishing
Ransom payments fell to a historic low of 23% in Q3 2025 as cyber extortion tactics shift towards targeted, costlier attacks on larger firms.
Jack o lantern cyber danger halloween suspicious emails social media laptop

Halloween scams spike as 63% of festive spam found malicious

Wed, 29th Oct 2025
#
malware
#
phishing
#
email security
Bitdefender reports a 63% rise in malicious Halloween spam, with scams posing as festive giveaways and retail offers to steal data or spread malware.
Cluttered smartphone home screen security apps overload confusion realistic digital illustration

Users spending up to $850 yearly on redundant and fragmented security apps

Fri, 24th Oct 2025
#
vpns
#
mfa
#
mdm
Fragmented security apps cost users up to $850 yearly, exposing them to cyber risks and alert fatigue, says new study by Ontario Tech University and PureVPN.
Hooded figure computer dark room multiple screens abstract encrypted code cyber attack

Ransomware groups surge as automation cuts attack time to 18 mins

Thu, 23rd Oct 2025
#
ransomware
#
encryption
#
advanced persistent threat protection
Automation and AI slash ransomware attack times to 18 minutes, challenging defenders to match speed with automated defences, says ReliaQuest report.
Dark ominous digital network glowing data streams malware infiltration east asian cityscape

APAC records highest network attack levels globally in WatchGuard report

Wed, 22nd Oct 2025
#
malware
#
firewalls
#
ransomware
WatchGuard reports a 40% rise in evasive malware hidden in encrypted traffic, with 70% of threats now using TLS to avoid detection in Q2 2025.
Shadowy figure computer digital code malware icons finance skyscrapers global cyber threats

TA585 identified as key threat actor using advanced malware tools

Tue, 21st Oct 2025
#
advanced persistent threat protection
#
risk & compliance
#
cybersecurity
Proofpoint identifies TA585 as a cyber threat actor managing end-to-end attacks, deploying advanced malware like MonsterV2 to target finance firms globally.
Gold coins digital symbols map russia us brazil financial cybercrime threats

Russia, US & Brazil pose highest risks for wealthy crypto holders

Fri, 17th Oct 2025
#
crypto
#
defi
#
bitcoin
Russia, the US and Brazil top the Executive Crypto Threat Index as the riskiest countries for wealthy cryptocurrency holders in 2025, while Japan and Singapore are safest.
Person examining computer screen split image real human face vs digital manipulation

Deepfake threat grows as public & business struggle to keep up

Wed, 15th Oct 2025
#
phishing
#
email security
#
data privacy
Deepfake scams surge worldwide, with 49% of firms hit in 2024 as public and businesses struggle to spot convincing fake videos and audio.
Realistic shadowy cyber hacker dark room computer monitors encrypted data

CL0P hackers exploited Oracle EBS zero-day for data extortion

Fri, 10th Oct 2025
#
firewalls
#
ransomware
#
network security
Hackers linked to CL0P exploited an Oracle E-Business Suite zero-day from July 2025, stealing data and extorting dozens of organisations worldwide.