Thomas Godden, 26, deliberately targeted men who were seeking companionship and a genuine emotional connection, defrauding three individuals out of a combined 28,000. One of the victims lost over 26,000. City of London Police found that Godden used Tinder and Bumble to target gay men, when in reality he was a heterosexual man already in a relationship.
The FBI's Seattle Division is seeking to identify potential victims installing Steam games embedded with malware. The FBI believes the threat actor primarily targeted users between the timeframe of May 2024 and January 2026.
Coruna is powerful and sophisticated in both purpose and design. But it is not effective against the latest versions of iOS. The easiest defense is to ensure your iPhone is running iOS 17.3 or newer. In instances where an update is not possible, it is recommended that Lockdown Mode be enabled for enhanced security.
ShinyHunters leaked 1 million Odido records for the second day in a row. According to Have I Been Pwned, which is ingesting the data from each day's leaks, the first million contained 317,000 unique email addresses, while the second round consisted of 371,000. Details associated with those accounts include bank account numbers, other basic personal information, passport numbers, driving licenses, and customer service comments.
At least 14 boys aged 14 to 17 were allegedly lured into Meyers' scheme to send him nude photos and sex videos, which he used to blackmail the minors. Meyers was charged with trafficking in minors, sexual extortion, unlawful contact with a minor, distribution of child sexual abuse material, criminal use of a communication facility, and more following his arrest.
SLH is diversifying its social engineering pool by specifically recruiting women to conduct vishing attacks, likely to increase the success rate of help desk impersonation. The group is said to be offering anywhere between $500 and $1,000 upfront per call, in addition to providing them with the necessary pre-written scripts to carry out the attack.
A 47-year-old man arrested by police in Poland for allegedly being involved in cybercriminal activities has been linked to the Phobos ransomware operation. According to Poland's Central Cybercrime Bureau, officers found hacking tools, credentials, payment card numbers, and server IP addresses on the unnamed suspect's devices during a search. They also discovered that the suspect had exchanged messages with the Phobos ransomware group.
In furtherance of the scheme, prosecutors said the five defendants created fraudulent customer accounts and driver accounts on DoorDash's platform and used the fictitious customer accounts to place orders for delivery. Using insider access to DoorDash's computer systems, the defendants assigned those orders to fraudulent driver accounts, then manipulated DoorDash's computer systems to cause DoorDash to pay the fraudulent driver accounts as if individual orders had been delivered hundreds of times.
Entering the cyber world is stepping into a warzone. Cyber is considered a war zone, and what happens there is described as cyberwar. But it's not that simple. War is conducted by nations (political), not undertaken by criminals (financial). Both are increasing in this war zone we call cyber, but the political threat is growing fast. Cyberwar is a complex subject, and a formal definition is difficult.
Any industry that revolves around AI in some way has seen a boost in the stock market, and cybersecurity may be one of the most promising opportunities. As AI efforts expand, companies will have more data that they must safeguard from hackers. Cybersecurity stocks have been long-term winners thanks to their annual recurring revenue models and how valuable they are for companies. The value of cybersecurity firms should continue to rise as AI makes their services more essential.
The court heard how the defendant helped orchestrate the intrusion of a port operator's computer systems by having a terminal employee insert a USB stick containing malware into a workstation. That single physical act opened the door to months of remote access. Investigators found a backdoor installed in September 2020 that stayed put into the following year, while chats show the defendant exploring the network and hunting for admin access.