cybercrime

AI in Cybercrime: Hackers Exploiting OpenAI
In a recent podcast interview with Cybercrime Magazine's host, Charlie Osborne, Heather Engel, Managing Partner at Strategic Cyber Partners, discusses reports from OpenAI that hackers are trying to use its tools for ...

The 6 Most Common Network Vulnerabilities Haunting CSOs in 2024
Network security is significantly more challenging than it was several years ago. Today's IT teams struggle against a cybersecurity talent shortage, an increasing number of endpoints in their network, and the ever-changing ...

Disney Leak Reveals Financial and Strategy Secrets
In a recent podcast interview with Cybercrime Magazine's host, David Braue, Scott Schober, Cyber Expert, Author of "Hacked Again," and CEO of Berkeley Varitronics Systems, discusses a recent data breach affecting information ...

Are Leaders Ready to Break the Ransomware Cycle
It is good to see US government leaders realize that ransomware is a growing existential threat to our country, at the hands of our adversaries. A top US national cybersecurity advisor ...

New Anti-Bot Services on the Dark Web Help Phishing Pages Bypass Google’s Red Page
Novel anti-bot services are being advertised on the dark web, offering cybercriminals advanced tools to bypass Google’s protective ‘Red Page’ warnings in a concerning development for cybersecurity teams. These services represent the ...

CEO Durov Says Telegram Will Provide More Data to Governments
The CEO of controversial messaging app Telegram says it will now make information about users suspected of crimes more easily available to law enforcement, a move that comes a month after he ...

Defending Against Ransomware Threats: Tactics and Procedures Revealed by CISA
In a recent announcement, the Cybersecurity and Infrastructure Security Agency (CISA) issued a warning about the increasing ransomware threat posed by Iran-based cyber actors. The advisory highlighted the specific tactics, techniques, and ...

Defending Against Zero-Day Attacks: How CimTrak Foils CVE-2024-38213 Exploits
Zero-day vulnerabilities remain a significant threat to cybersecurity, particularly for enterprise environments. One of the latest and most concerning examples is CVE-2024-38213, nicknamed "Copy2Pwn." This vulnerability allows attackers to bypass the Windows ...

Holding Trust for Ransom: What’s at Stake as Business Trust Erodes
Trust is vital to upholding the entire ecosystem in which all businesses operate, and the erosion of trust has considerable consequences for everyone. ...

The HealthEquity Data Breach: Key Takeaways
In a recent podcast interview with Cybercrime Magazine's host, David Braue, Cyber Expert, Author of "Hacked Again," and CEO of Berkeley Varitronics Systems, Scott Schober discusses the potential repercussions of the HealthEquity ...