article thumbnail

Lemon Group gang pre-infected 9 million Android devices for fraudulent activities

Security Affairs

The Lemon Group cybercrime ring has reportedly pre-installed malware known as Guerilla on almost 9 million Android devices. A cybercrime group tracked has Lemon Group has reportedly pre-installed malware known as Guerilla on almost 9 million Android devices.

Mobile 87
article thumbnail

Lockbit gang leaked data stolen from global high-tech giant Thales

Security Affairs

ransomware gang started leaking the information allegedly stolen from the global high-tech company Thales. The Lockbit 3.0 Thales is a global high-tech leader with more than 81,000 employees worldwide.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Kingston Technology Wins Coveted Global InfoSec Awards During RSA Conference 2021

CyberSecurity Insiders

As breaches become more frequent and costly, using encrypted drives can easily and economically avoid the nightmare caused by losing data on unencrypted storage devices.”. “We For more information visit kingston.com. We are managed and published by and for ethical, honest, passionate information security professionals.

InfoSec 40
article thumbnail

Gulf countries came under hackers’ spotlight in 2018, with more than 130 000 payment cards compromised

Security Affairs

CEO of NGN International, Yaqoob AlAwadhi stated that, from 2017 to 2018, cybercrimes aimed at financial thefts increased significantly with cyber-criminals largely exploiting software vulnerabilities through phishing mailings and hacked legal resources. Map of Middle-Eastern Countries.

article thumbnail

Analyzing IP Addresses to Prevent Fraud for Enterprises

Security Affairs

In recent years, users have seen the unsettling results of monitoring technologies, hyper-personalization, and big data. He holds a degree of Computer Science from Iqra University and specializes in Information Security & Data Privacy. How Do Cybercriminals Hide Behind IP Addresses? Pierluigi Paganini.

Internet 124