Remove Cryptocurrency Remove CSO Remove Cybercrime
article thumbnail

New UN cybercrime convention has a long way to go in a tight timeframe

CSO Magazine

Cybercrime is a growing scourge that transcends borders, spreading across the boundaries of virtually all the world's nearly 200 nation-states. From ransomware attacks to rampant cryptocurrency theft, criminal exploitation of borderless digital systems threatens global economic security and the political welfare of all countries.

article thumbnail

Hard-to-detect malware loader distributed via AI-generated YouTube videos

CSO Magazine

The Aurora infostealer is written in Go and is operated as a malware-as-a-service platform that's advertised on Russian-language cybercrime forums.

Malware 120
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Coinbase Hacked and Turns the Tables on the Cybercriminals!

Security Boulevard

This is how you handle cybercrime digital extortion! My absolute congratulations and respect to Coinbase executive leadership: Brian Armstrong CEO, Jeff Lunglhofer CISO, and Philip Martin CSO The post Coinbase Hacked and Turns the Tables on the Cybercriminals! Coinbases answer: NO! appeared first on Security Boulevard.

Hacking 66
article thumbnail

3CX Hit with Massive Supply Chain Attack

SecureWorld News

Lazarus has gained notoriety over the last few years with some high-profile incidents, including targeting cryptocurrency and blockchain organizations, as well as the energy sector in the U.S., We have a security team, we do our own pentesting, we've got software scanners, we got a CSO of course. Canada, and Japan.

CSO 90
article thumbnail

Fake LinkedIn CISO Profiles Target Top Companies

SecureWorld News

RELATED: Are Chinese Spies Trying to Connect with You on LinkedIn?

CISO 96
article thumbnail

Cybersecurity Snapshot: CISA Warns of Global Spear-Phishing Threat, While OWASP Releases AI Security Resources

Security Boulevard

Unraveling the True Security Risks ” (SecurityWeek) “ How deepfakes threaten biometric security controls ” (TechTarget) “ Deepfakes break through as business threat ” (CSO) 3 - Fake update variants dominate list of top malware in Q3 Hackers are doubling down on fake software-update attacks.