FBI-CBI Bust Illegal Call Centre That Duped US Citizens, $40M Cybercrime Nexus Dismantled | World News | #cybercrime | #infosec

[ad_1] Last Updated:August 28, 2025, 10:37 IST India’s CBI and the US FBI dismantled a cybercrime syndicate that defrauded US nationals of nearly USD 40 million via tech-support scams. Image used for representation In a major breakthrough, India’s Central Bureau of Investigation (CBI), in coordination with the US Federal Bureau of Investigation (FBI), has successfully […]

Storm-0501 Exploits Entra ID to Exfiltrate and Delete Azure Data in Hybrid Cloud Attacks | #ransomware | #cybercrime

[ad_1] The financially motivated threat actor known as Storm-0501 has been observed refining its tactics to conduct data exfiltration and extortion attacks targeting cloud environments. “Unlike traditional on-premises ransomware, where the threat actor typically deploys malware to encrypt critical files across endpoints within the compromised network and then negotiates for a decryption key, cloud-based ransomware […]

Anthropic thwarts hacker attempts to misuse Claude AI for cybercrime | #cybercrime | #infosec

[ad_1] Security researchers warn that as AI models become more powerful, the risk of misuse will grow unless companies and governments act quickly [File] | Photo Credit: AP Anthropic said on Wednesday it had detected and blocked hackers attempting to misuse its Claude AI system to write phishing emails, create malicious code and circumvent safety […]

Leveraging blockchain for cybersecurity detection using hybridization of prairie dog optimization with differential evolution on internet of things environment | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware

[ad_1] This study develops and designs an LBCCD-GJO method for IoT. The proposed method’s major intention is to identify and classify cybersecurity in the blockchain-assisted IoT environment. To accomplish this, the proposed LBCCD-GJO model involves various stages, such as data pre-processing, feature extraction, classification, and a hyper-parameter tuning method. Figure 1 signifies the complete workflow of […]

First AI-Powered Ransomware Can Automate Attacks With Unprecedented Speed | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware

[ad_1] From the onset of the AI race, many have expressed fear about the potential abuse of AI, and many instances have proved that this fear is well-founded. A few months ago, a report revealed how hackers crack passwords with AI. Recently, the research team at ESET has also discovered what they consider the first […]

Cyberattack that crippled Nevada’s systems reveals vulnerability of smaller government agencies to hackers | #ransomware | #cybercrime

[ad_1] Las Vegas — Nevada officials revealed Wednesday that personal information may have been compromised in what was described as a “sophisticated ransomware-based cybersecurity attack” that occurred Sunday in which hackers infiltrated government networkers and disrupted essential services statewide. Nevada Gov. Joe Lombardo had initially said Monday there were no signs personal data was stolen. However, […]

Israeli child predator misses US court hearing, ordered to attend via video link | #childpredator | #kidsaftey | #childsaftey

[ad_1] An Israeli official accused of trying to meet a 15-year-old girl for sex outside Las Vegas has been ordered to appear via video link next week after he missed his arraignment hearing, local media reported. Tom Artiom Alexandrovich, a senior cybersecurity official with the Israeli government, was one of eight people arrested as part […]

National Cyber Security

FREE
VIEW