Researchers reveal hidden fortunes and surprising underestimations in cybercrime revenue

Credit: CC0 Public Domain To what extent methodological limitations and incomplete data impact the revenue estimations of cybercriminal groups using the Bitcoin blockchain was largely unknown. A new study, conducted…

What is Storm-1152, alleged top creator of fake Microsoft accounts?

Microsoft has seized the websites of Storm-1152, a Vietnam-based group it says is responsible for creating hundreds of millions of fake accounts. Microsoft has seized the websites of a Vietnam-based…

Guidance on evaluating a privacy protection technique for the AI era

Evaluating any claim to differential protection requires examining every component of the differential privacy pyramid. Its top level contains the most direct measures of privacy guarantees, including epsilon, which is…

Are we witnessing the death of the password?

Credit: CC0 Public Domain Once considered a near iron-clad weapon of defense against cyber criminals, the password has begun to fall from grace. Effective passwords often require human efforts that…

Japan space agency likely penetrated by cyber attack

Credit: Pixabay/CC0 Public Domain Japan’s space agency was likely penetrated by a cyber attack this year by unknown entities but no sensitive information about rockets or satellites was accessed, officials…

‘Ineffable cryptography’ to protect critical infrastructure from cyber attacks

Credit: Sora Shimazaki from Pexels Australia’s critical infrastructure—including ports, energy grids and water supplies—reported 143 cyber attacks over the past year, up from 95 incidents the year before. In response…

What is LockBit, the cybercrime gang hacking some of the world’s largest organizations?

Credit: Pixabay/CC0 Public Domain While ransomware incidents have been occurring for more than 30 years, only in the last decade has the term “ransomware” appeared regularly in popular media. Ransomware…

Fake IDs for sale on the dark web

Internet crime. Credit: University of Technology Sydney. AI generated. Counterfeit Australian identity documents, especially driver’s licenses, rank among some of the most frequently listed and sold identity documents on anonymous…

Stellantis production affected by cyberattack at auto supplier

Credit: Pixabay/CC0 Public Domain Production at the maker of Chrysler, Dodge, Jeep and Ram models is being affected after a cyberattack on an automotive supplier disrupted its operations, the automaker…

Australian ports reopen after cyberattack

DP World cranes at Port Botany in Sydney on November 13. Major ports handling 40 percent of Australia’s freight trade have reopened, operator DP World said Monday, three days after…