Robuta

https://directcorporaterisks.com/news/how-cybercriminals-target-the-construction-industry/
Oct 20, 2025 - Cybercriminals are targeting UK construction with fake invoices & payment scams. Learn how cyber insurance protects your business from loss.
construction industrycybercriminalstargetdirectcorporate
https://www.resecurity.com/blog/article/doomsday-for-cybercriminals-data-breach-of-major-dark-web-foru
data breachdoomsdaycybercriminalsmajordark
https://thehackernews.com/2024/11/cybercriminals-exploit-popular-game.html
Hackers misuse Godot Engine in the GodLoader campaign, infecting 17,000+ systems undetected via GitHub.
popular gamecross platformcybercriminalsexploitengine
https://www.helpnetsecurity.com/2022/04/07/charity-donation-scams-video/
Charles Brook from Tessian, talks about how cybercriminals have taken advantage of the crisis in Ukraine to create charity donation scams.
taking advantagethe ukrainecybercriminalscrisiscreate
https://www.helpnetsecurity.com/2009/09/04/cybercriminals-exploit-california-bush-fires/
Cybercriminals are not known for their high moral standards, so it comes as no surprise they are using people's concern and interest regarding the
bush firescybercriminalsexploitcaliforniahelp
https://thehackernews.com/2024/10/cybercriminals-use-unicode-to-hide.html?m=1
New Mongolian Skimmer uses Unicode obfuscation to steal financial data from e-commerce sites, evading detection.
in ecybercriminalsuseunicodehide
https://www.sophos.com/en-us/blog/beyond-the-kill-chain-what-cybercriminals-do-with-their-money-part-1
Sophos X-Ops investigates what financially motivated threat actors invest their ill-gotten profits in, once the dust has settled
the killbeyondchaincybercriminalsmoney
https://thehackernews.com/2024/08/cybercriminals-abusing-cloudflare.html
Cloudflare's TryCloudflare is being exploited by cybercriminals for malware delivery via phishing emails, reports say.
cybercriminalsabusingcloudflaretunnelsevade
https://www.trendmicro.com/vinfo/it/security/news/cybercrime-and-digital-threats/from-bounty-to-exploit-cybercriminals-use-crowdsourcing-for-new-attacks
From articles to hackathons, cybercriminals are resorting to crowdsourcing to find more ways to exploit systems. In this article, we tackle these contests,...
bountyexploitcybercriminalsusecrowdsourcing
https://www.astro.co.uk/under-attack/
I think I am generally aware of the potential of a cyber-attack at all times. I also believe I know what to do in the event of an attack. However, the moment I...
under attackthe dayon mecybercriminalslaunched
https://www.helpnetsecurity.com/2011/03/31/cybercriminals-and-their-favorite-baits/
According to PandaLabs research, 25 percent of sites used video and multimedia content as bait; 21.63 percent referred to installers or program updates;
cybercriminalsfavoritebaitshelpnet
https://www.trendmicro.com/en_us/research/24/e/router-roulette.html
This blog entry aims to highlight the dangers of internet-facing routers and elaborate on Pawn Storm's exploitation of EdgeRouters, complementing the FBI's...
nation statesrouterroulettecybercriminalssharing
https://www.digitaljournal.com/tech-science/cybercriminals-are-seeking-more-sophisticated-data-streams/article
Phishing and stolen (or compromised) credentials were the two most common initial attack vectors.
cybercriminalsseekingsophisticateddatastreams
https://thehackernews.com/2023/07/cybercriminals-exploiting-woocommerce.html?version=meter+at+null
A critical security flaw in the WooCommerce Payments WordPress plugin (CVE-2023-28121) is being actively exploited by threat actors.
cybercriminalsexploitingwoocommercepaymentsplugin
https://www.trendmicro.com/vinfo/fr/security/news/cybercrime-and-digital-threats/foreseeing-a-new-era-cybercriminals-using-machine-learning-to-create-highly-advanced-threats
We listed a rundown of PoCs and real-life attacks where machine learning was weaponized to get a clearer picture of what is possible and what is already a...
a new erausing machinelearning toforeseeingcybercriminals
https://www.cbsnews.com/video/ransomware-cyberattacks-60-minutes-video-2021-06-06/
Targets have included hospitals and municipalities, but the FBI says anyone on the internet should expect to be attacked by cybercriminals. Scott Pelley...
the bestcybercriminalsholddatahostage
https://www.knowbe4.com/press/cybercriminal-mindset-cybersecurity-leaders-kb4-con-emea
Understanding the Mindset of Cybercriminals: Cybersecurity Leaders To Speak at KB4-CON EMEA 6 October
understandingmindsetcybercriminalscybersecurityleaders
https://www.mcafee.com/blogs/internet-security/cookie-theft-how-to-keep-cybercriminals-out-of-your-accounts/
Jun 20, 2024 - Chocolate chip, oatmeal raisin, snickerdoodle: Cybercriminals have a sweet tooth just like you. But their favorite type of cookie is of the browser
how toout ofkeepcybercriminalsaccounts
https://www.sophos.com/en-gb/blog/beyond-the-kill-chain-what-cybercriminals-do-with-their-money-part-1
Sophos X-Ops investigates what financially motivated threat actors invest their ill-gotten profits in, once the dust has settled
the killbeyondchaincybercriminalsmoney
https://www.sophos.com/ja-jp/press/press-releases/2019/04/cybercriminals-attack-cloud-server-honeypot-within-52-seconds
Sophos (LSE: SOPH), a global leader in network and endpoint security, today announced the findings of its report, Exposed: Cyberattacks on Cloud Honeypots,...
cloud servercybercriminalsattackhoneypotwithin
https://www.ftc.gov/business-guidance/blog/2026/01/recognize-data-privacy-day-protecting-your-small-business-cybercriminals
Your small business likely has had many milestones. Hiring your first employee. Opening your doors for the first time. Making your first sale. But some...
data privacy daysmall businessrecognizeprotecting
https://technologica.com/en/cybercriminals-attack-through-the-weakest-point/
Interview by Georgi Dukov, head of Security Solutions at TechnoLogica, for "Economy + Cybersecurity" special edition of the Economics magazine, issue 114 - Mr...
through thecybercriminalsattackweakestpoint
https://cointelegraph.com/news/cybercriminals-attack-godaddy-based-cryptocurrency-platforms
Using the same tools the notorious Twitter hacker employed over the summer, an attacker managed to take control of two crypto domains registered with GoDaddy
cybercriminalsattackgodaddybasedcryptocurrency
https://www.trendmicro.com/en_us/research/24/e/router-roulette.html?cjdata=MXxZfDB8WXww&PID=100017430&SID=100098X1555750X727462dd51987999189398bfc5138b71&cjevent=919757ab093411ef82ba0cf00a82b832
This blog entry aims to highlight the dangers of internet-facing routers and elaborate on Pawn Storm's exploitation of EdgeRouters, complementing the FBI's...
nation statesrouterroulettecybercriminalssharing
https://www.helpnetsecurity.com/2026/01/21/children-cybercrime-recruitment/
Children are being drawn into cybercrime through online recruitment that looks harmless at first but carries serious consequences.
the languageyoung peoplecybercriminalsspeaktrust
https://www.infosecurity-magazine.com/news/browser-push-notifications-deliver/
Dec 10, 2025 - Researchers at BlackFrog have uncovered Matrix Push C2, a malicious command-and-control system that abuses web browser push notifications to deliver malware
push notificationscybercriminalsexploitbrowserdeliver
https://rhisac.org/threat-intelligence/rmm-tools/
Nov 4, 2025 - A financially motivated threat cluster has been actively targeting the freight and logistics industry since at least June 2025 in a cyber-enabled cargo theft
rhisaccybercriminalsexploitrmm
https://www.infosecurity-magazine.com/news/criminals-lookalike-domains-email
BlueVoyant found that the use of lookalike domains in email-based attacks is allowing actors to extend the types of individuals and organizations being targeted
cybercriminalsexpanduselookalikedomains
https://www.duocircle.com/dmarc/how-cybercriminals-use-dns-hijacking-to-bypass-dmarc-policies
Email authentication protocols like SPF, DKIM, and DMARC are supposed to stop attackers from pretending to be you and dupe your clients. But what if they
dns hijackingcybercriminalsusebypassdmarc
https://www.spacewar.com/reports/Visas_247_war_room_takes_on_global_cybercriminals_999.html
Ashburn, United States (AFP) July 7, 2025 - In the heart of Data Center Alley - a patch of suburban Washington where much of the world's internet traffic flows...
war roomvisatakesglobalcybercriminals
https://securelist.com/flying-phishers-cybercriminals-targeting-frequent-flyer-miles/30854/
Miles stolen from customers are becoming a new kind of currency among Brazilian cybercriminals and phishers, who can use them to issue tickets for themselves,...
frequent flyer milesflyingphisherscybercriminalstargeting
https://www.kaspersky.com.au/blog/how-scammers-attack-young-gamers-2024/34069/
Sep 6, 2024 - Our new report investigates cyberthreats aimed at child gamers.
the mostcybercriminalsattackyounggamers
https://thehackernews.com/2023/09/cybercriminals-using-new-asmcrypt.html
Cybercriminals are currently employing ASMCrypt, an advanced iteration of DoubleFinger, to evade detection by security tools.
to flycybercriminalsusingnewmalware
https://thehackernews.com/2024/04/malicious-apps-caught-secretly-turning.html
Android VPN apps hijacking devices, covertly turning them into proxy nodes for threat actors and fueling botnet operations.
android phonesmaliciousappscaughtsecretly
https://www.malwarebytes.com/blog/news/2017/11/cryptocurrency-works-cybercriminals-love
Nov 2, 2017 - Ever stumble into a conversation about Bitcoin and wonder, "What is cryptocurrency, anyway?" Read on to learn how it works and why cybercriminals...
what islove itcryptocurrencycybercriminalsmalwarebytes
https://www.sgtlabs.com/blog/why-ai-is-the-new-weapon-of-choice-for-cybercriminals/
Oct 15, 2025 - Cybersecurity isn’t what it used to be. With artificial intelligence (AI) entering the battlefield, cybercriminals are automating threats and customizing...
weapon of choicethe newaicybercriminals
https://thehackernews.com/2025/02/cybercriminals-use-axios-and-node-fetch.html?m=1
78% of Microsoft 365 tenants faced ATO attempts by late 2024, with attackers using HTTP clients like Axios and Node Fetch.
cybercriminalsusegonodefetch
https://res-q-rity.com/cybercriminals-exploit-crowdstrike-update-mishap/
Cybercriminals are exploiting CrowdStrike's recent update mishap to distribute Remcos RAT malware, targeting Latin American customers.
res qcybercriminalsexploitcrowdstrikeupdate
https://winbuzzer.com/2024/06/18/fake-error-messages-trick-users-into-installing-malware-xcxwbn/
Nov 7, 2024 - The threat actors employ JavaScript within HTML attachments and hijacked websites to generate fake error notifications.
cybercriminalsexploitchromeworderrors
https://www.csoonline.com/article/3850783/11-ways-cybercriminals-are-making-phishing-more-potent-than-ever.html
Mar 25, 2025 - Cybercriminals are switching up tactics for their social engineering trickery to increase authenticity, better bypass filters, and more intentionally target...
wayscybercriminalsmakingphishingpotent
https://www.helpnetsecurity.com/2018/03/16/cybercriminals-launder-money/
Many cybercriminals are using virtual currency to make property purchases which convert illegal proceeds into legitimate cash and assets.
launder moneyprivate islandscrypto currencycybercriminalsmansions
https://www.sophos.com/en-gb/blog/beyond-the-kill-chain-what-cybercriminals-do-with-their-money-part-3
In the third of our five-part series, Sophos X-Ops explores the more legally and ethically dubious business interests of financially motivated threat actors
the killbeyondchaincybercriminalsmoney
https://www.mcafee.com/blogs/internet-security/5-online-gaming-tips-to-stay-safe-from-hackers/
Vanquishing aliens, building virtual amusement parks, mashing buttons in online battles royale. For some, playing video games is a way to unwind from the...
online gamingstay safetipscybercriminalsmcafee
https://www.republicworld.com/india/gurugram-21-cybercriminals-arrested-for-duping-rs-125-cr-in-fraud-cases
Twenty-one cybercriminals were arrested here for allegedly duping scores of people across the country.
gurugramcybercriminalsarresteddupingrs
https://www.techzine.eu/news/security/122112/companies-increasingly-re-victimized-by-cybercriminals/
Jul 10, 2024 - Cybercriminals are increasingly trying to extort companies multiple times using the same captured data, according to Orange Cyberdefense.
companiesincreasinglyvictimizedcybercriminalsglobal
https://securityboulevard.com/2025/11/ai-cybercriminals-target-black-friday-and-cyber-monday/
Nov 26, 2025 - AI-enabled cybercriminals are exploiting the holiday shopping season, forcing retailers to adopt real-time, adaptive defenses to keep pace.
black fridaycyber mondaysecurity boulevardaicybercriminals
https://thehackernews.com/2023/11/cybercriminals-using-telekopye-telegram.html
Beware of Telekopye: The malicious Telegram bot used by the "Neanderthals" for large-scale phishing scams. It crafts phishing websites and emails.
telegram botphishing scamscybercriminalsusingcraft
https://www.itpro.com/607134/cybercriminals-exploiting-the-human-to-steal-data
A new McAfee report shows criminals are increasingly targeting the human, rather than the technology, to steal personal data.
it procybercriminalsexploitinghumansteal
https://www.proofpoint.com/uk/resources/webinars/digital-first-security-awareness
Criminals capitalise on fear, uncertainty and anxiety. They socially engineer and exploit people by leveraging topical lures that are more likely to get people...
people againsteducatingcybercriminalslatesttactics
https://www.helpnetsecurity.com/2012/03/29/cybercriminals-increasingly-target-financial-services-industry/
A report published this week by PricewaterhouseCoopers (PwC) has revealed that the financial services sector is the most common target of cybercriminals,
financial services industrycybercriminalsincreasinglytargethelp
https://www.malwarebytes.com/cybersecurity/basics/dark-web-monitoring
Mar 7, 2025 - Learn what dark web monitoring is, how it works, and how to protect your data before criminals exploit it.
dark web monitoringyour dataprotectcybercriminals
https://www.paloaltonetworks.com/resources/podcasts/threat-vector-from-nation-states-to-cybercriminals-ais-influence-on-attacks-with-wendi-whitmore
nation statescybercriminalsaiinfluenceattacks