Global smishing campaigns linked to Chinese cybercriminals escalate with Smishing Triad’s new tools and techniques
Global smishing campaigns linked to Chinese cybercriminals escalate with Smishing Triad’s new tools and techniques
Cybersecurity researchers have lifted the lid on two threat actors that orchestrate investment scams through spoofed celebrity endorsements and conceal their activity through traffic distribution systems (TDSes).
The activity clusters have been codenamed Reckless Rabbit and Ruthless Rabbit by DNS threat intelligence firm Infoblox.
The attacks have been observed to lure victims with bogus
Discover key lessons from Take Command 2025 on building proactive, resilient cybersecurity defenses. Watch Ted Harrington’s full session on demand.
Individuals allegedly linked to the DragonForce cybercriminal syndicate have claimed the attack on the three UK retailers
It wasn’t ransomware headlines or zero-day exploits that stood out most in this year’s Verizon 2025 Data Breach Investigations Report (DBIR) — it was what fueled them. Quietly, yet consistently, two underlying factors played a role in some of the worst breaches: third-party exposure and machine credential abuse.
According to the 2025 DBIR, third-party involvement in breaches doubled
Reporting on the rise of fake students enrolling in community college courses:
The bots’ goal is to bilk state and federal financial aid money by enrolling in classes, and remaining enrolled in them, long enough for aid disbursements to go out. They often accomplish this by submitting AI-generated work. And because community colleges accept all applicants, they’ve been almost exclusively impacted by the fraud.
The article talks about the rise of this type of fraud, the difficulty of detecting it, and how it upends quite a bit of the class structure and learning community…
Prolific PhaaS operation Darcula uses Magic Cat software to steal over 800,000 cards in a seven-month period
The National Cyber Security Centre has published advice for retailers while the Co-op admits customer data was stolen
On this special episode of Afternoon Cyber Tea, Ann brings listeners inside the 2025 RSA Conference to explore the intersection of AI, quantum computing and cyber resiliency with two visionary experts: Massachusetts Institute of Technology’s Vinod Vaikuntanathan and Dr. Sasha O’Connell from The Aspen Institute. Vinod shares how quantum computing poses a serious threat to current encryption methods and explains the urgent need for post-quantum cryptography, while Sasha shares her non-technical path into cybersecurity, her work leading Aspen Digital’s global policy efforts and the launch of the new public campaign aimed at making cybersecurity accessible and actionable for everyone.
ERPNext 14.82.1 – Account Takeover via Cross-Site Request Forgery (CSRF)