TechDay US - America's technology news network

Cybercrime stories - Page 2

Any use of network connected electronic devices such as computers or smartphones for criminal activity is classified as cybercrime. With a long history starting with the misuse of telephone systems (such as ‘phreaking’), cybercrime today includes the creation and distribution of viruses, ransomware, keyloggers and other malware, the download and use of malware produced by others, social engineering tactics such as phishing or (physical) impersonation, the theft and use of credentials for accessing computer systems or networks, and the theft of privileged data. Cybercrime is a broad and dynamic field, with cybercriminals constantly adapting their methods in pursuit of usually financial goals, but also occasionally seeking to disrupt, embarrass or shame their targets.
Editorial illustration corporate criminal network ops map servers

HPE Threat Labs spot industrialised cybercrime surge

Last month
#
malware
#
firewalls
#
vpns
HPE Threat Labs warns cybercrime now runs like big business, as AI-fuelled, industrial-scale attacks hammer government and finance.
Editorial world map middle east highlight network warning lines

NCC Group warns Iran cyber threats spread worldwide

Last month
#
gaming
#
firewalls
#
network security
Iran-linked cyber attacks are spreading beyond the Middle East, with firms tied to Israel or the US warned they face heightened global risk.
Editorial law enforcement disabling global botnet world map routers

US-led raid disrupts record DDoS botnets worldwide

Last month
#
malware
#
firewalls
#
ddos
US, Canadian and German authorities have dismantled four record-breaking IoT DDoS botnets that hijacked over three million devices worldwide.
Shadowy criminal hand manipulating malware ad tracker web illustration

Cybercrooks abuse Keitaro tracker for AI scam campaigns

Last month
#
malware
#
phishing
#
martech
Cybercriminals exploit Keitaro ad tracker to cloak AI trading scams and malware, tying some 15,500 malicious domains into a hidden network.
Ad tracking abuse fake investment phishing malware web illustration

Keitaro ad tracker tied to more than 15,000 scam domains

Last month
#
malware
#
phishing
#
martech
Keitaro ad tracker abused in 15,500 scam and malware domains, as fraudsters cloak AI-themed investment lures from security watchdogs.
Sam peters

From fragmentation to focus: Can one security framework simplify compliance?

Last month
#
data protection
#
digital transformation
#
advanced persistent threat protection
As cyber risks and red tape surge, firms turn to ISO 27001 as a unified framework to tame fragmented compliance and build digital trust.
Digital shield protecting professionals from online scams illustration

OXIL urges safeguarding framework to curb online scams

Last month
#
cx
#
martech
#
cybersecurity
OXIL unveils a safeguarding-based blueprint to fight online scams, shifting responsibility from individuals to coordinated organisational action.
Moody server room red alert cracked shield cyber vulnerabilities

Rapid7 warns exploited software flaws more than double

Last month
#
firewalls
#
ransomware
#
network security
Rapid7 warns exploited high and critical software flaws more than doubled in 2025, as attackers compress disclosure-to-attack windows.
Dns web shields cutting malicious red nodes early cybercrime stop

Netcraft tool targets malicious domains before attacks

Last month
#
phishing
#
advanced persistent threat protection
#
email security
Netcraft unveils Preemptive Domain Disruption to knock out attacker domains in their dormant phase before phishing and BEC scams launch.
Moody corporate night office fileless ransomware cloud lock reflection

LeakNet adopts ClickFix lures & Deno fileless loader

Last month
#
storage
#
uc
#
firewalls
Ransomware group LeakNet adopts ClickFix lures and a Deno-based fileless loader to scale attacks and evade traditional endpoint defences.
Browser extension thief mask crypto coin shield wallet protection

Okta helps disrupt ShieldGuard crypto-stealing extension

Last month
#
mfa
#
crypto
#
phishing
Okta and partners pull rogue ShieldGuard Chrome extension that stole crypto wallet data and bypassed browser defences via custom code.
Corporate cyberattack command center world map dashboards scene

HPE report warns cyberattacks now run like big business

Last month
#
malware
#
firewalls
#
vpns
HPE warns cybercriminals now run attacks like global enterprises, using repeatable workflows, automation and AI to outpace defences.
Nighttime soc analysts ai network maps nvidia green crowdstrike red

CrowdStrike & Nvidia deepen AI-driven security ops pact

Last month
#
firewalls
#
network security
#
cloud security
CrowdStrike deepens its Nvidia tie-up to embed agentic AI in security ops, claiming faster MDR investigations and sharper triage accuracy.
Glowing fintech network shield smartphone fingerprint security

XConnect & SONIO team up to fight fraud in fintech

Last month
#
gaming
#
data protection
#
mfa
XConnect links its mobile network fraud signals into SONIO's identity platform to tighten onboarding and compliance for fintech and gambling.
Dark banking office ai driven global financial crime laundering

AI-fuelled crime drives illicit funds to $4.4 trillion

Last month
#
fintech
#
phishing
#
email security
AI-fuelled scams help push illicit finance to an estimated USD $4.4 trillion in 2025, with fraud losses hitting USD $579.4 billion.
Ai cyberattack shadow figure robotscreens red alarm extortion

AI agents drive surge in cyber threats & extortion

Last month
#
malware
#
data protection
#
ransomware
AI agents are fuelling a new wave of cyber risk, as criminals weaponise automation to speed up ransomware and sharpen extortion tactics.
Modern bank ops room digital world map fraud monitoring scene

Finastra adds real-time AI fraud checks to payments

Last month
#
saas
#
crypto
#
fintech
Finastra is embedding FraudAverse's AI-driven fraud checks into its Financial Messaging platform to secure real-time global and instant payments.
Moody cloud padlock human silhouettes identity theft pixels

Cloud identity compromise now drives most cyber attacks

Last month
#
malware
#
uc
#
firewalls
Cloud identity compromise now drives over 80% of cyber incidents, as attackers increasingly abuse trusted accounts and workplace tools.
Cinematic laptop deepfake face binary code broken locks quantum ai

IBM warns AI & quantum threats will reshape cybercrime

Last month
#
malware
#
data protection
#
ransomware
IBM warns shadow AI, deepfakes and quantum threats will reshape cyber risk by 2026, as autonomous agents speed breaches and ransomware.
Untitled design   2026 03 10t211837.920

Wireless CVEs surge, exposing hidden risks for AI centres

Last month
#
uc
#
firewalls
#
surveillance
Wireless flaws have surged 230-fold since 2010, as Bastille warns AI data centres and critical infrastructure face escalating unseen risks.