Cybercrime

Cybercrime news and articles. Stay up to date with the latest cyber crime trends. Enjoy exciting stories of cyebrcriminals. From carders and darkweb drug dealers to some nation state sponsored hackers. The Cyber Post brings you world wide cyber security news dedicated to cyber-crime.

In today’s digital age criminals are always lurking on the web. Whether it be phishing attacks or straight up digital extortion, many threats exist. But the cyber post is here to educate its readers. Learn from experts and cybersec industry vets on how you can better protect your data. Enjoy reading on how thieves and hackers employ tricks to steal your personal information. So then you can use this information to better protect your own identity.

Entra ID Data Protection: Essential or Overkill?

0
Microsoft Entra ID (formerly Azure Active Directory) is the backbone of modern identity management, enabling secure access to the applications, data, and services your business relies on. As hybrid...

Third Parties and Machine Credentials: The Silent Drivers Behind 2025’s Worst Breaches

0
It wasn't ransomware headlines or zero-day exploits that stood out most in this year's Verizon 2025 Data Breach Investigations Report (DBIR) — it was what fueled them. Quietly, yet...

Automating Zero Trust in Healthcare: From Risk Scoring to Dynamic Policy Enforcement Without Network...

0
The Evolving Healthcare Cybersecurity Landscape Healthcare organizations face unprecedented cybersecurity challenges in 2025. With operational technology (OT) environments increasingly targeted and the convergence of IT and medical systems creating...

ToyMaker Uses LAGTOY to Sell Access to CACTUS Ransomware Gangs for Double Extortion

0
Apr 26, 2025Ravie LakshmananMalware / Vulnerability Cybersecurity researchers have detailed the activities of an initial access broker (IAB) dubbed ToyMaker that has been observed handing over access to double extortion...

⚡ Weekly Recap: Critical SAP Exploit, AI-Powered Phishing, Major Breaches, New CVEs & More

0
Apr 28, 2025Ravie LakshmananCybersecurity / Hacking News What happens when cybercriminals no longer need deep skills to breach your defenses? Today's attackers are armed with powerful tools that do the...

SentinelOne Uncovers Chinese Espionage Campaign Targeting Its Infrastructure and Clients

0
Cybersecurity company SentinelOne has revealed that a China-nexus threat cluster dubbed PurpleHaze conducted reconnaissance attempts against its infrastructure and some of its high-value customers. "We first became aware of this...

RansomHub Went Dark April 1; Affiliates Fled to Qilin, DragonForce Claimed Control

0
Cybersecurity researchers have revealed that RansomHub's online infrastructure has "inexplicably" gone offline as of April 1, 2025, prompting concerns among affiliates of the ransomware-as-a-service (RaaS) operation. Singaporean cybersecurity company Group-IB...

Nebulous Mantis Targets NATO-Linked Entities with Multi-Stage Malware Attacks

0
Cybersecurity researchers have shed light on a Russian-speaking cyber espionage group called Nebulous Mantis that has deployed a remote access trojan called RomCom RAT since mid-2022. RomCom "employs advanced evasion...

U.S. Charges Yemeni Hacker Behind Black Kingdom Ransomware Targeting 1,500 Systems

0
The U.S. Department of Justice (DoJ) on Thursday announced charges against a 36-year-old Yemeni national for allegedly deploying the Black Kingdom ransomware against global targets, including businesses, schools, and...

Hackers Abuse Russian Bulletproof Host Proton66 for Global Attacks and Malware Delivery

0
Apr 21, 2025Ravie LakshmananVulnerability / Threat Intelligence Cybersecurity researchers have disclosed a surge in "mass scanning, credential brute-forcing, and exploitation attempts" originating from IP addresses associated with a Russian bulletproof...