A British national’s confession exposes a sophisticated campaign of phishing and SIM swapping that netted millions in cryptocurrency from major U.S. firms. Here’s how the cybercriminals did it—and what it means for the future of digital security.
Tyler Buchanan, a 24-year-old from Dundee, led a high-profile hacking ring dubbed Scattered Spider, stealing at least $8 million from US companies and individuals through smishing and SIM swapping. His guilty plea marks a milestone in the global fight against English-speaking cybercriminal collectives.
Cybercriminals are abusing Apple's legitimate account change alert emails to embed phishing messages, increasing the risk of users falling for scams that appear authentic. This feature explores the mechanics of the attack and offers tips for staying secure.
Tycoon 2FA’s disruption has splintered the phishing-as-a-service world, leading to a rise in attacks and a new generation of cybercrime platforms.
The takedown of Tycoon 2FA didn’t stop phishing—it scattered its tools and talent, sparking a surge in device code phishing attacks and empowering rival cybercriminal groups.
A wave of sophisticated Android malware—RecruitRat, SaferRat, Astrinox, and Massiv—is targeting banking, crypto, and job-seeking apps using phishing, smishing, and advanced overlay tactics. Here’s what you need to know to stay safe.
Rhode-White, a key player in construction supplies, fell victim to a sophisticated ransomware attack. Our investigation reveals the tactics used by cybercriminals, the vulnerabilities exploited, and the lessons the industry must learn.
AI-powered phishing and sophisticated cyberattacks are exposing the weaknesses in traditional MSP defenses. Learn why combining prevention, detection, and fast recovery is now vital for cyber resilience.
In Q4 2025, a sophisticated phishing campaign unleashed the XWorm backdoor across industrial control systems worldwide, revealing critical security gaps even as overall malware activity declined. Oil and gas sectors were hit hardest, with attackers exploiting email and removable media to bypass defenses.
A dramatic surge in phishing campaigns has exposed how attackers are abusing n8n automation webhooks to deliver malware and track victims, turning trusted workflow platforms into cybercrime tools.