Cybercrime 2024
Cybercriminals have adapted their methods in 2024 and are increasingly targeting mobile devices and the cryptocurrency sector.
Thousands of TP-Link Archer routers as target
Security researchers from the threat research team at Cato Networks have identified a new threat: the IoT botnet “Ballista”. This malware exploits a serious vulnerability in TP-Link Archer routers to spread unhindered across the internet.
Hackers infiltrate over 330 malicious apps into Google Play
Cyber criminals have managed to bypass Android’s security mechanisms and infect over 60 million users worldwide with malware. Experts from Bitdefender Labs discovered a large-scale malware campaign with over 330 infected apps.
Ransomware group develops brute force framework
The ransomware group BlackBasta has developed a powerful tool to automate brute force attacks on edge network devices such as firewalls and VPNs. The framework, called “BRUTED”, allows attackers to crack targeted credentials and scale ransomware attacks on vulnerable networks.
Nationwide cyber attack in the USA
The series Zero Day deals with the current cyber threat landscape and addresses the consequences of a large-scale cyberattack in the USA. For exactly one minute, electricity, mobile networks, server systems, traffic control systems, and air traffic control systems fail simultaneously across the entire country. The attack costs over
Cyber espionage on a new level
The notorious advanced persistent threat (APT) group SideWinder has refined its attack tactics and significantly expanded its geographical reach. According to recent analyses by Kaspersky, the group is now specifically targeting nuclear power plants and energy facilities.
Cybersecurity Alert
Cybercriminals are becoming more sophisticated, and one of the most dangerous tactics they use against businesses is spear phishing. Unlike traditional phishing, which involves sending mass emails to random recipients, spear phishing is highly targeted.
On the Trail of a Cybercrime Titan
He is one of the most colorful figures in the hacker scene: IntelBroker repeatedly makes headlines with spectacular attacks on well-known companies. But who is this hacker? What motivates him? And what’s next for us?
Best Practices
Since the discovery of LLMJacking by the Sysdig Threat Research Team (TRT) in May 2024, this threat vector has evolved rapidly. Just as large language models (LLMs) are constantly improving and finding new applications, cybercriminals are also adapting and using new ways to gain unauthorized access to these powerful
IT-Dienstleistungszentrum (ITDZ Berlin)
Berlin
A.T.U Auto-Teile-Unger GmbH & Co. KG
Weiden in der Oberpfalz, Home Office
Hörmann Deutschland
Steinhagen (Westfalen)
Meistgelesene Artikel
1. Dezember 2025
1. Dezember 2025
19. November 2025
19. November 2025
15. November 2025