CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Hackers
Oldest
  • Latest
  • Oldest
  • Random
  • A to Z

Hackers

Ransomware hacker holding out hand with stolen Bitcoins
Cyber SecurityNews

When Hackers Have PR Departments: Tens of Thousands in Stolen Bitcoins Donated To Charity Organizations

November 6, 2020
Hackers donated thousands of dollars in stolen Bitcoins to various charitable causes. While it's unclear what the true motives are, the donations will almost certainly be forfeit.
Read More
Close up hand typing keyboard on laptop in darkness showing cyber criminals hacking
Cyber SecurityInsights

Cyber Criminal Warfare: How Hacker Behaviors Can Tell Us About Their Identities

June 7, 2021
Research links three major cybercriminal gangs to 30% of all global non-credit data breaches. Two Canadian teens are presumed to be directly attributed to roughly 42% of all non-credit card related data breaches that occurred between January 2017 to June of 2020.
Read More
Security locks with a fish hook on computer keyboard showing credential phishing using compromised accounts
Cyber SecurityNews

Hackers Accessed 91% Of Compromised Accounts Within a Week and Used Them To Send Bulk Credential Phishing Messages

June 18, 2021
Investigation showed that scammers manually access 91% of compromised accounts within a week, 50% within 12 hours, and used them to send bulk credential phishing messages.
Read More
Hacker typing on keyboard with dollar bill showing financial theft
Cyber SecurityNews

Threat Group Elephant Beetle Involved in Financial Theft of Millions Through Small Amounts Over Long Periods

January 14, 2022
Threat group commits financial theft by hiding inside the victims’ networks for months while studying their financial systems and injecting fraudulent transactions into regular activity.
Read More

Latest

Police car with roof mounted strobe lightbar showing law enforcement data breach

Data Breach on DEA Law Enforcement System Grants Cyber Criminals Access to 16 Databases

VPN logo on smartphone lying on laptop showing VPN providers to hand over customer data

VPN Providers Ordered by Indian Government To Hold All Customer Data for Five Years, Hand Over to Government Upon Request

National Stadium and residential buildings with mountains in the background in San Jose, Costa Rica showing Conti ransomware

Could a Cyber Attack Overthrow a Government? Conti Ransomware Group Now Threatening To Topple Costa Rican Government if Ransom Not Paid

USA map on digital display showing privacy regulations

Data Privacy Conundrum: When Different States Play by Different Rules. . .

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow Us

© 2022 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results