ChannelLife Canada - Industry insider news for technology resellers

Cybercrime stories - Page 10

Any use of network connected electronic devices such as computers or smartphones for criminal activity is classified as cybercrime. With a long history starting with the misuse of telephone systems (such as ‘phreaking’), cybercrime today includes the creation and distribution of viruses, ransomware, keyloggers and other malware, the download and use of malware produced by others, social engineering tactics such as phishing or (physical) impersonation, the theft and use of credentials for accessing computer systems or networks, and the theft of privileged data. Cybercrime is a broad and dynamic field, with cybercriminals constantly adapting their methods in pursuit of usually financial goals, but also occasionally seeking to disrupt, embarrass or shame their targets.
Dimly lit industrial control room multiple screens warning symbols cyber attack disruption

Ransomware attacks surge 28% in September as Industrials sector hit hardest

Thu, 30th Oct 2025
#
ransomware
#
advanced persistent threat protection
#
supply chain
Global ransomware attacks surged 28% in September, with Industrials hardest hit, as cyber criminals ramp up efforts ahead of the busy holiday season.
Stressed businessperson office desk locked computer digital padlocks masked figures

Ransom payment rates drop to historic low as attackers adapt

Thu, 30th Oct 2025
#
ransomware
#
crypto
#
phishing
Ransom payments fell to a historic low of 23% in Q3 2025 as cyber extortion tactics shift towards targeted, costlier attacks on larger firms.
Jack o lantern cyber danger halloween suspicious emails social media laptop

Halloween scams spike as 63% of festive spam found malicious

Wed, 29th Oct 2025
#
malware
#
phishing
#
email security
Bitdefender reports a 63% rise in malicious Halloween spam, with scams posing as festive giveaways and retail offers to steal data or spread malware.
Cluttered smartphone home screen security apps overload confusion realistic digital illustration

Users spending up to $850 yearly on redundant and fragmented security apps

Fri, 24th Oct 2025
#
vpns
#
mfa
#
mdm
Fragmented security apps cost users up to $850 yearly, exposing them to cyber risks and alert fatigue, says new study by Ontario Tech University and PureVPN.
Hooded figure computer dark room multiple screens abstract encrypted code cyber attack

Ransomware groups surge as automation cuts attack time to 18 mins

Thu, 23rd Oct 2025
#
ransomware
#
encryption
#
advanced persistent threat protection
Automation and AI slash ransomware attack times to 18 minutes, challenging defenders to match speed with automated defences, says ReliaQuest report.
Shadowy figure computer digital code malware icons finance skyscrapers global cyber threats

TA585 identified as key threat actor using advanced malware tools

Tue, 21st Oct 2025
#
advanced persistent threat protection
#
risk & compliance
#
cybersecurity
Proofpoint identifies TA585 as a cyber threat actor managing end-to-end attacks, deploying advanced malware like MonsterV2 to target finance firms globally.
Gold coins digital symbols map russia us brazil financial cybercrime threats

Russia, US & Brazil pose highest risks for wealthy crypto holders

Fri, 17th Oct 2025
#
crypto
#
defi
#
bitcoin
Russia, the US and Brazil top the Executive Crypto Threat Index as the riskiest countries for wealthy cryptocurrency holders in 2025, while Japan and Singapore are safest.
Person examining computer screen split image real human face vs digital manipulation

Deepfake threat grows as public & business struggle to keep up

Wed, 15th Oct 2025
#
phishing
#
email security
#
data privacy
Deepfake scams surge worldwide, with 49% of firms hit in 2024 as public and businesses struggle to spot convincing fake videos and audio.
Realistic shadowy cyber hacker dark room computer monitors encrypted data

CL0P hackers exploited Oracle EBS zero-day for data extortion

Fri, 10th Oct 2025
#
firewalls
#
ransomware
#
network security
Hackers linked to CL0P exploited an Oracle E-Business Suite zero-day from July 2025, stealing data and extorting dozens of organisations worldwide.
Concerned it professionals in office analyzing deepfake cyber threats

Deepfake attacks cost firms an average of USD $280,000 per incident

Fri, 10th Oct 2025
#
advanced persistent threat protection
#
breach prevention
#
cybersecurity
More than half of firms faced deepfake fraud losses averaging USD $280,000 per incident, despite increased cybersecurity training and awareness efforts.
Worried businessperson warning screens robotic hand lock canadian cityscape

Canadian firms struggle with AI in cybersecurity amid talent gap

Thu, 9th Oct 2025
#
firewalls
#
advanced persistent threat protection
#
breach prevention
Canadian firms increasingly adopt AI in cybersecurity but face a talent shortage that hinders progress and raises breach risks, finds Fortinet's 2025 report.
Realistic server room red warning lights lock icon shadowy intrusion

Oracle issues urgent patch as Cl0p exploits suite flaw for attacks

Wed, 8th Oct 2025
#
ransomware
#
mfa
#
advanced persistent threat protection
Oracle has issued an urgent patch for a critical flaw in its E-Business Suite, exploited by the Cl0p ransomware group using advanced social engineering tactics.
Worried traveler holding passport id computer warning symbol realistic

WestJet data breach exposes passports, fuelling identity fraud risks

Wed, 8th Oct 2025
#
data protection
#
mfa
#
physical security
A WestJet data breach exposed passengers' passports and IDs, heightening risks of long-term identity theft and synthetic fraud schemes globally.
Football fan receives suspicious message shadowy figure lurks stadium

Fans warned of digital scams ahead of 2026 World Cup matches

Tue, 7th Oct 2025
#
malware
#
vpns
#
phishing
Fans heading to the 2026 World Cup are urged to beware of rising digital scams involving ticket fraud and fake travel deals, warns cybersecurity firm Norton.
Carolyn

Exclusive: Cloudera's Carolyn Duby warns of rising AI-powered cybercrime

Fri, 3rd Oct 2025
#
data protection
#
data analytics
#
digital transformation
AI-driven cyberattacks now cost firms on average USD $4 million and 100 days to recover, raising security to a vital business priority worldwide.
Smartphone app icons data streams shield privacy data protection illustration

Facebook, WhatsApp & TikTok most invasive, Discord safest

Thu, 2nd Oct 2025
#
data protection
#
data privacy
#
ai
Research finds Facebook, WhatsApp, and TikTok most privacy-invasive, while Discord tops the list for safeguarding user data and resisting AI training use.
Digital illustration secure data vault breached ai shapes futuristic padlocks quantum encryption cyber threats

Forrester forecasts agentic AI breaches & quantum spending surge by 2026

Thu, 2nd Oct 2025
#
data protection
#
encryption
#
iot security
Forrester predicts the first agentic AI data breach and a surge in quantum security spending by 2026, amid rising government control of telecoms.
Camouflaged dog silhouette lurking near globe with networked computer screens

Detour Dog malware uses DNS TXT records to hijack 30,000 sites

Thu, 2nd Oct 2025
#
advanced persistent threat protection
#
cybersecurity
#
threat intelligence
The Detour Dog malware has covertly hijacked over 30,000 websites globally, exploiting DNS TXT records to deliver stealthy, location-targeted attacks.
Snarling dog silhouette behind servers network web globe icons dns infection

Detour Dog exploits DNS to target 30,000 sites with covert malware

Wed, 1st Oct 2025
#
malware
#
firewalls
#
network security
Threat group Detour Dog has exploited DNS to covertly infect over 30,000 websites since 2020, shifting from scam redirects to malware delivery via server-side attacks.
Person protected by concentric digital shields binary codes cybersecurity

Experts call for people-centred cyber resilience & data focus

Tue, 30th Sep 2025
#
advanced persistent threat protection
#
quantum computing
#
risk & compliance
Experts urge a people-centred approach to cyber resilience, focusing on human behaviour, layered defences, and robust data governance amid evolving threats.