
Theft

How to Automate Phishing Detection to Prevent Data Theft
Phishing is no longer about badly written emails asking you to “click here.” Today’s attacks are business-grade, powered by AI and packaged in ready-to-use phishing kits. That means cybercriminals can now launch believable spearphishing campaigns in hours. For companies, this raises the stakes. A single successful phishing email can expose confidential data, disrupt operations, and…

Identity theft hits 1.1M reports — and authentication fatigue is only getting worse
Join the event trusted by enterprise leaders for nearly two decades. VB Transform brings together the people building real enterprise AI strategy. Learn more From passwords to passkeys to a veritable alphabet soup of other options — second-factor authentication (2FA)/one-time passwords (OTP), multi-factor authentication (MFA), single sign-on (SSO), silent network authentication (SNA) — when it comes…

OtterCookie v4 Adds VM Detection and Chrome, MetaMask Credential Theft Capabilities
The North Korean threat actors behind the Contagious Interview campaign have been observed using updated versions of a cross-platform malware called OtterCookie with capabilities to steal credentials from web browsers and other files. NTT Security Holdings, which detailed the new findings, said the attackers have “actively and continuously” updated the malware, introducing versions v3 and…

Grand Theft Auto 6’s Delay Just Affected the Entire Video Game Industry – IGN
Grand Theft Auto fans, there is some good news and some bad news. The good news is finally, after all these years, we have an actual day-and-date release time for GTA 6. The bad news? It’s around six months later than the ‘Fall 2025’ we were originally told. To many in the video game industry,…

The UK’s phone theft crisis is a wake-up call for digital security – Help Net Security
Phone theft is now commonplace in London. The Met Police recently revealed that it seizes 1,000 stolen phones weekly as it cracks down on organized criminal networks driving the £50 million trade. Nationally, cases have doubled to 83,900 annually. The real issue, though, isn’t the losing of a phone – it’s what happens next. Thieves…

Cybersecurity in Crypto: Best Practices to Prevent Theft and Fraud
Cybersecurity tips to protect your cryptocurrency from hackers, scams, and fraud. Learn best practices for securing digital assets and staying safe online. The cryptocurrency market is changing and growing daily, with new coins created weekly. While the broader market is struggling with weak demand and remains at a critical juncture, Cardano’s ADA is among the…

How ‘Grand Theft Hamlet’ evolved from lockdown escape to Shakespearean success
During the dark days of lockdown, we all found ways to connect. Some of us ran Zoom quizzes with mates. Some of us hit play on the same movie as our family on the other side of the world. Some of us staged an immersive, independent, multi-location production of Shakespeare’s Hamlet within the world of…

16 Chrome Extensions Hacked in Large-Scale Credential Theft Scheme
SUMMARY Large-Scale Breach: Over 16 Chrome extensions were compromised, exposing 600,000+ users to data and credential theft. Phishing Attack: Developers were tricked into granting access to a malicious OAuth app via fake Chrome Web Store emails. Cyberhaven Impact: Attackers used admin credentials to deploy a malicious update stealing sensitive user data. Widespread Impact: Many extensions…