ChannelLife UK - Industry insider news for technology resellers

Cybercrime stories - Page 4

Any use of network connected electronic devices such as computers or smartphones for criminal activity is classified as cybercrime. With a long history starting with the misuse of telephone systems (such as ‘phreaking’), cybercrime today includes the creation and distribution of viruses, ransomware, keyloggers and other malware, the download and use of malware produced by others, social engineering tactics such as phishing or (physical) impersonation, the theft and use of credentials for accessing computer systems or networks, and the theft of privileged data. Cybercrime is a broad and dynamic field, with cybercriminals constantly adapting their methods in pursuit of usually financial goals, but also occasionally seeking to disrupt, embarrass or shame their targets.
Uk command centre law enforcement fighting online financial fraud

UK fraud overhaul plans GBP £30m Online Crime Centre

Last month
#
fintech
#
phishing
#
email security
UK unveils expanded fraud strategy, pledging GBP £250m and a GBP £30m Online Crime Centre to target fast-moving online and overseas scams.
Uk cyberattack ransomware map dark blues red locks data loss

Ransomware dominates UK cyber incidents, data loss surges

Last month
#
data protection
#
ransomware
#
phishing
Ransomware drives over half of UK cyber incidents as data loss surges, with healthcare, retail and complex supply chains hardest hit.
Online fraud suspicious investment ads phone laptop warning icons

Bitdefender unmasks global Meta investment scam ads

Last month
#
phishing
#
martech
#
physical security
Bitdefender exposes 26,000 Meta ads in 25 countries pushing fake investment schemes, impersonating banks, media and public figures.
Nhs hospital ward clinicians badge login secure data access

Netskope & Imprivata link zero trust for clinicians

Last month
#
data protection
#
ransomware
#
cloud security
Netskope and Imprivata link zero trust policies to healthcare shared workstations, promising tighter PHI protection without slowing clinicians.
Dim corporate server room flashing red lights cracked shield vulnerability

Google warns of surge in enterprise zero-day attacks

Last month
#
virtualisation
#
firewalls
#
vpns
Google warns attackers are shifting from browsers to corporate systems, as tracked zero-day exploits climb and enterprise edge devices surge.
Moody server room supply chain breach glowing red lock icon

ShinyHunters claims Woflow breach in supply chain hack

Last month
#
data protection
#
ransomware
#
mfa
ShinyHunters claims it hacked merchant data firm Woflow, raising supply chain fears for major brands despite no confirmed breach yet.
Europe smartphone social feed blocking shady ads flat design

Meta removes nearly 6m scam ads after DSA reports

Last month
#
martech
#
facebook
#
instagram
Meta took down nearly 6m scam ads in 2025 after alerts from Lithuanian watchdog Debunk.org under the EU's Digital Services Act system.
Heather mahalik  1

Why women can be leaders when it comes to AI

Last month
#
data protection
#
ransomware
#
digital transformation
Women in cybersecurity, long trained to question and validate, are uniquely placed to lead the era of risky, fast‑moving AI tools.
Japan factory night ransomware attack shadow figure network

Ransomware attacks surge 50% as industrial firms hit hardest

Last month
#
malware
#
data protection
#
ransomware
Global ransomware attacks jump 50% to 7,874 in 2025, with industrial firms bearing the brunt as criminal groups reshuffle their tactics.
Moody laptop dark desk phishing inbox shadowy hand global cyber threats

Israel-Iran conflict exploited in fresh email scam wave

Last month
#
phishing
#
physical security
#
email security
Scammers hijack Israel-Iran war headlines for classic advance-fee email cons, security researchers warn, urging users not to respond.
Dark cyber fraud desk with shields and law enforcement servers

Microsoft & Europol disrupt global Tycoon 2FA scam

Last month
#
ransomware
#
mfa
#
crypto
Microsoft and Europol have seized over 300 domains to disrupt Tycoon 2FA, a vast phishing-for-hire service bypassing MFA worldwide.
Logos

Tycoon 2FA phishing service disrupted in EU crackdown

Last month
#
ransomware
#
manufacturing
#
mfa
European authorities and tech firms have disrupted Tycoon 2FA, a major phishing service used to bypass MFA and hijack cloud accounts.
Scottish police digital forensics officer examining phone

Cyacomb tool spots altered child abuse images faster

Last month
#
data protection
#
surveillance
#
risk & compliance
Edinburgh-based Cyacomb adds Similarity Matching to Examiner Plus, helping police spot altered child abuse images on phones in minutes.
Cinematic cloud server room ai identity theft masked attackers

Cloudflare flags AI-fuelled identity & SaaS attacks

Last month
#
saas
#
firewalls
#
ddos
Cloudflare warns AI-driven identity fraud and SaaS abuse are reshaping cybercrime, as global costs hit USD $10.5 trillion a year.
Megan squire

Stop framing deepfake harassment of women as a social problem - It's a cybersecurity problem

Last month
#
ransomware
#
genai
#
ai
Non-consensual deepfake abuse of women is not just online harassment but cybercrime, demanding full threat intelligence and security action.
Theodora

Generative AI fuels alarming surge in intimate image abuse

Last month
#
data protection
#
encryption
#
open source
Generative AI is fuelling a sharp rise in intimate image abuse, outpacing weak platform responses and patchy global legal protections.
Moody gamers desk dual monitors colorful battle royale cheat cash

Video game cheat economy grows into USD $8.5bn giant

Fri, 27th Feb 2026
#
saas
#
gaming
#
advanced persistent threat protection
A growing underground market for video game cheats has swelled into a USD $8.5 billion industry, outstripping esports and Twitch revenues.
Moody globe of network cables with hidden red cyber threat nodes

Phishing gangs weaponise .arpa DNS to evade defences

Fri, 27th Feb 2026
#
firewalls
#
network infrastructure
#
network security
Phishing gangs abuse .arpa DNS and IPv6 tunnels to hide brand-impersonation scams in core internet plumbing that most defences ignore.
Smartphone suspicious call laptop fake login deceptive subdomain scene

ShinyHunters pivots to subdomain phishing & vishing

Fri, 27th Feb 2026
#
saas
#
mfa
#
cloud security
ShinyHunters shifts to subdomain-brand phishing and vishing on mobiles, bypassing domain checks to hijack SSO logins and SaaS sessions.
Uk small office owner cyber breach email identity fraud illustration

UK small firms lag on cyber breach & ID fraud defences

Fri, 27th Feb 2026
#
mfa
#
phishing
#
physical security
Fewer than half of UK small firms can spot cyber breaches, as identity fraud and supplier scams expose gaps in remote and hybrid working.