Each week, the PhishLabs team posts The Week in Cybercrime (TWIC) to recap noteworthy cybercrime articles and reports (open source).
Cybercriminals abuse charities to verify stolen credit card data (PhishLabs)
PhishLabs’ R.A.I.D (Research, Analysis, and Intelligence Division) has uncovered an underground service that allows cybercriminals to use an interactive chat bot to automate the verification of stolen payment card data.
Microsoft Releases Emergency Security Update (KrebsOnSecurity)
Microsoft today deviated from its regular pattern of releasing security updates on the second Tuesday of each month, pushing out an emergency patch to plug a security hole in all supported versions of Windows.
Scammers move from Ebola phishing to fundraising (CSO)
This month, scammers combined the two approaches, sending out approximately 700,000 spam emails asking people to donate money to fight Ebola through an Indiegogo fundraiser, according to a report by Silicon Valley-based security firm Barracuda Networks, Inc.
New Citadel Trojan Targets Your Password Managers (TheHackerNews)
Security researchers have discovered a new variant of data-stealing Citadel Trojan program used by cybercriminals to slurp up users' master passwords for a number of password management applications and other authentication programs, which will let you think twice before using one.
Dridex Banking Trojan: Worldwide Threat (BankInfoSecurity)
Attackers are targeting online banking users' account information worldwide through sophisticated phishing attacks designed to deliver Microsoft Word documents containing malicious macro code known as Dridex.
Governments hit back against web-cam snooping websites (Computer World)
Government officials in the U.S. and the UK are warning people to secure their webcams after websites that broadcast the contents of those cameras have sprung up online.
Multiple UK arrests in international operation to combat computer hijackers (NCA)
Five people have been arrested in the UK as part of an international operation targeting users of software designed to remotely take over, control and steal information from computers.