Crypto scammers stole nearly $60m from 20 victims in H1 2024, data shows

Victims are often lured through phishing comments from impersonated accounts on X. Once on the phishing site, they are tricked into making seemingly legitimate transactions from their non-custodial wallets, resulting in unauthorized fund access.

RockYou2024: 10 billion passwords leaked in the largest compilation of all time | Cybernews

“In its essence, the RockYou2024 leak is a compilation of real-world passwords used by individuals all over the world. Revealing that many passwords for threat actors substantially heightens the risk of credential stuffing attacks,” researchers said.

Google Docs, look out—there’s a new private alternative in town | TechRadar

Proton Docs comes as a way to ensure that document creation and collaboration are both secure and user-friendly. As with all its products, Docs is completely free to use.

Types of Cyber Crime: A Guide to Prevention & Impact

From individual cybercriminals to organized groups, cyber crime has become a social epidemic that knows no borders. Cyber criminals use psychological manipulation, phishing, and malware to exploit individuals and organizations, causing financial losses and disrupting business operations.

What happens when a Waymo gets pulled over in Phoenix?

As self driving cars show up in more cities, new laws will be needed to determine how to treat traffic infractions. https://www.azcentral.com/story/news/local/arizona/2024/07/02/what-happens-when-a-waymo-gets-pulled-over-in-phoenix/74197111007/

Cybersecurity jobs available right now: July 3, 2024 – Help Net Security

As a Cyber Defense Specialist, you will operate and optimize security tooling/products, including security email gateway, firewall, IDS/IPS, web security gateway, emergency detect and response, logging and auditing, event and incident management, privileged access management and authentication. Update documentation and maintain security controls and tools as needed. Analyze and respond to previously undisclosed software and hardware vulnerabilities.

Hackers Using Weaponized Docs In QR Code Phishing Attacks

Threat actors embed malicious QR codes in emails, documents, and public places, using them to mask destinations. 

Reduce security risk with 3 edge-securing steps | CSO Online

Risk is everywhere these days, with attacks seemly coming at our businesses from all angles — ransomware, phishing, social engineering, and an ever-growing host of vulnerabilities that can be exploited.

Hiring expert: The resume mistake that will land it in the ‘no pile’

Every job seeker should have “one compelling personal template that you must tweak,” she says, “but it shouldn’t take a lot of tweaking.”

The biggest data breaches in 2024: 1B stolen records and rising | TechCrunch

These breaches not only affect the individuals whose data was irretrievably exposed, but also embolden the criminals who profit from their malicious cyberattacks.