Have you answered a spam call by accident? Your next move is extremely important

A database of your information is slowly being pieced together by malicious actors, “stored, repackaged and sold from one scammer to the next.” By offering up more information — even by simply answering the phone — that faux pas is “valuable to scammers who might try it again later” and “sell your number to the highest bidder,” 

London hospitals declare emergency following ransomware attack | Ars Technica

The outage has led hospitals, including Guy’s and St Thomas’ and King’s College Hospital Trusts, to cancel operations and procedures involving blood transfusions. The cancellations include transplant surgeries, which require blood transfusions.

Russia Aims Cyber Operations at Summer Olympics

Two Russian state-aligned threat actors have been carrying out online influence operations designed to undermine the upcoming Olympic Games in Paris.

Multibillion Dollar Botnet Scam Traced Back to a Single Person

The illicit scheme was massively successful. According to the DOJ, 911 S5 raked in an eye-watering $99 million since its inception in 2014. Wan spent much of that income on luxury properties, cars, watches, and more.

Cybercriminals pose as “helpful” Stack Overflow users to push malware

This approach serves as a reminder of the constantly changing tactics of cybercriminals and, unfortunately, illustrates why you can never blindly trust what someone shares online.

What is spear phishing? Examples, tactics, and techniques | CSO Online

Spear phishing messages are crafted with care using social engineering techniques and are difficult to defend against with technical means alone. And they’re ruthlessly efficient.

Hackers phish finance orgs using trojanized Minesweeper clone

Hackers are utilizing code from a Python clone of Microsoft’s venerable Minesweeper game to hide malicious scripts in attacks on European and US financial organizations.

CasperSecurity Stealer Attacking Windows Machine

This complex malware is made to steal Remote Desktop Protocol (RDP) credentials, which is very dangerous for individuals and businesses.

FCC Reveals ‘Royal Tiger’ Robocall Campaign

An example of a transcript of a call that Royal Tiger feeds its victims is as follows: “This is an important call regarding illegal enforcement action being executed under your name for suspicious and fraudulent activities carried out using your identity.

Hackers Can Abuse Apple’s Wi-Fi Positioning System

A recent study by security researchers has revealed a major privacy vulnerability in Apple’s Wi-Fi Positioning System (WPS) that allows hackers to track the locations of Wi-Fi access points and their owners globally.