Threat actors are increasingly banking on a new technique that leverages near-field communication (NFC) to cash out victim’s funds at scale.
The technique, codenamed Ghost Tap by ThreatFabric, enables cybercriminals to cash-out money from stolen credit cards linked to mobile payment services such as Google Pay or Apple Pay and relaying NFC traffic.
“Criminals can now misuse Google Pay and Apple

- November 20, 2024
- by
- Cyber News
- Less than a minute
- 71 Views
Related Post
- by Francis Schmuff
- April 5, 2025
Malicious Python Packages on PyPI Downloaded 39,000+ Times,
Cybersecurity researchers have uncovered malicious libraries in the Python Package Index (PyPI) repository that are designed to steal sensitive information
- by Francis Schmuff
- April 4, 2025
Friday Squid Blogging: Two-Man Giant Squid
The Brooklyn indie art-punk group, Two-Man Giant Squid, just released a new album. As usual, you can also use this
- by Francis Schmuff
- April 5, 2025
Microsoft Credits EncryptHub, Hacker Behind 618+ Breaches, for
A likely lone wolf actor behind the EncryptHub persona was acknowledged by Microsoft for discovering and reporting two security flaws
- by Francis Schmuff
- April 5, 2025
North Korean Hackers Deploy BeaverTail Malware via 11
The North Korean threat actors behind the ongoing Contagious Interview campaign are spreading their tentacles on the npm ecosystem by
- by Francis Schmuff
- April 5, 2025
Malicious Python Packages on PyPI Downloaded 39,000+ Times,
Cybersecurity researchers have uncovered malicious libraries in the Python Package Index (PyPI) repository that are designed to steal sensitive information
- by Francis Schmuff
- April 4, 2025
Friday Squid Blogging: Two-Man Giant Squid
The Brooklyn indie art-punk group, Two-Man Giant Squid, just released a new album. As usual, you can also use this
- by Francis Schmuff
- April 5, 2025
Microsoft Credits EncryptHub, Hacker Behind 618+ Breaches, for
A likely lone wolf actor behind the EncryptHub persona was acknowledged by Microsoft for discovering and reporting two security flaws
- by Francis Schmuff
- April 5, 2025
North Korean Hackers Deploy BeaverTail Malware via 11
The North Korean threat actors behind the ongoing Contagious Interview campaign are spreading their tentacles on the npm ecosystem by