Investigators showed ingenuity to uncover a scam worth millions of dollars.
On Wednesday, US law enforcement officers released the results of the operation to catch cryptocurrency scammers. An investigation conducted by the FBI revealed a sophisticated scheme for manipulating the prices of...
How did OneDrive and Dropbox become top phishing tools?
Microsoft warns of a rise in attacks using file storage services such as SharePoint, OneDrive and Dropbox to circumvent defenses. In these cyberattacks, attackers compromise business email (BECs), resulting in financial theft, data theft...
WSJ: US intelligence agencies successfully use the messenger in investigations.
According to The Wall Street Journal (WSJ), despite the widespread use of Telegram by criminals, the messenger has become an important tool for law enforcement agencies to penetrate criminal groups even without...
Trust and feelings have become tools for money laundering.
According to the case file, 30-year-old Christine Petitfrer from the city of Miramar used bank accounts to receive funds obtained as a result of fraud related to romantic scams. Petitfrère kept part of the money for herself as a reward...
Growing fragmentation makes it difficult to assess the real scale of cyber threats.
Ransomware groups are becoming increasingly fragmented due to recent law enforcement actions, according to Europol's latest report on Organized Crime on the Internet (IOCTA).
The 10th edition of the report...
In the Philippines, there is a whole network of clinics specializing in plastic surgery. According to the BBC, they provide their services to members of the mafia and fraudulent groups. Two months ago, a police raid at one of these hospitals seized tools for hair transplantation and skin...
What awaits those who dare to sabotage the Red Notice system?
As a result of an investigation by international law enforcement agencies, a criminal organization operating in Moldova was uncovered and suspected of trying to sabotage the Interpol system that helps participating countries locate...
Snapchat, Instagram, and TikTok must urgently take action to combat sexual extortion.
Researchers have found that criminals openly sell online sexual extortion manuals on social media. This illegal practice is now called "sextortion". Tutorials and videos detail how to impersonate young girls...
Cryptographic technologies of network anonymity and online payments allowed criminals to create a black market where they sell and buy drugs, stolen and counterfeit goods, and not only that. In response, the police and other law enforcement agencies are improving their technology, moving their...
Why do the police justify buying unsafe drones from China?
The U.S. Congress has expressed concern over plans by the NYPD to use Chinese drones in five high-crime areas. The government's concerns were voiced by NYPD Deputy Operations Commissioner Kaz Daughtry at a House of Representatives...
Finding out a person's location today is easy. Just look at his social networks. Usually, people themselves are willing to share such information in posts or stories. But sometimes even the most secretive Internet users are under threat – attackers determine their location by phone number.
Why...
In this new article, read expert advice on protecting against cyber attacks through third-party code repositories.
At the end of 2023, an article titled "One Attack on the Supply Chain to rule everyone" appeared on the Internet, which described a way to gain access to the GitHub repository...
It took 87 malicious apps and 100,000 victims for the company to pay attention to the situation.
Earlier last week, Google filed a lawsuit against two Chinese app developers, accusing them of creating fraudulent apps for investing in cryptocurrencies and publishing them on the Google Play...
Supposedly Iranian government-sponsored cybercriminal groups exploit VPN server vulnerabilities in their malicious campaigns to create backdoors in companies around the world. According to a report by specialists from the Israeli company ClearSky, Iranian cybercriminals are attacking...