Tag: crime
-
Cybercrime Disruption Demands Global Trust and Coordination
UK Cyber Official Paul Foster on Cross-Border Takedowns, New Disruption Playbook. Dismantling cybercrime groups requires more than technical capability. It demands trust, coordinated strategy and cross-border collaboration, says Paul Foster, head of the National Cyber Crime Unit at the U.K.’s National Crime Agency. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/cybercrime-disruption-demands-global-trust-coordination-a-31172
-
Hackers claim to have accessed data tied to millions of crime tipsters
A hacktivist group claims to have obtained sensitive data on crime tipsters and the people they reported, dating back to 1987. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/03/hackers-claim-to-have-accessed-data-tied-to-millions-of-crime-tipsters/
-
Millions of Anonymous Student and Crime Tips Exposed in Major Data Breach
A reported breach of P3 Global Intel exposed millions of anonymous crime and school safety tips, raising new concerns about privacy and trust. The post Millions of Anonymous Student and Crime Tips Exposed in Major Data Breach appeared first on TechRepublic. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/news-p3-global-intel-data-breach/
-
NCA Boss Warns That Teens Are Being “Radicalized” Into Cybercrime Online
The National Crime Agency’s director general warns that technology is rapidly reshaping crime First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/nca-boss-warns-teens-radicalized/
-
Everyday tools, extraordinary crimes: the ransomware exfiltration playbook
Attackers use trusted tools for data theft, making traditional detection unreliable. The Exfiltration Framework enables defenders to spot exfiltration by focusing on behavioral signals across endpoints, networks, and cloud environments rather than static tool indicators. First seen on blog.talosintelligence.com Jump to article: blog.talosintelligence.com/everyday-tools-extraordinary-crimes-the-ransomware-exfiltration-playbook/
-
Rethinking AML for Real-Time Payments
Datos Insights’ Serpil Hall on Using Predictive AML Tools to Support Compliance. Instant payments are reshaping financial crime controls as speed and the irreversibility of transactions strain anti-money laundering compliance programs. While many assume real-time AML means faster processing, this approach can increase risk, said Serpil Hall, strategic advisor at Datos Insights. First seen on…
-
Technology accelerating crime, boosts case for national police service, says NCA chief
NCA director general Graeme Biggar says technology has helped criminals get smarter, faster and more connected, boosting case for National Police Service First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366640462/Technology-accelerating-crime-boosts-case-for-national-police-service-says-NCA-chief
-
FBI Intensifies Crackdown on Thai Scam Centers Targeting Americans
The first contact often seems harmless, a friendly message, casual conversation, or even a budding online romance. But for many Americans, these interactions mark the beginning of a devastating financial scam. Authorities say these crimes trace back to organized scam centers in Southeast Asia. Now, the FBI in Thailand is working closely with regional partners…
-
Technology accelerating crime, boosts case for national police service says NCA chief
NCA director general Graeme Biggar says that technology had helped criminals get smarter, faster and more connected, boosting case for National Police Serivce First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366640462/Technology-accelerating-crime-boosts-case-for-national-police-service-says-NCA-chief
-
How US Ransomware Policy Aims to Break Global Crime Networks
Ex-FBI Leader Cynthia Kaiser on Sanctions, Ecosystem Disruption, Stronger Policies. U.S. cyber policy now treats ransomware gangs and fraud networks as transnational criminal organizations. Former FBI cyber leader Cynthia Kaiser explains how sanctions, infrastructure takedowns, and international cooperation could weaken cybercrime ecosystems and reduce attacks. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/how-us-ransomware-policy-aims-to-break-global-crime-networks-a-30976
-
Iranian MOIS Actors the Cyber Crime Connection
ey Points Iran-linked actors are increasingly engaging with the cyber crime ecosystem. Their activity suggests a growing reliance on criminal tools, services, and operational models in support of state objectives. Iranian actors have long used cyber crime and hacktivism as cover for destructive activity, but the trend now suggests direct engagement with the criminal ecosystem.…
-
Iranian MOIS Actors the Cyber Crime Connection
ey Points Iran-linked actors are increasingly engaging with the cyber crime ecosystem. Their activity suggests a growing reliance on criminal tools, services, and operational models in support of state objectives. Iranian actors have long used cyber crime and hacktivism as cover for destructive activity, but the trend now suggests direct engagement with the criminal ecosystem.…
-
UK plans to shift fraud fight onto telecoms, tech companies
The plan is the latest effort to curb what has become the most common crime in the United Kingdom, with official surveys estimating that fraud accounts for about 40% of recorded crime. First seen on therecord.media Jump to article: therecord.media/uk-plans-to-shift-fraud-fight-to-telecoms-tech
-
UK to launch cyber fraud squad in April
The UK’s new Online Crime Centre, launching next month, will bring together government, police, intelligence agencies, banks, mobile networks and tech firms to take coordinated action against cyber fraud. First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366639897/UK-to-launch-cyber-fraud-squad-in-April
-
UK Launches New Crackdown Unit to Tackle Cyber-Fraud at the Source
New UK Online Crime Centre will combine expertise from a range of sources to takedown online channels cyber-scammers rely on First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/uk-new-crackdown-unit-cyber-fraud/
-
Ghanaian Pleads Guilty to Role in $100m Romance Scam
Derrick Van Yeboah admitted he stole over $10m in romance scams as part of crime gang First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/ghanaian-pleads-guilty-100m/
-
Ein 360-Grad-Blick auf die Sicherheit im digitalen Raum
Die digitale Welt ist aus dem Gleichgewicht geraten: Technologie ist zur zentralen Machtfaktorin geworden und verschärft Cyber Crime, staatliche Cyberangriffe und digitale Abhängigkeiten. Mit dem neuen Wheel of Motion zeigt das BSI, wie Deutschland und Europa diesen Bedrohungen durch Cyber Automation, Cyber Defense und Cyber Control wirksam begegnen können. Ziel ist ein ganzheitlicher 360″‘Grad”‘Ansatz, der……
-
Künstliche Intelligenz macht Angreifer schneller und transformiert die Angriffsfläche
KI-gestützte Angriffe stiegen um 89 %. Breakout-Time sinkt auf 29 Minuten. KI-Tools und Entwicklungsplattformen werden aktiv ausgenutzt. Der Global Threat Report 2026 von CrowdStrike zeigt, wie künstliche Intelligenz das Tempo der Angreifer beschleunigt und die Angriffsfläche von Unternehmen vergrößert. Zudem ist die durchschnittliche E-Crime-Breakout-Time also die Zeit, die ein Angreifer benötigt, um sich… First seen…
-
Coruna: Spy-grade iOS exploit kit powering financial crime
A powerful iOS exploit kit has circulated among multiple threat actors over the past year, moving from a commercial surveillance operation to state-linked espionage campaigns … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/03/03/coruna-ios-exploit-kit/
-
‘Project Compass’ Cracks Down on ‘The Com’: 30 Members of Notorious Cybercrime Gang Arrested
International law enforcement operation led by Europol targets network of teenagers and young adults involved in ransomware attacks, extortion and other crimes First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/project-compass-com-arrests/
-
Ransomware groups switch to stealthy attacks and long-term access
Tags: access, application-security, attack, ciso, control, crime, cyber, cybercrime, cybersecurity, data, detection, encryption, endpoint, exploit, extortion, group, identity, intelligence, monitoring, organized, ransomware, service, software, strategy, supply-chain, switch, theft, threat, tool, vulnerability38% drop in encryption over the past 12 months as more cybercriminals turn to silently exfiltrating data for extortion as their main stock in trade.Picus’ suggestion that the volume of ransomware attacks is dropping is disputed by other experts.Tony Anscombe, chief security evangelist at endpoint security vendor Eset, offered a contrasting perspective.”In the recent Eset…
-
ZeroDayRAT Targets Android and iOS Devices for Surveillance and Financial Data Theft
ZeroDayRAT targets Android and iOS devices, combining real-time surveillance with direct financial theft within a single browser panel. The Malware-as-a-Service (MaaS) ecosystem is entering a new phase, blending mobile surveillance and financial crime into one seamless platform. Active promotions for this RAT (Remote Access Trojan) began on Telegram channels on February 2, 2026, highlighting its dual purpose: real-time spying and direct financial…
-
The rise of the evasive adversary
Tags: access, ai, attack, authentication, breach, china, cloud, credentials, crime, crowdstrike, crypto, data, defense, endpoint, exploit, finance, firewall, group, identity, infrastructure, intelligence, korea, lazarus, leak, mail, malicious, malware, microsoft, monitoring, network, north-korea, open-source, phishing, ransomware, remote-code-execution, russia, saas, service, software, strategy, supply-chain, tactics, theft, threat, tool, update, vpn, vulnerability, windows, zero-dayBig game hunters tighten their grip: CrowdStrike’s research highlights how big game hunting (BGH) ransomware actors have remained the dominant force in the eCrime landscape.Punk Spider, a group responsible for developing and maintaining Russian-language Akira ransomware, and its associated Akira dedicated leak site, conducted 198 intrusions in 2025, a 134% increase year over year. Victim-shaming operations…
-
Fraudster hacked hotel system, paid 1 cent for luxury rooms, Spanish cops say
Tags: crime‘First time we have detected a crime using this method,’ cops say First seen on theregister.com Jump to article: www.theregister.com/2026/02/18/fraudster_hotel_hack_one_cent_luxury_room/
-
Bretton AI Gets $75M to Use AI for Financial Crime Compliance
AI Agents Target Anti-Money Laundering at Major Global Banks, Cut Manual Probes. Bretton AI has raised $75 million in Series B funding led by Sapphire Ventures to scale AI agents for anti-money laundering sanctions and KYC compliance. CEO Will Lawrence says the company is targeting large banks with automation designed to reduce manual investigations and…
-
Bretton Raises $75M to Use AI for Financial Crime Compliance
AI Agents Target Anti-Money Laundering at Major Global Banks, Cut Manual Probes. Bretton AI has raised $75 million in Series B funding led by Sapphire Ventures to scale AI agents for anti-money laundering sanctions and KYC compliance. CEO Will Lawrence says the company is targeting large banks with automation designed to reduce manual investigations and…
-
Next Gen Spotlights: Turning Behavioural Intelligence into a Powerful Tool Against Fraud and Crime QA with Paddy Lawton, Co-Founder of FACT360
Founded on pioneering British research and real-world intelligence applications, FACT360 is using behavioural analytics to help governments and organisations detect fraud, terrorism and serious crime without breaching privacy. The Gurus spoke to Paddy Lawton, Founder of FACT360, about the origins of the company, the problem it solves and how government-backed programmes have helped accelerate its…
-
TeamPCP Turns Cloud Infrastructure into Crime Bots
The threat actor has been compromising cloud environments at scale with automated worm-like attacks on exposed services and interfaces. First seen on darkreading.com Jump to article: www.darkreading.com/cloud-security/teampcp-cloud-infrastructure-crime-bots
-
‘I fell into it’: ex-criminal hackers urge Manchester pupils to use web skills for good
Initiative aims to identify proficient gamers and coders who can help companies identify flaws in their cybersecurity Cybercriminals, the shadowy online figures often depicted in Hollywood movies as hooded villains capable of wiping millions of pounds off the value of businesses at a keystroke, are not usually known for their candour.But in a sixth-form college…
-
Russia Hacked the Polish Electricity Grid. Now What?
Stymied Attack Leaves Poland No Good Options in Responding to Provocation. Poland’s online defenses stopped a Russian cyberattack against the energy grid, but now the Warsaw government is in a bind about how to respond to a digital assault that was a lot more than a crime, but a sliver less than an act of…

