Tag: crime
-
New NCA Campaign Warns Men Off Crypto Investment Scams
The UK’s National Crime Agency is warning men under 45 that crypto dreams can soon become a scam nightmare First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/nca-campaign-men-crypto-investment/
-
Mexico City Is the Most Video-Surveilled Metropolis in the Americas
Despite 83,000 public cameras, crime in Mexico City remains high”, and widespread surveillance raises myriad ethical issues. First seen on wired.com Jump to article: www.wired.com/story/mexico-city-is-the-most-video-surveilled-city-in-the-americas/
-
ThreatsDay Bulletin: AI Tools in Malware, Botnets, GDI Flaws, Election Attacks & More
Cybercrime has stopped being a problem of just the internet — it’s becoming a problem of the real world. Online scams now fund organized crime, hackers rent violence like a service, and even trusted apps or social platforms are turning into attack vectors.The result is a global system where every digital weakness can be turned…
-
ThreatsDay Bulletin: AI Tools in Malware, Botnets, GDI Flaws, Election Attacks & More
Cybercrime has stopped being a problem of just the internet — it’s becoming a problem of the real world. Online scams now fund organized crime, hackers rent violence like a service, and even trusted apps or social platforms are turning into attack vectors.The result is a global system where every digital weakness can be turned…
-
Hackers Targeting Freight Operators to Steal Cargo: Proofpoint
Threat actors are working with organized crime groups to target freight operators and transportation companies, infiltrate their systems through RMM software, and steal cargo, which they then sell online or ship to Europe, according to Proofpoint researchers, who saw similar campaigns last year. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/11/hackers-targeting-freight-operators-to-steal-cargo-proofpoint/
-
Hackers Targeting Freight Operators to Steal Cargo: Proofpoint
Threat actors are working with organized crime groups to target freight operators and transportation companies, infiltrate their systems through RMM software, and steal cargo, which they then sell online or ship to Europe, according to Proofpoint researchers, who saw similar campaigns last year. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/11/hackers-targeting-freight-operators-to-steal-cargo-proofpoint/
-
Hackers Targeting Freight Operators to Steal Cargo: Proofpoint
Threat actors are working with organized crime groups to target freight operators and transportation companies, infiltrate their systems through RMM software, and steal cargo, which they then sell online or ship to Europe, according to Proofpoint researchers, who saw similar campaigns last year. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/11/hackers-targeting-freight-operators-to-steal-cargo-proofpoint/
-
Crooks exploit RMM software to hijack trucking firms and steal cargo
Hackers target trucking firms with RMM tools to steal freight, teaming with organized crime to loot goods, mainly food and beverages. Cybercriminals are targeting trucking and logistics firms with RMM tools (remote monitoring and management software) to steal freight. Active since June 2025, the group works with organized crime to loot goods, mainly food and…
-
Crooks exploit RMM software to hijack trucking firms and steal cargo
Hackers target trucking firms with RMM tools to steal freight, teaming with organized crime to loot goods, mainly food and beverages. Cybercriminals are targeting trucking and logistics firms with RMM tools (remote monitoring and management software) to steal freight. Active since June 2025, the group works with organized crime to loot goods, mainly food and…
-
Cybercrooks team up with organized crime to steal pricey cargo
Old-school cargo heists reborn in the cyber age First seen on theregister.com Jump to article: www.theregister.com/2025/11/03/cybercriminals_team_up_with_ocgs/
-
Cybercrooks team up with organized crime to steal pricey cargo
Old-school cargo heists reborn in the cyber age First seen on theregister.com Jump to article: www.theregister.com/2025/11/03/cybercriminals_team_up_with_ocgs/
-
Cybercrime groups team with organized crime in massive cargo theft campaigns
Financially motivated hackers are abusing remote monitoring and access tools against trucking and freight companies, Proofpoint warns. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/cybercrime-organized-crime-cargo-theft-campaign/804501/
-
Cybercriminals Exploit Remote Monitoring Tools to Infiltrate Logistics and Freight Networks
Bad actors are increasingly training their sights on trucking and logistics companies with an aim to infect them with remote monitoring and management (RMM) software for financial gain and ultimately steal cargo freight.The threat cluster, believed to be active since at least June 2025 according to Proofpoint, is said to be collaborating with organized crime…
-
Hackers Help Organized Crime Groups in Cargo Freight Heists, Researchers Find
Proofpoint researchers have observed recent hacking campaigns supporting cargo theft First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/hackers-organized-crime-cargo/
-
Alleged 764 leader arrested in Arizona, faces life in prison
Baron Cain Martin, a 21-year-old, allegedly joined the nihilistic violent extremist group in 2019. Officials described his alleged crimes as “atrocious” and “so depraved they defy comprehension.” First seen on cyberscoop.com Jump to article: cyberscoop.com/baron-cain-martin-764-leader-arrested-charged/
-
Cybersecurity Snapshot: Top Guidance for Improving AI Risk Management, Governance and Readiness
Tags: access, ai, api, attack, awareness, breach, business, ceo, cloud, compliance, computer, control, corporate, crime, cryptography, cyber, cybersecurity, data, data-breach, encryption, exploit, finance, framework, germany, google, governance, guide, hacking, ibm, identity, india, infrastructure, intelligence, jobs, law, leak, metric, microsoft, network, penetration-testing, privacy, risk, risk-management, scam, security-incident, skills, strategy, technology, threat, tool, training, vulnerability, vulnerability-managementMany organizations are playing catch-up in key AI security policy areas, such as usage governance, risk oversight, data protection, and staff training. In this Cybersecurity Snapshot special edition, we round up recent guidance on preparing for, managing and governing AI cyber risks. Key takeaways Most organizations’ AI adoption is dangerously outpacing their security strategies and…
-
Cybersecurity Snapshot: Top Guidance for Improving AI Risk Management, Governance and Readiness
Tags: access, ai, api, attack, awareness, breach, business, ceo, cloud, compliance, computer, control, corporate, crime, cryptography, cyber, cybersecurity, data, data-breach, encryption, exploit, finance, framework, germany, google, governance, guide, hacking, ibm, identity, india, infrastructure, intelligence, jobs, law, leak, metric, microsoft, network, penetration-testing, privacy, risk, risk-management, scam, security-incident, skills, strategy, technology, threat, tool, training, vulnerability, vulnerability-managementMany organizations are playing catch-up in key AI security policy areas, such as usage governance, risk oversight, data protection, and staff training. In this Cybersecurity Snapshot special edition, we round up recent guidance on preparing for, managing and governing AI cyber risks. Key takeaways Most organizations’ AI adoption is dangerously outpacing their security strategies and…
-
Transnational Organized Crime Gang Steals $1 Million from Ontario Couple
Today my LinkedIn feed and Google News filter is showing me several stories that illustrate how we are failing to stop online scammers from stealing from our elderly. It starts with the headlines. CTVNews: Ontario seniors GIVE AWAY MORE THAN $1 MILLION to scammers.CTVNews: Ontario couple LOSES MORE THAN $1 MILLION DOLLARS to fraud.Toronto Only:…
-
Alleged 764 member faces up to 69 years in prison for string of suspected violent crimes
Prosecutors accuse Tony Christopher Long of animal crushing, sexual exploitation of a minor, cyberstalking and extortion. First seen on cyberscoop.com Jump to article: cyberscoop.com/764-tony-christopher-long-california-charged/
-
Atroposia malware kit lowers the bar for cybercrime, and raises the stakes for enterprise defenders
Tags: apt, authentication, automation, ciso, credentials, crime, cybercrime, defense, detection, dns, endpoint, infrastructure, mail, malicious, malware, mfa, monitoring, rat, service, spam, threat, tool, update, vulnerabilityRAT toolkits proliferating: Atroposia is one of a growing number of RAT tools targeting enterprises; Varonis has also recently discovered SpamGPT and MatrixPDF, a spam-as-a-service platform and malicious PDF builder, respectively.Shipley noted that these types of packages which identify additional avenues to maintain persistence have been around for some time; Mirai, which goes back to…
-
US Teen Indicted in 764 Network Case Involving Exploitation Crimes
US teen indicted for involvement in extremist “764” network, accused of child exploitation, animal cruelty, and cyberstalking, says the Justice Department. First seen on hackread.com Jump to article: hackread.com/us-teen-indicted-764-network-case-crimes/
-
Investment Scams Spread Across Asia With International Reach
A surge in fake investment platforms targeting cryptocurrency and forex markets has been driving a new wave of financial crime in Asia First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/investment-scams-spread-across-asia/
-
CCB’s Cyber Crime Wing Busts ₹47 Crore ($5.6 Million) International Cybercrime Racket Linked to Dubai
Bengaluru’s Central Crime Branch (CCB) has dismantled a major international cybercrime racket, revealing a hacking operation that siphoned off ₹47 crore (approximately $5.6 million) from a private finance company in just two and a half hours. The Cyber Crime Wing of the CCB confirmed the arrest of two individuals involved in the scam, while the primary…
-
The 10 biggest issues CISOs and cyber teams face today
Tags: ai, attack, awareness, breach, business, ceo, ciso, computing, crime, cyber, cyberattack, cybersecurity, data, deep-fake, defense, email, encryption, exploit, finance, fraud, governance, group, hacker, international, mitigation, organized, phishing, ransom, risk, scam, service, strategy, supply-chain, technology, threat, tool, training, usa, vulnerability2. Escalating, and accelerating, AI-enabled attacks: A 2025 survey from Boston Consulting Group found that 80% of CISOs worldwide cited AI-powered cyberattacks as their top concern, a 19-point increase from the previous year. A 2025 survey from Darktrace, a security technology firm, found that 78% of CISOs reported a significant impact from AI-driven threats, up…
-
Cybersecurity Snapshot: Top Advice for Detecting and Preventing AI Attacks, and for Securing AI Systems
Tags: access, ai, attack, authentication, awareness, best-practice, breach, business, chatgpt, china, ciso, cloud, computing, container, control, credentials, crime, cve, cyber, cyberattack, cybersecurity, data, defense, detection, email, exploit, extortion, finance, flaw, framework, fraud, google, governance, government, group, guide, hacker, hacking, healthcare, iam, identity, incident response, intelligence, LLM, malicious, malware, mitigation, monitoring, network, open-source, openai, organized, phishing, ransom, risk, risk-management, russia, sans, scam, service, skills, soc, strategy, supply-chain, technology, theft, threat, tool, training, vulnerability, zero-trustAs organizations eagerly adopt AI, cybersecurity teams are racing to protect these new systems. In this special edition of the Cybersecurity Snapshot, we round up some of the best recent guidance on how to fend off AI attacks, and on how to safeguard your AI systems. Key takeaways Developers are getting new playbooks from groups…

