Tag: crime
-
Oracle quietly admits data breach, days after lawsuit accused it of cover-up
Tags: access, attack, authentication, breach, cloud, compliance, credentials, crime, cve, cybersecurity, data, data-breach, endpoint, exploit, finance, fraud, hacker, identity, infrastructure, intelligence, law, oracle, resilience, risk, service, strategy, supply-chain, technology, theft, threat, vulnerabilityLawsuit challenges Oracle’s response: The reports of Oracle’s acknowledgement of the breach come just days after the company was hit with a class action lawsuit over its handling of the security breach.The lawsuit specifically addresses a major security breach discovered in March that reportedly compromised 6 million records containing sensitive authentication-related data from Oracle Cloud…
-
Threat-informed defense for operational technology: Moving from information to action
Tags: access, ai, attack, automation, blueteam, cloud, control, crime, cyber, cyberattack, cybercrime, cybersecurity, data, defense, detection, exploit, finance, fortinet, framework, group, incident response, infrastructure, intelligence, law, malicious, malware, mitre, network, phishing, PurpleTeam, ransomware, RedTeam, resilience, risk, service, soar, strategy, tactics, technology, threat, tool, usaThe rise of cybercrime-as-a-service Today’s macro threat landscape is a flourishing ecosystem of cybercrime facilitated by crime-as-a-service (CaaS) models. Cybercriminal networks now operate like legitimate businesses, with specialized units dedicated to activities such as money laundering, malware development, and spear phishing. This ecosystem lowers the barrier to entry for cybercrime, enabling low-skilled adversaries to launch…
-
Group-IB veröffentlicht neuen Hightech-Crime-Report: Europa unter Druck
Der Bericht liefert umfassende Einblicke in die globale und regionale Bedrohungslandschaft und basiert auf eigenen Forschungsergebnissen, realen Cyberermittlungen sowie Erkenntnissen des internationalen Netzwerks der Digital Crime Resistance Centers (DCRCs) von Group-IB. First seen on infopoint-security.de Jump to article: www.infopoint-security.de/group-ib-veroeffentlicht-neuen-hightech-crime-report-europa-unter-druck/a40366/
-
UK Police Are Ill-Equipped to Tackle AI Crimes
New Turing Institute Report Urges Government to Create AI Crime Task Force. British law enforcement agencies are ill-equipped to tackle artificial intelligence-enabled cybercrime, a report by The Alan Turing Institute says, pointing to an enormous gap between police technical capabilities and the growing sophistication of threat actors. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/uk-police-are-ill-equipped-to-tackle-ai-crimes-a-27888
-
‘Sim farms’, high heels, zombie knives: what scammers buy with the money they steal
A haul of items seized by police reveals the scale and threat of payment fraud a crime that can have significant emotional impact on victimsOn a shelf between Alexander McQueen shoes, Louis Vuitton handbags and Versace heels in the police evidence room are an 18-inch machete and a serrated <a href=”https://www.theguardian.com/uk-news/2023/dec/09/google-profiting-from-sale-of-zombie-knives-in-uk-despite-claims-of-ban”>zombie knife. Alongside the expensive…
-
BlackLock Ransomware Exposed After Researchers Exploit Leak Site Vulnerability
Tags: crime, data, data-breach, exploit, group, hacker, hacking, infrastructure, leak, ransomware, threat, vulnerabilityIn what’s an instance of hacking the hackers, threat hunters have managed to infiltrate the online infrastructure associated with a ransomware group called BlackLock, uncovering crucial information about their modus operandi in the process. Resecurity said it identified a security vulnerability in the data leak site (DLS) operated by the e-crime group that made it…
-
Europol warns of AIs growing role in organized crime operations
First seen on scworld.com Jump to article: www.scworld.com/brief/europol-warns-of-ais-growing-role-in-organized-crime-operations
-
Classiscam Operators Use Automated Malicious Sites to Steal Financial Data
Classiscam, an automated scam-as-a-service operation, has been identified as a significant threat in Central Asia, leveraging sophisticated techniques to defraud users of online marketplaces and e-commerce platforms. This fraudulent scheme, highlighted in the High-Tech Crime Trends Report 2025, utilizes Telegram bots to generate fake websites that mimic legitimate services, effectively deceiving victims into sharing their…
-
Statements von IT-Experten zum Europol-Crime-Report 2025
Europol hat kürzlich einen Bericht zur Entwicklung der Kriminalität in der EU veröffentlicht und das Fazit lautet: Digitale Verbrechen hängen physische in Ausmaß und Schadensumfang zunehmend ab. Dies sehen auch namhafte Experten der IT-Sicherheitsbranche so: Statements von von Check Point, KnowBe4, Sysdig, Armis und Veeam zum Europol-Bericht. Cyberkriminelle nehmen Einzelpersonen, Unternehmen, kritische Infrastrukturen und Regierungen…
-
NCA Warns of Sadistic Online “Com” Networks
The UK’s National Crime Agency is warning of a growing cyber and physical threat from homegrown teens First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/nca-warns-of-sadistic-online-com/
-
Hackers Using E-Crime Tool Atlantis AIO for Credential Stuffing on 140+ Platforms
Threat actors are leveraging an e-crime tool called Atlantis AIO Multi-Checker to automate credential stuffing attacks, according to findings from Abnormal Security.Atlantis AIO “has emerged as a powerful weapon in the cybercriminal arsenal, enabling attackers to test millions of stolen credentials in rapid succession,” the cybersecurity company said in an analysis.Credential stuffing is a First…
-
Teen Boys at Risk of Sextortion as 74% Lack Basic Awareness
The UK’s National Crime Agency has launched a new campaign designed to raise awareness of sextortion among teenage boys First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/teen-boys-risk-sextortion-74-lack/
-
Hybrid Threats and AI: Shaping the Future of EU’s Organized Threat Landscape in 2025
The European Union’s landscape of serious and organized crime is undergoing a significant transformation, according to the latest EU-SOCTA 2025 report released by Europol. This comprehensive assessment highlights how hybrid threats and artificial intelligence (AI) have become the core elements of the organized threat landscape in Europe, reshaping the tactics, tools, and strategies employed by…
-
How AI, corruption and digital tools fuel Europe’s criminal underworld
Europol has released its 2025 report on serious and organized crime in the EU. The EU Serious and Organised Crime Threat Assessment (EU-SOCTA) is based on intelligence from EU … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/03/24/europe-criminal-underworld/
-
Cybercriminals Taking Advantage of ‘Shadow’ Alliances, AI
A Europol report says nation-state actors are increasingly working with organized crime networks to achieve geopolitical goals, including the destabilization of the EU. First seen on darkreading.com Jump to article: www.darkreading.com/cyber-risk/cybercriminals-taking-advantage-ai-shadow-alliances
-
Cybercriminals Taking Advantage Of AI, ‘Shadow’ Alliances
A Europol report says nation-state actors are increasingly working with organized crime networks to achieve geopolitical goals, including the destabilization of the EU. First seen on darkreading.com Jump to article: www.darkreading.com/cyber-risk/cybercriminals-taking-advantage-ai-shadow-alliances
-
Capital One hacker Paige Thompson got too light a sentence, appeals court rules
Two of the three judges said five years’ probation and time served didn’t match the severity of the crime, among other reasons for overturning the sentence. First seen on cyberscoop.com Jump to article: cyberscoop.com/capital-one-hacker-paige-thompson-sentence-appeals-court/
-
Names, bank info, and more spills from top sperm bank
Cyber-crime is officially getting out of hand First seen on theregister.com Jump to article: www.theregister.com/2025/03/19/sperm_bank_data_leak/
-
Breaking Down Risks in Cybersecurity
Cyber Crime Junkies podcast Breaking Down Risks in Cybersecurity A great conversation on the Cyber Crime Junkies podcast with David Mauro! We covered so many different topics that the CISOs are struggling with: Generative vs Agentic AI risks and opportunities How cyber attackers leverage powerful tools like…
-
AI Is Turbocharging Organized Crime, EU Police Agency Warns
AI and other technologies “are a catalyst for crime, and drive criminal operations’ efficiency by amplifying their speed, reach, and sophistication,” the report said. The post AI Is Turbocharging Organized Crime, EU Police Agency Warns appeared first on SecurityWeek. First seen on securityweek.com Jump to article: www.securityweek.com/ai-is-turbocharging-organized-crime-eu-police-agency-warns/
-
Russia using criminal networks to drive increase in sabotage acts, says Europol
Proxies deploying tactics including migrant smuggling in destabilisation efforts across EU, enforcement agency finds<ul><li><a href=”https://www.theguardian.com/world/live/2025/mar/18/trump-putin-call-ukraine-ceasefire-proposals-european-council-meeting-europe-live-news-latest”>Europe live latest updates</li></ul>Russia and other state actors are driving an increase in politically motivated cyber-attacks and sabotage of infrastructure and public institutions in the EU, the bloc’s police enforcement agency has found.Europol’s 80-page serious and organised crime threat assessment for…
-
How Oracle is using AI to combat financial crime
The tech giant is leveraging artificial intelligence to surface fraudulent financial transactions and improve the efficiency of financial crime investigations, offering relief to banks battling high costs and alert fatigue First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366621012/How-Oracle-is-using-AI-to-combat-financial-crime
-
Alleged Israeli LockBit Developer Rostislav Panev Extradited to U.S. for Cybercrime Charges
A 51-year-old dual Russian and Israeli national who is alleged to be a developer of the LockBit ransomware group has been extradited to the United States, nearly three months after he was formally charged in connection with the e-crime scheme.Rostislav Panev was previously arrested in Israel in August 2024. He is said to have been…
-
Driving licence data could be used for police facial recognition
The government’s Crime and Policing Bill could allow police to access the UK driving licence database for use in facial recognition watchlists, but the Home Office denies biometric data would be repurposed in this way First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366620582/Driving-licence-data-could-be-used-for-police-facial-recognition
-
The Violent Rise of ‘No Lives Matter’
“No Lives Matter” has emerged in recent months as a particularly violent splinter group within the extremist crime network known as Com and 764, and experts are at a loss for how to stop its spread. First seen on wired.com Jump to article: www.wired.com/story/no-lives-matter-764-violence/
-
Cybersecurity Snapshot: CSA Outlines Data Security Challenges and Best Practices, While ISACA Offers Tips To Retain IT Pros
Tags: advisory, ai, awareness, banking, best-practice, business, cloud, compliance, corporate, crime, crypto, cve, cyber, cybercrime, cybersecurity, data, defense, exploit, extortion, finance, fraud, governance, government, group, healthcare, infrastructure, iot, jobs, mail, malicious, microsoft, mitigation, monitoring, network, nis-2, privacy, qr, ransom, ransomware, regulation, resilience, risk, risk-assessment, risk-management, scam, service, strategy, technology, threat, tool, vmware, vulnerability, vulnerability-management, zero-dayCheck out best practices for shoring up data security and reducing cyber risk. Plus, get tips on how to improve job satisfaction among tech staff. Meanwhile, find out why Congress wants federal contractors to adopt vulnerability disclosure programs. And get the latest on cyber scams; zero-day vulnerabilities; and critical infrastructure security. Dive into six things…

