Tag: crimes
-
Meme Crimes Can You Conspire By Meme?
Can a person be convicted of a federal conspiracy solely by posting misleading political memes online, without ever having communicated or knowingly coordinated with their alleged co-conspirators? First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/07/meme-crimes-can-you-conspire-by-meme/
-
Pro basketball player and 4 youths arrested in connection to ransomware crimes
Suspects were allegedly involved in a string of ransomware breaches. First seen on arstechnica.com Jump to article: arstechnica.com/security/2025/07/pro-basketball-player-and-4-youths-arrested-in-connection-to-ransomware-crimes/
-
Tech firms complicit in ‘economy of genocide’, says UN rapporteur
A UN special rapporteur has called for technology firms operating in Israel and the Occupied Palestinian Territories to immediately halt their activities, in wider report about the role corporate entities have played in the Israeli state’s ongoing ‘crimes of apartheid and genocide’ First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366626968/Tech-firms-complicit-in-economy-of-genocide-says-UN-rapporteur
-
Virginia county says April ransomware attack exposed employee SSNs
Carol Steele, the county’s administrator, said they hired cybersecurity experts to help with the recovery and notified the FBI’s Cyber Crimes Division as well as the Cyber Fusion Center of the Virginia State Police. First seen on therecord.media Jump to article: therecord.media/virginia-county-says-ransomware-attack-exposed-ssns
-
Second espionage-linked cyberattack hits ICC, exposing persistent threats to global justice systems
Tags: attack, crime, crimes, cyber, cyberattack, cybersecurity, data, disinformation, espionage, identity, infrastructure, intelligence, international, Internet, office, resilience, russia, spy, threat, ukrainePattern of sophisticated cyber espionage: This marks the second major cybersecurity incident targeting the ICC in recent years. In September 2023, the court disclosed it had suffered what it later characterized as “a targeted and sophisticated attack with the objective of espionage” that was “a serious attempt to undermine the Court’s mandate.”According to reports following…
-
International Criminal Court Hacked via Sophisticated Cyber Campaign
The International Criminal Court (ICC), the global tribunal responsible for prosecuting serious international crimes, has been targeted by a sophisticated and highly focused cyberattack late last week. The Court confirmed that the incident, which marks the second such breach in recent years, was quickly detected and contained through its robust cybersecurity measures. According to an…
-
Reported Impersonation Scams Surge 148% as AI Takes Hold
New ITRC data reveals identity crimes are down but impersonation scams now account for a third of all scams First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/reported-impersonation-scams-surge/
-
Microsoft launches European Security Program to counter nation-state threats
Tags: access, ai, attack, blizzard, cloud, control, country, crime, crimes, cyber, cybercrime, cybersecurity, framework, google, government, group, infrastructure, intelligence, malicious, malware, microsoft, network, open-source, resilience, russia, service, strategy, threat, vulnerabilityThree-component strategy: The European Security Program will operate through three main components designed to strengthen continental cyber defenses.The first element centers on enhanced threat intelligence sharing, where Microsoft will provide European governments with AI-enhanced, real-time insights into nation-state tactics.The company’s Digital Crimes Unit will expand intelligence sharing through the Cybercrime Threat Intelligence Program, giving European…
-
The US Is Storing Migrant Children’s DNA in a Criminal Database
Customs and Border Protection has swabbed the DNA of migrant children as young as 4, whose genetic data is uploaded to an FBI-run database that can track them if they commit crimes in the future. First seen on wired.com Jump to article: www.wired.com/story/cbp-dna-migrant-children-fbi-codis/
-
Enterprise-specific zero-day exploits on the rise, Google warns
Tags: access, apple, apt, attack, china, cisco, cloud, crime, crimes, cyberespionage, detection, endpoint, exploit, finance, flaw, google, group, Hardware, incident response, injection, Internet, ivanti, korea, lessons-learned, mandiant, microsoft, mitigation, network, north-korea, remote-code-execution, russia, service, strategy, technology, threat, tool, update, vpn, vulnerability, zero-daySurge in network edge device exploitation: Of the 33 zero-day vulnerabilities in enterprise-specific products, 20 targeted hardware appliances typically located at the network edge, such as VPNs, security gateways, and firewalls. Notable targets last year included Ivanti Cloud Services Appliance, Palo Alto Networks’ PAN-OS, Cisco Adaptive Security Appliance, and Ivanti Connect Secure VPN.Targeted attacks against…
-
FBI Reports ₹1.38 Lakh Crore Loss in 2024, a 33% Surge from 2023
The FBI’s Internet Crime Complaint Center (IC3) has reported a record-breaking loss of $16.6 billion (approximately ₹1.38 lakh crore) due to cyber-enabled crimes in 2024, marking a staggering 33% increase from the previous year. Established 25 years ago, IC3 has evolved into the primary hub for reporting cyber fraud and threats, processing over 9 million…
-
CEO of cybersecurity firm charged with installing malware on hospital systems
Veritaco CEO Jeffrey Bowie faces charges for allegedly installing malware on hospital computers, violating Oklahoma’s Computer Crimes Act. Jeffrey Bowie, CEO of the cybersecurity firm Veritaco, is facing two counts of violating Oklahoma’s Computer Crimes Act for allegedly infecting employee computers at the Oklahoma City St. Anthony Hospital. The man is accused of having installed…
-
U.S. Secret Service Reveals Ways to Identify Credit Card Skimmers
With credit card skimming crimes escalating nationwide, the U.S. Secret Service’s Washington Field Office is sharing essential tips for the public to protect themselves from this growing threat, shared by Officials in LinkedIn post. According to the agency, credit card skimming involves criminals installing illicit devices to steal card information, has become a “low-risk, high-reward”…
-
UK Police Are Ill-Equipped to Tackle AI Crimes
New Turing Institute Report Urges Government to Create AI Crime Task Force. British law enforcement agencies are ill-equipped to tackle artificial intelligence-enabled cybercrime, a report by The Alan Turing Institute says, pointing to an enormous gap between police technical capabilities and the growing sophistication of threat actors. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/uk-police-are-ill-equipped-to-tackle-ai-crimes-a-27888
-
Microsoft Busts Hackers Selling Illegal Azure AI Access
LLMjacking operation leveraged illicit access GenAI services to produce explicit celebrity images and other harmful content, Microsoft’s digital crimes unit says. First seen on darkreading.com Jump to article: www.darkreading.com/application-security/microsoft-openai-hackers-selling-illicit-access-azure-llm-services
-
How Banks Can Adapt to the Rising Threat of Financial Crime
Banking fraud and financial crimes are growing more sophisticated every day. By understanding the threats and building strong collaborations, banks can protect themselves and their clients. First seen on darkreading.com Jump to article: www.darkreading.com/cyber-risk/how-banks-adapt-rising-threat-financial-crime
-
Unusual attack linked to Chinese APT group combines espionage and ransomware
Tags: apt, attack, breach, china, cloud, country, credentials, crime, crimes, crypto, cyber, cybercrime, cyberespionage, data, encryption, espionage, exploit, finance, firewall, government, group, hacker, infection, insurance, intelligence, korea, microsoft, network, north-korea, ransom, ransomware, russia, software, tactics, technology, threat, veeam, vulnerabilityThe attacker demanded a $2-million ransom: The attack that resulted in the deployment of the RA World ransomware program, as well as data exfiltration, had the same chain: the toshdpdb.exe loading toshdpapi.dll then decrypting toshdp.dat which resulted in the PlugX variant being deployed. The difference is the attacker then chose to deploy the RA World…
-
The Loneliness Epidemic Is a Security Crisis
Romance scams cost victims hundreds of millions of dollars a year. As people grow increasingly isolated, and generative AI helps scammers scale their crimes, the problem could get worse. First seen on wired.com Jump to article: www.wired.com/story/loneliness-epidemic-romance-scams-security-crisis/
-
Police arrest teenager suspected of hacking NATO and numerous Spanish institutions
Spain’s National Police, in a joint operation with the Civil Guard, has arrested an 18-year-old suspected of being the hacker going by aliases including “Natohub,” and known for hacking the computer services of private companies and Spanish institutions such as the Civil Guard, the Ministry of Defense, the National Mint, and the Ministry of Education,…
-
Microsoft sues overseas threat actor group over abuse of OpenAI service
Microsoft has filed suit against 10 unnamed people (“Does”), who are apparently operating overseas, for misuse of its Azure OpenAI platform, asking the Eastern District of Virginia federal court for damages and injunctive relief.The suit was filed in late December but was not made public until last Friday, when the initial sealed filings were revealed.…
-
Microsoft Sues Hacking Group Exploiting Azure AI for Harmful Content Creation
Microsoft has revealed that it’s pursuing legal action against a “foreign-based threatactor group” for operating a hacking-as-a-service infrastructure to intentionally get around the safety controls of its generative artificial intelligence (AI) services and produce offensive and harmful content.The tech giant’s Digital Crimes Unit (DCU) said it has observed the threat actors “develop First seen on…
-
Hackers Brute Force Your Passwords?
Cybercrimes have always existed as a result of internet usage in our society. Traversing the wide web, hackers are trying to exploit any nooks and crannies in the system. While many new types of crimes are arising on the internet, brute-force attacks are still the most common. Based on recent research, they have grown from…
-
792 Syndicate Suspects Arrested in Massive Crypto and Romance Scam: The Rise of Cybercrime as a Corporate Enterprise
The Economic and Financial Crimes Commission (EFCC) recently executed a landmark operation in Lagos, Nigeria, arresting 792 suspects for their alleged involvement in a cryptocurrency investment fraud and romance scam. The raid, conducted at an imposing seven-storey building in Victoria Island, sheds light on the systematic infrastructure and advanced methods employed by these fraud networks…
-
Nigeria Cracks Down on Cryptocurrency Investment Fraud and Romance Scams
The suspects were apprehended in a surprise operation at their hideout in Lagos following intelligence received by Nigeria’s Economic and Financial Crimes Commission First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/nigeria-cracks-down-cryptocurrency/

