The arrests follow multiple investigations into attempted murders ordered via encrypted platforms, including a recent attack on 7 May 2025
The arrests follow multiple investigations into attempted murders ordered via encrypted platforms, including a recent attack on 7 May 2025
The action day led to the following results:8 arrests, including the leaders of the criminal organisation (4 in Algeciras, 3
Between 11 and 13 June, a series of coordinated actions took place across Germany, the Netherlands, Romania, Spain, Sweden, targeting
SIRIUS is an EU-funded project that helps law enforcement and judicial authorities access cross-border electronic evidence in the context of
The investigation targeted a criminal network that used companies in Costa Rica to receive cocaine from Colombia and conceal it
Europol’s 2025 Internet Organised Crime Threat Assessment (IOCTA), published today, reveals how stolen data fuels the digital underworld, powering a
Here’s nine ways to prevent attackers from weaponizing open-source intelligence.SCM feed for Endpoint/Device SecurityRead More
Results of the operation:48 suspects arrested3.8 tonnes of cocaine seized29 house searches in Fuerteventura (2), Gran Canaria (13) and Lanzarote
On 3 June, law enforcement carried out raids in five major cities across Bulgaria under the supervision of the Burgas
On the action day, 50 handguns of one specific make, 13 further handguns, 4 machine guns, 4 rifles, 1 revolver,
The referral day took place only a few weeks after Europol launched a new Operational Taskforce to tackle the rising
Two main organisers identifiedIn June 2024, the French authorities seized 216 kilograms of crystal methamphetamine and arrested two French nationals
The group composed of up to 20 Dutch nationals was based mostly in the greater Utrecht area, with some individuals
The operation took place in April 2025 and led to:14 arrests (11 in Belgium, 2 in Germany, 1 in Italy)11
Between 12 and 23 May 2025, victim identification experts from over 30 countries and Europol analysed hundreds of images and
Its origin goes back to the foundation of the European Police Office by the Europol Convention, which set the legal
The criminal network lured victims with the promise of high returns on investments through a fraudulent online trading platform. After
The suspects were identified through coordinated investigations based on intelligence from the takedowns of the dark web marketplaces Nemesis, Tor2Door,
In addition, EUR 3.5 million in cryptocurrency was seized during the action week, bringing the total amount seized during the
The German investigation began with a routine immigration check in September 2024. Due to irregularities in a driver’s documentation, he
The now defunct platforms – Cfxapi, Cfxsecurity, neostress, jetstress, quickdown and zapcut – are thought to have facilitated widespread attacks
This joint operation targeted the sophisticated ecosystem that allowed criminals to exploit stolen information on a massive scale. Europol coordinated
Operational highlightsThe Italian Carabinieri Command for the Protection of Cultural Heritage (TPC) in coordination with the Italian Customs and Monopolies
The 17 individuals arrested are mostly of Chinese and Syrian nationality and are suspected of providing primarily money laundering services
In addition, EUR 3.5 million in cryptocurrency was seized during the action week, bringing the total amount seized during the
The suspects were identified through coordinated investigations based on intelligence from the takedowns of the dark web marketplaces Nemesis, Tor2Door,
Operational highlightsThe Italian Carabinieri Command for the Protection of Cultural Heritage (TPC) in coordination with the Italian Customs and Monopolies
This joint operation targeted the sophisticated ecosystem that allowed criminals to exploit stolen information on a massive scale. Europol coordinated
Nova Scotia Power says a wide range of personal and financial information was stolen in the recent cyberattack. The post
The Australian Human Rights Commission says data submitted through the complaint form on its website was inadvertently exposed. The post
The China-linked hacking group Earth Ammit has launched multi-wave attacks in Taiwan and South Korea to disrupt the drone sector.
On April 14, Dubai’s ruler, Sheikh Mohammed bin Rashid Al Maktoum, announced that the United Arab Emirates would begin using artificial intelligence to help
Two ransomware groups and several Chinese APTs have been exploiting two recent SAP NetWeaver vulnerabilities. The post Ransomware Groups, Chinese
American steel giant Nucor on Wednesday disclosed a cybersecurity incident that bears the hallmarks of a ransomware attack. The post
Enterprise cybersecurity giant Proofpoint is buying Germany-based Microsoft 365 security solutions provider Hornetsecurity. The post Proofpoint to Acquire Hornetsecurity in
Coinbase said a group of rogue contractors were bribed to pull customer data from internal systems, leading to a $20
Its origin goes back to the foundation of the European Police Office by the Europol Convention, which set the legal
The 17 individuals arrested are mostly of Chinese and Syrian nationality and are suspected of providing primarily money laundering services
The German investigation began with a routine immigration check in September 2024. Due to irregularities in a driver’s documentation, he
The criminal network lured victims with the promise of high returns on investments through a fraudulent online trading platform. After
The now defunct platforms – Cfxapi, Cfxsecurity, neostress, jetstress, quickdown and zapcut – are thought to have facilitated widespread attacks
The importance of the MITRE-run Common Vulnerabilities and Exposures (CVE) Program shouldn’t be understated. For 25 years, it has acted
Android’s May 2025 security update includes patches for an exploited vulnerability in the FreeType open source rendering engine. The post
Reporting on the rise of fake students enrolling in community college courses: The bots’ goal is to bilk state and
Misconfigured Apache Pinot instances can and have enabled threat actors to gain access to sensitive information. The post Microsoft Warns
CISA warns organizations that threat actors are exploiting a critical-severity vulnerability in low-code AI builder Langflow. The post Critical Vulnerability
Threat actors started exploiting a vulnerability in Samsung MagicINFO only days after a PoC exploit was published. The post Samsung
Rami Khaled Ahmed, a 36-year-old from Yemen, has been charged for launching ransomware attacks between 2021 and 2023. The post
Threat actors are revisiting SAP NetWeaver instances to leverage webshells deployed via a recent zero-day vulnerability. The post Second Wave
The exploitation of young perpetrators to carry out criminal acts has emerged as a fast-evolving tactic used by organised crime.
The lab was located in a mansion in a remote area. Two Dutch nationals, who were identified as chemists, were
Az Európai Unió Kiberbiztonsági ügynöksége (az ENISA) 2011-ben kezdett el foglalkozni azzal a gondolattal, hogy egy szervezett kampány keretei között olyan
A Sysmon új verziója számos új funkcióval bővült, többek között a file zárolás lehetőségével. Az új funkció lehetővé teszi futtatható
A MISP (Malware Information Sharing Platform) új korrelációs motorral, új munkafolyamatokkal bővült a mostani kiadásában. FORRÁS
Ha szeretszt Elasticsearch-el dolgozni és szereted, ha a logjaid egységes neveket alkalmaznak, egységes típusokat az a jó megoldás számodra. FORRÁS
Cisco Talos nemrég felfedezett egy új támadó keretrendszert amelyet ‘Manjusaka’-nak neveznek.A kutatás egy rosszindulatú Word dokumentum elemzésével kezdődött, amiben egy
A jelentés fókusza a megtévesztési formákra fókuszál, így biztosítva tisztább összképet arról, hogy a rosszindulatú kódok fejlesztői milyen formában igyekeznek