Search results for: “law enforcement”
Showing results matching your search
Refine your search
-
Honeypot Defense Turns Breach Claim Into Intelligence
Threat actors claimed breaching Resecurity. The firm responded with deception: attackers accessed a honeypot trap containing fake data. Resecurity’s defense turned an attack into intelligence collection.
·
·
6–9 minutes -
European Space Agency Data Breach Exposes 200GB of Infrastructure and Source Code
A hacker claiming the alias 888 alleges a breach of the European Space Agency on December 18, 2025, claiming theft of 200GB of internal data including private repositories, project management systems, CI/CD configurations, and hardcoded…
·
·
6–9 minutes -
RondoDox Botnet Exploits React2Shell CVSS 10.0 to Hijack 90,300+ IoT Devices and Web Servers
A sophisticated botnet campaign spanning nine months has targeted IoT devices and web applications worldwide, exploiting React2Shell CVE-2025-55182 (CVSS 10.0) as its primary initial access vector since December 2025. With 68,400 vulnerable instances in the…
·
·
8–12 minutes -
Scottish Council Two Years into Ransomware Recovery
The Scottish Comhairle nan Eilean Siar, or Council for the Western Isles, is now two years deep into recovering from a major ransomware attack that hit them in early November 2023. The direct financial fallout…
·
·
2–3 minutes -
Ex-Officer Gets Suspended Sentence for Selling Police Files to Journalist Nephew
A former police officer in Yekaterinburg has received a four-year suspended sentence after admitting to selling confidential police files. The court press service confirmed the ruling on Tuesday. Andrei Karpov, the ex-officer, pleaded guilty to…
·
·
1–2 minutes -
Sanctions Hit Russia’s Bulletproof Hosting Provider
U.S., UK, and Australia sanction Russia-based Media Land for providing bulletproof hosting to ransomware groups like LockBit, BlackSuit, and Play, freezing assets and prohibiting transactions.
·
·
1–2 minutes -
Hijack Loader Delivers PureHVNC in Latin America; Insider Sells Exploits
Hijack Loader used malicious SVGs to deliver PureHVNC in Latin America; a separate DOJ case details an insider selling exploit tooling for cryptocurrency.
·
·
2–3 minutes -
What is Rhadamanthys Infostealer?
Rhadamanthys Infostealer compromises digital security by illicitly acquiring sensitive user data. This sophisticated malicious software operates as a Malware-as-a-Service (MaaS), posing a significant threat to individuals and organizations. It facilitates widespread credential theft and financial…
·
·
2–3 minutes -
Global Fraud Rings Explained
Global fraud rings are highly organized, transnational criminal enterprises that use intricate networks and sophisticated tactics to illicitly acquire money, assets, or sensitive information from individuals, corporations, and national economies across international borders.
·
·
2–3 minutes -
Russia Detains Eight in Bashkortostan Over Alleged Telecom Sabotage Plot
Russian authorities have detained eight individuals in the republic of Bashkortostan, alleging their involvement in a plot to sabotage telecommunications infrastructure. The detentions signal a heightened focus on internal security amidst ongoing international tensions.
·
·
1–2 minutes








