Podcasts about Europol

  • 544PODCASTS
  • 978EPISODES
  • 37mAVG DURATION
  • 5WEEKLY NEW EPISODES
  • Sep 13, 2025LATEST

POPULARITY

20172018201920202021202220232024

Categories



Best podcasts about Europol

Latest podcast episodes about Europol

The Documentary Podcast
Who's behind Europe's largest rare book heist?

The Documentary Podcast

Play Episode Listen Later Sep 13, 2025 26:29


The University library in Tartu, in Estonia, is a large brutalist complex, surrounded by concrete water fountains and futuristic steel sculptures. But inside this unassuming building lies a hidden treasure: rare books worth thousands. In April 2022, some of these books were stolen, including historic editions by Alexander Pushkin. According to Europol, the European law enforcement agency, this theft was part of a criminal operation that targeted national libraries in 12 countries, including the Baltic states, Poland, Finland, Germany and France. It's been described as Europe's largest book heist since War World Two. Who was behind it? My colleague Nina Nazarova from BBC Russian has been investigating this story. Plus, 7-year-old Nigerian online musical sensation Emmanuel plays keyboards and drums, and has been captivating audiences online, as BBC Pidgin's Adesola Ikulajolu reports. This episode of The Documentary comes to you from The Fifth Floor, the show at the heart of global storytelling, with BBC journalists from all around the world. This is an EcoAudio certified production. (Photo: Faranak Amidi. Credit: Tricia Yourkevich.)

Se Habla Español
Español con noticias 70: Migrantes en dobles fondos - Episodio exclusivo para mecenas

Se Habla Español

Play Episode Listen Later Aug 31, 2025 25:28


Agradece a este podcast tantas horas de entretenimiento y disfruta de episodios exclusivos como éste. ¡Apóyale en iVoox! Episodio exclusivo para suscriptores de Se Habla Español en Apple Podcasts, Spotify, iVoox y Patreon: Spotify: https://open.spotify.com/show/2E2vhVqLNtiO2TyOjfK987 Patreon: https://www.patreon.com/sehablaespanol Buy me a coffee: https://www.buymeacoffee.com/sehablaespanol/w/6450 Donaciones: https://paypal.me/sehablaespanol Contacto: sehablaespanolpodcast@gmail.com Facebook: www.facebook.com/sehablaespanolpodcast Twitter: @espanolpodcast Hola, ¿cómo va todo? Parece mentira que ya se acabe el mes de agosto. Y en mi caso, lo peor es que ya he vuelto a trabajar. Bueno, digo lo peor porque me gusta más estar de vacaciones, claro. Pero tener trabajo es un privilegio, porque hay muchas personas que no lo tienen. Así que, estoy muy agradecido, sobre todo porque el ambiente de trabajo es bastante bueno. Nos llevamos bien entre los compañeros del departamento audiovisual. Y como solía decirme un amigo mío con el que trabajé hace tiempo, mi amigo Alberto, sentirse a gusto en el trabajo es lo mejor que te puede pasar. Y hablando de trabajo, cada año miles de personas de países menos desarrollados tienen que abandonar sus casas para desplazarse al llamado “primer mundo”. España, por su ubicación geográfica, es una de las principales puertas de entrada a Europa para miles de personas que buscan una vida mejor. Muchas de ellas lo hacen de forma legal, pero otras llegan sin los permisos necesarios, lo que se conoce como inmigración irregular. En 2024, más de 56.000 personas entraron en España de manera irregular, un aumento significativo o considerable con respecto al año anterior La ruta canaria fue la más utilizada, con más de 21.000 llegadas solo a las Islas Canarias procedentes de África. Las personas migrantes suelen llegar por varios medios: Por mar, en pateras o cayucos, desde países como Marruecos, Senegal o Mauritania. Por tierra, cruzando las vallas fronterizas de Ceuta y Melilla. O incluso por aire, con visados turísticos que luego vencen. Una vez en territorio español, los migrantes irregulares pueden ser detenidos hasta 72 horas para su identificación, pueden acceder a programas de atención humanitaria, gestionados por entidades como Cruz Roja, y también pueden solicitar protección internacional o asilo, si cumplen ciertos requisitos. En muchos casos, son alojados en centros de acogida o pisos tutelados, especialmente si son menores o personas vulnerables. En cuanto a la manera de regularizar su situación, existen varias vías legales para obtener la residencia: Arraigo social: tras vivir 3 años en España y demostrar integración. Arraigo laboral: si han trabajado al menos 6 meses. Arraigo familiar: si tienen hijos españoles o familiares directos. Arraigo para la formación: si se comprometen a estudiar un curso profesional. Te cuento todo esto porque la noticia que vamos a escuchar hoy está muy relacionada con este tema. En concreto, habla de una de las formas utilizadas para introducir inmigrantes ilegales en España. Así que, lo mejor es que la escuchemos por primera vez. Como casi siempre, pertenece a Radio Nacional de España. “En camionetas, en dobles fondos, sin ventilación, sin ninguna medida de seguridad. Estas son las condiciones en las que más de 500 migrantes, incluyendo también menores, fueron introducidos en Europa, a través de una red de tráfico que ha desmantelado un operativo conjunto de la Policía Nacional de España con la francesa y con la Europol. Hay siete detenidos, ¿no? Sí, esta red utilizaba una ruta inédita para introducir en España migrantes irregulares, la mayoría marroquíes y argelinos. Desde estos países viajaban en avión hasta el Reino Unido para no levantar sospechas. Se quedaban en ese país y antes de que se les acabara el permiso de residencia, eran trasladados a Francia y desde ahí a España en camiones o furgonetas, como decías antes, sin ninguna medida de seguridad, tumbados entre la mercancía, sin comida ni agua, lo que suponía un grave riesgo para su vida, según ha explicado la Policía Nacional. Tanto en España como en Francia, estas personas residían hacinados en pisos a las afueras de las ciudades. El objetivo era venderlos como mano de obra para labores agrícolas. Cada migrante pagaba entre 350 y 1.500 euros a la red para poder ser trasladados. Llegaron a organizar 68 viajes con unos 500 migrantes. La recaudación superó el medio millón de euros.” Como ves, hay personas que se hacen ricas aprovechándose de la situación vulnerable de otras. Pero no siempre se salen con la suya, no siempre tienen éxito, como en esta ocasión, porque la policía está muy pendiente de estas mafias que trafican con personas. En cuanto a las palabras más destacadas, empezamos con el doble fondo, que es un compartimento oculto dentro de un objeto,como una maleta o un vehículo, que no es visible a simple vista y que se usa para esconder cosas o personas. La policía encontró a varios migrantes escondidos en un doble fondo del camión. El coche tenía un doble fondo en el maletero para ocultar mercancía ilegal. En muchas ocasiones, esos dobles fondos no tienen ventilación, o sea, no hay entrada o circulación de aire. Eso es la ventilación. Las personas viajaban sin ventilación, lo que ponía en riesgo su salud. En el sótano no hay ventanas, así que la ventilación es muy mala. El verbo desmantelar significa deshacer o eliminar una estructura, organización o sistema, especialmente si es ilegal o peligroso. Las autoridades lograron desmantelar una red de tráfico de personas. La policía desmanteló un laboratorio clandestino de drogas. El adjetivo inédita se refiere a algo que nunca antes se había visto, hecho o utilizado; nueva o desconocida. El masculino sería inédito. La red utilizaba una ruta inédita para entrar en España sin ser detectados. El escritor publicó una novela inédita que había guardado durante años. La expresión levantar sospechas es hacer que alguien empiece a dudar o sospechar que algo no es normal o legal. Lo importante es el verbo que usamos, levantar. Viajaban al Reino Unido para no levantar sospechas en los controles fronterizos. Su comportamiento extraño empezó a levantar sospechas entre los vecinos. Si una persona está tumbada es que se encuentra en posición horizontal, acostada, generalmente sobre el suelo o una superficie plana. Los migrantes iban tumbados entre cajas, sin espacio para moverse. Estaban tumbados en el suelo del camión, sin comida ni agua. Y si los migrantes estaban hacinados es que se encontraban muy juntos en un espacio reducido, sin condiciones adecuadas de higiene o comodidad. Vivían hacinados en pisos pequeños a las afueras de la ciudad. Los refugiados estaban hacinados en un centro sin recursos suficientes. Por último, la recaudación es el dinero obtenido a través de cobros, ventas o actividades, especialmente si es de forma organizada. La recaudación del partido superó los dos millones de euros. El concierto benéfico logró una recaudación de más de 10.000 euros. Muy bien. ¿Alguna duda? Espero que no. Si lo necesitas, puedes escuchar de nuevo las explicaciones. Si no, si está todo claro, pasamos al segundo pase de la noticia. “En camionetas, en dobles fondos, sin ventilación, sin ninguna medida de seguridad. Estas son las condiciones en las que más de 500 migrantes, incluyendo también menores, fueron introducidos en Europa, a través de una red de tráfico que ha desmantelado un operativo conjunto de la Policía Nacional de España con la francesa y con la Europol. Hay siete detenidos, ¿no? Sí, esta red utilizaba una ruta inédita para introducir en España migrantes irregulares, la mayoría marroquíes y argelinos. Desde estos países viajaban en avión hasta el Reino Unido para no levantar sospechas. Se quedaban en ese país y antes de que se les acabara el permiso de residencia, eran trasladados a Francia y desde ahí a España en camiones o furgonetas, como decías antes, sin ninguna medida de seguridad, tumbados entre la mercancía, sin comida ni agua, lo que suponía un grave riesgo para su vida, según ha explicado la Policía Nacional. Tanto en España como en Francia, estas personas residían hacinados en pisos a las afueras de las ciudades. El objetivo era venderlos como mano de obra para labores agrícolas. Cada migrante pagaba entre 350 y 1.500 euros a la red para poder ser trasladados. Llegaron a organizar 68 viajes con unos 500 migrantes. La recaudación superó el medio millón de euros.” Mucho mejor ahora, ¿verdad? Bueno, pues no vamos a parar aquí, sino que ahora te voy a ofrecer algunos sinónimos de las palabras que aparecen en la noticia en mi resumen habitual. Viajaban en furgonetas, en compartimentos ocultos, sin aire, sin protección alguna. Así fueron transportadas más de 500 personas migrantes, incluidos niños y adolescentes, hacia Europa, por medio de una organización criminal dedicada al tráfico de seres humanos, que ha sido desarticulada gracias a una acción coordinada entre la Policía Nacional española, las autoridades francesas y Europol. Hay siete arrestados. Esta estructura delictiva empleaba una vía poco habitual para introducir en territorio español a extranjeros en situación irregular, en su mayoría originarios de Marruecos y Argelia. Desde esos países, los migrantes volaban primero al Reino Unido para que todo pareciera normal. Permanecían allí un tiempo y, antes de que expirara su permiso temporal de estancia, eran trasladados a Francia, y desde allí a España, ocultos en vehículos de carga, sin ventilación, acostados entre mercancías, sin acceso a alimentos ni agua, lo que representaba un peligro extremo para su integridad física, según informó la Policía. Tanto en territorio español como en el francés, estas personas eran alojadas en viviendas saturadas, situadas en zonas periféricas de las ciudades. El propósito final era explotarlos laboralmente en el sector agrícola. Cada migrante pagaba entre 350 y 1.500 euros a la red por el traslado. En total, se organizaron 68 desplazamientos, movilizando a unas 500 personas, y la ganancia obtenida superó los 500.000 euros. Como te decía antes, esos 7 detenidos estaban haciendo mucho dinero con este negocio ilegal. Escuchamos la noticia por última vez y luego te cuento más cosas. “En camionetas, en dobles fondos, sin ventilación, sin ninguna medida de seguridad. Estas son las condiciones en las que más de 500 migrantes, incluyendo también menores, fueron introducidos en Europa, a través de una red de tráfico que ha desmantelado un operativo conjunto de la Policía Nacional de España con la francesa y con la Europol. Hay siete detenidos, ¿no? Sí, esta red utilizaba una ruta inédita para introducir en España migrantes irregulares, la mayoría marroquíes y argelinos. Desde estos países viajaban en avión hasta el Reino Unido para no levantar sospechas. Se quedaban en ese país y antes de que se les acabara el permiso de residencia, eran trasladados a Francia y desde ahí a España en camiones o furgonetas, como decías antes, sin ninguna medida de seguridad, tumbados entre la mercancía, sin comida ni agua, lo que suponía un grave riesgo para su vida, según ha explicado la Policía Nacional. Tanto en España como en Francia, estas personas residían hacinados en pisos a las afueras de las ciudades. El objetivo era venderlos como mano de obra para labores agrícolas. Cada migrante pagaba entre 350 y 1.500 euros a la red para poder ser trasladados. Llegaron a organizar 68 viajes con unos 500 migrantes. La recaudación superó el medio millón de euros.” La inmigración irregular es un fenómeno complejo que requiere respuestas coordinadas, tanto a nivel nacional como internacional. En los últimos años, España y la Unión Europea han intensificado sus esfuerzos para controlar los flujos migratorios, proteger los derechos humanos y combatir las redes de tráfico de personas. Por lo que se refiere a España, ha reforzado su estrategia en varios frentes: Cooperación con países africanos: Ha firmado acuerdos bilaterales con Senegal, Mauritania y Gambia, entre otros, para fomentar la migración regular y segura, y combatir las mafias que trafican con personas. Migración circular: A través de este modelo, personas de países como Marruecos, Honduras o Colombia pueden venir a trabajar de forma temporal y regresar a su país, evitando así la irregularidad. Control fronterizo: Se han reforzado los medios en puntos críticos como Ceuta, Melilla y las Islas Canarias, con más vigilancia marítima y terrestre. Campañas informativas: En países de origen, para desmentir falsas promesas de las mafias y explicar los riesgos reales del viaje. Lo que parece claro es que la inmigración irregular no se resuelve solo con muros o patrullas. Requiere mucha cooperación internacional, vías legales de acceso, y mejoras en los países de origen de esas personas que buscan una vida diferente. Pero es un tema muy complejo, muy complicado, con difícil solución. Venga, vamos a repasar las palabras y expresiones que hemos aprendido hoy. -Doble fondo: Compartimento oculto dentro de un objeto (como una maleta o un vehículo) que no es visible a simple vista y se usa para esconder cosas. -Ventilación: Entrada o circulación de aire en un espacio cerrado para mantenerlo fresco o respirable. -Desmantelar: Deshacer o eliminar una estructura, organización o sistema, especialmente si es ilegal o peligroso. -Inédita: Que nunca antes se había visto, hecho o utilizado; nueva o desconocida. -Levantar sospechas: Hacer que alguien empiece a dudar o sospechar que algo no es normal o legal. -Tumbados: En posición horizontal, acostados, generalmente sobre el suelo o una superficie plana. -Hacinados: Muy juntos en un espacio reducido, sin condiciones adecuadas de higiene o comodidad. -Recaudación: Dinero obtenido a través de cobros, ventas o actividades, especialmente si es de forma organizada. Perfecto. Aquí se termina este episodio, al igual que el mes de agosto. Ahora empieza una nueva temporada de trabajo para muchas personas, sobre todo en España, donde este mes suele ser el más habitual para las vacaciones, un mes en el que muchas empresas cierran para descansar. En otros países, sin embargo, ya han empezado las clases en los colegios, así que ya han vuelto a la rutina. Sea cual sea tu caso, te deseo lo mejor para esta nueva temporada. Muchas gracias de nuevo por acompañarme en esta aventura. Ha sido un placer. Adiós. Escucha este episodio completo y accede a todo el contenido exclusivo de Se Habla Español. Descubre antes que nadie los nuevos episodios, y participa en la comunidad exclusiva de oyentes en https://go.ivoox.com/sq/171214

Criminal Compliance Podcast
Europol: Struktur, Arbeitsweise und Datenanalyse

Criminal Compliance Podcast

Play Episode Listen Later Aug 29, 2025 10:50


Wie funktioniert Strafverfolgung, wenn Kriminalität längst nicht mehr an nationalen Grenzen haltmacht? In dieser Folge wirft Dr. Christian Rosinus einen Blick auf Europol – die europäische Polizeibehörde mit Sitz in Den Haag. Als Knotenpunkt für Analysen und Informationsaustausch unterstützt Europol die Mitgliedstaaten bei der Bekämpfung von organisierter Kriminalität, Cybercrime, Terrorismus und Geldwäsche. Im Gespräch geht es darum, warum Europol als Kompetenzzentrum für Strafverfolgungsexperten gilt, welche Rolle Datenbanken, Analysen und internationale Verbindungsbeamte spielen und weshalb die Behörde selbst keine Festnahmen durchführen darf. Außerdem werden die hohen Anforderungen an Datenschutz und das sogenannte ORCON-Prinzip beleuchtet. Abgerundet wird die Folge durch Einblicke in aktuelle Projekte und Erfolge, etwa die Finanz-Taskforce EFIPPP und die Operation A.S.S.E.T. Hier geht's zur Folge „Interpol: Struktur, Instrumente und internationale Verteidigung“: https://criminal-compliance.podigee.io/261-cr Hier geht's zur Folge „Die europäische Anti-Geldwäschebehörde (AMLA)“: https://criminal-compliance.podigee.io/195-cr Hier geht's zum Europol Podcast: https://www.europol.europa.eu/media-press/europol-podcast Hier erfahren Sie mehr über das Project A.S.S.E.T.: https://www.europol.europa.eu/media-press/newsroom/news/europol-holds-largest-ever-operation-to-increase-seizures-of-criminal-assets-worldwide https://www.rosinus-on-air.com https://rosinus-partner.com

Risky Business News
Risky Bulletin: Child sextortion cases linked to scam compounds

Risky Business News

Play Episode Listen Later Aug 20, 2025 7:16


Almost 500 child sextortion cases have been linked to scam compounds, Oracle's CSO departs after 37 years, Europol offers a reward for the Qilin ransomware group, and the UK drops its demand for an Apple backdoor. Show notes Risky Bulletin: NIST releases face-morphing detection guideline

Seize & Desist
Ep. 21: What is Interpol's New Silver Notice?

Seize & Desist

Play Episode Listen Later Aug 20, 2025 52:08


In this conversation, host Aidan Larkin discusses Interpol's pivotal role in global law enforcement with Nick Court, the Assistant Director at Interpol's Financial Crime and Anti-Corruption Centre. They explore the launch of the Silver Notice, a new tool designed to help recover criminal assets across borders, its potential to strengthen international cooperation, and what it could mean for the future of global law enforcement. Timestamps00:00 - Introduction 02:15 - Role of Interpol in Global Law Enforcement 10:30 - Significance of the Silver Notice 18:45 - Challenges in Asset Recovery 25:00 - Importance of International Cooperation 32:20 - Impact of the Silver Notice Pilot Program 40:00 - Conclusion and Key Takeaways About our Guest Nick Court is a seasoned law enforcement professional with extensive experience in economic crime and asset recovery. Currently serving as the Assistant Director at Interpol's Financial Crime and Anti-Corruption Centre, Nick has dedicated his career to tackling financial crime on a global scale. With a background as a detective in the City of London Police, he has been instrumental in international investigations, particularly in fraud and cybercrime. Key TakeawaysRole of Interpol in Global Law Enforcement: Nick Court highlights Interpol's unique position as the only global law enforcement organisation and how it drives international cooperation and intelligence sharing. Significance of the Silver Notice: The Silver Notice is a strategic tool to enhance asset recovery by enabling countries to trace and identify criminal assets across borders. Challenges in Asset Recovery: Nick explains the complexities and resource constraints law enforcement agencies face when recovering assets and why international collaboration is critical. Importance of International Cooperation: Coordinated efforts among countries are essential to effectively combating financial crime and improving asset recovery outcomes. Impact of the Silver Notice Pilot Program: The pilot program engages multiple countries to recover assets that would otherwise remain hidden, showcasing its potential to transform asset recovery efforts. Resources Mentioned Interpol's Official Website INTERPOL publishes first Silver Notice targeting criminal assets City of London Police secure Silver Notice against convicted fraudster Dirty assets: the Silver Notice hits organized crime in its pocket Stay Connected Dive deeper into the world of asset recovery with Seize & Desist. Subscribe for exclusive insights into the stories that are redefining asset recovery.Disclaimer Our podcasts are for informational purposes only. They are not intended to provide legal, tax, financial, and/or investment advice. Listeners must consult their own advisors before making decisions on the topics discussed. Asset Reality has no responsibility or liability for any decision made or any other acts or omissions in connection with your use of this material. The views expressed by guests are their own and their appearance on the program does not imply an endorsement of them or any entity they represent. Views and opinions expressed by Asset Reality employees are those of the employees and do not necessarily reflect the views of the company. Asset Reality does not guarantee or warrant the accuracy, completeness, timeliness, suitability or validity of the information in any particular podcast and will not be responsible for any claim attributable to errors, omissions, or other inaccuracies of any part of such material. Unless stated otherwise, reference to any specific product or entity does not constitute an endorsement or recommendation by Asset Reality.

The Food Programme
Polski Sklep: A Recent History of the Polish Shop

The Food Programme

Play Episode Listen Later Aug 15, 2025 41:50


Since the early 2000s, one type of shop has quietly become a regular feature on British high streets: the Polski sklep – or Polish shop.Known for their smoked sausages, sour pickles, and wide selection of herbal teas, these shops offer more than just food. With Polish people now the largest non-British nationality in the UK, and Polish the next most spoken language after English and Welsh, they also reflect a broader story of migration and community. Jaega Wise explores what makes these stores worth visiting for everyone, not just Poles, and how they're adapting to the challenges facing the high street.To find out more, Jaega visits Peterborough – a city she once lived in and remembers for its vibrant Polish community. There, she explores the busy Europol supermarket and a popular home-style restaurant, Pierogarnia. In Walthamstow, she meets cultural historian and second-generation Pole Dr Kasia Tomasiewicz, who explains the background behind the herbal teas and how they connect her to her ancestors. And back in Hackney, Jaega makes pierogi at home with food writer Zuza Zak, using a mix of Polish and British ingredients. She also hears from Dr Kathy Burrell, Professor of Migration Geographies at the University of Liverpool. Producer: Eliza Lomas

Cyber Briefing
July 24, 2025 - Cyber Briefing

Cyber Briefing

Play Episode Listen Later Jul 24, 2025 9:30


PULS BIZNESU do słuchania
Inter Europol Competition: Piekarze na torze! PB AUTOPORTRET

PULS BIZNESU do słuchania

Play Episode Listen Later Jul 24, 2025 41:10


Pierwszy raz w historii naszego podcastu mamy gości. Posłuchaj  jak Jakub Śmiechowski, właściciel i kierowca zespołu Inter Europol Competition (IEC) oraz Aleksandr Jeżewski, dyrektor operacyjny tego teamu opowiadają o kulisach zwycięskiego na siebie Le Mans. Jest też o kosztach, wyzwaniach i emocjach towarzyszących startom w wyścigach długodystansowych. Posłuchaj historii o tym jak niepozorny zespół z podwarszawskiego garażu dostał się do pierwszej ligi światowego motorsportu. To opowieść o tym jak wbrew ograniczeniom IEC stał się symbolem wytrwałości i pasji. Wysłuchaj całego odcinka i weź udział w konkursie. Do wygrania niesamowite emocje w towarzystwie najszybszych piekarzy świata! Wizyta w siedzibie zespołu i możliwość obcowania z samochodem, którym Panowie wygrali najsłynniejszy wyścig na ziemi. 

Microsoft Threat Intelligence Podcast
Inside Microsoft's Global Operation to Disrupt Lumma Stealer's 2,300-Domain Malware Network

Microsoft Threat Intelligence Podcast

Play Episode Listen Later Jul 23, 2025 45:19


In this episode of the Microsoft Threat Intelligence Podcast, host⁠ ⁠⁠Sherrod DeGrippo is joined by Richard Boscovich and Derek Richardson from Microsoft's Digital Crimes Unit to unpack the global takedown of Lumma Stealer, one of the world's largest infostealer malware operations. They discuss how creative legal tools like RICO and centuries-old trespass laws, deep collaboration with global partners, and innovative technical strategies came together to seize 2,300 domains and protect nearly 400,000 victims. The episode explores how the DCU is shifting toward persistent, cost-imposing disruption of cybercrime as a service, and what this means for defenders everywhere.    In this episode you'll learn:       How Microsoft took down one of the world's largest infostealer malware operations  The global partnerships with Europol, Japan, and private companies in cyber takedowns  What happens to stolen victim data during a takedown operation    Some questions we ask:      How did you first identify Lumma as a high-priority threat?  Is persistent disruption now the new normal for DCU operations?  Do you see more operations like this coming from DCU in the future?    Resources:   View Richard Boscovich on LinkedIn   View Sherrod DeGrippo on LinkedIn   Disrupting Lumma Stealer: Microsoft Leads Global Action Against Favored Cybercrime Tool    Related Microsoft Podcasts:                    Afternoon Cyber Tea with Ann Johnson  The BlueHat Podcast  Uncovering Hidden Risks      Discover and follow other Microsoft podcasts at microsoft.com/podcasts     Get the latest threat intelligence insights and guidance at Microsoft Security Insider      The Microsoft Threat Intelligence Podcast is produced by Microsoft and distributed as part of N2K media network.  

P3 Krim
Operation Grimm – så ska Europol stoppa barnrekryteringen

P3 Krim

Play Episode Listen Later Jul 23, 2025 32:01


Svensk polis kraftsamlar med andra europeiska länder för att stoppa kontraktsmord som annonseras på nätet. Lyssna på alla avsnitt i Sveriges Radio Play. Vid tre-tiden på natten i en liten ort på Västgötaslätten kör en bil upp utanför en bostad. I lägenheten sitter en 16-åring som har svarat på en annons på Tiktok. Han ska få 150 000 kronor för att mörda en människa, och bilen ska ta honom norrut. 16-åringen vet inte vart han ska, eller vem som är måltavlan. Till sin flickvän skriver han att han är rädd:”Jag har skakat hela dagen. Kan inte äta, stressad som fan, paranoid”.Kontraktsmorden på sociala medier – där unga utförare öppet söks för att mörda och spränga i gängkonflikter – är typiska för Sverige, men har nu spritt sig till flera länder i Europa. ”Hela crime as a service upplägget har blivit en industri i sig, så att det finns ju de som sysslar med att tillhandahålla den här servicen utan att ha direkta kopplingar till något av de kriminella nätverken”, säger Theodor Smedius, polisintendent vid NOA. Med Operation Grimm vill polisen stoppa den här utvecklingen. Men har de verktygen att göra det?Programledare: Petra Berggren och Fanny HedenmoProducent: Pernilla WadebäckLjudtekniker: Johan HörnqvistKontakt: p3krim@sverigesradio.seTipstelefon: 0734-61 29 15 (samma på Signal)

ALEF SecurityCast
Ep#290 - Když Bluetooth otevře cestu až k motoru

ALEF SecurityCast

Play Episode Listen Later Jul 21, 2025 11:17


Zranitelnost PerfektBlue umožňuje útočníkům získat přístup k infotainment systémům vozů Škoda, Volkswagen a Mercedes-Benz přes Bluetooth – a v některých případech otevřít cestu až k řídicím jednotkám vozidla. Věnujeme se také mezinárodní operaci EASTWOOD, při níž Europol a 13 států narušily infrastrukturu proruské skupiny NoName057(16). Následuje varování před aktivně zneužívanou zranitelností v Microsoft SharePointu a v závěru krátce zranitelnosti v Google Chrome a Cisco ISE.

Security Conversations
Train brake hack, GRU sanctions, Wagner war crimes, Microsoft's Chinese ‘digital escorts'

Security Conversations

Play Episode Listen Later Jul 18, 2025 108:45


Three Buddy Problem - Episode 54: Europol busted pro‑Russian hacktivist crew NoName 057(16), the Brits announce sanctions on Russia's GRU cyber units, Wagner‑linked “war influencers” streamed atrocities from Africa, and fresh tech worries ranged from a $500 RF flaw that can hijack U.S. train brakes. Plus, ProPublica on Microsoft's China‑based “digital escorts,” Google's headline‑grabbing AI‑found SQLite zero‑day, and OpenAI's new task‑running agents. Meanwhile, Ukraine's hackers wiped a Russian drone maker, ransomware crippled a major vodka producer, and another Chrome zero‑day quietly underscored how routine critical exploits have become. Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs), Ryan Naraine (https://twitter.com/ryanaraine) and Costin Raiu (https://twitter.com/craiu).

Cyber Security Headlines
Google's AI tool finds bugs, Europol disrupts hacktivist group, SquidLoader targets Hong Kong

Cyber Security Headlines

Play Episode Listen Later Jul 17, 2025 6:29


Google says ‘Big Sleep' AI tool found bug hackers planned to use Google fixes actively exploited sandbox escape zero day in Chrome China's cyber sector amplifies Beijing's hacking of U.S. targets Huge thanks to our sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. ThreatLocker operates with a default deny approach to reduce the attack surface and mitigate potential cyber vulnerabilities. To learn more and start your free trial, visit ThreatLocker.com/CISO.

West Coast Cookbook & Speakeasy
West Coast Cookbook & Speakeasy Metro Shrimp & Grits Thursdays 17 July 25

West Coast Cookbook & Speakeasy

Play Episode Listen Later Jul 17, 2025 63:48


Today's West Coast Cookbook & Speakeasy Podcast for our especially special Daily Special, Metro Shrimp & Grits Thursdays is now available on the Spreaker Player!Starting off in the Bistro Cafe, Maurene Comey, a career federal prosecutor in Manhattan, the daughter of former FBI Director James Comey, as well as the lead in the Epstein and Sean Diddy prosecutions, has been fired from her job in the Southern District of New York by the Trump/Bondi Justice Department for reasons unknown, so don't talk about it.Then, on the rest of the menu, MAGA John Roberts secretly praised Trump during crisis talks with judges who ruled against him; the Urban League declared a ‘state of emergency' for civil rights in the US; and, only one in four US adults say Trump's policies have helped them.After the break, we move to the Chef's Table where a Europol-coordinated global operation took down a pro-Russian cybercrime network; and, the UK and Germany are set to sign a treaty on defense, trade and migration.All that and more, on West Coast Cookbook & Speakeasy with Chef de Cuisine Justice Putnam.Bon Appétit!The Netroots Radio Live Player​Keep Your Resistance Radio Beaming 24/7/365!“Everyone in this good city enjoys the full right to pursue his own inclinations in all reasonable and, unreasonable ways.” -- The Daily Picayune, New Orleans, March 5, 1851Become a supporter of this podcast: https://www.spreaker.com/podcast/west-coast-cookbook-speakeasy--2802999/support.

Tech Update | BNR
Pro-Russische hackersgroep achter aanvallen op NAVO-top offline gehaald door Europol

Tech Update | BNR

Play Episode Listen Later Jul 16, 2025 5:45


NoName057(16), de pro-Russische hackersgroep die meerdere ddos-aanvallen op de NAVO-top in Den Haag heeft opgeëist, is voor een groot deel offline gehaald door politie-organisatie Europol. Ook zijn er zeven arrestatiebevelen uitgevaardigd, waaronder voor twee kopstukken van NoName. Niels Kooloos vertelt erover in deze Tech Update. Volgens Europol zijn er meer dan honderd computersystemen verstoord en is de centrale serverinfrastructuur van Noname uit de lucht gehaald. Ook de Nederlandse politie is betrokken bij de operatie, die door Europol 'Eastwood' wordt genoemd. Naast het offline halen van systemen en het uitvaardigen van arrestatiebevelen heeft Europol zeker duizend supporters van NoName gewaarschuwd dat hun daden strafbaar zijn. Daarnaast zijn er tot nu toe twee mensen gearresteerd in Duitsland en Spanje. Verder in deze Tech Update: Jensen Huang belooft meer chipleveringen aan China nu de exportrestricties versoepeld worden In België zet de politie tips om cybercriminaliteit te voorkomen op broodzakken See omnystudio.com/listener for privacy information.

Spitsuur | BNR
The Daily Move | 16 juli 2025

Spitsuur | BNR

Play Episode Listen Later Jul 16, 2025 113:22


De Europese Commissie is vanmiddag met een nieuwe meerjarenbegroting gekomen. Het voorstel: tussen 2028 en 2034 gaat er 2000 miljard euro - dus een twee met 9 nullen - naar Brussel. Ursula von der Leyen is in haar nopjes. Ander nieuws uit The Daily Move: De Israëlische premier Netanyahu is de meerderheid in het parlement kwijt. De ultra-orthodoxe partij Shas is namelijk uit de coalitie gestapt. Correspondent Ralph Dekkers vertelt wat dat betekent voor de toekomst van zijn regering. Treinkaartjes worden volgend jaar zo'n 6 tot 9 procent duurder. Dat schrijft staatssecretaris Thierry Aartsen van Infrastructuur en Waterstaat. Dat is een minder hoge stijging dan de 12 procent die verwacht werd. Dit verschil moet opgevangen worden door flinke bezuinigingen van de NS zelf. De pro-Russische hackersgroep NoName05716 is uit de lucht gehaald bij een internationale actie van politie en justitie. Dat zeggen Europol, Eurojust en de politie. Ook Nederland was betrokken bij de operatie. See omnystudio.com/listener for privacy information.

Fraudology Podcast
16 Billion Passwords Leaked, AI Fraud Fighters, and a Scammer's Dream Home

Fraudology Podcast

Play Episode Listen Later Jul 15, 2025 48:47


Fraudology is presented by Sardine. Get your tickets to Sardine[Con] and end the scamedmichost Karisse Hendrick dives deep into the latest fraud news and cybersecurity threats shaking up the digital landscape. The episode kicks off with a jaw-dropping "What the Fraud" story about a Florida inmate who orchestrated a $1.2 million fraud scheme from behind bars, highlighting the ingenuity and audacity of modern fraudsters. Karisse then unpacks the staggering revelation of 16 billion exposed passwords in what's being called the largest data breach in history. This massive leak poses unprecedented risks for account takeovers, identity theft, and targeted phishing attacks.The host explores the implications for both consumers and businesses, offering practical advice on protecting accounts and sensitive information. Karisse also examines emerging threats from state-sponsored hackers, particularly those affiliated with Iran, and their potential impact on critical infrastructure. The episode covers Europol's takedown of a major crypto investment fraud ring and MasterCard's innovative use of AI to combat card fraud. Rounding out the news, Karisse discusses how countries like Singapore and Australia are implementing novel approaches to fight scams, including giving police power to freeze suspected victims' bank accounts.This information-packed episode is a must-listen for anyone concerned about online security, from individual consumers to fraud-fighting professionals. Karisse's expert analysis and actionable insights provide listeners with the knowledge they need to stay ahead of evolving fraud tactics.Fraudology is hosted by Karisse Hendrick, a fraud fighter with decades of experience advising hundreds of the biggest ecommerce companies in the world on fraud, chargebacks, and other forms of abuse impacting a company's bottom line. Connect with her on LinkedIn She brings her experience, expertise, and extensive network of experts to this podcast weekly, on Tuesdays.

Spegillinn
Vændismansal á Íslandi og í Evrópu

Spegillinn

Play Episode Listen Later Jul 15, 2025 10:00


Lögregla og tollgæsla á Íslandi tóku á dögunum þátt í umfangsmiklum, alþjóðlegum aðgerðum gegn mansali á vegum Interpol. Europol og Frontex. Í þessum aðgerðum fór lögregla inn í á þriðja tug húsa og heimila og kannaði aðstæður um það bil 250 manns. Af þeim telur lögregla sig vita að 36 séu þolendur mansals, þar af þrjátíu og fjögur þolendur mansals í kynferðislegum tilgangi - það er að segja neydd til vændis. Langflest voru frá Rúmeníu og mikill meirihluti þeirra konur. Einn maður - vændiskaupandi - var handtekinn og gert að greiða sekt. Úti í hinum stóra heimi er mansal, ekki síst í kynferðislegum tilgangi, risastór iðnaður, þar sem fólk gengur bókstaflega kaupum og sölum. Drífa Snædal, talskona Stígamóta, þekkir vel til í þessum málaflokki. Ævar Örn Jósepsson spurði hana, hverju aðgerðir eins og þessar skiluðu. Umsjón: Ævar Örn Jósepsson Tæknimaður: Kári Guðmundsson.

Cyber Briefing
July 01, 2025 - Cyber Briefing

Cyber Briefing

Play Episode Listen Later Jul 1, 2025 8:40


If you like what you hear, please subscribe, leave us a review and tell a friend!

Mad at the Internet
Infinite Lawsuits

Mad at the Internet

Play Episode Listen Later Jun 20, 2025 247:24


No Kings, EUROPOL is very strong, Boss Clarence, LGBTQIAP+ pacifiers, NexusMods, Pippa Pipkins and Kirsche's strongest soldier, AMC+'s coverup, Chantal plans her next move, Tarl is guilty is domestic abuse battery, Nick sharted, Bossman finds a nug, and Cog finds God.

Accents d'Europe
Comment protéger les enfants des recruteurs de la criminalité organisée ?

Accents d'Europe

Play Episode Listen Later Jun 18, 2025 19:30


Des tueurs à gages de 12 ans, engagés par des gangs ou élevés dans des familles mafieuses : le crime organisé implique des adolescents de plus en plus jeunes. Pour lutter contre cet inquiétant phénomène auquel l'Europe fait face, des initiatives voient le jour. Sortir les enfants des filets du crime organisé « Libres de choisir »  En Italie, la Sicile emboîte le pas à la Calabre dans la lutte contre la criminalité organisée. Le Parlement régional de l'île, berceau de Cosa Nostra, a voté fin mai une loi intitulée « Libres de choisir ». Ce nom est celui d'un protocole mis sur pied par le juge pour enfants Roberto Di Bella. Il permet aux enfants issus des familles mafieuses de vivre une nouvelle vie, loin de leur famille et/ou de leur région d'origine. Car le destin des jeunes qui grandissent avec les règles de la mafia comme seuls repères est souvent scellé d'avance. Collaborateur de la justice, Luigi Bonaventura en a fait l'expérience. Ancien chef de clan de la 'Ndrangheta, la mafia calabraise, il est désormais engagé auprès des jeunes pour leur éviter une vie tracée par leurs parents. Cécile Debarge l'a rencontré.  Europol lance une vaste opération En Europe, des tueurs à gages de 12, 13 ou 14 ans ont été interpellés par la police ces dernières années. Et ils n'ont pas forcément grandi dans des familles mafieuses. La criminalité organisée recrute, en effet, de très jeunes adolescents en masse sur les réseaux sociaux pour leur faire faire du trafic ou des actes violents. L'agence de police criminelle Europol s'est récemment saisie de cet inquiétant problème : elle a mis en place une structure dédiée qui réunit huit capitales européennes et lancé une opération d'envergure pour tenter de démanteler ces réseaux de recrutement. Les explications d'Elena Louazon. La chronique musique Vincent Théval  Duo Ruut – Hobusemäng  (Estonie)   Quelle place pour les femmes dans les cultes ? L'Espagne est un pays en pointe dans la défense des droits des femmes ; c'est également un pays très catholique, où le féminisme s'exprime jusqu'au sein de l'Église. Le pape François avait favorisé l'accession des femmes à des postes à responsabilité au Vatican ; l'action de son successeur sera scrutée de près par les associations. L'une d'elles, dénommée « Révolte des femmes dans l'Église », réunit clercs et laïques pour exiger plus d'égalité avec les hommes religieux. Le reportage de Diane Cambon. Peu de religions laissent les femmes célébrer les offices. Il y a en Europe de nombreuses femmes pasteurs – les femmes rabbins ou les femmes imames sont beaucoup plus rares, mais elles existent. L'Allemagne, par exemple, compte une petite poignée de femmes imames. La plus connue est Seyran Ates, avocate de profession, qui a co-fondé une mosquée libérale à Berlin en 2017. Elle y accueille des couples interconfessionnels ou des croyantes homosexuelles. Mais cela a un coût : elle vit depuis des années sous protection policière. Un portrait signé Delphine Nerbollier.

Risky Business News
Risky Bulletin: Israel-linked hackers claim Iran bank disruption

Risky Business News

Play Episode Listen Later Jun 18, 2025 7:03


An Israeli-linked hacktivist group claims attack on Iranian bank, Chrome gets a new prompt to prevent local network attacks, a Century-old German napkin company goes under following ransomware attack, and Europol takes down the Archetyp dark web market. Show notes

Accents d'Europe
Comment protéger les enfants des recruteurs de la criminalité organisée ?

Accents d'Europe

Play Episode Listen Later Jun 18, 2025 19:30


Des tueurs à gages de 12 ans, engagés par des gangs ou élevés dans des familles mafieuses : le crime organisé implique des adolescents de plus en plus jeunes. Pour lutter contre cet inquiétant phénomène auquel l'Europe fait face, des initiatives voient le jour. Sortir les enfants des filets du crime organisé « Libres de choisir »  En Italie, la Sicile emboîte le pas à la Calabre dans la lutte contre la criminalité organisée. Le Parlement régional de l'île, berceau de Cosa Nostra, a voté fin mai une loi intitulée « Libres de choisir ». Ce nom est celui d'un protocole mis sur pied par le juge pour enfants Roberto Di Bella. Il permet aux enfants issus des familles mafieuses de vivre une nouvelle vie, loin de leur famille et/ou de leur région d'origine. Car le destin des jeunes qui grandissent avec les règles de la mafia comme seuls repères est souvent scellé d'avance. Collaborateur de la justice, Luigi Bonaventura en a fait l'expérience. Ancien chef de clan de la 'Ndrangheta, la mafia calabraise, il est désormais engagé auprès des jeunes pour leur éviter une vie tracée par leurs parents. Cécile Debarge l'a rencontré.  Europol lance une vaste opération En Europe, des tueurs à gages de 12, 13 ou 14 ans ont été interpellés par la police ces dernières années. Et ils n'ont pas forcément grandi dans des familles mafieuses. La criminalité organisée recrute, en effet, de très jeunes adolescents en masse sur les réseaux sociaux pour leur faire faire du trafic ou des actes violents. L'agence de police criminelle Europol s'est récemment saisie de cet inquiétant problème : elle a mis en place une structure dédiée qui réunit huit capitales européennes et lancé une opération d'envergure pour tenter de démanteler ces réseaux de recrutement. Les explications d'Elena Louazon. La chronique musique Vincent Théval  Duo Ruut – Hobusemäng  (Estonie)   Quelle place pour les femmes dans les cultes ? L'Espagne est un pays en pointe dans la défense des droits des femmes ; c'est également un pays très catholique, où le féminisme s'exprime jusqu'au sein de l'Église. Le pape François avait favorisé l'accession des femmes à des postes à responsabilité au Vatican ; l'action de son successeur sera scrutée de près par les associations. L'une d'elles, dénommée « Révolte des femmes dans l'Église », réunit clercs et laïques pour exiger plus d'égalité avec les hommes religieux. Le reportage de Diane Cambon. Peu de religions laissent les femmes célébrer les offices. Il y a en Europe de nombreuses femmes pasteurs – les femmes rabbins ou les femmes imames sont beaucoup plus rares, mais elles existent. L'Allemagne, par exemple, compte une petite poignée de femmes imames. La plus connue est Seyran Ates, avocate de profession, qui a co-fondé une mosquée libérale à Berlin en 2017. Elle y accueille des couples interconfessionnels ou des croyantes homosexuelles. Mais cela a un coût : elle vit depuis des années sous protection policière. Un portrait signé Delphine Nerbollier.

Choses à Savoir TECH
Qu'est-ce AVCheck, l'outil favoris des cybercriminels ?

Choses à Savoir TECH

Play Episode Listen Later Jun 11, 2025 2:03


Nouveau chapitre dans l'opération « Endgame », la vaste offensive internationale contre l'écosystème des cybercriminels. Cette fois, c'est AVCheck, un service utilisé pour tester et perfectionner des malwares, qui vient de tomber. Le FBI, en coopération avec les autorités néerlandaises et finlandaises, a mené un coup de filet visant l'un des outils les plus prisés des pirates pour échapper aux radars des antivirus.Depuis des années, AVCheck permettait aux hackers de soumettre leurs malwares à une batterie de tests, simulant leur détection par les principaux moteurs de cybersécurité. Objectif : affiner le code malveillant jusqu'à le rendre indétectable. Ce passage obligé avant chaque attaque, notamment les campagnes de rançongiciels, faisait d'AVCheck un maillon essentiel de la chaîne criminelle. En démantelant cette plateforme, les enquêteurs ont mis à jour tout un réseau de serveurs, adresses mail et noms de domaine utilisés pour opérer ce service dans l'ombre. Résultat : plusieurs serveurs saisis, quatre noms de domaine désactivés, et dans le sillage, deux autres services similaires — Cryptor.biz et Crypt.guru — également mis hors service.Cette action s'inscrit dans la stratégie globale de l'opération Endgame, lancée par Europol en mai 2024 avec le soutien d'une quinzaine de pays et des États-Unis. Son objectif : frapper les infrastructures techniques utilisées en amont des attaques, bien avant que les ransomwares ne frappent les victimes. En mai, une première vague avait déjà visé les « droppers », ces programmes qui ouvrent la porte aux malwares. Bilan : des centaines de serveurs saisis, des milliers de domaines neutralisés, et plusieurs arrestations à la clé. Dernier succès en date : le démantèlement de DanaBot, un malware-as-a-service responsable de plus de 300 000 infections et de 45 millions d'euros de pertes à l'échelle mondiale. Endgame, plus qu'un nom de code, est en train de devenir le cauchemar organisé du cybercrime. Hébergé par Acast. Visitez acast.com/privacy pour plus d'informations.

Risky Business
Risky Business #793 -- Scattered Spider is hijacking MX records

Risky Business

Play Episode Listen Later May 28, 2025 64:52


In this week's edition of Risky Business Dmitri Alperovitch and Adam Boileau join Patrick Gray to talk through the week's news, including: EXCLUSIVE: A Scattered Spider-style crew is hijacking DNS MX entries and compromising enterprises within minutes The SVG format brings the all horrors of HTML+JS to image files, and attackers have noticed Brian Krebs eats a 6.3Tbps DDoS … ‘cause that's how you demo your packet cannon Law enforcement takes out Lumma Stealer, Qakbot, Danabot and some dark web drug traffickers Iranian behind 2019 Baltimore ransomware mysteriously appears in North Carolina and pleads guilty CISA's leadership is fleeing in droves, even though the US needs them more than ever. This week's episode is sponsored by Thinkst Canary. Long time friend of the show Haroon Meer joins and talks through where he feels the industry is at, having just returned home from the AI-fueled hype at this year's RSA conference. This episode is also available on Youtube. Show notes China-linked ‘Silk Typhoon' hackers accessed Commvault cloud environments, person familiar says - Nextgov/FCW Risky Bulletin: SVG use for phishing explodes in 2025 - Risky Business Media KrebsOnSecurity Hit With Near-Record 6.3 Tbps DDoS – Krebs on Security Midwestern telco Cellcom confirms cyber incident after days of service outages | The Record from Recorded Future News Microsoft leads international takedown of Lumma Stealer | Cybersecurity Dive Who said what? on X: "Message from the administrator of Lumma Stealer on the forums about the recent events

Reimagining Cyber
Operation Endgame: Behind the Global Cybercrime Takedown - Ep 151

Reimagining Cyber

Play Episode Listen Later May 28, 2025 16:36


 In today's episode,  OpenText's  Tyler Moffitt (Sr. Security Analyst) delves into 'Operation Endgame,' one of the most extensive coordinated cybercrime takedowns in history. Learn about the multinational law enforcement efforts that targeted critical malware infrastructure, dismantling key botnets and loaders vital to ransomware attacks. Tyler provides an in-depth analysis of the operation's impact on the cybercriminal ecosystem, real-world implications, and predictions for the future of cybersecurity. Don't miss this eye-opening discussion!

1號課堂
川普大美法案,美國赤字無法無天?/全球網路詐騙,科技巨擘難卸其責?|丁學文的財經世界EP236

1號課堂

Play Episode Listen Later May 27, 2025 12:28


摘要 一, 5月20日,川普親身前往國會山莊,跟共和黨議員舉行閉門會議,催促共和黨人團結合力通過他所推動、稱為《大美法案》的預算開支法案,但在會後,共和黨內部仍然意見分歧。 不過,第二天,美國眾議院議長Mike Johnson表示,共和黨已就提高州與地方稅 (SALT) 扣除額上限達成協議,預計將目前的 1 萬美元上限提高至 4 萬美元,為川普第二任期稅改方案掃除一項主要障礙。 消息曝光,道瓊工業指數開盤下挫360點或0.84%,標準普爾500指數下跌0.5%,那斯達克綜合指數下跌0.34%。30年期公債殖利率交易價格約為5.09%,觸及2023年10月以來的最高水準,指標10年期公債殖利率交易價格為4.59%。事實上,這項法案文本堂堂1,000多頁,核心內容是延長川普第一任在2017年通過的減稅案,另外添加新的減稅措施,亦即他2024年競選總統的政見。 但眾議院規則委員會民主黨領袖Jim McGovern公開批評共和黨人選擇在凌晨1點召開小組會議,就是偷雞摸狗見不得人。 二, 最近幾年,在台灣投資詐騙日益猖獗,越來越多名人成為了詐騙廣告的最大受害者,全球最大的社群媒體平台臉書(Facebook)更是充斥著各種似是而非的虛假貼文,讓人防不勝防。 今年年初,趨勢科技發佈一個《節慶期間網路詐騙調查》指出,台灣有近八成受訪者看過節慶相關的網路詐騙,有62%曾上網搜尋以確認是否為詐騙,但整體受訪者卻仍有四分之一曾落入節慶相關的網路詐騙陷阱,比率遠高於美國、澳洲、新加坡地區,全民的戒備防守仍須再強化。 過去一年全球跨國執法行動有不少斬獲,像是歐洲刑警組織(Europol)與全球15國執法單位通力合作,一口氣關閉27個DDoS租用平台,或是國際刑警組織(Interpol)與40個國家及地區的執法單位聯手,逮捕超過5,500名從事金融犯罪的嫌犯並沒收不法所得。而對於專門提供作案工具買賣的網站,最近也有進展。 我們應該怎麼看待這個禁也禁不了的現象,最近西方世界的法律動作也越來越大,怎麼解讀? Powered by Firstory Hosting

Choses à Savoir TECH
Une opération de police numérique historique menée par la France ?

Choses à Savoir TECH

Play Episode Listen Later May 27, 2025 2:15


C'est un séisme dans le monde souterrain du numérique. Une opération internationale d'une ampleur inédite vient de frapper au cœur les réseaux criminels du darknet, grâce à une coordination sans faille entre Europol, les forces de l'ordre françaises, et plusieurs services américains. Baptisée Opération RapTOR, cette manœuvre transnationale a mobilisé les polices de dix pays, dont la gendarmerie et les douanes françaises, le FBI, l'ICE et la DEA. Résultat : des frappes synchronisées qui ont pris les suspects de court, évitant toute fuite. Les États-Unis ont procédé à 130 arrestations, l'Allemagne à 42, le Royaume-Uni à 37, et la France n'est pas en reste avec 29 interpellations. La Corée du Sud, elle, en compte 19. Ces chiffres révèlent l'ampleur mondiale de cette criminalité numérique, désormais bien implantée aux quatre coins du globe.L'opération s'inscrit dans la lignée du coup de filet “SpecTor” de 2023, qui avait permis l'arrestation de 288 individus. Cette fois, les enquêteurs ont ciblé les anciens utilisateurs des places de marché clandestines récemment démantelées, comme Nemesis, Tor2Door ou encore Kingdom Market, dans une stratégie méthodique : remonter les filières après avoir abattu les têtes de réseau. Et les résultats sont spectaculaires : 200 millions de dollars saisis, en cryptomonnaies et en liquide, deux tonnes de drogues confisquées – dont 144 kilos de fentanyl, cet opioïde ravageur – et 180 armes à feu. Sans compter 4 tonnes de tabac de contrebande et 12 500 produits contrefaits.Ces chiffres témoignent d'un darknet devenu un véritable supermarché du crime, où drogues, armes et faux papiers s'échangent en quelques clics. Et si les criminels tentent désormais de contourner la surveillance en créant des boutiques individuelles, plus discrètes, cette opération RapTOR démontre que l'impunité n'est plus garantie. La technologie qui protégeait hier les cybercriminels devient aujourd'hui leur piège. Après le démantèlement du malware Lumma Stealer, les autorités viennent de frapper un grand coup : un signal fort pour ceux qui croyaient encore que l'anonymat numérique était une armure. Hébergé par Acast. Visitez acast.com/privacy pour plus d'informations.

The Jerich Show Podcast
Patch Me If You Can: Cyber Oops, Selfies & Seizures

The Jerich Show Podcast

Play Episode Listen Later May 23, 2025 15:52


In this episode of The Jerich Show, Erich Kron and Javvad Malik dive headfirst into the week's most curious, cringeworthy, and critical cybersecurity stories. First up: a global honeypot powered by over 5,300 compromised Cisco devices—courtesy of the ViciousTrap botnet. Then, it's schadenfreude central as the developers of DanaBot malware accidentally infect themselves. Karma, meet keyboard. We'll also unpack Europol's massive takedown of ransomware infrastructure, which led to the seizure of 300 servers and €3.5 million in crypto. Not to be outdone, two ATM heist suspects made their arrest even easier... by taking selfies mid-crime. And finally, the UK's NCSC shows us how to securely retire old tech—because tossing servers in the skip just isn't secure policy. Join Erich and Javvad for sharp takes, security snark, and the cybersecurity fails you'll want to learn from (or at least laugh at).

Spegillinn
Gervigreind hjá skipulögðum glæpahópum, stækkunarstjóri ESB og niktótínpúðar

Spegillinn

Play Episode Listen Later May 23, 2025 20:00


Halla Hrund Logadóttir, þingmaður Framsóknarflokksins, kallaði í vikunni eftir hertari aðgerðum gegn Nikótínpúðum. Hlutfall ungmenna sem nota slíka níkótínpúða er hvergi hærra á Norðurlöndum en á Íslandi - Á stóru blaði sem hangir á veggnum á skrifstofunni hjá stækkunarstjóra Evrópusambandsins í í Brussel, eru nöfn níu ríkja sem sótt hafa um aðild að ESB og yfirlit yfir hvernig viðræðurnar ganga - Ísland er á listanum - með rauðu merki - enda er aðildarumsóknin í frosti eins og fram hefur komið. Nýleg skýrsla Europol varpar ljósi á hvernig skipulögð brotastarfsemi hefur þróast á undanförnum árum, meðal annars með nýrri tækni eins og gervigreind - þótt afbrot eins og fíkniefnasmygl, vopnasala og mansal séu áfram fyrirferðarmikil. Þetta er alþjóðleg starfsemi í eðli sínu og Ísland er þar ekki undanskilið; íslenskir og erlendir brotamenn starfa saman; flytja hingað fíkniefni og þvætta ágóðann af ólögmætri starfsemi, meðal annars með skipulögðum útflutningi á reiðufé og kaupum á rafmynt.

Business of Tech
AI in SMBs, Washington's New Tech Tax, and Major Cybersecurity Breaches: What You Need to Know

Business of Tech

Play Episode Listen Later May 22, 2025 17:43


Small businesses are increasingly adopting artificial intelligence (AI) technologies, particularly in personalized email marketing, which has become a primary channel for nearly 19% of small to mid-sized businesses in 2025. Despite the growing interest, many businesses face challenges in implementation, with 35% citing a lack of familiarity with AI as a significant barrier. A recent survey indicates that while 38% of small and medium-sized businesses are utilizing AI across various functions, the actual productivity gains from AI investments, such as chatbots, have been minimal, with only a 3% time savings reported. This discrepancy highlights the gap between the hype surrounding AI and its real-world applications.Legislative developments are also shaping the tech landscape, with Washington State introducing a new sales tax on technology and digital services to address a significant budget shortfall. This tax, expected to generate billions over the next few years, has raised concerns among local tech industry leaders about its potential impact on competitiveness. Additionally, Congress is considering a moratorium on state regulations regarding AI, which could undermine privacy protections established by states. Critics argue that this could hinder essential consumer safeguards, while proponents believe a unified regulatory framework is necessary for innovation.Cybersecurity remains a pressing issue, with notable incidents highlighting vulnerabilities in the sector. Delta Airlines is pursuing legal action against cybersecurity firm CrowdStrike following a massive IT failure that led to significant flight cancellations and financial losses. Meanwhile, a new malware called LumaStealer has infected hundreds of thousands of devices, prompting a coordinated response from Microsoft and Europol. The FBI has also issued warnings about AI-generated voice scams, which pose a growing threat to trust-based systems like email and voice approvals.The podcast emphasizes the importance of resilience and responsibility in cybersecurity, urging IT service providers to focus on trust governance rather than merely managing technology. As AI continues to evolve, the need for systematic validation of communications and relationships becomes critical. The discussion underscores the necessity for businesses to navigate the complexities of AI adoption and cybersecurity effectively, ensuring that they are not only keeping pace with technological advancements but also safeguarding their operations and customer trust. 00:00 AI's Real Value Lies in Utility, Not Innovation, Say Analysts Tracking SMB Adoption Trends+06:36 U.S. Tech Policy in Flux: More States Tax IT, Feds Push AI Preemption, and Data Privacy Falters11:34 Cybersecurity's Trust Gap Widens: Delta Can Sue CrowdStrike, AI Voice Scams Rise, and North Korea Hacks U.S. Firms This is the Business of Tech.    Supported by:  https://afi.ai/office-365-backup/ All our Sponsors: https://businessof.tech/sponsors/ Do you want the show on your podcast app or the written versions of the stories? Subscribe to the Business of Tech: https://www.businessof.tech/subscribe/Looking for a link from the stories? The entire script of the show, with links to articles, are posted in each story on https://www.businessof.tech/ Support the show on Patreon: https://patreon.com/mspradio/ Want to be a guest on Business of Tech: Daily 10-Minute IT Services Insights? Send Dave Sobel a message on PodMatch, here: https://www.podmatch.com/hostdetailpreview/businessoftech Want our stuff? Cool Merch? Wear “Why Do We Care?” - Visit https://mspradio.myspreadshop.com Follow us on:LinkedIn: https://www.linkedin.com/company/28908079/YouTube: https://youtube.com/mspradio/Facebook: https://www.facebook.com/mspradionews/Instagram: https://www.instagram.com/mspradio/TikTok: https://www.tiktok.com/@businessoftechBluesky: https://bsky.app/profile/businessof.tech

AI For Everyone
Bitcoin & Money Laundering: Busting the Crypto Crime Myth

AI For Everyone

Play Episode Listen Later May 18, 2025 14:16


You've heard the headlines: “Bitcoin is for criminals.” But is that actually true?In this episode, we dig into the data, scandals, and hypocrisy behind the global money laundering industry. Spoiler: it's not Bitcoin moving $2 trillion a year — it's the traditional banking system.

Les interviews d'Inter
Fabrice Rizzoli : le recrutement de très jeunes tueurs à gages "est un phénomène européen"

Les interviews d'Inter

Play Episode Listen Later May 16, 2025 5:57


durée : 00:05:57 - L'invité de 6h20 - Fabrice Rizzoli, spécialiste de la grande criminalité, était l'invité du 6h20 ce vendredi. France Inter révèle le lancement d'une vaste opération par Europol pour lutter contre le recrutement de très jeunes tueurs à gages, phénomène qui a explosé en Europe.

Cyber Security Headlines
Europol shuts down DDoS-for-hire services, CrowdStrike lays off 500 workers, GOV.UK embraces passkeys

Cyber Security Headlines

Play Episode Listen Later May 8, 2025 7:28


Europol shuts down six DDoS-for-hire services used in global attacks CrowdStrike says it will lay off 500 workers Passkeys set to protect GOV.UK accounts against cyber-attacks Thanks to today's episode sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. ThreatLocker operates with a default deny approach to reduce the attack surface and mitigate potential cyber vulnerabilities. To learn more and start your free trial, visit ThreatLocker.com/CISO. Find the stories behind the headlines at CISOseries.com.

De Taghi Podcast
Gruwelijke details: wat beschrijf je als journalist wel en niet? ‘We laten héél veel weg'

De Taghi Podcast

Play Episode Listen Later May 1, 2025 33:06


Gruwelijke details over moord, marteling, verkrachting of aan stukken gesneden lichamen. Als journalist kom je veel meer te weten dan je publiceert. Wat beschrijf je, wat niet? Paul Vugts en Jesper Roele vertellen erover in de Parool Misdaadpodcast.‘Soms vinden nabestaanden media-aandacht vreselijk, soms willen ze die héél graag’. · verder bespreekt Corrie Gerritsma met Paul zijn verwondering over het jaarverslag van de AIVD· volgt Jesper een strafzaak over een van drugs doortrokken seksdate in Amsterdam-Zuidoost· én een gruwelijke zaak in Landsmeer, waar een 32-jarige zoon zijn 52-jarige moeder heeft gedood en haar benen heeft afgezaagd Presentatie: Corrie GerritsmaJournalisten: Paul Vugts en Jesper RoeleProductie en montage: Daan HofsteeEindredactie: Josien WolthuizenMuziek: Kloaq Audio Design Schrijf je hier in voor de wekelijkse Misdaadnieuwsbrief. Reageren of vragen?Mail: misdaad@parool.nlWhatsapp en Signal: 06 27 19 33 64Meer lezen: - Column van Paul over het jaarverslag van de AIVD: No shit, Sherlock… Daar kwamen de AIVD en Europol ook nog even aanhobbelen- OM eist 180 uur werkstraf voor man die date na overdosis achterliet: ‘112 bellen had het slachtoffer kunnen redden’- Onderbenen van vrouw (52) die dood in woning van haar zoon (32) in Landsmeer werd aangetroffen, zijn nog niet gevondenSupport the show: https://www.kiosk.nl/See omnystudio.com/listener for privacy information.

Intangiblia™
Pairs Well With Fame, Fraud, and a Hint of Lawsuit

Intangiblia™

Play Episode Listen Later Apr 29, 2025 14:49 Transcription Available


A bottle of wine carries more than fermented grapes. It embodies intellectual property worth billions in global markets. From the tapas bars of Barcelona to the vineyards of Australia, wine names spark international incidents with real-world consequences.When a small Spanish bar named "Champanillo" (little champagne) faced the wrath of the powerful Comité Champagne, it revealed how geographical indications function like luxury brand protections. No actual champagne was sold, yet the European Court of Justice ruled the mere evocation of champagne's prestige violated EU law. Similarly, Belgian customs officials destroyed thousands of Miller High Life beer cans for daring to call themselves "The Champagne of Beers" despite using the slogan for over 120 years.These battles extend beyond Europe's borders. Croatian winemakers watched helplessly as their traditional Prošek dessert wine, despite being nothing like sparkling Prosecco, was blocked from registration after Italian opposition. Meanwhile, Australia and the EU reached a trade negotiation impasse over whether "Prosecco" refers to a grape variety (as Australians argue) or a protected place name (as Europeans insist). The dispute demonstrates how a single wine term can become geopolitical leverage worth potentially billions in trade.Luxury producers fight equally fierce battles, with Château Petrus winning a €1.2 million judgment against a cheaper wine called "Petrus Lambertini," while even Prince's estate successfully challenged an Ohio winery's "Purple Rain" wine. Counterfeiters face serious consequences too, fake Lafite bottles distributed through nearly 2,000 supermarkets resulted in an $11 million judgment, while Europol's "Operation Epigraphy" dismantled a multinational fake Rioja network spanning three countries.Whether through trademarks, geographical indications, certification marks, or patents (as seen in the competitive synthetic cork industry), wine intellectual property serves as the legal foundation for an industry that blends agriculture, culture, commerce and law. What's inside the bottle is only half the story, the rest lies in who has the right to tell it.Listen now to understand why every sip comes with a side of intellectual property law, and why the words on a wine label can be worth millions in courtrooms worldwide.Send us a text

Intangiblia™ en español
El Vino Combina Bien con Fama, Fraude y una Pizca de Demanda

Intangiblia™ en español

Play Episode Listen Later Apr 29, 2025 15:47 Transcription Available


Las etiquetas de vino esconden más que notas de cata, ocultan batallas legales feroces donde cada nombre, región y corcho pueden ser motivo de demandas millonarias. Al descorchar este episodio de Intangiblia, viajamos desde Barcelona hasta Australia para revelar cómo una pequeña cadena de tapas llamada "Champanillo" enfrentó la ira del poderoso Comité Champagne, y por qué miles de latas de cerveza fueron destruidas simplemente por usar la palabra "Champagne" en su eslogan. Te sorprenderá descubrir que incluso nombres con siglos de historia, como el vino croata Prošek, pueden ser bloqueados por sonar "demasiado similar" a Prosecco italiano.Desentrañamos conflictos comerciales globales donde lo que está en juego no son solo palabras, sino identidades culturales y millones de dólares en exportaciones. Revelamos operaciones internacionales contra falsificadores que replican vinos de élite como Lafite Rothschild y Rioja, demostrando que el fraude vinícola es crimen organizado a escala global. También exploramos las innovaciones en corchos sintéticos y cómo las patentes han transformado silenciosamente la industria.Este viaje por las copas conflictivas y pleitos con aroma a barrica te dejará cinco lecciones claras sobre la propiedad intelectual en el mundo vinícola. Porque, como descubrirás, el vino no solo se bebe y se disfruta, también se protege por ley. ¿Te gustaría conocer más historias donde la creatividad y el comercio colisionan? Suscríbete ahora y comparte este episodio con otros amantes del buen vino y las buenas historias.

IT Privacy and Security Weekly update.
EP 237.5 Deep Dive: Artificial General Intelligence and The IT Privacy and Security Weekly Update for the Week Ending April 8th., 2025

IT Privacy and Security Weekly update.

Play Episode Listen Later Apr 9, 2025 15:39


1. Concerns About AGI DevelopmentDeepMind's 108-page report outlines four major risks of Artificial General Intelligence (AGI):Misuse: AGI used maliciously (e.g., creating viruses).Misalignment: AGI acting contrary to intended goals.Mistakes: Errors causing unintended harm, especially in high-stakes sectors like defense.Structural Risks: Long-term impacts on trust, power, and truth in society. While safety measures are urged, full control of AGI remains uncertain.2. Improving Machine Learning SecurityThe open-source community is adopting model signing (via Sigstore), applying digital signatures to AI models. This ensures the model's authenticity and integrity—helping prevent the use of tampered or untrusted code in AI systems.3. Risks from AI Coding AssistantsA newly identified threat—Rules File Backdoor—allows attackers to embed malicious instructions in configuration files used by AI coding assistants (like GitHub Copilot or Cursor). This can lead to AI-generated code with hidden vulnerabilities, increasing risk through shared or open-source repos.4. Italy's Controversial Piracy ShieldPiracy Shield, Italy's system for blocking pirated content, has mistakenly blacklisted legitimate services like Google Drive. Critics highlight issues around lack of transparency, violations of net neutrality and digital rights, and risks of censorship. Despite backlash, the system is being expanded, raising further concerns.5. EU's Push on Data Access and EncryptionThe EU's ProtectEU strategy includes strengthening Europol into a more FBI-like agency and proposing roadmaps for law enforcement access to encrypted data. This indicates a potential push toward backdoor access, reigniting debates on privacy vs. security.6. Cyberattacks on Australian Pension FundsCoordinated cyberattacks have compromised over 20,000 accounts across Australian retirement funds, with some user savings stolen. The incidents expose vulnerabilities in financial infrastructure, prompting a government initiative to bolster sector-wide cybersecurity.7. Lessons from Oracle's Security BreachesOracle reported two separate breaches in a short span. The latest involved theft of outdated login credentials. These incidents reveal persistent challenges in securing large tech platforms and highlight the need for ongoing security improvements and scrutiny of legacy systems.8. Closure of OpenSNP Genetic DatabaseOpenSNP is shutting down after 14 years, deleting all user data due to rising concerns over misuse of genetic data, especially amid growing political threats from authoritarian regimes. The founder emphasized protecting vulnerable populations and reevaluated the risks of continued data availability versus its research value.

IT Privacy and Security Weekly update.
Artificial General Intelligence and The IT Privacy and Security Weekly Update for the Week Ending April 8th., 2025

IT Privacy and Security Weekly update.

Play Episode Listen Later Apr 8, 2025 18:30


EP 237. DeepMind just released a 108-page manual on not getting wiped out by our own invention.  Highlighting the fact that planning for an AI apocalypse could now be a core business line function.Sigstore machine learning model signing - AI models are finally getting digital signatures, because “mystery code from the internet” just wasn't a scalable trust strategy.Turns out your AI  programmer can be tricked into writing malware.  Helping us understand that “copilot” isn't necessarily synonymous with “competent”.Italy's anti-piracy tool is blocking legit services like it's playing "whack-a-mole" blindfolded, but in this case the moles are  cloud storage, like your Google drive.The EU wants Europol to act like the FBI because privacy for our citizens is important, except when we want to read their encrypted messages.Hackers hit Aussie retirement funds, proving the only thing scarier than blowing through all your retirement money is someone else blowing through it all for you.Oracle's been hacked again—because who doesn't love a sequel with worse security and a bigger cleanup bill?OpenSNP just quit the internet after realizing DNA + authoritarian vibes = one dystopia too many.This week is a wild ride, so saddle up and hold on tight!

The CyberWire
The invisible force fueling cyber chaos.

The CyberWire

Play Episode Listen Later Apr 3, 2025 30:59


A joint advisory labels Fast Flux a national security threat. Europol shuts down a major international CSAM platform. Oracle verifies a data breach. A new attack targets Apache Tomcat servers. The Hunters International group pivots away from ransomware. Hackers target Juniper routers using default credentials. A controversy erupts over a critical CrushFTP vulnerability.  Johannes Ullrich, Dean of Research at SANS Technology Institute unpacks Next.js.  Abracadabra, alakazam — poof! Your credentials are gone. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Johannes Ullrich, Dean of Research at SANS Technology Institute, is discussing Next.js and how similar problems have led to vulnerabilities recently. Selected Reading Fast Flux: A National Security Threat (CISA) Don't cut CISA personnel, House panel leaders say, as they plan legislation giving the agency more to do (CyberScoop) CSAM platform Kidflix shut down by international operation (The Record) AI Image Site GenNomis Exposed 47GB of Underage Deepfakes (Hackread) Oracle tells clients of second recent hack, log-in data stolen, Bloomberg News reports (Reuters) Hackers Exploiting Apache Tomcat Vulnerability to Steal SSH Credentials & Gain Server Control (Cyber Security News) Hunters International Ransomware Gang Rebranding, Shifting Focus (SecurityWeek) Hackers Actively Scanning for Juniper's Smart Router With Default Password (Cyber Security News) Details Emerge on CVE Controversy Around Exploited CrushFTP Vulnerability (SecurityWeek)  New Malware Attacking Magic Enthusiasts to Steal Login Credentials (Cyber Security News) Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show.  Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

Storm⚡️Watch by GreyNoise Intelligence
Cybercrime Evolution: Robot Dog Backdoors & Mob's Digital Takeover

Storm⚡️Watch by GreyNoise Intelligence

Play Episode Listen Later Apr 1, 2025 58:12


Forecast = Cloudy with a chance of cyber meatballs. ‍ We're not fooling around in this episode of Storm⚡️Watch! The show kicks off with some positive news about the Journal Times returning to full operations following a cyberattack. This is followed by important information for VMware users regarding Broadcom's significant licensing changes effective April 10, including an increase in minimum core requirements from 16 to 72 cores per command line and a new 20% penalty for late subscription renewals that will be applied retroactively. The crew then reviews results from their recent poll asking listeners which feature of encrypted messaging apps concerns them most, with options including data storage, unencrypted backups, metadata, and accidental adds. In our first segment, we discuss security concerns with the Unitree Go1 consumer-grade robot dog, specifically focusing on the recently disclosed Zhexi Oray Tunnel backdoor that has raised alarm in the security community. Next up, the team explores FamousSparrow and their SparrowDoor malware, examining the techniques and implications of this threat actor's operations. In light of recent event, the hosts provide comprehensive guidance on secure messaging practices, drawing from recent Washington Post and Wired articles. They emphasize that secure communication depends not just on the app but also on how you use it. Key recommendations include choosing contacts wisely, securing your devices by using personal rather than work equipment, setting messages to automatically delete, and selecting the right messaging apps with Signal being the top recommendation for its verifiable end-to-end encryption. They also warn about potential vulnerabilities in cross-platform messaging and advise caution with apps like Telegram. We quickly review Europol's 2025 report on the evolving landscape of organized crime, which now heavily intersects with cybercrime. Traditional criminal networks have transformed into technology-driven enterprises using AI, blockchain, and cryptocurrency to enhance their operations. The internet has become the primary theater for organized crime with data as the new currency of power. The report identifies seven key threat areas and calls for improved global financial security measures, noting that criminal asset confiscation remains stagnant at around 2%. Finally, we conclude with updates from our benevolent overlords, including Censys' reports on JunOS vulnerabilities and Kubernetes issues, VulnCheck's partnership with Filigran, runZero's approach to exposure management, and GreyNoise's observations on DrayTek router activity and Palo Alto Networks scanner activity that may indicate upcoming threats. Storm Watch Homepage >> Learn more about GreyNoise >>  

De Dag
#1828 - Hoe jonge jongens criminelen worden

De Dag

Play Episode Listen Later Mar 26, 2025 22:25


In de podcast het verhaal van Jamal (niet zijn echte naam) die op zijn 13e geronseld werd om criminelen te helpen. Inmiddels is hij 16 en zet hij zelf andere 'sukkels' aan het werk.  Het jongerenkanaal van de NOS, NOS Stories, dook in de wereld van ronselaars en geronselde kinderen in het criminele circuit. Presentator Crystalina Agyeman-Prempeh sprak onder meer met een 16-jarige jongen die vrijuit vertelt over zijn criminele activiteiten. Zelf werd hij op zijn dertiende benaderd en inmiddels zet hij andere jongens aan het werk. 'Die klusjes laat ik doen door kneuzen,' zegt hij. 'Want zelf doen, dat is teveel risico. En ja, ik weet wel dat ik deze jongens meetrek in het criminele leven, maar goed, dat is natuurlijk hun eigen keuze.' De Europese politiedienst Europol waarschuwt voor de kwetsbaarheid van jongeren. Zij zouden steeds vaker "het vuile werk" voor criminele organisaties opknappen. Abdellaziz Akhath is jongerenwerker, werkte 10 jaar in een jeugdgevangenis, en staat in nauw contact met jongens die in het criminele circuit terecht zijn gekomen of ertegenaan schurken. Hij vertelt vanuit de praktijk welke verhalen hij tegenkomt. 'We krijgen het steeds drukker.'  Reageren? Mail dedag@nos.nl Presentatie & Montage: Elisabeth Steinz Redactie: Lisa Konings

Reimagining Cyber
AI and Cybercrime: Europol's New Warning and Global Threats

Reimagining Cyber

Play Episode Listen Later Mar 25, 2025 17:13


In this episode of Reimagining Cyber, we dive into Europol's latest report, The Changing DNA of Serious and Organised Crime, which highlights how AI is accelerating cybercrime and global information warfare.  Rob Aragao, breaks down the report's key findings, including AI-driven fraud, deepfake scams, and automated cybercrime operations.We also explore the broader implications of AI in shaping misinformation campaigns, with major players like China, Russia, and Iran investing billions in disinformation efforts. As law enforcement agencies struggle to keep up, we discuss the challenges of combating AI-powered threats and what this means for cybersecurity on a global scale.Rob also touches on how The U.S. is facing challenges in defending against AI-driven disinformation, as key institutions are shut down. This reduction in information validation and support makes it harder to track and counter adversarial efforts. Follow or subscribe to the show on your preferred podcast platform.Share the show with others in the cybersecurity world.Get in touch via reimaginingcyber@gmail.com

The CyberWire
Remote hijacking at your fingertips.

The CyberWire

Play Episode Listen Later Mar 19, 2025 32:03


A critical vulnerability could let attackers hijack and potentially disable vulnerable servers. Europol warns of a “shadow alliance” between state-backed threat actors and cybercriminals. Sekoia examines ClearFake. A critical PHP vulnerability is under active exploitation. A sophisticated scareware phishing campaign has shifted its focus to macOS users. Phishing as a service attacks are on the rise. A new jailbreak technique bypasses security controls in popular LLMs. Microsoft has uncovered StilachiRAT. CISA confirms active exploitation of a critical Fortinet vulnerability. On our CertByte segment, Chris Hare is joined by Troy McMillan to break down a question targeting the ISACA® Certified Information Security Manager® (CISM®) exam. AI coding assistants get all judgy.  Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CertByte Segment Welcome to CertByte! On this bi-weekly segment hosted by Chris Hare, a content developer and project management specialist at N2K, we share practice questions from N2K's suite of industry-leading certification resources. This week, Chris is joined by Troy McMillan to break down a question targeting the ISACA® Certified Information Security Manager® (CISM®) exam. Today's question comes from N2K's ISACA® Certified Information Security Manager® (CISM®) Practice Test. The CISM exam helps to affirm your ability to assess risks, implement effective governance, proactively respond to incidents and is the preferred credential for IT managers, according to ISACA.To learn more about this and other related topics under this objective, please refer to the following resource: CISM Review Manual, 15th Edition, 1.0, Information Security Governance, Introduction. Have a question that you'd like to see covered? Email us at certbyte@n2k.com. If you're studying for a certification exam, check out N2K's full exam prep library of certification practice tests, practice labs, and training courses by visiting our website at n2k.com/certify. Please note: The questions and answers provided here, and on our site, are not actual current or prior questions and answers from these certification publishers or providers. Additional source: https://www.isaca.org/credentialing/cism#1 Selected Reading Critical AMI MegaRAC bug can let attackers hijack, brick servers (bleepingcomputer) Europol Warns of “Shadow Alliance” Between States and Criminals (Infosecurity Magazine) ClearFake's New Widespread Variant: Increased Web3 Exploitation for Malware Delivery (Sekoia.io Blog) PHP RCE Vulnerability Actively Exploited in Wild to Attack Windows-based Systems (cybersecuritynews) Scareware Combined With Phishing in Attacks Targeting macOS Users (securityweek) Sneaky 2FA Joins Tycoon 2FA and EvilProxy in 2025 Phishing Surge (Infosecurity Magazine) New Jailbreak Technique Bypasses DeepSeek, Copilot, and ChatGPT to Generate Chrome Malware (gbhackers) Microsoft Warns of New StilachiRAT Malware (SecurityWeek) Fortinet Vulnerability Exploited in Ransomware Attack, CISA Warns (Infosecurity Magazine) AI coding assistant Cursor reportedly tells a 'vibe coder' to write his own damn code (TechCrunch) Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show.  Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

Más de uno
Edu García: "Tebas ha sellado alianza con Europol para cerrar persianas virtuales"

Más de uno

Play Episode Listen Later Feb 28, 2025 2:04


Edu García hace un repaso por las novedades del mundo del deporte. 

AML Conversations
Corruption, AI-based Fraud, Cybercrime, and Changing Priorities

AML Conversations

Play Episode Listen Later Feb 14, 2025 14:29


This week, John and Elliot discuss corruption, including the dropping of charges against New York Mayor Eric Adams, the Basel Institute on Governance's new quick guide on strategic corruption, and the DOJ's pausing enforcement of the Foreign Corrupt Practices Act. They also discuss issues raised by BaFin about AI-based fraud, actions by Europol on cybercrime, and other items impacting the financial crime prevention community.

The CyberWire
Read all about it—or maybe not.

The CyberWire

Play Episode Listen Later Feb 10, 2025 31:27


A cyberattack disrupts newspaper publishing. A major AI summit takes place in Paris this week. A federal judge restricts DOGE from accessing Treasury Department systems. Cybersecurity cooperation between Canada and the U.S. remains strong. The Kraken ransomware group leaks credentials allegedly linked to Cisco. Europol urges banks to start preparing for quantum-safe cryptography. Microsoft expands its Copilot bug bounty program. The PlayStation Network (PSN) experienced a major outage over the weekend. Indiana man sentenced to 20 years for $37m cryptocurrency fraud. Our guest is Mike Woodard, VP of Product Management for App Security at Digital.ai, sharing strategies to minimize risk when implementing AI. Hunting for length and complexity in WiFi passwords.  Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Our guest is Mike Woodard, VP of Product Management for App Security at Digital.ai, sharing strategies to minimize risk when implementing AI to enhance security. Selected Reading Cyberattack Disrupts Publication of Lee Newspapers Across the U.S. (New York Times) Trump's AI Ambition and China's DeepSeek Overshadow an AI Summit in Paris (SecurityWeek) Musk Team's Treasury Access Raises Security Fears, Despite Judge's Ordered Halt (New York Times) In Breaking USAID, the Trump Administration May Have Broken the Law (ProPublica) Judge: DOGE made US Treasury ‘more vulnerable to hacking' (The Register) Cisco Data Breach – Ransomware Group Allegedly Breached Internal Network (GB Hackers) Europol Warns Financial Sector of “Imminent” Quantum Threat (Infosecurity Magazine) Trade war or not, Canada will keep working with the U.S. on cybersecurity (The Logic) Microsoft Expands Copilot Bug Bounty Program, Increases Payouts (SecurityWeek) PlayStation Network Down; Outage Leaves Gamers Frustrated (Updated) (HackRead) Indiana Man Sentenced to 20 Years in Federal Prison for Conspiracies Involving Cyber Intrusion and a Massive $37 Million Cryptocurrency Theft (DataBreaches.Net) The World's Longest and Strongest WiFi Passwords (InfoSec Write-ups)  Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show.  Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

The CyberWire
Dismantling the Manson cybercrime market.

The CyberWire

Play Episode Listen Later Dec 5, 2024 35:35


Europol dismantles the Manson cybercrime market. Operation Destabilise stops two major Russian-speaking money laundering networks. New details emerge on China's attacks on U.S. telecoms. Black Lotus Labs uncovers a covert campaign by the Russian-based threat actor “Secret Blizzard”. Cisco issues patches for a high impact bootloader vulnerability. Trend Micro researchers uncovered Earth Minotaur targeting Tibetan and Uyghur communities. Payroll Pirates target HR payroll systems to redirect employee funds .Pegasus spyware may be more prevalent than previously believed. Our guest today is Jon France, CISO at ISC2, with insights from the ISC2 2024 Workforce Study. How businesses can lose customers one tip at a time.  Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Our guest today is Jon France, CISO at ISC2, sharing the ISC2 2024 Workforce Study. You can read the press release about the report here and dig into the details of the report itself here.  Selected Reading 50 Servers Linked to Cybercrime Marketplace and Phishing Sites Seized by Law Enforcement (SecurityWeek) UK's NCA Disrupts Multibillion-Dollar Russian Money Launderers (Infosecurity Magazine) The White House reveals at least 8 U.S. telecom firms impacted by China's Salt Typhoon cyberattack (Fast Company) Senators implore Department of Defense to expand the use of Matrix (Element) Snowblind: The Invisible Hand of Secret Blizzard (Lumen) Frequent freeloader part I: Secret Blizzard compromising Storm-0156 infrastructure for espionage (Microsoft Security) Russian Hackers Exploit Rival Attackers' Infrastructure for Espionage (Infosecurity Magazine) Bootloader Vulnerability Impacts Over 100 Cisco Switches (SecurityWeek) MOONSHINE Exploit Kit and DarkNimbus Backdoor Enabling Earth Minotaur's Multi-Platform Attacks (Trend Micro) Hunting Payroll Pirates: Silent Push Tracks HR Redirect Phishing Scam (Silent Push) iVerify Mobile Threat Investigation Uncovers New Pegasus Samples (iVerify) How a Russian man's harrowing tale shows the physical dangers of spyware (CyberScoop) Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show.  Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices