Sep. 8, 2025 By Bill Parry A Queens grand jury indicted a Jackson Heights woman on charges of sex trafficking, grand larceny and other related crimes for allegedly forcing a woman to engage in prostitution on Roosevelt Avenue and to pay the defendant a daily sum of money. Valezka Echeverrias, 31, of 80th Street,… The post Jackson Heights woman indicted for sex trafficking woman, extorting another on Roosevelt Avenue: DA appeared first on Jackson Heights Post.| Jackson Heights Post
Unit 42 explores the similarities between the social engineering and reconnaissance tactics used by financially motivated criminals. The post Data Is the New Diamond: Heists in the Digital Age appeared first on Unit 42.| Unit 42
As businesses adopt AI-enabled interfaces, ransomware actors use them to expand, increase profits, and enhance successful attacks.| Help Net Security
Brazil’s Red Command Turned Turf Control Into Ride-Hailing Monopoly Brazil’s Red Command gang created its own Uber-style ride-hailing app, showing how Brazilian gangs are combining real-world territorial control and increasing technological sophistication to generate new revenue streams. The Red Command managed its app, called Rotax Mobili, together with an allied criminal group, Amigos dos Amigos. The post Brazil’s Red Command Turned Turf Control Into Ride-Hailing Monopoly appeared fir...| InSight Crime
Beyond Tren de Aragua: Venezuelan Gangs Spread Across Latin America While headlines and political speeches focus predominately on Tren de Aragua, another criminal group from Venezuela, the Zulia gangs, has expanded its operations in Latin America, leaving a quieter but no less violent mark than the more famous Venezuelan crime group. The post Beyond Tren de Aragua: Venezuelan Gangs Spread Across Latin America appeared first on InSight Crime.| InSight Crime
दिल्ली के पटियाला हाउस कोर्ट ने पूर्व रॉ अधिकारी विकास यादव के ख़िलाफ़ ग़ैर-ज़मानती वारंट जारी किया है. वह अपहरण और रंगदारी से जुड़े एक मामले की सुनवाई में अनुपस्थित रहे, जिसके बाद कोर्ट ने यह फै...| The Wire - Hindi
LGBTQ+ advocates list hotspots where blackmailers and organised groups target gay men. Homophobic extortion and blackmail of LGBTQ+ Africans is a widespread problem which the LGBTQ+ rights group Rightify Ghana is working to minimize. This week they published a list of the most dangerous areas in Ghana for anti-gay attacks, robberies and extortion. Rightify Ghana… The post Ghana’s most dangerous areas for anti-gay attacks and extortion appeared first on Erasing 76 Crimes.| Erasing 76 Crimes
AI advancements give malicious groups access to tools that will allow them to create more elaborate social engineering attacks in the future.| Help Net Security
Lockbit 3.0 is currently the most active ransomware group, but new ransomware groups like 8Base and Akira are rising in prominence.| Help Net Security
Your organization has been hit by ransomware and a decision has to be made on whether or not to make the ransom payment.| Help Net Security
While not paying a ransom is ethically correct, organizations lack power when it comes to ransomware attacks.| Help Net Security
"In Q1 2024, the proportion of victims that chose to pay touched a new record low of 28%," ransomware IR firm Coveware has found.| Help Net Security
Snowflake compromised? Attackers exploit stolen credentials| Help Net Security
Farmers in Bagdad district of Fergana region told journalist Sharifa Madrahimova that the district hokim is forcing them to deliver more grain to the state than is specified in their contracts.| Uzbek Forum for Human Rights
An international manhunt is underway to capture a former state security chief for allegedly colluding with a Jalisco Cartel cell in Tabasco.| InSight Crime
The number of Cl0p victims resulting from its attack on vulnerable internet-facing MOVEit Transfer installations has surpassed 420.| Help Net Security
Google Threat Intelligence Group said about 20 organizations have been hit by a cybercrime group it tracks as UNC6040.| CyberScoop
Ransomware attacks have reached new heights of ambition and audacity over the past year, with a surge in extortion attacks.| Help Net Security
In this article, the author looks back at predictions made in the 2014 Pew Research. Reflecting on this study, it becomes self-evident that we understand what the problems are, and, perhaps, we even have good ideas of how to tackle these problems. Therefore, the issue is not necessarily “finding a solution” but rather, having the will and desire to implement a solution.| QuickRead | News for the Financial Consulting Professional
Natalia here speaks to our imaginary friend 185.150.184.92| That grumpy BSD guy
The changes in the ransomware landscape from 2023 to 2024 show a promising trend: ransomware payments have decreased by a third.| Help Net Security
Ransomware and extortion incidents increased in 2023, creating a global crisis. 5,000 ransomware victims were detected across social channels.| Help Net Security
Ransomware payments plummet as more victims refuse to pay| Help Net Security
Attackers gain access to AWS cloud storage containers by scanning for and leveraging exposed environment files (with cloud IAM keys inside).| Help Net Security