Warning of Cryptocurrency Token Impersonation Scam
Warning to the braider audience about criminals creating cryptocurrency tokens that impersonate well-known tokens, such as Tether (USDT) and other stablecoins
Warning to the braider audience about criminals creating cryptocurrency tokens that impersonate well-known tokens, such as Tether (USDT) and other stablecoins
A Europe-wide network of telephone fraudsters has been dismantled who have caused an (estimated) loss of 10 million euros in around 6000 cases.
Crypto firms, alongside retail banking, wholesale banking and wealth management, posed the greatest risk of being exploited for money laundering between 2022 and 2023, a report by the government’s financial arm said on Wednesday.
The success story of brining down a massive Asian boiler room operation without the involvement of a single police officer
Today nearly $9 million worth of Tether, a cryptocurrency pegged to the U.S. dollar, have been successfully seized. These seized funds were traced to cryptocurrency addresses allegedly associated with an organization that exploited over 70 victims through romance scams and cryptocurrency confidence scams, which are widely known as “pig butchering.”
Nigerian scammers have been sentenced to six months in prison for using various online scams to steal more than $1.3 million from approximately 125 victims.
7 tips for proactively limiting or even blocking cyber threats at home to protect your home office work, your private internet activities and your children
Visitors to the sites of the illegal exchangers will now find a seizure banner that notifies them that the domain name has been seized by federal authorities.
Madrid based international cybercrime gang cracked after defrauding victims of more than $5.3 million.
The way SARs are handled are often riddled with basic errors. Elements such as narrative, keywords, objective, and timing of submission can make a real difference in the quality of the reports. So how to compile an effective and correct SAR?