Announcements - Latest News

Europol is celebrating #NoMoreRansom’s 6th anniversary!

Wednesday, 27 July 2022

This means 6 years of helping ransomware victims unlock encrypted files, providing tips on how to avoid getting infected and keeping money out of the...

More ›››

USD 11 million in illicit medicines seized in global INTERPOL operation

Friday, 22 July 2022

Every day, advertisements for medicines invade the Internet, posted on social media networks or other websites. However, behind this slick marketing...

More ›››

US seizes SSNDOB market with significant help from Cyprus Police's Cybercrime Subdivision

Thursday, 9 June 2022

SSNDOB, an online marketplace that sold the names, social security numbers, and dates of birth of approximately 24 million US people, has been taken...

More ›››

Global europol taskforce identifies 18 child victims of sexual abuse

Thursday, 18 November 2021

A total of 18 children have been tentatively identified and two offenders apprehended as a result of the 10th edition of Europol’s Victim...

More ›››

Uniting to raise awareness on Cyber Threats: European Cybersecurity Month 2021

Thursday, 30 September 2021

Today kicks off the European Union’s 9th annual European Cybersecurity Month (ECSM), promoting online security among citizens. The annual...

More ›››

Ransomware Facts, Trends & Statistics for 2020

Sunday, 29 November 2020

Being ever-evolving as an attack tool, even the simplest form of ransomware can cost significant time and money, but more severe attacks can deal a...

More ›››

Important Facts

2022 (Q1-Q3)







Child Pornography


Security Tips

A Cybercrime Typology

Wednesday, 3 August 2022

Cybercrime is one of the most prevalent forms of crime in the world. It can be defined as the intentional exploitation of computer networks, systems and technology-dependent enterprises. There are different types of cybercrime that include the use of malicious codes to modify data and gain...

More ›››

Tips And Advice To Avoid Becoming A Fraud Victim

Thursday, 2 June 2022

Online Shopping ‘Online shopping’ refers to purchases made either on a computer or on a smart phone/tablet. You can shop online with or without full authentication. Using a card is a safe method of payment in online shopping as long as you exercise the same care as in other shopping. Before...

More ›››

National CSIRT-CY

SiriusXM Vulnerability Lets Hackers Remotely Unlock and Start Connected Cars

Monday, December 5, 2022

Cybersecurity researchers have discovered a security vulnerability that exposes cars from Honda, Nissan, Infiniti, and Acura to remote attacks through a connected vehicle service provided by SiriusXM.

More ›››

Χάκερ χρησιμοποιούν το 'Invisible Challenge' του TikTok για να διαδώσουν κακόβουλο λογισμικό

Friday, December 2, 2022

Σύμφωνα με ερευνητές, χάκερ εκμεταλλεύονται μια δημοφιλή πρόκληση του TikTok για να εξαπατήσουν τους χρήστες ώστε να κατεβάσουν κακόβουλο λογισμικό που υποκλέπτει πληροφορίες.

More ›››

'iSpoof' service dismantled, main operator and 145 users arrested

Friday, November 25, 2022

The 'iSpoof' online spoofing service has been dismantled following an international law enforcement investigation that also led to the arrest of 146 people, including the suspected mastermind of the operation.

More ›››

Notorious Emotet Malware Returns With High-Volume Malspam Campaign

Tuesday, November 22, 2022

The notorious Emotet malware has returned with renewed vigor as part of a high-volume malspam campaign designed to drop payloads like IcedID and Bumblebee.

More ›››

High Severity Vulnerabilities Reported in F5 BIG-IP and BIG-IQ Devices

Thursday, November 17, 2022

Multiple security vulnerabilities have been disclosed in F5 BIG-IP and BIG-IQ devices that, if successfully exploited, to completely compromise affected systems.

More ›››

Citrix Issues Patches for Critical Flaw Affecting ADC and Gateway Products

Friday, November 11, 2022

Citrix has released security updates to address a critical authentication bypass flaw in the application delivery controller (ADC) and Gateway products that could be exploited to take control of affected systems.

More ›››
© Copyright 2022, Υποδιεύθυνση Ηλεκτρονικού Εγκλήματος, All Rights Reserved
Design & Development by Digital Forensic Lab | Hosting by Network Solutions LTD