UK law enforcement has shared over half a million compromised passwords found in cloud storage with Have I Been Pwned. The headline item is that over one-third of these passwords (about 225 million) have not been logged before.
After an apparent refusal to pay a ransom demand, Russian hackers have leaked a sampling of 13 million records of UK police data to the dark web in retaliation. The records were stolen from a police contractor.
After its infrastructure went offline in October, there was widespread speculation that the REvil ransomware group was done for good. The likelihood of that increased with last week's apprehension of affiliates along with the seizure of $6.1 million.
Suspects affiliated with a ransomware-as-a-service (RaaS) platform used in LockerGoga, MegaCortex, and Dharma ransomware attacks were detained in Ukraine and Switzerland.
An international law enforcement campaign that began in 2020 culminated in the infiltration and control of the botnet's infrastructure, with a beneficial payload delivered to infected devices that scrubs the Emotet malware.
US law enforcement agencies make up the majority of the information requests and nearly all of the ‘three letter’ players are getting in on the action, from the FBI to the IRS.
New report paints a picture of US law enforcement agencies that are stocked with advanced phone extraction tools and are very eager to use them, even when it is not legally appropriate.
Law enforcement agencies purchasing illicit breach data from SpyCloud, presumably for use in investigations, raising questions of due legal process by these agencies.
Data dump containing 269 GB of police files from hundreds of U.S. law enforcement agencies and the FBI is found to be tied to a breach at a shared third-party vendor.
Digital investigations take an important role in criminal justice today but law enforcement agencies face many challenges to drive operational efficiencies and standards in handling digital data.