Tagged articles
27 articles
Page 1 of 1
Black & White Path
Black & White Path
Apr 8, 2026 · Industry Insights

Who Gains the Most in the 2026 Hacker Forum Wars?

The 2026 showdown among BreachForums, NotBreachForums, and LAPSUS$ reveals how brand value, internal rivalries, and resurrection tactics shape the underground cybercrime market, with the FBI watching the chaos unfold while observers dissect the power dynamics.

BreachForumsLAPSUS$brand effect
0 likes · 7 min read
Who Gains the Most in the 2026 Hacker Forum Wars?
Black & White Path
Black & White Path
Mar 13, 2026 · Information Security

Beware: Generative AI as a New Cybercrime Ally—13 Enterprise Attack Vectors

The article analyzes how generative AI is transforming cybercrime by enabling 13 distinct attack methods—from highly personalized phishing emails and AI‑assisted malware creation to automated vulnerability hunting, deep‑fake social engineering, malicious LLMs, and attacks on AI infrastructure—highlighting recent research data and real‑world examples that illustrate the heightened speed, stealth, and accessibility of modern threats.

AI InfrastructureLLM Securitycybercrime
0 likes · 13 min read
Beware: Generative AI as a New Cybercrime Ally—13 Enterprise Attack Vectors
Black & White Path
Black & White Path
Mar 12, 2026 · Information Security

Operation Cronos: How the FBI Turned Ransomware Takedown into Psychological Warfare

Operation Cronos demonstrated that law‑enforcement agencies can cripple a ransomware‑as‑a‑service group like LockBit not only by shutting down its infrastructure but also by launching a psychological campaign that exposed affiliates, destroyed the brand’s credibility, and leveraged legal and cryptocurrency actions to undermine future operations.

LockBitcybercrimeinformation security
0 likes · 9 min read
Operation Cronos: How the FBI Turned Ransomware Takedown into Psychological Warfare
Black & White Path
Black & White Path
Feb 21, 2026 · Industry Insights

2025 Global Crypto Crime Surge: Hackers and Ransomware Attacks Remain Rampant

TRM Labs reports that illicit cryptocurrency transactions jumped 145% to $1.58 trillion in 2025, driven by sanctions‑evasion trades, expanded state use, and better fund‑tracing tools, while hacker attacks, scams ($350 B inflow) and ransomware activity also intensified with new variants and evolving laundering methods.

BlockchainTRM Labscrypto scams
0 likes · 5 min read
2025 Global Crypto Crime Surge: Hackers and Ransomware Attacks Remain Rampant
Black & White Path
Black & White Path
Feb 14, 2026 · Information Security

When Hackers Operate Like a Corporation: How Attackers Outpace Defenders

The article traces the rapid evolution of cybercrime from scattered early malware to a highly organized, global underground industry, highlighting the rise of Ransomware‑as‑a‑Service, state‑backed actors, AI‑driven attacks, and why enterprises must shift from slow, reactive defenses to proactive resilience.

AI in securityattack-as-a-servicecyber resilience
0 likes · 13 min read
When Hackers Operate Like a Corporation: How Attackers Outpace Defenders
Java Captain
Java Captain
Jul 10, 2025 · Information Security

How a Young Developer Made 7 Million Yuan Selling Illegal Video‑Piracy Software

A 90‑born programmer created illegal video‑transfer software that bypassed watermark and originality checks on platforms like TikTok and Kuaishou, earning over 7 million yuan in less than a year before being sentenced to three years in prison, highlighting a criminal supply chain in China’s short‑video industry.

Chinacybercrimeinformation security
0 likes · 3 min read
How a Young Developer Made 7 Million Yuan Selling Illegal Video‑Piracy Software
Architecture Digest
Architecture Digest
Jul 25, 2024 · Information Security

Investigation of Phone and Electricity Recharge Money‑Laundering Schemes in Illicit Apps

The article analyzes how shady mobile applications exploit phone‑credit and electricity‑bill recharge interfaces to funnel user payments through complex, hidden channels, describing the laundering chain, various payment methods, server tracing details, and the broader security implications for the black‑gray market.

black marketcybercrimeinformation security
0 likes · 8 min read
Investigation of Phone and Electricity Recharge Money‑Laundering Schemes in Illicit Apps
IT Services Circle
IT Services Circle
Jun 17, 2024 · Information Security

Disgruntled Former Employee Hacks Singapore IT Firm, Deletes 180 Virtual Servers, Highlighting Human Factors in Enterprise Security

A former NCS QA engineer in Singapore, feeling wronged after his dismissal, illegally accessed the company's internal systems, wrote malicious scripts, and deleted 180 virtual servers, causing $678,000 in losses and prompting security experts to stress the importance of account deactivation, continuous monitoring, and the impact of employee emotions on corporate security.

AuthenticationSecurity Breachcybercrime
0 likes · 7 min read
Disgruntled Former Employee Hacks Singapore IT Firm, Deletes 180 Virtual Servers, Highlighting Human Factors in Enterprise Security
Efficient Ops
Efficient Ops
Jun 16, 2024 · Information Security

How a Former NCS Engineer’s Revenge Hack Caused $670K Loss and Prison

A Singapore court sentenced former NCS employee Kandula Nagaraju to over two years in prison after he illegally accessed his ex‑employer’s QA system, deleted 180 virtual servers, and caused more than $670,000 in damages, highlighting serious cybersecurity and legal repercussions.

Data losscybercrimeinformation security
0 likes · 6 min read
How a Former NCS Engineer’s Revenge Hack Caused $670K Loss and Prison
Java Architect Essentials
Java Architect Essentials
Feb 22, 2024 · Information Security

Analysis of Recharge‑Based Money Laundering Schemes in Illicit Apps

The article examines how certain shady applications use phone‑bill and electricity‑bill recharge interfaces as covert channels to launder money, detailing the multi‑step chain from unsuspecting consumers through small merchants and QR‑code transfers to black‑market accounts, and warns readers of the hidden risks.

black marketcybercrimemoney laundering
0 likes · 7 min read
Analysis of Recharge‑Based Money Laundering Schemes in Illicit Apps
Open Source Linux
Open Source Linux
Dec 15, 2023 · Information Security

Understanding Ransomware: Types, Attack Methods, and Effective Defenses

This article explains what ransomware is, outlines its main variants such as encryption‑based, lock‑screen and doxware ransomware, describes common infection vectors like brute‑force, phishing and exploit kits, and provides practical network‑ and host‑side defenses as well as response steps if an attack occurs.

cybercrimedefenseencryption
0 likes · 9 min read
Understanding Ransomware: Types, Attack Methods, and Effective Defenses
Programmer DD
Programmer DD
Jul 26, 2023 · Information Security

WormGPT: The Dark Twin of ChatGPT Empowering Cybercriminals

WormGPT, a €60‑per‑month black‑hat AI built on GPT‑J, can generate malicious code, phishing emails and other illegal content, exposing serious security risks and prompting experts to recommend BEC training and stricter email verification to mitigate AI‑driven cyber attacks.

AI securityBEC attacksChatGPT
0 likes · 8 min read
WormGPT: The Dark Twin of ChatGPT Empowering Cybercriminals
MaGe Linux Operations
MaGe Linux Operations
Feb 15, 2023 · Information Security

Unveiling DoS/DDoS Attacks: Techniques, Exploits, and Real Hacker Cases

This article explores the fundamentals and varieties of DoS and DDoS attacks, explains how special‑crafted packets, floods, SYN, UDP, and reflection/amplification methods work, and illustrates real‑world hacker groups such as DD4BC, Armada Collective, Fancy Bear, and their ransom tactics.

DDoSDoScybercrime
0 likes · 12 min read
Unveiling DoS/DDoS Attacks: Techniques, Exploits, and Real Hacker Cases
21CTO
21CTO
Jun 20, 2022 · Information Security

How an iCloud Hacker Stole Thousands of Nude Photos and Got 9 Years in Prison

A U.S. hacker known as "icloudripper4you" infiltrated thousands of iCloud accounts, stole massive amounts of nude photos and videos, and was sentenced to nine years in prison, highlighting the severe impact of cyber‑crime and the FBI's commitment to prosecuting such offenses.

cybercrimedata breachiCloud hack
0 likes · 4 min read
How an iCloud Hacker Stole Thousands of Nude Photos and Got 9 Years in Prison
Java Architect Essentials
Java Architect Essentials
Jun 12, 2021 · Information Security

China's First Nationwide Case of Illegal WeChat Data Harvesting via "Clean Fan" Software

In September 2022, Nantong police uncovered China's first nationwide case of illegal WeChat user data harvesting using a "clean fan" application, leading to the arrest of eight suspects who were convicted for illegally obtaining computer system data and controlling systems, highlighting severe information security risks.

ChinaWeChatcybercrime
0 likes · 7 min read
China's First Nationwide Case of Illegal WeChat Data Harvesting via "Clean Fan" Software
Java Backend Technology
Java Backend Technology
Mar 16, 2021 · Information Security

Inside the Fake WeChat App That Promotes Porn: Hidden Mechanics Unveiled

Security researchers dissect the counterfeit “Le Bao” app that mimics WeChat, revealing its covert QR‑code group‑joining, custom decoding, member‑paid porn livestreams, embedded payment methods, server infrastructure, and illicit profit models, highlighting its high concealment and the need for aggressive mitigation.

cybercrimeinformation securitymalware analysis
0 likes · 15 min read
Inside the Fake WeChat App That Promotes Porn: Hidden Mechanics Unveiled
Programmer DD
Programmer DD
Dec 6, 2020 · Information Security

How Fraudsters Exploit Online Promotions: Real Cases and Lessons

This article explains the concept of "薅羊毛" (exploiting online promotions), presents several real police‑investigated cases—including massive membership recharges, coupon abuse, and game‑reward scams—and warns readers about the legal risks of using illegal methods to obtain freebies.

case studycybercrimeinformation security
0 likes · 7 min read
How Fraudsters Exploit Online Promotions: Real Cases and Lessons
Architect's Tech Stack
Architect's Tech Stack
Dec 5, 2020 · Information Security

Case Study: Micro-Alliance Database Deletion Incident and Its Legal Consequences

In February 2020, a core operations engineer at Micro-Alliance maliciously deleted the company's production databases, causing over ten billion yuan in market loss, massive user disruption, and a six‑year prison sentence, while highlighting broader industry risks and the need for stronger security controls.

cybercrimedata breachdatabase deletion
0 likes · 8 min read
Case Study: Micro-Alliance Database Deletion Incident and Its Legal Consequences
Programmer DD
Programmer DD
Oct 27, 2020 · Information Security

How a Fake WeChat App ‘LeBao’ Fuels Hidden Porn Networks – A Deep Dive

This report analyzes the malicious “LeBao” application that masquerades as a WeChat‑like chat tool, detailing its covert QR‑code group entry, custom decoding, member‑paid porn livestreams, payment fraud, server tracing, and recommended mitigation measures to curb its illicit operations.

app investigationcybercrimeinformation security
0 likes · 11 min read
How a Fake WeChat App ‘LeBao’ Fuels Hidden Porn Networks – A Deep Dive
Java Backend Technology
Java Backend Technology
Aug 16, 2020 · Information Security

How Chinese Police Dismantled a $20M Game Cheat Syndicate

In 2020, Chinese authorities uncovered and busted a nationwide network selling illegal League of Legends cheat software, arresting 21 suspects across 14 provinces, exposing the developers, sales tactics, massive profits, and the legal ramifications under criminal law.

League of Legendscybercrimegame cheating
0 likes · 8 min read
How Chinese Police Dismantled a $20M Game Cheat Syndicate
21CTO
21CTO
Mar 22, 2020 · Information Security

Fake WeChat App Exposes Security Flaws: From Reverse Engineering to Criminal Conviction

A Chinese court case reveals how a reverse‑engineered, unauthorized WeChat client for feature phones spread illegal ads, compromised encrypted communications, and led to criminal charges for providing tools to infiltrate computer systems, highlighting serious information‑security risks and the legal consequences of software piracy.

ChinaSoftware PiracyWeChat
0 likes · 8 min read
Fake WeChat App Exposes Security Flaws: From Reverse Engineering to Criminal Conviction
Efficient Ops
Efficient Ops
Oct 30, 2018 · Information Security

How a Former Ops Manager Illegally Escalated Privileges to Steal and Sell Code Worth 8 Million Yuan

In a 2018 Beijing police operation, a former operations supervisor illegally raised his system permissions, downloaded three proprietary project source codes from a tech company, and sold them for nearly eight million yuan, leading to the arrest of two suspects after extensive digital forensic investigation.

Chinacase studycybercrime
0 likes · 4 min read
How a Former Ops Manager Illegally Escalated Privileges to Steal and Sell Code Worth 8 Million Yuan
21CTO
21CTO
Aug 28, 2018 · Information Security

500 Million Hotel Records Exposed: How the Massive Data Leak Impacts Your Privacy

A recent dark‑web sale revealed that over 500 million records from dozens of Huazhu hotel brands—including personal IDs, booking details, and login credentials—were compromised, prompting urgent security advice and highlighting the growing risks of large‑scale data breaches.

cybercrimedata breachhotel security
0 likes · 6 min read
500 Million Hotel Records Exposed: How the Massive Data Leak Impacts Your Privacy
Alibaba Cloud Infrastructure
Alibaba Cloud Infrastructure
Dec 6, 2016 · Information Security

Seminar on Building a Secure Internet Ecosystem Highlights Policy, Legal, and Technical Challenges

A recent seminar in Beijing gathered government, academic, and industry representatives to discuss the rapid growth of the internet, the rising threats of black‑gray markets, gaps in legislation, the need for unified standards, and collaborative measures to strengthen the overall cybersecurity ecosystem.

CollaborationInternet SecurityLegal Framework
0 likes · 6 min read
Seminar on Building a Secure Internet Ecosystem Highlights Policy, Legal, and Technical Challenges