Attackers demand money under the guise of a "remote search"
Scammers request geolocation, supposedly for a meeting, and then use threats, intimidation, and extort money
The scheme is related to the "return" of allegedly credited funds
The correspondence between the victim and the perpetrators can last for several weeks
Difficulties in labeling calls arise due to the lack of a unified tool and mechanism that takes into account the specifics of small companies
Anonymous mail services, malicious applications, phishing sites, and others were also blocked
Criminals disguise malicious programs as legitimate software
Deputies believe there are difficulties in verifying access to adult content
Scammers are using generative technologies to create fake websites and ads
Three suspects are accused of using a cloud-based telephone exchange for criminal activity
Experts advise checking each resource before making a purchase
Attackers target young men of conscription age and relatives of deceased military personnel
A set of jewelry was offered for 250 million rubles
A draft national standard for assessing the risks of artificial intelligence implementation has been developed in Novosibirsk
Information published on the darknet is not related to the messenger's infrastructure