Saturday, March 14, 2026
- Advertisment -
Google search engine
Home Blog Page 2

NOPD Seeks Suspected Perpetrator, Persons of Interest in Eighth District Homicide Investigation

0

The NOPD is seeking assistance from the public in locating and identifying four subjects in its investigation for questioning of a homicide that occurred earlier today (September 29, 2025) in the 200 block of Bourbon Street in the Eighth District.

At about 2:22 a.m., NOPD Eighth District officers responded to shots being fired in the area. Upon arrival, officers located three gunshot wound victims – two adult females and one adult male.

One of the adult females was declared deceased on scene, while the remaining adult female and adult male were transported to a local hospital. A short time later, a third female victim was located near the intersection of Saint Charles Avenue and Canal Street.

The victim, who had sustained a graze gunshot wound, was also transported to a local hospital for treatment.

The depicted subjects – two unknown black males and two unknown black females – were viewed at the scene of the shooting at the time of the incident.

The pictured heavyset male subject is the suspected perpetrator in this incident. The additional subjects, who were seen with the suspect at the time of the incident, are considered persons of interest.

Suspect Wanted by Eighth District for Theft

0

The New Orleans Police are seeking the public’s assistance in identifying and locating a suspect wanted for theft from a vehicle.

According to investigators, on September 12, 2025, the pictured suspect stole property from the rear of a truck parked in the 1000 block of Conti Street and then fled on foot in an unknown direction.

Anyone with information regarding the crime or the identity of the suspect is asked to call Eighth District detectives at 504-658-6080 or to call Crimestoppers anonymously at 504-822-1111.

Founder of One of World’s Largest Hacker Forums Conor Brian Fitzpatrick Resentenced to Prison

0

A New York man has been resentenced to three years in prison for his creation and operation of BreachForums, a marketplace for cybercriminals to buy, sell, and trade hacked or stolen data and other contraband, and for possessing child sexual abuse material (CSAM).

“Following the dismantlement of RaidForums by law enforcement, the defendant set up and administered BreachForums, an online bazaar where criminals could purchase sensitive data,” said Acting Assistant Attorney General Matthew R. Galeotti of the Justice Department’s Criminal Division.

Conor Brian Fitzpatrick, 22, of Peekskill, New York, pleaded guilty to one count of access device conspiracy, one count of access device solicitation, and one count of possession of child sexual abuse material.

As part of the plea agreement, Fitzpatrick also agreed to forfeit over 100 domain names used in the operation of BreachForums, more than a dozen electronic devices used to execute the scheme, and cryptocurrency that represented proceeds of the scheme.

Fitzpatrick’s resentencing came after the U.S. Court of Appeals for the Fourth Circuit issued an opinion on January 21, 2025, vacating Fitzpatrick’s prior sentence of time served (17 days) and remanded the case for resentencing.

According to court documents, BreachForums, launched in March 2022, rapidly developed into one of the world’s largest English-language hacking forums with over 330,000 members. BreachForums emerged as a replacement to RaidForums, a then-major English-language hacking forum that law enforcement seized in February 2022.

As with RaidForums, BreachForums gained notoriety by selling access to high-profile database breaches that contained, among other things, bank account information, social security numbers and other personal identifying information (PII), and usernames and associated passwords for accessing online accounts with merchants and service providers.

BreachForums also maintained and offered access to at least 888 datasets of stolen information containing over 14 billion individual records of PII. Some of the stolen datasets contained sensitive information of customers at telecommunication, social media, investment, health care services, and internet service providers.

For instance, one database contained the names and contact information for approximately 200 million users of a major U.S.-based social networking site.

Another database listed the details of approximately 87,760 members of InfraGard, a partnership between the FBI and private sector companies focused on the protection of critical infrastructure.

Ransomware 2.0: The New Era of Cyber Extortion and Shifting Landscape

0

In recent years, ransomware attacks have evolved significantly, adopting more sophisticated tactics to extort victims.

Lukman Oduola of the International Cybersecurity and Digital Forensics Academy (ICDFA) states, “The threat landscape has shifted, and ransomware groups are now using double and triple extortion tactics to maximise their gains.”

Understanding double and triple extortion
Double extortion ransomware combines data encryption with data theft. Attackers not only lock a victim’s files but also steal sensitive information, threatening to leak it if the ransom is not paid. This technique was developed in response to organisations refusing to pay ransoms and restoring from backups instead.

Triple extortion takes it a step further, adding a third layer of pressure, such as demanding a ransom from the victim’s customers or partners or performing a Distributed Denial of Service (DDoS).

The rise of encryption-less ransomware
Encryption-less ransomware focuses on data exfiltration, where attackers steal sensitive data and threaten to publish it unless a ransom is paid. This type of ransomware is particularly damaging, as it can lead to reputational damage and regulatory risks. According to Morphisec, up to 97% of ransomware incidents involve data exfiltration.

Notable ransomware examples
Several ransomware groups have made headlines for their sophisticated tactics and widespread impact. Cl0p Ransomware is known for exploiting zero-day vulnerabilities and using double extortion tactics, where they not only encrypt data but also threaten to leak it if their demands aren’t met.

This group has compromised hundreds of organisations globally, making it a significant threat to businesses and institutions. Qilin Ransomware, on the other hand, offers a highly customizable Ransomware-as-a-Service (RaaS) model, targeting industries that handle sensitive data, such as healthcare and finance.

This allows affiliates to tailor their attacks to specific victims, increasing the likelihood of success.

Akira Ransomware targets small to medium-sized businesses, using double extortion tactics and demanding Bitcoin payments. Its relatively low profile belies its effectiveness in extorting money from vulnerable organisations.

LockBit Ransomware employs intermittent encryption, making it harder to detect, and triple extortion tactics, including Distributed Denial of Service (DDoS) attacks. By adding DDoS attacks to their arsenal, LockBit increases the pressure on victims to pay the ransom, making it a particularly formidable threat.

These examples illustrate the diversity and complexity of modern ransomware attacks, highlighting the need for robust cybersecurity measures to prevent and respond to these threats.

Statistics highlight the severity of the threat
The statistics surrounding ransomware attacks paint a stark picture of the severity of this threat. The average cost of a ransomware incident has skyrocketed, jumping from $686,000 in 2019 to $3.7 million in 2023, a staggering 440% increase.

This dramatic rise underscores the growing financial burden that organisations face when dealing with these types of attacks. Moreover, the total losses attributed to ransomware events over five years are estimated to be around $276 billion, representing a 140-fold increase in financial impact.

This enormous figure highlights the devastating consequences of ransomware attacks on a global scale. Notably, smaller organisations, those with revenues under $100 million, are disproportionately affected, with ransomware accounting for 30-40% of incidents in this group.

These statistics demonstrate the urgent need for effective cybersecurity measures to prevent and mitigate the impact of ransomware attacks, particularly for smaller organisations that may be more vulnerable to these threats.

Defensive strategies
To effectively combat ransomware attacks, organisations should implement a multifaceted defence strategy. Firstly, monitoring outbound traffic is crucial to detect unusual uploads and transfers that may indicate data exfiltration, allowing for swift action to prevent further damage.

Additionally, strengthening data backup practices is vital; this can be achieved by using immutable backups that cannot be altered or deleted by attackers, and regularly testing restoration processes to ensure that data can be quickly recovered in the event of an attack.

Limiting Remote Desktop Protocol (RDP) access is also essential, which can be done by enforcing multi-factor authentication (MFA) to add an extra layer of security and regularly auditing VPN/RDP logs to identify potential security breaches.

Furthermore, utilising Data Loss Prevention (DLP) tools can provide organisations with increased visibility and control over sensitive data, enabling them to detect potential data breaches and take prompt action to prevent them.

Experts stress that by grasping the shifting threat landscape and deploying robust security measures, organisations can minimise the risk of ransomware attacks and shield their sensitive information. According to Lukman, a proactive stance on cybersecurity is vital to outpacing threat actors.

Funminiyi B. Philips is a cybersecurity enthusiast. He can be reached on LinkedIn.

Brazil’s Former President Jair Bolsonaro Jailed 27 Years for Coup

0

Brazil’s Supreme Court on Thursday convicted former President Jair Bolsonaro of orchestrating a coup plot after his defeat in the 2022 presidential election.

The 70-year-old former leader was sentenced to 27 years and three months in prison, concluding a lengthy legal battle that has gripped the nation.

The verdict followed a two-year investigation and trial into Bolsonaro’s alleged actions after he lost the election to his rival, Luiz Inácio Lula da Silva.

Prosecutors presented a case arguing that the former president used his position to incite his followers to reject the election results and storm government buildings in the capital.

The prosecution’s evidence included video recordings of Bolsonaro’s speeches, social media posts, and private communications with allies. The court’s decision was unanimous, with all justices finding Bolsonaro guilty of crimes against the democratic state and the rule of law.

Bolsonaro’s legal team has vowed to appeal the decision, maintaining that the former president is a victim of political persecution. They contend that his actions were expressions of free speech and not a genuine attempt to seize power.

However, legal experts believe the Supreme Court’s verdict is a strong signal that Brazil’s democratic institutions are prepared to defend themselves against any threats. The sentence is considered one of the most severe ever handed down to a former head of state in the country.

The conviction has deepened the political divisions that have defined Brazil in recent years. Supporters of Bolsonaro have condemned the ruling as a politically motivated attack on their leader, while his opponents have hailed it as a victory for democracy.

The sentence has effectively ended any hope of a political comeback for Bolsonaro and has shifted the focus to the future of the conservative movement in Brazil without its most prominent figure.

PHOTO: FBI Offers $100,000 Reward for Information in Utah Murder of Charlie Kirk

0

The Federal Bureau of Investigation is offering a reward of up to $100,000 for information leading to the identification and arrest of the person or persons responsible for the murder of Charlie Kirk.

Kirk was killed on September 10, 2025, at Utah Valley University.

The FBI is urging the public to come forward with any information, no matter how insignificant it may seem.

Details surrounding the murder are limited, but authorities have confirmed that the incident took place on the campus of Utah Valley University.

The FBI has partnered with local law enforcement to investigate the case and is appealing to anyone who was in the vicinity of the university on the day of the murder to contact them.

The public is encouraged to call the FBI at 1-800-CALL-FBI.

The FBI also accepts digital evidence, such as photos and videos, which can be submitted through a dedicated online portal.

The murder has sent shockwaves through the community of Orem and the Utah Valley University campus. Students, faculty, and staff are being urged to remain vigilant and report any suspicious activity to campus security or law enforcement. The university has increased its security presence and is offering counselling services to those affected by the tragedy.

The substantial reward offered by the FBI underscores the seriousness of the case and the determination of law enforcement to bring the perpetrator to justice. Investigators hope that the reward will encourage witnesses to come forward with information that can help solve the crime and provide closure for Charlie Kirk’s family and friends.

Nadine Menendez Sentenced to Years in Prison for Bribery

0

In a dramatic conclusion to a high-profile case, Nadine Menendez, the wife of former New Jersey Senator Robert Menendez, was sentenced to four and a half years in prison for her role in a bribery scheme.

She was found guilty of trading her husband’s political influence for cash, gold bars, and a luxury Mercedes-Benz.

During the sentencing, Menendez addressed the judge, stating that her husband had led her astray.

“I put my life in his hands and he strung me like a puppet,” she said.

The case has drawn national attention, shining a light on the intersection of politics, power, and corruption.

The charges against Nadine Menendez stemmed from a years-long investigation that alleged she and her husband accepted bribes in exchange for political favours.

The prosecution presented evidence showing a pattern of gifts and payments from businessmen seeking the senator’s influence.

The trial revealed a scheme where Menendez acted as an intermediary, facilitating the flow of money and gifts in exchange for her husband’s assistance.

Prosecutors argued that the bribes were intended to influence public policy and benefit the private interests of the donors. The defence, however, maintained that the gifts were a show of friendship and had no connection to any official government actions.

 

Statement about her conviction in April

Moments ago, a unanimous jury convicted Nadine Menendez for her critical role in a corruption and foreign influence scheme involving her husband, convicted former Senator Robert Menendez.

Nadine Menendez and Senator Menendez were partners in crime.

Over the span of five years, Nadine Menendez agreed to accept and accepted all sorts of bribes – including gold bars, cash, a Mercedes-Benz convertible, and a no-show job – all in exchange for the Senator’s corrupt official acts.

Together, Nadine Menendez and the senator placed their own interests and greed ahead of the interests of the citizens the senator was elected to serve.

Today’s (Monday) verdict sends the clear message that the power of government officials may not be put up for sale, and that all those who facilitate corruption will be held accountable for their actions.

I thank the career prosecutors of this Office and the special agents of the Federal Bureau of Investigation and Internal Revenue Service—Criminal Investigation for their unwavering commitment to this case and for their extraordinary efforts in ensuring that justice was done.

Statement of acting United States Attorney Matthew Podolsky on the conviction of Nadine Menendez

Sudanese Tortured, Killed in ‘Slaughterhouses’: Human Rights Council

0

Shortly after presenting a mandated report to the Human Rights Council in Geneva on Tuesday, the chair of the Fact-Finding Mission on Sudan, Mohamed Chande Othman, insisted that both the Sudanese Armed Forces (SAF) and Rapid Support Forces (RSF) militia had carried out atrocity crimes.

Among the testimonies gathered for the report, survivors from RSF detention sites described the locations as “slaughterhouses”.

In one notorious RSF facility, dozens of detainees died between June and October this year after being tortured, denied food and medical care, the independent rights expert said.

Equally, in SAF-run detention facilities, “civilians were also subjected to torture, including electric shock, sexualized abuse, and they were held in cells so overcrowded that some prisoners had to sleep standing”, he disclosed.

In addition, girls as young as 12 were forced into marriage, “sometimes under the threat of death to their families”, the fact-finding mission chair continued.

“Men and boys were also subjected to sexualized torture, and such acts are rooted in racism, prejudice and impunity, and they devastate entire communities.”

Highlighting the lack of diplomatic solutions to the conflict, which began in April 2023, and its massive impact of the war on civilians, report co-author Mona Rishmawi said, “Everybody knows you cannot rape, you cannot loot, you cannot destroy property. You cannot starve people…But if there is no accountability, of course, they will continue doing it.”

Asked why the report had decided not to describe what has been happening in Sudan as genocide, Rishmawi replied that the evidence “basically looks at more or less the same kind of violations as genocide”.

She added, “You kill, [you provide] no food, no water, you don’t allow food production. You don’t allow access to food, to markets…and you don’t allow access to humanitarian aid. What you do want is to kill the population…So, the effect of this is really the crime against humanity…of extermination.”

The investigative body created by the Human Rights Council in October 2023 highlighted the devastating humanitarian emergency that has resulted from the war.

“In displacement camps such as Zamzam and Abu Shouk, witnesses describe children dying of hunger and dehydration in the streets, including people eating animal food,” said Joy Ngozi Ezeilo, Expert Member of the Fact-Finding Mission.

Addressing the council earlier, fact-finding mission chair Mr. Othman insisted that the war was “destroying not only lives but also the means of survival”, with hospitals, markets, water and electricity systems – and even humanitarian convoys – systematically attacked.

“Markets, the backbone of food access, have been repeatedly bombed,” he said, adding that in October 2024, SAF airstrikes on El Koma market killed at least 45 civilians.

It was reported that two months later, Kabkabiya market was struck, killing more than 100. In March this year, it was gathered that SAF bombed the Tora market during peak hours, killing and injuring hundreds

The mission report underscored how the RSF had also shelled markets, pillaged entire areas and destroyed Zamzam camp’s market.

RSF drone strikes hit the Merowe Dam and water towers, leaving communities without drinking water, while “one mother told us she lost all four of her children to thirst while fleeing”, said Othman, who, like the other members of the panel, is an independent human rights expert and not a UN employee.

Conservative Activist Charlie Kirk Shot, Killed at Utah Valley University Event

0

Conservative activist and founder of Turning Point USA, Charlie Kirk, was shot and killed on Wednesday while speaking at an event at Utah Valley University in Orem, Utah, according to multiple reports and a statement from President Donald Trump.

The shooting, which took place during an outdoor debate event, has drawn widespread condemnation and renewed concerns about political violence across the United States.

At approximately 12:10 p.m. local time, a single shot was fired at Kirk as he sat under a tent, addressing a crowd as part of his organisation’s ‘Prove Me Wrong’ series.

Videos from the scene, circulated widely on social media, show the 31-year-old Kirk speaking into a microphone when a shot rings out. He is seen reaching for his neck before collapsing as spectators scream and scatter.

Orem, Utah, Mayor David Young confirmed that a suspect has not been arrested and the search is ongoing. While the university initially stated a person was in custody, law enforcement officials later clarified that the person was a witness who was questioned and subsequently released.

In a statement on his Truth Social account, former President Donald Trump confirmed the death, writing, “The Great, and even Legendary, Charlie Kirk, is dead. No one understood or had the Heart of the Youth in the United States of America better than Charlie. He was loved and admired by ALL, especially me, and now, he is no longer with us.”

The motive for the shooting remains unknown, but the event had been met with some opposition on campus. An online petition calling for Kirk’s appearance to be barred had received nearly 1,000 signatures. Despite this, the university had affirmed its commitment to free speech and constructive dialogue.

Leaders on both sides of the political spectrum have condemned the shooting.

Utah Governor Spencer Cox stated that he and the FBI are working to “bring to justice the individual responsible for this tragedy.”

Similarly, California Governor Gavin Newsom, a Democrat, described the attack as “disgusting, vile, and reprehensible,” stressing that “we must reject political violence in EVERY form.”

According to former Utah congressman Jason Chaffetz, who was at the event, Kirk had some private security, but the police presence was light. Chaffetz described the incident as a single, close shot.

The shooting is the latest in a series of politically motivated violent acts documented since January 6, 2021, and serves as a grim reminder of the nation’s fractured political landscape.

Kirk was a prominent and influential figure in conservative youth politics. As the co-founder and CEO of Turning Point USA, he built a powerful grassroots organisation with a mission to identify, educate, train, and organise students to promote conservative principles.

His daily radio talk show, ‘The Charlie Kirk Show’, and his frequent appearances on cable news made him a regular presence in the national political discourse.

Utah Valley University has closed its campus and cancelled classes until further notice as police and multiple agencies, including the FBI, continue their investigation.

LockerGoga, MegaCortex, Nefilim Ransomware Administrator Charged with Ransomware Attacks

0

Earlier today, the U.S. District Court for the Eastern District of New York unsealed a superseding indictment charging Volodymyr Viktorovich Tymoshchuk — also known as deadforz, Boba, msfv, and farnetwork — a Ukrainian national, with serving as an administrator in the LockerGoga, MegaCortex, and Nefilim ransomware schemes.

“Volodymyr Tymoshchuk is charged for his role in ransomware schemes that extorted more than 250 companies across the United States and hundreds more around the world,” said Acting Assistant Attorney General Matthew R. Galeotti of the Justice Department’s Criminal Division. “In some instances, these attacks resulted in the complete disruption of business operations until encrypted data could be recovered or restored. This prosecution and today’s rewards announcement reflect our determination to protect businesses from digital sabotage and extortion and to relentlessly pursue the criminals responsible, no matter where they are located.”

As alleged in the superseding indictment, between December 2018 and October 2021, Tymoshchuk used the LockerGoga, MegaCortex, and Nefilim ransomware variants to encrypt computer networks in countries around the world, including in the Eastern District of New York, elsewhere in the United States, France, Germany, the Netherlands, Norway, and Switzerland.

These ransomware attacks resulted in millions of dollars in losses, encompassing damage to victim computer systems, remediation costs, and ransomware payments to the perpetrators.

In these attacks, the perpetrators typically customised the ransomware executable file (the ransomware file responsible for encryption) for each ransomware victim. The customisation enabled ransomware actors to generate a decryption key that could only decrypt the network of the specific victim.

If a victim paid the ransom demand, the perpetrators would send a decryption tool, which enabled the victim to decrypt the computer files locked by the ransomware program.

Between July 2019 and June 2020, Tymoshchuk and his co‑conspirators are alleged to have compromised the networks of more than 250 victim companies in the United States and hundreds of other companies around the world with LockerGoga and MegaCortex.

However, many of these extortion attempts were unsuccessful because law enforcement often notified victims that their networks had been compromised before Tymoshchuk and his co-conspirators were able to deploy the ransomware.

Subsequently, from July 2020 through October 2021, Tymoshchuk is alleged to have been one of the administrators of the Nefilim ransomware strain.

Tymoshchuk and the other Nefilim administrators provided other Nefilim ransomware affiliates, including co‑defendant Artem Stryzhak, who was extradited from Spain and faces charges in the Eastern District of New York, with access to the Nefilim ransomware in exchange for 20 per cent of the ransom proceeds extorted from Nefilim victims.

In September 2022, as part of an international coordinated effort against LockerGoga and MegaCortex ransomware, decryption keys associated with those ransomware variants were made available to the public via the “No More Ransomware Project”, an initiative to empower ransomware victims to decrypt encrypted computers without paying a ransom.

These decryption keys enabled compromised victim companies and institutions to recover data previously encrypted with LockerGoga and MegaCortex ransomware.

Tymoshchuk is charged with two counts of conspiracy to commit fraud and related activity in connection with computers, three counts of intentional damage to a protected computer, one count of unauthorised access to a protected computer, and one count of transmitting a threat to disclose confidential information.