Tuesday, July 1, 2025

Security Boulevard Logo

Security Boulevard

The Home of the Security Bloggers Network

Community Chats Webinars Library
  • Home
    • Cybersecurity News
    • Features
    • Industry Spotlight
    • News Releases
  • Security Creators Network
    • Latest Posts
    • Syndicate Your Blog
    • Write for Security Boulevard
  • Webinars
    • Upcoming Webinars
    • Calendar View
    • On-Demand Webinars
  • Events
    • Upcoming Events
    • On-Demand Events
  • Sponsored Content
  • Chat
    • Security Boulevard Chat
    • Marketing InSecurity Podcast
    • Techstrong.tv Podcast
    • TechstrongTV - Twitch
  • Library
  • Related Sites
    • Techstrong Group
    • Cloud Native Now
    • DevOps.com
    • Security Boulevard
    • Techstrong Research
    • Techstrong TV
    • Techstrong.tv Podcast
    • Techstrong.tv - Twitch
    • Devops Chat
    • DevOps Dozen
    • DevOps TV
  • Media Kit
  • About
  • Sponsor

  • Analytics
  • AppSec
  • CISO
  • Cloud
  • DevOps
  • GRC
  • Identity
  • Incident Response
  • IoT / ICS
  • Threats / Breaches
  • More
    • Blockchain / Digital Currencies
    • Careers
    • Cyberlaw
    • Mobile
    • Social Engineering
  • Humor

#PigButchering

A pig in a muddy farm field

US Pig Butchering Victims ‘Will’ Get Refunds — Feds Seize $225M Cryptocurrency

Richi Jennings | June 20, 2025 | #CryptoScam, #InvestmentScam, #PigButchering, bank scam, bitcoin ATM scam, bitcoin scam, bitcoin transfer scams, blockchain, Blockchain Analysis, Blockchain Analytics, civil asset forfeiture, Crypto, crypto cons, crypto crime, crypto currency, cryptocurrency, Department of Justice (DOJ), DOJ, DOJ (Department of Justice), FBI, fbi annoucement, FBI investigation of cybercrime, FBI Investigations, Heartland Tri-State Bank, justice department, money laundering, OKX, online romance scam, philippines, pig butchering, Pig Butchering Scams, romance, romance fraud, romance scam, romance scammers, romance scams, SB Blogwatch, secret service, Shan Hanes, stablecoin, Tether, The Philippines, TRM Labs, U.S. Justice Department, U.S. Secret Service, US Justice Department, USDT, USSS, Vietnam
DoJ, FBI, USSS yoinked USDT: Pretty girls plus investment fraud equals forfeiture recovery (eventually) ...
Security Boulevard
A pig in a muddy farm field

Asian Scam Farms: ‘Industrial Scale,’ Warns UN Report

Richi Jennings | April 23, 2025 | #CryptoScam, #InvestmentScam, #PigButchering, Amazon Phishing Scams, AppleCare Warranty Scam, bank scam, bitcoin ATM scam, bitcoin scam, bitcoin transfer scams, gift card, gift card fraud, Gift Card Gang, gift card scams, gift cards, GiftCardScams, online romance scam, pig butchering, Pig Butchering Scams, romance, romance fraud, romance scam, romance scammers, romance scams, SB Blogwatch, social media intelligence, United Nations, UNODC
Bacon Redux: Pig butchering and other serious scams still thriving, despite crackdowns in Dubai and Myanmar ...
Security Boulevard
A pig in a muddy farm field

Pig Butchering at Heart of Bank Failure — CEO Gets 24 Years in Jail

Richi Jennings | August 23, 2024 | #PigButchering, Crypto, crypto cons, crypto crime, crypto currency, cryptocurrency, Heartland Tri-State Bank, online romance scam, pig butchering, Pig Butchering Scams, romance, romance fraud, romance scam, romance scammers, romance scams, SB Blogwatch, Shan Hanes
Oink, oink, FAIL—you’re in jail: Kansas bank chief exec Shan Hanes stole money from investors, a church and others to buy cryptocurrency to feed a scam ...
Security Boulevard
Millions and Millions of Fraud Domains: China attacks Illegal Gambling and Telecom Fraud

Millions and Millions of Fraud Domains: China attacks Illegal Gambling and Telecom Fraud

Gary Warner | June 24, 2024 | #CryptoScam, #PigButchering, china, domain names, financial grooming, Fraud
Last week I was reviewing a publication by the United Nation Office on Drugs and Crime published in January 2024, titled "Casinos, Money Laundering, Underground Banking, and Transnational Organized Crime in East ...
CyberCrime & Doing Time

Techstrong TV

Click full-screen to enable volume control
Watch latest episodes and shows

Tech Field Day Events

Upcoming Webinars

Securing Vibe Coding: Addressing the Security Challenges of AI-Generated Code
How to Spot and Stop Security Risks From Unmanaged AI Tools

Podcast

Listen to all of our podcasts

Press Releases

GoPlus's Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

GoPlus’s Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

C2A Security’s EVSec Risk Management and Automation Platform Gains Traction in Automotive Industry as Companies Seek to Efficiently Meet Regulatory Requirements

C2A Security’s EVSec Risk Management and Automation Platform Gains Traction in Automotive Industry as Companies Seek to Efficiently Meet Regulatory Requirements

Zama Raises $73M in Series A Lead by Multicoin Capital and Protocol Labs to Commercialize Fully Homomorphic Encryption

Zama Raises $73M in Series A Lead by Multicoin Capital and Protocol Labs to Commercialize Fully Homomorphic Encryption

RSM US Deploys Stellar Cyber Open XDR Platform to Secure Clients

RSM US Deploys Stellar Cyber Open XDR Platform to Secure Clients

ThreatHunter.ai Halts Hundreds of Attacks in the past 48 hours: Combating Ransomware and Nation-State Cyber Threats Head-On

ThreatHunter.ai Halts Hundreds of Attacks in the past 48 hours: Combating Ransomware and Nation-State Cyber Threats Head-On

Subscribe to our Newsletters

ThreatLocker

Most Read on the Boulevard

N. Korean Group BlueNoroff Uses Deepfake Zoom Calls in Crypto Scams
‘IntelBroker’ Hacker Arrested for Wave of High-Profile Data Breaches
Abstract Security Adds Data Lake to Reduce Storage Costs
NIST’s CURBy Uses Quantum to Verify Randomness of Numbers
ICE’s Shiny New ‘AI’ Facial Recognition App: False Positives Ahoy!
Cybersecurity Snapshot: U.S. Gov’t Urges Adoption of Memory-Safe Languages and Warns About Iran Cyber Threat
AI vs. AI: How Deepfake Attacks Are Changing Authentication Forever
The Hacktivist Cyber Attacks in the Iran-Israel Conflict
Best SAST Solutions: How to Choose Between the Top 11 Tools in 2025
Best Application Security Testing Tools: Top 10 Tools in 2025

Industry Spotlight

ICE’s Shiny New ‘AI’ Facial Recognition App: False Positives Ahoy!
Analytics & Intelligence Cyberlaw Cybersecurity Data Privacy Featured Governance, Risk & Compliance Humor Identity & Access Industry Spotlight Mobile Security Most Read This Week Network Security News Popular Post Security Awareness Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight Threat Intelligence Threats & Breaches 

ICE’s Shiny New ‘AI’ Facial Recognition App: False Positives Ahoy!

June 30, 2025 Richi Jennings | Yesterday 0
Russian Throttling of Cloudflare ‘Renders Many Websites Barely Usable’
Cloud Security Cybersecurity Data Security Featured Industry Spotlight Mobile Security Network Security News Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Social Engineering Spotlight 

Russian Throttling of Cloudflare ‘Renders Many Websites Barely Usable’

June 30, 2025 Jeffrey Burt | Yesterday 0
WhatsApp BANNED by House Security Goons — But Why?
Application Security Cloud Security Cyberlaw Cybersecurity Data Privacy Data Security DevOps Endpoint Featured Governance, Risk & Compliance Humor Incident Response Industry Spotlight Mobile Security Most Read This Week Network Security News Popular Post Security Awareness Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight Threats & Breaches Vulnerabilities 

WhatsApp BANNED by House Security Goons — But Why?

June 24, 2025 Richi Jennings | Jun 24 0

Top Stories

Sysdig Extends AI Agent Reach Across Portfolio
Cybersecurity Featured News Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight Threats & Breaches Vulnerabilities 

Sysdig Extends AI Agent Reach Across Portfolio

June 30, 2025 Michael Vizard | Yesterday 0
NIST’s CURBy Uses Quantum to Verify Randomness of Numbers
Cloud Security Cybersecurity Data Privacy Data Security Featured Identity & Access Mobile Security Network Security News Security Awareness Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight Threat Intelligence Threats & Breaches 

NIST’s CURBy Uses Quantum to Verify Randomness of Numbers

June 29, 2025 Jeffrey Burt | 1 day ago 0
‘IntelBroker’ Hacker Arrested for Wave of High-Profile Data Breaches
Cloud Security Cybersecurity Data Privacy Data Security Featured Identity & Access Mobile Security Network Security News Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight Threat Intelligence Threats & Breaches 

‘IntelBroker’ Hacker Arrested for Wave of High-Profile Data Breaches

June 28, 2025 Jeffrey Burt | 2 days ago 0

Download Free eBook

Managing the AppSec Toolstack

Security Boulevard Logo White

DMCA

Join the Community

  • Add your blog to Security Creators Network
  • Write for Security Boulevard
  • Bloggers Meetup and Awards
  • Ask a Question
  • Email: [email protected]

Useful Links

  • About
  • Media Kit
  • Sponsor Info
  • Copyright
  • TOS
  • DMCA Compliance Statement
  • Privacy Policy

Related Sites

  • Techstrong Group
  • Cloud Native Now
  • DevOps.com
  • Digital CxO
  • Techstrong Research
  • Techstrong TV
  • Techstrong.tv Podcast
  • DevOps Chat
  • DevOps Dozen
  • DevOps TV
Powered by Techstrong Group
Copyright © 2025 Techstrong Group Inc. All rights reserved.
×