Latest news with #DarkWeb


Metro
5 days ago
- Health
- Metro
Boy, 6, ‘kills newborn baby' after being left alone on maternity ward
A six-year-old boy has been accused of killing a premature baby on a maternity ward after his parents let him roam free. Newborn Zayneb-Cassandra died on Tuesday after suffering a catastrophic head injury at Jeanne-de-Flandre Children's Hospital in the northern city in Lille France. She was allegedly dropped on the floor by the boy, whose mother was also delivering a baby, who 'treated her like a doll' on Friday. Zayneb-Cassandra was the first child to a 23-year-old woman, and was born via c-section seven and a half months premature. She was left alone in the neonatal unit while the mum recovered on the maternity ward when the boy entered her room. Other patients had already complained about the child, who they said was a 'disruptive presence' and went into other patients' rooms unattended. Zayneb's grandmother told the Voix du Nord newspaper: 'The boy would arrive at 7am and spend all day running up and down the hallways. 'All the mothers were complaining, and a nurse even warned the child's mother that there was a problem. He was entering the other rooms. 'He also entered Zayneb's room for the first time. He said she looked like a doll, and my husband, who was there, took him out.' The family were signing the new mum's discharge papers when they received a call from the ward manager who said: 'A little boy had been playing with the baby, who had fallen.' Zayneb was found unresponsive on the floor next to the boy who was say in a chair. She was rushed to intensive care but was declared dead on Tuesday. More Trending An investigation has been opened by the juvenile unit of the Lille Judicial Police Service. 'Investigations are currently underway in this case,' said a spokesman for Lille prosecutors. The hospital also announced the opening of 'an internal administrative investigation'. A spokesman said: 'This human tragedy has deeply affected the staff and teams of Lille University Children's Hospital, as well as the other families present.' Get in touch with our news team by emailing us at webnews@ For more stories like this, check our news page. MORE: NCA officer jailed for swiping Bitcoin now worth £4,300,000 from Dark Web suspect MORE: Boy, 15, admits to throwing chair over Stratford Westfield balcony MORE: Heartbroken mum dies a year after son, 6, was killed by drink-driver


The Star
14-07-2025
- The Star
Jail, caning for Singapore man who had 285 child porn videos showing over 400 children, including infants
SINGAPORE: A police raid on a digital marketer's home in May 2022 uncovered 285 sexually explicit videos showing over 400 children in his possession. The videos include those involving infant boys below a year old. Investigations revealed that Danial Abdul Rahman had shared such content with others via Twitter and Telegram, but did not receive any money for doing so. On July 14, the 31-year-old Singaporean was sentenced to three years and a month in jail, and four strokes of the cane after he pleaded guilty to being in possession of such pornographic material. Deputy Public Prosecutor (DPP) Benjamin Low told the court that in 2017, Danial went on the Dark Web and downloaded child pornography onto his Google Drive account. He also joined various channels on messaging platform Telegram where such obscene materials were shared and distributed. In 2018, Danial created a Twitter account and posted obscene material showing male adults engaging in sexual activities with one another. He later had up to 500 followers on the platform. The DPP said that some of these followers and other Twitter users then sent him private messages, seeking his help in downloading obscene material, including those involving children. Danial agreed to do so and shared such content with them, before Twitter suspended his account in May 2021. After that, he started receiving requests for child pornography from multiple Telegram users. He then downloaded such content and shared them with the users. Investigations revealed that Danial distributed child pornography to multiple people, including at least five users via Twitter, for at least four years from 2018 to March 2022. Court documents did not disclose how his offence came to light, but police raided his home at around 10am on May 12, 2022 and found 285 sexually explicit videos showing over 400 children, including infant boys below a year old. The videos were between 20 seconds and nearly two hours long. The DPP had urged the court to sentence Danial to up to three years and three months' jail, and six strokes of the cane, adding: 'At least one video showed clear indications that the young male subject depicted in that video was in pain and distress, as evidenced by his crying.' - The Straits Times/ANN

Straits Times
14-07-2025
- Straits Times
Jail, caning for man who had 285 child porn videos showing over 400 children, including infants
Find out what's new on ST website and app. The 31-year-old Singaporean was sentenced to three years and a month in jail, and four strokes of the cane . SINGAPORE – A police raid on a digital marketer's home in May 2022 uncovered 285 sexually explicit videos showing over 400 children in his possession. The videos include those involving infant boys below a year old. Investigations revealed that Danial Abdul Rahman had shared such content with others via Twitter and Telegram, but did not receive any money for doing so. On July 14, the 31-year-old Singaporean was sentenced to three years and a month in jail, and four strokes of the cane after he pleaded guilty to being in possession of such pornographic material. Deputy Public Prosecutor (DPP) Benjamin Low told the court that in 2017, Danial went on the Dark Web and downloaded child pornography onto his Google Drive account. He also joined various channels on messaging platform Telegram where such obscene materials were shared and distributed. In 2018, Danial created a Twitter account and posted obscene material showing male adults engaging in sexual activities with one another. He later had up to 500 followers on the platform. The DPP said that some of these followers and other Twitter users then sent him private messages, seeking his help in downloading obscene material, including those involving children. Danial agreed to do so and shared such content with them, before Twitter suspended his account in May 2021. After that, he started receiving requests for child pornography from multiple Telegram users. He then downloaded such content and shared them with the users. Investigations revealed that Danial distributed child pornography to multiple people, including at least five users via Twitter, for at least four years from 2018 to March 2022. Court documents did not disclose how his offence came to light, but police raided his home at around 10am on May 12, 2022 and found 285 sexually explicit videos showing over 400 children, including infant boys below a year old. The videos were between 20 seconds and nearly two hours long. The DPP had urged the court to sentence Danial to up to three years and three months' jail, and six strokes of the cane, adding: 'At least one video showed clear indications that the young male subject depicted in that video was in pain and distress, as evidenced by his crying.'


Business Insider
10-07-2025
- Business
- Business Insider
Nominis Wins 'Product Innovation Award' at Mastercard Fintech Finals in Berlin
Tel Aviv, Israel, July 10th, 2025, Chainwire Nominis, the blockchain intelligence platform used by cryptocurrency startups and law enforcement, has won the Product Innovation Award at the Mastercard Fintech Competition in Berlin. This is Nominis' second Mastercard award this year. The judges recognized Nominis for building the first real-time KYT platform that combines on-chain data with off-chain intelligence from the Dark Web, Deep Web, open sources, and behavioral signals. CEO Snir Levi accepted the award remotely and stated: 'Nominis was built for the realities of 2025, where off-chain risks surface first, in the Dark Web, social media, and beyond. Most KYT tools weren't designed for that. This award validates our approach: complete transaction context, in real time, across over 70 blockchains.' Nominis Vue, the core platform, monitors blockchain and crypto wallet, trading, and mining transactions in real time, detects suspicious wallet behavior, and flags money laundering and sanction evasion patterns. It includes case management, automated investigations, and real-time risk scoring. As countries like Dubai and Singapore increase enforcement, real-time KYT is becoming a standard. Nominis supports both startups and regulators in navigating that shift. The award highlights Nominis' role in building safer crypto infrastructure, one transaction at a time. About Nominis NOMINIS is a crypto intelligence company. Nominis provides clients with a platform for KYT and Blockchain investigation. Through constant monitoring of the blockchain, and clear/deep/dark web scans and AI analysis, Nominis proactively detects potential threats before they escalate, including terror-financing and illegal money-laundering transactions.


New Paper
06-07-2025
- Business
- New Paper
IT vendor fined over data stolen from 190,000, sold on Dark Web
IT vendor Ezynetic has been fined $17,500 for failing to protect its clients' data, which resulted in more than 190,000 individuals' personal data being stolen and put for sale on the Dark Web. Ezynetic had failed to put in place reasonable security arrangements to protect the personal data in its possession or under its control, the Personal Data Protection Commission (PDPC) said on July 3 via a statement on its website. At the time of the breach, which Ezynetic uncovered on June 24, 2024, the company was operating an IT system linked to the Moneylenders Credit Bureau platform operated by Credit Bureau Singapore. Enzynetic's affected clients - previously identified as moneylenders Ban King Credit, Credit 21, Lending Bee, Katong Credit, Credit Thirty3, GS Credit, 1AP Capital, Creditmaster, BST Credit, U Credit, Horison Credit and Credit Matters - would input personal data of their prospective loan applicants and borrowers into the money lending system. This would allow them to verify the applicants' and borrowers' loan eligibility, generate MLCB credit reports and profit and loss reports, as well as track loans, instalments, collections and payments. In a judgment, the PDPC said that investigations found that a threat actor had exploited a vulnerable web service application to gain access and control of Ezynetic's system administrator account to access the money lending system. After gaining access to the money lending system, the threat actor obtained the personal data of the affected individuals. The data stolen included a combination of the name, address, e-mail address, telephone number, NRIC number, date of birth and the financial information available in the MLCB credit reports of 190,589 individuals. These individuals were notified of the incident on July 1, 2024. PDPC, which was informed of the incident on June 26, 2024, said its investigations revealed that Ezynetic had failed to disable or adequately secure the system administrator account, which is often targeted by malicious users. The account password at the time of the incident, which was p@ssword1 or Password@1, was susceptible to brute force attacks, wherein hackers repeatedly try to gain access to systems by trying different passwords. Ezynetic was also found not to have performed any periodic vulnerability assessment or penetration testing of its infrastructure, said the commission. Following the incident, Ezynetic rebuilt its entire network and migrated to a cloud environment for its servers, and implemented enhanced security measures for the new network after consultations with the Cyber Security Agency of Singapore and the Ministry of Law. PDPC's decision Under the Personal Data Protection Act (PDPA), which Ezynetic was found to have breached, organisations must protect personal data in its possession or under its control by making reasonable security arrangements to prevent unauthorised access, collection, use, disclosure, copying, modification or disposal, or similar risks. Its failure to conduct a reasonable periodic security review also amounted to a breach of the PDPA; according to PDPC's checklists to guard against common types of data breaches, organisations should, as a basic practice, periodically conduct web application vulnerability scanning and assessments. PDPC said that a fine was appropriate, as Ezynetic was a Software-as-a-Service provider, which should possess the necessary technical expertise to implement reasonable cyber security measures to address the evolving threats. According to Microsoft's cloud computing platform Azure, Software-as-a-Service, or SaaS for short, is a cloud-based model where software applications are hosted by a service provider and accessed over the internet. SaaS providers manage the underlying infrastructure, security, maintenance, and updates. Ezynetic was also directed by the PDPC to obtain Cyber Security Agency of Singapore's Cyber Trustmark Certification for its new IT network and report to the Commission on its completion. Such marks certify good cyber-security practices, helping companies benchmark and show their preparedness to meet new risks, On Dec 2, Ezynetic was informed of PDPC's preliminary decision, and the following day, it sought a waiver or reduction to the fine. The firm cited its financial commitment to mitigating the breach, its losses as a result of ongoing disruptions caused by the breach, and that it had cooperated with all regulatory bodies throughout the investigation. However, PDPC rejected this, as Ezynetic's financial commitment was a "necessary part of its obligation to implement reasonable security arrangement" under its protection obligation, and that Ezynetic's cooperativeness was already taken into account while determining the fine amount. "Whilst (Ezynetic) did provide some invoices showing that it had incurred expenses to implement remedial measures, these did not show that (Ezynetic) is in such a dire financial situation that the imposition of a financial penalty of $17,500 would adversely impact its ability to continue its business," said PDPC. As a result, the PDPC said Ezynetic was required to pay the fine within 30 days of from the date of the relevant notice accompanying its decision. If it does not do so, interest will be accrued until the fine is paid in full. The firm will also be required to obtain Cyber Trustmark Certification for its new IT network within 9 months from the date of PDPC's decision, and has to report to the commission within 14 days of doing so.