From Files to Networks: Disrupting CSAM Distribution at Its Source
Recent arrests highlight how CSAM is distributed at scale. Targeting the digital infrastructure behind it is key to dismantling networks and protecting children.
Crime-as-a-Service and Malware-as-a-Service: The Professionalisation of Cyber Crime
Cybercrime has evolved into a professional underground economy driven by Crime-as-a-Service (CaaS) and Malware-as-a-Service (MaaS), where even non-experts can launch sophisticated attacks. These “cybercrime-for-hire” models are reshaping the threat landscape, demanding stronger defences and global cooperation.
Joint Stakeholder Workshop – PRESERVE, SafeHorizon, ENSEMBLE, and LEA Projects Cluster
We invite you to a joint stakeholder workshop organised by PRESERVE, SafeHorizon, and ENSEMBLE, together with the LEA Projects Cluster, led by Privanova.
Operation SIMCARTEL: Inside the Infrastructure Powering Crime-as-a-Service
Operation SIMCARTEL exposes the hidden infrastructure of Crime-as-a-Service, showing why dismantling criminal tools is key to preventing fraud.
From Chaos to Clarity: Real-Time Crypto Crime Intelligence with NOVA Internal AI
NOVA detects crypto crime reports in real time, extracts wallets with AI, and sends alerts to investigators, cutting delays, errors, and fund losses.
Disinformation as a Disruption Tool: Outsmarting Crime-as-a-Service from the Inside
Crime-as-a-Service turns cybercrime into a business. By targeting trust with counter-disinformation, LEAs can disrupt CaaS networks, slow attacks, and protect victims.
Security Challenges in Corporate Generative AI: ChatGPT, Copilot, Recall and others
The rapid adoption of AI tools like ChatGPT in organisations is raising major cybersecurity concerns, as security teams lack visibility into which tools are used and what sensitive data is being processed.
Pig Butchering Scams: The Long Con Behind Crypto Romance Frauds
Pig butchering (sha zhu pan) is a fast-growing crypto fraud that combines romance scams, investment fraud, and social engineering. Victims are groomed emotionally and financially before being tricked into transferring their savings to fake crypto platforms.
Exploring Digital Drug Trading Ecologies
New study by Tampere University compares Finnish, Polish and English darknet platforms, showing how language, culture and tech shape distinct drug trading ecologies.
Uncovering How Offenders Exploit Technology for Child Abuse
“Tell Me More About Tech” explores how offenders exploit digital tools for child abuse, providing evidence to help policymakers and platforms strengthen child online safety.


