Cyber crime continues to evolve, with criminals professionalising their operations. In November 2025, Eurojust and Europol dismantled a €600 million crypto‑investment fraud network, arresting nine individuals and seizing cash and cryptocurrency. The network lured victims through fake investment platforms, demonstrating the scale and sophistication of modern financial scams. Law enforcement emphasised the need for cross‑border cooperation to combat these crimes.
At the same time, researchers uncovered a side‑channel attack dubbed “TEE.fail” that exploits a vulnerability in the DDR5 bus to extract secrets from Intel and AMD Trusted Execution Environments (TEEs). Although this attack requires physical access, it highlights weaknesses in hardware‑based security mechanisms and underscores the need for continuous hardware and firmware security research.
These stories illustrate the breadth of today’s cyber threats—from financial scams to advanced hardware exploits. To protect against crypto‑fraud, businesses and individuals should verify investment platforms, conduct due diligence, and be sceptical of unrealistic returns. Organisations storing cryptocurrency should implement strong security controls, such as hardware wallets and multi‑signature schemes.
For hardware security, stay informed about vulnerabilities and apply firmware updates when available. Use physical security measures to prevent unauthorised access to servers and sensitive devices. Ultimately, a robust cybersecurity posture requires vigilance across technology, people, and processes. By learning from emerging threats, organisations can adapt and strengthen their defences.
