Sunday, April 27, 2025
Homecyber securityThousands of Individuals Were Rescued from Cybercrime Groups

Thousands of Individuals Were Rescued from Cybercrime Groups

Published on

SIEM as a Service

Follow Us on Google News

Around 2700 people were rescued in Manila who were involved in Human Trafficking for fraudulent online gaming sites and other cybercrime groups.

The latest news regarding nighttime rides shows Las Pinas City in metropolitan Manila has become the Hubspot for cybercrime syndicates.

After investigation, police found that these suspects had fallen into the trap and were not allowed to quit the job easily once they realized.

- Advertisement - Google News

Unemployment, the need for money, and less user awareness make people fall into the trap of scams on the internet with fancy advertisements and excellent pay.

Cybercrime scams have become a significant issue in Asia, with reports of people from outside the region being enticed to take jobs in countries such as Myanmar and Cambodia, which are plagued by civil strife. 

Nevertheless, many of these workers are compelled to participate in internet-based scams and virtual servitude.

In May, leaders from the Association of Southeast Asian Nations agreed at a summit in Indonesia to tighten border controls and law enforcement and broaden public education to fight criminal syndicates that traffic workers to other nations, where they are made to participate in online fraud.

The team of police heads with Brig. Gen. Sydney Hernia said police armed with warrants raided and searched the buildings around midnight in Las Pinas and rescued 1,534 Filipinos and 1,190 foreigners from at least 17 countries, including 604 Chinese, 183 Vietnamese, 137 Indonesians, 134 Malaysians, and 81 Thais. 

There were also a few people from Myanmar, Pakistan, Yemen, Somalia, Sudan, Nigeria, and Taiwan.

In May, police raided another suspected cybercrime base at the Clark freeport in Mabalacat City, Pampanga province, north of Manila, seizing nearly 1,400 Filipino and foreign employees who were allegedly coerced into conducting cryptocurrency scams.

During investigations, the suspects confessed that they were not allowed to resign for unclear reasons. According to the AP news report, they were threatened to pay a hefty amount when attempting to leave.

“AI-based email security measures Protect your business From Email Threats!” – .

Latest articles

How To Use Digital Forensics To Strengthen Your Organization’s Cybersecurity Posture

Digital forensics has become a cornerstone of modern cybersecurity strategies, moving beyond its traditional...

Building A Strong Compliance Framework: A CISO’s Guide To Meeting Regulatory Requirements

In the current digital landscape, Chief Information Security Officers (CISOs) are under mounting pressure...

Two Systemic Jailbreaks Uncovered, Exposing Widespread Vulnerabilities in Generative AI Models

Two significant security vulnerabilities in generative AI systems have been discovered, allowing attackers to...

New AI-Generated ‘TikDocs’ Exploits Trust in the Medical Profession to Drive Sales

AI-generated medical scams across TikTok and Instagram, where deepfake avatars pose as healthcare professionals...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

How To Use Digital Forensics To Strengthen Your Organization’s Cybersecurity Posture

Digital forensics has become a cornerstone of modern cybersecurity strategies, moving beyond its traditional...

Building A Strong Compliance Framework: A CISO’s Guide To Meeting Regulatory Requirements

In the current digital landscape, Chief Information Security Officers (CISOs) are under mounting pressure...

Two Systemic Jailbreaks Uncovered, Exposing Widespread Vulnerabilities in Generative AI Models

Two significant security vulnerabilities in generative AI systems have been discovered, allowing attackers to...