#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
AWS EKS Security Best Practices

Dutch Police | Breaking Cybersecurity News | The Hacker News

Category — Dutch Police
Dutch Police Seize Two VPN Servers, But Without Explaining... Why?

Dutch Police Seize Two VPN Servers, But Without Explaining... Why?

Sep 03, 2016
Recently, two European countries, France and Germany, have declared war against encryption with an objective to force major technology companies to built encryption backdoors in their secure messaging services. However, another neighborhood country, Netherlands, is proactively taking down cyber criminals, but do you know how? Dutch Police has seized two servers belonging to Virtual Private Network (VPN) provider Perfect Privacy , as part of an investigation, without even providing any reason for seizures. Switzerland-based VPN provider said they came to know about the servers seizure from I3D, the company that provides server hosting across Rotterdam. For those unfamiliar, Virtual Private Networks or VPNs are easy security and privacy tools that route your Internet traffic through a distant connection, protecting your browsing, hiding your location data and accessing restricted resources. VPNs have now become a great tool not just for large companies, but also for individual...
Underground Marketplace 'Utopia' Seized by Dutch Police, 5 suspects arrested

Underground Marketplace 'Utopia' Seized by Dutch Police, 5 suspects arrested

Feb 13, 2014
After Silk Road , another underground online marketplace ' Utopia ' has been seized by Dutch National Police ,  where users could buy illegal drugs and guns for home delivery. The police started their investigation under Codename ' Operation Commodore ' in 2013,   and finally  seized Utopia's Germany-based servers and arrested total 5 suspects for running this marketplace. One arrested in  Germany and  other four suspects, aged 29 to 46, were detained in The Netherlands.  Two of them had also been involved in another similar underground website ' Black Market Reloaded ', which was closed in December 2013. Utopia  reportedly launched only last week ( https://ggvow6fj3sehlm45.onion/ ),  intended to become a direct competitor of the Silk Road, was  a ' d ark web ' website, which is accessible only by using Tor anonymity software. The website is now displaying a message:  " This hidden ...
Second Dutch Teen Arrested Over Pro-WikiLeaks Cyber Attacks

Second Dutch Teen Arrested Over Pro-WikiLeaks Cyber Attacks

Dec 13, 2010
Police in the Netherlands have arrested a second teenager in connection with the pro-WikiLeaks distributed denial-of-service (DDoS) attacks seen earlier this week. The arrest of the 19-year-old man follows Friday's attacks on websites belonging to the Dutch Police and the national prosecutor's office. These attacks were widely viewed as retaliation against the arrest of a 16-year-old Dutch boy the day before. This boy was allegedly involved in "Anonymous" pro-WikiLeaks attacks against several websites, including MasterCard and PayPal. Prosecutors claim that the 19-year-old, from Hoogezand-Sappemeer in the northeast of the Netherlands, flooded the prosecutor's website with internet traffic. "From behind his computer, the man used hacker software to flood the website of the prosecutor's office with as much digital traffic as possible. Investigations by the National Police Services Agency showed that the man, who was active under the internet nickname Awinee...
cyber security

SaaS Security Made Simple

websiteAppomniSaaS Security / SSPM
Simplify SaaS security with a vendor checklist, RFP, and expert guidance.
Beware the Hidden Risk in Your Entra Environment

Beware the Hidden Risk in Your Entra Environment

Jun 25, 2025Identity Management / Enterprise Security
If you invite guest users into your Entra ID tenant, you may be opening yourself up to a surprising risk.  A gap in access control in Microsoft Entra's subscription handling is allowing guest users to create and transfer subscriptions into the tenant they are invited into, while maintaining full ownership of them.  All the guest user needs are the permissions to create subscriptions in their home tenant, and an invitation as a guest user into an external tenant. Once inside, the guest user can create subscriptions in their home tenant, transfer them into the external tenant, and retain full ownership rights. This stealthy privilege escalation tactic allows a guest user to gain a privileged foothold in an environment where they should only have limited access. Many organizations treat guest accounts as low-risk based on their temporary, limited access, but this behavior, which works as designed, opens the door to known attack paths and lateral movement within the resource t...
Expert Insights Articles Videos
Cybersecurity Resources