Month: February 2021

Experiment data analysis on Bitcoin Blockchain full data

At we offer to experiment data analysis on Bitcoin Blockchain Data. The data is parsed with BlockSci, and there are libraries to be productive very fast. We opened beta tester program, just go to register and I send you the access. You have Jupyter Notebook with libraries and data at disposal. Here below a little code for example.

submitted by /u/isaac1972
[link] [comments]

Master Data Management on a shoestring?

I work at a nonprofit, and we have two databases (one on Oracle and another on MSSQL) that hold nearly the same sort of information, but serve very different business purposes. I was able to replicate the data from Oracle into MSSQL using SSIS.

After a year of being live with this solution, it is obvious that the integration has a major issue with merging a particular entity model. I think it is time we explore a master data management solution.

We have SQL Server Standard edition; Master Data Services only comes with Developer and Enterprise editions. I do not have the budget to upgrade, and for regulatory reasons cannot deploy Developer ed in a production environment.

Since I have a non-existent budget, I have been eyeing Talend Open Studio for MDM. Given our investment in SSIS, I hate giving up the work we did in SSIS, especially since we bought a few 3rd party components for it.

Is there anyway to use Talend’s MDM solution with SSIS (a custom component perhaps)? I see there are components in Talend to import SSIS packages into Talend Open Studio.

Are there any open-source/budget friendly MDM solutions that work with SSIS? Is there anyway to license Microsoft’s solution separately from upgrading SQL Server?

Please forgive me – this is not my area of expertise.

submitted by /u/drk2cmp
[link] [comments]

Looking for feedback on our new Data Discovery tool

We just launched our new data discovery tool and are looking for feedback: The first 50 companies that sign up are able to access this catalogue for free.

submitted by /u/secodaHQ
[link] [comments]

The Business of Fraud: An Overview of How Cybercrime Gets Monetized

Insikt Group

Editor’s Note: The following post is an excerpt of a full report. To read the entire analysis, click here to download the report as a PDF.

Recorded Future analyzed current data from the Recorded Future® Platform, information security reporting, and other OSINT sources to review 11 fraud methods and services that facilitate threat actor campaigns. In subsequent months, Recorded Future will publish in-depth reports on each method or service, the threat actors offering them, technical details where applicable, and mitigation recommendations. This report will be of most interest to anti-fraud and network defenders, security researchers, and executives charged with security and fraud risk management and mitigation.

Executive Summary

The cybercriminal fraud ecosystem is a whole and interconnected enterprise. In this report, the introduction to our series on cybercriminal fraud, Insikt Group will describe 11 types of fraud methods and services currently used by threat actors to facilitate their campaigns. For each, we provide a brief overview of some notable recent developments, list some of the top vendors of these services on the criminal underground, and provide suggested mitigations for defenders to implement. The Recorded Future Platform enables research and analysis of fraud methods available on the dark web and other sources to identify cybercriminal schemes, as well as threat actors and communities that advertise said methods.


  • Fraud tutorials and courses provide insights into possible vulnerabilities as well as schemes and techniques used by threat actors.
  • Drops and mule services, unlike other cybercrime services, require a physical and human presence to successfully carry out criminal operations.
  • Dating scams involve the creation of fake profiles on dating apps or social media platforms, or direct phishing emails that target victims with the end goal of tricking the victims into sending money or facilitating fraudulent activities.
  • Online retail fraud, including gift card fraud and refund fraud, typically entails the use of stolen information and is frequently facilitated by anti-detect and shipping services.
  • SIM swapping is a technique used by threat actors to gain access to a victim’s phone number with the end goal of using two-factor authentication (2FA) to obtain access to the victim’s online accounts.
  • Money laundering services within the dark web provide a combination of services through which threat actors can conceal the origins of their money, transfer cryptocurrency into virtual currency, have funds sent to a bank account or payment card, move funds across borders, or exchange for physical currency.
  • The role of botnets in the dissemination of malware to support fraud continues to grow as threat actors propagate some of the most prevalent malware families targeting individuals and organizations. These malware strains are specifically designed to exfiltrate information appealing to financially motivated threat actors seeking to conduct fraud.
  • Travel and loyalty (hospitality) fraud involves threat actors scamming users into providing personally identifiable information (PII) and financial information through fraudulent travel and hospitality services, including car rentals, hotel and flight bookings, excursions, and other vacation-related offers such as bonus points, miles, and other rewards.
  • Sales of personally identifiable information (PII) and protected health information (PHI) are conducted by threat actors who gather victim PII stolen from compromised networks, individual infected computers, leaked databases, or phishing attacks, which is then used to facilitate a wide variety of fraud.
  • Tax return fraud, also known as stolen identity refund fraud (SIRF), is a specific case of identity theft where a criminal files a tax return with victim information to the Internal Revenue Service or state tax agencies with the goal of stealing the victim’s tax refund.
  • Bank fraud is constantly evolving to follow current trends in the banking industry. Credit card fraud, online banking fraud, and wire transfers fraud are the main types of bank fraud.

Editor’s Note: This post was an excerpt of a full report. To read the entire analysis, click here to download the report as a PDF.

The post The Business of Fraud: An Overview of How Cybercrime Gets Monetized appeared first on Recorded Future.


The complainant requested information from Bicester Town Council (“the Council”) relating to allotment tenancy agreements.
The Commissioner’s decision is that the Council responded to the request within 20 working days as required by section 10 of the FOIA.
No steps are required.


The complainant requested information from the London Borough of Tower Hamlets about payments.  The London Borough of Tower Hamlets has failed to respond to this request. The Commissioner requires the London Borough of Tower Hamlets to provide the complainant with a response to this request in accordance with its obligations under FOIA. The London Borough of Tower Hamlets must take these steps within 35 calendar days of the date of this decision notice.
Scroll to top