OCTOBER- NOV 2025 updates

OCTOBER- NOV 2025 updates

810 bookmarks
Newest
Key member chinese money laundering network charged laundering tens millions dollars drug
Key member chinese money laundering network charged laundering tens millions dollars drug
Yan Lin, 41, of California, made an initial appearance today in Cincinnati on charges of conspiracy to launder tens of millions of dollars derived from drug trafficking proceeds. According to the indictment unsealed today, between March 2022 and October 2024, Mexico-based drug traffickers hired Lin to return tens of millions of dollars in profits from the sale of fentanyl, cocaine, and methamphetamine in cities throughout the United States to Mexico.
. Lin arranged for his co-conspirators to deliver bulk cash to others who bought electronics that were shipped to co-conspirators in Hong Kong, China, and elsewhere. After confirmation of receipt of the bulk cash, Mexico-based drug traffickers would receive their payment in Mexico, minus a commission, via a “mirror transaction.” One ledger, which recorded just a portion of Lin’s money contracts in 2024, totaled approximately $27.4 million in bulk cash delivered across the United States.
laundered
Assistant Attorney General A. Tysen Duva of the Justice Department’s Criminal Division. “Dismantling Chinese money laundering networks that support drug trafficki
said U.S. Attorney Dominick S. Gerace II for the Southern District of Ohio. “
Acting Special Agent in Charge Matthew Stentz of Immigrations and Customs Enforcement Homeland Security Investigations (HSI) Detroit Field Office
Special Agent in Charge Karen Wingerd of the IRS Criminal Investigation (IRS-CI) Detroit Field Office.
Special Agent in Charge Jason Cromartie of the FBI Cincinnati Field Office.
This case is being investigated by the HSI Cincinnati Office, IRS-CI, the Drug Enforcement Administration, including the New York, Philadelphia, Charleston, Tulsa and Atlanta offices, FBI Cincinnati, and the Hamilton County Sheriff’s Office Regional Enforcement Narcotics Unit. DEA’s Special Operations Division also aided the investigation. Acting Assistant Deputy Chief Mingda Hang, and Trial Attorney Elizabeth Rabe of the Criminal Division’s Money Laundering, Narcotics and Forfeiture Section, and Assistant U.S. Attorney David Dornette for the Southern District of Ohio, are prosecuting
·justice.gov·
Key member chinese money laundering network charged laundering tens millions dollars drug
Packet Builder for Network Engineer - Colasoft
Packet Builder for Network Engineer - Colasoft
Colasoft Packet builder is a network packet crafter, packet generator or packet editor that network professionals use to build (or craft) all types of custom network packets, such as ARP, TCP and UDP, etc. and test the networks such as network penetration test to protect against attacks and intrusion.
·colasoft.com·
Packet Builder for Network Engineer - Colasoft
BerriAI/litellm: Python SDK, Proxy Server (AI Gateway) to call 100+ LLM APIs in OpenAI (or native) format, with cost tracking, guardrails, loadbalancing and logging. [Bedrock, Azure, OpenAI, VertexAI, Cohere, Anthropic, Sagemaker, HuggingFace, VLLM, NVIDIA NIM]
BerriAI/litellm: Python SDK, Proxy Server (AI Gateway) to call 100+ LLM APIs in OpenAI (or native) format, with cost tracking, guardrails, loadbalancing and logging. [Bedrock, Azure, OpenAI, VertexAI, Cohere, Anthropic, Sagemaker, HuggingFace, VLLM, NVIDIA NIM]
Python SDK, Proxy Server (AI Gateway) to call 100+ LLM APIs in OpenAI (or native) format, with cost tracking, guardrails, loadbalancing and logging. [Bedrock, Azure, OpenAI, VertexAI, Cohere, Anthr...
·github.com·
BerriAI/litellm: Python SDK, Proxy Server (AI Gateway) to call 100+ LLM APIs in OpenAI (or native) format, with cost tracking, guardrails, loadbalancing and logging. [Bedrock, Azure, OpenAI, VertexAI, Cohere, Anthropic, Sagemaker, HuggingFace, VLLM, NVIDIA NIM]
Offensive Security Tool: QuickResponseC2 | Black Hat Ethical Hacking
Offensive Security Tool: QuickResponseC2 | Black Hat Ethical Hacking
QuickResponseC2 is a highly covert Command and Control (C2) framework and it operates by leveraging QR codes and HTTP(S) for indirect communication between an attacker and a compromised system.
·blackhatethicalhacking.com·
Offensive Security Tool: QuickResponseC2 | Black Hat Ethical Hacking
UncheatableEval
UncheatableEval
This application allows users to compare different language models based on their compression efficiency metrics like compression ratio, bits per character, and bits per byte. Users can filter resu...
·huggingface.co·
UncheatableEval
aTalk.org
aTalk.org
Sublime Stunning free HTML5/CSS3 website template
·atalk.sytes.net·
aTalk.org