Categories

  • Cyber Security
  • Threat Intelligence
  • Cryptocurrency
  • Technology
    • IppSec Videos
    • John Hammond
    • All Cyber Security Videos
  • How-to
  • Our Mission
  • Top Ten Cyber Security Tips
  • Cyber Threat Maps
  • Online Streamers
  • Contact
  • Home
  • Contact
  • Our Mission
  • Top Ten Cyber Security Tips
  • Cyber Threat Maps
  • Online Streamers
#1 Source for Cyber Security News, Reports and Threat Intelligence
Categories
  • Cyber Security
  • Threat Intelligence
  • Cryptocurrency
  • Technology
  • Cyber Security Videos
    • IppSec Videos
    • John Hammond
    • All Cyber Security Videos
  • How-to
Home /
Cryptocurrency /
Crypto exec ran a ‘covert pipeline for dirty money,’ DOJ says

Crypto exec ran a ‘covert pipeline for dirty money,’ DOJ says

Jun 10, 2025 12:00 am Cryptocurrency 142

Evita Pay founder Iurii Gugnin has been accused of using sanctioned Russian banks to launder millions into the US, with the funds used in part to undermine American interests.



Support the originator by clicking the read the rest link below.
crypto covert pipeline dirty money
  • E-Mail
  • Facebook
  • LinkedIn
  • Twitter
  • Google+
  • Pinterest
  • VK
  • WhatsApp
Read The Rest from the original source
cointelegraph.com
The Dangerous Truth About the ‘Nonlethal’ Weapons Used Against LA Protesters
Prev
The Dangerous Truth About the ‘Nonlethal’...
Ethereum Weekly Structure Tightens – Tower Top Pattern In Play?
Next
Ethereum Weekly Structure Tightens – Tower Top...

Related News

  • Coinbase crypto lobby urges Congress to back major crypto bill
    Coinbase crypto lobby urges Congress to back...
  • XRP Set To Shock The Crypto Market With 30% Share, Analyst Predicts
    XRP Set To Shock The Crypto Market With 30%...
  • Malware Surge Hits Android: Adware, Trojans and Crypto Theft Lead Q2 Threats
    Malware Surge Hits Android: Adware, Trojans and...
  • Crypto adoption will be driven by high-growth markets, with or without the US
    Crypto adoption will be driven by high-growth...
  • Secret Service seizes $400M in crypto, cold wallet among world’s largest
    Secret Service seizes $400M in crypto, cold...
  • What Are Crypto Trading Signals on Telegram in 2025?
    What Are Crypto Trading Signals on Telegram in...
  • Crypto Market Cap On Track To $4.5 Trillion As Q3 Unfolds – Details
    Crypto Market Cap On Track To $4.5 Trillion As...
  • Crypto’s path to legitimacy runs through the CARF regulation
    Crypto’s path to legitimacy runs through the...
  • Congress Declares Crypto Week: U.S. Lawmakers Gear Up for Groundbreaking Blockchain Bills
    Congress Declares Crypto Week: U.S. Lawmakers...
  • BlackRock’s Bold $85M Ethereum Buy Hints at Crypto Confidence Surge Post-ETF Turnaround
    BlackRock’s Bold $85M Ethereum Buy Hints at...
1 Trump says Musk ‘off the rails’ for forming political party to rival GOP
Trump says Musk ‘off the rails’ for forming political party to rival GOP
XRP Set To Shock The Crypto Market With 30% Share, Analyst Predicts
2 XRP Set To Shock The Crypto Market With 30% Share,...
Malware Surge Hits Android: Adware, Trojans and Crypto Theft Lead Q2 Threats
3 Malware Surge Hits Android: Adware, Trojans and Crypto...
Elon Musk confirms new ‘America Party’ will embrace Bitcoin
4 Elon Musk confirms new ‘America Party’ will embrace Bitcoin
Aligning Software Security Practices with the EU CRA Requirements
5 Aligning Software Security Practices with the EU CRA...

Newsletter

Be in Touch


Current News Sources: 60

Information about Cyber Security and Threat Intelligence should spread as fast as possible. Our goal is to collect these sources and place them all in one area for quick reading. If the information is important to the viewer and they want more information, we forward them to the direct source. The more people talking about cyber security and the more people sharing the information, the better!

If you have a resource that should be added, please let us know via the contact form. We will review the information and get back to you.

  • Incident Response Tool List
  • Blue Team Tool List
  • Privacy Policy
All Rights Reserved #1 Source for Cyber Security News, Reports and Threat Intelligence
Powered By The Internet!!!!