{"id":55865,"date":"2026-03-10T10:42:42","date_gmt":"2026-03-10T10:42:42","guid":{"rendered":"https:\/\/www.cyberguru.it\/2026\/03\/10\/cuneo-at-the-center-of-the-war-on-cybercrime-from-the-international-romance-scam-network-to-the-training-challenge\/"},"modified":"2026-03-10T16:32:00","modified_gmt":"2026-03-10T16:32:00","slug":"cuneo-at-the-center-of-the-war-on-cybercrime-from-the-international-romance-scam-network-to-the-training-challenge","status":"publish","type":"post","link":"https:\/\/www.cyberguru.it\/en\/2026\/03\/10\/cuneo-at-the-center-of-the-war-on-cybercrime-from-the-international-romance-scam-network-to-the-training-challenge\/","title":{"rendered":"Cuneo at the Center of the War on Cybercrime: From the International Romance Scam Network to the Training Challenge"},"content":{"rendered":"\n<pre class=\"wp-block-verse\"><em>An investigation by the <a href=\"https:\/\/www.gdf.gov.it\/it\" target=\"_blank\" rel=\"noreferrer noopener\">Guardia di Finanza<\/a> reveals a criminal organization active in five European countries. While <strong>cybercrime in Italy continues to grow<\/strong> relentlessly (\u20ac181 million stolen in 2024 alone), <a href=\"https:\/\/www.confindustriacuneo.it\/\" target=\"_blank\" rel=\"noreferrer noopener\">Confindustria Cuneo<\/a> launches the Legal Check and reinforces a crucial theme: technology alone is not enough\u2014people need to be educated. <\/em><\/pre>\n\n<h2 class=\"wp-block-heading\" id=\"h-la-truffa-romantica-che-ha-aperto-un-caso-internazionale\">The Romance Scam That Opened an International Case<\/h2>\n\n<p>It all begins with a report.<br\/>A victim comes to the Guardia di Finanza in Cuneo and describes falling for what investigators call a &#8220;<strong><a href=\"https:\/\/www.cyberguru.it\/en\/2026\/02\/13\/romance-scam-what-it-is-and-how-to-avoid-online-romance-scams\/\" target=\"_blank\" rel=\"noreferrer noopener\">romance scam<\/a><\/strong>&#8220;: an online romantic relationship that turned out to be an orchestrated scheme to steal money. <strong>It was not an isolated case<\/strong>. That single report opened a window onto a much larger and more structured criminal system, with ramifications in five European countries: Italy, Portugal, Lithuania, Northern Ireland, and Belgium. <\/p>\n\n<p>The Economic and Financial Police Unit of Cuneo, coordinated by the local Public Prosecutor&#8217;s Office, conducted an investigation that concluded on February 26, 2026, establishing the responsibility of 23 individuals listed in the register of suspects. For one of them, the Preliminary Investigations Judge of the Court of Cuneo ordered pre-trial detention, deeming him responsible for fraud, self-laundering, and identity theft. Two other suspects were already detained for other illegal activities.  <\/p>\n\n<p><strong>The group&#8217;s modus operandi was sophisticated and multi-phase<\/strong>.<br\/>The criminals created fake profiles on major social networks and dating apps, building credible digital identities through identity theft techniques and, in some cases, <strong>with the support of artificial intelligence<\/strong> for realistic photos, videos, and conversations. Once a relationship of trust was established (often romantic in nature, exploiting emotional vulnerabilities), the second phase kicked in: requests for money for alleged medical emergencies, family problems, or promised trips that never materialized.<br\/>In other cases, victims were lured by investment proposals in <strong>cryptocurrencies<\/strong> and <strong>digital wallets<\/strong>, presented as easy profit opportunities. <\/p>\n\n<p>The collected funds were then systematically diverted to a network of bank accounts held by the suspects, or converted into cryptocurrencies to make tracing more difficult. Applying the &#8220;<strong>follow the money<\/strong>&#8221; principle, the Guardia di Finanza reconstructed transactions totaling approximately <strong>\u20ac<\/strong><strong>900,000<\/strong>, establishing hypotheses of money laundering and self-laundering. The Preliminary Investigations Judge ordered the preventive seizure of 19 financial accounts deemed instrumental to the illegal activities. Investigations continue to reconstruct the entire network of financial flows and clarify roles and responsibilities within the organization.   <\/p>\n\n<h2 class=\"wp-block-heading\">Cybercrime in Italy: The Numbers of a Silent Emergency<\/h2>\n\n<p>The Cuneo case is not a peripheral story, but rather a reflection of a phenomenon that has reached the dimensions of a genuine national emergency. Data from the 2024 Report of the <a href=\"https:\/\/www.commissariatodips.it\/\" target=\"_blank\" rel=\"noreferrer noopener\">Postal Police<\/a> and Cybersecurity paint a concerning picture: <strong>during the year, 18,714 cases of online fraud were handled<\/strong>, marking a 15% increase from 16,325 in 2023. But even more alarming is the growth in stolen amounts, which increased by 32%, jumping from \u20ac137 million to \u20ac181 million. Added to these figures are frauds, which reached <strong>\u20ac48 million<\/strong>, with a 20% increase.   <\/p>\n\n<p>On the infrastructure attack front, the <strong>National Cybercrime Center for Critical Infrastructure Protection<\/strong> (<strong>CNAIPIC<\/strong>) handled approximately <strong>12,000 significant attacks<\/strong> in 2024, issuing over <strong>59,000 alerts<\/strong> on IT systems of national interest. The preferred targets remain local public administrations\u2014particularly municipalities and healthcare facilities\u2014and companies providing essential services in the transportation, finance, healthcare, and telecommunications sectors. <strong>Ransomware and DDoS attacks remain the most widely used tools<\/strong>, with an increasingly marked presence of state-sponsored actors linked to international geopolitical contexts. <\/p>\n\n<p>The local data should not be underestimated: in Piedmont and Valle d&#8217;Aosta, in 2024, reported online fraud and scams rose from <strong>1,751 to 1,794 cases<\/strong>. Throughout Italy, in the same year, there were <strong>1,500 cases of sextortion, with victims mostly adult males<\/strong>, and 264 cases of non-consensual sharing of intimate images.<br\/>The number of arrests increased by <strong>33%, rising from 108 to 144<\/strong>, confirming a more effective investigative response. <\/p>\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><strong>Ivano Gabrielli, Director of the Postal Police and Cybersecurity Service, has defined online economic and financial crime as &#8220;the most significant area of action for complex, internationally distributed organizations.&#8221;<\/strong><\/p>\n<\/blockquote>\n\n<h3 class=\"wp-block-heading\">The Most Exposed Sectors: From Industry to Public Administration<\/h3>\n\n<p>Cyber threats do not strike uniformly. <strong>Manufacturing and industrial companies are among the most frequent targets of ransomware attacks<\/strong>, which block production systems and demand ransoms for data restoration. The financial and banking sector is systematically targeted with <strong>phishing, smishing, and Business Email Compromise (BEC)<\/strong> techniques, where criminals impersonate executives or suppliers to divert payments. <strong>Healthcare remains vulnerable due to the sensitivity of the data handled<\/strong> and often due to outdated IT systems.  <br\/><strong>SMEs<\/strong>, which represent the heart of the Italian productive fabric, <strong>are particularly exposed<\/strong> precisely because they rarely have dedicated cybersecurity resources and trained personnel to recognize threats.<\/p>\n\n<p><strong>A common characteristic of almost all successful attacks is the human factor<\/strong>: according to the most credible international estimates, over 90% of security breaches start with a human error or lapse\u2014a click on a malicious link, a weak password, an email attachment opened without verifying its source. <\/p>\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><strong>This is the so-called &#8220;weakest link in the chain&#8221;: it doesn&#8217;t matter how robust the technical firewall is if someone inside the organization doesn&#8217;t know how to recognize a threat.<\/strong><\/p>\n<\/blockquote>\n\n<h2 class=\"wp-block-heading\">Legal Check: Confindustria Cuneo&#8217;s Response to Businesses<\/h2>\n\n<p>In this scenario, a concrete response on the prevention front also comes from Cuneo. On February 23, 2026, three days before the conclusion of the Guardia di Finanza operation, Confindustria Cuneo presented a new operational tool for member companies in the Sala Ferrero: the &#8220;Legal Check.&#8221;  <br\/>The initiative was presented during the conference &#8220;Reading Risk, Understanding Rules&#8221; and was developed with the contribution of the Chamber of Commerce of Cuneo.<\/p>\n\n<p>The Legal Check is a free self-assessment questionnaire that allows companies to measure their level of exposure to regulatory risks. The tool is divided into four independent and complementary modules: administrative liability of entities (Legislative Decree 231\/2001), privacy (GDPR), cybersecurity (with reference to the NIS2 directive), and adequacy of organizational structures with a focus on business crisis indicators.  <br\/>Each module allows for targeted and modular analysis, designed especially for SMEs that often lack internal resources to navigate regulatory complexity.<\/p>\n\n<p>The message that emerged strongly from the conference is that compliance should no longer be experienced as a bureaucratic requirement imposed from outside, but as a strategic lever for competitiveness.<\/p>\n\n<h2 class=\"wp-block-heading\">The Human Factor: The Weak Link That No Firewall Can Replace<\/h2>\n\n<p>The Cuneo operation on the romance scam network clearly demonstrates how the primary attack vector was not a technical exploit on a corporate server, but the psychological manipulation of real people. Social engineering\u2014the art of deceiving human beings to obtain information or money\u2014is today the most pervasive threat and the most difficult to counter with purely technological tools. Phishing, spear phishing, vishing (via phone), smishing (via SMS), and the more elaborate romance scams or BEC (Business Email Compromise) all share the same characteristic: they aim to deceive a person, not to breach a computer system.  <\/p>\n\n<p>For this reason, experts agree in identifying continuous training as the most effective security measure with the best cost-benefit ratio. Training employees means teaching them to recognize red flags: an email with a sender slightly different from usual, an urgent request for a wire transfer from an &#8220;executive,&#8221; a private message from a stranger who is strangely attentive. It means creating a culture where reporting a phishing attempt is not perceived as a sign of incompetence, but as a positive contribution to collective security. It means, ultimately, transforming every person in the organization from a potential point of vulnerability to a first line of defense.   <\/p>\n\n<p>Attack simulations (phishing), periodic training, social engineering tests, and awareness programs are proven tools that the most advanced companies use systematically<strong>.<\/strong> <\/p>\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><strong>It&#8217;s not about replacing technical solutions<\/strong>\u2014antivirus, EDR, firewalls, multi-factor authentication systems remain essential\u2014<strong>but about complementing them with people&#8217;s awareness<\/strong>. <\/p>\n<\/blockquote>\n\n<p>A state-of-the-art IT system without trained personnel is like a cutting-edge safe with the combination written on a sticky note attached to the door.<\/p>\n\n<h2 class=\"wp-block-heading\" id=\"h-conclusioni\"> Conclusions<\/h2>\n\n<p>The real challenge, therefore, remains cultural. As the Cuneo operation demonstrated, cybercrime has no geographical boundaries, respects no sectors, and does not stop based on the size of the company or person targeted. Anyone can be a victim, at any time, through a private message on a dating app, a seemingly innocent email, or a cryptocurrency investment promising impossible returns.   <br\/>The most effective, and most democratic, response is knowledge. Knowing how these mechanisms work, recognizing manipulation techniques, trusting institutions, and reporting are behaviors that can be learned.  <br\/>And they can make the difference between remaining a victim and becoming the protagonist of your own digital security.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>An investigation by the Guardia di Finanza reveals a criminal organization active in five European countries. While cybercrime in Italy continues to grow relentlessly (\u20ac181 million stolen in 2024 alone), Confindustria Cuneo launches the Legal Check and reinforces a crucial theme: technology alone is not enough\u2014people need to be educated. The Romance Scam That Opened [&hellip;]<\/p>\n","protected":false},"author":16,"featured_media":55860,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"off","_et_pb_old_content":"","_et_gb_content_width":"","content-type":"","footnotes":""},"categories":[1],"tags":[467,1096],"class_list":["post-55865","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-cyber-crime-en-2","tag-cybercrime"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cuneo at the Center of the War on Cybercrime<\/title>\n<meta name=\"description\" content=\"Discover how a romance scam uncovered the vast phenomenon of cybercrime in Europe, with investigations across five countries.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberguru.it\/en\/2026\/03\/10\/cuneo-at-the-center-of-the-war-on-cybercrime-from-the-international-romance-scam-network-to-the-training-challenge\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cuneo at the Center of the War on Cybercrime: From the International Romance Scam Network to the Training Challenge\" \/>\n<meta property=\"og:description\" content=\"Discover how a romance scam uncovered the vast phenomenon of cybercrime in Europe, with investigations across five countries.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberguru.it\/en\/2026\/03\/10\/cuneo-at-the-center-of-the-war-on-cybercrime-from-the-international-romance-scam-network-to-the-training-challenge\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Guru\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise\" \/>\n<meta property=\"article:published_time\" content=\"2026-03-10T10:42:42+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-10T16:32:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2026\/03\/cybercrime-a-cuneo.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"688\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"simona derubis\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"simona derubis\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2026\\\/03\\\/10\\\/cuneo-at-the-center-of-the-war-on-cybercrime-from-the-international-romance-scam-network-to-the-training-challenge\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2026\\\/03\\\/10\\\/cuneo-at-the-center-of-the-war-on-cybercrime-from-the-international-romance-scam-network-to-the-training-challenge\\\/\"},\"author\":{\"name\":\"simona derubis\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/#\\\/schema\\\/person\\\/9413e6685fb4a58629955d29c3a5c484\"},\"headline\":\"Cuneo at the Center of the War on Cybercrime: From the International Romance Scam Network to the Training Challenge\",\"datePublished\":\"2026-03-10T10:42:42+00:00\",\"dateModified\":\"2026-03-10T16:32:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2026\\\/03\\\/10\\\/cuneo-at-the-center-of-the-war-on-cybercrime-from-the-international-romance-scam-network-to-the-training-challenge\\\/\"},\"wordCount\":1362,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2026\\\/03\\\/10\\\/cuneo-at-the-center-of-the-war-on-cybercrime-from-the-international-romance-scam-network-to-the-training-challenge\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/cybercrime-a-cuneo.webp\",\"keywords\":[\"Cyber Crime\",\"cybercrime\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2026\\\/03\\\/10\\\/cuneo-at-the-center-of-the-war-on-cybercrime-from-the-international-romance-scam-network-to-the-training-challenge\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2026\\\/03\\\/10\\\/cuneo-at-the-center-of-the-war-on-cybercrime-from-the-international-romance-scam-network-to-the-training-challenge\\\/\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2026\\\/03\\\/10\\\/cuneo-at-the-center-of-the-war-on-cybercrime-from-the-international-romance-scam-network-to-the-training-challenge\\\/\",\"name\":\"Cuneo at the Center of the War on Cybercrime\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2026\\\/03\\\/10\\\/cuneo-at-the-center-of-the-war-on-cybercrime-from-the-international-romance-scam-network-to-the-training-challenge\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2026\\\/03\\\/10\\\/cuneo-at-the-center-of-the-war-on-cybercrime-from-the-international-romance-scam-network-to-the-training-challenge\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/cybercrime-a-cuneo.webp\",\"datePublished\":\"2026-03-10T10:42:42+00:00\",\"dateModified\":\"2026-03-10T16:32:00+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/#\\\/schema\\\/person\\\/9413e6685fb4a58629955d29c3a5c484\"},\"description\":\"Discover how a romance scam uncovered the vast phenomenon of cybercrime in Europe, with investigations across five countries.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2026\\\/03\\\/10\\\/cuneo-at-the-center-of-the-war-on-cybercrime-from-the-international-romance-scam-network-to-the-training-challenge\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2026\\\/03\\\/10\\\/cuneo-at-the-center-of-the-war-on-cybercrime-from-the-international-romance-scam-network-to-the-training-challenge\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2026\\\/03\\\/10\\\/cuneo-at-the-center-of-the-war-on-cybercrime-from-the-international-romance-scam-network-to-the-training-challenge\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/cybercrime-a-cuneo.webp\",\"contentUrl\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/cybercrime-a-cuneo.webp\",\"width\":1200,\"height\":688,\"caption\":\"cybercrime a cuneo\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2026\\\/03\\\/10\\\/cuneo-at-the-center-of-the-war-on-cybercrime-from-the-international-romance-scam-network-to-the-training-challenge\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/home-page-v2-draft\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cuneo at the Center of the War on Cybercrime: From the International Romance Scam Network to the Training Challenge\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/\",\"name\":\"Cyber Guru\",\"description\":\"Security Awareness Training That Works!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/#\\\/schema\\\/person\\\/9413e6685fb4a58629955d29c3a5c484\",\"name\":\"simona derubis\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0c0ee55b2203163ceef95af9890fba256e9cf8a9444749f1e216b4706aab4d9e?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0c0ee55b2203163ceef95af9890fba256e9cf8a9444749f1e216b4706aab4d9e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0c0ee55b2203163ceef95af9890fba256e9cf8a9444749f1e216b4706aab4d9e?s=96&d=mm&r=g\",\"caption\":\"simona derubis\"},\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/author\\\/simona-derubis\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cuneo at the Center of the War on Cybercrime","description":"Discover how a romance scam uncovered the vast phenomenon of cybercrime in Europe, with investigations across five countries.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberguru.it\/en\/2026\/03\/10\/cuneo-at-the-center-of-the-war-on-cybercrime-from-the-international-romance-scam-network-to-the-training-challenge\/","og_locale":"en_US","og_type":"article","og_title":"Cuneo at the Center of the War on Cybercrime: From the International Romance Scam Network to the Training Challenge","og_description":"Discover how a romance scam uncovered the vast phenomenon of cybercrime in Europe, with investigations across five countries.","og_url":"https:\/\/www.cyberguru.it\/en\/2026\/03\/10\/cuneo-at-the-center-of-the-war-on-cybercrime-from-the-international-romance-scam-network-to-the-training-challenge\/","og_site_name":"Cyber Guru","article_publisher":"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise","article_published_time":"2026-03-10T10:42:42+00:00","article_modified_time":"2026-03-10T16:32:00+00:00","og_image":[{"width":1200,"height":688,"url":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2026\/03\/cybercrime-a-cuneo.webp","type":"image\/webp"}],"author":"simona derubis","twitter_card":"summary_large_image","twitter_misc":{"Written by":"simona derubis","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cyberguru.it\/en\/2026\/03\/10\/cuneo-at-the-center-of-the-war-on-cybercrime-from-the-international-romance-scam-network-to-the-training-challenge\/#article","isPartOf":{"@id":"https:\/\/www.cyberguru.it\/en\/2026\/03\/10\/cuneo-at-the-center-of-the-war-on-cybercrime-from-the-international-romance-scam-network-to-the-training-challenge\/"},"author":{"name":"simona derubis","@id":"https:\/\/www.cyberguru.it\/en\/#\/schema\/person\/9413e6685fb4a58629955d29c3a5c484"},"headline":"Cuneo at the Center of the War on Cybercrime: From the International Romance Scam Network to the Training Challenge","datePublished":"2026-03-10T10:42:42+00:00","dateModified":"2026-03-10T16:32:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cyberguru.it\/en\/2026\/03\/10\/cuneo-at-the-center-of-the-war-on-cybercrime-from-the-international-romance-scam-network-to-the-training-challenge\/"},"wordCount":1362,"commentCount":0,"image":{"@id":"https:\/\/www.cyberguru.it\/en\/2026\/03\/10\/cuneo-at-the-center-of-the-war-on-cybercrime-from-the-international-romance-scam-network-to-the-training-challenge\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2026\/03\/cybercrime-a-cuneo.webp","keywords":["Cyber Crime","cybercrime"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.cyberguru.it\/en\/2026\/03\/10\/cuneo-at-the-center-of-the-war-on-cybercrime-from-the-international-romance-scam-network-to-the-training-challenge\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.cyberguru.it\/en\/2026\/03\/10\/cuneo-at-the-center-of-the-war-on-cybercrime-from-the-international-romance-scam-network-to-the-training-challenge\/","url":"https:\/\/www.cyberguru.it\/en\/2026\/03\/10\/cuneo-at-the-center-of-the-war-on-cybercrime-from-the-international-romance-scam-network-to-the-training-challenge\/","name":"Cuneo at the Center of the War on Cybercrime","isPartOf":{"@id":"https:\/\/www.cyberguru.it\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberguru.it\/en\/2026\/03\/10\/cuneo-at-the-center-of-the-war-on-cybercrime-from-the-international-romance-scam-network-to-the-training-challenge\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberguru.it\/en\/2026\/03\/10\/cuneo-at-the-center-of-the-war-on-cybercrime-from-the-international-romance-scam-network-to-the-training-challenge\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2026\/03\/cybercrime-a-cuneo.webp","datePublished":"2026-03-10T10:42:42+00:00","dateModified":"2026-03-10T16:32:00+00:00","author":{"@id":"https:\/\/www.cyberguru.it\/en\/#\/schema\/person\/9413e6685fb4a58629955d29c3a5c484"},"description":"Discover how a romance scam uncovered the vast phenomenon of cybercrime in Europe, with investigations across five countries.","breadcrumb":{"@id":"https:\/\/www.cyberguru.it\/en\/2026\/03\/10\/cuneo-at-the-center-of-the-war-on-cybercrime-from-the-international-romance-scam-network-to-the-training-challenge\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberguru.it\/en\/2026\/03\/10\/cuneo-at-the-center-of-the-war-on-cybercrime-from-the-international-romance-scam-network-to-the-training-challenge\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cyberguru.it\/en\/2026\/03\/10\/cuneo-at-the-center-of-the-war-on-cybercrime-from-the-international-romance-scam-network-to-the-training-challenge\/#primaryimage","url":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2026\/03\/cybercrime-a-cuneo.webp","contentUrl":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2026\/03\/cybercrime-a-cuneo.webp","width":1200,"height":688,"caption":"cybercrime a cuneo"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberguru.it\/en\/2026\/03\/10\/cuneo-at-the-center-of-the-war-on-cybercrime-from-the-international-romance-scam-network-to-the-training-challenge\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberguru.it\/en\/home-page-v2-draft\/"},{"@type":"ListItem","position":2,"name":"Cuneo at the Center of the War on Cybercrime: From the International Romance Scam Network to the Training Challenge"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberguru.it\/en\/#website","url":"https:\/\/www.cyberguru.it\/en\/","name":"Cyber Guru","description":"Security Awareness Training That Works!","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberguru.it\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.cyberguru.it\/en\/#\/schema\/person\/9413e6685fb4a58629955d29c3a5c484","name":"simona derubis","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/0c0ee55b2203163ceef95af9890fba256e9cf8a9444749f1e216b4706aab4d9e?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/0c0ee55b2203163ceef95af9890fba256e9cf8a9444749f1e216b4706aab4d9e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0c0ee55b2203163ceef95af9890fba256e9cf8a9444749f1e216b4706aab4d9e?s=96&d=mm&r=g","caption":"simona derubis"},"url":"https:\/\/www.cyberguru.it\/en\/author\/simona-derubis\/"}]}},"_links":{"self":[{"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/posts\/55865","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/users\/16"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/comments?post=55865"}],"version-history":[{"count":2,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/posts\/55865\/revisions"}],"predecessor-version":[{"id":55881,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/posts\/55865\/revisions\/55881"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/media\/55860"}],"wp:attachment":[{"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/media?parent=55865"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/categories?post=55865"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/tags?post=55865"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}