Tag: country
-
Chinese Threat Group ‘Jewelbug’ Quietly Infiltrated Russian IT Network for Months
A threat actor with ties to China has been attributed to a five-month-long intrusion targeting a Russian IT service provider, marking the hacking group’s expansion to the country beyond Southeast Asia and South America.The activity, which took place from January to May 2025, has been attributed by Broadcom-owned Symantec to a threat actor it tracks…
-
NCSC warns companies to prepare for a day when your screens go dark
The UK’s National Cyber Security Centre warns that the country now faces four nationally significant cyberattacks every week – a 129% jump in a year. Some headlines claim the NCSC is urging organisations to “go back to pen and paper,” but the full report tells a more practical story about resilience, preparedness, and surviving a…
-
NCSC warns companies to prepare for a day when your screens go dark
The UK’s National Cyber Security Centre warns that the country now faces four nationally significant cyberattacks every week – a 129% jump in a year. Some headlines claim the NCSC is urging organisations to “go back to pen and paper,” but the full report tells a more practical story about resilience, preparedness, and surviving a…
-
NCSC warns companies to prepare for a day when your screens go dark
The UK’s National Cyber Security Centre warns that the country now faces four nationally significant cyberattacks every week – a 129% jump in a year. Some headlines claim the NCSC is urging organisations to “go back to pen and paper,” but the full report tells a more practical story about resilience, preparedness, and surviving a…
-
Cambodian Conglomerate a ‘Pig Butchering’ Outfit, Says US
Prince Holding Group CEO Chen Zhi Indicted, Sanctioned. A Cambodian multinational conglomerate with ties to the country’s ruling elite is actually a transnational criminal group raking in tens of millions per day from online scams perpetuated by forced labor held in compounds, say federal prosecutors. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/cambodian-conglomerate-pig-butchering-outfit-says-us-a-29723
-
Layoffs, reassignments further deplete CISA
Some CISA staffers have been pushed out, while others are being told to move across the country for jobs outside their skill sets. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/cisa-layoffs-reassignments-dhs-white-house-government-shutdown/802723/
-
Layoffs, reassignments further deplete CISA
Some CISA staffers have been pushed out, while others are being told to move across the country for jobs outside their skill sets. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/cisa-layoffs-reassignments-dhs-white-house-government-shutdown/802723/
-
UK hit by record number of ‘nationally significant’ cyberattacks
The British government is announcing on Tuesday it will be writing to the chief executives and chairs of the country’s leading businesses to “take concrete actions” to protect their enterprises from attacks. First seen on therecord.media Jump to article: therecord.media/uk-hit-by-record-number-significant-cyberattacks
-
Ukraine takes steps to launch dedicated cyber force for offensive strikes
Ukraine lawmakers are considering uniting the country’s offensive and defensive military cyber capabilities under a single command within the Armed Forces. First seen on therecord.media Jump to article: therecord.media/ukraine-takes-steps-dedicated-cyber-force
-
Massive multi-country botnet targets RDP services in the US
A large-scale botnet is targeting Remote Desktop Protocol (RDP) services in the United States from more than 100,000 IP addresses. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/massive-multi-country-botnet-targets-rdp-services-in-the-us/
-
Ukraine sees surge in AI-Powered cyberattacks by Russia-linked Threat Actors
Russia-linked actors use AI to craft phishing and malware attacks against entities in Ukraine, says SSSCIP. Russian hackers increasingly use AI in cyberattacks against Ukraine, the country’s State Service for Special Communications and Information Protection (SSSCIP) reported. Beyond AI-generated phishing, some malware samples now show AI-generated code. In H1 2025, Ukraine recorded 3,018 cyber incidents,…
-
Ukraine sees surge in AI-Powered cyberattacks by Russia-linked Threat Actors
Russia-linked actors use AI to craft phishing and malware attacks against entities in Ukraine, says SSSCIP. Russian hackers increasingly use AI in cyberattacks against Ukraine, the country’s State Service for Special Communications and Information Protection (SSSCIP) reported. Beyond AI-generated phishing, some malware samples now show AI-generated code. In H1 2025, Ukraine recorded 3,018 cyber incidents,…
-
From Phishing to Malware: AI Becomes Russia’s New Cyber Weapon in War on Ukraine
Russian hackers’ adoption of artificial intelligence (AI) in cyber attacks against Ukraine has reached a new level in the first half of 2025 (H1 2025), the country’s State Service for Special Communications and Information Protection (SSSCIP) said.”Hackers now employ it not only to generate phishing messages, but some of the malware samples we have analyzed…
-
Developing economies are falling behind in the fight against cybercrime
Cybercrime is a global problem, but not every country is equally equipped to fight it. In many developing economies, cybersecurity is still seen as a luxury, something nice to … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/10/08/developing-countries-fight-cybercrime/
-
Developing economies are falling behind in the fight against cybercrime
Cybercrime is a global problem, but not every country is equally equipped to fight it. In many developing economies, cybersecurity is still seen as a luxury, something nice to … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/10/08/developing-countries-fight-cybercrime/
-
Japanese brewer Asahi delays product launches, halts deliveries after cyberattack
Japanese beverage giant Asahi is struggling to restore operations following a cyberattack that has disrupted its business for most of the week, raising fears of shortages of the country’s top-selling beer. First seen on therecord.media Jump to article: therecord.media/japan-asahi-delay-cyberattack
-
SMS Pools and what the US Secret Service Really Found Around New York
Tags: apple, authentication, business, china, conference, control, country, credit-card, crime, crypto, data, email, exploit, finance, fraud, google, group, Hardware, infrastructure, iphone, jobs, korea, law, linux, mfa, mobile, phishing, phone, scam, service, smishing, software, theft, usa, windowsLast week the United Nations General Assembly kicked off in New York City. On the first day, a strange US Secret Service press conference revealed that they had seized 300 SIM Servers with 100,000 SIM cards. Various media outlets jumped on the idea that this was some state-sponsored sleeper cell waiting to destroy telecommunication services…
-
Despite Russian influence, Moldova votes Pro-EU, highlighting future election risks
Moldova ‘s deputy PM blames Russia for an election cyberattack, calling it part of a planned hybrid campaign to destabilize democracy. Moldova Deputy Prime Minister Doina Nistor blamed Russia for a cyberattack targeting the country’s Central Electoral Commission last week, ahead of the forthcoming parliamentary election. Nistor said that threat actors targeted a weekness that…
-
US investors to take over TikTok operations in the country
Tags: countryU.S. President Donald Trump has signed an executive order approving a plan to restructure TikTok operations in the country to address national security concerns. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/government/us-investors-to-take-over-tiktok-operations-in-the-country/
-
Singapore Threatens Meta With Fines Over Facebook Impersonation Scams
The Singapore police said Facebook is the top platform for online scams in the country First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/singapore-meta-fines-facebook/
-
2025 Ransomware Trends: How Australia’s Wealth Makes It a Prime Target
Australia’s strong economy and high per-capita wealth have made it a prime target for ransomware groups, with the country facing a disproportionate number of attacks compared to many other nations. First seen on thecyberexpress.com Jump to article: thecyberexpress.com/australia-ransomware-threats-surge/
-
2025 Ransomware Trends: How Australia’s Wealth Makes It a Prime Target
Australia’s strong economy and high per-capita wealth have made it a prime target for ransomware groups, with the country facing a disproportionate number of attacks compared to many other nations. First seen on thecyberexpress.com Jump to article: thecyberexpress.com/australia-ransomware-threats-surge/
-
Canada’s RCMP closes TradeOgre, seizes $40M in country’s largest crypto bust
RCMP shuts down TradeOgre, seizing $40M from crime, the first crypto exchange closure and largest asset seizure in Canada’s history. The Royal Canadian Mounted Police shut down the crypto exchange TradeOgre and seized $40M worth of crypto assets. This is the first crypto exchange shut down by the Canadian authorities. >>RCMP Federal Policing Eastern […]…
-
Canada’s RCMP closes TradeOgre, seizes $40M in country’s largest crypto bust
RCMP shuts down TradeOgre, seizing $40M from crime, the first crypto exchange closure and largest asset seizure in Canada’s history. The Royal Canadian Mounted Police shut down the crypto exchange TradeOgre and seized $40M worth of crypto assets. This is the first crypto exchange shut down by the Canadian authorities. >>RCMP Federal Policing Eastern […]…
-
TDL 005 – A Defender’s Journey: From Passion Project to Protecting Children Online
Tags: access, business, control, corporate, country, cyber, cybersecurity, data-breach, defense, dns, encryption, endpoint, finance, github, government, group, guide, identity, Internet, jobs, microsoft, network, open-source, privacy, risk, service, technology, tool, zero-trustSummary A Defender’s Journey: From Passion Project to Protecting Children Online In a recent episode of “The Defender’s Log,” host David Redekop sat down with cybersecurity expert Will Earp to discuss his unconventional path into the industry and his current mission-driven career. Earp, a self-proclaimed “tinkerer” from a young age, shared how his early fascination…
-
Day in the Life: Expanding Sonar into LATAM as a Country Manager
Let’s dive in and learn about his drive to expand Sonar’s presence in Latin America, what a typical day looks like, and what fuels his passion both in and out of the office. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/09/day-in-the-life-expanding-sonar-into-latam-as-a-country-manager/
-
Italy first in EU to pass comprehensive law regulating use of AI
Legislation limits child access and imposes prison terms for damaging use of artificial intelligenceItaly has become the first country in the EU to approve a comprehensive law regulating the use of artificial intelligence, including imposing prison terms on those who use the technology to cause harm, such as generating deepfakes, and limiting child access.Giorgia Meloni’s…
-
South Korea Personal Information Privacy Act
What is the Data Privacy Act (DPA)? The Philippines Data Privacy Act of 2012 (Republic Act No. 10173), commonly referred to as the DPA, is the country’s primary data protection law. Enacted in August 2012, the Act was designed to safeguard the fundamental right to privacy of every Filipino while ensuring the free flow of……
-
China Imposes One-Hour Reporting Rule for Major Cybersecurity Incidents
China is ramping up its cybersecurity enforcement with new regulations requiring network operators to report severe cybersecurity incidents within one hour. The rules, announced by the Cyberspace Administration of China (CAC), will come into effect on November 1, 2025, and mark a significant escalation in how the country manages threats to its critical digital infrastructure.…
-
Chinese Guarantee Syndicates and the Fruit Machine
When I was speaking to a group of Bank Security people in New York City yesterday, I mentioned “machine rooms” — which are rooms full of Apple iPhones that are used to send iMessage phishing spam. Someone in the audience asked “Where would they get that many phones?” The kids like to use the acronym…

