Tag: country
-
UK sets timeline for country’s transition to quantum-resistant encryption
The U.K. National Cyber Security Centre issued new guidance to help organizations transition to cryptographic algorithms and protocols that can protect data threatened by quantum computing. First seen on therecord.media Jump to article: therecord.media/uk-ncsc-quantum-resistant-algorithms-transition
-
Ukrainian military targeted in new Signal spear-phishing attacks
Ukraine’s Computer Emergency Response Team (CERT-UA) is warning about highly targeted attacks employing compromised Signal accounts to send malware to employees of defense industry firms and members of the country’s army forces. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/ukrainian-military-targeted-in-new-signal-spear-phishing-attacks/
-
Telegram CEO leaves France temporarily as criminal probe continues
French authorities have allowed Pavel Durov, Telegram’s CEO and founder, to temporarily leave the country while criminal activity on the messaging platform is still under investigation. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/telegram-ceo-leaves-france-temporarily-as-criminal-probe-continues/
-
Ukraine seeks to bolster offensive cyber capabilities amid rising threats from Russia
A senior Ukrainian national security figure said the country is working on strengthening its offensive cyber capacity and is encouraging its European partners to join these efforts. First seen on therecord.media Jump to article: therecord.media/ukraine-russia-cyber-offensive-bolster
-
Garantex administrator arrested in India under extradition law
Garantex co-founder Aleksej Besciokov was arrested in India’s Kerala on Tuesday under the country’s extradition law. First seen on techcrunch.com Jump to article: techcrunch.com/2025/03/12/garantex-administrator-arrested-in-india-under-extradition-law/
-
Swiss critical sector faces new 24-hour cyberattack reporting rule
Switzerland’s National Cybersecurity Centre (NCSC) has announced a new reporting obligation for critical infrastructure organizations in the country, requiring them to report cyberattacks to the agency within 24 hours of their discovery. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/swiss-critical-sector-faces-new-24-hour-cyberattack-reporting-rule/
-
Switzerland Mandates Cyber-Attack Reporting for Critical Infrastructure
Starting April 2025, Swiss critical infrastructure organizations will have to report cyber-attacks to the country’s authorities within 24 hours of discovery First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/switzerland-mandates-cyber/
-
Canadian intelligence agency warns of threat AI poses to upcoming elections
Influence and espionage campaigns, boosted by AI, are likely to be aimed at Canada’s upcoming elections, says a new report from the CSE, the country’s signals and cyber intelligence agency. First seen on therecord.media Jump to article: therecord.media/canada-cyber-agency-elections-warning-ai-
-
Ukraine’s intel service honors civilian hackers for the first time with military award
Ukraine’s military intelligence service (HUR) has honored a group of civilian cyber activists for their role “in strengthening national security,” marking the agency’s first official recognition of cybersecurity specialists outside the country’s military ranks. First seen on therecord.media Jump to article: therecord.media/ukraine-intel-service-honors-civilian-hackers-with-military-award
-
Polish space agency says it’s investigating a cyberattack
Poland’s space agency (POLSA) says it is working to restore services following a cybersecurity incident. POLSA, the Polish government agency responsible for the country’s space activities, said in a post on X that it had “immediately disconnected” its network from the internet after detecting the cyberattack on Sunday. POLSA’s website remains offline at the time…
-
Security Pros Push Back as Trump Orders Halt to Cyber Ops vs. Russia
The Trump Administration’s orders to the DoD and CISA to halt cyber operations and investigations against Russia is a gift to the United States’ longtime foreign adversary and makes the country less safe, according to cybersecurity professionals. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/03/security-pros-push-back-as-trump-orders-halt-to-cyber-ops-vs-russia/
-
Serbian police used Cellebrite zero-day hack to unlock Android phones
Serbian authorities have reportedly used an Android zero-day exploit chain developed by Cellebrite to unlock the device of a student activist in the country and attempt to install spyware. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/serbian-police-used-cellebrite-zero-day-hack-to-unlock-android-phones/
-
UK Delays Plans for AI Regulation
Some Lawmakers Fear Regulation Could Stymie Innovation. The British Labour Government has reportedly delayed plans to put forward a draft bill on artificial intelligence over concerns that binding AI regulation could stifle the country’s AI growth potential. A spokesperson said the government remains committed to bringing forward a legislation. First seen on govinfosecurity.com Jump to…
-
DEF CON 32 How I Hacked Learning Codes Of The Key F(j)ob Of A Car Assembled In My Country
Author/Presenter: D. Erazo Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/02/def-con-32-how-i-hacked-learning-codes-of-the-key-fjob-of-a-car-assembled-in-my-country/
-
Russia warns financial sector of major IT service provider hack
Russia’s National Coordination Center for Computer Incidents (NKTsKI) is warning organizations in the country’s credit and financial sector about a breach at LANIT, a major Russian IT service and software provider. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/russia-warns-financial-sector-of-major-it-service-provider-hack/
-
Three years on, Europe looks to Ukraine for the future of defense tech
Today marks three years since Russia’s illegal, unprovoked, and brutal invasion of Ukraine. The Ukrainian people have heroically fought the war with grit and determination, but they have also, against the odds, innovated on and off the battlefield. In addition to establishing a defense tech initiative called BRAVE1, the country has also hosted tech conferences like…
-
Australia Bans Kaspersky Software Over National Security and Espionage Concerns
Australia has become the latest country to ban the installation of security software from Russian company Kaspersky, citing national security concerns.”After considering threat and risk analysis, I have determined that the use of Kaspersky Lab, Inc. products and web services by Australian Government entities poses an unacceptable security risk to Australian Government, networks and data,…
-
Top Polish anti-corruption official resigns amid spyware probe
The head of the Polish government’s anti-corruption bureau resigned under pressure Thursday after officials leading the country’s commission investigating wide-scale spyware abuse criticized her for allegedly withholding information. First seen on therecord.media Jump to article: therecord.media/top-polish-anti-corruption-official-resigns-spyware-probe
-
German election targeted by Russian disinformation, security services warn
Germany’s security services warned on Friday that fake videos circulating online purporting to reveal ballot manipulation in the country’s upcoming federal elections were part of a Russian information operation. First seen on therecord.media Jump to article: therecord.media/german-election-targeted-by-russian-disinformation
-
Is Russia Reining In Ransomware-Wielding Criminals?
Flurry of Arrests a Potential Prelude to Russia-Ukraine Peace Negotiations Even before Donald Trump took office on Jan. 20, there were signs that Russian President Vladimir Putin ordered cybercriminals operating inside his country’s borders to be reined in, potentially as a bargaining chip in negotiations over Russia’s stalemated war of conquest against Ukraine. First seen…
-
Is Russia Reining-In Ransomware-Wielding Criminals?
Flurry of Arrests a Potential Prelude to Russia-Ukraine Peace Negotiations Even before Donald Trump took office on Jan. 20, there were signs that Russian President Vladimir Putin ordered cybercriminals operating inside his country’s borders to be reined in, potentially as a bargaining chip in negotiations over Russia’s stalemated war of conquest against Ukraine. First seen…
-
South Korea Suspends DeepSeek AI Downloads Over Privacy Violations
South Korea has formally suspended new downloads of Chinese artificial intelligence (AI) chatbot DeepSeek in the country until the service makes changes to its mobile apps to comply with data protection regulations.Downloads have been paused as of February 15, 2025, 6:00 p.m. local time, the Personal Information Protection Commission (PIPC) said in a statement. The…
-
Sweden’s PM on suspected cable sabotage: ‘We don’t believe random things suddenly happen quite often’
Sweden’s Prime Minister Ulf Kristersson told the Munich Security Conference on Saturday that the country didn’t believe a series of submarine cable cuts in the Baltic Sea were simply coincidental. First seen on therecord.media Jump to article: therecord.media/sweden-pm-on-suspected-russian-cable-breaks-not-an-accident
-
Unusual attack linked to Chinese APT group combines espionage and ransomware
Tags: apt, attack, breach, china, cloud, country, credentials, crime, crimes, crypto, cyber, cybercrime, cyberespionage, data, encryption, espionage, exploit, finance, firewall, government, group, hacker, infection, insurance, intelligence, korea, microsoft, network, north-korea, ransom, ransomware, russia, software, tactics, technology, threat, veeam, vulnerabilityThe attacker demanded a $2-million ransom: The attack that resulted in the deployment of the RA World ransomware program, as well as data exfiltration, had the same chain: the toshdpdb.exe loading toshdpapi.dll then decrypting toshdp.dat which resulted in the PlugX variant being deployed. The difference is the attacker then chose to deploy the RA World…
-
India’s Cybercrime Problems Grow as Nation Digitizes
More than half of attacks on Indian businesses come from outside the country, while 45% of those targeting consumers come from Cambodia, Myanmar, and Laos. First seen on darkreading.com Jump to article: www.darkreading.com/cyber-risk/indias-cybercrime-problems-nation-digitizes
-
CISA Places Election Security Staffers on Leave
The staffers were tasked with building relationships on the ground across the country in local election jurisdictions, teaching election officials tactics on mitigating cyber threats, cyber hygiene, combating misinformation and foreign influence, and more. First seen on darkreading.com Jump to article: www.darkreading.com/cyber-risk/cisa-election-security-staffers-on-leave
-
India’s RBI Introduces Exclusive “bank.in” Domain to Combat Digital Banking Fraud
India’s central bank, the Reserve Bank of India (RBI), said it’s introducing an exclusive “bank.in” internet domain for banks in the country to combat digital financial fraud.”This initiative aims to reduce cyber security threats and malicious activities like phishing; and, streamline secure financial services, thereby enhancing trust in digital banking and payment services,” the RBI…
-
CIOs and CISOs grapple with DORA: Key challenges, compliance complexities
Tags: access, automation, banking, business, cio, ciso, communications, compliance, control, country, cyber, cybersecurity, data, dora, finance, framework, GDPR, governance, jobs, law, monitoring, network, nis-2, penetration-testing, privacy, regulation, resilience, risk, risk-management, service, skills, supply-chain, technology, threat, tool, training, vulnerabilityIn force since January, the Digital Operational Resilience Act (DORA) has required considerable effort from CIOs and CISOs at 20 types of financial entities to achieve compliance. For many, the journey is not complete.”In the past months, financial entities targeted by DORA have been busy internally defining roles and responsibilities related to ICT security, identifying…
-
Basket of Bank Trojans Defraud Citizens of East India
Cheap banking scams are often easier to pull off in a country with older devices, fewer regulations, and experienced fraudsters. First seen on darkreading.com Jump to article: www.darkreading.com/cyberattacks-data-breaches/bank-trojans-defraud-citizens-east-india

