Tag: law
-
UK Government Considers Computer Misuse Act Revision
Security Minister Dan Jarvis Endorses Security Researcher Protections. The U.K. government is considering amending its three-decade-old hacking law to include a statutory defense cover for security researchers. The announcement comes amid concerns that the law penalizes white hat hackers for essential security practices. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/uk-government-considers-computer-misuse-act-revision-a-30197
-
Your Data Might Determine How Much You Pay for Eggs
A newly enacted New York law requires retailers to say whether your data influences the price of basic goods like a dozen eggs or toilet paper, but not how. First seen on wired.com Jump to article: www.wired.com/story/algorithmic-pricing-eggs-ny-law/
-
Law enforcement shuts down Cryptomixer in major crypto crime takedown
Authorities seized $29M in Bitcoin after takedown of Cryptomixer, a service used to launder cybercrime proceeds. Europol announced the seizure of $29M in Bitcoin after shutting down Cryptomixer, a crypto-mixing service used for cybercrime and money laundering. The Europol reported that since its creation in 2016, Cryptomixer mixed over EUR 1.3 billion in Bitcoin. The…
-
Police Disrupt ‘Cryptomixer,’ Seize Millions in Crypto
Multiple European law enforcement agencies recently disrupted Cryptomixer, a service allegedly used by cybercriminals to launder ill-gotten gains from ransomware and other cyber activities. First seen on darkreading.com Jump to article: www.darkreading.com/cyberattacks-data-breaches/police-disrupt-cryptomixer-seize-millions-crypto
-
Authorities Shut Down ‘Cryptomixer’ Platform Used for Cybercrime and Money Laundering
Law enforcement authorities from Switzerland and Germany, with support from Europol, have successfully dismantled a primary cryptocurrency mixing service called ‘Cryptomixer’ that was facilitating cybercrime and money laundering operations worldwide. The coordinated action took place between November 24 and 28, 2025, in Zurich, Switzerland. During the operation, authorities seized three servers and confiscated the cryptomixer.io…
-
Cryptomixer crypto laundering service taken down by law enforcement
German and Swiss law enforcement agencies have taken down Cryptomixer, an illegal cryptocurrency mixer service, and have confiscated over 25 million euros (approximately $29 … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/12/01/cryptomixer-takedown-seizure/
-
Police takes down Cryptomixer cryptocurrency mixing service
Law enforcement officers from Switzerland and Germany have taken down the Cryptomixer cryptocurrency-mixing service, believed to have helped cybercriminals launder stolen funds. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/police-takes-down-cryptomixer-cryptocurrency-mixing-service/
-
California law regulating web browsers could have national data privacy impact, experts say
Tech companies may universally offer an opt-out capability required by California law as a way to avoid having multiple versions of browsers and ask questions about residency. First seen on therecord.media Jump to article: therecord.media/california-web-browser-law-national-implications
-
Scattered Lapsus$ Hunters target Zendesk users with fake domains
Tags: access, attack, breach, credentials, data, data-breach, email, government, group, infrastructure, law, service, supply-chainDiscord breach may be connected: The Zendesk campaign may not be an isolated incident. Discord said on October 9 that attackers breached its customer service provider, 5CA, exposing data from about 70,000 users who had submitted government IDs for age verification. The breach also exposed support ticket data for users who had contacted Discord’s customer…
-
Key provisions of the UK Cyber Resilience Bill Revealed
Shona Lester, head of the Cyber Security and Resilience Bill team within the UK government, outlined some of the provisions that should be included in the future law First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/key-provisions-uk-cyber-resilience/
-
Mobile industry warns patchwork cyber regs are driving up costs
GSMA says fragmented, poorly designed laws add burdens without making networks any safer First seen on theregister.com Jump to article: www.theregister.com/2025/11/26/gsma_global_standards_mobile_industry/
-
Mobile industry warns patchwork cyber regs are driving up costs
GSMA says fragmented, poorly designed laws add burdens without making networks any safer First seen on theregister.com Jump to article: www.theregister.com/2025/11/26/gsma_global_standards_mobile_industry/
-
Prompt Injections Loom Large Over ChatGPT’s Atlas Browser
It’s the law of unintended consequences: equipping browsers with agentic AI opens the door to an exponential volume of prompt injections. First seen on darkreading.com Jump to article: www.darkreading.com/application-security/prompt-injections-loom-large-over-chatgpt-atlas-launch
-
Prompt Injections Loom Large Over ChatGPT’s Atlas Browser
It’s the law of unintended consequences: equipping browsers with agentic AI opens the door to an exponential volume of prompt injections. First seen on darkreading.com Jump to article: www.darkreading.com/application-security/prompt-injections-loom-large-over-chatgpt-atlas-launch
-
Prompt Injections Loom Large Over ChatGPT’s Atlas Browser
It’s the law of unintended consequences: equipping browsers with agentic AI opens the door to an exponential volume of prompt injections. First seen on darkreading.com Jump to article: www.darkreading.com/application-security/prompt-injections-loom-large-over-chatgpt-atlas-launch
-
Alliances between ransomware groups tied to recent surge in cybercrime
Tags: access, attack, awareness, backup, business, cloud, cybercrime, cybersecurity, data, encryption, exploit, extortion, group, healthcare, incident response, intelligence, law, leak, monitoring, ransom, ransomware, saas, service, software, tactics, theft, threat, vpn, vulnerability, zero-dayRansomware groups change tactics to evade law enforcement: The latest quarterly study from Rapid7 also found that newly forged alliances are leading to a spike in ransomware activity while adding that tactical innovations, from refined extortion to double extortion and use of zero day, are also playing a part in increased malfeasance.The quarter also saw…
-
$262 million stolen in account takeover fraud schemes this year, FBI says ahead of holiday season
The law enforcement agency said they have received more than 5,100 complaints about Account Takeover (ATO) fraud since January and have tallied losses exceeding $262 million. First seen on therecord.media Jump to article: therecord.media/millions-in-account-takeover-fbi-warns-ahead-of-holidays
-
US FCC Scraps CALEA Move, Raising Telecom Security Fears
Lawmakers Say Reversal Strips One of Few Enforceable Standards for Major Carriers. The U.S. FCC’s move to scrap its short-lived interpretation of the Communications Assistance for Law Enforcement Act – the 1994 statute known as CALEA – sparked warnings that the agency just eliminated one of the few enforceable cybersecurity tools for the telecom sector.…
-
US FCC Scraps CALEA Move, Raising Telecom Security Fears
Lawmakers Say Reversal Strips One of Few Enforceable Standards for Major Carriers. The U.S. FCC’s move to scrap its short-lived interpretation of the Communications Assistance for Law Enforcement Act – the 1994 statute known as CALEA – sparked warnings that the agency just eliminated one of the few enforceable cybersecurity tools for the telecom sector.…
-
FCC reversal removes federal cyber safeguards targeting telecom weaknesses post-Salt Typhoon attacks
Tags: access, at&t, attack, breach, ceo, china, communications, control, country, cyber, cyberattack, cybersecurity, exploit, government, group, hacker, intelligence, law, mobile, network, phone, router, threatSalt Typhoon still reverberating: Salt Typhoon impacted major carriers including AT&T, Charter Communications, Consolidated Communications, Lumen Technologies, T-Mobile, Verizon, and Windstream. But law enforcement and intelligence agencies caution that its impact is far more widespread, exposing at least 200 US organizations, plus entities in 80 other countries.According to federal investigations, the attack allowed the Chinese…
-
SEC Ends SolarWinds Suit After Major Legal Setbacks
High-Profile Case Ends After Judge Guts SEC’s Cyber Fraud Allegations. The SEC has dropped its remaining claims against SolarWinds and CISO Tim Brown, ending a controversial cyber fraud lawsuit that aimed to expand securities law to cover operational security failures tied to the 2020 Russian hacking campaign. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/sec-ends-solarwinds-suit-after-major-legal-setbacks-a-30101
-
Hack the Hackers: 6 Laws for Staying Ahead of the Attackers
A new security framework responds to a shift in attackers’ tactics, one that allows them to infiltrate enterprises silently through their own policies. First seen on darkreading.com Jump to article: www.darkreading.com/cyber-risk/hack-hackers-6-laws-staying-ahead-cyberattackers
-
Cybersecurity Snapshot: Global Agencies Target Criminal “Bulletproof” Hosts, as CSA Unveils Agentic AI Risk Framework
Tags: access, advisory, ai, android, apple, attack, banking, breach, browser, chrome, cisa, ciso, cloud, compliance, control, credentials, credit-card, crypto, cve, cyber, cybercrime, cybersecurity, data, defense, detection, endpoint, extortion, finance, firewall, firmware, flaw, framework, google, governance, government, group, guide, Hardware, ibm, identity, infection, infrastructure, international, Internet, law, linux, malicious, malware, microsoft, mobile, monitoring, network, open-source, oracle, password, phishing, radius, ransomware, rat, resilience, risk, risk-assessment, risk-management, russia, scam, service, software, switch, technology, threat, tool, update, vulnerability, windowsCyber agencies call on ISPs to help combat “bulletproof” internet hosts that shield cybercriminals. Meanwhile, the CSA introduced a new methodology to assess the risks of autonomous AI. Plus, get the latest on the CIS Benchmarks, drone-detection systems, and malware infections. Key takeaways Crackdown on “bulletproof” hosting: International cyber agencies are urging ISPs and network…
-
Cybersecurity Snapshot: Global Agencies Target Criminal “Bulletproof” Hosts, as CSA Unveils Agentic AI Risk Framework
Tags: access, advisory, ai, android, apple, attack, banking, breach, browser, chrome, cisa, ciso, cloud, compliance, control, credentials, credit-card, crypto, cve, cyber, cybercrime, cybersecurity, data, defense, detection, endpoint, extortion, finance, firewall, firmware, flaw, framework, google, governance, government, group, guide, Hardware, ibm, identity, infection, infrastructure, international, Internet, law, linux, malicious, malware, microsoft, mobile, monitoring, network, open-source, oracle, password, phishing, radius, ransomware, rat, resilience, risk, risk-assessment, risk-management, russia, scam, service, software, switch, technology, threat, tool, update, vulnerability, windowsCyber agencies call on ISPs to help combat “bulletproof” internet hosts that shield cybercriminals. Meanwhile, the CSA introduced a new methodology to assess the risks of autonomous AI. Plus, get the latest on the CIS Benchmarks, drone-detection systems, and malware infections. Key takeaways Crackdown on “bulletproof” hosting: International cyber agencies are urging ISPs and network…
-
Local law enforcement agencies in Oklahoma, Massachusetts responding to cyber incidents
A county sheriff’s office in Oklahoma and a police department in Massachusetts said their networks were recently disrupted by cybersecurity incidents. First seen on therecord.media Jump to article: therecord.media/cleveland-county-okla-attleboro-mass-law-enforcement-cyberattacks
-
Critics Say White House’s Draft AI Order Is a Power Grab
Leaked Executive Order Would Strip States of Power to Regulate AI Tech Firms. A leaked draft executive order would empower federal agencies to override state AI laws, threatening federal funds for noncompliance and creating a litigation task force – drawing sharp backlash over executive overreach and potential harm to consumers. First seen on govinfosecurity.com Jump…
-
NDSS 2025 Hitchhiking Vaccine: Enhancing Botnet Remediation With Remote Code Deployment Reuse
SESSION Session 3C: Mobile Security ———– ———– Authors, Creators & Presenters: Runze Zhang (Georgia Institute of Technology), Mingxuan Yao (Georgia Institute of Technology), Haichuan Xu (Georgia Institute of Technology), Omar Alrawi (Georgia Institute of Technology), Jeman Park (Kyung Hee University), Brendan Saltaformaggio (Georgia Institute of Technology) ———– PAPER Hitchhiking Vaccine: Enhancing Botnet Remediation With Remote…
-
NDSS 2025 Hitchhiking Vaccine: Enhancing Botnet Remediation With Remote Code Deployment Reuse
SESSION Session 3C: Mobile Security ———– ———– Authors, Creators & Presenters: Runze Zhang (Georgia Institute of Technology), Mingxuan Yao (Georgia Institute of Technology), Haichuan Xu (Georgia Institute of Technology), Omar Alrawi (Georgia Institute of Technology), Jeman Park (Kyung Hee University), Brendan Saltaformaggio (Georgia Institute of Technology) ———– PAPER Hitchhiking Vaccine: Enhancing Botnet Remediation With Remote…
-
Do National Data Laws Carry Cyber-Risks for Large Orgs?
When international corporations have to balance competing cyber laws from different countries, the result is fragmented, potentially vulnerable systems. First seen on darkreading.com Jump to article: www.darkreading.com/cybersecurity-operations/national-data-laws-cyber-risks-large-orgs
-
Information sharing law’s expiration could squander government vulnerability hunting efforts, senator says
The next steps for the law, now extended for a short time, are up in the air. First seen on cyberscoop.com Jump to article: cyberscoop.com/cyber-threat-data-sharing-law-expiration-security-risk-mike-rounds-gary-peters-rand-paul/

