Tag: law
-
Why we must reform the Computer Misuse Act: A cyber pro speaks out
by
in SecurityNewsBritain’s outdated hacking laws are leaving the UK’s cyber practitioners hamstrung and afraid. Security professional Simon Whittaker reveals how he nearly ran afoul of the Computer Misuse Act, and why he’s speaking out for reform First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366623789/Why-we-must-reform-the-Computer-Misuse-Act-A-cyber-pro-speaks-out
-
Congress faces pressure to renew cyber information-sharing law
by
in SecurityNewsThe law’s expiration in September could jeopardize a wide range of information-sharing partnerships that have helped catch and thwart cyberattacks in the U.S. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/cisa-reauthorization-congress-industry-letter/748053/
-
Russian military cadet reportedly arrested for selling hacking tool to FSB agent
by
in SecurityNewsA Russian military cadet reportedly developed an algorithm that could bypass the protective infrastructure of law enforcement software and gain access to restricted data. First seen on therecord.media Jump to article: therecord.media/russian-military-cadet-reportedly-arrested-for-selling-hacking-tool
-
European Police Bust Euro3m Investment Fraud Ring
by
in SecurityNewsLaw enforcers from multiple countries team up to dismantle a multimillion-euro fraud gang First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/european-police-bust-3m-investment/
-
4 critical leadership priorities for CISOs in the AI era
by
in SecurityNews1. Guide the C-suite As businesses rush to implement AI effectively, CISOs can play an important role in guiding the C-suite on a variety of matters, starting with vetting AI use cases, Alexander says. “These are conversations with technologists, security, and the business. You can’t just jump into the AI game without really understanding what…
-
Randall Munroe’s XKCD ‘Pascal’s Law’
by
in SecurityNewsvia the inimitable Daniel Stori at Turnoff.US! Permalink First seen on securityboulevard.com Jump to article: https://securityboulevard.com/2025/05/randall-munroes-xkcd-pascals-law/
-
UK Considers New Enterprise IoT Security Law
by
in SecurityNewsThe UK government wants to hear feedback on a possible new standard or legislation to improve enterprise IoT security First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/government-enterprise-iot-security/
-
Moldovan Police Arrest Suspect in Euro4.5M Ransomware Attack on Dutch Research Agency
by
in SecurityNewsMoldovan law enforcement authorities have arrested a 45-year-old foreign man suspected of involvement in a series of ransomware attacks targeting Dutch companies in 2021.”He is wanted internationally for committing several cybercrimes (ransomware attacks, blackmail, and money laundering) against companies based in the Netherlands,” officials said in a statement Monday.In conjunction with the First seen on…
-
Deepfake attacks are inevitable. CISOs can’t prepare soon enough.
by
in SecurityNews
Tags: advisory, ai, attack, authentication, awareness, blockchain, business, ciso, compliance, control, cybersecurity, data, deep-fake, defense, detection, espionage, finance, fraud, governance, grc, identity, incident response, jobs, law, mfa, north-korea, password, privacy, resilience, risk, scam, software, strategy, tactics, technology, threat, tool, training, updateReal-world fabrications: Even security vendors have been victimized. Last year, the governance risk and compliance (GRC) lead at cybersecurity company Exabeam was hiring for an analyst, and human resources (HR) qualified a candidate that looked very good on paper with a few minor concerns, says Kevin Kirkwood, CISO.”There were gaps in how the education represented…
-
Google Reaches $1.4 Billion Privacy Settlement With Texas
by
in SecurityNewsState Accused Tech Giant of Geolocation, Incognito Search, Biometric Violations. Texas has reached a nearly $1.4 billion settlement agreement with technology giant Alphabet after accusing its Google subsidiary of violating state privacy laws via its geolocation, incognito search and biometric data capture and retention practices. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/google-reaches-14-billion-privacy-settlement-texas-a-28369
-
Facebook Flaws and Privacy Laws: A Journey into Early Social Media Security from 2009
by
in SecurityNewsJoin hosts Tom Eston, Scott Wright, and Kevin Johnson in a special best-of episode of the Shared Security Podcast. Travel back to 2009 with the second-ever episode featuring discussions on early Facebook bugs, cross-site scripting vulnerabilities, and a pivotal Canadian privacy ruling involving Facebook. Gain insights into social media security from the past and see……
-
FBI opens inquiry into 764, online group that sexually exploits and encourages minors to self-harm
by
in SecurityNewsAgency is investigating 250 people affiliated with networks that manipulate and threaten young victims in cyberspaceThe name of the group sounds innocuous enough: 764.But the ordinary-seeming number hides one of the most disturbing trends in the US’s <a href=”https://www.theguardian.com/us-news/us-crime”>criminal landscape, disguising a brutal and sinister online group that exploits its victims in cyberspace and is…
-
Operation Moonlander dismantled the botnet behind Anyproxy and 5socks cybercriminals services
by
in SecurityNewsLaw enforcement dismantled a 20-year botnet behind Anyproxy and 5socks cybercriminals services and arrested four suspects. Authorities dismantled a 20-year-old botnet tied to Anyproxy and 5socks as part of an international operation codenamed >>Operation Moonlander
-
Three Russians, one Kazakhstani charged in takedown of Anyproxy and 5socks botnets
by
in SecurityNewsU.S. prosecutors charged four foreign nationals and said a law enforcement operation seized internet domains associated with two powerful botnets. First seen on therecord.media Jump to article: therecord.media/5socks-anyproxy-botnets-takedown-russians-kazakhstani-charged
-
Police dismantles botnet selling hacked routers as residential proxies
by
in SecurityNewsLaw enforcement authorities have dismantled a botnet that infected thousands of routers over the last 20 years to build two networks of residential proxies known as Anyproxy and 5socks. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/police-dismantles-botnet-selling-hacked-routers-as-residential-proxies/
-
BREAKING: 7,000-Device Proxy Botnet Using IoT, EoL Systems Dismantled in U.S. – Dutch Operation
A joint law enforcement operation undertaken by Dutch and U.S. authorities has dismantled a criminal proxy network that’s powered by thousands of infected Internet of Things (IoT) and end-of-life (EoL) devices, enlisting them into a botnet for providing anonymity to malicious actors.In conjunction with the domain seizure, Russian nationals, Alexey Viktorovich Chertkov, 37, Kirill Vladimirovich…
-
Hacker Leaks Stolen LockBit Ransomware Operation Database
by
in SecurityNewsExposes Details of Victims, ‘Aggressive’ Negotiations, Cryptocurrency Addresses. One year to the day after an international law enforcement operation unmasked and indicted the leader of the notorious LockBit ransomware group, a hacker has sent the group another love letter. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/hacker-leaks-stolen-lockbit-ransomware-operation-database-a-28350
-
ESET Reveals How to Spot Fake Calls Demanding Payment for ‘Missed Jury Duty’
by
in SecurityNewsESET, a leading cybersecurity firm, has shed light on one particularly insidious scheme: fake calls purportedly from government officials demanding payment for ‘missed jury duty’. Here’s how to identify and protect against these scams. Scammers employing these tactics often impersonate law enforcement officers or court officials, using a blend of urgency and authority to intimidate…
-
LockBit Ransomware Hacked, Insider Secrets Exposed
by
in SecurityNewsThe data dump will likely shed light on LockBit’s recent activity and help law enforcement trace cryptocurrency transactions First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/lockbit-ransomware-hacked-insider/
-
Six DDoS sites seized in multi-national law enforcement operation
by
in SecurityNewsFour countries, including the U.S., arrested four people as part of Operation PowerOFF. First seen on cyberscoop.com Jump to article: cyberscoop.com/poland-ddos-arrests-europol-operation-poweroff/
-
NSO Group Fined $168M for Targeting 1,400 WhatsApp Users With Pegasus Spyware
by
in SecurityNewsA federal jury on Tuesday decided that NSO Group must pay Meta-owned WhatsApp WhatsApp approximately $168 million in monetary damages, more than four months after a federal judge ruled that the Israeli company violated U.S. laws by exploiting WhatsApp servers to deploy Pegasus spyware, targeting over 1,400 individuals globally.WhatsApp originally filed the lawsuit against NSO…
-
UK Legal Aid Agency investigates cybersecurity incident
by
in SecurityNewsThe Legal Aid Agency (LAA), an executive agency of the UK’s Ministry of Justice that oversees billions in legal funding, warned law firms of a security incident and said the attackers might have accessed financial information. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/uk-legal-aid-agency-investigates-cybersecurity-incident/
-
Top tips for successful threat intelligence usage
by
in SecurityNews
Tags: ai, attack, automation, cloud, computing, data, ddos, detection, exploit, firewall, group, guide, incident response, infosec, infrastructure, intelligence, law, mitigation, network, phishing, siem, skills, soar, software, threat, tool, update, vulnerability, vulnerability-managementMake sure you don’t have more intel than you need: Next is the matching phase: the most sophisticated TIP may be overkill if you have a small infosec department with limited skills or have a relatively simple computing environment. According to this 2025 report from Greynoise, threat feeds must match your own environment in terms…
-
Luna Moth Hackers Use Fake Helpdesk Domains to Target Victims
by
in SecurityNewsA recent investigation by cybersecurity firm EclecticIQ, in collaboration with threat hunters, has exposed a surge in malicious activity tied to the Luna Moth hacking group. The actors are now leveragingfake helpdesk-themed domainsto impersonate legitimate businesses and steal sensitive data. This campaign, first detected in March 2025, primarily targets law firms and corporate entities. How…
-
Ransomware Attacks Up 9% but Payments Are Down
by
in SecurityNewsRecorded Future’s Liska on What Happens Next When Ransomware Gets Less Profitable. Data theft-only ransomware attacks have reached 50% of incidents in Q1 2025, said Allan Liska, senior security architect at Recorded Future. Law enforcement has disrupted the major players, leaving less-skilled actors scrabbling for a payday or stealing information. First seen on govinfosecurity.com Jump…
-
Ireland’s DPC fined TikTok Euro530M for sending EU user data to China
by
in SecurityNewsIreland’s Data Protection Commission (DPC) fined TikTok Euro530M for violating data rules by sending European user data to China. Ireland’s Data Protection Commission (DPC) fined the popular video-sharing platform TikTok Euro530 million for violating data laws by transferring data belonging to European users to China. TikTok violated GDPR by transferring EEA user data to China…
-
Despite Arrests, Scattered Spider Continues High-Profile Hacking
by
in SecurityNewsWhile law enforcement has identified and arrested several alleged members, the notorious threat group continues to wreak havoc. First seen on darkreading.com Jump to article: www.darkreading.com/cyberattacks-data-breaches/despite-arrests-scattered-spider-continues-hacking
-
Ukrainian extradited to US for alleged Nefilim ransomware attack spree
by
in SecurityNewsFederal law enforcement officials accuse Artem Stryzhak, who was arrested in Spain last year, of attacking and extorting multiple companies between 2018 and 2021. First seen on cyberscoop.com Jump to article: cyberscoop.com/nefilim-ransomware-artem-stryzhak-extradited/
-
Defense contractors to pay $8.4 million over charges of failing to meet federal cyber standards
by
in SecurityNewsThe settlement falls under the False Claims Act, a Civil War-era law that allows for civil damages against government contractors who violate the terms of their agreement. First seen on therecord.media Jump to article: therecord.media/defense-contractors-settle-with-dod-false-claims-act