Tag: law
-
Police arrests suspects linked to Euro600 million crypto fraud ring
European law enforcement authorities have arrested nine suspected money launderers who set up a cryptocurrency fraud network that stole over Euro600 million ($689 million) from victims across multiple countries. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/european-police-dismantles-600-million-crypto-investment-fraud-ring/
-
Police arrests suspects linked to Euro600 million crypto fraud ring
European law enforcement authorities have arrested nine suspected money launderers who set up a cryptocurrency fraud network that stole over Euro600 million ($689 million) from victims across multiple countries. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/european-police-dismantles-600-million-crypto-investment-fraud-ring/
-
Cybersecurity experts charged with running BlackCat ransomware operation
Tags: attack, breach, computer, crypto, cybersecurity, extortion, finance, group, healthcare, incident response, law, network, office, psychology, ransom, ransomware, risk, service, threatThe victims and the demands: The indictment cited at least five victim organizations: a Florida medical-device company, a Maryland pharmaceutical manufacturer, a California doctor’s office, a California engineering firm, and a Virginia-based drone company. On May 13, 2023, the conspirators allegedly attacked the Florida firm, demanding $10 million and receiving roughly $1.27 million in cryptocurrency.…
-
Cybersecurity experts charged with running BlackCat ransomware operation
Tags: attack, breach, computer, crypto, cybersecurity, extortion, finance, group, healthcare, incident response, law, network, office, psychology, ransom, ransomware, risk, service, threatThe victims and the demands: The indictment cited at least five victim organizations: a Florida medical-device company, a Maryland pharmaceutical manufacturer, a California doctor’s office, a California engineering firm, and a Virginia-based drone company. On May 13, 2023, the conspirators allegedly attacked the Florida firm, demanding $10 million and receiving roughly $1.27 million in cryptocurrency.…
-
NSFOCUS in SAS 2025: Unveiling Secrets Behind Large-Scale DDoS Attacks on AI Platform and Social Media
SANTA CLARA, Calif., November 4, 2025 The 18th Global Security Analyst Summit (SAS) concluded successfully in Khao Lak, Thailand. Focused on the complexity of APT attacks, the summit exposed the latest attack activities from Hacking Team and disclosed multiple major security risk incidents. It gathered top global cybersecurity experts, academic elites, and law enforcement representatives to…The…
-
NSFOCUS in SAS 2025: Unveiling Secrets Behind Large-Scale DDoS Attacks on AI Platform and Social Media
SANTA CLARA, Calif., November 4, 2025 The 18th Global Security Analyst Summit (SAS) concluded successfully in Khao Lak, Thailand. Focused on the complexity of APT attacks, the summit exposed the latest attack activities from Hacking Team and disclosed multiple major security risk incidents. It gathered top global cybersecurity experts, academic elites, and law enforcement representatives to…The…
-
Lawmakers say stolen police logins are exposing Flock surveillance cameras to hackers
Flock said around 3% of its law enforcement customers do not use multi-factor authentication, potentially exposing dozens of law enforcement agency accounts open to compromise and improper access. First seen on techcrunch.com Jump to article: techcrunch.com/2025/11/03/lawmakers-say-stolen-police-logins-are-exposing-flock-surveillance-cameras-to-hackers/
-
Lawmakers say stolen police logins are exposing Flock surveillance cameras to hackers
Flock said around 3% of its law enforcement customers do not use multi-factor authentication, potentially exposing dozens of law enforcement agency accounts open to compromise and improper access. First seen on techcrunch.com Jump to article: techcrunch.com/2025/11/03/lawmakers-say-stolen-police-logins-are-exposing-flock-surveillance-cameras-to-hackers/
-
Standing to Sue The Elephant in the Room
When Elephant Insurance was hacked and millions of driver’s license numbers were exposed, the Fourth Circuit confronted a crucial privacy law dilemma: Is data theft alone enough to sue, or must harm be public and provable? This case exposes how U.S. courts still undervalue privacy in the digital age, and why the elephant in the…
-
Standing to Sue The Elephant in the Room
When Elephant Insurance was hacked and millions of driver’s license numbers were exposed, the Fourth Circuit confronted a crucial privacy law dilemma: Is data theft alone enough to sue, or must harm be public and provable? This case exposes how U.S. courts still undervalue privacy in the digital age, and why the elephant in the…
-
Standing to Sue The Elephant in the Room
When Elephant Insurance was hacked and millions of driver’s license numbers were exposed, the Fourth Circuit confronted a crucial privacy law dilemma: Is data theft alone enough to sue, or must harm be public and provable? This case exposes how U.S. courts still undervalue privacy in the digital age, and why the elephant in the…
-
Cybersecurity Snapshot: Top Guidance for Improving AI Risk Management, Governance and Readiness
Tags: access, ai, api, attack, awareness, breach, business, ceo, cloud, compliance, computer, control, corporate, crime, cryptography, cyber, cybersecurity, data, data-breach, encryption, exploit, finance, framework, germany, google, governance, guide, hacking, ibm, identity, india, infrastructure, intelligence, jobs, law, leak, metric, microsoft, network, penetration-testing, privacy, risk, risk-management, scam, security-incident, skills, strategy, technology, threat, tool, training, vulnerability, vulnerability-managementMany organizations are playing catch-up in key AI security policy areas, such as usage governance, risk oversight, data protection, and staff training. In this Cybersecurity Snapshot special edition, we round up recent guidance on preparing for, managing and governing AI cyber risks. Key takeaways Most organizations’ AI adoption is dangerously outpacing their security strategies and…
-
Cybersecurity Snapshot: Top Guidance for Improving AI Risk Management, Governance and Readiness
Tags: access, ai, api, attack, awareness, breach, business, ceo, cloud, compliance, computer, control, corporate, crime, cryptography, cyber, cybersecurity, data, data-breach, encryption, exploit, finance, framework, germany, google, governance, guide, hacking, ibm, identity, india, infrastructure, intelligence, jobs, law, leak, metric, microsoft, network, penetration-testing, privacy, risk, risk-management, scam, security-incident, skills, strategy, technology, threat, tool, training, vulnerability, vulnerability-managementMany organizations are playing catch-up in key AI security policy areas, such as usage governance, risk oversight, data protection, and staff training. In this Cybersecurity Snapshot special edition, we round up recent guidance on preparing for, managing and governing AI cyber risks. Key takeaways Most organizations’ AI adoption is dangerously outpacing their security strategies and…
-
Sling TV settles with California for allegedly violating state consumer privacy law
Streaming service Sling TV will pay a $530,000 civil penalty to the state of California and make changes to how customers can opt-out of the sale of their data. First seen on therecord.media Jump to article: therecord.media/sling-tv-california-data-protection-settlement
-
US Stands Out in Refusal to Sign UN Cybercrime Treaty
The agreement aims to help law enforcement prosecute cross-border cybercrime, but the final treaty could allow unchecked surveillance and human-rights abuses, critics say; and, it includes no protection for pen-testers. First seen on darkreading.com Jump to article: www.darkreading.com/cybersecurity-operations/us-refuses-sign-un-cybercrime-treaty
-
Denmark reportedly withdraws Chat Control proposal following controversy
Earlier in its European Council presidency, Denmark had brought back a draft law which would have required scanning of electronic messages, sparking an intense backlash. First seen on therecord.media Jump to article: therecord.media/demark-reportedly-withdraws-chat-control-proposal
-
Denmark reportedly withdraws Chat Control proposal following controversy
Earlier in its European Council presidency, Denmark had brought back a draft law which would have required scanning of electronic messages, sparking an intense backlash. First seen on therecord.media Jump to article: therecord.media/demark-reportedly-withdraws-chat-control-proposal
-
Tips for CISOs switching between industries
Understand and demonstrate achieved results: Making the jump into a new industry isn’t about matching past job titles but about proving you can create impact in a new context. DiMarco says the key is to demonstrate relevance early.”When I pitch a candidate, I explain what they did, how they did it, and what their impact…
-
Scope of US state-level privacy laws expands rapidly in 2025
Nine state-level data protection laws have come into force in the US this year, and three more are slated for January 2026. Navigating this complex landscape is becoming a challenge First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366633681/Scope-of-US-state-level-privacy-laws-expands-rapidly-in-2025
-
Australia’s Scam Prevention Framework: The Bubble That Burst
Treasury Yet to Release Sector-Specific Controls and Reimbursement Mechanisms Australia introduced the world to the first-ever Scam Prevention Framework law that promised to make the country the hardest place on earth for fraudsters. Eight months later, it’s trapped in bureaucratic limbo – passed, praised and still waiting to work. First seen on govinfosecurity.com Jump to…
-
Australia’s Scam Prevention Framework: The Bubble That Burst
Treasury Yet to Release Sector-Specific Controls and Reimbursement Mechanisms Australia introduced the world to the first-ever Scam Prevention Framework law that promised to make the country the hardest place on earth for fraudsters. Eight months later, it’s trapped in bureaucratic limbo – passed, praised and still waiting to work. First seen on govinfosecurity.com Jump to…
-
North Canton City Council Advances Cybersecurity Policy to Comply with New State Law
The City Council of North Canton, Ohio, is preparing to adopt a new cybersecurity policy designed to strengthen digital defenses and comply with statewide regulations. The legislation, enacted under Ohio Revised Code Section 9.64 through House Bill 96, mandates that all political subdivisions, including cities, villages, and counties, establish documented cybersecurity protocols by January 1,…
-
UK cyber law delays ‘deeply concerning,’ say MPs
Major recent cybersecurity incidents should spur the British government to act decisively on new cybersecurity laws, opposition MPs say. First seen on therecord.media Jump to article: therecord.media/britain-cyber-law-delays-opposition-mps-warning
-
Cybercriminals Impersonate Aid Agencies to Lure Victims with Fake Financial Offers
Tags: cyber, cybercrime, finance, fraud, intelligence, international, law, monitoring, scam, threat, vulnerabilityScammers have intensified their efforts to defraud vulnerable populations through sophisticated impersonation schemes and fraudulent financial aid offers, according to recent intelligence monitoring and law enforcement findings. The threat landscape reveals a coordinated, international ecosystem of fraud operations targeting individuals across multiple social media platforms, with particular focus on older adults who represent a significant…
-
Cybercriminals turn on each other: the story of Lumma Stealer’s collapse
Normally when we write about a malware operation being disrupted, it’s because it has been shut down by law enforcement. But in the case of Lumma Stealer, a notorious malware-as-a-service (MaaS) operation used to steal passwords and sensitive data, it appears to have been sabotaged by other cybercriminals. First seen on fortra.com Jump to article:…
-
State attorneys general stepping up privacy enforcement, watchdog finds
State attorneys general are playing a vital role in protecting consumers in the absence of a comprehensive data privacy federal law, researchers found. First seen on therecord.media Jump to article: therecord.media/state-ags-enforcement-privacy-law
-
Russia Pivots, Cracks Down on Resident Hackers
Thanks to improving cybersecurity and law enforcement action from the West, Russia’s government is reevaluating which cybercriminals it wants to give safe haven from the law. First seen on darkreading.com Jump to article: www.darkreading.com/threat-intelligence/russia-cracks-down-low-level-hackers
-
Simple to Ask: Is Your SOC AI Ready? Not Simple to Answer!
Gemini made blog illustration In early 1900s, factory owners bolted the new electric dynamo onto their old, central-shaft-and-pulley systems. They thought they were modernizing, but they were just doing a “retrofit.” The massive productivity boom didn’t arrive until they completely re-architected the factory around the new unit-drive motor (metaphor source). Today’s AI agent slapped onto…

