Tag: law
-
Chinese Owners Locked Out of Dutch Chip Maker Nexperia
Dutch Ministry Invokes National Security Law to Impose Domestic Control. The Dutch government said it is severing semiconductor chipmaker Nexperia from control by its Chinese parent after invoking a national security law allowing it to impose domestic control. Partially Chinese state-controlled Wingtech Technologies acquired a three quarters stake in Nexperia in 2018. First seen on…
-
What to look for in a data protection platform for hybrid clouds
Tags: access, advisory, ai, attack, automation, backup, breach, business, cisco, cloud, compliance, computing, control, corporate, data, defense, encryption, endpoint, framework, gartner, google, governance, government, group, guide, ibm, identity, infrastructure, intelligence, Internet, iot, kubernetes, law, malware, metric, microsoft, monitoring, network, oracle, privacy, ransomware, regulation, risk, risk-assessment, saas, service, software, technology, threat, tool, veeam, vmware, vulnerability, zero-trusthybrid cloud data protection buyer’s guide today!] In this buyer’s guide Data protection for hybrid clouds explainedWhy hybrid clouds need data protectionWhat to look for in a data protection platform for hybrid cloudsMajor trends in data protection for hybrid cloudsLeading vendors for data protection of hybrid cloudsWhat to ask before buying data protection for hybrid…
-
Spanish Authorities Dismantle Advanced AI Phishing Operation GoogleXcoder
Tags: ai, banking, credentials, cyber, cybercrime, finance, government, group, law, network, phishing, theftSpanish law enforcement recently dismantled an advanced AI-driven phishing network and arrested the mastermind developer known as “GoogleXcoder.” This operation marks a significant victory in the fight against banking credential theft in Spain. Cybercriminals Target Banks and Government Agencies Since 2023, Spain faced a surge in sophisticated phishing campaigns. Criminal groups impersonated major banks and…
-
What to look for in a data protection platform for hybrid clouds
Tags: access, advisory, ai, attack, automation, backup, breach, business, cisco, cloud, compliance, computing, control, corporate, data, defense, encryption, endpoint, framework, gartner, google, governance, government, group, guide, ibm, identity, infrastructure, intelligence, Internet, iot, kubernetes, law, malware, metric, microsoft, monitoring, network, oracle, privacy, ransomware, regulation, risk, risk-assessment, saas, service, software, technology, threat, tool, veeam, vmware, vulnerability, zero-trusthybrid cloud data protection buyer’s guide today!] In this buyer’s guide Data protection for hybrid clouds explainedWhy hybrid clouds need data protectionWhat to look for in a data protection platform for hybrid cloudsMajor trends in data protection for hybrid cloudsLeading vendors for data protection of hybrid cloudsWhat to ask before buying data protection for hybrid…
-
Spanish Authorities Dismantle Advanced AI Phishing Operation GoogleXcoder
Tags: ai, banking, credentials, cyber, cybercrime, finance, government, group, law, network, phishing, theftSpanish law enforcement recently dismantled an advanced AI-driven phishing network and arrested the mastermind developer known as “GoogleXcoder.” This operation marks a significant victory in the fight against banking credential theft in Spain. Cybercriminals Target Banks and Government Agencies Since 2023, Spain faced a surge in sophisticated phishing campaigns. Criminal groups impersonated major banks and…
-
What to look for in a data protection platform for hybrid clouds
Tags: access, advisory, ai, attack, automation, backup, breach, business, cisco, cloud, compliance, computing, control, corporate, data, defense, encryption, endpoint, framework, gartner, google, governance, government, group, guide, ibm, identity, infrastructure, intelligence, Internet, iot, kubernetes, law, malware, metric, microsoft, monitoring, network, oracle, privacy, ransomware, regulation, risk, risk-assessment, saas, service, software, technology, threat, tool, veeam, vmware, vulnerability, zero-trusthybrid cloud data protection buyer’s guide today!] In this buyer’s guide Data protection for hybrid clouds explainedWhy hybrid clouds need data protectionWhat to look for in a data protection platform for hybrid cloudsMajor trends in data protection for hybrid cloudsLeading vendors for data protection of hybrid cloudsWhat to ask before buying data protection for hybrid…
-
Microsoft violated EU law in handling of kids’ data, Austrian privacy regulator finds
Austria’s data protection authority ruled that Microsoft illegally tracked students using its education software by failing to give them access to their data and using cookies without consent. First seen on therecord.media Jump to article: therecord.media/microsoft-violated-eu-law-austria
-
Feds Shutter ShinyHunters Salesforce Extortion Site
The group warned that law-enforcement crackdowns are imminent in the wake of the takedown, but its extortion threats against Salesforce victims remain active. First seen on darkreading.com Jump to article: www.darkreading.com/cyberattacks-data-breaches/shinyhunters-feds-shutter-salesforce-extortion-site
-
Red Pilling of Politics Court Strikes Down California Law on Political Deepfakes
California’s AB 2655 aimed to fight AI-generated political deepfakes, but a federal court struck it down under Section 230, highlighting the clash between free speech and AI regulation. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/10/red-pilling-of-politics-court-strikes-down-california-law-on-political-deepfakes/
-
Authorities Dismantle BreachForums’ Reemerged Clearnet Marketplace
In a coordinated effort, international law enforcement agencies seized the clearnet domain breachforums[.]hn, shutting down yet another incarnation of the notorious cybercrime marketplace BreachForums. The domain now displays a joint seizure notice from the U.S. Department of Justice (DOJ) and the Federal Bureau of Investigation (FBI), alongside French authorities, including the Brigade de Lutte Contre…
-
Authorities Dismantle BreachForums’ Reemerged Clearnet Marketplace
In a coordinated effort, international law enforcement agencies seized the clearnet domain breachforums[.]hn, shutting down yet another incarnation of the notorious cybercrime marketplace BreachForums. The domain now displays a joint seizure notice from the U.S. Department of Justice (DOJ) and the Federal Bureau of Investigation (FBI), alongside French authorities, including the Brigade de Lutte Contre…
-
Authorities Dismantle BreachForums’ Reemerged Clearnet Marketplace
In a coordinated effort, international law enforcement agencies seized the clearnet domain breachforums[.]hn, shutting down yet another incarnation of the notorious cybercrime marketplace BreachForums. The domain now displays a joint seizure notice from the U.S. Department of Justice (DOJ) and the Federal Bureau of Investigation (FBI), alongside French authorities, including the Brigade de Lutte Contre…
-
Chinese-Linked Hackers Breach Top Political US Law Firm
Williams & Connolly Hit in Zero-Day Campaign Impacting Client Emails. A zero-day vulnerability was used to breach email accounts at the elite D.C. law firm Williams & Connolly, with officials reportedly suspecting the hack is part of a China-linked campaign targeting the U.S. legal sector to support espionage, steal intelligence and establish long-term access routes.…
-
Renewal of cyber information-sharing law must mind the gap, senator says
Companies that are still sharing threat information with the government despite the lapse of the law known as CISA 2015 should be protected retroactively when Congress revives that authority, Sen. Gary Peters says. First seen on therecord.media Jump to article: therecord.media/cisa-2015-renewal-peters-bill-gap-in-liability-protections
-
Renewal of cyber information-sharing law must mind the gap, senator says
Companies that are still sharing threat information with the government despite the lapse of the law known as CISA 2015 should be protected retroactively when Congress revives that authority, Sen. Gary Peters says. First seen on therecord.media Jump to article: therecord.media/cisa-2015-renewal-peters-bill-gap-in-liability-protections
-
Sen. Peters tries another approach to extend expired cyber threat information-sharing law
A new bill renames the Cybersecurity Information Sharing Act of 2015 and would make its legal protections retroactive after its lapse. First seen on cyberscoop.com Jump to article: cyberscoop.com/gary-peters-cyber-threat-information-sharing-law-rand-paul/
-
Sen. Peters tries another approach to extend expired cyber threat information-sharing law
A new bill renames the Cybersecurity Information Sharing Act of 2015 and would make its legal protections retroactive after its lapse. First seen on cyberscoop.com Jump to article: cyberscoop.com/gary-peters-cyber-threat-information-sharing-law-rand-paul/
-
LockBit, DragonForce, and Qilin form a ‘cartel’ to dictate ransomware market conditions
Tags: access, attack, breach, control, credentials, cybercrime, data, firewall, group, infrastructure, law, leak, lockbit, network, ransomware, service, technology, vpnCritical infrastructure declared fair game: As part of LockBit’s return announcement, the group revealed that critical infrastructure sectors previously considered off-limits would now be permissible targets for its affiliates. “It is permissible to attack critical infrastructure such as nuclear power plants, thermal power plants, hydroelectric power plants, and other similar organizations,” the group stated, according…
-
LockBit, DragonForce, and Qilin form a ‘cartel’ to dictate ransomware market conditions
Tags: access, attack, breach, control, credentials, cybercrime, data, firewall, group, infrastructure, law, leak, lockbit, network, ransomware, service, technology, vpnCritical infrastructure declared fair game: As part of LockBit’s return announcement, the group revealed that critical infrastructure sectors previously considered off-limits would now be permissible targets for its affiliates. “It is permissible to attack critical infrastructure such as nuclear power plants, thermal power plants, hydroelectric power plants, and other similar organizations,” the group stated, according…
-
California enacts law giving consumers ability to universally opt out of data sharing
The California Consumer Privacy Act, signed in 2018, gave Californians the right to send opt-out signals, but major browsers have not had to make opt-outs simple to use. First seen on therecord.media Jump to article: therecord.media/california-signs-law-opt-out-browsers
-
California enacts law giving consumers ability to universally opt out of data sharing
The California Consumer Privacy Act, signed in 2018, gave Californians the right to send opt-out signals, but major browsers have not had to make opt-outs simple to use. First seen on therecord.media Jump to article: therecord.media/california-signs-law-opt-out-browsers
-
Major US law firm says hackers broke into attorneys’ emails accounts
While the firm did not specify which nation-state it believes the hacker is affiliated with, The New York Times reported that sources have said it is China. First seen on therecord.media Jump to article: therecord.media/us-law-firm-hackers-breached-email
-
Law Enforcement Pressure is Reshaping the Global Ransomware Threat Landscape
Check Point’s Q2 2025 Ransomware Report reveals the collapse of major RaaS groups like LockBit and RansomHub, giving rise to a new, fragmented wave of ransomware actors. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/10/law-enforcement-pressure-is-reshaping-the-global-ransomware-threat-landscape/
-
Law Enforcement Pressure is Reshaping the Global Ransomware Threat Landscape
Check Point’s Q2 2025 Ransomware Report reveals the collapse of major RaaS groups like LockBit and RansomHub, giving rise to a new, fragmented wave of ransomware actors. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/10/law-enforcement-pressure-is-reshaping-the-global-ransomware-threat-landscape/
-
Potential EU law sparks global concerns over endend encryption for messaging apps
The EU will vote Oct. 14 on a proposal that would use AI or humans to detect child sexual abuse material on their devices. First seen on cyberscoop.com Jump to article: cyberscoop.com/potential-eu-law-sparks-global-concerns-encryption-privacy/
-
Europol Calls for Stronger Data Laws to Combat Cybercrime
Europol’s Cybercrime Conference has warned that cybercriminals are exploiting new technologies faster than law enforcement can adapt First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/europol-calls-stronger-data-laws/
-
How Exposure Management Helped Three Companies Transform Their Cybersecurity Program
Tags: application-security, attack, ciso, cloud, compliance, control, cyber, cybersecurity, data, identity, infrastructure, iot, law, risk, software, threat, tool, vulnerability, vulnerability-managementPart two of our Exposure Management Academy series on exposure management maturity explores how organizations like Drogaria Araujo, Tenable and Verizon have applied exposure management to strengthen their security postures. Key takeaways: Case studies of Drogaria Araujo, Tenable and Verizon illustrate how exposure management provides tangible benefits to organizations of different sizes and security maturity…
-
UK government to consult on police live facial recognition use
The UK’s policing minister has confirmed the government will consult on the use of live facial recognition by law enforcement before expanding its use throughout England, but so far, the technology has been deployed with minimal public debate or consultation First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366632381/UK-government-to-consult-on-police-live-facial-recognition-use
-
WARMCOOKIE Malware Operators Introduce Advanced Capabilities
The cybersecurity landscape continues to evolve as threat actors behind the WARMCOOKIE backdoor malware have significantly enhanced their capabilities, introducing new features and maintaining active development despite law enforcement disruptions. The latest WARMCOOKIE variants demonstrate the threat actors’ commitment to expanding their operational toolkit. Four new command handlers have been integrated into the malware’s architecture…
-
Italy’s AI Law Comes Into Force
On October 10, 2025, Italy will become the first EU member state to bring a national artificial intelligence law into force, moving ahead of the bloc’s landmark EU AI Act. Law No. 132 of 2025, published in the Gazzetta Ufficiale in late September, positions Italy at the center of Europe’s evolving AI governance landscape. The……

