Tag: law
-
Cybercriminals are going after law firms’ sensitive client data
Regardless of their size, all law firms hold valuable data, including client communications, financial records, and confidential legal strategies. That data has never been … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/09/23/law-firms-cyberthreats/
-
Cybercriminals are going after law firms’ sensitive client data
Regardless of their size, all law firms hold valuable data, including client communications, financial records, and confidential legal strategies. That data has never been … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/09/23/law-firms-cyberthreats/
-
Microsoft DCU’s Takedown of RaccoonO365
When I saw the name of the Microsoft Digital Crime Unit’s latest target, “RaccoonO365” I probably reacted to it differently than most. With the help of a friend in Lagos, we’ve been watching the money launderers and things have reached a point that they now refer to what we previously called “Business Email Compromise” or…
-
Top 10 Best Cybersecurity Compliance Management Software in 2025
Cybersecurity compliance has become a mission-critical part of modern business operations. With the rise of data privacy laws, global regulations, and increasing cyber threats, organizations need reliable compliance management software to stay secure and audit-ready. The best compliance platforms streamline frameworks like SOC 2, ISO 27001, HIPAA, PCI DSS, GDPR, and more while automating workflows,…
-
EU agency ENISA says ransomware attack behind airport disruptions
The EU cybersecurity agency ENISA confirmed that airport check-in disruptions were caused by a cyberattack, and law enforcement is investigating. A cyber attack on Collins Aerospace disrupted check-in and boarding systems at major European airports, heavily impacting Heathrow, Brussels, and Berlin. The outage caused numerous flight delays and cancellations, forcing manual operations. Collins Aerospace is…
-
Cyber threat information law hurtles toward expiration, with poor prospects for renewal
Short-term and long-term extensions alike for the 2015 Cybersecurity Information Sharing Act have fallen by the wayside despite industry and Trump administration advocacy. First seen on cyberscoop.com Jump to article: cyberscoop.com/cyber-threat-information-law-hurtles-toward-expiration-with-poor-prospects-for-renewal/
-
Cyber threat information law hurtles toward expiration, with poor prospects for renewal
Short-term and long-term extensions alike for the 2015 Cybersecurity Information Sharing Act have fallen by the wayside despite industry and Trump administration advocacy. First seen on cyberscoop.com Jump to article: cyberscoop.com/cyber-threat-information-law-hurtles-toward-expiration-with-poor-prospects-for-renewal/
-
Canada Police Shuts Down TradeOgre After $56M Crypto Theft
Montréal, Quebec, September 18, 2025 In an unprecedented operation, the Royal Canadian Mounted Police (RCMP) Federal Policing Eastern Region has executed the largest cryptocurrency seizure in Canadian history, recovering over 56 million dollars from the now-defunct TradeOgre exchange platform. This marks the first time Canadian law enforcement has dismantled an entire cryptocurrency trading […] The…
-
Agentic AI der neue Horror für Sicherheitsentscheider?
Tags: ai, antivirus, api, breach, ciso, compliance, cyberattack, cybersecurity, cyersecurity, detection, governance, law, mail, malware, monitoring, risk, service, supply-chain, tool, vulnerabilityKI ist mittlerweile in den meisten Unternehmen gesetzt. Im Trend liegen aktuell vor allem Systeme mit autonomen Fähigkeiten bei denen die potenziellen Sicherheitsrisiken besonders ausgeprägt sind.KI-Agenten werden im Unternehmensumfeld immer beliebter und zunehmend in Workflows und Prozesse integriert. Etwa in den Bereichen Softwareentwicklung, Kundenservice und -Support, Prozessautomatisierung oder Employee Experience. Für CISOs und ihre Teams…
-
ESET uncovers GamaredonTurla collaboration in Ukraine cyberattacks
ESET found evidence that Russia-linked groups Gamaredon and Turla collaborated in cyberattacks on Ukraine between February and April 2025. ESET reported Russia-linked groups Gamaredon and Turla collaborated in cyberattacks against entities in Ukraine. The Russia-linked APT group Gamaredon (a.k.a. Shuckworm, Armageddon, Primitive Bear, ACTINIUM, Callisto) is known for targeting government, law enforcement, and defense organizations in Ukraine since 2013. The Turla APT group (aka Snake, Uroburos, Waterbug, Venomous…
-
Scattered Spider Hackers Charged in Connection With Transport for London Attack
Victims collectively paid more than $115 million in ransomware payments, law enforcement said. The post Scattered Spider Hackers Charged in Connection With Transport for London Attack appeared first on TechRepublic. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/news-scattered-spider-arrests/
-
New Texas Law Targets AI, Health Record Storage
New Texas health information legislation that began to go into effect on Sept. 1 includes several noteworthy provisions including requirements related to health record data storage and artificial intelligence, said regulatory attorney Rachel Rose. Rose explains the significance of the new state law. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/interviews/new-texas-law-targets-ai-health-record-storage-i-5495
-
FBI warns of cybercriminals using fake FBI crime reporting portals
The FBI warned today that cybercriminals are impersonating its Internet Crime Complaint Center (IC3) website in what the law enforcement agency described as “possible malicious activity.” First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/fbi-warns-of-fake-fbi-crime-complaint-portals-used-for-cybercrime/
-
UK police arrested two teen Scattered Spider members linked to the 2024 attack on Transport for London
U.K. police arrested two teens from the Scattered Spider group for their role in the August 2024 cyberattack on Transport for London. U.K. law enforcement authorities arrested two teenagers who are members of the notorious Scattered Spider hacking group in connection with their role in the cyber attack that hit Transport for London (TfL). Transport for London (TfL)…
-
UK police arrested two teen Scattered Spider members linked to the 2024 attack on Transport for London
U.K. police arrested two teens from the Scattered Spider group for their role in the August 2024 cyberattack on Transport for London. U.K. law enforcement authorities arrested two teenagers who are members of the notorious Scattered Spider hacking group in connection with their role in the cyber attack that hit Transport for London (TfL). Transport for London (TfL)…
-
UK police arrested two teen Scattered Spider members linked to the 2024 attack on Transport for London
U.K. police arrested two teens from the Scattered Spider group for their role in the August 2024 cyberattack on Transport for London. U.K. law enforcement authorities arrested two teenagers who are members of the notorious Scattered Spider hacking group in connection with their role in the cyber attack that hit Transport for London (TfL). Transport for London (TfL)…
-
UK Police Arrest Two Scattered Spider Hackers Over London Transport Breach
UK law enforcement agencies have arrested two individuals linked to the notorious Scattered Spider cybercriminal group. The arrests, announced on Tuesday, pertain to a sophisticated attack on London’s transport systems. Authorities say the suspects infiltrated critical infrastructure networks, demanding ransom payments and causing widespread disruption. Details of the Arrests and Charges On Sept. 16, officers…
-
U.K. Arrests Two Teen Scattered Spider Hackers Linked to August 2024 TfL Cyber Attack
Law enforcement authorities in the U.K. have arrested two teen members of the Scattered Spider hacking group in connection with their alleged participation in an August 2024 cyber attack targeting Transport for London (TfL), the city’s public transportation agency.Thalha Jubair (aka EarthtoStar, Brad, Austin, and @autistic), 19, from East London and Owen Flowers, 18, from…
-
Cyberthreat Law at Risk in Washington Spending Showdown
Senate Homeland Security Cancels Markup Session. Lawmakers are racing to extend a key cyber sharing law before it expires Sept. 30, but partisan gridlock and proposed restrictions on the U.S. cyber defense agency’s disinformation work threaten reauthorization – risking federal insight into active threats and chilling private cooperation. First seen on govinfosecurity.com Jump to article:…
-
ICE unit signs new $3M contract for phone-hacking tech
Homeland Security Investigations, the law enforcement arm of ICE, adds phone-unlocking tech made by Magnet Forensics to its arsenal of technology used to power the Trump administration’s deportation crackdown. First seen on techcrunch.com Jump to article: techcrunch.com/2025/09/18/ice-unit-signs-new-3-million-contract-for-phone-hacking-tech/
-
SonicWall warns customers to reset credentials after MySonicWall backups were exposed
SonicWall urges users to reset credentials after MySonicWall backups were exposed; the company locked out the threat actors and notified authorities. SonicWall urged customers to reset credentials after firewall backup files tied to MySonicWall accounts were exposed. The company announced it had blocked attackers’ access and is working with cybersecurity experts and law enforcement agencies…
-
Italy first in EU to pass comprehensive law regulating use of AI
Legislation limits child access and imposes prison terms for damaging use of artificial intelligenceItaly has become the first country in the EU to approve a comprehensive law regulating the use of artificial intelligence, including imposing prison terms on those who use the technology to cause harm, such as generating deepfakes, and limiting child access.Giorgia Meloni’s…
-
NCA Singles Out “The Com” as It Chairs Five Eyes Group
The UK’s National Crime Agency is the new chair of the Five Eyes Law Enforcement Group First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/nca-singles-out-com-chairs-five/
-
Judge rejects Meta attempt to overturn Flo privacy verdict
In refusing to overturn the decision or greenlight a new trial, U.S. District Judge James Donato shot down Meta’s claim that recordings of women’s data obtained from the period tracking app Flo were “secondhand” and are therefore not covered by the California wiretapping law which Meta is accused of violating. First seen on therecord.media Jump…
-
Microsoft and Cloudflare execute ‘rugpull’ on massive phishing empire
Tags: access, ai, attack, blockchain, breach, computer, credentials, crime, crimes, crypto, cybercrime, data, detection, exploit, extortion, finance, fraud, infrastructure, international, law, microsoft, phishing, programming, scam, service, strategy, threat, toolLegal victory with limitations: Microsoft’s investigation identified Joshua Ogundipe, based in Nigeria, as the operation’s leader and primary architect. The company filed a lawsuit against Ogundipe and four associates listed as John Does in late August, then obtained a court order from the US District Court for the Southern District of New York in early…
-
Turkey Personal Data Protection Law (KVKK)
What is Turkey’s Personal Data Protection Law (KVKK)? The Personal Data Protection Law (KVKK), or KiÅŸisel Verileri Koruma Kanunu in Turkish, is Turkey’s primary data privacy law. It came into force on April 7, 2016, and is largely based on the EU’s former Data Protection Directive 95/46/EC, with significant similarities to the GDPR. It is……
-
Washington My Health My Data Act (MHMDA)
What is the Washington My Health My Data Act? The Washington My Health My Data Act (MHMDA) is a comprehensive privacy law enacted in 2023. Its purpose is to safeguard a broad category of sensitive information defined as “consumer health data”, which is not fully covered by the federal Health Insurance Portability and Accountability Act……
-
Cybercrime group accessed Google Law Enforcement Request System (LERS)
Google found threat actors created a fake account in its Law Enforcement Request System (LERS) and shut it down. Google confirmed that threat actors gained access to its Law Enforcement Request System (LERS) platform by creating a fake account. The Google Law Enforcement Request System (LERS) is a secure online portal for verified government agencies…
-
Master regulatory compliance: Dominate change before it dominates you
Change is no longer the exception; it’s the baseline. As we move into 2025, regulatory compliance is morphing faster than many organizations anticipated. New laws, shifting political priorities, disruptive technologies such as AI and IoT, and rising expectations from stakeholders are all combining to reshape what compliance looks like. For compliance leaders, legal teams, and…The…
-
Master regulatory compliance: Dominate change before it dominates you
Change is no longer the exception; it’s the baseline. As we move into 2025, regulatory compliance is morphing faster than many organizations anticipated. New laws, shifting political priorities, disruptive technologies such as AI and IoT, and rising expectations from stakeholders are all combining to reshape what compliance looks like. For compliance leaders, legal teams, and…The…

