Tag: law
-
Cybersecurity Snapshot: Top Guidance for Improving AI Risk Management, Governance and Readiness
Tags: access, ai, api, attack, awareness, breach, business, ceo, cloud, compliance, computer, control, corporate, crime, cryptography, cyber, cybersecurity, data, data-breach, encryption, exploit, finance, framework, germany, google, governance, guide, hacking, ibm, identity, india, infrastructure, intelligence, jobs, law, leak, metric, microsoft, network, penetration-testing, privacy, risk, risk-management, scam, security-incident, skills, strategy, technology, threat, tool, training, vulnerability, vulnerability-managementMany organizations are playing catch-up in key AI security policy areas, such as usage governance, risk oversight, data protection, and staff training. In this Cybersecurity Snapshot special edition, we round up recent guidance on preparing for, managing and governing AI cyber risks. Key takeaways Most organizations’ AI adoption is dangerously outpacing their security strategies and…
-
Sling TV settles with California for allegedly violating state consumer privacy law
Streaming service Sling TV will pay a $530,000 civil penalty to the state of California and make changes to how customers can opt-out of the sale of their data. First seen on therecord.media Jump to article: therecord.media/sling-tv-california-data-protection-settlement
-
US Stands Out in Refusal to Sign UN Cybercrime Treaty
The agreement aims to help law enforcement prosecute cross-border cybercrime, but the final treaty could allow unchecked surveillance and human-rights abuses, critics say; and, it includes no protection for pen-testers. First seen on darkreading.com Jump to article: www.darkreading.com/cybersecurity-operations/us-refuses-sign-un-cybercrime-treaty
-
Denmark reportedly withdraws Chat Control proposal following controversy
Earlier in its European Council presidency, Denmark had brought back a draft law which would have required scanning of electronic messages, sparking an intense backlash. First seen on therecord.media Jump to article: therecord.media/demark-reportedly-withdraws-chat-control-proposal
-
Denmark reportedly withdraws Chat Control proposal following controversy
Earlier in its European Council presidency, Denmark had brought back a draft law which would have required scanning of electronic messages, sparking an intense backlash. First seen on therecord.media Jump to article: therecord.media/demark-reportedly-withdraws-chat-control-proposal
-
Tips for CISOs switching between industries
Understand and demonstrate achieved results: Making the jump into a new industry isn’t about matching past job titles but about proving you can create impact in a new context. DiMarco says the key is to demonstrate relevance early.”When I pitch a candidate, I explain what they did, how they did it, and what their impact…
-
Scope of US state-level privacy laws expands rapidly in 2025
Nine state-level data protection laws have come into force in the US this year, and three more are slated for January 2026. Navigating this complex landscape is becoming a challenge First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366633681/Scope-of-US-state-level-privacy-laws-expands-rapidly-in-2025
-
Australia’s Scam Prevention Framework: The Bubble That Burst
Treasury Yet to Release Sector-Specific Controls and Reimbursement Mechanisms Australia introduced the world to the first-ever Scam Prevention Framework law that promised to make the country the hardest place on earth for fraudsters. Eight months later, it’s trapped in bureaucratic limbo – passed, praised and still waiting to work. First seen on govinfosecurity.com Jump to…
-
Australia’s Scam Prevention Framework: The Bubble That Burst
Treasury Yet to Release Sector-Specific Controls and Reimbursement Mechanisms Australia introduced the world to the first-ever Scam Prevention Framework law that promised to make the country the hardest place on earth for fraudsters. Eight months later, it’s trapped in bureaucratic limbo – passed, praised and still waiting to work. First seen on govinfosecurity.com Jump to…
-
North Canton City Council Advances Cybersecurity Policy to Comply with New State Law
The City Council of North Canton, Ohio, is preparing to adopt a new cybersecurity policy designed to strengthen digital defenses and comply with statewide regulations. The legislation, enacted under Ohio Revised Code Section 9.64 through House Bill 96, mandates that all political subdivisions, including cities, villages, and counties, establish documented cybersecurity protocols by January 1,…
-
UK cyber law delays ‘deeply concerning,’ say MPs
Major recent cybersecurity incidents should spur the British government to act decisively on new cybersecurity laws, opposition MPs say. First seen on therecord.media Jump to article: therecord.media/britain-cyber-law-delays-opposition-mps-warning
-
Cybercriminals Impersonate Aid Agencies to Lure Victims with Fake Financial Offers
Tags: cyber, cybercrime, finance, fraud, intelligence, international, law, monitoring, scam, threat, vulnerabilityScammers have intensified their efforts to defraud vulnerable populations through sophisticated impersonation schemes and fraudulent financial aid offers, according to recent intelligence monitoring and law enforcement findings. The threat landscape reveals a coordinated, international ecosystem of fraud operations targeting individuals across multiple social media platforms, with particular focus on older adults who represent a significant…
-
Cybercriminals turn on each other: the story of Lumma Stealer’s collapse
Normally when we write about a malware operation being disrupted, it’s because it has been shut down by law enforcement. But in the case of Lumma Stealer, a notorious malware-as-a-service (MaaS) operation used to steal passwords and sensitive data, it appears to have been sabotaged by other cybercriminals. First seen on fortra.com Jump to article:…
-
State attorneys general stepping up privacy enforcement, watchdog finds
State attorneys general are playing a vital role in protecting consumers in the absence of a comprehensive data privacy federal law, researchers found. First seen on therecord.media Jump to article: therecord.media/state-ags-enforcement-privacy-law
-
Russia Pivots, Cracks Down on Resident Hackers
Thanks to improving cybersecurity and law enforcement action from the West, Russia’s government is reevaluating which cybercriminals it wants to give safe haven from the law. First seen on darkreading.com Jump to article: www.darkreading.com/threat-intelligence/russia-cracks-down-low-level-hackers
-
Simple to Ask: Is Your SOC AI Ready? Not Simple to Answer!
Gemini made blog illustration In early 1900s, factory owners bolted the new electric dynamo onto their old, central-shaft-and-pulley systems. They thought they were modernizing, but they were just doing a “retrofit.” The massive productivity boom didn’t arrive until they completely re-architected the factory around the new unit-drive motor (metaphor source). Today’s AI agent slapped onto…
-
AI’s split personality: Solving crimes while helping conceal them
What happens when investigators and cybercriminals start using the same technology? AI is now doing both, helping law enforcement trace attacks while also being tested for its … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/10/21/ai-cybercrime-digital-forensics/
-
AI’s split personality: Solving crimes while helping conceal them
What happens when investigators and cybercriminals start using the same technology? AI is now doing both, helping law enforcement trace attacks while also being tested for its … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/10/21/ai-cybercrime-digital-forensics/
-
Maine 2025 Ballot Questions Redux
QUESTION 1: “Do you want to change Maine election laws to eliminate two days of absentee voting, prohibit requests for absentee ballots by phone or family members, end ongoing absentee voter status for seniors and people with disabilities, ban prepaid postage on absentee ballot return envelopes, limit the number of drop boxes, require voters to……
-
Europol Dismantles SIM Farm Network Powering 49 Million Fake Accounts Worldwide
Europol on Friday announced the disruption of a sophisticated cybercrime-as-a-service (CaaS) platform that operated a SIM farm and enabled its customers to carry out a broad spectrum of crimes ranging from phishing to investment fraud.The coordinated law enforcement effort, dubbed Operation SIMCARTEL, saw 26 searches carried out, resulting in the arrest of seven suspects and…
-
Authorities Shut Down Cybercrime-as-a-Service, Seize 40,000 SIM Cards
Law enforcement authorities across Europe have dismantled a sophisticated cybercrime-as-a-service operation that enabled criminals to commit widespread fraud and other serious offenses across the continent. The coordinated action, codenamed ‘SIMCARTEL’, resulted in seven arrests, the seizure of over 40,000 active SIM cards, and the takedown of infrastructure that facilitated crimes causing millions of euros in…
-
AI and Patient Health Data Access: Considering the Risks
Among pressing issues facing healthcare providers and health IT vendors is how artificial intelligence enabled tools such as AI assistants might further facilitate patients’ access to records as well as the transmission of records themselves, said attorney Alisa Chestler of law firm Baker Donelson. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/interviews/ai-patient-health-data-access-considering-risks-i-5500
-
Cybersecurity Snapshot: F5 Breach Prompts Urgent U.S. Gov’t Warning, as OpenAI Details Disrupted ChatGPT Abuses
Tags: ai, attack, awareness, backdoor, breach, business, chatgpt, china, cisa, cloud, control, corporate, cve, cyber, cybersecurity, data, data-breach, defense, detection, exploit, framework, fraud, governance, government, group, hacker, incident, infrastructure, Internet, iran, law, LLM, malicious, malware, mitigation, monitoring, network, openai, organized, phishing, privacy, resilience, risk, russia, scam, security-incident, service, software, strategy, supply-chain, technology, threat, training, update, vulnerabilityF5’s breach triggers a CISA emergency directive, as Tenable calls it “a five-alarm fire” that requires urgent action. Meanwhile, OpenAI details how attackers try to misuse ChatGPT. Plus, boards are increasing AI and cyber disclosures. And much more! Key takeaways A critical breach at cybersecurity firm F5, attributed to a nation-state, has triggered an urgent…
-
AI Chat Data Is History’s Most Thorough Record of Enterprise Secrets. Secure It Wisely
AI interactions are becoming one of the most revealing records of human thinking, and we’re only beginning to understand what that means for law enforcement, accountability, and privacy. First seen on darkreading.com Jump to article: www.darkreading.com/application-security/ai-chat-data-is-history-s-most-thorough-record-of-enterprise-secrets-secure-it-accordingly
-
AI Chat Data Is History’s Most Thorough Record of Enterprise Secrets. Secure It Wisely
AI interactions are becoming one of the most revealing records of human thinking, and we’re only beginning to understand what that means for law enforcement, accountability, and privacy. First seen on darkreading.com Jump to article: www.darkreading.com/application-security/ai-chat-data-is-history-s-most-thorough-record-of-enterprise-secrets-secure-it-accordingly
-
TDL 007 – Cyber Warriors Digital Shadows: Insights from Canada’s Cybersecurity Leader
Tags: ai, awareness, backup, breach, browser, business, cio, ciso, communications, conference, control, corporate, country, cryptography, cyber, cybersecurity, dark-web, data, data-breach, defense, dns, email, encryption, finance, government, healthcare, identity, incident, infrastructure, intelligence, Internet, jobs, law, leak, linux, malicious, mfa, mitigation, network, organized, phone, privacy, ransom, ransomware, RedTeam, resilience, risk, risk-management, router, service, startup, strategy, supply-chain, switch, tactics, technology, theft, threat, tool, training, windowsSummary In this episode of The Defender’s Log, host David Redekop interviews Sami Khoury, the Senior Official for Cybersecurity for the Government of Canada. With a career spanning 33 years at the Communication Security Establishment (CSE), Khoury shares how a coincidental job application blossomed into a lifelong passion for national security. Khoury emphasizes that modern…
-
Europol dismantles SIM box operation renting numbers for cybercrime
European law enforcement in an operation codenamed ‘SIMCARTEL’ has dismantled an illegal SIM-box service that enabled more than 3,200 fraud cases and caused at least 4.5 million euros in losses. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/europol-dismantles-sim-box-operation-renting-numbers-for-cybercrime/
-
Tech industry association sues to block Texas ‘censorship’ law age-gating access to apps
A leading technology industry association has sued Texas, seeking to block a state law that requires app stores to verify user ages to purchase and download apps. First seen on therecord.media Jump to article: therecord.media/tech-industry-texas-age-gating
-
Tech industry association sues to block Texas ‘censorship’ law age-gating access to apps
A leading technology industry association has sued Texas, seeking to block a state law that requires app stores to verify user ages to purchase and download apps. First seen on therecord.media Jump to article: therecord.media/tech-industry-texas-age-gating
-
AI Chat Data Is History’s Most Thorough Record of Enterprise Secrets, Secure it Wisely
AI interactions are becoming one of the most revealing records of human thinking; and we’re only beginning to understand what that means for law enforcement, accountability, and privacy. First seen on darkreading.com Jump to article: www.darkreading.com/application-security/ai-chat-data-is-history-s-most-thorough-record-of-enterprise-secrets-secure-it-accordingly

