Tag: law
-
Gaps in California Privacy Law: Half of Data Brokers Ignore Requests
Failure to comply with consumer data access and deletion requests highlights the urgent need for standardized verification processes and stronger enforcement mechanisms to protect consumer privacy. First seen on darkreading.com Jump to article: www.darkreading.com/data-privacy/gaps-in-california-privacy-law-half-of-data-brokers-ignore-requests
-
Law firm email blunder exposes Church of England abuse victim details
Apology issued after names tied to redress scheme revealed in mass mailing First seen on theregister.com Jump to article: www.theregister.com/2025/08/28/lawyer_coe_email_blunder/
-
Microsoft refuses to divulge data flows to Police Scotland
Tech giant Microsoft is declining to share key information with Police Scotland about where the sensitive data it uploads to Office 365 will be processed, leaving the force unable to comply with UK-wide data protection laws First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366629871/Microsoft-refuses-to-divulge-data-flows-to-Police-Scotland
-
Top 5 Cybersecurity Risks That Your Law Firm Can Face
One in five law firms isn’t sure if they’ve been hacked. Don’t be one of them. Learn the 5 cybersecurity risks that could shut down your practice and damage client trust forever. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/08/top-5-cybersecurity-risks-that-your-law-firm-can-face/
-
License-plate reader company pauses work with federal agencies after backlash
Tags: lawFlock acknowledged in a Monday blog post that it has engaged in “limited pilots” with CBP and Homeland Security Investigations, the law enforcement division of the Department of Homeland Security. It said the partnerships were meant to bolster the federal agencies’ efforts to fight human trafficking and fentanyl distribution. First seen on therecord.media Jump to…
-
DOJ targets state laws in latest inquiry
Tags: lawIn another effort to further President Donald Trump’s deregulatory agenda, the DOJ is seeking public comment on state laws that burden U.S. businesses. First seen on techtarget.com Jump to article: www.techtarget.com/searchcio/news/366629791/DOJ-targets-state-laws-in-latest-inquiry
-
African Law Enforcement Agencies Nab Cybercrime Syndicates
African nations work with Interpol and private-sector partners to disrupt cybercriminal operations on the continent, but more work needs to be done. First seen on darkreading.com Jump to article: www.darkreading.com/cyberattacks-data-breaches/african-law-enforcement-agencies-nab-cybercrime-syndicates
-
TDL003 – Breaking Barriers: IPv6 Adoption and DNS Transformation with Tommy Jensen
Tags: access, ai, apple, attack, backup, banking, browser, business, ceo, chrome, ciso, compliance, computer, computing, control, country, credentials, cybersecurity, data, data-breach, ddos, dns, encryption, endpoint, google, government, group, international, Internet, jobs, law, microsoft, mobile, network, phishing, phone, privacy, programming, radius, risk, service, smishing, strategy, switch, technology, threat, update, vpn, windows, zero-trustSummary This episode of the Defender’s Log features special guest Tommy Jensen, an internet technologist specializing in IPv6, Zero Trust, and standards. Jensen’s career path, from an AppleCare contractor to a key figure in advancing internet technologies, is explored. The discussion highlights the critical importance and challenges of migrating to IPv6 and the necessity of…
-
BSidesSF 2025: State Of (Absolute) AppSec
Creator, Author and Presenter: Seth Law, Ariel Shin, Lakshmi Sudheer, Ken Johnson Our deep appreciation to Security BSides – San Francisco and the Creators, Authors and Presenters for publishing their BSidesSF 2025 video content on YouTube. Originating from the conference’s events held at the lauded CityView / AMC Metreon – certainly a venue like no…
-
CIISec: Most Security Professionals Want Stricter Regulations
A new CIISec poll finds the majority of industry professionals would prefer more rigorous cybersecurity laws First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/ciisec-security-professionals/
-
PDPL (UAE)
What is PDPL (UAE)? The Personal Data Protection Law (PDPL), formally known as Federal Decree-Law No. 45 of 2021 on the Protection of Personal Data, is the United Arab Emirates’ first comprehensive data protection framework. Commonly referred to as PDPL (UAE), it establishes a unified standard for safeguarding personal data, closely aligned with global privacy……
-
PDPL (Saudi)
What is PDPL (Saudi)? The Personal Data Protection Law (PDPL) is Saudi Arabia’s first comprehensive privacy law, designed to protect the personal data of individuals and regulate how organizations handle it. First issued in 2021 and amended in 2023, the law officially came into force in September 2023, with full enforcement beginning a year later….…
-
Operation Serengeti 2.0: INTERPOL nabs 1,209 cybercriminals in Africa, seizes $97M
INTERPOL arrested 1,209 cybercriminals in 18 African nations seizing $97.4M, and dismantling 11,432 malicious infrastructures. INTERPOL announced the result of the second phase of ongoing law enforcement Operation Serengeti (June to August 2025) that led to 1,209 arrests across 18 nations in Africa. The authorities are aiding 88,000 victims, seizing $97.4M, and dismantling 11,432 cybercrime…
-
US warns tech companies against complying with European and British ‘censorship’ laws
U.S. tech companies were warned they could face action from the Federal Trade Commission (FTC) for complying with the European Union and United Kingdom’s regulations about the content shared on their platforms. First seen on therecord.media Jump to article: therecord.media/tech-companies-ftc-censorship-laws
-
INTERPOL Arrests 1,209 Cybercriminals Across 18 African Nations in Global Crackdown
INTERPOL on Friday announced that authorities from 18 countries across Africa have arrested 1,209 cybercriminals who targeted 88,000 victims.”The crackdown recovered $97.4 million and dismantled 11,432 malicious infrastructures, underscoring the global reach of cybercrime and the urgent need for cross-border cooperation,” the agency said.The effort is the second phase of an ongoing law First seen…
-
Massive anti-cybercrime operation leads to over 1,200 arrests in Africa
Law enforcement authorities in Africa have arrested over 1,200 suspects as part of ‘Operation Serengeti 2.0,’ an INTERPOL-led international crackdown targeting cross-border cybercriminal gangs. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/massive-anti-cybercrime-operation-leads-to-over-1-200-arrests-in-africa/
-
What is the cost of a data breach?
Tags: access, ai, api, attack, automation, breach, business, ciso, compliance, cyber, cyberattack, cybersecurity, data, data-breach, detection, finance, fraud, healthcare, ibm, identity, incident response, india, infrastructure, insurance, intelligence, jobs, law, metric, privacy, programming, ransom, ransomware, regulation, risk, security-incident, service, skills, software, supply-chain, technology, theft, threat, tool, vulnerabilityCanada ($4.84 million) and the UK ($4.14million) remain in the top 10 hardest hit, with ASEAN or Association of Southeast Asian Nations ($3.67 million), Australia ($2.55 million), and India ($2.51 million) among the top 15. Breaches by industry: Healthcare remains the industry hit with the highest costs per breach by far, at $7.42 million despite…
-
TRM Launches Industry-Wide Platform to Fight Crypto Crimes
With Beacon Network, TRM Labs has brought together law enforcement and some of the largest crypto exchanges to fight against crypto crimes First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/trm-labs-beacon-network-fight/
-
TRM Launches Industry-Wide Platform to Fight Crypto Crimes
With Beacon Network, TRM Labs has brought together law enforcement and some of the largest crypto exchanges to fight against crypto crimes First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/trm-labs-beacon-network-fight/
-
L’Oréal to promote cyber resilience for Britain’s beauty salons
L’Oréal UK and Ireland will work with law enforcement, cyber educators and students, and other large organisations to help thousands of small salons across the UK improve their cyber resilience practice. First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366629222/LOreal-to-promote-cyber-resilience-for-Britains-beauty-salons
-
DoJ Seizes $2.8M in Crypto from Zeppelin Ransomware Group
The Department of Justice has announced a significant victory against cybercriminals, seizing over $2.8 million in cryptocurrency and additional assets from a Zeppelin ransomware operation. The coordinated law enforcement action targeted Ianis Aleksandrovich Antropenko, who faces federal charges for his role in deploying ransomware attacks against victims worldwide, including numerous American organizations and businesses. Major…
-
Law Enforcement Seizes BlackSuit Ransomware Servers Targeting U.S. Critical Infrastructure
Tags: control, cyber, extortion, group, infrastructure, international, law, ransomware, tactics, threatThe U.S. Department of Justice, in collaboration with multiple domestic and international law enforcement agencies, announced the seizure of critical infrastructure associated with the BlackSuit ransomware group, formerly known as Royal. Authorities dismantled four command-and-control (C2) servers and nine domains utilized by the threat actors for deploying ransomware payloads, extorting victims through double-extortion tactics, and…
-
ShinyHunters Claims BreachForums Seized by Law Enforcement, Now a Honeypot
Tags: authentication, breach, communications, cyber, data, hacking, infrastructure, law, privacy, threatThe threat actor known as ShinyHunters has publicly disclosed what they claim is a covert seizure of BreachForums, a notorious online platform used for trading stolen data and discussing illicit hacking activities. According to ShinyHunters’ announcement, the forum’s core infrastructure, including its official Pretty Good Privacy (PGP) key used for cryptographic authentication and secure communications,…
-
Dutch Investigators Blame Hacks on Multiple Threat Actors
NCSC-NL Says Hack of Citrix NetScaler Flaw Also Targeted Critical Infrastructure. A preliminary assessment by the Dutch NCSC into a suspected Russian hacking campaign has concluded that more than one group likely carried out the May breach of the country’s law enforcement network. Investigators say hacks of Citrix NetScaler flaw also targeted critical infrastructure. First…
-
9 things CISOs need know about the dark web
Tags: 2fa, access, ai, attack, automation, backup, blockchain, botnet, breach, captcha, ceo, ciso, communications, corporate, credentials, crypto, cyber, cybercrime, cybersecurity, dark-web, data, data-breach, ddos, deep-fake, defense, detection, dns, exploit, extortion, finance, fraud, group, guide, hacking, identity, incident, incident response, infrastructure, intelligence, international, jobs, law, leak, lockbit, malicious, malware, marketplace, mfa, monitoring, network, open-source, phishing, privacy, ransomware, resilience, risk, russia, saas, scam, service, strategy, tactics, technology, threat, tool, training, vpn, vulnerability, zero-dayNew groups form after major marketplaces are disrupted: International takedown efforts damage infrastructure and curb cybercrime operations by disrupting larger operations, removing major players from the ecosystem and scattering user bases.However, the dark web is highly adaptive and sophisticated actors often maintain contingency plans, including mirrors, backups, and alternative forums, according to Edward Currie, associate…
-
New State Privacy Laws Going into Effect in 2025: What You Need to Know
Key Takeaways The Patchwork of U.S. Privacy Laws If you’ve been tracking U.S. privacy law, you already know that there’s no single national rulebook. Instead, we’re living in a growing mosaic of state-by-state legislation. Some states aim for GDPR-style rights and transparency. Others focus narrowly on age-appropriate design or limiting targeted ads. Some carve out……
-
Dutch Investigators Blame Multiple Threat Actors on Hacks
NCSC-NL Says Hack of Citrix NetScaler Flaw Also Targeted Critical Infrastructure. A preliminary assessment by the Dutch NCSC into a suspected Russian hacking campaign has concluded that more than one group likely carried out the May breach of the country’s law enforcement network. Investigators say hacks of Citrix NetScaler flaw also targeted critical infrastructure. First…
-
BlackSuit Ransomware Takes an Infrastructure Hit From Law Enforcement
A swarm of US agencies joined with international partners to take down servers and domains and seize more than $1 million associated with BlackSuit (Royal) ransomware operations, a group that has been a chronic, persistent threat against critical infrastructure. First seen on darkreading.com Jump to article: www.darkreading.com/vulnerabilities-threats/blacksuit-ransomware-infrastructure-law-enforcement
-
US government seized $1M from Russian ransomware gang
A global law enforcement coalition targeted the infrastructure of the group behind the Royal and BlackSuit ransomware strains, allegedly responsible for extorting victims out of $370 million since 2022. First seen on techcrunch.com Jump to article: techcrunch.com/2025/08/11/u-s-government-seized-1-million-from-russian-ransomware-gang/

