Tag: law
-
Chaos Ransomware Rises as BlackSuit Gang Falls
Researchers detailed a newer double-extortion ransomware group made up of former members of BlackSuit, which was recently disrupted by international law enforcement. First seen on darkreading.com Jump to article: www.darkreading.com/cyberattacks-data-breaches/chaos-ransomware-rises-blacksuit-falls
-
Internet Archive is now a US federal depository library
The Internet Archive has become an official U.S. federal depository library, providing online users with access to archived congressional bills, laws, regulations, presidential documents, and other U.S. government documents. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/technology/internet-archive-is-now-a-us-federal-depository-library/
-
Inside Muddled Libra’s Playbook: Call Center Attacks for Initial Breach
Palo Alto Networks’ Unit 42, the cybercrime group tracked as Muddled Libra also known as Scattered Spider or UNC3944 has demonstrated remarkable resilience and adaptation in 2025, following international law enforcement disruptions in late 2024. Despite federal charges against five suspected members in November 2024, the group has escalated its intrusion operations across sectors including…
-
Security Affairs newsletter Round 534 by Pierluigi Paganini INTERNATIONAL EDITION
A new round of the weekly Security Affairs newsletter has arrived! Every week, the best security articles from Security Affairs are free in your email box. Enjoy a new round of the weekly SecurityAffairs newsletter, including the international press. Law enforcement operations seized BlackSuit ransomware gang’s darknet sites Arizona woman sentenced for aiding North Korea…
-
Law enforcement operations seized BlackSuit ransomware gang’s darknet sites
An international law enforcement operation seized the dark web data leak site of the BlackSuit ransomware group. A banner on the BlackSuit ransomware group’s TOR data leak sites informs visitors that they were seized by U.S. Homeland Security Investigations in a global law enforcement operation. The notice features logos of 17 law enforcement agencies and…
-
Microsoft Investigates Leak in Early Warning System Used by Chinese Hackers to Exploit SharePoint Vulnerabilities
Tags: breach, china, cyber, cybersecurity, exploit, flaw, government, hacker, international, law, leak, microsoft, software, vulnerabilityChinese laws requiring vulnerability disclosure to the government create transparency issues and potential conflicts for international cybersecurity efforts. Microsoft is probing whether a leak from its confidential early warning system enabled Chinese state-sponsored hackers to exploit significant flaws in its SharePoint software, leading to breaches at over 400 organizations, including the U.S. agency responsible for…
-
BreachForums Resurfaces on Original Dark Web (.onion) Address
BreachForums resurfaces on its original .onion domain amid law enforcement crackdowns, raising questions about its admin, safety and future. First seen on hackread.com Jump to article: hackread.com/breachforums-resurface-original-dark-web-onion-address/
-
Operation Checkmate: BlackSuit Ransomware’s Dark Web Domains Seized
International law enforcement agencies, including the FBI and Europol, have successfully seized the infrastructure of the notorious BlackSuit ransomware gang in Operation Checkmate. This article details the takedown, BlackSuit’s origins, and the ongoing fight against evolving cyber threats. First seen on hackread.com Jump to article: hackread.com/operation-checkmate-dark-web-blacksuit-ransomware-seized/
-
Despite changes, crisis pregnancy centers still attract scrutiny over HIPAA promises
Some crisis pregnancy centers (CPCs) still tell visitors that their data is protected under the HIPAA privacy law, despite guidance to the contrary from the government and CPCs’ own umbrella organizations. Data privacy and abortion-rights groups want states to do more to end those claims. First seen on therecord.media Jump to article: therecord.media/crisis-pregnancy-centers-hipaa-data-privacy
-
The Age-Checked Internet Has Arrived
Starting today, UK adults will have to prove their age to access porn online. Experts warn that a global wave of age-check laws threatens to chill speech and ultimately harm children and adults alike. First seen on wired.com Jump to article: www.wired.com/story/the-age-checked-internet-has-arrived/
-
BlackSuit Ransomware Infrastructure Seized by Authorities
International law enforcement agencies delivered a significant blow to cybercriminals this week with the successful takedown of critical infrastructure belonging to the BlackSuit ransomware gang. The coordinated operation, dubbed >>Operation Checkmate,
-
BlackSuit ransomware extortion sites seized in Operation Checkmate
Law enforcement has seized the dark web extortion sites of the BlackSuit ransomware operation, which has targeted and breached the networks of hundreds of organizations worldwide over the past several years. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/law-enforcement-seizes-blacksuit-ransomware-leak-sites/
-
BlackSuit ransomware leak sites seized in Operation Checkmate
Law enforcement has seized the dark web leak sites of the BlackSuit ransomware operation, which has targeted and breached the networks of hundreds of organizations worldwide over the past several years. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/law-enforcement-seizes-blacksuit-ransomware-leak-sites/
-
Law Enforcement Cracks Down on XSS, but Will It Last?
The arrest of a suspected administrator for the popular cybercrime forum was one of several enforcement actions in the past week targeting malicious activity. First seen on darkreading.com Jump to article: www.darkreading.com/threat-intelligence/law-enforcement-cracks-down-xss
-
Key Operator of World’s Largest XSS Dark Web Platform Detained
International law enforcement agencies have dismantled one of the world’s most influential Russian-speaking cybercrime platforms following the arrest of its suspected administrator in a coordinated operation spanning France, Ukraine, and broader European cooperation. The takedown of xss.is represents a significant blow to global cybercriminal networks that have operated with relative impunity on the dark web…
-
White House AI plan heavy on cyber, light on implementation
Tags: ai, automation, country, cyber, cybersecurity, defense, infrastructure, law, military, strategyIt’s a ‘north star’ strategy and not an executive order: Unlike strategy documents or executive orders issued by presidential administrations in the past, this action plan contains no implementation requirements, deadlines, or specifics on when many of its actions need to be completed or how. It is a “north star strategy for all of these…
-
WhatsApp is refused right to intervene in Apple legal action on encryption ‘backdoors’
Investigatory Powers Tribunal to hear arguments in public over lawfulness of secret UK order requiring Apple to give UK law enforcement access to users’ encrypted data stored on the Apple iCloud First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366627911/WhatsApp-is-refused-right-to-intervene-in-Apple-legal-action-on-encryption-backdoors
-
UK proposal would forbid ransom payments by gov’t agencies, but will it meaningfully decrease ransomware attacks?
Tags: attack, backup, business, ceo, dark-web, data, finance, government, group, hacker, intelligence, law, ransom, ransomware, threatBusinesses often want to pay ransom: Fred Chagnon, principal research director at Info-Tech Research Group noted that, from a business continuity perspective, it can make sense to pay the ransom.”Paying the ransom can sometimes be the quickest and least damaging path to restoring operations, especially if backups are compromised or recovery is prohibitively slow. While…
-
Suspected admin of major dark web cybercrime forum arrested in Ukraine
French law enforcement said the alleged administrator of the long-running cybercrime forum XSS, formerly known as DaMaGeLab, was arrested in Ukraine. First seen on therecord.media Jump to article: therecord.media/suspected-xss-cybercrime-marketplace-admin-arrested
-
House Republicans endorse stricter state and federal-led voter roll purges despite dearth of evidence on fraud
GOP lawmakers say they’re committed to altering national voting laws to make it easier for states to purge potentially eligible voters. First seen on cyberscoop.com Jump to article: cyberscoop.com/house-republicans-state-voter-roll-purges-hearing-gop-fraud-claims/
-
Lumma infostealer malware returns after law enforcement disruption
The Lumma infostealer malware operation is gradually resuming activities following a massive law enforcement operation in May, which resulted in the seizure of 2,300 domains and parts of its infrastructure. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/lumma-infostealer-malware-returns-after-law-enforcement-disruption/
-
Lumma Stealer Masquerades as Pirated Apps to Steal Logins and Data
Lumma Stealer, a notorious information-stealing malware-as-a-service (MaaS) platform, has swiftly reemerged after a coordinated global law enforcement operation in May 2025. The U.S. Department of Justice, alongside international partners, seized approximately 2,300 malicious domains integral to Lumma’s command-and-control (C&C) infrastructure, including administrative login panels. This disruption severed connections between infected endpoints and exfiltration servers, temporarily…
-
Global Ransomware Attacks Plummet 43% in Q2 2025
NCC Group observed a 43% drop in ransomware attacks in Q2 2025, driven by law enforcement actions and internal conflicts in groups First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/ransomware-attacks-plummet-q2/
-
UK moves forward with plans for mandatory reporting of ransomware attacks
Britain’s Home Office wants public feedback on several anti-ransomware proposals, including a requirement for all victims to report attacks to law enforcement. First seen on therecord.media Jump to article: therecord.media/mandatory-reporting-ransomware-attacks-uk-proposal
-
Microsoft ‘digital escorts’ reveal crucial US counterintelligence blind spot
Tags: access, china, cio, cloud, compliance, country, cyber, cybersecurity, data, defense, firewall, framework, google, government, injection, intelligence, law, microsoft, military, oracle, risk, service, threat, update, vulnerabilityWhat the program was, and how it worked: The digital escort model, according to ProPublica, was designed to comply with federal contracting rules that prohibit foreign nationals from directly accessing sensitive government systems. Under this framework:China-based engineers would file support tickets for tasks such as firewall updates or bug fixes.US-based escorts, often former military personnel…
-
What the law says about your next data breach
In this Help Net Security video, Chad Humphries, Solution Consultant, Networks Cyber Security at Rockwell Automation, explores how cyber risk quantification is becoming … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/07/22/data-breach-cyber-risk-quantification-video/
-
Netherlands calls for European shift to post-tracking internet as privacy laws fail
Dutch research institute argues decade of regulation hasn’t curbed surveillance capitalism, proposes fundamental business model change First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366627666/Netherlands-calls-for-European-shift-to-post-tracking-internet-as-privacy-laws-fail
-
Japanese police release decryptor for Phobos ransomware after February takedown
Victims of Phobos ransomware and its 8Base offshoot now have access to a decryptor released by Japanese law enforcement and backed by the FBI and European officials. First seen on therecord.media Jump to article: therecord.media/decryptor-phobos-8base-ransomware-japan-national-police
-
China’s Massistant Tool Secretly Extracts SMS, GPS Data, and Images From Confiscated Phones
Cybersecurity researchers have shed light on a mobile forensics tool called Massistant that’s used by law enforcement authorities in China to gather information from seized mobile devices.The hacking tool, believed to be a successor of MFSocket, is developed by a Chinese company named SDIC Intelligence Xiamen Information Co., Ltd., which was formerly known as Meiya…

