Tag: law
-
Clément Domingo: “We are not using AI correctly to defend ourselves”
Tags: access, ai, attack, control, credentials, cyber, cyberattack, cybercrime, cybersecurity, dark-web, finance, government, group, hacker, infrastructure, intelligence, Internet, jobs, law, malicious, malware, office, password, programming, ransom, startup, threat, tool, trainingstartup, but dedicated to cybercrime in a very efficient way,” Domingo tells via email. “Most have what we call affiliates, which allows them to operate worldwide and attack any organization or entity. In most cases, the startup keeps 20% of the ransom and the accomplice takes 80%.”These are companies that, as he details, offer all…
-
Lawmakers call on DNI to review intel sharing with Spain over Huawei revelations
The Chinese government could use its information-sharing laws to force the Huawei to assist Beijing’s vast intelligence apparatus, Sen. Tom Cotton and Rep. Rick Crawford, both Republicans from Arkansas, wrote. First seen on therecord.media Jump to article: therecord.media/lawmakers-call-on-dni-to-review-spain-intel-huawei
-
Massistant: Chinese Mobile Forensic Tool Accesses SMS, Images, Audio, and GPS Data
Cybersecurity researchers at Lookout Threat Lab have uncovered a sophisticated mobile forensics application called Massistant, deployed by Chinese law enforcement to extract comprehensive data from confiscated mobile devices. The tool represents a significant evolution from its predecessor MFSocket, incorporating advanced capabilities to bypass device security measures and collect sensitive information including SMS messages, images, audio…
-
Chinese Salt Typhoon Infiltrated US National Guard Network for Months
A Department of Homeland Security memo confirms Chinese group Salt Typhoon, extensively compromised a US National Guard network for nearly a year, stealing sensitive military and law enforcement data. First seen on hackread.com Jump to article: hackread.com/chinese-salt-typhoon-infiltrated-us-national-guard-network/
-
Belk Suffers Major Data Breach; Law Firm Investigates Class Action
The popular U.S. department store chain Belk is under First seen on thecyberexpress.com Jump to article: thecyberexpress.com/belk-data-breach/
-
How AI is changing the GRC strategy
Tags: access, ai, best-practice, breach, business, ciso, compliance, control, data, detection, finance, framework, fraud, governance, grc, guide, law, monitoring, network, nist, privacy, regulation, risk, risk-analysis, risk-management, strategy, threat, toolAdapting existing frameworks with AI risk controls: AI risks include data safety, misuse of AI tools, privacy considerations, shadow AI, bias and ethical considerations, hallucinations and validating results, legal and reputational issues, and model governance to name a few.AI-related risks should be established as a distinct category within the organization’s risk portfolio by integrating into…
-
Operation Eastwood disrupted operations of pro-Russian hacker group NoName057(16)
International law enforcement operation disrupted the activities of the pro-Russia hacking group NoName057(16). European and U.S. authorities disrupted the activities of the pro-Russian hacktivist group NoName057(16) in Operation Eastwood. >>Between 14 and 17 July, a joint international operation, known as Eastwood and coordinated by Europol and Eurojust, targeted the cybercrime network NoName057(16). Law enforcement and…
-
International operation disrupts pro-Russian hacker group NoName057(16)
European and U.S. law enforcement have disrupted the operations of a pro-Russian hacker group known for launching distributed denial-of-service attacks against Ukraine and its allies. First seen on therecord.media Jump to article: therecord.media/international-police-takedown-noname-hacker
-
Pro-Russian DDoS group NoName057(16) disrupted by international law enforcement operation
Over a dozen law enforcement agencies took action earlier this week, resulting in multiple arrests. First seen on cyberscoop.com Jump to article: cyberscoop.com/noname05716-disruption-operation-eastwood-europol/
-
Europol disrupts pro-Russian NoName057(16) DDoS hacktivist group
An international law enforcement operation dubbed “Operation Eastwood” has targeted the infrastructure of the pro-Russian hacktivist group NoName057(16), responsible for distributed denial-of-service (DDoS) attacks across Europe and the US. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/europol-disrupts-pro-russian-noname05716-ddos-hacktivist-group/
-
AI Is Reshaping How Attorneys Practice Law
Experts recommend enhanced AI literacy, training around the ethics of using AI, and verification protocols to maintain credibility in an increasingly AI-influenced courtroom. First seen on darkreading.com Jump to article: www.darkreading.com/cyber-risk/ai-is-reshaping-how-attorneys-practice-law
-
Police disrupt “Diskstation” ransomware gang attacking NAS devices
An international law enforcement action dismantled a Romanian ransomware gang known as ‘Diskstation,’ which encrypted the systems of several companies in the Lombardy region, paralyzing their businesses. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/police-disrupt-diskstation-ransomware-gang-attacking-nas-devices/
-
14 Hackers Arrested in Massive Tax Fraud Scheme, Authorities Confirm
Authorities have arrested 14 individuals in a coordinated international operation targeting a sophisticated tax fraud scheme that exploited stolen personal data to submit fraudulent claims worth over £1 million. The arrests demonstrate the growing collaboration between UK and Romanian law enforcement agencies in combating cross-border cybercrime. Thirteen suspects were apprehended in Romania across the counties…
-
How defenders use the dark web
Tags: access, antivirus, attack, breach, corporate, credit-card, crypto, cyber, cybercrime, dark-web, data, data-breach, email, extortion, finance, fraud, government, group, hacker, healthcare, identity, incident, insurance, intelligence, Internet, interpol, law, leak, lockbit, mail, malware, monitoring, network, phishing, ransom, ransomware, service, software, theft, threat, tool, usa, vpnAttributing attacks to threat actors: When organizations suffer from data breaches and cyber incidents, the dark web becomes a crucial tool for defenders, including the impacted businesses, their legal teams, and negotiators.Threat actors such as ransomware groups often attack organizations to encrypt and steal their data so they can extort them for money, in exchange…
-
Spain awarded Euro12.3 million in contracts to Huawei
Spain gives Huawei wiretap contracts, sparking concerns over potential Chinese government access due to Huawei’s links to Beijing. The Spanish Ministry of the Interior has awarded Euro12.3 million ($14.3 million) contracts to manage and store judicially authorized wiretaps used by law enforcement and intelligence agencies, raising concerns about potential Chinese government access due to the…
-
CBI Shuts Down £390K U.K. Tech Support Scam, Arrests Key Operatives in Noida Call Center
India’s Central Bureau of Investigation (CBI) has announced that it has taken steps to dismantle what it said was a transnational cybercrime syndicate that carried out “sophisticated” tech support scams targeting citizens of Australia and the United Kingdom.The fraudulent scheme is estimated to have led to losses worth more than £390,000 ($525,000) in the United…
-
Airline executive agrees to dismiss litigation around alleged hackhire scheme
The cases, which stretched across multiple continents and shed light on the shady world of corporate espionage and mercenary hackers, stemmed from a scheme allegedly orchestrated by an attorney at the law firm Dechert to hack into Azima’s accounts for one of its clients. First seen on therecord.media Jump to article: therecord.media/airline-exec-agrees-to-dismiss-hack-for-hire-lawsuit
-
Indonesia extradites Russian accused of selling personal data on Telegram
Indonesia has extradited to Russia a man accused of running a Telegram channel that sold personal data obtained from law enforcement databases. First seen on therecord.media Jump to article: therecord.media/indonesia-extradites-russian-telegram-sale
-
Russian Basketball Star Arrested Over Ransomware Attacks on 900+ Companies
A prominent Russian basketball player has been arrested in France on charges related to one of the most extensive ransomware operations in recent years, highlighting the ongoing intersection between cybercrime and international law enforcement. Daniil Kasatkin, a 26-year-old professional basketball player who recently played for Moscow’s MBA-MAI team, was detained at Paris Charles de Gaulle…
-
DHS Tells Police That Common Protest Activities Are ‘Violent Tactics’
DHS is urging law enforcement to treat even skateboarding and livestreaming as signs of violent intent during a protest, turning everyday behavior into a pretext for police action. First seen on wired.com Jump to article: www.wired.com/story/dhs-tells-police-that-common-protest-activities-are-violent-tactics/
-
UK NCA arrested four people over MS, Co-op cyberattacks
NCA arrested four people in UK, including three teens, over cyberattacks on M&S, Co-op, and Harrods, per its investigation. The British National Crime Agency (NCA) arrested four individuals in the country following an investigation into the recent wave of attacks targeting Co-op, M&S, and Harrods. On July 10, Law enforcement arrested 4 youths, aged 1720,…
-
Why Agentic AI in Healthcare Demands Deeper Data Oversight
As healthcare providers and their vendors develop and implement agentic artificial intelligence and other AI tools, they need to throughly understand data privacy risks under HIPAA and other laws, said attorney Jordan Cohen of law firm Akerman LLP. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/interviews/agentic-ai-in-healthcare-demands-deeper-data-oversight-i-5485
-
FBI’s CJIS demystified: Best practices for passwords, MFA & access control
FBI’s Criminal Justice Information Services (CJIS) compliance isn’t optional when handling law enforcement data. From MFA to password hygiene, see how Specops Software helps meet FBI standards while also securing your Windows Active Directory. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/fbis-cjis-demystified-best-practices-for-passwords-mfa-and-access-control/
-
FBI’s CJIS demystified: Best practices for passwords, MFA & access control
FBI’s Criminal Justice Information Services (CJIS) compliance isn’t optional when handling law enforcement data. From MFA to password hygiene, see how Specops Software helps meet FBI standards while also securing your Windows Active Directory. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/fbis-cjis-demystified-best-practices-for-passwords-mfa-and-access-control/
-
Four Hackers Arrested by UK Police After Attacks on MS Co”‘op and Harrods
UK law enforcement authorities have made significant progress in their investigation into cyber attacks targeting some of Britain’s most prominent retailers, with four individuals now in custody following coordinated arrests across the West Midlands and London. The National Crime Agency (NCA) announced today that four suspects”, two males aged 19, a 17-year-old male, and a…
-
Four Hackers Arrested by UK Police After Attacks on MS Co”‘op and Harrods
UK law enforcement authorities have made significant progress in their investigation into cyber attacks targeting some of Britain’s most prominent retailers, with four individuals now in custody following coordinated arrests across the West Midlands and London. The National Crime Agency (NCA) announced today that four suspects”, two males aged 19, a 17-year-old male, and a…
-
German court rules Meta tracking technology violates European privacy laws
The court in Leipzig ruled that Meta must pay Euro5,000 ($5,900) to a German Facebook user who sued the platform for embedding tracking technology in third-party websites, a ruling that could open the door to other lawsuits. First seen on therecord.media Jump to article: therecord.media/german-court-meta-tracking-tech
-
Appeals court revives Salvadoran journalists’ lawsuit against NSO Group
The appellate court on Tuesday sent the case back to the lower court for further consideration, saying it had “abused its discretion” and improperly applied the law when deciding Salvadoran journalists had no right to sue in U.S. courts. First seen on therecord.media Jump to article: therecord.media/appeals-court-revives-salvadoran-journalist-lawsuit-nso-group-spyware
-
Security coalition urges Congress to renew 2015 CISA law
A group of top cybersecurity and technology firms said the law provided critical protections for sharing essential vulnerability information. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/cyber-information-sharing-law-congress-reauthorize-security-coalition-letter/752454/
-
Qantas Contacted by Potential Cybercriminal Following Data Breach
Qantas said it is currently validating the contact, and has informed law enforcement First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/qantas-contacted-cybercriminal/

