Tag: law
-
Aeza Group Latest BPH Service Provider Sanctioned by U.S. Treasury
Five months after sanction Zservers, the U.S. Treasury Department targeted Aeza Group, another Russia-based bulletproof hosting services provider for allowing threat actors to host ransomware and other campaigns on its infrastructure, which is resistant to law enforcement demands and investigations. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/07/aeza-group-latest-bph-service-provider-sanctioned-by-u-s-treasury/
-
Cybersecurity in the supply chain: strategies for managing fourth-party risks
Tags: access, breach, business, ciso, compliance, control, cyber, cybersecurity, data, exploit, framework, governance, intelligence, ISO-27001, law, mitigation, monitoring, nist, risk, risk-management, saas, service, soc, software, strategy, supply-chain, threat, tool, vulnerabilitySet clear data boundaries: The reality is that any organization consuming third-party software-as-a-service offerings and services has extremely limited control over the partners that their third parties are working with, says Curtis Simpson, CISO at Armis.”This is why it’s critically important to understand the sub-processors involved in the delivery of contracted SaaS offerings and services,…
-
Europol shuts down Archetyp Market, longest-running dark web drug marketplace
Europol shuts down Archetyp Market, longest-running dark web drug site, the police arrested the admin in Spain, top vendors hit in Sweden. An international law enforcement operation led by German authorities has shut down Archetyp Market, the longest-running dark web drug marketplace, in a coordinated operation across six countries with support from Europol and Eurojust.…
-
Sovereign by Design: Data Control in a Borderless World
How IT Leaders Can Navigate Regulatory Complexity, Use Tech for Digital Sovereignty. From Schrems II to TikTok fines, data sovereignty is redefining the rules of digital engagement. It is no longer an option for enterprises. CIOs must navigate a maze of data laws and tech strategies to stay compliant and competitive in a world without…
-
UK eyes new laws as cable sabotage blurs line between war and peace
It might be time to update the Submarine Telegraph Act of 1885 First seen on theregister.com Jump to article: www.theregister.com/2025/07/02/uk_cable_sabotage_law/
-
New York cyber legislation signed into law
First seen on scworld.com Jump to article: www.scworld.com/brief/new-york-cyber-legislation-signed-into-law
-
Ghost in the Machine: A Spy’s Digital Lifeline
Tags: access, ai, attack, authentication, best-practice, cloud, communications, control, country, crypto, cyber, data, encryption, endpoint, framework, government, Hardware, identity, infrastructure, intelligence, jobs, law, linux, mfa, military, network, resilience, risk, software, spy, strategy, technology, threat, tool, vpn, windows, zero-trust -
U.S. House Homeland Security Appropriations Bill Seeks to Modernize Border Infrastructure Security with Proactive OT/IT Security Measures
Tags: ai, attack, awareness, cctv, cisa, cloud, control, cryptography, cyber, cybersecurity, data, defense, detection, fedramp, government, incident response, infrastructure, intelligence, Internet, iot, law, mitigation, monitoring, network, office, privacy, risk, service, strategy, supply-chain, technology, threat, tool, vulnerability, zero-trustThe FY 2026 House Homeland Security Appropriations Bill highlights growing focus in Congress on protecting border infrastructure from cyber threats. The directive to implement continuous monitoring and real-time threat intelligence reflects a broader push toward modern, preventive cybersecurity across federal agencies. As the digital and physical worlds become increasingly intertwined, the technologies used to protect…
-
US disrupts North Korean IT worker “laptop farm” scheme in 16 states
The U.S. Department of Justice (DoJ) announced coordinated law enforcement actions against North Korean government’s fund raising operations using remote IT workers. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/us-disrupts-north-korean-it-worker-laptop-farm-scheme-in-16-states/
-
Europol Dismantles Massive Crypto Investment Scam Targeting 5000+ victims Worldwide
Europol and international law enforcement have dismantled a sprawling cryptocurrency investment fraud network that allegedly defrauded more than 5,000 victims globally, laundering at least Euro460 million ($540 million) in illicit funds. The arrests, carried out on June 25, 2025, mark one of the largest crackdowns on crypto fraud in European history. Coordinated International Effort The…
-
U.S. DOJ Cracks Down on North Korean Remote IT Workforce Operating Illegally
The U.S. Department of Justice (DOJ) has announced a major crackdown on North Korea’s covert use of remote information technology (IT) workers to siphon millions from American companies and fund its weapons programs. The coordinated law enforcement actions, resulted in the arrest of a New Jersey man, the seizure of 29 financial accounts, 21 fraudulent…
-
Porn-site age checks will be harder to fight after ruling on Texas law, experts say
The U.S. Supreme Court’s decision in favor of Texas’ law requiring age verification for porn-site users will have ripple effects across other states, and also for personal data privacy and security, experts say. First seen on therecord.media Jump to article: therecord.media/supreme-court-ruling-texas-porn-age-check-law-privacy-data-security
-
Europol Dismantles $540 Million Cryptocurrency Fraud Network, Arrests Five Suspects
Europol on Monday announced the takedown of a cryptocurrency investment fraud ring that laundered Euro460 million ($540 million) from more than 5,000 victims across the world.The operation, the agency said, was carried out by the Spanish Guardia Civil, along with support from law enforcement authorities from Estonia, France, and the United States. Europol said the…
-
Denmark moves to protect personal identity from deepfakes with new copyright law
Denmark plans to let citizens copyright their face, body, and voice to combat deepfakes under a new law strengthening personal digital rights. Denmark plans to amend its copyright law to give individuals rights over their body, face, and voice, to combat AI-generated deepfakes. Believed to be the first law of its kind in Europe, the…
-
ISMG Editors: Et Tu, AI? When Frontier Models Choose Murder
Also: India’s New Privacy Law; Monitoring Operational Technology Environments. In this week’s update, four ISMG editors discussed frontier artificial intelligence models’ propensity to engage in unethical behavior, getting ready for India’s new data protection law and how to improve hardening and security monitoring for operational technology environments. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/ismg-editors-et-tu-ai-when-frontier-models-choose-murder-a-28843
-
US Supreme Court Upholds Texas Porn ID Law
Tags: lawIn a 6-3 decision, the Supreme Court held that age verification for explicit sites is constitutional. In a dissent, Justice Elena Kagan warned it burdens adults and ignores First Amendment precedent. First seen on wired.com Jump to article: www.wired.com/story/us-supreme-court-porn-age-verification-decision-2025/
-
Defining Cyber Resilience: Industry Leaders Meet in London as AI Threats Accelerate
Last week, Check Point hosted its annual Cyber Leader Summit at Landing Forty-Two in London’s iconic Leadenhall Building. The summit convened influential figures from the cybersecurity, law enforcement, and enterprise communities to explore the rapidly evolving threat landscape and the transformative role of artificial intelligence. Key discussions focused on the urgent need for proactive, resilience-focused…
-
The rise of the compliance super soldier: A new human-AI paradigm in GRC
Tags: ai, automation, awareness, compliance, control, governance, grc, jobs, law, LLM, metric, regulation, risk, skills, strategy, threat, tool, training, updateRegulatory acceleration: Global AI laws are evolving but remain fragmented and volatile. Toolchain convergence: Risk, compliance and engineering workflows are merging into unified platforms. Maturity asymmetry: Few organizations have robust genAI governance strategies, and even fewer have built dedicated AI risk teams. These forces create a scenario where GRC teams must evolve rapidly, from policy monitors to strategic…
-
Authorities Arrest Five Operators Behind Infamous BreachForums Cybercrime Hub
In a sweeping crackdown that has sent shockwaves through the global cybercrime community, French authorities have arrested five key operators behind BreachForums, one of the world’s most notorious online marketplaces for stolen data. The arrests mark a significant victory for international law enforcement in the fight against digital crime and data trafficking. The operation, led…
-
Bankers Association’s Attack on Cybersecurity Transparency
Tags: attack, awareness, banking, breach, ciso, control, cybersecurity, data, extortion, finance, group, incident response, infrastructure, insurance, law, malicious, ransomware, riskA coalition of banking industry associations, including SIFA, the American Bankers Association (ABA), Bank Policy Institute (BPI), and several other lobbying groups have made a disgraceful appeal to the SEC to eliminate the rule requiring public disclosure of material cybersecurity incidents within four days of detection. This rule was established to ensure shareholders are properly…
-
Many data brokers aren’t registering across state lines, privacy groups say
An analysis of four states with data broker registry laws found that hundreds of brokers are registered as such in one state but not in others. First seen on cyberscoop.com Jump to article: cyberscoop.com/many-data-brokers-arent-registering-across-state-lines-privacy-groups-say/
-
Short-term extension of expiring cyber information-sharing law could be on the table
Time is running short for Congress to renew the 2015 Cybersecurity Information Sharing Act. First seen on cyberscoop.com Jump to article: cyberscoop.com/cisa-2015-bill-extension-2025/
-
Africa Sees Surge in Cybercrime as Law Enforcement Struggles
Cybercrime accounts for more than 30% of all reported crime in East Africa and West Africa, with online scams, ransomware, business email compromise, and digital sextortion taking off. First seen on darkreading.com Jump to article: www.darkreading.com/cyber-risk/africa-surge-cybercrime-law-enforcement-struggles
-
AI Moratorium Stays in US Senate Budget Reconciliation Bill
10-Year Freeze on AI State Laws Remains in Senate Bill Despite Fierce Pushback. A decade-long federal ban on state AI regulations remains in the Senate’s version of Trump’s sweeping legislative bill, drawing sharp bipartisan criticism for sidelining state oversight and granting tech giants a reprieve amid growing calls for stronger AI governance. First seen on…
-
Key Cyber Law’s Lapse Could Mute Threat Sharing Nationwide
Congress Faces Pressure to Modernize Cyber Definitions, Safeguards Before Deadline. With the Cybersecurity Information Sharing Act of 2015 set to expire this fall, lawmakers face mounting pressure to update its liability protections and outdated definitions, as experts warn that failure to modernize could undermine public-private threat sharing and weaken national cyber defenses. First seen on…
-
UK Data Bill Signals Evolution in AI and Privacy Rules
Attorney Edward Machin on How the New Law Affects Data Use and Risk. The U.K.’s new data bill updates rules on AI, cookies and automated decisions while keeping EU data-sharing intact. Edward Machin of Ropes & Gray calls it evolution, not revolution and says the lighter-touch approach still carries serious long-term consequences. First seen on…
-
Court Ditches HIPAA Reproductive Health Info Privacy Rule
Ruling: HHS Has No Authority to Distinguish Different Types of PHI for Restrictions. A Texas federal court has vacated 2024 changes to the HIPAA Privacy Rule made by the Biden administration to shield reproductive healthcare information from law enforcement. The court’s ruling could potentially make it easier for state investigators to obtain information about abortions…

