Tag: law
-
Two key cyber laws are back as president signs bill to end shutdown
The cyberthreat information sharing law known as CISA 2015 and a cybersecurity grant program for state and local governments have been renewed as part of legislation to reopen the government. First seen on therecord.media Jump to article: therecord.media/cisa-2015-state-local-grants-renewed-legislation-ending-shutdown
-
Government funding bill temporarily revives cybersecurity information-sharing law
The spending legislation passed by Congress will reauthorize the CISA 2015 program through the end of January. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/cisa-2015-temporary-reauthorization-spending-bill/805320/
-
Operation Endgame 3.0 Dismantles Three Major Malware Networks
A global law enforcement operation has taken down the Rhadamanthys infostealer, VenomRAT trojan and the Elysium botnet First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/operation-endgame-3-dismantles/
-
Operation Endgame Dismantles Rhadamanthys, Venom RAT, and Elysium Botnet in Global Crackdown
Malware families like Rhadamanthys Stealer, Venom RAT, and the Elysium botnet have been disrupted as part of a coordinated law enforcement operation led by Europol and Eurojust.The activity, which is taking place between November 10 and 13, 2025, marks the latest phase of Operation Endgame, an ongoing operation designed to take down criminal infrastructures and…
-
Rhadamanthys infostealer operation disrupted by law enforcement
Tags: lawThe rumors were true: Operation Endgame, a joint effort between law enforcement and judicial authorities of several European countries, Australia, Canada, the UK and the US, … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/11/13/rhadamanthys-infostealer-operation-disrupted/
-
Police disrupts Rhadamanthys, VenomRAT, and Elysium malware operations
Law enforcement authorities from 9 countries have taken down 1,025 servers used by the Rhadamanthys infolstealer, VenomRAT, and Elysium botnet malware operations in the latest phase of Operation Endgame, an international action targeting cybercrime. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/police-disrupts-rhadamanthys-venomrat-and-elysium-malware-operations/
-
Operation Endgame: Authorities Takedown 1,025 Servers Linked to Rhadamanthys, VenomRAT, and Elysium
Between November 10 and 14, 2025, law enforcement agencies executed one of the most significant coordinated operations against cybercriminals in recent history. Operation Endgame, coordinated from Europol’s headquarters in The Hague, successfully dismantled three major threats to global cybersecurity: the infamous Rhadamanthys infostealer, the VenomRAT remote access trojan, and the Elysium botnet. This remarkable international…
-
Operation Endgame: Authorities Takedown 1,025 Servers Linked to Rhadamanthys, VenomRAT, and Elysium
Between November 10 and 14, 2025, law enforcement agencies executed one of the most significant coordinated operations against cybercriminals in recent history. Operation Endgame, coordinated from Europol’s headquarters in The Hague, successfully dismantled three major threats to global cybersecurity: the infamous Rhadamanthys infostealer, the VenomRAT remote access trojan, and the Elysium botnet. This remarkable international…
-
Google asks US court to shut down Lighthouse phishing-as-a-service operation
Tags: control, crime, cyber, cybercrime, cybersecurity, email, google, government, incident response, law, malicious, network, phishing, risk, sans, scam, service, smishing, technology, threatWill have ‘minimal impact’: Ed Dubrovsky, chief operating officer of incident response firm Cypher, is skeptical of the effectiveness of court action. Phishing-as-a-service operations don’t have to be on American soil, he explained, so court orders and legislation will likely have minimal impact on smishing or phishing attacks.”However,” he added, “I can understand that even…
-
Hungry for data: Inside Europol’s secretive AI programme
The EU’s law enforcement agency has been quietly amassing data to feed an ambitious but secretive artificial intelligence development programme that could have far-reaching privacy implications for people across the bloc First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366634419/Hungry-for-data-Inside-Europols-secretive-AI-programme
-
US cyber intel sharing law set for temporary extension
The US’ CISA 2015 cyber intelligence sharing law that lapsed just over a month ago amid a wider shutdown, will receive a temporary lease of life should attempts to reopen the federal government succeed. First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366634452/US-cyber-intel-sharing-law-set-for-temporary-extension
-
US Congress Moves to Revive CISA 2015 After Shutdown
Lawmakers Include Extension of Cyberthreat Sharing Law in Shutdown Resolution. A statute underpinning corporate cybersecurity information sharing may come back into effect along with funding to reopen the U.S. federal government after six weeks of being shutdown. The Cybersecurity Information Sharing Act of 2015 expired the same day Washington shut down on Oct. 1. First…
-
EU-Kommission will DSGVO für KI und Cookie-Tracking lockern
Die vorgeschlagenen Änderungen der EU-Kommission durch das ‘Digital Omnibus”-Paket gefährden laut Datenschützern die DSGVO.Laut einem durchgesickerten Entwurf, über den die deutsche Interessenvertretung Netzpolitik.org berichtet, würde das bevorstehende ‘Digital Omnibus”-Paket der EU-Kommission die Datenschutz-Grundverordnung (DSGVO) massiv verändern. Der Vorschlag soll am 19. November 2025 offiziell vorgestellt werden. Datenschützer befürchten jedoch, dass dies die DSGVO schwächen könnte.So…
-
EU-Kommission will DSGVO für KI und Cookie-Tracking lockern
Die vorgeschlagenen Änderungen der EU-Kommission durch das ‘Digital Omnibus”-Paket gefährden laut Datenschützern die DSGVO.Laut einem durchgesickerten Entwurf, über den die deutsche Interessenvertretung Netzpolitik.org berichtet, würde das bevorstehende ‘Digital Omnibus”-Paket der EU-Kommission die Datenschutz-Grundverordnung (DSGVO) massiv verändern. Der Vorschlag soll am 19. November 2025 offiziell vorgestellt werden. Datenschützer befürchten jedoch, dass dies die DSGVO schwächen könnte.So…
-
Senate moves to restore lapsed cybersecurity laws after shutdown
Tags: cisa, cyber, cyberattack, cybersecurity, data, defense, detection, government, infrastructure, intelligence, jobs, law, monitoring, network, service, threatWhat the lapse meant for enterprises: The expiration of CISA 2015 eliminated legal protections for sharing threat information, disrupting the real-time intelligence exchanges that had become routine over the past decade. Without its statutory shields, organizations faced potential liability for monitoring networks, sharing defensive measures, and coordinating responses with peers and federal agencies.The law had…
-
UK asks cyberspies to probe whether Chinese buses can be switched off remotely
Norwegian testers claim maker has remote access, while UK importer says supplier complies with the law First seen on theregister.com Jump to article: www.theregister.com/2025/11/11/uk_probe_china_bus_claim/
-
Senate moves to restore lapsed cybersecurity laws after shutdown
Tags: cisa, cyber, cyberattack, cybersecurity, data, defense, detection, government, infrastructure, intelligence, jobs, law, monitoring, network, service, threatWhat the lapse meant for enterprises: The expiration of CISA 2015 eliminated legal protections for sharing threat information, disrupting the real-time intelligence exchanges that had become routine over the past decade. Without its statutory shields, organizations faced potential liability for monitoring networks, sharing defensive measures, and coordinating responses with peers and federal agencies.The law had…
-
Danabot Malware Reemerges with Version 669 After Operation Endgame
The notorious Danabot banking malware has made a comeback with the release of version 669, marking a significant return after nearly six months of silence following the coordinated law enforcement takedown known as Operation Endgame in May 2025. The resurgence signals that cybercriminals behind the malware have successfully regrouped and reestablished their command-and-control (C2) infrastructure…
-
How GlassWorm wormed its way back into developers’ code, and what it says about open source security
Tags: access, ai, attack, blockchain, ciso, control, credentials, crypto, cybersecurity, data, data-breach, endpoint, exploit, framework, github, google, infrastructure, law, malicious, malware, marketplace, monitoring, open-source, resilience, service, software, supply-chain, threat, tool, update, wormadhamu.history-in-sublime-merge (downloaded 4,000 times)ai-driven-dev.ai-driven-dev (downloaded 3,300 times)yasuyuky.transient-emacs (downloaded 2,400 times)All three GlassWorm extensions are “still literally invisible” in code editors, the researchers note. They are encoded in unprintable Unicode characters that look like blank space to the human eye, but execute as JavaScript.The attackers have posted new transactions to the Solana blockchain that outline updated…
-
How GlassWorm wormed its way back into developers’ code, and what it says about open source security
Tags: access, ai, attack, blockchain, ciso, control, credentials, crypto, cybersecurity, data, data-breach, endpoint, exploit, framework, github, google, infrastructure, law, malicious, malware, marketplace, monitoring, open-source, resilience, service, software, supply-chain, threat, tool, update, wormadhamu.history-in-sublime-merge (downloaded 4,000 times)ai-driven-dev.ai-driven-dev (downloaded 3,300 times)yasuyuky.transient-emacs (downloaded 2,400 times)All three GlassWorm extensions are “still literally invisible” in code editors, the researchers note. They are encoded in unprintable Unicode characters that look like blank space to the human eye, but execute as JavaScript.The attackers have posted new transactions to the Solana blockchain that outline updated…
-
Enforcement begins for New York’s algorithmic pricing law
California’s legislature also has enacted an algorithmic pricing law, but it has not yet taken effect, making New York the first state in the country to regulate the practice. First seen on therecord.media Jump to article: therecord.media/enforcement-begins-new-york-pricing-law
-
Short-term renewal of cyber information sharing law appears in bill to end shutdown
An expired 2015 law that gives companies liability protection when they share cyberthreat information with the federal government would be renewed through January 30 under Senate legislation to end the government shutdown. First seen on therecord.media Jump to article: therecord.media/cisa-2015-information-sharing-law-renewal-bill-ending-shutdown
-
Short-term renewal of cyber information sharing law appears in bill to end shutdown
An expired 2015 law that gives companies liability protection when they share cyberthreat information with the federal government would be renewed through January 30 under Senate legislation to end the government shutdown. First seen on therecord.media Jump to article: therecord.media/cisa-2015-information-sharing-law-renewal-bill-ending-shutdown
-
European Commission moves to loosen GDPR for AI and cookie tracking
AI training gets green light: The proposal directly addressed one of the most contentious issues in EU privacy law: whether companies can train AI systems using personal data.The draft stated that AI training, testing, and validation may be conducted under the GDPR’s “legitimate interest” basis, as long as companies implement safeguards such as data minimization,…
-
European Commission moves to loosen GDPR for AI and cookie tracking
AI training gets green light: The proposal directly addressed one of the most contentious issues in EU privacy law: whether companies can train AI systems using personal data.The draft stated that AI training, testing, and validation may be conducted under the GDPR’s “legitimate interest” basis, as long as companies implement safeguards such as data minimization,…
-
European Commission moves to loosen GDPR for AI and cookie tracking
AI training gets green light: The proposal directly addressed one of the most contentious issues in EU privacy law: whether companies can train AI systems using personal data.The draft stated that AI training, testing, and validation may be conducted under the GDPR’s “legitimate interest” basis, as long as companies implement safeguards such as data minimization,…
-
European Commission moves to loosen GDPR for AI and cookie tracking
AI training gets green light: The proposal directly addressed one of the most contentious issues in EU privacy law: whether companies can train AI systems using personal data.The draft stated that AI training, testing, and validation may be conducted under the GDPR’s “legitimate interest” basis, as long as companies implement safeguards such as data minimization,…
-
Cyber information sharing law would get extension under shutdown deal bill
The Cybersecurity and Information Sharing Act of 2015 would go from expired to extended through Jan. 30. First seen on cyberscoop.com Jump to article: cyberscoop.com/cisa-2015-shutdown-extension-continuing-resolution/
-
Cyber information sharing law would get extension under shutdown deal bill
The Cybersecurity and Information Sharing Act of 2015 would go from expired to extended through Jan. 30. First seen on cyberscoop.com Jump to article: cyberscoop.com/cisa-2015-shutdown-extension-continuing-resolution/
-
Cyber information sharing law would get extension under shutdown deal bill
The Cybersecurity and Information Sharing Act of 2015 would go from expired to extended through Jan. 30. First seen on cyberscoop.com Jump to article: cyberscoop.com/cisa-2015-shutdown-extension-continuing-resolution/

