Tag: law
-
Police Target Violent Online Predators Incubated by the Com
28 Countries Join Forces to Pursue Violent Online Extremism Targeting Children. A global law enforcement initiative to coordinate the disruption of violent online extremism targeting minors and vulnerable individuals swept up 30 suspected members of The Com, the decentralized, largely Western adolescent cybercrime community. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/police-target-violent-online-predators-incubated-by-com-a-30856
-
Police Target Violent Online Predators Incubated by the Com
28 Countries Join Forces to Pursue Violent Online Extremism Targeting Children. A global law enforcement initiative to coordinate the disruption of violent online extremism targeting minors and vulnerable individuals swept up 30 suspected members of The Com, the decentralized, largely Western adolescent cybercrime community. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/police-target-violent-online-predators-incubated-by-com-a-30856
-
The Global Fight Over Who Controls Your Data Just Escalated, Here’s What the Numbers Say
A new diplomatic offensive against foreign privacy laws collides with fresh research showing that weakening data sovereignty protections is the last thing organizations need right now. The post The Global Fight Over Who Controls Your Data Just Escalated, Here’s What the Numbers Say appeared first on TechRepublic. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/news-data-sovereignty-cloud-security-report/
-
Chinese group’s ChatGPT use reveals worldwide harassment campaign against critics
OpenAI said a Chinese law enforcement agency uploaded reports to ChatGPT that details a worldwide digital operation to track and silence regime critics at home and abroad. First seen on cyberscoop.com Jump to article: cyberscoop.com/chinese-chatgpt-online-harassment-campaign-against-critics-dissidents/
-
Operation Red Card 2.0 Leads to 651 Arrests in Africa
In the latest operation targeting cybercrime groups, African law enforcement agencies cooperated with Interpol and cybersecurity firms to recover more than USD 4.3 million. First seen on darkreading.com Jump to article: www.darkreading.com/cybersecurity-operations/operation-red-card-2-0-leads-to-651-arrests-in-africa
-
US ‘committed’ to fighting transnational gangs behind Southeast Asian scam compounds: FBI
Scott Schelble, the deputy assistant director of the FBI’s International Operations Division, told reporters that he recently met with law enforcement officials in Thailand, Cambodia and Vietnam to discuss the region’s scam operations. First seen on therecord.media Jump to article: therecord.media/us-committed-to-fighting-southeast-asia-scam-compounds
-
Global regulators say AI image tools don’t get a free pass on privacy rules
Watchdogs warn models that can generate realistic images of people must comply with data protection laws First seen on theregister.com Jump to article: www.theregister.com/2026/02/23/privacy_watchdogs_ai_images/
-
TDL 016 – Speed, Risk, and Responsibility in the Age of AI – Rafael Ramirez
Tags: access, ai, antivirus, automation, awareness, business, ciso, cloud, control, country, cyber, data, defense, detection, dns, firewall, governance, government, hacker, ibm, incident response, intelligence, Internet, law, linkedin, login, mfa, microsoft, network, risk, saas, service, skills, software, startup, strategy, technology, threat, tool, training, update, vulnerability, windows, zero-trustSummary In a recent episode of The Defenders Log, host David Redekop sat down with cyber security expert Rafael Ramirez to navigate the rapidly shifting landscape of AI security. As we move deeper into 2026, the duo explored how artificial intelligence has evolved from simple chatbots into powerful, autonomous “agentic” systems. The Double-Edged Sword of…
-
Red Card 2.0: INTERPOL busts scam networks across Africa, seizes millions
INTERPOL’s Operation Red Card 2.0 led to 651 arrests across 16 African countries and recovered over $4.3 million from online scams. INTERPOL’s Operation Red Card 2.0, a joint effort involving law enforcement agencies from 16 African countries, resulted in 651 arrests linked to online scam networks. The operation was carried out under the African Joint…
-
651 arrested, $4.3 million recovered in African cybercrime sweep
Operation Red Card 2.0, supported by INTERPOL and involving law enforcement agencies from 16 African countries, led to 651 arrests and the recovery of more than $4.3 million … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/02/20/interpol-operation-red-card-2-0-africa-cybercrime/
-
UK to require tech firms to remove nonconsensual intimate images within 48 hours or face fines
U.K. Prime Minister Keir Starmer announced a new law that will require tech companies to remove intimate images shared without consent within two days or face large fines and potentially have their services blocked. First seen on therecord.media Jump to article: therecord.media/united-kingdom-noncensual-images-fines
-
INTERPOL Operation Red Card 2.0 Arrests 651 in African Cybercrime Crackdown
An international cybercrime operation against online scams has led to 651 arrests and recovered more than $4.3 million as part of an effort led by law enforcement agencies from 16 African countries.The initiative, codenamed Operation Red Card 2.0, took place between December 8, 2025 and January 30, 2026, according to INTERPOL. It targeted infrastructure and…
-
Texas Sues TP-Link for Covering Up Chinese Manufacturing
Router Maker Accuses Rivals, Competitors of Smear Campaign. The Texas attorney general invoked state consumer protection law to sue Wi-Fi router maker TP-Link Systems for misrepresenting its connections to mainland China and the security of its ubiquitous devices. The suit says TP-Link should be forced to declare that their products are made in China. First…
-
Amazon’s Ring Scraps Law Enforcement Integration Amid Surveillance Conflagrations
Tags: lawAmazon.com Inc.’s Ring terminated its high-profile partnership with police surveillance firm Flock Safety following a wave of public scrutiny over its expanding role in neighborhood monitoring. The two companies announced a joint decision to end the integration, which was originally intended to allow Ring users to share video footage directly with law enforcement through Flock’s..…
-
Dutch police arrest man who refused to delete confidential files shared by mistake
Tags: lawDutch police have arrested a 40-year-old man who refused to delete confidential documents law enforcement accidentally sent to him. First seen on therecord.media Jump to article: therecord.media/netherlands-arrest-confidential-files-police
-
CISO Julie Chatman offers insights for you to take control of your security leadership role
Tags: access, ai, attack, awareness, breach, business, ciso, control, crowdstrike, cyber, cybersecurity, deep-fake, email, finance, firewall, government, healthcare, infrastructure, law, military, office, phishing, risk, service, skills, supply-chain, technology, threat, training, updateFirst, the hopes-and-dreams budget: What would it take to close all the known gaps and operate proactively?Second, the could-live-with-this budget: What’s realistic and gets you to acceptable risk levels?Third, the I-think-I’m-going-to-resign budget: Because you can see a breach coming and you don’t want your name attached to it.You probably won’t end up at that last…
-
CISO Julie Chatman offers insights for you to take control of your security leadership role
Tags: access, ai, attack, awareness, breach, business, ciso, control, crowdstrike, cyber, cybersecurity, deep-fake, email, finance, firewall, government, healthcare, infrastructure, law, military, office, phishing, risk, service, skills, supply-chain, technology, threat, training, updateFirst, the hopes-and-dreams budget: What would it take to close all the known gaps and operate proactively?Second, the could-live-with-this budget: What’s realistic and gets you to acceptable risk levels?Third, the I-think-I’m-going-to-resign budget: Because you can see a breach coming and you don’t want your name attached to it.You probably won’t end up at that last…
-
GUEST ESSAY: The hidden risks lurking beneath legal AI, permission sprawl, governance drift
In many law firms today, leadership believes their data is secure. Policies are documented, annual reviews are completed, and vendor questionnaires are answered with confidence. On paper, the safeguards look strong. Related: The cost of law firm breaches Yet in… (more”¦) First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/02/guest-essay-the-hidden-risks-lurking-beneath-legal-ai-permission-sprawl-governance-drift/
-
UK sets course for stricter AI chatbot regulation
The UK government has announced immediate action to force AI chatbot providers to comply with laws requiring online platforms to protect children from illegal and harmful … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/02/16/uk-ai-chatbot-rules-child-online-safety/
-
CISO Julie Chatman wants to help you take control of your security leadership role
Tags: access, ai, attack, awareness, breach, business, ciso, control, crowdstrike, cyber, cybersecurity, deep-fake, email, finance, firewall, government, healthcare, infrastructure, law, military, office, phishing, risk, service, skills, supply-chain, technology, threat, training, updateFirst, the hopes-and-dreams budget: What would it take to close all the known gaps and operate proactively?Second, the could-live-with-this budget: What’s realistic and gets you to acceptable risk levels?Third, the I-think-I’m-going-to-resign budget: Because you can see a breach coming and you don’t want your name attached to it.You probably won’t end up at that last…
-
The Law of Cyberwar is Pretty Discombobulated
This article explores the complexities of cyberwarfare, emphasizing the need to reconsider how we categorize cyber operations within the framework of the Law of Armed Conflict (LOAC). It discusses the challenges posed by AI in transforming traditional warfare notions and highlights the potential risks associated with the misuse of emerging technologies in conflicts. First seen…
-
European Commission: TikTok’s addictive design breaches EU law
In a preliminary ruling, European Commission says TikTok’s additive design features are in breach of laws designed to create safer digital spaces First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366639072/European-Commission-TikToks-addictive-design-breaches-EU-law
-
California fines Disney $2.75 million for data privacy violations
Disney has agreed to pay a $2.75 million to the state of California over allegations that it broke the state’s landmark privacy law by making it exceedingly difficult for consumers to opt out of having their data shared and sold. First seen on therecord.media Jump to article: therecord.media/california-fines-disney-data-privacy
-
Fake CAPTCHA Attacks Exploit Key Entry Point for LummaStealer Malware
Fake CAPTCHA attacks are now a key entry point for a new wave of LummaStealer infections, with CastleLoader loaders turning simple web clicks into full system compromise. Less than a year after a major law-enforcement takedown, the infostealer’s operators have rebuilt at scale and are again harvesting credentials, crypto wallets, and personal data worldwide. LummaStealer…
-
40 state AGs warn House KOSA bill falls short of protecting children online
Tags: lawThe House bill lacks several components that are included in the Senate bill and allows a federal law to preempt existing tough state laws, state AGs said. First seen on therecord.media Jump to article: therecord.media/40-state-ags-warn-house-kosa-bill-falls-short
-
Chinese crypto scammer sentenced in absentia to 20 years after fleeing US
The Department of Justice said it will “work with our law enforcement partners around the world to ensure that Li is returned to the United States to serve his full sentence.” First seen on therecord.media Jump to article: therecord.media/chinese-crypto-scammer-sentenced-after-fleeing-us

