Tag: law
-
US punts renewal of threat data sharing law to September
US lawmakers have extended the Cybersecurity Information Sharing Act of 2015 for another nine months, buying time to enact a replacement for the legislation. First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366637737/US-punts-renewal-of-threat-data-sharing-law-to-September
-
Ransomware gang’s slip-up led to data recovery for 12 US firms
Tags: access, attack, backup, breach, business, citrix, cloud, corporate, cyber, data, data-breach, detection, encryption, endpoint, exploit, finance, group, incident response, infosec, infrastructure, law, linux, network, phishing, powershell, ransom, ransomware, risk, software, spear-phishing, sql, threat, tool, veeam, vulnerabilityscrutinize and audit your backups. If you have a regular backup schedule, is there unexpected or unexplained activity? Von Ramin Mapp notes that crooks are known to time data exfiltration to match corporate off-site backups as a way to hide their work;monitor for encrypted data leaving your environments and see where it goes. Does this…
-
US Officials Urge Congress to Reauthorize Key Quantum Law
Feds Warn US May Lose Quantum Race Without Sustained Research Funding. Federal scientists told Congress that failure to reauthorize the National Quantum Initiative threatens to unravel coordinated research and development progress, stall commercialization and allow China to surpass U.S. leadership as adversaries accelerate post-quantum capabilities. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/us-officials-urge-congress-to-reauthorize-key-quantum-law-a-30585
-
Ireland plans law allowing law enforcement to use spyware
The Irish government plans to draft legislation that would make it legal for law enforcement to use spyware, Minister of Justice Jim O’Callaghan said. First seen on therecord.media Jump to article: therecord.media/ireland-plans-law-enforcement-spyware
-
House of Lords backs legislation to ban social media for children under 16
Tags: lawBritain’s House of Lords voted by an overwhelming margin to ban children under age 16 from accessing social media, setting up a vote on the law in the House of Commons. First seen on therecord.media Jump to article: therecord.media/house-lords-bans-social-media
-
Ireland proposes new law allowing police to use spyware
The Irish government announced that it wants to pass a law that would grant police more surveillance powers, such as using spyware to fight serious crime, while aiming to protect the privacy rights of its citizens. First seen on techcrunch.com Jump to article: techcrunch.com/2026/01/22/ireland-proposes-new-law-allowing-police-to-use-spyware/
-
Europe’s GDPR cops dished out Euro1.2B in fines last year as data breaches piled up
Regulators logged over 400 personal data breach notifications a day for first time since law came into force First seen on theregister.com Jump to article: www.theregister.com/2026/01/22/europes_gdpr_cops_dished_out/
-
Securing the Future: Practical Approaches to Digital Sovereignty in Google Workspace
Tags: access, attack, ciso, cloud, compliance, computing, container, control, data, defense, dora, email, encryption, GDPR, google, Hardware, healthcare, identity, infrastructure, law, malware, network, privacy, regulation, resilience, risk, service, software, strategy, zero-trustSecuring the Future: Practical Approaches to Digital Sovereignty in Google Workspace madhav Thu, 01/22/2026 – 04:35 In today’s rapidly evolving digital landscape, data privacy and sovereignty have become top priorities for organizations worldwide. With the proliferation of cloud services and the tightening of global data protection regulations, security professionals face mounting pressure to ensure their…
-
Breach Notifications in Europe Rise, While Fines Hold Steady
$1.4 Billion in Known Fines Levied in 2025, Despite Criticism From Outside EU. The volume of data breach notifications being issued to Europeans increased by one-fifth over the past year, while the total fines being imposed by data protection authorities held steady, adding up to 1.2 billion euros for the second year in a row,…
-
Supreme Court to consider whether geofence warrants are constitutional
The Supreme Court agreed to hear a case challenging the constitutionality of geofence warrants, which let law enforcement compel companies to provide the location data of cell phones at specific times and places. First seen on therecord.media Jump to article: therecord.media/supreme-court-geofence-constitutionality
-
Europe Readies Law to Eject Chinese Equipment From Telecoms
Revised Cybersecurity Act Would Also Boost ENISA. Countries across the EU could be forced to kick Chinese telecom manufacturers such as Huawei and ZTE out of their critical infrastructure supply chains, under a far-reaching proposal published by the European Commission on Tuesday. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/europe-readies-law-to-eject-chinese-equipment-from-telecoms-a-30566
-
Europe Readies Law to Eject Chinese Equipment From Telecoms
Revised Cybersecurity Act Would Also Boost ENISA. Countries across the EU could be forced to kick Chinese telecom manufacturers such as Huawei and ZTE out of their critical infrastructure supply chains, under a far-reaching proposal published by the European Commission on Tuesday. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/europe-readies-law-to-eject-chinese-equipment-from-telecoms-a-30566
-
Congressional appropriators move to extend information-sharing law, fund CISA
The legislation also includes mandates on election security funding and CISA staff levels, as well as an extension of a state and local cyber grant program. First seen on cyberscoop.com Jump to article: cyberscoop.com/congressional-appropriators-move-to-extend-information-sharing-law-fund-cisa/
-
Congressional appropriators move to extend information-sharing law, fund CISA
The legislation also includes mandates on election security funding and CISA staff levels, as well as an extension of a state and local cyber grant program. First seen on cyberscoop.com Jump to article: cyberscoop.com/congressional-appropriators-move-to-extend-information-sharing-law-fund-cisa/
-
UK launches landmark ‘Report Fraud’ service to tackle cybercrime and fraud
British authorities are rolling out Report Fraud, a platform intended to win back public trust over how law enforcement responds to widespread cybercrime and fraud. First seen on therecord.media Jump to article: therecord.media/uk-report-fraud-platform-launch-police-cybercrime
-
UK copyright law unfit for protecting creative workers from AI
As the UK government considers its approach to artificial intelligence and copyright, Computer Weekly explores the dynamics at play in copyright markets, and what measures can be taken to ensure that creatives are protected First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366637299/UK-copyright-unfit-for-protecting-creative-workers-from-AI
-
Law enforcement tracks ransomware group blamed for massive financial losses
Law enforcement agencies in Ukraine and Germany have identified two members of a Russian-affiliated ransomware group and carried out searches in western Ukraine. Search … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/01/19/international-ransomware-group-investigation-ukraine/
-
The Year Ransomware Went Fully Decentralized: Cyble’s 2025 Threat Analysis
Cyble’s Annual Threat Landscape Report for 2025 documents a cybercrime environment that remained volatile even as international law enforcement agencies escalated disruption efforts. Large-scale takedowns, arrests, and infrastructure seizures failed to slow adversaries for long. Instead, cybercriminal ecosystems fractured, reorganized, and re-emerged across decentralized platforms, encrypted messaging channels, and invitation-only forums. The ransomware landscape, in particular, demonstrated a capacity…
-
Ring’s Facial Recognition Feature: Convenience or Privacy Nightmare?
In this episode, we explore Amazon Ring’s newly introduced Familiar Faces feature that utilizes AI for facial recognition. We discuss the convenience of identifying familiar people at your doorstep, the privacy concerns it raises, and the legal implications surrounding biometric data. Learn about how this feature works, potential inaccuracies, and privacy laws in certain U.S….…
-
EU and INTERPOL Hunt Black Basta Ransomware Kingpin, Suspects Identified in Ukraine
European and international law enforcement agencies have intensified their pursuit of individuals connected to the Black Basta ransomware operation. Authorities confirmed that the alleged leader of the Russia-linked ransomware-as-a-service (RaaS) group has been placed on both the European Union’s Most Wanted list and INTERPOL’s Red Notice, while Ukrainian and German investigators have identified two additional…
-
Who’s Stalking Whom? ICE Uses Social Media and Phone Surveillance System to Track Protesters
ICE protests surveillance yet uses tech to track citizens’ devices, possibly violating privacy laws and the Fourth Amendment, revealed through ICE’s data tools. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/01/whos-stalking-whom-ice-uses-social-media-and-phone-surveillance-system-to-track-protesters/
-
UkraineGermany operation targets Black Basta, Russian leader wanted
Police in Ukraine and Germany identified Black Basta suspects and issued an international wanted notice for the group’s alleged Russian leader. Ukrainian and German police raided homes linked to alleged Black Basta ransomware members, identifying two Ukrainian suspects. Law enforcement also issued an international wanted notice for the group’s alleged Russian ringleader. >>The Office of…
-
Black Basta Ransomware Leader Added to EU Most Wanted and INTERPOL Red Notice
Ukrainian and German law enforcement authorities have identified two Ukrainians suspected of working for the Russia-linked ransomware-as-a-service (RaaS) group Black Basta.In addition, the group’s alleged leader, a 35-year-old Russian national named Oleg Evgenievich Nefedov (Ðефедов Олег Евгеньевич), has been added to the European Union’s Most Wanted and INTERPOL’s Red Notice lists, authorities First seen on…
-
Black Basta Ransomware Leader Added to EU Most Wanted and INTERPOL Red Notice
Ukrainian and German law enforcement authorities have identified two Ukrainians suspected of working for the Russia-linked ransomware-as-a-service (RaaS) group Black Basta.In addition, the group’s alleged leader, a 35-year-old Russian national named Oleg Evgenievich Nefedov (Ðефедов Олег Евгеньевич), has been added to the European Union’s Most Wanted and INTERPOL’s Red Notice lists, authorities First seen on…
-
Ransomware by the Numbers: Count of Victims and Groups Surge
Despite Some Well-Known Groups Disappearing, Ransomware Competition Remains Fierce. Here’s unwelcome ransomware news: Groups’ victim listings and underground chatter suggest that the count of victims and number of criminal groups behind such attacks have both risen over the past 12 months, despite repeat disruptions by law enforcement, fierce competition and fewer victims paying. First seen…
-
Microsoft Legal Action Disrupts RedVDS Cybercrime Infrastructure Used for Online Fraud
Microsoft on Wednesday announced that it has taken a “coordinated legal action” in the U.S. and the U.K. to disrupt a cybercrime subscription service called RedVDS that has allegedly fueled millions in fraud losses.The effort, per the tech giant, is part of a broader law enforcement effort in collaboration with law enforcement authorities that has…
-
Microsoft, Law Enforcement Disrupt RedVDS Global Cybercrime Service
Microsoft and law enforcement agencies in Europe disrupted the operations of RedVDS, a global cybercrime service that sold cheap and disposable dedicated virtual servers to threat actors that used them to run BEC, phishing, and other fraud campaigns. The vendor now wants to shut down its payment networks and find the operators behind it. First…
-
Microsoft Disrupts Cybercrime Service RedVDS
RedVDS, a cybercrime-as-a-service operation that has stolen millions from victims, lost two domains to a law enforcement operation supported by Microsoft. First seen on darkreading.com Jump to article: www.darkreading.com/threat-intelligence/microsoft-disrupts-cybercrime-service-redvds
-
Microsoft disrupts RedVDS cybercrime platform behind $40 million in scam losses
Microsoft and law enforcement partners took down a popular cybercriminal subscription service called RedVDS that was used to enable more than $40 million in fraud losses in the United States alone. First seen on therecord.media Jump to article: therecord.media/microsoft-redvds-cybercrime-scam
-
US cybersecurity weakened by congressional delays despite Plankey renomination
Tags: business, cisa, cyber, cybersecurity, government, infrastructure, law, network, risk, strategy, threatCISA 2015 reauthorization: Likely, but late and suboptimal: A major cybersecurity bill called the Cybersecurity Information Sharing Act of 2015 (CISA 2015), which expired on Sept. 30, was temporarily revived on Nov. 13 and given a two-month lease on life through Jan. 30, 2026. The law provides critical legal liability protections that enable cyber threat…

