Tag: law
-
CISO Julie Chatman offers insights for you to take control of your security leadership role
Tags: access, ai, attack, awareness, breach, business, ciso, control, crowdstrike, cyber, cybersecurity, deep-fake, email, finance, firewall, government, healthcare, infrastructure, law, military, office, phishing, risk, service, skills, supply-chain, technology, threat, training, updateFirst, the hopes-and-dreams budget: What would it take to close all the known gaps and operate proactively?Second, the could-live-with-this budget: What’s realistic and gets you to acceptable risk levels?Third, the I-think-I’m-going-to-resign budget: Because you can see a breach coming and you don’t want your name attached to it.You probably won’t end up at that last…
-
CISO Julie Chatman offers insights for you to take control of your security leadership role
Tags: access, ai, attack, awareness, breach, business, ciso, control, crowdstrike, cyber, cybersecurity, deep-fake, email, finance, firewall, government, healthcare, infrastructure, law, military, office, phishing, risk, service, skills, supply-chain, technology, threat, training, updateFirst, the hopes-and-dreams budget: What would it take to close all the known gaps and operate proactively?Second, the could-live-with-this budget: What’s realistic and gets you to acceptable risk levels?Third, the I-think-I’m-going-to-resign budget: Because you can see a breach coming and you don’t want your name attached to it.You probably won’t end up at that last…
-
GUEST ESSAY: The hidden risks lurking beneath legal AI, permission sprawl, governance drift
In many law firms today, leadership believes their data is secure. Policies are documented, annual reviews are completed, and vendor questionnaires are answered with confidence. On paper, the safeguards look strong. Related: The cost of law firm breaches Yet in… (more”¦) First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/02/guest-essay-the-hidden-risks-lurking-beneath-legal-ai-permission-sprawl-governance-drift/
-
UK sets course for stricter AI chatbot regulation
The UK government has announced immediate action to force AI chatbot providers to comply with laws requiring online platforms to protect children from illegal and harmful … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/02/16/uk-ai-chatbot-rules-child-online-safety/
-
CISO Julie Chatman wants to help you take control of your security leadership role
Tags: access, ai, attack, awareness, breach, business, ciso, control, crowdstrike, cyber, cybersecurity, deep-fake, email, finance, firewall, government, healthcare, infrastructure, law, military, office, phishing, risk, service, skills, supply-chain, technology, threat, training, updateFirst, the hopes-and-dreams budget: What would it take to close all the known gaps and operate proactively?Second, the could-live-with-this budget: What’s realistic and gets you to acceptable risk levels?Third, the I-think-I’m-going-to-resign budget: Because you can see a breach coming and you don’t want your name attached to it.You probably won’t end up at that last…
-
The Law of Cyberwar is Pretty Discombobulated
This article explores the complexities of cyberwarfare, emphasizing the need to reconsider how we categorize cyber operations within the framework of the Law of Armed Conflict (LOAC). It discusses the challenges posed by AI in transforming traditional warfare notions and highlights the potential risks associated with the misuse of emerging technologies in conflicts. First seen…
-
European Commission: TikTok’s addictive design breaches EU law
In a preliminary ruling, European Commission says TikTok’s additive design features are in breach of laws designed to create safer digital spaces First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366639072/European-Commission-TikToks-addictive-design-breaches-EU-law
-
California fines Disney $2.75 million for data privacy violations
Disney has agreed to pay a $2.75 million to the state of California over allegations that it broke the state’s landmark privacy law by making it exceedingly difficult for consumers to opt out of having their data shared and sold. First seen on therecord.media Jump to article: therecord.media/california-fines-disney-data-privacy
-
Fake CAPTCHA Attacks Exploit Key Entry Point for LummaStealer Malware
Fake CAPTCHA attacks are now a key entry point for a new wave of LummaStealer infections, with CastleLoader loaders turning simple web clicks into full system compromise. Less than a year after a major law-enforcement takedown, the infostealer’s operators have rebuilt at scale and are again harvesting credentials, crypto wallets, and personal data worldwide. LummaStealer…
-
40 state AGs warn House KOSA bill falls short of protecting children online
Tags: lawThe House bill lacks several components that are included in the Senate bill and allows a federal law to preempt existing tough state laws, state AGs said. First seen on therecord.media Jump to article: therecord.media/40-state-ags-warn-house-kosa-bill-falls-short
-
Chinese crypto scammer sentenced in absentia to 20 years after fleeing US
The Department of Justice said it will “work with our law enforcement partners around the world to ensure that Li is returned to the United States to serve his full sentence.” First seen on therecord.media Jump to article: therecord.media/chinese-crypto-scammer-sentenced-after-fleeing-us
-
Singapore Takes Down Chinese Hackers Targeting Telco Networks
Operation Cyber Guardian was Singapore’s largest and longest running anti-cyber threat law enforcement operation First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/singapore-takes-down-china-hackers/
-
EU: WhatsApp Likely Broke Antitrust Law by Blocking Rival AI
European Commission Intends to Force Meta to Open Chat App to Third Party AI. The European Commission said Meta appears to have broken antitrust law by blocking third-party AI assistants from interfacing with their users through WhatsApp. It gave notice to parent company that Europe intends to open up WhatsApp to third-party general-purpose AI assistants.…
-
Can a Cardiac Pacemaker Help Find a Missing Person?
Medical Device Cyber Experts Explain Data, Signal Constraints. As law enforcement investigate the abduction of 84-year-old Nancy Guthrie, medical device cyber experts cast doubt on whether her pacemaker might lead authorities to find her location, even as one researcher suggested the medical device may unwittingly transmit certain signals. First seen on govinfosecurity.com Jump to article:…
-
Who’s Liable When Embedded AI Goes Wrong?
Privacy Expert Chiara Rustici on Laws Governing Autonomous Robots, Embedded AI. As embedded AI moves from labs into real environments, organizations face growing liability risks. From border patrol robots to healthcare automation, leaders must understand how AI governance, product liability, data protection and security laws apply, said Chief Privacy Officer Chiara Rustici. First seen on…
-
Alleged 764 member arrested, charged with CSAM possession in New York
Tags: lawAuthorities have arrested multiple members of 764 during the past year, reflecting heightened law enforcement activity targeting the violent extremist collective. First seen on cyberscoop.com Jump to article: cyberscoop.com/764-member-arrested-charged-csam-new-york/
-
China-linked Amaranth-Dragon hackers target Southeast Asian governments in 2025
China-linked hackers tracked as Amaranth-Dragon targeted government and law enforcement agencies across Southeast Asia in 2025. CheckPoint says China-linked threat actors, tracked as Amaranth-Dragon, carried out cyber-espionage campaigns in 2025 targeting government and law enforcement agencies across Southeast Asia. The activity is linked to the APT41 ecosystem and affected countries including Thailand, Indonesia, Singapore, and…
-
Amaranth-Dragon Exploits WinRAR Vulnerability for Persistent Access to Victim Systems
A new cyber-espionage threat group dubbedAmaranth-Dragon. Active throughout 2025, this group has launched highly targeted attacks against government and law enforcement agencies across Southeast Asia. Evidence links Amaranth-Dragon to APT-41, a notorious Chinese state-sponsored hacking group, due to shared tools and operational time zones (UTC+8). The group creates attack campaigns based on local geopolitical events, such…
-
Cybersecurity planning keeps moving toward wholesociety models
National governments already run cybersecurity through a mix of ministries, regulators, law enforcement, and private operators that own most critical systems. In that … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/02/05/cybersecurity-planning-national-cybersecurity-strategy/
-
Cybersecurity planning keeps moving toward wholesociety models
National governments already run cybersecurity through a mix of ministries, regulators, law enforcement, and private operators that own most critical systems. In that … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/02/05/cybersecurity-planning-national-cybersecurity-strategy/
-
Cybersecurity planning keeps moving toward wholesociety models
National governments already run cybersecurity through a mix of ministries, regulators, law enforcement, and private operators that own most critical systems. In that … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/02/05/cybersecurity-planning-national-cybersecurity-strategy/
-
China-Linked Amaranth-Dragon Exploits WinRAR Flaw in Espionage Campaigns
Threat actors affiliated with China have been attributed to a fresh set of cyber espionage campaigns targeting government and law enforcement agencies across Southeast Asia throughout 2025.Check Point Research is tracking the previously undocumented activity cluster under the moniker Amaranth-Dragon, which it said shares links to the APT 41 ecosystem. Targeted countries include Cambodia, First…
-
New Amaranth Dragon cyberespionage group exploits WinRAR flaw
Tags: attack, china, cyberespionage, espionage, exploit, flaw, government, group, law, threat, vulnerabilityA new threat actor called Amaranth Dragon, linked to APT41 state-sponsored Chinese operations, exploited the CVE-2025-8088 vulnerability in WinRAR in espionage attacks on government and law enforcement agencies. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/new-amaranth-dragon-cyberespionage-group-exploits-winrar-flaw/
-
How Data Brokers Can Fuel Violence Against Public Servants
A new report from the Public Service Alliance finds state privacy laws offer public servants few ways to protect their private data, even as threats against them are on the rise. First seen on wired.com Jump to article: www.wired.com/story/how-data-brokers-can-fuel-violence-against-public-servants/
-
Drone sightings have doubled near UK military bases, warns British government
The surge in sightings has prompted the government to expand the powers available to service personnel to deal with the threat from uncrewed aerial vehicles without having to first involve law enforcement. First seen on therecord.media Jump to article: therecord.media/military-drone-sightings-double-uk-government
-
BreachForums Breach Exposes Names of 324K Cybercriminals, Upends the Threat Intel Game
The BreachForums marketplace has suffered a leak, exposing the identities of nearly 324,000 cybercriminals. This incident highlights a critical shift in cyberattacks, creating opportunities for law enforcement while demonstrating the risks associated with breaches in the cybercriminal ecosystem. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/02/breachforums-breach-exposes-names-of-324k-cybercriminals-upends-the-threat-intel-game/
-
The Case for a Ransom Payment Ban and When It Might Happen
Britain will likely ban at least some types of ransom payments as it revamps the nation’s cybersecurity laws, but many open questions remain, including sectors and the organizational sizes to be covered, and if all payments might be required to pass sanctions checks, said policy expert Jen Ellis. First seen on govinfosecurity.com Jump to article:…
-
Operation Switch Off dismantles major pirate TV streaming services
The latest phase of the global law enforcement action resulted in seizing three industrial-scale illegal IPTV services. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/legal/operation-switch-off-dismantles-major-pirate-tv-streaming-services/
-
Badges, Bytes and Blackmail
Behind the scenes of law enforcement in cyber: what do we know about caught cybercriminals? What brought them in, where do they come from and what was their function in the crimescape?Introduction: One view on the scattered fight against cybercrimeThe growing sophistication and diversification of cybercrime have compelled law enforcement agencies worldwide to respond through…

