Tag: law
-
Alan Turing Institute: UK can’t handle a fight against AI-enabled crims
by
in SecurityNewsLaw enforcement facing huge gap in ‘AI adoption’ First seen on theregister.com Jump to article: www.theregister.com/2025/04/04/nca_ati_ai_report/
-
EU Pushes for Backdoors in EndEnd Encryption
by
in SecurityNewsEuropean Commission Demands Law Enforcement Access to Data. The European Commission’s ProtectEU strategy aims to overhaul internal security, proposing law enforcement access to encrypted data by 2026 and a roadmap to explore lawful encryption backdoors and enhanced intelligence-sharing between EU member states and agencies to combat rising cyber threats. First seen on govinfosecurity.com Jump to…
-
Oracle quietly admits data breach, days after lawsuit accused it of cover-up
by
in SecurityNews
Tags: access, attack, authentication, breach, cloud, compliance, credentials, crime, cve, cybersecurity, data, data-breach, endpoint, exploit, finance, fraud, hacker, identity, infrastructure, intelligence, law, oracle, resilience, risk, service, strategy, supply-chain, technology, theft, threat, vulnerabilityLawsuit challenges Oracle’s response: The reports of Oracle’s acknowledgement of the breach come just days after the company was hit with a class action lawsuit over its handling of the security breach.The lawsuit specifically addresses a major security breach discovered in March that reportedly compromised 6 million records containing sensitive authentication-related data from Oracle Cloud…
-
Major Online Platform for Child Exploitation Dismantled
by
in SecurityNewsAn international law enforcement operation has shut down Kidflix, a platform for child sexual exploitation with 1.8m registered users First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/online-platform-child-exploitation/
-
Oracle quietly admits data breach, days after lawsuit accused it of cover-up
by
in SecurityNews
Tags: access, attack, authentication, breach, cloud, compliance, credentials, crime, cve, cybersecurity, data, data-breach, endpoint, exploit, finance, fraud, hacker, identity, infrastructure, intelligence, law, oracle, resilience, risk, service, strategy, supply-chain, technology, theft, threat, vulnerabilityLawsuit challenges Oracle’s response: The reports of Oracle’s acknowledgement of the breach come just days after the company was hit with a class action lawsuit over its handling of the security breach.The lawsuit specifically addresses a major security breach discovered in March that reportedly compromised 6 million records containing sensitive authentication-related data from Oracle Cloud…
-
Major Online Platform for Child Exploitation Dismantled
by
in SecurityNewsAn international law enforcement operation has shut down Kidflix, a platform for child sexual exploitation with 1.8m registered users First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/online-platform-child-exploitation/
-
Europol-led operation shuts down CSAM platform Kidflix, leading to 79 arrests
by
in SecurityNewsAn international law enforcement operation shuts down Kidflix, a child sexual abuse material (CSAM) streaming platform with 1.8M users. An international operation, codenamed Operation Stream, against child sexual exploitation shuts down one of the largest streaming platforms that offered child sexual abuse material (CSAM) in the world, Kidflix. The investigation was led by the State…
-
Navigating Saudi Arabia’s Personal Data Protection Law (PDPL): A Guide to Compliance
by
in SecurityNews
Tags: access, ai, compliance, control, data, GDPR, governance, guide, identity, intelligence, law, monitoring, privacy, serviceNavigating Saudi Arabia’s Personal Data Protection Law (PDPL): A Guide to Compliance madhav Thu, 04/03/2025 – 04:30 The Kingdom of Saudi Arabia (KSA) has taken a significant step towards bolstering data protection with its Personal Data Protection Law (PDPL), marking a pivotal moment in the region’s digital landscape. The PDPL, enforced by the Saudi Data…
-
Europol Dismantles Kidflix With 72,000 CSAM Videos Seized in Major Operation
by
in SecurityNews
Tags: lawIn one of the largest coordinated law enforcement operations, authorities have dismantled Kidflix, a streaming platform that offered child sexual abuse material (CSAM).”A total of 1.8 million users worldwide logged on to the platform between April 2022 and March 2025,” Europol said in a statement. “On March 11, 2025, the server, which contained around 72,000…
-
Don’t cut CISA personnel, House panel leaders say, as they plan legislation giving the agency more to do
by
in SecurityNewsReps. Andrew Garbarino and Eric Swalwell said legislative priorities include an expiring information-sharing law and making a threat information-sharing organization permanent. First seen on cyberscoop.com Jump to article: cyberscoop.com/cisa-workforce-cuts-house-leaders-legislation/
-
How an Interdiction Mindset Can Help Win War on Cyberattacks
by
in SecurityNewsThe US military and law enforcement learned to outthink insurgents. It’s time for cybersecurity to learn to outsmart and outmaneuver threat actors with the same framework. First seen on darkreading.com Jump to article: www.darkreading.com/cyberattacks-data-breaches/how-interdiction-mindset-cyberattacks
-
Threat-informed defense for operational technology: Moving from information to action
by
in SecurityNews
Tags: access, ai, attack, automation, blueteam, cloud, control, crime, cyber, cyberattack, cybercrime, cybersecurity, data, defense, detection, exploit, finance, fortinet, framework, group, incident response, infrastructure, intelligence, law, malicious, malware, mitre, network, phishing, PurpleTeam, ransomware, RedTeam, resilience, risk, service, soar, strategy, tactics, technology, threat, tool, usaThe rise of cybercrime-as-a-service Today’s macro threat landscape is a flourishing ecosystem of cybercrime facilitated by crime-as-a-service (CaaS) models. Cybercriminal networks now operate like legitimate businesses, with specialized units dedicated to activities such as money laundering, malware development, and spear phishing. This ecosystem lowers the barrier to entry for cybercrime, enabling low-skilled adversaries to launch…
-
Police shuts down KidFlix child sexual exploitation platform
by
in SecurityNewsKidflix, one of the largest platforms used to host, share, and stream child sexual abuse material (CSAM) on the dark web, was shut down on March 11 following a joint action coordinated by German law enforcement. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/police-shuts-down-kidflix-child-sexual-exploitation-platform/
-
Gootloader Malware Resurfaces in Google Ads for Legal Docs
by
in SecurityNewsAttackers target a familiar industry, law professionals, by hiding the infostealer in ads delivered via Google-based malvertising. First seen on darkreading.com Jump to article: www.darkreading.com/cyberattacks-data-breaches/gootloader-malware-google-ads-legal-docs
-
North Korean IT worker scam spreading to Europe after US law enforcement crackdown
by
in SecurityNewsNorth Korea’s IT worker scam has expanded widely into Europe after years of focusing on U.S. companies, according to new research. First seen on therecord.media Jump to article: therecord.media/north-korean-it-worker-scam-spreads-to-europe
-
European Commission takes aim at endend encryption and proposes Europol become an EU FBI
by
in SecurityNewsThe Commission said it would create roadmaps regarding both the “lawful and effective access to data for law enforcement” and on encryption. First seen on therecord.media Jump to article: therecord.media/european-commission-takes-aim-encryption-europol-fbi-proposal
-
Russia tightens cybersecurity measures as financial fraud hits record high
by
in SecurityNewsVladimir Putin signed a law on Monday that prohibits state institutions, banks and others from using foreign messaging apps when communicating with customers. First seen on therecord.media Jump to article: therecord.media/russia-tightens-cyber-measures-as-fraud-hits-record-high
-
UK sets out new cyber reporting requirements for critical infrastructure
by
in SecurityNewsThe belated reworking of the country’s cybersecurity regulations comes three years after the previous government had prematurely described those laws as “updated” while failing to actually introduce the legislation. First seen on therecord.media Jump to article: therecord.media/uk-sets-out-cyber-reporting-requirements-critical-infrastructure
-
UK Police Are Ill-Equipped to Tackle AI Crimes
by
in SecurityNewsNew Turing Institute Report Urges Government to Create AI Crime Task Force. British law enforcement agencies are ill-equipped to tackle artificial intelligence-enabled cybercrime, a report by The Alan Turing Institute says, pointing to an enormous gap between police technical capabilities and the growing sophistication of threat actors. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/uk-police-are-ill-equipped-to-tackle-ai-crimes-a-27888
-
Reassessing UK law enforcement data adequacy
by
in SecurityNewsComputer Weekly takes stock of proposed changes to the UK’s law enforcement data protection rules and how it could affect data adequacy with the European Union First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366621775/Reassessing-UK-law-enforcement-data-adequacy
-
UK law enforcement data adequacy at risk
by
in SecurityNewsThe UK government says reforms to police data protection rules will help to simplify law enforcement data processing, but critics argue the changes will lower protection to the point where the UK risks losing its European data adequacy First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366621774/UK-law-enforcement-data-adequacy-at-risk
-
Russian Hackers Leverage Bulletproof Hosting to Shift Network Infrastructure
by
in SecurityNewsRussian-aligned cyber threat groups, UAC-0050 and UAC-0006, have significantly escalated their operations in 2025, targeting entities worldwide with a focus on Ukraine. These groups employ bulletproof hosting services to mask their network infrastructure, enabling sophisticated campaigns involving financial theft, espionage, and psychological operations. UAC-0050, linked to Russian law enforcement agencies, has transitioned to deploying NetSupport…
-
Understanding Privacy Changes: eBay’s AI Policy and The Future of Data Privacy
In this episode, host Tom Eston discusses recent privacy changes on eBay related to AI training and the implications for user data. He highlights the hidden opt-out feature for AI data usage and questions the transparency of such policies, especially in regions without strict privacy laws like the United States. The host also explores how……
-
Understanding Privacy Changes: eBay’s AI Policy and The Future of Data Privacy
In this episode, host Tom Eston discusses recent privacy changes on eBay related to AI training and the implications for user data. He highlights the hidden opt-out feature for AI data usage and questions the transparency of such policies, especially in regions without strict privacy laws like the United States. The host also explores how……
-
12 Cybercriminals Arrested After Ghost Communication Platform Shutdown
by
in SecurityNewsLaw enforcement agencies have successfully dismantled a clandestine communication platform known as >>Ghost,
-
Legal impact on cybersecurity in 2025: new developments and challenges in the EU
by
in SecurityNews
Tags: 5G, authentication, compliance, corporate, cybersecurity, dora, finance, framework, fraud, identity, law, network, regulation, resilience, risk, service, strategy, technology, theftDORA Regulation: digital operational resilience in the financial sector: Regulation 2022/2554 (DORA) focuses on increasing the “Digital Operational Resilience” of financial institutions. Approved on 14 December 2022, DORA seeks to strengthen the security and robustness of financial sector entities’ information systems, with the aim of reducing technological risks and cyberthreats.As mentioned, DORA is applicable to…
-
Understanding RDAP: The Future of Domain Registration Data Access
by
in SecurityNews
Tags: access, api, attack, authentication, china, compliance, control, cyber, cybercrime, cybersecurity, data, detection, exploit, framework, fraud, GDPR, incident response, infrastructure, intelligence, Internet, law, malicious, malware, phishing, privacy, regulation, service, threat, tool, vulnerability -
INTERPOL Arrests 306 Suspects, Seizes 1,842 Devices in Cross-Border Cybercrime Bust
by
in SecurityNewsLaw enforcement authorities in seven African countries have arrested 306 suspects and confiscated 1,842 devices as part of an international operation codenamed Red Card that took place between November 2024 and February 2025.The coordinated effort “aims to disrupt and dismantle cross-border criminal networks which cause significant harm to individuals and businesses,” INTERPOL said, adding it…
-
Thai officers intercept Starlink transmitters allegedly headed for Myanmar scam centers
by
in SecurityNewsThai law enforcement on Saturday reportedly confiscated 38 Starlink satellite internet transmitters allegedly intended to be used in scam compounds in Myanmar. First seen on therecord.media Jump to article: therecord.media/thai-officers-intercept-starlink-transmitters-myanmar-cyber-scam-compounds
-
Hackers steal sensitive data from Pennsylvania county during ransomware attack
by
in SecurityNewsThe government of Union County in central Pennsylvania said a recent ransomware attack exposed information related to law enforcement and other government business. First seen on therecord.media Jump to article: therecord.media/union-county-pennsylvania-ransomware-attack