Tag: law
-
US unseals complaint against Russian-Israeli accused of working for LockBit
by
in SecurityNewsRostislav Panev is facing 40 counts for allegedly working for the cybercrime group as a software developer from 2019 up until February 2024, the same month that law enforcement disrupted the LockBit scheme by seizing its darknet website and infrastructure.]]> First seen on therecord.media Jump to article: therecord.media/us-unseals-lockbit-complaint-israel
-
Cybersecurity Snapshot: CISA Hands Down Cloud Security Directive, While Threat from North Korean IT Workers Gets the Spotlight
by
in SecurityNews
Tags: access, ai, authentication, best-practice, business, china, cisa, cisco, cloud, computer, control, cyber, cybersecurity, data, data-breach, email, extortion, finance, framework, fraud, google, government, guide, hacker, identity, incident, incident response, infrastructure, intelligence, international, Internet, jobs, korea, kubernetes, law, lessons-learned, linux, login, malicious, microsoft, mobile, monitoring, network, north-korea, office, password, regulation, risk, risk-management, russia, service, software, tactics, technology, threat, tool, updateCheck out the new cloud security requirements for federal agencies. Plus, beware of North Korean government operatives posing as remote IT pros. Also, learn how water plants can protect their HMIs against cyberattacks. And get the latest on the U.S. cyber incident response framework; the CIS Benchmarks; and local and state governments’ cyber challenges. Dive…
-
Latest attempt to override UK’s outdated hacking law stalls
Amendments to the Data Bill that would have given the UK cyber industry a boost by updating restrictive elements of the Computer Misuse Act have failed to progress beyond a Lords committee First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366617109/Latest-attempt-to-override-UKs-outdated-hacking-law-stalls
-
The Year of Global AI and Cybersecurity Regulations: 7 GRC Predictions for 2025
by
in SecurityNewsAs 2025 approaches, emerging regulations and laws will affect how CISOs strategize and protect their organizations. With the increasing complexity of global compliance frameworks, understanding these changes is crucial for maintaining security and operational efficiency. Let’s discuss what I expect regarding regulatory shifts and their implications in 2025 and explore what CISOs and CCOs should……
-
Telegram’s algorithms promote extremist content, researchers say
by
in SecurityNewsTelegram’s “similar channels” feature, introduced last year, recommends extremist channels even when users browse channels on nonpolitical topics such as celebrities or technology, according to a report by the U.S. nonprofit legal advocacy organization Southern Poverty Law Center (SPLC).]]> First seen on therecord.media Jump to article: therecord.media/telegram-algorithm-promotes-extremist-content-researchers-say
-
European authorities say AI can use personal data without consent for training
by
in SecurityNewsThe European Data Protection Board (EDPB) issued a wide-ranging report on Wednesday exploring the many complexities and intricacies of modern AI model development. It said that it was open to potentially allowing personal data, without owner’s consent, to train models, as long as the finished application does not reveal any of that private information.This reflects…
-
NYDOH Cybersecurity Regulations: What Healthcare Providers Need to Know in 2025
by
in SecurityNews10 NYCRR 405.46: NY’s New Hospital Cyber Regulation Hospitals are no strangers to health data privacy laws like HIPAA. But New York’s new cybersecurity regulations take things to the next level. Finalized by the New York State Department of Health (NYDOH) in October 2024, these laws aim to fill gaps left by existing frameworks. They……
-
US eyes ban on TP-Link routers amid cybersecurity concerns
by
in SecurityNews
Tags: attack, business, china, compliance, computer, corporate, country, cyber, cyberattack, cybercrime, cybersecurity, ddos, defense, espionage, exploit, flaw, government, hacking, infrastructure, intelligence, law, malicious, microsoft, network, risk, router, technology, threat, vulnerability, wifiThe US government is investigating TP-Link, a Chinese company that supplies about 65% of routers for American homes and small businesses, amid concerns about national security risks. Reports suggest these routers have vulnerabilities that cybercriminals exploit to compromise sensitive enterprise data.Investigations by the Commerce, Defense, and Justice Departments indicate that the routers may have been…
-
Europol Details on How Cyber Criminals Exploit legal businesses for their Economy
Europol has published a groundbreaking report titled >>Leveraging Legitimacy: How the EU’s Most Threatening Criminal Networks Abuse Legal Business Structures.Decoding […] The post Europol Details on How Cyber Criminals Exploit legal businesses for their Economy appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform. First seen on gbhackers.com Jump to article: gbhackers.com/europol-details-on-cyber-criminals/
-
In potential reversal, European authorities say AI can indeed use personal data, without consent, for training
by
in SecurityNewsThe European Data Protection Board (EDPB) issued a wide-ranging report on Wednesday exploring the many complexities and intricacies of modern AI model development. It said that it was open to potentially allowing personal data, without owner’s consent, to train models, as long as the finished application does not reveal any of that private information.This reflects…
-
Ransomware in 2024: New players, bigger payouts, and smarter tactics
by
in SecurityNewsIn 2024, ransomware remained the top cybersecurity threat to organizations worldwide. New groups filled the void left by law enforcement crackdowns, targeting businesses with … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2024/12/19/ransomware-surveys-2024/
-
Proposed UK White Hat Legal Shield Fails in House of Lords
Amendment to Computer Misuse Act Fails During Bloc Vote. A proposed amendment to British anti-hacking law that would have provided a legal shield to white hat hackers failed Wednesday in the House of Lords. Under the Computer Misuse Act, access to a computer system without adequate consent from the system owner is illegal. First seen…
-
Understanding NIS2: Essential and Important Entities
by
in SecurityNewsNIS 2 aims to enhance the security of networks and information systems in the EU. Its main goal is to level up the cybersecurity game across Europe. It requires organisations in critical sectors to take cybersecurity seriously. The transposition of the NIS2 Directive into national law by member states emphasizes the deadline for compliance and……
-
Interpol replaces dehumanizing “Pig Butchering” term with “Romance Baiting”
by
in SecurityNewsInterpol calls on the cybersecurity community, law enforcement, and the media to stop using the term “Pig Butchering” when referring to online relationship and investment scams, as it unnecessarily shames the victims impacted by these fraud campaigns. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/interpol-replaces-dehumanizing-pig-butchering-term-with-romance-baiting/
-
Thai Police Systems Under Fire From ‘Yokai’ Backdoor
Hackers are abusing legitimate Windows utilities to target Thai law enforcement with a novel malware that is a mix of sophistication and amateurishness. First seen on darkreading.com Jump to article: www.darkreading.com/threat-intelligence/thai-police-systems-yokai-backdoor
-
A new ransomware regime is now targeting critical systems with weaker networks
by
in SecurityNews
Tags: access, attack, authentication, breach, control, corporate, credentials, cybercrime, data, defense, exploit, extortion, finance, flaw, fortinet, group, infrastructure, law, lockbit, malware, mfa, network, ransomware, risk, tactics, usa, vmware, vpn, vulnerability, zyxelThe year 2024’s ransomware shake-up, fueled by law enforcement crackdowns on giants like LockBit, has shifted focus to critical operations, with major attacks this year hitting targets like Halliburton, TfL, and Arkansas water plant.A Dragos study for the third quarter of 2024 highlighted a surge in activity from new groups like RansomHub, Play, and Fog,…
-
INTERPOL Urges to End ‘Pig Butchering’ Replaces With >>Romance Baiting<<
by
in SecurityNewsINTERPOL has called for the term >>romance baiting>pig butchering,>Romance Baiting
-
US Congressional Task Force Offers Roadmap for AI Governance
by
in SecurityNewsLawmakers Urge Washington to Adapt Current Laws to Avoid Duplication. The bipartisan House Task Force on AI released a final report Tuesday urging Congress to adopt an agile, incremental approach to AI policy, avoid duplicative regulations, support AI talent pathways and ensure privacy and transparency in AI governance while addressing its growing energy demands. First…
-
Nebraska AG sues Change Healthcare, UnitedHealth for data theft after ransomware attack
by
in SecurityNewsThe 29-page filing alleges violations of Nebraska’s consumer protection and data security laws and says Change Healthcare, which is owned by UnitedHealth Group (UHG), failed to implement proper security measures that exacerbated the data breach, disrupting critical healthcare services across the state.]]> First seen on therecord.media Jump to article: therecord.media/nebraska-ag-sues-change-healthcare-unitedhealth-after-ransomware-attack
-
Rydox cybercrime marketplace seized by law enforcement, suspected admins arrested
by
in SecurityNewsRydox, an online marketplace used by cybercriminals to sell hacked personal information and tools to commit fraud, has been seized in an international law enforcement operation and its suspected administrators arrested. First seen on bitdefender.com Jump to article: www.bitdefender.com/en-us/blog/hotforsecurity/rydox-cybercrime-marketplace-seixed-by-law-enforcement-suspected-admins-arrested
-
Rydox cybercrime marketplace seixed by law enforcement, suspected admins arrested
by
in SecurityNewsRydox, an online marketplace used by cybercriminals to sell hacked personal information and tools to commit fraud, has been seized in an international law enforcement operation and its suspected administrators arrested. First seen on bitdefender.com Jump to article: www.bitdefender.com/en-us/blog/hotforsecurity/rydox-cybercrime-marketplace-seixed-by-law-enforcement-suspected-admins-arrested
-
âš¡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips
by
in SecurityNewsThis past week has been packed with unsettling developments in the world of cybersecurity. From silent but serious attacks on popular business tools to unexpected flaws lurking in everyday devices, there’s a lot that might have flown under your radar. Attackers are adapting old tricks, uncovering new ones, and targeting systems both large and small.Meanwhile,…
-
ESET: RansomHub most active ransomware group in H2 2024
by
in SecurityNewsThe antimalware vendor says law enforcement operations against the LockBit ransomware gang were successful, but a new prolific group has emerged in its place. First seen on techtarget.com Jump to article: www.techtarget.com/searchsecurity/news/366617096/ESET-RansomHub-most-active-ransomware-group-in-H2-2024
-
Amnesty International exposes Serbian police’s use of spyware on journalists, activists
by
in SecurityNewsThe comprehensive report showed how Serbian law enforcement combined Cellebrite’s tech with a novel Android-focused spyware program. First seen on cyberscoop.com Jump to article: cyberscoop.com/amnesty-international-exposes-serbian-polices-use-of-spyware-on-journalists-activists/
-
Hackers Can Jailbreak Digital License Plates to Make Others Pay Their Tolls and Tickets
by
in SecurityNewsDigital license plates sold by Reviver, already legal to buy in some states and drive with nationwide, can be hacked by their owners to evade traffic regulations or even law enforcement surveillance. First seen on wired.com Jump to article: www.wired.com/story/digital-license-plate-jailbreak-hack/