Tag: enforcement

  • News: Key figures behind Phobos and 8Base ransomware arrested in international cybercrime crackdown

    Source URL: https://www.europol.europa.eu/media-press/newsroom/news/key-figures-behind-phobos-and-8base-ransomware-arrested-in-international-cybercrime-crackdown Source: News Title: Key figures behind Phobos and 8Base ransomware arrested in international cybercrime crackdown Feedly Summary: This follows a series of high-impact arrests targeting Phobos ransomware:An administrator of Phobos was arrested in South Korea in June 2024 and extradited to the United States in November of the same year. He is…

  • The Register: Apple warns ‘extremely sophisticated attack’ may be targeting iThings

    Source URL: https://www.theregister.com/2025/02/11/apple_ios_ipados_patches/ Source: The Register Title: Apple warns ‘extremely sophisticated attack’ may be targeting iThings Feedly Summary: Cupertino mostly uses bland language when talking security, so this sounds nasty Apple has warned that some iPhones and iPads may have been targeted by an “extremely sophisticated attack” and has posted patches that hopefully prevent it.……

  • The Register: All your 8Base are belong to us: Ransomware crew busted in global sting

    Source URL: https://www.theregister.com/2025/02/10/8base_police_arrrest/ Source: The Register Title: All your 8Base are belong to us: Ransomware crew busted in global sting Feedly Summary: Dark web site seized, four cuffed in Thailand An international police operation spanning the US, Europe, and Asia has shuttered the 8Base ransomware crew’s dark web presence and resulted in the arrest of…

  • The Register: US news org still struggling to print papers a week after ‘cybersecurity event’

    Source URL: https://www.theregister.com/2025/02/10/us_newspapers_lee_enterprises_cyberattack/ Source: The Register Title: US news org still struggling to print papers a week after ‘cybersecurity event’ Feedly Summary: Publications across 25 states either producing smaller issues or very delayed ones US newspaper publisher Lee Enterprises is one week into tackling a nondescript “cybersecurity event," saying the related investigation may take "weeks…

  • The Register: India wants all banking to happen at dedicated bank.in domain

    Source URL: https://www.theregister.com/2025/02/10/india_bank_dotin_plan/ Source: The Register Title: India wants all banking to happen at dedicated bank.in domain Feedly Summary: With over 2,000 banks in operation, the potential to make life harder for fraudsters is obvious India’s Reserve Bank last week announced a plan to use adopt dedicated second-level domains – bank.in and fin.in – in…

  • Schneier on Security: UK is Ordering Apple to Break its Own Encryption

    Source URL: https://www.schneier.com/blog/archives/2025/02/uk-is-ordering-apple-to-break-its-own-encryption.html Source: Schneier on Security Title: UK is Ordering Apple to Break its Own Encryption Feedly Summary: The Washington Post is reporting that the UK government has served Apple with a “technical capability notice” as defined by the 2016 Investigatory Powers Act, requiring them to break the Advanced Data Protection encryption in iCloud…

  • Hacker News: UK government reportedly demands Apple backdoor to encrypted cloud data

    Source URL: https://techcrunch.com/2025/02/07/uk-government-demands-apple-backdoor-to-encrypted-cloud-data-report/ Source: Hacker News Title: UK government reportedly demands Apple backdoor to encrypted cloud data Feedly Summary: Comments AI Summary and Description: Yes Summary: The report discusses a controversial request by U.K. government officials for Apple to create a backdoor into its encrypted iCloud service, potentially compromising user privacy. This situation highlights the…

  • CSA: What Are the Five Steps to Zero Trust?

    Source URL: https://cloudsecurityalliance.org/blog/2025/02/07/five-steps-to-zero-trust Source: CSA Title: What Are the Five Steps to Zero Trust? Feedly Summary: AI Summary and Description: Yes Summary: The text emphasizes the urgent need for a Zero Trust cybersecurity approach, particularly for small to medium-sized businesses (SMBs) facing significant cyber-attack risks. It outlines a five-step implementation process, detailing how organizations can…