Child Exploitation and the Crypto Wars
Susan Landau published an excellent essay on the current justification for the government breaking end-to-end-encryption: child sexual abuse and exploitation…
Susan Landau published an excellent essay on the current justification for the government breaking end-to-end-encryption: child sexual abuse and exploitation…
The Philippine defense ordered its personnel to stop using AI-based applications to generate personal portraits. The Philippine defense warned of…
Researchers linked Vietnamese threat actors to the string of DarkGate malware attacks on entities in the U.K., the U.S., and…
MI5 chief warns Chinese cyber espionage reached an epic scale, more than 20,000 people in the UK have now been…
The International Criminal Court revealed the recent attack was carried out by a threat actor for espionage purposes. The International…
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs are free…
A threat actor is selling access to Facebook and Instagram’s Police Portal used by law enforcement agencies to request data…
Okta revealed that threat actors breached its support case management system and stole sensitive data that can be used in…
The U.S. government seized 17 website domains used by North Korean IT workers in a fraudulent scheme to defraud businesses…
ESET’s analysis of cybercrime campaigns in Latin America reveals a notable shift from opportunistic crimeware to more complex threats, including…