The state of privacy regulations across Asia
Throughout Asia, it’s clear that the European Union’s GDPR privacy regulations, which apply globally when handling EU residents’ data, has marked out many of the...
Trezor wallets hacked? Don’t be duped by phishing attack email
Owners of physical Trezor cryptocurrency wallets should be on their guard after an email was sent out by thieves attempting to dupe them into downloading...
Scammers are Exploiting Ukraine Donations
Authored by Vallabh Chole and Oliver Devane Scammers are very quick at reacting to current events, so they can generate ill-gotten gains. It comes as...
Friday Squid Blogging: Squid Migration and Climate Change
New research on the changing migration of the Doryteuthis opalescens as a result of climate change. News article: Stanford researchers have solved a mystery about...
Upstart crime site woos Raid Forums orphans
A new crime site for hackers is positioning itself as an alternative to Raid Forums, a popular watering hole for threat actors before it was...
Exiger launches data-agnostic supply chain risk platform
New York-based risk management company Exiger this week launched a new supply chain risk monitoring service, designed to incorporate a wide and customizeable array of...
House Passes Better Cybercrime Metrics Act
Bill requiring FBI to report cybercrime metrics and cyber enabled crime categories clears Congress Read More
NSA Employee Accused of Sharing National Defense Secrets
Indictment alleges NSA employee used personal email account to send Top Secret info Read More
US Cyber Command Partners with APUS
American Public University System joins CYBERCOM’s Academic Engagement Network Read More
Defending Against Russian Cyber-Attacks: Guidance for SLTTs
CIS and the MS- and EI-ISACs share how U.S. state and local governments can defend themselves against Russian cyber-attacks. Read More