<?xml version='1.0' encoding='UTF-8'?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:georss="http://www.georss.org/georss" xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-484539844128637595</atom:id><lastBuildDate>Thu, 02 Apr 2026 09:05:47 +0000</lastBuildDate><category>Latest_News</category><category>Threat_Intel</category><category>GeoCrime</category><category>Business</category><category>PRChannel</category><category>Data Breach</category><category>Europol</category><category>Read</category><category>Consumer</category><category>CyberInsights</category><category>NCSC</category><category>Compliance</category><category>Events_2023</category><category>Insights</category><category>Crypto</category><category>PR_Wire</category><category>Ransomware</category><category>Smartphone</category><category>State_Actors</category><category>CyberUK 2023</category><category>Ddos</category><category>ECSO</category><category>Geo_Crime</category><category>Infrastructure</category><category>PRWire</category><category>2023 Global Threat Report</category><category>2023 State of the Phish Report</category><category>500m WhatsApp datasets sold online</category><category>ACRO Cyberbreach</category><category>AI</category><category>APT 34</category><category>Advisory</category><category>Akamai - Enemy at the Gates</category><category>Amazon Counterfeit Unit</category><category>Average Cost of a Cyber Attack</category><category>BITSIGHT An Insecure World</category><category>BLACKBERRY: Global Threat Report</category><category>Biggest DDoS Attack Ever</category><category>Bizlato - HUMAN</category><category>Britain sanctions seven Russian</category><category>CCDCOE Welcomes New Members</category><category>CYBERHive</category><category>Call for Speakers</category><category>ChatGPT</category><category>Cisco Cybersecurity Survey</category><category>Cloudflare</category><category>Credential Leak Detection</category><category>Crowdstrike</category><category>Cyber Industry</category><category>Cyber Resilience Act</category><category>Cyber Safe</category><category>Cyber Security</category><category>Cyber Threat Landscape 2023</category><category>Cyber-Security Specialist</category><category>Cybercrime</category><category>Cybercrime Trends in 2023</category><category>Cybercriminals stung as HIVE infrastructure shut down</category><category>Cybersecurity 2023</category><category>Cybersecurity Journalist</category><category>DDoS Attacks</category><category>Dark web Takedown</category><category>Dark_Web</category><category>Data Breach at London Gym Group</category><category>ECSO: Cyber Awareness</category><category>ECSO: NIS2 Implementation Initiative</category><category>EUROPOL IPTV Takedown</category><category>Europol &quot;Monopoly Market&quot; Arrests</category><category>Europol - Cybercrime Servers taken down</category><category>Europol hits two Ransomware targets</category><category>Europol unplugs phone scam</category><category>Experian Can-spam Violations</category><category>Extradited UK Citizen Guilty</category><category>Fiatusdt.com</category><category>Future-proof your Cybersecurity NOW!</category><category>GCHQ</category><category>GDPR - Spotify Fines</category><category>GEOCRIME: Russian found guilty in $90m (€83m) Hack Conspiracy</category><category>GRU Cyber Campaign Exposed</category><category>Gartner</category><category>Gartner Security Threat Intel</category><category>Gartner Summit 2023</category><category>Gartner Survey</category><category>Go Passwordless with DUO</category><category>HUMAN: THE VASTFLUX TAKEDOWN</category><category>Hermit Surveillanceware</category><category>ICS Conference</category><category>Israel-Hamas Cyber Warfare</category><category>JD Sports</category><category>Killnet</category><category>Law Enforcement</category><category>Love Business-Hate Fraud</category><category>NCA</category><category>NCSC Advisory</category><category>NCSC Advisory January 2023</category><category>NCSC Warns against State Actors</category><category>NK X_Trader Supply Hack</category><category>Online Privacy by US State</category><category>Phishing</category><category>Qakbot</category><category>Ragnar Lockwear</category><category>Ransomware Gang</category><category>Russian Cybercriminals</category><category>Russian Hacktivists</category><category>Security Compliance in 2023</category><category>Smart Cities</category><category>SouthKorea</category><category>Teenager Hacks Spanish Infrastructure</category><category>Think before you Link</category><category>Top Posts</category><category>UK Cyber Week 2023</category><category>UKCSC</category><category>US</category><category>US Attorneys Office</category><category>US Disrupts FSB Snake Malware</category><category>Ukraine</category><category>VPN</category><category>Verizon - White Paper</category><category>Voice of the CISO</category><category>WEF</category><category>Website Planet</category><category>WhatsApp beefs up Security</category><title>Iain Fraser | Cybersecurity Journalist — Best-Performing Articles &amp;amp; Thought Leadership 2026</title><description>Iain Fraser (IfOnlyCommunications) — Curated Best-Performing Cybersecurity Journalism, Analysis &amp;amp; Thought Leadership. A handpicked selection of my most-read articles covering cyber risk, security strategy, threats, SME security, and vendor insights—written in clear, accredited-journalist style for CISOs, security teams, and the wider cyber industry. Read, share, and bookmark the pieces that consistently resonate.</description><link>https://iainfraserjournalist.blogspot.com/</link><managingEditor>noreply@blogger.com (Cybersecurity Journalist - Iain Fraser)</managingEditor><generator>Blogger</generator><openSearch:totalResults>102</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><item><guid isPermaLink="false">tag:blogger.com,1999:blog-484539844128637595.post-344571789760382910</guid><pubDate>Wed, 01 Apr 2026 09:00:00 +0000</pubDate><atom:updated>2026-04-01T11:03:37.140+02:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Cyber Safe</category><category domain="http://www.blogger.com/atom/ns#">Cyber Security</category><title>What is SME Cybersecurity?  The Definitive Answer - A Practical UK Guide for Owners, Directors and Advisers</title><description>&lt;div style=&quot;background-color: white; color: #3e3f3c; font-family: Lora, serif;&quot;&gt;Syndicated By: Iain Fraser/&lt;a href=&quot;https://www.iainfraser.net/p/cybervoice-cybersecurity-pr-wire.html&quot; style=&quot;background: transparent; color: #970101; cursor: pointer; text-decoration-line: none;&quot; target=&quot;_blank&quot;&gt;Cyber PR Wire&lt;/a&gt;&lt;/div&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;background: white; line-height: normal; mso-margin-bottom-alt: auto;&quot;&gt;&lt;span style=&quot;color: #262626; mso-bidi-font-family: Tahoma; mso-bidi-font-size: 12.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-GB; mso-font-kerning: 0pt; mso-ligatures: none;&quot;&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;background-color: white; color: #3e3f3c; font-family: Lora, serif;&quot;&gt;via IainFRASER.net/&lt;/span&gt;&lt;a href=&quot;https://www.iainfraser.net/p/cybervoice-cybersecurity-pr-wire.html&quot; style=&quot;background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; color: #970101; cursor: pointer; font-family: Lora, serif; text-decoration-line: none;&quot; target=&quot;_blank&quot;&gt;CyberPRWire&lt;/a&gt;&amp;nbsp;&lt;/p&gt;&lt;p class=&quot;MsoNoSpacing&quot;&gt;&lt;span style=&quot;mso-fareast-language: EN-GB; mso-font-kerning: 0pt;&quot;&gt;If you run a UK SME, “cybersecurity” usually lands on your desk only
when something breaks; a supplier emails to say they have been breached, a
director gets a fake invoice chain, or Microsoft 365 locks an account after
suspicious sign-ins. That reactive cycle is expensive. The UK Government’s
Cyber Security Breaches Survey 2025 found 43% of businesses reported a cyber
security breach or attack in the last 12 months, and phishing remained the most
common route in.&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;background: white; line-height: normal; mso-margin-bottom-alt: auto;&quot;&gt;&lt;span style=&quot;color: #262626; mso-bidi-font-family: Tahoma; mso-bidi-font-size: 12.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-GB; mso-font-kerning: 0pt; mso-ligatures: none;&quot;&gt;SME cybersecurity is how you
stop those incidents becoming operational disruption, financial loss, and a UK
GDPR reporting scramble. It is not enterprise theatre. It is focused,
budget&lt;/span&gt;&lt;span style=&quot;color: #262626;&quot;&gt;-aware risk reduction.&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;background: white; line-height: normal; mso-margin-bottom-alt: auto;&quot;&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj1PN0nFW8p4hzixB8wXKft2A-Jy13i8NFk-5eV5JyPLilr4cp3UgbNPMCAd5kroFO2KXBJiGK7g2wDkSlFGCR1CH9VrG4cvC5yBZbEtiupQDzu56YiNofaEA52Kgqc7VD3PjNMaCDw1jHvAxEuc17Wa8-IJ9xqun2hbzma19quLKdMtd02W0Fy6px6Uqk/s5433/businessman-holding-laptop-computer_compressed.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;3622&quot; data-original-width=&quot;5433&quot; height=&quot;266&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj1PN0nFW8p4hzixB8wXKft2A-Jy13i8NFk-5eV5JyPLilr4cp3UgbNPMCAd5kroFO2KXBJiGK7g2wDkSlFGCR1CH9VrG4cvC5yBZbEtiupQDzu56YiNofaEA52Kgqc7VD3PjNMaCDw1jHvAxEuc17Wa8-IJ9xqun2hbzma19quLKdMtd02W0Fy6px6Uqk/w400-h266/businessman-holding-laptop-computer_compressed.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;background: white; line-height: normal; mso-margin-bottom-alt: auto;&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;background: white; line-height: normal; margin-bottom: 12pt; mso-margin-top-alt: auto; mso-outline-level: 3;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: #262626; mso-bidi-font-family: Tahoma; mso-bidi-font-size: 12.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-GB; mso-font-kerning: 0pt; mso-ligatures: none;&quot;&gt;What is SME cybersecurity, in plain English?&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;background: white; line-height: normal; mso-margin-bottom-alt: auto;&quot;&gt;&lt;span style=&quot;color: #262626; mso-bidi-font-family: Tahoma; mso-bidi-font-size: 12.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-GB; mso-font-kerning: 0pt; mso-ligatures: none;&quot;&gt;SME cybersecurity is the set
of &lt;b&gt;people, process, and technical controls&lt;/b&gt; that reduce the chance of a
cyber incident and limit the impact when one happens. For most SMEs, the “crown
jewels” are not a data centre; they are email, cloud files, finance workflows,
and customer or employee personal data.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;background: white; line-height: normal; mso-margin-bottom-alt: auto;&quot;&gt;&lt;span style=&quot;color: #262626; mso-bidi-font-family: Tahoma; mso-bidi-font-size: 12.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-GB; mso-font-kerning: 0pt; mso-ligatures: none;&quot;&gt;In practice, it answers
three questions directors care about:&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;ol start=&quot;1&quot; style=&quot;margin-top: 0cm;&quot; type=&quot;1&quot;&gt;
 &lt;li class=&quot;MsoNormal&quot; style=&quot;background: white; color: #262626; line-height: normal; margin-bottom: 6pt; margin-top: 6pt; mso-list: l11 level1 lfo1; tab-stops: list 36.0pt;&quot;&gt;&lt;b&gt;Can an attacker log in as
     us?&lt;/b&gt;&amp;nbsp;(identity security)&lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;
 &lt;li class=&quot;MsoNormal&quot; style=&quot;background: white; color: #262626; line-height: normal; margin-bottom: 6pt; margin-top: 6pt; mso-list: l11 level1 lfo1; tab-stops: list 36.0pt;&quot;&gt;&lt;b&gt;If they do, can they move
     and escalate?&lt;/b&gt;&amp;nbsp;(access control and
     configuration)&lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;
 &lt;li class=&quot;MsoNormal&quot; style=&quot;background: white; color: #262626; line-height: normal; margin-bottom: 6pt; margin-top: 6pt; mso-list: l11 level1 lfo1; tab-stops: list 36.0pt;&quot;&gt;&lt;b&gt;If systems go down, can we
     recover quickly?&lt;/b&gt;&amp;nbsp;(backups
     and incident response)&lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;
&lt;/ol&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;background: white; line-height: normal; margin-bottom: 12pt; mso-margin-top-alt: auto; mso-outline-level: 3;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: #262626; mso-bidi-font-family: Tahoma; mso-bidi-font-size: 12.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-GB; mso-font-kerning: 0pt; mso-ligatures: none;&quot;&gt;Why cyber security for small businesses fails
in predictable ways&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;background: white; line-height: normal; mso-margin-bottom-alt: auto;&quot;&gt;&lt;span style=&quot;color: #262626; mso-bidi-font-family: Tahoma; mso-bidi-font-size: 12.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-GB; mso-font-kerning: 0pt; mso-ligatures: none;&quot;&gt;SMEs are not careless. They
are busy. That creates common weak points:&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;ul style=&quot;margin-top: 0cm;&quot; type=&quot;disc&quot;&gt;
 &lt;li class=&quot;MsoNormal&quot; style=&quot;background: white; color: #262626; line-height: normal; margin-bottom: 6pt; margin-top: 6pt; mso-list: l6 level1 lfo2; tab-stops: list 36.0pt;&quot;&gt;&lt;b&gt;Shared admin accounts&lt;/b&gt;&amp;nbsp;and “temporary” access that becomes
     permanent.&lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;
 &lt;li class=&quot;MsoNormal&quot; style=&quot;background: white; color: #262626; line-height: normal; margin-bottom: 6pt; margin-top: 6pt; mso-list: l6 level1 lfo2; tab-stops: list 36.0pt;&quot;&gt;&lt;b&gt;Email-first approvals&lt;/b&gt;&amp;nbsp;for payments and bank detail changes.&lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;
 &lt;li class=&quot;MsoNormal&quot; style=&quot;background: white; color: #262626; line-height: normal; margin-bottom: 6pt; margin-top: 6pt; mso-list: l6 level1 lfo2; tab-stops: list 36.0pt;&quot;&gt;&lt;b&gt;Outsourced IT&lt;/b&gt;&amp;nbsp;with unclear boundaries; who patches
     what, and who monitors alerts.&lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;
 &lt;li class=&quot;MsoNormal&quot; style=&quot;background: white; color: #262626; line-height: normal; margin-bottom: 6pt; margin-top: 6pt; mso-list: l6 level1 lfo2; tab-stops: list 36.0pt;&quot;&gt;&lt;b&gt;Backups that exist, but are
     never tested&lt;/b&gt;; restore failure is
     discovered at the worst time.&lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;background: white; line-height: normal; mso-margin-bottom-alt: auto;&quot;&gt;&lt;span style=&quot;color: #262626; mso-bidi-font-family: Tahoma; mso-bidi-font-size: 12.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-GB; mso-font-kerning: 0pt; mso-ligatures: none;&quot;&gt;Attackers know this.
Business email compromise and invoice fraud target normal working patterns, not
technical complexity.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;background: white; line-height: normal; margin-bottom: 12pt; mso-margin-top-alt: auto; mso-outline-level: 3;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: #262626; mso-bidi-font-family: Tahoma; mso-bidi-font-size: 12.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-GB; mso-font-kerning: 0pt; mso-ligatures: none;&quot;&gt;What are the highest-impact SME cyber security
best practices?&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;background: white; line-height: normal; mso-margin-bottom-alt: auto;&quot;&gt;&lt;span style=&quot;color: #262626; mso-bidi-font-family: Tahoma; mso-bidi-font-size: 12.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-GB; mso-font-kerning: 0pt; mso-ligatures: none;&quot;&gt;Start with controls that cut
real losses quickly and fit a lean team.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;ol start=&quot;1&quot; style=&quot;margin-top: 0cm;&quot; type=&quot;1&quot;&gt;
 &lt;li class=&quot;MsoNormal&quot; style=&quot;background: white; color: #262626; line-height: normal; margin-bottom: 6pt; margin-top: 6pt; mso-list: l9 level1 lfo3; tab-stops: list 36.0pt;&quot;&gt;&lt;b&gt;Lock down email and logins
     (highest impact)&lt;/b&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;
&lt;/ol&gt;&lt;ul style=&quot;margin-top: 0cm;&quot; type=&quot;disc&quot;&gt;
 &lt;li class=&quot;MsoNormal&quot; style=&quot;background: white; color: #262626; line-height: normal; margin-bottom: 6pt; margin-top: 6pt; mso-list: l0 level1 lfo4; tab-stops: list 36.0pt;&quot;&gt;Turn on&amp;nbsp;&lt;b&gt;multi-factor
     authentication (MFA)&lt;/b&gt;&amp;nbsp;for Microsoft 365 or Google Workspace;
     enforce it for all users, not just admins.&lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;
 &lt;li class=&quot;MsoNormal&quot; style=&quot;background: white; color: #262626; line-height: normal; margin-bottom: 6pt; margin-top: 6pt; mso-list: l0 level1 lfo4; tab-stops: list 36.0pt;&quot;&gt;Create named admin
     accounts; remove shared admin credentials; use least privilege.&lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;ol start=&quot;2&quot; style=&quot;margin-top: 0cm;&quot; type=&quot;1&quot;&gt;
 &lt;li class=&quot;MsoNormal&quot; style=&quot;background: white; color: #262626; line-height: normal; margin-bottom: 6pt; margin-top: 6pt; mso-list: l10 level1 lfo5; tab-stops: list 36.0pt;&quot;&gt;&lt;b&gt;Harden devices and patch
     like you mean it&lt;/b&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;
&lt;/ol&gt;&lt;ul style=&quot;margin-top: 0cm;&quot; type=&quot;disc&quot;&gt;
 &lt;li class=&quot;MsoNormal&quot; style=&quot;background: white; color: #262626; line-height: normal; margin-bottom: 6pt; margin-top: 6pt; mso-list: l7 level1 lfo6; tab-stops: list 36.0pt;&quot;&gt;Enable automatic updates
     for operating systems and browsers.&lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;
 &lt;li class=&quot;MsoNormal&quot; style=&quot;background: white; color: #262626; line-height: normal; margin-bottom: 6pt; margin-top: 6pt; mso-list: l7 level1 lfo6; tab-stops: list 36.0pt;&quot;&gt;Patch priority apps weekly;
     remote access tools, VPNs, firewalls, and document viewers.&lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;ol start=&quot;3&quot; style=&quot;margin-top: 0cm;&quot; type=&quot;1&quot;&gt;
 &lt;li class=&quot;MsoNormal&quot; style=&quot;background: white; color: #262626; line-height: normal; margin-bottom: 6pt; margin-top: 6pt; mso-list: l8 level1 lfo7; tab-stops: list 36.0pt;&quot;&gt;&lt;b&gt;Reduce invoice fraud risk
     with process, not tools&lt;/b&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;
&lt;/ol&gt;&lt;ul style=&quot;margin-top: 0cm;&quot; type=&quot;disc&quot;&gt;
 &lt;li class=&quot;MsoNormal&quot; style=&quot;background: white; color: #262626; line-height: normal; margin-bottom: 6pt; margin-top: 6pt; mso-list: l2 level1 lfo8; tab-stops: list 36.0pt;&quot;&gt;For any change of bank
     details, verify via a known phone number, not the email thread.&lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;
 &lt;li class=&quot;MsoNormal&quot; style=&quot;background: white; color: #262626; line-height: normal; margin-bottom: 6pt; margin-top: 6pt; mso-list: l2 level1 lfo8; tab-stops: list 36.0pt;&quot;&gt;Require dual approval for
     new payees above a sensible threshold.&lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;ol start=&quot;4&quot; style=&quot;margin-top: 0cm;&quot; type=&quot;1&quot;&gt;
 &lt;li class=&quot;MsoNormal&quot; style=&quot;background: white; color: #262626; line-height: normal; margin-bottom: 6pt; margin-top: 6pt; mso-list: l1 level1 lfo9; tab-stops: list 36.0pt;&quot;&gt;&lt;b&gt;Backups that ransomware
     cannot casually destroy&lt;/b&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;
&lt;/ol&gt;&lt;ul style=&quot;margin-top: 0cm;&quot; type=&quot;disc&quot;&gt;
 &lt;li class=&quot;MsoNormal&quot; style=&quot;background: white; color: #262626; line-height: normal; margin-bottom: 6pt; margin-top: 6pt; mso-list: l5 level1 lfo10; tab-stops: list 36.0pt;&quot;&gt;Keep at least one backup
     copy offline or logically isolated.&lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;
 &lt;li class=&quot;MsoNormal&quot; style=&quot;background: white; color: #262626; line-height: normal; margin-bottom: 6pt; margin-top: 6pt; mso-list: l5 level1 lfo10; tab-stops: list 36.0pt;&quot;&gt;Test restores quarterly;
     document the restore steps so it is not tribal knowledge.&lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;ol start=&quot;5&quot; style=&quot;margin-top: 0cm;&quot; type=&quot;1&quot;&gt;
 &lt;li class=&quot;MsoNormal&quot; style=&quot;background: white; color: #262626; line-height: normal; margin-bottom: 6pt; margin-top: 6pt; mso-list: l3 level1 lfo11; tab-stops: list 36.0pt;&quot;&gt;&lt;b&gt;A one-page cyber incident
     response plan&lt;/b&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;
&lt;/ol&gt;&lt;ul style=&quot;margin-top: 0cm;&quot; type=&quot;disc&quot;&gt;
 &lt;li class=&quot;MsoNormal&quot; style=&quot;background: white; color: #262626; line-height: normal; margin-bottom: 6pt; margin-top: 6pt; mso-list: l4 level1 lfo12; tab-stops: list 36.0pt;&quot;&gt;List who calls the bank,
     who contacts IT, who speaks to customers, and who assesses UK GDPR
     notification.&lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;
 &lt;li class=&quot;MsoNormal&quot; style=&quot;background: white; color: #262626; line-height: normal; margin-bottom: 6pt; margin-top: 6pt; mso-list: l4 level1 lfo12; tab-stops: list 36.0pt;&quot;&gt;Store it somewhere
     accessible when email is down.&lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;background: white; line-height: normal; margin-bottom: 12pt; mso-margin-top-alt: auto; mso-outline-level: 3;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: #262626; mso-bidi-font-family: Tahoma; mso-bidi-font-size: 12.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-GB; mso-font-kerning: 0pt; mso-ligatures: none;&quot;&gt;How Cyber Essentials and UK GDPR fit together
for UK SMEs&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;background: white; line-height: normal; mso-margin-bottom-alt: auto;&quot;&gt;&lt;span style=&quot;color: #262626; mso-bidi-font-family: Tahoma; mso-bidi-font-size: 12.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-GB; mso-font-kerning: 0pt; mso-ligatures: none;&quot;&gt;Cyber Essentials matters
because it focuses on five technical control areas that map to real SME
failures; secure configuration, user access control, malware protection,
security update management, and firewalls (NCSC Cyber Essentials overview). UK
GDPR matters because if personal data is involved, you must implement
“appropriate” security measures and assess whether you need to report a breach
to the ICO within strict timelines.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;background: white; line-height: normal; mso-margin-bottom-alt: auto;&quot;&gt;&lt;span style=&quot;color: #262626; mso-bidi-font-family: Tahoma; mso-bidi-font-size: 12.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-GB; mso-font-kerning: 0pt; mso-ligatures: none;&quot;&gt;For SMEs, Use Cyber
Essentials as your SME cybersecurity baseline this month; pick three gaps and
close them, starting with MFA, admin access, and backups.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;background: white; line-height: normal; mso-margin-bottom-alt: auto;&quot;&gt;&lt;span style=&quot;color: #262626; mso-bidi-font-family: Tahoma; mso-bidi-font-size: 12.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-GB; mso-font-kerning: 0pt; mso-ligatures: none;&quot;&gt;For advisers, Cyber
Essentials is often the most pragmatic way to evidence baseline security
controls without burying a client in policy paperwork.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;div align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;line-height: 115%; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-bidi-font-size: 12.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-GB; mso-font-kerning: 0pt; mso-ligatures: none;&quot;&gt;

&lt;hr align=&quot;center&quot; noshade=&quot;&quot; size=&quot;1&quot; style=&quot;color: #262626;&quot; width=&quot;100%&quot; /&gt;

&lt;/span&gt;&lt;/div&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;background: white; line-height: normal; mso-margin-bottom-alt: auto;&quot;&gt;















































&lt;span style=&quot;color: #262626;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;</description><link>https://iainfraserjournalist.blogspot.com/2026/04/what-is-cybersecurity.html</link><author>noreply@blogger.com (Cybersecurity Journalist - Iain Fraser)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj1PN0nFW8p4hzixB8wXKft2A-Jy13i8NFk-5eV5JyPLilr4cp3UgbNPMCAd5kroFO2KXBJiGK7g2wDkSlFGCR1CH9VrG4cvC5yBZbEtiupQDzu56YiNofaEA52Kgqc7VD3PjNMaCDw1jHvAxEuc17Wa8-IJ9xqun2hbzma19quLKdMtd02W0Fy6px6Uqk/s72-w400-h266-c/businessman-holding-laptop-computer_compressed.jpg" height="72" width="72"/><georss:featurename>Gibraltar</georss:featurename><georss:point>36.140751 -5.353585</georss:point><georss:box>7.8305171638211561 -40.509835 64.450984836178847 29.802665</georss:box></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-484539844128637595.post-7169914759362497345</guid><pubDate>Tue, 05 Dec 2023 11:31:00 +0000</pubDate><atom:updated>2023-12-07T10:59:54.320+01:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Latest_News</category><category domain="http://www.blogger.com/atom/ns#">Threat_Intel</category><title> CYBER BREACH: Data Breach Exposed Thousands of Pet Medical Records Including Owner Information</title><description>&lt;div&gt;Tuesday, 5th December 2023&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;CYBER BREACH: Data Breach Exposed Thousands of Pet Medical Records Including Owner Information&lt;/b&gt;&lt;/div&gt;&lt;div&gt;By &lt;a href=&quot; https://www.websiteplanet.com/author/jeremiah-fowler/&quot; target=&quot;_blank&quot;&gt;Jeremiah Fowler - Website Planet&amp;nbsp;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;Syndicated By &lt;a href=&quot;https://www.iainfraser.net/p/cybervoice-cybersecurity-pr-wire.html&quot;&gt;IainFraser.net/CYBER_Voice&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;a href=&quot;https://www.google.com/search?q=daily+cyber+insights&amp;amp;oq=daily&amp;amp;gs_lcrp=EgZjaHJvbWUqBggAEEUYOzIGCAAQRRg7MgYIARBFGDsyBwgCEAAYgAQyBggDEEUYOTIHCAQQABiABDIGCAUQRRg8MgYIBhBFGDwyBggHEEUYPdIBCDQ2MzFqMGo0qAIAsAIA&amp;amp;sourceid=chrome&amp;amp;ie=UTF-8&quot; target=&quot;_blank&quot;&gt;Daily Cyber Insights&amp;nbsp;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Cybersecurity Researcher, Jeremiah Fowler, discovered and reported to WebsitePlanet about a non-password protected database that contained over 56,000 records, including pet medical reports, DNA tests, pedigree history and other potentially sensitive information. As a long-time cyber security researcher, this is one of the most interesting discoveries I have ever encountered and a first for me.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;I recently discovered a non-password protected database that contained records of thousands of dogs from around the world and included the information of their human owners. The publicly exposed cloud storage database contained a total of 56,624 documents in .PDF, .png, and .jpg formats with a total size of 25 GB. Upon further investigation, the database appeared to belong to the Worldwide Australian Labradoodle Association (WALA).&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;The international organization promotes the Australian Labradoodle breed and sets standards for responsible breeding practices. While WALA has members and affiliated breeders all over the world, their main office is based in Washington state, United States. WALA also has regional offices in other parts of the world, including Australia, Europe, and Asia. It should be noted that I saw documents from multiple countries inside the publicly exposed database. I immediately sent a responsible disclosure notice to WALA and the database was eventually restricted several days later without a reply to my messages.&amp;nbsp;&lt;a href=&quot;https://www.websiteplanet.com/news/wala-breach-report/&quot; target=&quot;_blank&quot;&gt;Learn More /...&amp;nbsp;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjQg2x7L8qOpQ6NyQ5K-duL68XZxfUqlOtdm9f4edDm4cGmBDgDlLgRjyIeMNDNb4lWithFHI5nEMzLXQ-L55uG_kYlsZUZVtN0wzYWJODAwMuNMmeQaoQQD_31T0FA3VMZqUCOqpRhOeLuJ2njXAeZR_edqlsoYGeZG-Dgj4xZj7pkhlrCzZc_U9aHBn0/s1280/pets-3715733_1280.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Daily Cyber Insights&quot; border=&quot;0&quot; data-original-height=&quot;853&quot; data-original-width=&quot;1280&quot; height=&quot;266&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjQg2x7L8qOpQ6NyQ5K-duL68XZxfUqlOtdm9f4edDm4cGmBDgDlLgRjyIeMNDNb4lWithFHI5nEMzLXQ-L55uG_kYlsZUZVtN0wzYWJODAwMuNMmeQaoQQD_31T0FA3VMZqUCOqpRhOeLuJ2njXAeZR_edqlsoYGeZG-Dgj4xZj7pkhlrCzZc_U9aHBn0/w400-h266/pets-3715733_1280.jpg&quot; title=&quot;Cybersecurity Journalist&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;About Jeremiah Fowler&lt;/b&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Jeremiah Fowler is a Security Researcher and co-founder of Security Discovery. Jeremiah began his career in security research in 2015 and has a mission of data protection. He has helped identify and secure the data of millions of people around the world. His discoveries have been covered in Forbes, BBC, Gizmodo, among others. Security and responsible disclosure are not only a passion, but a way of protecting our digital lives. &lt;a href=&quot; https://www.websiteplanet.com/author/jeremiah-fowler/&quot; target=&quot;_blank&quot;&gt;Learn More /...&lt;/a&gt;&lt;/div&gt;</description><link>https://iainfraserjournalist.blogspot.com/2023/12/data-breach-exposed-thousands-of-pet.html</link><author>noreply@blogger.com (Cybersecurity Journalist - Iain Fraser)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjQg2x7L8qOpQ6NyQ5K-duL68XZxfUqlOtdm9f4edDm4cGmBDgDlLgRjyIeMNDNb4lWithFHI5nEMzLXQ-L55uG_kYlsZUZVtN0wzYWJODAwMuNMmeQaoQQD_31T0FA3VMZqUCOqpRhOeLuJ2njXAeZR_edqlsoYGeZG-Dgj4xZj7pkhlrCzZc_U9aHBn0/s72-w400-h266-c/pets-3715733_1280.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-484539844128637595.post-8263717505470089315</guid><pubDate>Tue, 28 Nov 2023 14:21:00 +0000</pubDate><atom:updated>2023-11-28T15:45:56.417+01:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Advisory</category><category domain="http://www.blogger.com/atom/ns#">NCSC</category><category domain="http://www.blogger.com/atom/ns#">PR_Wire</category><category domain="http://www.blogger.com/atom/ns#">SouthKorea</category><category domain="http://www.blogger.com/atom/ns#">Threat_Intel</category><title>CYBERSECURITY NEWS: UK NCSC &amp; South Korea´s NIS and issue joint advisory </title><description>&lt;div&gt;28th November 2023&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;CYBERSECURITY NEWS: UK NCSC &amp;amp; South Korea´s NIS and issue joint advisory&amp;nbsp;&lt;/b&gt;&lt;/div&gt;&lt;div&gt;Syndicated By: Iain Fraser/&lt;a href=&quot;https://www.iainfraser.net/p/cybervoice-cybersecurity-pr-wire.html&quot; target=&quot;_blank&quot;&gt;Cyber PR Wire&lt;/a&gt;&lt;/div&gt;&lt;div&gt;via IainFRASER.net/&lt;a href=&quot;https://www.iainfraser.net/p/cybervoice-cybersecurity-pr-wire.html&quot; target=&quot;_blank&quot;&gt;CyberPRWire&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;CYBERSECURITY NEWS: NCSC &amp;amp; South Korea´s NIS and issue joint advisory warning about DPRK state-linked cyber actors attacking software supply chains.&lt;/b&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;Joint advisory observes cyber actors leveraging zero-day vulnerabilities and exploits in third-party software.&amp;nbsp;&lt;/b&gt;Cyber actors linked to the &lt;b&gt;Democratic People’s Republic of Korea (DPRK) &lt;/b&gt;are increasingly targeting software supply chain products to attack organisations around the world, the UK and the Republic of Korea have warned.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;In a new joint advisory, the &lt;a href=&quot;https://www.ncsc.gov.uk/&quot; target=&quot;_blank&quot;&gt;&lt;b&gt;National Cyber Security Centre&lt;/b&gt;&lt;/a&gt; (NCSC) – a part of GCHQ – and the &lt;b&gt;National Intelligence Service&lt;/b&gt; (NIS) have detailed how DPRK state-linked cyber actors have been using increasingly sophisticated techniques to gain access to victims’ systems.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;The actors have been observed leveraging zero-day vulnerabilities and exploits in third-party software to gain access to specific targets or indiscriminate organisations via their supply chains.&lt;a href=&quot;https://www.ncsc.gov.uk/news/uk-republic-of-korea-issue-warning-dprk-state-linked-cyber-actors-attacking-software-supply-chains&quot; target=&quot;_blank&quot;&gt; Learn More /...&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;About NCSC (National Cyber Security Centre)&amp;nbsp;&lt;/b&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;Helping to make the UK the safest place to live and work online.&lt;/b&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;&lt;div&gt;The &lt;b&gt;NCSC &lt;/b&gt;Supports the most critical organisations in the UK, the wider public sector, industry, SMEs as well as the general public. When incidents do occur, we provide effective incident response to minimise harm to the UK, help with recovery, and learn lessons for the future. &lt;a href=&quot;https://www.ncsc.gov.uk/section/about-ncsc/what-we-do&quot; target=&quot;_blank&quot;&gt;Learn More /...&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiQ-01lQ9UbVUoMDmZyMFOgI6vTQp668S4Co6Qdh-HPVFcpbxd-RkX6v27mMfL567LW0KmapS_yoChE5a34gmrLCRAnxp7wLI4cXbenXMjEXYek_HZUXlJHNfDeZCRrKxLN2rUJLEcCquaurSc6L2EwqYLwxEjAgTNk6K7XSL1dijjRDYPEQWGGiNQ6MUM/s1280/container-ship-7383545_1280.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Cybersecurity Journalist&quot; border=&quot;0&quot; data-original-height=&quot;853&quot; data-original-width=&quot;1280&quot; height=&quot;266&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiQ-01lQ9UbVUoMDmZyMFOgI6vTQp668S4Co6Qdh-HPVFcpbxd-RkX6v27mMfL567LW0KmapS_yoChE5a34gmrLCRAnxp7wLI4cXbenXMjEXYek_HZUXlJHNfDeZCRrKxLN2rUJLEcCquaurSc6L2EwqYLwxEjAgTNk6K7XSL1dijjRDYPEQWGGiNQ6MUM/w400-h266/container-ship-7383545_1280.jpg&quot; title=&quot;Daily Cyber Insights&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;</description><link>https://iainfraserjournalist.blogspot.com/2023/11/ncsc-advisory-nkorea.html</link><author>noreply@blogger.com (Cybersecurity Journalist - Iain Fraser)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiQ-01lQ9UbVUoMDmZyMFOgI6vTQp668S4Co6Qdh-HPVFcpbxd-RkX6v27mMfL567LW0KmapS_yoChE5a34gmrLCRAnxp7wLI4cXbenXMjEXYek_HZUXlJHNfDeZCRrKxLN2rUJLEcCquaurSc6L2EwqYLwxEjAgTNk6K7XSL1dijjRDYPEQWGGiNQ6MUM/s72-w400-h266-c/container-ship-7383545_1280.jpg" height="72" width="72"/><thr:total>0</thr:total><georss:featurename>Gibraltar</georss:featurename><georss:point>36.140751 -5.353585</georss:point><georss:box>7.8305171638211561 -40.509835 64.450984836178847 29.802665</georss:box></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-484539844128637595.post-6022667874405107069</guid><pubDate>Tue, 28 Nov 2023 13:42:00 +0000</pubDate><atom:updated>2023-11-28T14:43:24.436+01:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">CYBERHive</category><category domain="http://www.blogger.com/atom/ns#">ECSO</category><category domain="http://www.blogger.com/atom/ns#">Latest_News</category><category domain="http://www.blogger.com/atom/ns#">PR_Wire</category><title>CYBERSECURITY NEWS: ECSO Launches its latest ground-breaking initiative CYBERHive </title><description>&lt;div&gt;28th November 2023&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;CYBERSECURITY NEWS: ECSO Launches its latest ground-breaking initiative CYBERHive&amp;nbsp;&lt;/b&gt;&lt;/div&gt;&lt;div&gt;Syndicated By: Iain Fraser/&lt;a href=&quot;https://www.iainfraser.net/p/cybervoice-cybersecurity-pr-wire.html&quot; target=&quot;_blank&quot;&gt;Cyber PR Wire&lt;/a&gt;&lt;/div&gt;&lt;div&gt;via IainFRASER.net/&lt;a href=&quot;https://www.iainfraser.net/p/cybervoice-cybersecurity-pr-wire.html&quot; target=&quot;_blank&quot;&gt;CyberPRWire&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;ECSO&lt;/b&gt; is delighted to announce the launch of its new, ground-breaking initiative: Cyberhive EUROPE. Cyberhive is the first-ever European marketplace co-created with- and for the European cybersecurity ecosystem, and will offer global accessibility to all Europe-headquartered cybersecurity solution providers, while also being freely accessible to end-users worldwide. Through the Cyberhive, ECSO will connect market players, promote European-made products, and ultimately strengthen the European cybersecurity market as a whole. To learn more about the Cyberhive, read below.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;The second Annual CISO Meetup, organised by ECSO, starts today! Over 150 CISOs are joining us in Florence from all over Europe to engage in high-level discussions on critical cybersecurity topics. Read more below.&lt;a href=&quot; https://ecs-org.eu/ecsos-latest-initiative-cyberhive-europe&quot; target=&quot;_blank&quot;&gt; Learn More /...&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;About ECSO (The European Cyber Security Organisation)&lt;/b&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;ECSO &lt;/b&gt;was created in 2016 as the contractual counterpart to the European Commission to implement Europe’s unique Public-Private Partnership in Cybersecurity – cPPP (2016-2020). Building upon the success of the cPPP, ECSO is today the unique European cross-sectoral and independent membership organisation for cybersecurity that gathers and represents European public and private cybersecurity stakeholders and fosters their cooperation. Members of ECSO include large companies, SMEs and start-ups, research centres, universities, end-users and operators of essential services, clusters and associations, as well as the local, regional and national public administrations across the European Union Members States and the European Free Trade Association (EFTA). &lt;a href=&quot;https://ecs-org.eu/who-we-are/&quot; target=&quot;_blank&quot;&gt;Learn More /...&amp;nbsp;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjUdMqO1dPK48oBuwxV9M3R09n0L9fSdbwg-5gxoPVl8LHl1CmBAQ8CCsY21qw_KMyRf2rx6F7__wex5-2vVK4fVhSS3BjD5FmOAl26_vHL-BKMwWl1dwLnjrf_ieXoKD7g7aNptw1MJoKNzMtYewv_pCAlPt-61IJaWSgBueP7PtQ2gNckAm2-IuPoR2Q/s1280/bee-4668171_1280.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Cybersecurity Journalist&quot; border=&quot;0&quot; data-original-height=&quot;959&quot; data-original-width=&quot;1280&quot; height=&quot;300&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjUdMqO1dPK48oBuwxV9M3R09n0L9fSdbwg-5gxoPVl8LHl1CmBAQ8CCsY21qw_KMyRf2rx6F7__wex5-2vVK4fVhSS3BjD5FmOAl26_vHL-BKMwWl1dwLnjrf_ieXoKD7g7aNptw1MJoKNzMtYewv_pCAlPt-61IJaWSgBueP7PtQ2gNckAm2-IuPoR2Q/w400-h300/bee-4668171_1280.jpg&quot; title=&quot;Daily Cyber Insights&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;</description><link>https://iainfraserjournalist.blogspot.com/2023/11/ecso-launches-cyberhive.html</link><author>noreply@blogger.com (Cybersecurity Journalist - Iain Fraser)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjUdMqO1dPK48oBuwxV9M3R09n0L9fSdbwg-5gxoPVl8LHl1CmBAQ8CCsY21qw_KMyRf2rx6F7__wex5-2vVK4fVhSS3BjD5FmOAl26_vHL-BKMwWl1dwLnjrf_ieXoKD7g7aNptw1MJoKNzMtYewv_pCAlPt-61IJaWSgBueP7PtQ2gNckAm2-IuPoR2Q/s72-w400-h300-c/bee-4668171_1280.jpg" height="72" width="72"/><thr:total>0</thr:total><georss:featurename>Gibraltar</georss:featurename><georss:point>36.140751 -5.353585</georss:point><georss:box>7.8305171638211561 -40.509835 64.450984836178847 29.802665</georss:box></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-484539844128637595.post-7363220326835462398</guid><pubDate>Tue, 28 Nov 2023 13:29:00 +0000</pubDate><atom:updated>2023-11-28T15:23:50.029+01:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Europol</category><category domain="http://www.blogger.com/atom/ns#">Latest_News</category><category domain="http://www.blogger.com/atom/ns#">Ransomware</category><category domain="http://www.blogger.com/atom/ns#">Threat_Intel</category><category domain="http://www.blogger.com/atom/ns#">Ukraine</category><title> CYBERSECURITY NEWS: EUROPOL- International collaboration leads to dismantlement of ransomware group</title><description>&lt;div&gt;28th November 2023&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;CYBERSECURITY NEWS: EUROPOL - International collaboration leads to dismantlement of ransomware group in Ukraine amidst ongoing war&amp;nbsp;&lt;/b&gt;&lt;/div&gt;&lt;div&gt;Syndicated By: Iain Fraser/&lt;a href=&quot;https://www.iainfraser.net/p/cybervoice-cybersecurity-pr-wire.html&quot; target=&quot;_blank&quot;&gt;Cyber PR Wire&lt;/a&gt;&lt;/div&gt;&lt;div&gt;via IainFRASER.net/&lt;a href=&quot;https://www.iainfraser.net/p/cybervoice-cybersecurity-pr-wire.html&quot; target=&quot;_blank&quot;&gt;CyberPRWire&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;The ransomware gang is behind high-profile attacks that created losses of hundreds of millions of euros.&amp;nbsp;&lt;/b&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;In an unprecedented effort, law enforcement and judicial authorities from seven countries have joined forces with Europol and Eurojust to dismantle and apprehend in Ukraine key figures behind significant ransomware operations wreaking havoc across the world.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;The operation comes at a critical time, as the country grapples with the challenges of Russia’s military aggression against its territory. On 21 November, 30 properties were searched in the regions of Kyiv, Cherkasy, Rivne and Vinnytsia, resulting in the arrest of the 32-year-old ringleader. Four of the ringleader&#39;s most active accomplices were also detained. &lt;a href=&quot;https://www.europol.europa.eu/media-press/newsroom/news/international-collaboration-leads-to-dismantlement-of-ransomware-group-in-ukraine-amidst-ongoing-war?mtm_campaign=newsletter&quot; target=&quot;_blank&quot;&gt;Learn More &lt;/a&gt;/...&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;About EUROPOL&lt;/b&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;Headquartered in The Hague, the Netherlands, Europol’s mission is to support its Member States in preventing and combating all forms of serious international and organised crime, cybercrime and terrorism. Europol also works with many non-EU partner states and international organisations.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Large-scale criminal and terrorist networks pose a significant threat to the internal security of the EU and to the safety and livelihood of its people. &lt;a href=&quot;https://www.europol.europa.eu/about-europol&quot; target=&quot;_blank&quot;&gt;Learn More&lt;/a&gt; /...&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;i&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh1I-rV1t2Hsib8IwVaKSTl2gEfDBjrTfbIaBZbqgHpyiIyrfiUTzzne-KhFh2JQLpQB-VXtZ-vltIy95uoO3yxnWxXcHIXx5Rl97ixxyh4HWNbU0ZDn1hI4egAhhcXp0SI-u3yODiIAqV5NwDmlhd2M9tb-lDLLuqj4Qfdx2V9-M9dmF4qcUFI5QGpAOo/s1024/1024px-Europol_building,_The_Hague,_the_Netherlands_-_002.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Daily Cyber Insights&quot; border=&quot;0&quot; data-original-height=&quot;768&quot; data-original-width=&quot;1024&quot; height=&quot;240&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh1I-rV1t2Hsib8IwVaKSTl2gEfDBjrTfbIaBZbqgHpyiIyrfiUTzzne-KhFh2JQLpQB-VXtZ-vltIy95uoO3yxnWxXcHIXx5Rl97ixxyh4HWNbU0ZDn1hI4egAhhcXp0SI-u3yODiIAqV5NwDmlhd2M9tb-lDLLuqj4Qfdx2V9-M9dmF4qcUFI5QGpAOo/w320-h240/1024px-Europol_building,_The_Hague,_the_Netherlands_-_002.jpg&quot; title=&quot;Cybersecurity Journalist&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;/i&gt;&lt;i style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;Image Credit: &lt;a href=&quot;https://commons.wikimedia.org/wiki/User:OSeveno&quot; target=&quot;_blank&quot;&gt;OSeveno CCSA 3.0&lt;/a&gt;&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;</description><link>https://iainfraserjournalist.blogspot.com/2023/11/ukraine-ransomware-takedown.html</link><author>noreply@blogger.com (Cybersecurity Journalist - Iain Fraser)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh1I-rV1t2Hsib8IwVaKSTl2gEfDBjrTfbIaBZbqgHpyiIyrfiUTzzne-KhFh2JQLpQB-VXtZ-vltIy95uoO3yxnWxXcHIXx5Rl97ixxyh4HWNbU0ZDn1hI4egAhhcXp0SI-u3yODiIAqV5NwDmlhd2M9tb-lDLLuqj4Qfdx2V9-M9dmF4qcUFI5QGpAOo/s72-w320-h240-c/1024px-Europol_building,_The_Hague,_the_Netherlands_-_002.jpg" height="72" width="72"/><thr:total>0</thr:total><georss:featurename>Gibraltar</georss:featurename><georss:point>36.140751 -5.353585</georss:point><georss:box>7.8305171638211561 -40.509835 64.450984836178847 29.802665</georss:box></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-484539844128637595.post-3867103335541455068</guid><pubDate>Tue, 28 Nov 2023 09:11:00 +0000</pubDate><atom:updated>2023-11-28T10:12:05.976+01:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">AI</category><category domain="http://www.blogger.com/atom/ns#">Insights</category><category domain="http://www.blogger.com/atom/ns#">Latest_News</category><category domain="http://www.blogger.com/atom/ns#">Threat_Intel</category><title>CYBER THREAT INTEL: AI - UK &amp; US Spooks publish AI Development Guidance</title><description>&lt;div&gt;&lt;b&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;Tuesday, 28th November 2023&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;&lt;b&gt;CYBER THREAT INTEL: AI -&lt;/b&gt; UK &amp;amp; US Spooks publish AI Development Guidance&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;Posted by: Iain Fraser - &lt;a href=&quot;https://www.google.com/search?q=cybersecurity+journalist&amp;amp;oq=cyber&amp;amp;gs_lcrp=EgZjaHJvbWUqBggAEEUYOzIGCAAQRRg7MgYIARBFGDkyBwgCEC4YgAQyBwgDEAAYgAQyBwgEEC4YgAQyBwgFEAAYgAQyDQgGEC4YxwEY0QMYgAQyBwgHEAAYgAQyBwgIEAAYgAQyBwgJEAAYjwLSAQkzNTAxajBqMTWoAgCwAgA&amp;amp;sourceid=chrome&amp;amp;ie=UTF-8&quot; target=&quot;_blank&quot;&gt;Cybersecurity Journalist&lt;/a&gt; Gibraltar&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;via IainFraser.net/ &lt;a href=&quot;https://www.google.com/search?q=daily+cyber+insights&amp;amp;sca_esv=585873092&amp;amp;ei=dKxlZaT9JKyIkdUP1MCzyA4&amp;amp;ved=0ahUKEwikh9nVquaCAxUsRKQEHVTgDOkQ4dUDCBA&amp;amp;uact=5&amp;amp;oq=daily+cyber+insights&amp;amp;gs_lp=Egxnd3Mtd2l6LXNlcnAiFGRhaWx5IGN5YmVyIGluc2lnaHRzMgUQIRigATIFECEYoAEyBRAhGKABSORWULUHWK1QcAJ4AZABBJgB0wGgAa8eqgEGMC4yNC4xuAEDyAEA-AEBqAIAwgIKEAAYRxjWBBiwA8ICChAAGIAEGIoFGEPCAgUQABiABMICBhAAGBYYHsICCxAAGIAEGIoFGIYDwgILEAAYgAQYigUYkQLCAgsQLhiABBjHARjRA8ICBRAuGIAEwgINEC4YgAQYxwEY0QMYCsICCxAuGIAEGMcBGK8BwgIHECEYoAEYCuIDBBgAIEGIBgGQBgg&amp;amp;sclient=gws-wiz-serp&quot; target=&quot;_blank&quot;&gt;Daily Cyber Insights&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;CYBER THREAT INTEL: AI - UK &amp;amp; US Spooks publish AI Development Guidance&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;&lt;b&gt;The UK &lt;a href=&quot;https://www.ncsc.gov.uk/&quot; target=&quot;_blank&quot;&gt;NCSC&lt;/a&gt; &amp;amp; US &lt;a href=&quot;https://www.cisa.gov/&quot; target=&quot;_blank&quot;&gt;CISA&lt;/a&gt;&lt;/b&gt; have joint-published what they term as &quot;security-focused guidance&quot; for AI &amp;amp; ML developers and those who leverage AI/ML with their protocols and systems.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;The Publication of &lt;a href=&quot;https://www.ncsc.gov.uk/collection/guidelines-secure-ai-system-development&quot; target=&quot;_blank&quot;&gt;Guidelines for Secure AI System Development &lt;/a&gt;(PDF),&amp;nbsp; apply to all types of AI/ML systems, regardless of whether built from wireframe up or added as a bolt-on on third-party resources, to address issues related to AI, cybersecurity, and critical infrastructure.&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;Devised to be used in conjunction with existing Cybersecurity, Incident Response and Cyber Risk-Management protocols. The &lt;a href=&quot;https://www.ncsc.gov.uk/&quot; target=&quot;_blank&quot;&gt;&lt;b&gt;NCSC&lt;/b&gt;&lt;/a&gt; and &lt;a href=&quot;https://www.cisa.gov/&quot; target=&quot;_blank&quot;&gt;&lt;b&gt;CISA&lt;/b&gt;&lt;/a&gt; have said &lt;i&gt;“Providers should implement security controls and mitigations where possible within their models, pipelines and/or systems, and where settings are used, implement the most secure option as default”&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;The Guidelines have been collated in collaboration with over 20 domestic and international cybersecurity organisations, broken down into four sections, covering different stages of the AI system development, namely - Design, Development, Deployment &amp;amp; Operation and Maintenance. Implementation of the recommendations will require investments in features, mechanisms and tools designed and implemented to protect customer data at all layers and throughout the entire system lifecycle.&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhu7V1gKBiCZekCbqKYP-z-FS6kqHLq_4fUfAgLkGxTEEqXrZcKKV3tNMo3v4CVDXryeDTj8RpZ0sEDKsm7z7fenwgAUU9AsTV19L6IY0C2WP0qz7oI9ceSzfLmLHmVXRiORzxDAFN66BMa0kFnCsRhsgAxc25DGKGMOXN8wy2_k7OVUoXAUB8ItnOMVlw/s1280/technology-7111799_1280.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Cybersecurity Journalist&quot; border=&quot;0&quot; data-original-height=&quot;699&quot; data-original-width=&quot;1280&quot; height=&quot;175&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhu7V1gKBiCZekCbqKYP-z-FS6kqHLq_4fUfAgLkGxTEEqXrZcKKV3tNMo3v4CVDXryeDTj8RpZ0sEDKsm7z7fenwgAUU9AsTV19L6IY0C2WP0qz7oI9ceSzfLmLHmVXRiORzxDAFN66BMa0kFnCsRhsgAxc25DGKGMOXN8wy2_k7OVUoXAUB8ItnOMVlw/w320-h175/technology-7111799_1280.jpg&quot; title=&quot;Daily Cyber Insights&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;</description><link>https://iainfraserjournalist.blogspot.com/2023/11/spooks-publish-ai-guide.html</link><author>noreply@blogger.com (Cybersecurity Journalist - Iain Fraser)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhu7V1gKBiCZekCbqKYP-z-FS6kqHLq_4fUfAgLkGxTEEqXrZcKKV3tNMo3v4CVDXryeDTj8RpZ0sEDKsm7z7fenwgAUU9AsTV19L6IY0C2WP0qz7oI9ceSzfLmLHmVXRiORzxDAFN66BMa0kFnCsRhsgAxc25DGKGMOXN8wy2_k7OVUoXAUB8ItnOMVlw/s72-w320-h175-c/technology-7111799_1280.jpg" height="72" width="72"/><thr:total>0</thr:total><georss:featurename>Gibraltar</georss:featurename><georss:point>36.140751 -5.353585</georss:point><georss:box>7.8305171638211561 -40.509835 64.450984836178847 29.802665</georss:box></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-484539844128637595.post-8762536027632464945</guid><pubDate>Thu, 23 Nov 2023 13:28:00 +0000</pubDate><atom:updated>2023-11-23T14:34:51.907+01:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Geo_Crime</category><category domain="http://www.blogger.com/atom/ns#">GeoCrime</category><category domain="http://www.blogger.com/atom/ns#">Latest_News</category><category domain="http://www.blogger.com/atom/ns#">PR_Wire</category><title>CRYPTO FRAUD: US DoJ - Binance and CEO Plead Guilty to Federal Charges in $4B Resolution</title><description>&lt;b&gt;Thursday, 23rd November 2023&lt;/b&gt;&lt;div&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;b&gt;CRYPTO FRAUD: US DoJ - Binance and CEO Plead Guilty to Federal Charges in $4B Resolution&lt;/b&gt;&lt;/div&gt;&lt;div&gt;Syndicated By: IainFraser.net/CyberPRWire&lt;/div&gt;&lt;div&gt;Daily Cybersecurity PRWire&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Binance Admits It Engaged in Anti-Money Laundering, Unlicensed Money Transmitting, and Sanctions Violations in Largest Corporate Resolution to Include Criminal Charges for an Executive Binance Holdings Limited (Binance), the entity that operates the world’s largest cryptocurrency exchange, Binance.com, pleaded guilty today and has agreed to pay over $4 billion to resolve the Justice Department’s investigation into violations related to the Bank Secrecy Act (BSA), failure to register as a money transmitting business, and the International Emergency Economic Powers Act (IEEPA).&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Binance’s founder and chief executive officer (CEO), Changpeng Zhao, a Canadian national, also pleaded guilty to failing to maintain an effective anti-money laundering (AML) program, in violation of the BSA and has resigned as CEO of Binance.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Binance’s guilty plea is part of coordinated resolutions with the Department of the Treasury’s Financial Crimes Enforcement Network (FinCEN) and Office of Foreign Assets Control (OFAC) and the U.S. Commodity Futures Trading Commission (CFTC). &lt;a href=&quot;https://www.justice.gov/opa/pr/binance-and-ceo-plead-guilty-federal-charges-4b-resolution&quot; target=&quot;_blank&quot;&gt;Learn More /...&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhcgjj49L5o3j_obdbqvWRmLqyTEpdT7JwkvvISD4A8zrs3ddYj7hwwsme0ReIVRGeq2bSLUmw7AYk1g4G6OyHOKJeOfLbtsiwQ4xUExrLyNgWCARLzBWvM91Fi6PCW-IepifQknIheEPzylCtsIb67h3pYMd4mw5jekDusABuUk6C8s3qDdaSH8hqSTMM/s1280/stock-market-6531146_1280.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Cybersecurity Journalist&quot; border=&quot;0&quot; data-original-height=&quot;853&quot; data-original-width=&quot;1280&quot; height=&quot;213&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhcgjj49L5o3j_obdbqvWRmLqyTEpdT7JwkvvISD4A8zrs3ddYj7hwwsme0ReIVRGeq2bSLUmw7AYk1g4G6OyHOKJeOfLbtsiwQ4xUExrLyNgWCARLzBWvM91Fi6PCW-IepifQknIheEPzylCtsIb67h3pYMd4mw5jekDusABuUk6C8s3qDdaSH8hqSTMM/w320-h213/stock-market-6531146_1280.jpg&quot; title=&quot;Daily Cybersecurity PR&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;</description><link>https://iainfraserjournalist.blogspot.com/2023/11/binance-ceo-guilty.html</link><author>noreply@blogger.com (Cybersecurity Journalist - Iain Fraser)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhcgjj49L5o3j_obdbqvWRmLqyTEpdT7JwkvvISD4A8zrs3ddYj7hwwsme0ReIVRGeq2bSLUmw7AYk1g4G6OyHOKJeOfLbtsiwQ4xUExrLyNgWCARLzBWvM91Fi6PCW-IepifQknIheEPzylCtsIb67h3pYMd4mw5jekDusABuUk6C8s3qDdaSH8hqSTMM/s72-w320-h213-c/stock-market-6531146_1280.jpg" height="72" width="72"/><thr:total>0</thr:total><georss:featurename>Gibraltar</georss:featurename><georss:point>36.140751 -5.353585</georss:point><georss:box>7.8305171638211561 -40.509835 64.450984836178847 29.802665</georss:box></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-484539844128637595.post-4900629972970131944</guid><pubDate>Mon, 20 Nov 2023 13:45:00 +0000</pubDate><atom:updated>2023-11-20T14:45:52.936+01:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Infrastructure</category><category domain="http://www.blogger.com/atom/ns#">Insights</category><category domain="http://www.blogger.com/atom/ns#">Latest_News</category><category domain="http://www.blogger.com/atom/ns#">Threat_Intel</category><title>CYBER THREAT INTELLIGENCE - IAEA: Enhancing Cybersecurity for Nuclear Safety and Security</title><description>&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;&lt;b&gt;CYBER THREAT INTELLIGENCE - IAEA: Enhancing Cybersecurity for Nuclear Safety and Security&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;Posted By: Iain Fraser - Cybersecurity Journalist&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;via Daily Cyber Insights PR Wire&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;IainFraser.net/CyberInsights&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;The International Atomic Energy Agency (IAEA) published an article back in June this year but the topic is so evocative I have decided to revisit the subject particularly with developments in the Russia - Ukraine War. Only a few weeks ago Russia launched an attack of&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;Iranian-designed Shahed drones on the Khmelnytsky Nuclear Power Plant region. The IAEA was quick to confirm that the plant&#39;s operations were unaffected.&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;IAEA Director General Rafael Grossi said in a statement at the time that &lt;i&gt;&quot;Powerful explosions shook an area near Ukraine&#39;s Khmelnytsky,&quot; &quot;The blasts highlight the dangers to nuclear safety&quot;&lt;/i&gt; posed by the war, he added.&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;Writing on the IAEA Website back in June this year in her article Enhancing Computer Security for Nuclear Safety and Security - Lydie Evrard wrote Nuclear safety and nuclear security share the same objective and vision: to protect individuals, societies and the environment from the potential harmful effects of ionizing radiation. Though the activities that address nuclear safety and nuclear security are different, it is essential to establish a well-coordinated approach to managing their interface. It is important to ensure that relevant measures are implemented in a manner that capitalizes on opportunities that may be available for mutual enhancement — without compromising either safety or security. &lt;a href=&quot;https://www.iaea.org/bulletin/enhancing-computer-security-for-nuclear-safety-and-security&quot; target=&quot;_blank&quot;&gt;Learn More /...&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;&lt;b&gt;About the IAEA&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;The International Atomic Energy Agency is the world&#39;s central intergovernmental forum for scientific and technical cooperation in the nuclear field. It works for the safe, secure and peaceful uses of nuclear science and technology, contributing to international peace and security and the United Nations&#39; Sustainable Development Goals.&lt;a href=&quot;https://www.iaea.org/about/overview&quot; target=&quot;_blank&quot;&gt; Learn More /...&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjx-3OsNVQJWTt4PhFzLKTY9_65Rw-nlwS-5FlDyV_GHIg1Zaw0yNDhDIrjuhYwNR1MexFm6cScIOoGtsS5W6PPwkzdgMZqqH2Zye8N0OxiUNreydAzIyeTn498mmlzj5FEdSWO0CnWtTkZ4LZ8Dtq6hbNbNyHFIoGw802drU6NH9-tGw5nlH8PODn0lgg/s1280/armageddon-2546068_1280.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Cybersecurity Journalist&quot; border=&quot;0&quot; data-original-height=&quot;720&quot; data-original-width=&quot;1280&quot; height=&quot;225&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjx-3OsNVQJWTt4PhFzLKTY9_65Rw-nlwS-5FlDyV_GHIg1Zaw0yNDhDIrjuhYwNR1MexFm6cScIOoGtsS5W6PPwkzdgMZqqH2Zye8N0OxiUNreydAzIyeTn498mmlzj5FEdSWO0CnWtTkZ4LZ8Dtq6hbNbNyHFIoGw802drU6NH9-tGw5nlH8PODn0lgg/w400-h225/armageddon-2546068_1280.jpg&quot; title=&quot;Cybersecurity Writer&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;</description><link>https://iainfraserjournalist.blogspot.com/2023/11/iaea-enhancing-cybersecurity.html</link><author>noreply@blogger.com (Cybersecurity Journalist - Iain Fraser)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjx-3OsNVQJWTt4PhFzLKTY9_65Rw-nlwS-5FlDyV_GHIg1Zaw0yNDhDIrjuhYwNR1MexFm6cScIOoGtsS5W6PPwkzdgMZqqH2Zye8N0OxiUNreydAzIyeTn498mmlzj5FEdSWO0CnWtTkZ4LZ8Dtq6hbNbNyHFIoGw802drU6NH9-tGw5nlH8PODn0lgg/s72-w400-h225-c/armageddon-2546068_1280.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-484539844128637595.post-8653116081290148382</guid><pubDate>Thu, 16 Nov 2023 11:08:00 +0000</pubDate><atom:updated>2023-11-23T14:35:17.688+01:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">GeoCrime</category><category domain="http://www.blogger.com/atom/ns#">Latest_News</category><category domain="http://www.blogger.com/atom/ns#">Threat_Intel</category><title>EUROPOL: Europol and Eurojust support Czech and Ukrainian police in taking down multi-million euro voice phishing gang </title><description>&lt;div style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;Thursday, 16th November 2023&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;&lt;b&gt;EUROPOL: Europol and Eurojust support Czech and Ukrainian police in taking down multi-million euro voice phishing gang&amp;nbsp;&lt;/b&gt;&lt;br /&gt;Syndicated By: Iain Fraser&amp;nbsp;&lt;a href=&quot;https://www.google.com/search?q=cybersecurity+journalist+gibraltar&amp;amp;sca_esv=576042617&amp;amp;source=hp&amp;amp;ei=rIU3Zf23HYqtkdUP-eyp4Aw&amp;amp;iflsig=AO6bgOgAAAAAZTeTvLCojvPzBDC3l3LHjF3861Lf3PBo&amp;amp;ved=0ahUKEwj9vcybp46CAxWKVqQEHXl2CswQ4dUDCAo&amp;amp;uact=5&amp;amp;oq=cybersecurity+journalist+gibraltar&amp;amp;gs_lp=Egdnd3Mtd2l6IiJjeWJlcnNlY3VyaXR5IGpvdXJuYWxpc3QgZ2licmFsdGFyMgUQIRigAUiKhgZQxMkEWJL9BXACeACQAQCYAccBoAGAIqoBBDAuMzS4AQPIAQD4AQGoAgDCAgUQABiABMICCxAuGIAEGMcBGNEDwgIFEC4YgATCAgcQABiABBgKwgIIEAAYigUYhgPCAgYQABgWGB7CAgQQIRgVwgIHECEYoAEYCg&amp;amp;sclient=gws-wiz&quot; target=&quot;_blank&quot;&gt;Cybersecurity Journalist Gibraltar&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;via&amp;nbsp;&lt;a href=&quot;https://www.IainFRASER.net/&quot;&gt;IainFRASER.net/PRWire&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;The Czech and Ukrainian police have disrupted, with the support of Europol and Eurojust, a prolific phishing gang believed to have defrauded victims across Europe of tens of millions of euros. In Czechia alone, the damage caused by this criminal group is estimated at over EUR 8 million (CZK 195 000 000).&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;As a result of this investigation, six suspects were already arrested in Ukraine and four in the Czech Republic in April this year. Locations in Czechia (Domazlice, Rokycany and Plzen) and Ukraine (Dnipropetrovsk) were searched during the raids, including the homes of the accused, vehicles and call centres. &lt;a href=&quot;https://www.europol.europa.eu/media-press/newsroom/news/europol-and-eurojust-support-czech-and-ukrainian-police-in-taking-down-multi-million-euro-voice-phishing-gang?mtm_campaign=newsletter&quot; target=&quot;_blank&quot;&gt;Learn More /...&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg4VfynEw3G5LMNqiv0CHAlndmGVztl2sxPAGFRc-s4PLav0ApFtVKiN4NEQoXzSS_aqcj30Rkq4UVu_TYEBPzhRNtSyPWLN5PnQoOIYZNjZSJp2ZUqqirZJjaXTwCNxDd8ooLDxLqIByCXjtCTBQ3u0-gH_F1bz6XrHBvDeR6rDj5Zhyp_KrrRmT23H58/s1024/1024px-Europol_building,_The_Hague,_the_Netherlands_-_960.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Image Credit: OSeveno&quot; border=&quot;0&quot; data-original-height=&quot;768&quot; data-original-width=&quot;1024&quot; height=&quot;240&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg4VfynEw3G5LMNqiv0CHAlndmGVztl2sxPAGFRc-s4PLav0ApFtVKiN4NEQoXzSS_aqcj30Rkq4UVu_TYEBPzhRNtSyPWLN5PnQoOIYZNjZSJp2ZUqqirZJjaXTwCNxDd8ooLDxLqIByCXjtCTBQ3u0-gH_F1bz6XrHBvDeR6rDj5Zhyp_KrrRmT23H58/w320-h240/1024px-Europol_building,_The_Hague,_the_Netherlands_-_960.jpg&quot; title=&quot;Cybersecurity Journalist&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;/div&gt;</description><link>https://iainfraserjournalist.blogspot.com/2023/11/europol-halts-phishing-gang.html</link><author>noreply@blogger.com (Cybersecurity Journalist - Iain Fraser)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg4VfynEw3G5LMNqiv0CHAlndmGVztl2sxPAGFRc-s4PLav0ApFtVKiN4NEQoXzSS_aqcj30Rkq4UVu_TYEBPzhRNtSyPWLN5PnQoOIYZNjZSJp2ZUqqirZJjaXTwCNxDd8ooLDxLqIByCXjtCTBQ3u0-gH_F1bz6XrHBvDeR6rDj5Zhyp_KrrRmT23H58/s72-w320-h240-c/1024px-Europol_building,_The_Hague,_the_Netherlands_-_960.jpg" height="72" width="72"/><thr:total>0</thr:total><georss:featurename>Gibraltar</georss:featurename><georss:point>36.140751 -5.353585</georss:point><georss:box>7.8305171638211561 -40.509835 64.450984836178847 29.802665</georss:box></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-484539844128637595.post-5425679929083803858</guid><pubDate>Fri, 27 Oct 2023 11:57:00 +0000</pubDate><atom:updated>2023-11-23T14:35:38.695+01:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Europol</category><category domain="http://www.blogger.com/atom/ns#">GeoCrime</category><category domain="http://www.blogger.com/atom/ns#">Latest_News</category><title>EUROPOL: Unleashing Tech in the fight against Intellectual Property Crime</title><description>&lt;b&gt;EUROPOL: Unleashing Tech in the fight against Intellectual Property Crime&lt;/b&gt;&lt;div&gt;&lt;div&gt;Syndicated By: Iain Fraser&amp;nbsp;&lt;a href=&quot;https://www.google.com/search?q=cybersecurity+journalist+gibraltar&amp;amp;sca_esv=576042617&amp;amp;source=hp&amp;amp;ei=rIU3Zf23HYqtkdUP-eyp4Aw&amp;amp;iflsig=AO6bgOgAAAAAZTeTvLCojvPzBDC3l3LHjF3861Lf3PBo&amp;amp;ved=0ahUKEwj9vcybp46CAxWKVqQEHXl2CswQ4dUDCAo&amp;amp;uact=5&amp;amp;oq=cybersecurity+journalist+gibraltar&amp;amp;gs_lp=Egdnd3Mtd2l6IiJjeWJlcnNlY3VyaXR5IGpvdXJuYWxpc3QgZ2licmFsdGFyMgUQIRigAUiKhgZQxMkEWJL9BXACeACQAQCYAccBoAGAIqoBBDAuMzS4AQPIAQD4AQGoAgDCAgUQABiABMICCxAuGIAEGMcBGNEDwgIFEC4YgATCAgcQABiABBgKwgIIEAAYigUYhgPCAgYQABgWGB7CAgQQIRgVwgIHECEYoAEYCg&amp;amp;sclient=gws-wiz&quot; target=&quot;_blank&quot;&gt;Cybersecurity Journalist Gibraltar&lt;/a&gt;&lt;/div&gt;&lt;div&gt;via&amp;nbsp;&lt;a href=&quot;https://www.IainFRASER.net/&quot;&gt;IainFRASER.net/PRWire&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Friday, 27th October 2023&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;Europol Intellectual Property Crime Conference hosts 250 experts fighting counterfeit goods that pose threat to health, safety, and the environment&amp;nbsp;&lt;/b&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;The conference, themed &quot;Tackling counterfeit goods posing a threat to health, safety, and the environment,&quot; delved deep into the critical issues surrounding intellectual property (IP) crime, with a particular focus on the role of advanced technology. Within a busy agenda of conference activities, a diverse group of experts and stakeholders from around the world came together for the discussion. &lt;a href=&quot;https://www.europol.europa.eu/media-press/newsroom/news/unleashing-tech-in-fight-against-intellectual-property-crime?mtm_campaign=newsletter&quot; target=&quot;_blank&quot;&gt;Learn More /...&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;Key topics at the conference included:&lt;/b&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;&lt;div&gt;•&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;the role of women in fighting intellectual property crime;&lt;/div&gt;&lt;div&gt;•&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;counterfeit goods posing a threat to health and safety;&lt;/div&gt;&lt;div&gt;•&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;counterfeit goods posing a threat to the environment;&lt;/div&gt;&lt;div&gt;•&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;the impact of advanced technology on intellectual property crime.&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi3MlICdewR4NRCzszQ40DikUzZX_hMXSfsQuYIW4eTeu51LXI5D3gd8dJSNZxkKABy6KfwdvdADwXsq-niEGJ8OLIEdeGVxql0xbhLKL9nlb0ZfY-CjaiwFAshlT77f8E8Xh4TiT0AuPdaQj4laChAQ2RrLMPr5dESNz6Xn94PdvhGQxQyaNaw0ig-BxI/s1280/lady-justice-2388500_1280.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Cybersecurity Journalist&quot; border=&quot;0&quot; data-original-height=&quot;960&quot; data-original-width=&quot;1280&quot; height=&quot;240&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi3MlICdewR4NRCzszQ40DikUzZX_hMXSfsQuYIW4eTeu51LXI5D3gd8dJSNZxkKABy6KfwdvdADwXsq-niEGJ8OLIEdeGVxql0xbhLKL9nlb0ZfY-CjaiwFAshlT77f8E8Xh4TiT0AuPdaQj4laChAQ2RrLMPr5dESNz6Xn94PdvhGQxQyaNaw0ig-BxI/w320-h240/lady-justice-2388500_1280.jpg&quot; title=&quot;Daily Cyber Insights&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;</description><link>https://iainfraserjournalist.blogspot.com/2023/10/intellectual-property-crime.html</link><author>noreply@blogger.com (Cybersecurity Journalist - Iain Fraser)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi3MlICdewR4NRCzszQ40DikUzZX_hMXSfsQuYIW4eTeu51LXI5D3gd8dJSNZxkKABy6KfwdvdADwXsq-niEGJ8OLIEdeGVxql0xbhLKL9nlb0ZfY-CjaiwFAshlT77f8E8Xh4TiT0AuPdaQj4laChAQ2RrLMPr5dESNz6Xn94PdvhGQxQyaNaw0ig-BxI/s72-w320-h240-c/lady-justice-2388500_1280.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-484539844128637595.post-5154052664334809891</guid><pubDate>Wed, 25 Oct 2023 08:29:00 +0000</pubDate><atom:updated>2023-10-25T10:29:37.698+02:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Consumer</category><category domain="http://www.blogger.com/atom/ns#">Data Breach</category><category domain="http://www.blogger.com/atom/ns#">Latest_News</category><title>DATA BREACH: Millions of Highly Sensitive Patient Records Exposed in Medical Diagnostic Company Data Breach</title><description>&lt;div&gt;&lt;div&gt;&lt;b&gt;DATA BREACH: Millions of Highly Sensitive Patient Records Exposed in Medical Diagnostic Company Data Breach&lt;/b&gt;&lt;/div&gt;&lt;div&gt;By: Jeremiah Fowler - WebsitePlanet.com&lt;/div&gt;&lt;/div&gt;&lt;div&gt;Syndicated By: Iain Fraser&amp;nbsp;&lt;a href=&quot;https://www.google.com/search?q=cybersecurity+journalist+gibraltar&amp;amp;sca_esv=576042617&amp;amp;source=hp&amp;amp;ei=rIU3Zf23HYqtkdUP-eyp4Aw&amp;amp;iflsig=AO6bgOgAAAAAZTeTvLCojvPzBDC3l3LHjF3861Lf3PBo&amp;amp;ved=0ahUKEwj9vcybp46CAxWKVqQEHXl2CswQ4dUDCAo&amp;amp;uact=5&amp;amp;oq=cybersecurity+journalist+gibraltar&amp;amp;gs_lp=Egdnd3Mtd2l6IiJjeWJlcnNlY3VyaXR5IGpvdXJuYWxpc3QgZ2licmFsdGFyMgUQIRigAUiKhgZQxMkEWJL9BXACeACQAQCYAccBoAGAIqoBBDAuMzS4AQPIAQD4AQGoAgDCAgUQABiABMICCxAuGIAEGMcBGNEDwgIFEC4YgATCAgcQABiABBgKwgIIEAAYigUYhgPCAgYQABgWGB7CAgQQIRgVwgIHECEYoAEYCg&amp;amp;sclient=gws-wiz&quot; target=&quot;_blank&quot;&gt;Cybersecurity Journalist Gibraltar&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;via&amp;nbsp;&lt;a href=&quot;https://www.IainFRASER.net/&quot;&gt;IainFRASER.net/PRWire&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Wednesday, 25th October 2023&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;b&gt;Cybersecurity Researcher, Jeremiah Fowler, discovered and reported to WebsitePlanet about a non-password protected database that contained over 12 million records containing medical diagnostic scans, test results, and other potentially sensitive medical records.&lt;/b&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;The database contained a massive amount of medical test results that included the names of patients, doctors, if the testing sample was done at home or at a medical facility, and a wide range of other sensitive health information. The total number of records was significant, at a count of 12,347,297 with a total size of 7TB. Upon further investigation, the documents were marked as belonging to an India-based company called Redcliffe Labs.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;I immediately sent a responsible disclosure notice, and I received a reply acknowledging my discovery and thanking me for my efforts. Public access was restricted the same day, but it is unclear how long the database was exposed or if any unauthorized individuals accessed the purported health records.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Redcliffe Labs is one of India’s largest diagnostic centres. It offers more than 3600 wellness and illness tests. Users can receive medical diagnosis services at home, at medical facilities, and online via a mobile application. These services include full-body check-ups at home, blood testing, diabetes tests, joint care, vitamin tests, specialized testing services for cancer, genetics, HIV, pregnancy, and many others. Redcliffe Labs also advertises free sample collections and a consultation with a doctor as part of the service.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;According to their website, they have 2.5 million customers. However, a folder in the database named “test results” contained over 6 million PDF documents. This could indicate either that far more customers were potentially affected or that perhaps these were multiple tests from repeat customers. According to their website “Redcliffe Labs is India’s fastest growing technology empowered diagnostics service provider having its home sample collection service in more than 220+ cities with 80+ Labs and 2000+ Walk-in Wellness and Collection Centres across India”. &lt;a href=&quot;https://www.websiteplanet.com/news/redcliffe-breach-report/&quot; target=&quot;_blank&quot;&gt;Learn More /...&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhO8WR_NfHD7bSidoh89e7hHOUbKfEfjRfr3m6ElkzdfPn3kVd5nrtP_r7vWtHfgHx2UED_teJSY0le3P2YUagb9Zg8rL2UzsKl49tjMj5mM85mTjXbF_DyYl3xHQfnltLMn6JUQOx2dA0whfgwmR5ghnBbPSIfqqOxn12xZ-SLnDiwthTjVq89cupDvjg/s850/MILLIONS-OF-HIGHLY-SENSITIVE-850x446.webp&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Daily Cyber Insights&quot; border=&quot;0&quot; data-original-height=&quot;446&quot; data-original-width=&quot;850&quot; height=&quot;210&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhO8WR_NfHD7bSidoh89e7hHOUbKfEfjRfr3m6ElkzdfPn3kVd5nrtP_r7vWtHfgHx2UED_teJSY0le3P2YUagb9Zg8rL2UzsKl49tjMj5mM85mTjXbF_DyYl3xHQfnltLMn6JUQOx2dA0whfgwmR5ghnBbPSIfqqOxn12xZ-SLnDiwthTjVq89cupDvjg/w400-h210/MILLIONS-OF-HIGHLY-SENSITIVE-850x446.webp&quot; title=&quot;Cybersecurity Journalist&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;</description><link>https://iainfraserjournalist.blogspot.com/2023/10/medical-records-cyber-breach.html</link><author>noreply@blogger.com (Cybersecurity Journalist - Iain Fraser)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhO8WR_NfHD7bSidoh89e7hHOUbKfEfjRfr3m6ElkzdfPn3kVd5nrtP_r7vWtHfgHx2UED_teJSY0le3P2YUagb9Zg8rL2UzsKl49tjMj5mM85mTjXbF_DyYl3xHQfnltLMn6JUQOx2dA0whfgwmR5ghnBbPSIfqqOxn12xZ-SLnDiwthTjVq89cupDvjg/s72-w400-h210-c/MILLIONS-OF-HIGHLY-SENSITIVE-850x446.webp" height="72" width="72"/><thr:total>0</thr:total><georss:featurename>Gibraltar</georss:featurename><georss:point>36.140751 -5.353585</georss:point><georss:box>7.8305171638211561 -40.509835 64.450984836178847 29.802665</georss:box></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-484539844128637595.post-8507999719998971696</guid><pubDate>Tue, 24 Oct 2023 08:58:00 +0000</pubDate><atom:updated>2023-11-23T14:36:06.345+01:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Europol</category><category domain="http://www.blogger.com/atom/ns#">GeoCrime</category><category domain="http://www.blogger.com/atom/ns#">Latest_News</category><category domain="http://www.blogger.com/atom/ns#">Ragnar Lockwear</category><category domain="http://www.blogger.com/atom/ns#">Ransomware Gang</category><title>EUROPOL: Ragnar Locker ransomware gang taken down by international police swoop</title><description>&lt;div&gt;&lt;b&gt;EUROPOL: Ragnar Locker ransomware gang taken down by international police swoop&lt;/b&gt;&lt;/div&gt;&lt;div&gt;Syndicated By: Iain Fraser &lt;a href=&quot;https://www.google.com/search?q=cybersecurity+journalist+gibraltar&amp;amp;sca_esv=576042617&amp;amp;source=hp&amp;amp;ei=rIU3Zf23HYqtkdUP-eyp4Aw&amp;amp;iflsig=AO6bgOgAAAAAZTeTvLCojvPzBDC3l3LHjF3861Lf3PBo&amp;amp;ved=0ahUKEwj9vcybp46CAxWKVqQEHXl2CswQ4dUDCAo&amp;amp;uact=5&amp;amp;oq=cybersecurity+journalist+gibraltar&amp;amp;gs_lp=Egdnd3Mtd2l6IiJjeWJlcnNlY3VyaXR5IGpvdXJuYWxpc3QgZ2licmFsdGFyMgUQIRigAUiKhgZQxMkEWJL9BXACeACQAQCYAccBoAGAIqoBBDAuMzS4AQPIAQD4AQGoAgDCAgUQABiABMICCxAuGIAEGMcBGNEDwgIFEC4YgATCAgcQABiABBgKwgIIEAAYigUYhgPCAgYQABgWGB7CAgQQIRgVwgIHECEYoAEYCg&amp;amp;sclient=gws-wiz&quot; target=&quot;_blank&quot;&gt;Cybersecurity Journalist Gibraltar&lt;/a&gt;&lt;/div&gt;&lt;div&gt;via &lt;a href=&quot;https://www.IainFRASER.net/&quot;&gt;IainFRASER.net/PRWire&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Tuesday, 24th October 2023&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;EUROPOL: Ragnar Locker ransomware gang taken down by international police swoop as Law Enforcement and Judicial authorities from eleven countries delivered a major blow to one of the most dangerous ransomware operations of recent years.&amp;nbsp;&lt;/b&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;This action, coordinated at international level by Europol and Eurojust, targeted the Ragnar Locker ransomware group. The group were responsible for numerous high-profile attacks against critical infrastructure across the world.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;In an action carried out between 16 and 20 October, searches were conducted in Czechia, Spain and Latvia. The “key target” of this malicious ransomware strain was arrested in Paris, France, on 16 October, and his home in Czechia was searched. Five suspects were interviewed in Spain and Latvia in the following days. At the end of the action week, the main perpetrator, suspected of being a developer of the Ragnar group, has been brought in front of the examining magistrates of the Paris Judicial Court.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;The ransomware’s infrastructure was also seized in the Netherlands, Germany and Sweden and the associated data leak website on Tor was taken down in Sweden. &lt;a href=&quot; https://www.europol.europa.eu/media-press/newsroom/news/ragnar-locker-ransomware-gang-taken-down-international-police-swoop?mtm_campaign=newsletter&quot; target=&quot;_blank&quot;&gt;Learn More /...&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjjYhJFWuokve9HecUpk2B7x-HYMNnpK3VHotNFAF7xD8rbyMsTuA6So7eV0fWfasmgnuekGTl2eL69uwqx6yZ1ZTR8gJkzlHOeBUwGek_jTWUVrl2Hj7vjEhZR_x37aWD93GO7ck6QdS7uXBm_LIrFAFNt1QY7_mOKJ1dS_ntC__dzKpfBKtLzARb41oY/s3874/pexels-tima-miroshnichenko-5380649.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;2583&quot; data-original-width=&quot;3874&quot; height=&quot;213&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjjYhJFWuokve9HecUpk2B7x-HYMNnpK3VHotNFAF7xD8rbyMsTuA6So7eV0fWfasmgnuekGTl2eL69uwqx6yZ1ZTR8gJkzlHOeBUwGek_jTWUVrl2Hj7vjEhZR_x37aWD93GO7ck6QdS7uXBm_LIrFAFNt1QY7_mOKJ1dS_ntC__dzKpfBKtLzARb41oY/s320/pexels-tima-miroshnichenko-5380649.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;About EMPACT&lt;/b&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;The European Multidisciplinary Platform Against Criminal Threats (EMPACT) tackles the most important threats posed by organised and serious international crime affecting the EU. EMPACT strengthens intelligence, strategic and operational cooperation between national authorities, EU institutions and bodies, and international partners. EMPACT runs in four-year cycles focusing on common EU crime priorities.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;</description><link>https://iainfraserjournalist.blogspot.com/2023/10/ransomware-gang-taken-down.html</link><author>noreply@blogger.com (Cybersecurity Journalist - Iain Fraser)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjjYhJFWuokve9HecUpk2B7x-HYMNnpK3VHotNFAF7xD8rbyMsTuA6So7eV0fWfasmgnuekGTl2eL69uwqx6yZ1ZTR8gJkzlHOeBUwGek_jTWUVrl2Hj7vjEhZR_x37aWD93GO7ck6QdS7uXBm_LIrFAFNt1QY7_mOKJ1dS_ntC__dzKpfBKtLzARb41oY/s72-c/pexels-tima-miroshnichenko-5380649.jpg" height="72" width="72"/><thr:total>0</thr:total><georss:featurename>Gibraltar</georss:featurename><georss:point>36.140751 -5.353585</georss:point><georss:box>7.8305171638211561 -40.509835 64.450984836178847 29.802665</georss:box></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-484539844128637595.post-4365867828222256240</guid><pubDate>Tue, 24 Oct 2023 07:58:00 +0000</pubDate><atom:updated>2023-10-24T10:04:10.529+02:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Latest_News</category><category domain="http://www.blogger.com/atom/ns#">PRChannel</category><category domain="http://www.blogger.com/atom/ns#">UKCSC</category><title>UKCSC: Singapore &amp; UK have expressed their intention to jointly build and develop a cyber security profession </title><description>&lt;div&gt;&lt;div&gt;&lt;b&gt;UKCSC: Singapore &amp;amp; UK have expressed their intention to jointly build and develop a cyber security profession&amp;nbsp;&lt;/b&gt;&lt;/div&gt;&lt;div&gt;Syndicated By: Iain Fraser &lt;a href=&quot;https://www.google.com/search?q=cybersecurity+journalist+gibraltar&amp;amp;sca_esv=576026540&amp;amp;ei=9HY3ZZGpAbOakdUPp-yBaA&amp;amp;ved=0ahUKEwiR89OWmY6CAxUzTaQEHSd2AA0Q4dUDCBA&amp;amp;uact=5&amp;amp;oq=cybersecurity+journalist+gibraltar&amp;amp;gs_lp=Egxnd3Mtd2l6LXNlcnAiImN5YmVyc2VjdXJpdHkgam91cm5hbGlzdCBnaWJyYWx0YXIyBRAhGKABSN4kUKgHWO8bcAF4AZABAJgBowGgAeUKqgEEMC4xMLgBA8gBAPgBAcICChAAGEcY1gQYsAPCAgYQABgWGB7CAggQABiKBRiGA8ICBBAhGBXCAgcQIRigARgK4gMEGAAgQYgGAZAGCA&amp;amp;sclient=gws-wiz-serp&quot; target=&quot;_blank&quot;&gt;Cybersecurity Journalist Gibraltar&lt;/a&gt;&lt;/div&gt;&lt;div&gt;via IainFRASER.net/CyberInsights&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Tuesday, 24th October 2023&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;The UK Cyber Security Council have announced that Singapore and the United Kingdom, have expressed their intention to jointly build and develop a cyber security profession that is clearly-defined and future-proofed.&lt;/b&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;The Governments of Singapore and the United Kingdom recognise that the cyber security skills gap is a global issue that will require a collaborative approach from the international community.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Addressing this gap will reduce cyber risk to organisations and citizens across our economies and support the growth of the sector workforce in the coming years.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Accordingly, Singapore and the United Kingdom recognise the need to work together to improve and champion the cyber security profession. Earlier today, Singapore’s Minister for Communications and Information and Minister-in-charge of Smart Nation and Cybersecurity, Mrs Josephine Teo, and UK Cabinet Office Minister, Baroness Neville-Rolfe, met on the side-lines of the Singapore International Cyber Week 2023.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;The two ministers had a wide-ranging discussion on Singapore-UK cyber cooperation and reaffirmed a mutual intent to collaborate on developing the cyber security profession and skills.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;Both countries have agreed to cooperate on the following:&lt;/b&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;• Building and aligning a common knowledge base in cyber security&lt;/div&gt;&lt;div&gt;• Facilitating a cyber skills dialogue&lt;/div&gt;&lt;div&gt;• Mapping knowledge and skills required to areas of practice in cyber security&lt;/div&gt;&lt;div&gt;• Exploring the possibility of opening the UK Cyber Security Council&#39;s Professional Chartership to cyber practitioners in Singapore who may be keen to apply. This includes introducing the Council to UK businesses located in Singapore. Learn More /...&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiYIsDHTsovC9nW7mdEns69tZlPYB9Br8Wb7NkcVnCwUzXZ9Ivk0CH8x4IV6rxlH6bmD5Nd2SLWsNLaJFW3N-xUUWt4bt2rK5y7-aQKi3REt6L8OxCSW_mMllReQ8zONllmYG3c41Zc7vZM00Y6iHppZ9PWOCO6X4u8kGYkwwIwG622Laqe3gcGUjKcjhU/s800/1697724216968.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;533&quot; data-original-width=&quot;800&quot; height=&quot;213&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiYIsDHTsovC9nW7mdEns69tZlPYB9Br8Wb7NkcVnCwUzXZ9Ivk0CH8x4IV6rxlH6bmD5Nd2SLWsNLaJFW3N-xUUWt4bt2rK5y7-aQKi3REt6L8OxCSW_mMllReQ8zONllmYG3c41Zc7vZM00Y6iHppZ9PWOCO6X4u8kGYkwwIwG622Laqe3gcGUjKcjhU/s320/1697724216968.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;#Cybersecurity #Singapore #Chartership&lt;/div&gt;</description><link>https://iainfraserjournalist.blogspot.com/2023/10/singapore-and-uk-co-sign-agreement.html</link><author>noreply@blogger.com (Cybersecurity Journalist - Iain Fraser)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiYIsDHTsovC9nW7mdEns69tZlPYB9Br8Wb7NkcVnCwUzXZ9Ivk0CH8x4IV6rxlH6bmD5Nd2SLWsNLaJFW3N-xUUWt4bt2rK5y7-aQKi3REt6L8OxCSW_mMllReQ8zONllmYG3c41Zc7vZM00Y6iHppZ9PWOCO6X4u8kGYkwwIwG622Laqe3gcGUjKcjhU/s72-c/1697724216968.jpg" height="72" width="72"/><thr:total>0</thr:total><georss:featurename>Gibraltar</georss:featurename><georss:point>36.140751 -5.353585</georss:point><georss:box>7.8305171638211561 -40.509835 64.450984836178847 29.802665</georss:box></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-484539844128637595.post-1027037777174978727</guid><pubDate>Tue, 17 Oct 2023 10:21:00 +0000</pubDate><atom:updated>2023-10-17T12:22:26.059+02:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Israel-Hamas Cyber Warfare</category><category domain="http://www.blogger.com/atom/ns#">Latest_News</category><category domain="http://www.blogger.com/atom/ns#">PRChannel</category><title>STATE ACTORS: The Israeli-Hamas Conflict Shows Cyber Warfare Is Now the New Normal</title><description>&lt;div&gt;&lt;b style=&quot;font-family: Montserrat;&quot;&gt;The Israeli-Hamas Conflict Shows Cyber Warfare Is Now the New Normal&lt;/b&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;Syndicated By: Iain Fraser Cybersecurity Journalist Gibraltar&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;Research By: Jeremiah Fowler&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;via IainFRASER.net/CyberInsights&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;&lt;b&gt;The Israeli-Hamas Conflict Shows Cyber Warfare Is Now the New Normal&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;During the start of the Russian invasion of Ukraine the hacktivist group Anonymous declared a cyber war against Russia. At the time, I conducted extensive research into the methods, tactics, and results of how a group of semi-unorganized non-governmental hacktivists were able to cause major havoc in Russia.&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;Their strategy included everything from hacking news outlets, home printers, and connected devices, to downloading a mind-boggling amount of Russian data belonging to companies and government agencies and then publicly releasing that data online. It was the first time the world saw a successful crowdsourced cyber war that could not be tracked back to any specific country or government. &lt;a href=&quot;By https://www.websiteplanet.com/news/israel-palestine-cyberwarfare-report/#:~:text=the%20New%20Normal-,Jeremiah%20Fowler,-October%2016%2C%202023&quot; target=&quot;_blank&quot;&gt;Learn More /...&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgGN0Y5BOj-uvIC4MT3z85pqiMDRdlybZnABTRreWYDqF3l8-qa4_IiiOt09OcflJDx41uya5NAdoJdW5jfzlC8RzB6jy2l3DlQsdIUsPK20wxNt6hAlXJsMhR44buM6qRVyf2oXYJn0tVQRbHXVdRKM8WNkU_PC2sozwOFhLB02vC_uUb9RiZhtny4LbY/s850/THE-ISRAELI-HAMAS-CONFLICT-SHOWS-CYBERWARFARE-IS-NOW-THE-NEW-NORMAL-850x446.webp&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;446&quot; data-original-width=&quot;850&quot; height=&quot;210&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgGN0Y5BOj-uvIC4MT3z85pqiMDRdlybZnABTRreWYDqF3l8-qa4_IiiOt09OcflJDx41uya5NAdoJdW5jfzlC8RzB6jy2l3DlQsdIUsPK20wxNt6hAlXJsMhR44buM6qRVyf2oXYJn0tVQRbHXVdRKM8WNkU_PC2sozwOFhLB02vC_uUb9RiZhtny4LbY/w400-h210/THE-ISRAELI-HAMAS-CONFLICT-SHOWS-CYBERWARFARE-IS-NOW-THE-NEW-NORMAL-850x446.webp&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;b style=&quot;font-family: Montserrat;&quot;&gt;About Jeremiah Fowler&lt;/b&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;Jeremiah Fowler is a Security Researcher and co-founder of Security Discovery. Jeremiah began his career in security research in 2015 and has a mission of data protection. He has helped identify and secure the data of millions of people around the world. His discoveries have been covered in Forbes, BBC, Gizmodo, among others. Security and responsible disclosure are not only a passion, but a way of protecting our digital lives. &lt;a href=&quot;https://www.websiteplanet.com/author/jeremiah-fowler/&quot; target=&quot;_blank&quot;&gt;Learn More /...&amp;nbsp;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;</description><link>https://iainfraserjournalist.blogspot.com/2023/10/israel-hamas-cyber-warfare.html</link><author>noreply@blogger.com (Cybersecurity Journalist - Iain Fraser)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgGN0Y5BOj-uvIC4MT3z85pqiMDRdlybZnABTRreWYDqF3l8-qa4_IiiOt09OcflJDx41uya5NAdoJdW5jfzlC8RzB6jy2l3DlQsdIUsPK20wxNt6hAlXJsMhR44buM6qRVyf2oXYJn0tVQRbHXVdRKM8WNkU_PC2sozwOFhLB02vC_uUb9RiZhtny4LbY/s72-w400-h210-c/THE-ISRAELI-HAMAS-CONFLICT-SHOWS-CYBERWARFARE-IS-NOW-THE-NEW-NORMAL-850x446.webp" height="72" width="72"/><thr:total>0</thr:total><georss:featurename>Gibraltar</georss:featurename><georss:point>36.140751 -5.353585</georss:point><georss:box>7.8305171638211561 -40.509835 64.450984836178847 29.802665</georss:box></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-484539844128637595.post-7135422540331601137</guid><pubDate>Thu, 21 Sep 2023 11:01:00 +0000</pubDate><atom:updated>2023-10-06T15:03:09.177+02:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Dark web Takedown</category><category domain="http://www.blogger.com/atom/ns#">Europol</category><category domain="http://www.blogger.com/atom/ns#">GeoCrime</category><category domain="http://www.blogger.com/atom/ns#">Latest_News</category><category domain="http://www.blogger.com/atom/ns#">PRChannel</category><title>EUROPOL: International operation closes down Piilopuoti dark web marketplace </title><description>&lt;div&gt;&lt;b&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;EUROPOL: International operation closes down Piilopuoti dark web marketplace&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;Syndicated By: Iain Fraser &lt;a href=&quot;https://www.google.com/search?q=cybersecurity+journalist+gibraltar&amp;amp;sca_esv=567242663&amp;amp;source=hp&amp;amp;ei=PyEMZfX9KLGnkdUPqtqHuA4&amp;amp;iflsig=AO6bgOgAAAAAZQwvT8u7CGy4gh3ECwDS2Sp6QfE5b2tE&amp;amp;oq=cybersecurity+journalist+gib&amp;amp;gs_lp=Egdnd3Mtd2l6IhxjeWJlcnNlY3VyaXR5IGpvdXJuYWxpc3QgZ2liKgIIATIFECEYoAEyBRAhGKABMgUQIRigATIFECEYoAFI0pABUABYyHJwAHgAkAEAmAGzA6ABvSCqAQowLjI2LjEuMC4xuAEDyAEA-AEBwgIFEAAYgATCAgsQLhiABBjHARjRA8ICBRAuGIAEwgIIEAAYigUYhgPCAgYQABgWGB7CAgQQIRgV&amp;amp;sclient=gws-wiz&quot; target=&quot;_blank&quot;&gt;Cybersecurity Journalist Gibraltar&lt;/a&gt; - PRWire Channel&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;a href=&quot;https://www.IainFraser.net/&quot;&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;IainFraser.net/PRWire&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;Thursday 21st September 2023&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;In a significant victory against dark web criminals, the Finnish Customs (Tulli), together with European partners, has successfully taken down the dark web marketplace ‘Piilopuoti’.&amp;nbsp; Drugs and other illegal commodities were sold in large quantities on this Finnish-language platform which had been operating on the Onion Router (Tor) network since May 2022.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;This successful action by the Finnish Customs was supported, among others, by the German Federal Criminal Office (Bundeskriminalamt) and the Lithuanian Criminal Police Bureau (Lietuvos kriminalinės policijos biuras). Europol’s European Cybercrime Centre coordinated the international activity and provided operational support and technical expertise.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;The investigation is still ongoing as law enforcement worldwide work together to identify the sellers and users on the platform &lt;a href=&quot;https://www.europol.europa.eu/media-press/newsroom/news/international-operation-closes-down-piilopuoti-dark-web-marketplace?mtm_campaign=newsletter&quot; target=&quot;_blank&quot;&gt;Learn More /...&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjV41U1p11wO9GSYn_Se9rIgk83cHKfuuHEKBBTeaOEgyEYWBqWpQ3tnFYo2H1DgltHfij5TVt-jAohCXTt-5gR5J3dB-ki4WI0dRSC9s9EZM6yWkflkrQX3iNBNqtPao15Bib0HnWiFVcQRECF0yxHc7G79vv4n57WFDZ-iR4aFtJtXkz5G6I4D_1qcyk/s1920/spider-web-5505310_1920.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1280&quot; data-original-width=&quot;1920&quot; height=&quot;266&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjV41U1p11wO9GSYn_Se9rIgk83cHKfuuHEKBBTeaOEgyEYWBqWpQ3tnFYo2H1DgltHfij5TVt-jAohCXTt-5gR5J3dB-ki4WI0dRSC9s9EZM6yWkflkrQX3iNBNqtPao15Bib0HnWiFVcQRECF0yxHc7G79vv4n57WFDZ-iR4aFtJtXkz5G6I4D_1qcyk/w400-h266/spider-web-5505310_1920.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;</description><link>https://iainfraserjournalist.blogspot.com/2023/09/europol-dark-web-shutdown.html</link><author>noreply@blogger.com (Cybersecurity Journalist - Iain Fraser)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjV41U1p11wO9GSYn_Se9rIgk83cHKfuuHEKBBTeaOEgyEYWBqWpQ3tnFYo2H1DgltHfij5TVt-jAohCXTt-5gR5J3dB-ki4WI0dRSC9s9EZM6yWkflkrQX3iNBNqtPao15Bib0HnWiFVcQRECF0yxHc7G79vv4n57WFDZ-iR4aFtJtXkz5G6I4D_1qcyk/s72-w400-h266-c/spider-web-5505310_1920.jpg" height="72" width="72"/><thr:total>0</thr:total><georss:featurename>Gibraltar</georss:featurename><georss:point>36.140751 -5.353585</georss:point><georss:box>7.8305171638211561 -40.509835 64.450984836178847 29.802665</georss:box></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-484539844128637595.post-5653598757397288676</guid><pubDate>Fri, 08 Sep 2023 06:44:00 +0000</pubDate><atom:updated>2023-10-06T15:03:37.150+02:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Europol</category><category domain="http://www.blogger.com/atom/ns#">GeoCrime</category><category domain="http://www.blogger.com/atom/ns#">Latest_News</category><category domain="http://www.blogger.com/atom/ns#">PRChannel</category><category domain="http://www.blogger.com/atom/ns#">Qakbot</category><title>EUROPOL: Qakbot botnet infrastructure shattered after international operation </title><description>&lt;div&gt;&lt;b&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;EUROPOL: Qakbot botnet infrastructure shattered after international operation&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;Syndicated By:&amp;nbsp;&lt;a href=&quot;https://www.google.com/search?q=cybersecurity+journalist+gibraltar&amp;amp;sca_esv=563635297&amp;amp;ei=P7n6ZJz4GICbkdUP_aCCuAQ&amp;amp;ved=0ahUKEwjck5_pq5qBAxWATaQEHX2QAEcQ4dUDCBA&amp;amp;uact=5&amp;amp;oq=cybersecurity+journalist+gibraltar&amp;amp;gs_lp=Egxnd3Mtd2l6LXNlcnAiImN5YmVyc2VjdXJpdHkgam91cm5hbGlzdCBnaWJyYWx0YXIyBRAhGKABSKQ2UNcHWJMpcAF4AZABAJgBnwSgAegWqgELMC4xLjUuMy4wLjG4AQPIAQD4AQHCAgoQABhHGNYEGLADwgIGEAAYFhgewgIIEAAYigUYhgPCAgQQIRgVwgIHECEYoAEYCuIDBBgAIEGIBgGQBgg&amp;amp;sclient=gws-wiz-serp&quot; target=&quot;_blank&quot;&gt;Iain Fraser Cybersecurity Journalist&lt;/a&gt;, Gibraltar&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;via&amp;nbsp;&lt;a href=&quot;https://www.IainFRASER.net/&quot;&gt;IainFRASER.net/PRWire&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;Friday, 8th September 2023&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;&lt;b&gt;The malware victimised more than 700 000 computers, with at least EUR 54 million paid in ransoms since 2007&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;&lt;b&gt;Europol&lt;/b&gt; has supported the coordination of a large-scale international operation that has taken down the infrastructure of the Qakbot malware and led to the seizure of nearly EUR 8 million in cryptocurrencies. The international investigation, also supported by Eurojust, involved judicial and law enforcement authorities from France, Germany, Latvia, The Netherlands, Romania, United Kingdom and the United States. Qakbot, operated by a group of organised cybercriminals, targeted critical infrastructure and busine1sses across multiple countries, stealing financial data and login credentials. Cybercriminals used this persistent malware to commit ransomware, fraud, and other cyber-enabled crimes. &lt;a href=&quot; https://www.europol.europa.eu/media-press/newsroom/news/qakbot-botnet-infrastructure-shattered-after-international-operation?mtm_campaign=newsletter&quot; target=&quot;_blank&quot;&gt;Learn More /...&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;&lt;b&gt;About Europol&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;Headquartered in The Hague, the Netherlands, Europol’s mission is to support its Member States in preventing and combating all forms of serious international and organised crime, cybercrime and terrorism. Europol also works with many non-EU partner states and international organisations. &lt;a href=&quot;https://www.europol.europa.eu/about-europol&quot; target=&quot;_blank&quot;&gt;Learn More /...&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiWvQyAQEEcE4Fnx72zYo1kT__bqs9yGs43K9hWLDl0BQe8El5ROzlg5BIuDXM-lTsPZ_BuwFxq0Ng8BDbusf60KZIp-gm3r2wH1yBrxSPnjlpchMqUAF65MnINy9srEj2TEdmSSfraEnxBGSdTo2jOsAwYsfN-9uy5cwhAdphrp3lxIwsuaiD7SSB6eKA/s512/512px-Europol_building,_The_Hague,_the_Netherlands_-_901.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Cybersecurity Journalist - Daily Cyber Insights&quot; border=&quot;0&quot; data-original-height=&quot;446&quot; data-original-width=&quot;512&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiWvQyAQEEcE4Fnx72zYo1kT__bqs9yGs43K9hWLDl0BQe8El5ROzlg5BIuDXM-lTsPZ_BuwFxq0Ng8BDbusf60KZIp-gm3r2wH1yBrxSPnjlpchMqUAF65MnINy9srEj2TEdmSSfraEnxBGSdTo2jOsAwYsfN-9uy5cwhAdphrp3lxIwsuaiD7SSB6eKA/s16000/512px-Europol_building,_The_Hague,_the_Netherlands_-_901.jpg&quot; title=&quot;Europol Headquarters The Hague&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;i style=&quot;font-family: Montserrat; font-size: small;&quot;&gt;Image Credit: &lt;a href=&quot; https://commons.wikimedia.org/wiki/User:OSeveno&quot; target=&quot;_blank&quot;&gt;OSeveno&lt;/a&gt;&lt;/i&gt;&lt;/div&gt;</description><link>https://iainfraserjournalist.blogspot.com/2023/09/botnet-infrastructure-smashed.html</link><author>noreply@blogger.com (Cybersecurity Journalist - Iain Fraser)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiWvQyAQEEcE4Fnx72zYo1kT__bqs9yGs43K9hWLDl0BQe8El5ROzlg5BIuDXM-lTsPZ_BuwFxq0Ng8BDbusf60KZIp-gm3r2wH1yBrxSPnjlpchMqUAF65MnINy9srEj2TEdmSSfraEnxBGSdTo2jOsAwYsfN-9uy5cwhAdphrp3lxIwsuaiD7SSB6eKA/s72-c/512px-Europol_building,_The_Hague,_the_Netherlands_-_901.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-484539844128637595.post-5923772980650450646</guid><pubDate>Fri, 08 Sep 2023 06:10:00 +0000</pubDate><atom:updated>2023-10-06T15:03:51.893+02:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Business</category><category domain="http://www.blogger.com/atom/ns#">Cyber Resilience Act</category><category domain="http://www.blogger.com/atom/ns#">ECSO</category><category domain="http://www.blogger.com/atom/ns#">PRChannel</category><category domain="http://www.blogger.com/atom/ns#">Threat_Intel</category><title>CYBER RESILIANCE ACT: European Parliament has published its position on the act </title><description>&lt;div&gt;&lt;b&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;CYBER RESILIANCE ACT: European Parliament has published its position on the act&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;Syndicated By: &lt;a href=&quot;https://www.google.com/search?q=cybersecurity+journalist+gibraltar&amp;amp;sca_esv=563635297&amp;amp;ei=P7n6ZJz4GICbkdUP_aCCuAQ&amp;amp;ved=0ahUKEwjck5_pq5qBAxWATaQEHX2QAEcQ4dUDCBA&amp;amp;uact=5&amp;amp;oq=cybersecurity+journalist+gibraltar&amp;amp;gs_lp=Egxnd3Mtd2l6LXNlcnAiImN5YmVyc2VjdXJpdHkgam91cm5hbGlzdCBnaWJyYWx0YXIyBRAhGKABSKQ2UNcHWJMpcAF4AZABAJgBnwSgAegWqgELMC4xLjUuMy4wLjG4AQPIAQD4AQHCAgoQABhHGNYEGLADwgIGEAAYFhgewgIIEAAYigUYhgPCAgQQIRgVwgIHECEYoAEYCuIDBBgAIEGIBgGQBgg&amp;amp;sclient=gws-wiz-serp&quot; target=&quot;_blank&quot;&gt;Iain Fraser Cybersecurity Journalist&lt;/a&gt;, Gibraltar&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;via &lt;a href=&quot;https://www.IainFRASER.net/&quot;&gt;IainFRASER.net/PRWire&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;Friday, 8th September 2023&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;&lt;b&gt;The Cyber Resilience Act &lt;/b&gt;comprises a legislative initiative aimed at introducing cybersecurity mandates, including obligatory security patches and vulnerability management for Internet of Things (IoT) products and interconnected devices capable of data collection and exchange.&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;The EU lawmakers engaged in the dossier for the European Parliament&#39;s principal Industry Committee have deliberated on the incorporation of open source considerations, whether within the preamble&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;or the substantive text, the duration of product support, reporting responsibilities, and the timeline&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;for implementation. After deliberations, the Parliament has now published its common position. &lt;a href=&quot;https://digital-strategy.ec.europa.eu/en/policies/cyber-resilience-act&quot; target=&quot;_blank&quot;&gt;Learn More /...&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;About ECSO (European Cyber Security Organisation&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;ECSO was created in 2016 as the contractual counterpart to the European Commission to implement Europe’s unique Public-Private Partnership in Cybersecurity – cPPP (2016-2020). Building upon the success of the cPPP, ECSO is today the unique European cross-sectoral and independent membership organisation for cybersecurity that gathers and represents European public and private cybersecurity stakeholders and fosters their cooperation.&lt;a href=&quot;https://ecs-org.eu/who-we-are/&quot; target=&quot;_blank&quot;&gt; Learn More /...&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEggAnGbyA3Q78KfDFt9Aw_URJhm2p3zmSjeFIh2G2LS_k94VFFkSqcy098atyeIn8nPSwDuOxmQGnhGhddOtZrbHBEG-xf7SDegBi1kIm1kDDPd5NAwyxbYm12zvtskQEcHRWvjZ6zKJs5LcjRxFNlKMAZOuHdn95FvBYw5OV62bBpqFyNpWNei1F-gTp8/s640/code-4333398_640.jpg&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;427&quot; data-original-width=&quot;640&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEggAnGbyA3Q78KfDFt9Aw_URJhm2p3zmSjeFIh2G2LS_k94VFFkSqcy098atyeIn8nPSwDuOxmQGnhGhddOtZrbHBEG-xf7SDegBi1kIm1kDDPd5NAwyxbYm12zvtskQEcHRWvjZ6zKJs5LcjRxFNlKMAZOuHdn95FvBYw5OV62bBpqFyNpWNei1F-gTp8/s16000/code-4333398_640.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;</description><link>https://iainfraserjournalist.blogspot.com/2023/09/eu-cyber-resilience-act.html</link><author>noreply@blogger.com (Cybersecurity Journalist - Iain Fraser)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEggAnGbyA3Q78KfDFt9Aw_URJhm2p3zmSjeFIh2G2LS_k94VFFkSqcy098atyeIn8nPSwDuOxmQGnhGhddOtZrbHBEG-xf7SDegBi1kIm1kDDPd5NAwyxbYm12zvtskQEcHRWvjZ6zKJs5LcjRxFNlKMAZOuHdn95FvBYw5OV62bBpqFyNpWNei1F-gTp8/s72-c/code-4333398_640.jpg" height="72" width="72"/><thr:total>0</thr:total><georss:featurename>Gibraltar</georss:featurename><georss:point>36.140751 -5.353585</georss:point><georss:box>7.8305171638211561 -40.509835 64.450984836178847 29.802665</georss:box></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-484539844128637595.post-2691888739028032052</guid><pubDate>Thu, 07 Sep 2023 12:43:00 +0000</pubDate><atom:updated>2023-10-06T15:02:07.806+02:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Experian Can-spam Violations</category><category domain="http://www.blogger.com/atom/ns#">Latest_News</category><category domain="http://www.blogger.com/atom/ns#">PRChannel</category><title>COMPLIANCE: Experian agrees permanent injunction &amp; $650k Spam Fine</title><description>&lt;div&gt;&lt;b&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;COMPLIANCE: Experian agrees to permanent injunction &amp;amp; $650k Spam Fine -&amp;nbsp;USDOJ&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;Syndicated By: Iain Fraser Cybersecurity Journalist, Gibraltar&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;via IainFRASER.net/PRWire&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;The Justice Department, together with the Federal Trade Commission (FTC), today announced that ConsumerInfo.com, Inc. dba Experian Consumer Services (Experian), has agreed to a permanent injunction and a $650,000 civil penalty as part of a settlement to resolve alleged violations of the Controlling the Assault of Non-Solicited Pornography and Marketing Act of 2003 (CAN-SPAM Act), the Controlling the Assault of Non-Solicited Pornography and Marketing Rule (CAN-SPAM Rule), and the Federal Trade Commission Act.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;The CAN-SPAM Act and Rule require senders of commercial emails to notify the recipients of such emails of their right to opt-out of future emails and to provide an opt-out mechanism. Experian shares a parent company, Experian PLC, with Experian Information Solutions Inc., which offers credit information, analytical tools and marketing services. &lt;a href=&quot; https://www.justice.gov/opa/pr/permanent-injunction-and-650000-civil-penalty-imposed-experian-consumer-services-allegedly&quot; target=&quot;_blank&quot;&gt;Learn More /...&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg22abFTnR2nH9y-p7Z8RVMsQKPq0lJU95NYJjJZAcy3UrD6qLNds148Uyi4LlSlL8OG054YyhRDQbsmm0jdUWLKEtSG_QWAJ5b8-_COus7xa9uHzwGlrF8njR2HpoEMXTFgnYncOrjjJrH3BW18fmX9ToymdK3TpBj2P1BoNUr9I-iM9iPQ0SVS6b9PEA/s640/letter-7102985_640.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;427&quot; data-original-width=&quot;640&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg22abFTnR2nH9y-p7Z8RVMsQKPq0lJU95NYJjJZAcy3UrD6qLNds148Uyi4LlSlL8OG054YyhRDQbsmm0jdUWLKEtSG_QWAJ5b8-_COus7xa9uHzwGlrF8njR2HpoEMXTFgnYncOrjjJrH3BW18fmX9ToymdK3TpBj2P1BoNUr9I-iM9iPQ0SVS6b9PEA/s16000/letter-7102985_640.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;</description><link>https://iainfraserjournalist.blogspot.com/2023/09/compliance-experian-agrees-to-permanent.html</link><author>noreply@blogger.com (Cybersecurity Journalist - Iain Fraser)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg22abFTnR2nH9y-p7Z8RVMsQKPq0lJU95NYJjJZAcy3UrD6qLNds148Uyi4LlSlL8OG054YyhRDQbsmm0jdUWLKEtSG_QWAJ5b8-_COus7xa9uHzwGlrF8njR2HpoEMXTFgnYncOrjjJrH3BW18fmX9ToymdK3TpBj2P1BoNUr9I-iM9iPQ0SVS6b9PEA/s72-c/letter-7102985_640.jpg" height="72" width="72"/><thr:total>0</thr:total><georss:featurename>Gibraltar</georss:featurename><georss:point>36.140751 -5.353585</georss:point><georss:box>7.8305171638211561 -40.509835 64.450984836178847 29.802665</georss:box></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-484539844128637595.post-6263069015642974338</guid><pubDate>Tue, 15 Aug 2023 07:05:00 +0000</pubDate><atom:updated>2023-10-06T15:01:31.301+02:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Europol - Cybercrime Servers taken down</category><category domain="http://www.blogger.com/atom/ns#">GeoCrime</category><category domain="http://www.blogger.com/atom/ns#">PRChannel</category><title>EUROPOL: 5 arrested in Poland running bulletproof hosting service for cyber gangs </title><description>&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;&lt;b&gt;EUROPOL: 5 arrested in Poland for running bulletproof hosting service for cybercrime gangs&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;Syndicated By: Iain Fraser - &lt;a href=&quot;https://www.google.com/search?q=cybersecurity+journalist+gibraltar&amp;amp;oq=cybersec&amp;amp;gs_lcrp=EgZjaHJvbWUqBggDEEUYOzIHCAAQABiABDIGCAEQRRg5MgcIAhAAGIAEMgYIAxBFGDsyBwgEEAAYgAQyBwgFEAAYgAQyBwgGEAAYgAQyBwgHEAAYgAQyBwgIEAAYgAQyBwgJEAAYgATSAQ4yMjE1Mzg5NTZqMGoxNagCALACAA&amp;amp;sourceid=chrome&amp;amp;ie=UTF-8&quot; target=&quot;_blank&quot;&gt;Cybersecurity Journalist - Gibraltar&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;via &lt;a href=&quot;https://www.IainFRASER.net&quot;&gt;IainFRASER.net/CyberPR&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;15th August 2023&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;The Polish Central Cybercrime Bureau (Centralne Biuro Zwalczania Cyberprzestępczości) under the supervision of the Regional Prosecutor&#39;s Office in Katowice (Prokuratura Regionalna w Katowicach) took action against LolekHosted.net, a bulletproof hosting service used by criminals to launch cyber-attacks across the world.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;Five of its administrators were arrested, and all of its servers seized, rendering LolekHosted.net no longer available.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;This latest success in the fight against cybercrime follows a complex investigation supported by Europol and the US Federal Bureau of Investigation (FBI). &lt;a href=&quot;https://www.europol.europa.eu/media-press/newsroom/news/5-arrested-in-poland-for-running-bulletproof-hosting-service-for-cybercrime-gangs?mtm_campaign=newsletter&quot; target=&quot;_blank&quot;&gt;Learn More /...&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhC1CRpW-9IvUtOGCAFBL0-e-eD6dFfotlNHvordcc8fY2q6MxfxHyTk4HB0FGSqCdhTn3XruwW672gAsLy81SjYfUXKa28bLT7v4vPAvAMsqci1zWXMptIdkpBNIiqGwrK1ymbgdiArHX7JwGSllf-T2bV12mB5Zjollo6vZ3rsc6pAm0msEVgKrV_XfM/s1912/SplashOpEC3.png.webp&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1288&quot; data-original-width=&quot;1912&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhC1CRpW-9IvUtOGCAFBL0-e-eD6dFfotlNHvordcc8fY2q6MxfxHyTk4HB0FGSqCdhTn3XruwW672gAsLy81SjYfUXKa28bLT7v4vPAvAMsqci1zWXMptIdkpBNIiqGwrK1ymbgdiArHX7JwGSllf-T2bV12mB5Zjollo6vZ3rsc6pAm0msEVgKrV_XfM/s16000/SplashOpEC3.png.webp&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;Image Credit: Europol&lt;/span&gt;&lt;/div&gt;&lt;/span&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;</description><link>https://iainfraserjournalist.blogspot.com/2023/08/cybercrime-servers-poland.html</link><author>noreply@blogger.com (Cybersecurity Journalist - Iain Fraser)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhC1CRpW-9IvUtOGCAFBL0-e-eD6dFfotlNHvordcc8fY2q6MxfxHyTk4HB0FGSqCdhTn3XruwW672gAsLy81SjYfUXKa28bLT7v4vPAvAMsqci1zWXMptIdkpBNIiqGwrK1ymbgdiArHX7JwGSllf-T2bV12mB5Zjollo6vZ3rsc6pAm0msEVgKrV_XfM/s72-c/SplashOpEC3.png.webp" height="72" width="72"/><thr:total>0</thr:total><georss:featurename>Gibraltar</georss:featurename><georss:point>36.140751 -5.353585</georss:point><georss:box>7.8305171638211561 -40.509835 64.450984836178847 29.802665</georss:box></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-484539844128637595.post-4211230735378673932</guid><pubDate>Fri, 28 Jul 2023 10:38:00 +0000</pubDate><atom:updated>2023-09-07T09:43:28.808+02:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Data Breach</category><category domain="http://www.blogger.com/atom/ns#">Latest_News</category><category domain="http://www.blogger.com/atom/ns#">Website Planet</category><title>DATA BREACH: School Accreditation Organization Data Breach </title><description>&lt;div&gt;&lt;b style=&quot;font-family: Montserrat;&quot;&gt;DATA BREACH: School Accreditation Organization Data Breach Exposed Sensitive Information on Students, Parents, and Teachers Online&lt;/b&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;By &lt;a href=&quot;https://www.websiteplanet.com/author/jeremiah-fowler/&quot; target=&quot;_blank&quot;&gt;Jeremiah Fowler - Website Planet&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;Syndicated By: &lt;a href=&quot;https://www.google.com/search?q=cybersecurity+journalist+gibraltar&amp;amp;filter=0&amp;amp;biw=1920&amp;amp;bih=941&amp;amp;dpr=1&quot; target=&quot;_blank&quot;&gt;Iain Fraser - Cybersecurity Journalist Gibraltar&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;&lt;a href=&quot;https://www.IainFRASER.net/&quot;&gt;IainFRASER.net/&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;a href=&quot;https://www.google.com/search?q=DATA+BREACH%3A+School+Accreditation+Organization+Data+Breach+Exposed+Sensitive+Information+on+Students%2C+Parents%2C+and+Teachers+Online&amp;amp;rlz=1C1GCEA_enES1036ES1036&amp;amp;biw=1366&amp;amp;bih=661&amp;amp;sxsrf=AB5stBjevyN-HoJCz-mH7BlRIDTA0sr3LA%3A1690961451405&amp;amp;ei=KwbKZM6oGIqnkdUP2reewAY&amp;amp;ved=0ahUKEwiO6o6lur2AAxWKU6QEHdqbB2gQ4dUDCA8&amp;amp;uact=5&amp;amp;oq=DATA+BREACH%3A+School+Accreditation+Organization+Data+Breach+Exposed+Sensitive+Information+on+Students%2C+Parents%2C+and+Teachers+Online&amp;amp;gs_lp=Egxnd3Mtd2l6LXNlcnAiggFEQVRBIEJSRUFDSDogU2Nob29sIEFjY3JlZGl0YXRpb24gT3JnYW5pemF0aW9uIERhdGEgQnJlYWNoIEV4cG9zZWQgU2Vuc2l0aXZlIEluZm9ybWF0aW9uIG9uIFN0dWRlbnRzLCBQYXJlbnRzLCBhbmQgVGVhY2hlcnMgT25saW5lMgcQIxjqAhgnMgcQIxjqAhgnMgcQIxjqAhgnMgcQIxjqAhgnMgcQIxjqAhgnMgcQIxjqAhgnMgcQIxjqAhgnMgcQIxjqAhgnMgcQIxjqAhgnMgcQIxjqAhgnSKQKUABYhgZwAXgBkAEAmAEAoAEAqgEAuAEDyAEA-AEB-AECqAIK4gMEGAAgQYgGAQ&amp;amp;sclient=gws-wiz-serp&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;Google Indexed on 280723 at 13:40 CET&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;28th July 2023&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;b style=&quot;font-family: Montserrat;&quot;&gt;School Accreditation Organization Data Breach Exposed Sensitive Information on Students, Parents, and Teachers Online&lt;/b&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;Cybersecurity Researcher, Jeremiah Fowler, discovered and reported to WebsitePlanet a non-password protected database that contained 680k records. Upon further investigation, it was identified that these records were related to educational institutions. Documents inside the database suggested that it belonged to the Southern Association of Independent Schools, Inc (SAIS).&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;In my many years as a security researcher, I have seen everything from millions of credit card numbers and health records, to internal documents from organizations of all sizes. However, this discovery is among the most sensitive data collections I have ever encountered. The database contained a diverse collection of sensitive records that, when exposed, could unlock a wide range of potential risks. The files included multiple types of student and teacher records, health information, teacher background checks and social security numbers (SSN), active shooter and lockdown notifications, maps of schools, financial budgets, and much more. The documents ranged in date from 2012-2023.&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;One of the most interesting things I saw was third-party security reports marked as confidential that reviewed weaknesses in school security, locations of cameras, access and entry points, and more. These documents could pose a potentially serious real world security risk to the safety of students and teachers. I immediately sent a responsible disclosure notice to SAIS and received a reply thanking me for the notification and promising that they would take action. The database was quickly secured from public access. &lt;a href=&quot; https://www.websiteplanet.com/news/sais-breach-report/&quot; target=&quot;_blank&quot;&gt;Learn More /...&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiR1JgGlpDQa-XA7ovxVfedXVvgo33gThmbvCFtOWvoAUG6oKlckUtxue_2x6Y1aVRnOh6TTQrLct6cXC9nlTJpXjoGEl3tWZCJltybyywhabKZR0XOtPKp7h3GlNbsHfsmgjacX8WQdoIh2lVz7121LP_p2a3gPRu8K7yLdY-A__LTFuQHFcgz2IGzfqI/s850/School-Accreditation-Organization-Data-Breach-850x446.webp&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Cyber Insights 2023&quot; border=&quot;0&quot; data-original-height=&quot;446&quot; data-original-width=&quot;850&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiR1JgGlpDQa-XA7ovxVfedXVvgo33gThmbvCFtOWvoAUG6oKlckUtxue_2x6Y1aVRnOh6TTQrLct6cXC9nlTJpXjoGEl3tWZCJltybyywhabKZR0XOtPKp7h3GlNbsHfsmgjacX8WQdoIh2lVz7121LP_p2a3gPRu8K7yLdY-A__LTFuQHFcgz2IGzfqI/s16000/School-Accreditation-Organization-Data-Breach-850x446.webp&quot; title=&quot;DATA BREACH: School Accreditation Organization Data Breach Exposed Sensitive Information&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;</description><link>https://iainfraserjournalist.blogspot.com/2023/07/school-data-breach.html</link><author>noreply@blogger.com (Cybersecurity Journalist - Iain Fraser)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiR1JgGlpDQa-XA7ovxVfedXVvgo33gThmbvCFtOWvoAUG6oKlckUtxue_2x6Y1aVRnOh6TTQrLct6cXC9nlTJpXjoGEl3tWZCJltybyywhabKZR0XOtPKp7h3GlNbsHfsmgjacX8WQdoIh2lVz7121LP_p2a3gPRu8K7yLdY-A__LTFuQHFcgz2IGzfqI/s72-c/School-Accreditation-Organization-Data-Breach-850x446.webp" height="72" width="72"/><thr:total>0</thr:total><georss:featurename>Gibraltar</georss:featurename><georss:point>36.140751 -5.353585</georss:point><georss:box>7.8305171638211561 -40.509835 64.450984836178847 29.802665</georss:box></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-484539844128637595.post-2395180249982930875</guid><pubDate>Mon, 10 Jul 2023 09:07:00 +0000</pubDate><atom:updated>2023-09-07T09:48:18.073+02:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Data Breach</category><category domain="http://www.blogger.com/atom/ns#">Latest_News</category><category domain="http://www.blogger.com/atom/ns#">Threat_Intel</category><title>DATA BREACH: Global Document Translation Service Exposed Records Online</title><description>&lt;div&gt;&lt;b&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;Global Document Translation Service Exposed Highly Sensitive Records Online&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;By: &lt;a href=&quot; https://www.websiteplanet.com/author/jeremiah-fowler/&quot; target=&quot;_blank&quot;&gt;Jeremiah Fowler - Website Planet&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;Syndicated By: Iain Fraser - &lt;a href=&quot;https://www.google.com/search?q=cybersecurity+journalist+gibraltar&amp;amp;source=hp&amp;amp;ei=kMqrZNCZA4nBkdUPz8WAuAw&amp;amp;iflsig=AD69kcEAAAAAZKvYoHSRvRYBEp1uVCCUlv_vZ9jsSYjm&amp;amp;ved=0ahUKEwjQofKc5YOAAxWJYKQEHc8iAMcQ4dUDCAk&amp;amp;uact=5&amp;amp;oq=cybersecurity+journalist+gibraltar&amp;amp;gs_lcp=Cgdnd3Mtd2l6EAMyBQghEKABOggILhDUAhCABDoFCAAQgAQ6BQguEIAEOgsILhCABBDHARDRAzoHCAAQgAQQCjoICAAQigUQhgM6BggAEBYQHjoECCEQFToHCCEQoAEQClAAWI5FYKNRaABwAHgAgAG9BYgBkkSSAQ4wLjE1LjcuMS4yLjQuMZgBAKABAQ&amp;amp;sclient=gws-wiz&quot; target=&quot;_blank&quot;&gt;Cybersecurity Journalist Gibraltar&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;a href=&quot;https://www.IainFRASER.net&quot;&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;www.IainFRASER.net&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;a href=&quot;https://www.google.com/search?q=DATA+BREACH%3A+Global+Document+Translation+Service+Exposed+Highly+Sensitive+Records+Online&amp;amp;rlz=1C1GCEA_enES1036ES1036&amp;amp;biw=1366&amp;amp;bih=667&amp;amp;sxsrf=AB5stBiust2eQgWFXNT5UA9XqoLEPX75UA%3A1689592563449&amp;amp;ei=8yK1ZKDuGoCV9u8P-M6koA0&amp;amp;ved=0ahUKEwjgs7zkzpWAAxWAiv0HHXgnCdQQ4dUDCA8&amp;amp;uact=5&amp;amp;oq=DATA+BREACH%3A+Global+Document+Translation+Service+Exposed+Highly+Sensitive+Records+Online&amp;amp;gs_lp=Egxnd3Mtd2l6LXNlcnAiWERBVEEgQlJFQUNIOiBHbG9iYWwgRG9jdW1lbnQgVHJhbnNsYXRpb24gU2VydmljZSBFeHBvc2VkIEhpZ2hseSBTZW5zaXRpdmUgUmVjb3JkcyBPbmxpbmUyBxAjGOoCGCcyBxAjGOoCGCcyBxAjGOoCGCcyBxAjGOoCGCcyBxAjGOoCGCcyBxAjGOoCGCcyBxAjGOoCGCcyBxAjGOoCGCcyBxAjGOoCGCcyBxAjGOoCGCdI2SlQAFjxIHABeACQAQCYAQCgAQCqAQC4AQPIAQD4AQH4AQKoAgriAwQYACBBiAYB&amp;amp;sclient=gws-wiz-serp&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;Google Indexed on 100723 at 12:00 CET&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;10th July 2023&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;Recently, security researcher Jeremiah Fowler discovered and reported to WebsitePlanet a non-password protected database containing more than 25k records. The publicly exposed documents included highly sensitive files, which contained personally identifiable information (PII).&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;The unsecured database contained internal screenshots of source code as well as customer documents that were stored in uploads folders. These documents include: US Federal and State tax filings, passports, driver licenses, birth and marriage records, business documents, denied visa petitions, among other files from customers around the world. Upon further research, there were references and invoices linked to a NYC-based translation service provider, Kings of Translation. The company offers translation services and claims to have locations in the UK and Latvia. The database contained a total of 25,601 records. Kings of Translation purportedly used its own technology to let customers upload their documents and pay for the order automatically. I immediately sent a responsible disclosure notice to Kings of Translation. Despite receiving no response, I noted that public access to the database was restricted the following day.&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;People usually don’t consider how paper documents offline can become an online data risk, but this discovery proves that even those documents can be compromised. In my years as a security researcher, I have seen all types of documents and data breaches from a wide range of industries, organizations, and businesses, and this is the first time I have found the data of a translation service and its customers. However, I have never seen such a wide range of documents in a single database before. Some businesses handle more sensitive records than others, and usually the documents they collect and store are related to their specific business or industry. Documents that need to be translated are often of significant importance and may be required by foreign governments or educational institutions, or for acquiring crucial records such as birth, marriage, divorce, death certificates, among others.&amp;nbsp;&lt;a href=&quot; https://www.websiteplanet.com/news/kingsoftranslation-breach-report/&quot; target=&quot;_blank&quot;&gt;Learn More /...&amp;nbsp;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;b&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;About Jeremiah Fowler&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;Jeremiah Fowler is a Security Researcher and co-founder of Security Discovery. Jeremiah began his career in security research in 2015 and has a mission of data protection. He has helped identify and secure the data of millions of people around the world. His discoveries have been covered in Forbes, BBC, Gizmodo, among others. Security and responsible disclosure are not only a passion, but a way of protecting our digital lives.&amp;nbsp;&lt;a href=&quot; https://www.websiteplanet.com/author/jeremiah-fowler/&quot; target=&quot;_blank&quot;&gt;Learn More /...&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;span style=&quot;clear: left; float: left; font-family: Montserrat; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Cybersecurity Journalist Gibraltar&quot; border=&quot;0&quot; data-original-height=&quot;1013&quot; data-original-width=&quot;1920&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhjWrIVS7mjy6DJbw9WoYYUUt-0K95fRHqanOJKreaqe3d2iggH7SMUlBmnpDSQlAwSJA_6mcVtb0ndq2FgvNFrVf1SVp4wf4EZAPUlVY6LzeC_yJi3nzuwEfMt_4o4vLiDNbRLvxVrdoOm64AM1Bz-nOpk8fIuBCao1gO4YByyMYxuuPz2v17ZctUeS4w/s16000/cybersecurity-5618877_1920.jpg&quot; title=&quot;Global Document Translation Service Exposed Highly Sensitive Records Online&quot; /&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;br /&gt;&lt;/div&gt;</description><link>https://iainfraserjournalist.blogspot.com/2023/07/sensitive-records-exposed.html</link><author>noreply@blogger.com (Cybersecurity Journalist - Iain Fraser)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhjWrIVS7mjy6DJbw9WoYYUUt-0K95fRHqanOJKreaqe3d2iggH7SMUlBmnpDSQlAwSJA_6mcVtb0ndq2FgvNFrVf1SVp4wf4EZAPUlVY6LzeC_yJi3nzuwEfMt_4o4vLiDNbRLvxVrdoOm64AM1Bz-nOpk8fIuBCao1gO4YByyMYxuuPz2v17ZctUeS4w/s72-c/cybersecurity-5618877_1920.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-484539844128637595.post-957972393838936889</guid><pubDate>Tue, 04 Jul 2023 10:37:00 +0000</pubDate><atom:updated>2023-11-28T15:36:21.536+01:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">CyberInsights</category><category domain="http://www.blogger.com/atom/ns#">Europol unplugs phone scam</category><category domain="http://www.blogger.com/atom/ns#">GeoCrime</category><category domain="http://www.blogger.com/atom/ns#">PRChannel</category><category domain="http://www.blogger.com/atom/ns#">PRWire</category><title>CYBER INSIGHTS: EUROPOL: Police unplug international phone scam OCG</title><description>&lt;div&gt;&lt;b&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;DAILY CYBER INSIGHTS | EUROPOL: Police unplug international phone scam network&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;Syndicated By: Iain Fraser -&amp;nbsp;&lt;a href=&quot;https://www.google.com/search?q=cybersecurity+journalist+gibraltar&amp;amp;oq=cyber&amp;amp;gs_lcrp=EgZjaHJvbWUqBggAEEUYOzIGCAAQRRg7MgYIARBFGDkyBggCEEUYPTIGCAMQRRg8MgYIBBBFGEEyBggFEEUYQTIGCAYQRRhBMgYIBxBFGDzSAQgyMzQ5ajBqNKgCALACAA&amp;amp;sourceid=chrome&amp;amp;ie=UTF-8&quot; target=&quot;_blank&quot;&gt;Cybersecurity Journalist Gibraltar&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;via&amp;nbsp;&lt;a href=&quot;https://www.IainFRASER.net/CyberPRWire&quot;&gt;IainFRASER.net/CyberPRWire&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;a href=&quot;https://www.google.com/search?q=DAILY+CYBER+INSIGHTS%3A+EUROPOL%3A+Police+unplug+international+phone+scam+network&amp;amp;rlz=1C1GCEA_enES1036ES1036&amp;amp;biw=1366&amp;amp;bih=667&amp;amp;sxsrf=AB5stBjACxqcS_H8zG9Z6HeSfarrlf-FKw%3A1689942494534&amp;amp;ei=3nm6ZJGSIPSjkdUPt8qXyAs&amp;amp;ved=0ahUKEwiR-c6w5p-AAxX0UaQEHTflBbk4FBDh1QMIDw&amp;amp;uact=5&amp;amp;oq=DAILY+CYBER+INSIGHTS%3A+EUROPOL%3A+Police+unplug+international+phone+scam+network&amp;amp;gs_lp=Egxnd3Mtd2l6LXNlcnAiTURBSUxZIENZQkVSIElOU0lHSFRTOiBFVVJPUE9MOiBQb2xpY2UgdW5wbHVnIGludGVybmF0aW9uYWwgcGhvbmUgc2NhbSBuZXR3b3JrMgcQIxjqAhgnMgcQIxjqAhgnMgcQIxjqAhgnMgcQIxjqAhgnMgcQIxjqAhgnMgcQIxjqAhgnMgcQIxjqAhgnMgcQIxjqAhgnMgcQIxjqAhgnMgcQIxjqAhgnSPgcUMsPWIkWcAJ4AZABAJgBAKABAKoBALgBA8gBAPgBAfgBAqgCCsICChAAGEcY1gQYsAPiAwQYACBBiAYBkAYI&amp;amp;sclient=gws-wiz-serp&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;Google Indexed on 040723 at 13:30 CET&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;4th July 2023&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;Law enforcement from Germany, Poland and the United Kingdom, supported by &lt;a href=&quot;https://www.europol.europa.eu/about-europol&quot; target=&quot;_blank&quot;&gt;Europol&lt;/a&gt;, have tracked down and arrested the head of a criminal network responsible for defrauding hundreds of elderly citizens. The suspect was taken into custody near London, from where he directed a network of fraudsters targeting mainly German and Polish citizens. While executing the arrest warrant issued by Polish authorities, officers seized crucial evidence such as mobile phones in the suspect’s residence. Meanwhile, German police conducted searches in five locations and seized over EUR 160 000 in cash, gold bars and gold coins, as well as jewellery, phones, and other electronic devices.&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;Unwitting accomplices sent to collect cash&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;The organised criminal network specialised in calling elderly citizens across Germany and Poland pretending to be police officers or representing other official authorities. Victims were informed that one of their relatives has been responsible for a car accident or similar event resulting in injuries or death of other persons. The scam caller would then hand over the phone to an accomplice, who would cry or scream into the phone frantically, imploring the victim to lend help. This approach was intended to shock the elderly person, allowing the caller to proceed with the fraudulent procedure and ask for the handover of money to avoid the fake relative’s detention.&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;The criminals would instruct the victim about the handover procedure, then send a person to collect the money at the victim’s doorstep. In order to minimise exposure and avoid the risk of arrest, the criminal network recruited unwitting accomplices for this task, via online job platforms.&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;Over the course of the investigation, over 70 persons taking part in this scam were arrested, for instance while they were collecting money at the victim’s homes. The overall damage amounts to around EUR 5 million and is estimated that up to EUR 1.4 million of losses could be prevented thanks to this successful takedown. &lt;a href=&quot; https://www.europol.europa.eu/media-press/newsroom/news/police-unplug-international-phone-scam-network?mtm_campaign=newsletter&quot; target=&quot;_blank&quot;&gt;Learn More /...&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;b&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;About Europol&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;Headquartered in The Hague, the Netherlands, Europol’s mission is to support its Member States in preventing and combating all forms of serious international and organised crime, cybercrime and terrorism. Europol also works with many non-EU partner states and international organisations.&amp;nbsp;&lt;a href=&quot;https://www.europol.europa.eu/about-europol&quot; target=&quot;_blank&quot;&gt;Learn More /...&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;span style=&quot;clear: left; float: left; font-family: Montserrat; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Daily Cyber Insights&quot; border=&quot;0&quot; data-original-height=&quot;1280&quot; data-original-width=&quot;1920&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh2E30wW6hFWFFqmEUWFZAMwtm8_6G2kxzAu3ir7_kt7eBySaot-zMzMkBmrlBPmLLNMy8luYJ6gvbSrgenWfGIKuclN5LGagjR3fY1sK8kd3H0GM-_IriaPqJwVKDr05JO1K07vhMGKmhB9Qvn9ylzNqPNX8Hx6N0q-qq3ES7QPvW2lO-BV-4IiEjZNrw/s16000/headsets-6612707_1920.jpg&quot; title=&quot;Europol unplugs phone scam&quot; /&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;br /&gt;&lt;/div&gt;</description><link>https://iainfraserjournalist.blogspot.com/2023/07/europol-unplugs-phone-scam.html</link><author>noreply@blogger.com (Cybersecurity Journalist - Iain Fraser)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh2E30wW6hFWFFqmEUWFZAMwtm8_6G2kxzAu3ir7_kt7eBySaot-zMzMkBmrlBPmLLNMy8luYJ6gvbSrgenWfGIKuclN5LGagjR3fY1sK8kd3H0GM-_IriaPqJwVKDr05JO1K07vhMGKmhB9Qvn9ylzNqPNX8Hx6N0q-qq3ES7QPvW2lO-BV-4IiEjZNrw/s72-c/headsets-6612707_1920.jpg" height="72" width="72"/><thr:total>0</thr:total><georss:featurename>Gibraltar</georss:featurename><georss:point>36.140751 -5.353585</georss:point><georss:box>7.8305171638211561 -40.509835 64.450984836178847 29.802665</georss:box></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-484539844128637595.post-8416833933936533579</guid><pubDate>Tue, 04 Jul 2023 09:24:00 +0000</pubDate><atom:updated>2023-11-28T15:37:14.812+01:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">CyberInsights</category><category domain="http://www.blogger.com/atom/ns#">Gartner Security Threat Intel</category><category domain="http://www.blogger.com/atom/ns#">PRChannel</category><category domain="http://www.blogger.com/atom/ns#">Threat_Intel</category><title>CYBER INSIGHTS: GARTNER: Security Threat Intelligence Products and Services</title><description>&lt;div&gt;&lt;b&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;GARTNER: Security Threat Intelligence Products and Services - Report &amp;amp; Analysis&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;Syndicated By: Iain Fraser - Cybersecurity Journalist Gibraltar&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;via &lt;a href=&quot;https://www.IainFRASER.net/&quot;&gt;IainFRASER.net/CyberPRWire&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;a href=&quot;https://www.google.com/search?q=DAILY+CYBER+INSIGHTS%3A+GARTNER%3A+Security+Threat+Intelligence+Products+and+Services+-+Report+%26+Analysis&amp;amp;biw=1920&amp;amp;bih=946&amp;amp;ei=L1mlZJy3HonTkwWpkIfABQ&amp;amp;ved=0ahUKEwjcivSgwPf_AhWJ6aQKHSnIAVgQ4dUDCA8&amp;amp;uact=5&amp;amp;oq=DAILY+CYBER+INSIGHTS%3A+GARTNER%3A+Security+Threat+Intelligence+Products+and+Services+-+Report+%26+Analysis&amp;amp;gs_lcp=Cgxnd3Mtd2l6LXNlcnAQA0oECEEYAFAAWNIFYPoQaAFwAHgAgAEAiAEAkgEAmAEAoAEBoAECsAEAwAEB&amp;amp;sclient=gws-wiz-serp&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;Google Indexed on 040723 at 12:21 CET&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;4th July 2023&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;According to Gartner® in their recent report Threat intelligence is expected to grow at a compound annual growth rate of 15.5% to reach $2.8 billion by 2026. TI has a large number of vendors, and they are expanding into new markets.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;As you advance your corporate security protocols are you fully aware of the full portfolio of systems available that will aid you as you navigate the Cyber Threat landscape &lt;a href=&quot;https://www.gartner.com/en/documents/4343699&quot; target=&quot;_blank&quot;&gt;Learn More /...&amp;nbsp;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;b&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;What is Gartner® research?&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;Gartner research, which includes in-depth proprietary studies, peer and industry best practices, trend analysis and quantitative modelling, enables us to offer innovative approaches that can help you drive stronger, more sustainable business performance.&amp;nbsp;&lt;a href=&quot;https://www.gartner.com/en/about&quot; target=&quot;_blank&quot;&gt;Learn More /...&amp;nbsp;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;span style=&quot;clear: left; float: left; font-family: Montserrat; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1076&quot; data-original-width=&quot;1920&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg44fWspFlMZg5v3KcItl2nxjDwaS_vt_sQgMQ29vUsC-CHr9sAvpJmw27x9Gu8t__q7KeaFVCjSHrAvnfbscq3OTtEd1_iJoRR9CydBuBuVQisifKFoeXa4InoiHsqOVtXis047y-WY2xVl61hm5VJYRCwPOnqc4Zj5X6lfy9cAAD60Ks6aIrWoeAVGzE/s16000/control-center-8004999_1920.jpg&quot; /&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;br /&gt;&lt;/div&gt;</description><link>https://iainfraserjournalist.blogspot.com/2023/07/security-threat-intelligence.html</link><author>noreply@blogger.com (Cybersecurity Journalist - Iain Fraser)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg44fWspFlMZg5v3KcItl2nxjDwaS_vt_sQgMQ29vUsC-CHr9sAvpJmw27x9Gu8t__q7KeaFVCjSHrAvnfbscq3OTtEd1_iJoRR9CydBuBuVQisifKFoeXa4InoiHsqOVtXis047y-WY2xVl61hm5VJYRCwPOnqc4Zj5X6lfy9cAAD60Ks6aIrWoeAVGzE/s72-c/control-center-8004999_1920.jpg" height="72" width="72"/><thr:total>0</thr:total><georss:featurename>Gibraltar</georss:featurename><georss:point>36.140751 -5.353585</georss:point><georss:box>7.8305171638211561 -40.509835 64.450984836178847 29.802665</georss:box></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-484539844128637595.post-8126620764784820156</guid><pubDate>Tue, 04 Jul 2023 08:13:00 +0000</pubDate><atom:updated>2023-10-06T15:04:42.985+02:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Business</category><category domain="http://www.blogger.com/atom/ns#">Compliance</category><category domain="http://www.blogger.com/atom/ns#">NCSC</category><category domain="http://www.blogger.com/atom/ns#">PRChannel</category><title>NCSC:  LEGAL firms have been issued with guidance to strengthen cyber defences </title><description>&lt;div&gt;&lt;b&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;NCSC: Legal firms urged to strengthen cyber defences&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;Syndicated By: Iain Fraser - &lt;a href=&quot;https://www.google.com/search?q=cybersecurity+journalist+gibraltar&amp;amp;oq=cyber&amp;amp;gs_lcrp=EgZjaHJvbWUqBggAEEUYOzIGCAAQRRg7MgYIARBFGDkyBggCEEUYPTIGCAMQRRg8MgYIBBBFGEEyBggFEEUYQTIGCAYQRRhBMgYIBxBFGDzSAQgyMzQ5ajBqNKgCALACAA&amp;amp;sourceid=chrome&amp;amp;ie=UTF-8&quot; target=&quot;_blank&quot;&gt;Cybersecurity Journalist Gibraltar&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;via &lt;a href=&quot;https://www.IainFRASER.net/CyberPRWire&quot;&gt;IainFRASER.net/CyberPRWire&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;a href=&quot;https://www.google.com/search?q=NCSC%3A+Legal+firms+urged+to+strengthen+cyber+defences&amp;amp;biw=1920&amp;amp;bih=946&amp;amp;ei=21ilZOCoNq-Bi-gPw-G-0A0&amp;amp;ved=0ahUKEwiggoX5v_f_AhWvwAIHHcOwD9oQ4dUDCA8&amp;amp;uact=5&amp;amp;oq=NCSC%3A+Legal+firms+urged+to+strengthen+cyber+defences&amp;amp;gs_lcp=Cgxnd3Mtd2l6LXNlcnAQAzIFCAAQogQyBQgAEKIESgQIQRgAUABY1RVgqyBoAXABeASAAbIBiAHtD5IBBDAuMTWYAQCgAQGgAQKwAQDAAQE&amp;amp;sclient=gws-wiz-serp&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;Google Indexed on 040723 at 10:51 CET&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;4th July 2023&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;LEGAL firms have been issued with the latest guidance and steps to take to combat the evolving cyber security threats the sector faces.&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;The National Cyber Security Centre – which is part of GCHQ – has published its latest Cyber Threat to the Legal Sector report to highlight the potential threats to legal firms, from ransomware attacks by criminals to intellectual property theft by state actors.&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;The report, which updates a previous iteration from 2018, looks to help UK law practices of all sizes and types of law be more resilient to the main methods of attack. &lt;a href=&quot;https://www.ncsc.gov.uk/news/legal-firms-urged-to-strengthen-cyber-defences&quot; target=&quot;_blank&quot;&gt;Learn More /...&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;span style=&quot;clear: left; float: left; font-family: Montserrat; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Daily Cyber Insights&quot; border=&quot;0&quot; data-original-height=&quot;1280&quot; data-original-width=&quot;1920&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhA3ZDRo8gy5tuoRss-HdXY7KOaSuQVJlAKmkWqV_15ghXSuILWr9OPJSkZ7rl9nV9Cvf75tmJZyDwSgcu4me26kmAZ-Vq5OQwGcf0Po9uwUivG25WJR8TrbvtlpIhmadHbb90ff3gOOflZD4masNND5pXMwil_DewJFRchUcltuCKHFG-fnPWlxHV4nwM/s16000/legal-5293009_1920.jpg&quot; title=&quot;legal firms strengthen cybersecurity&quot; /&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;</description><link>https://iainfraserjournalist.blogspot.com/2023/07/legal-firms-strengthen-cybersecurity.html</link><author>noreply@blogger.com (Cybersecurity Journalist - Iain Fraser)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhA3ZDRo8gy5tuoRss-HdXY7KOaSuQVJlAKmkWqV_15ghXSuILWr9OPJSkZ7rl9nV9Cvf75tmJZyDwSgcu4me26kmAZ-Vq5OQwGcf0Po9uwUivG25WJR8TrbvtlpIhmadHbb90ff3gOOflZD4masNND5pXMwil_DewJFRchUcltuCKHFG-fnPWlxHV4nwM/s72-c/legal-5293009_1920.jpg" height="72" width="72"/><thr:total>0</thr:total><georss:featurename>Gibraltar</georss:featurename><georss:point>36.140751 -5.353585</georss:point><georss:box>7.8305171638211561 -40.509835 64.450984836178847 29.802665</georss:box></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-484539844128637595.post-4998038519066713735</guid><pubDate>Thu, 22 Jun 2023 10:21:00 +0000</pubDate><atom:updated>2023-09-07T10:00:08.498+02:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Business</category><title>DATA BREACHES: Human error continues to be a huge vulnerability - VERIZON </title><description>&lt;div&gt;&lt;b&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;DATA BREACHES: Human error continues to be a huge vulnerability - VERIZON&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;Posted By: Iain Fraser -&amp;nbsp;&lt;a href=&quot;https://www.google.com/search?q=cybersecurity+journalist+gibraltar&amp;amp;oq=cyberse&amp;amp;aqs=chrome.0.69i59j69i57j69i61j69i60j69i65l3j69i60.4791j0j4&amp;amp;sourceid=chrome&amp;amp;ie=UTF-8&quot; target=&quot;_blank&quot;&gt;Cybersecurity Journalist Gibraltar&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;via&amp;nbsp;&lt;a href=&quot;https://www.IainFRASER.net/&quot;&gt;IainFRASER.net/DailyCyberInsights&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;a href=&quot;https://www.google.com/search?q=DATA+BREACHES%3A+Human+error+continues+to+be+a+huge+vulnerability+-+VERIZON+&amp;amp;biw=1920&amp;amp;bih=946&amp;amp;ei=eVilZKmOJMvpkgWh45GQDw&amp;amp;ved=0ahUKEwjprpXKv_f_AhXLtKQKHaFxBPIQ4dUDCA8&amp;amp;uact=5&amp;amp;oq=DATA+BREACHES%3A+Human+error+continues+to+be+a+huge+vulnerability+-+VERIZON+&amp;amp;gs_lcp=Cgxnd3Mtd2l6LXNlcnAQA0oECEEYAFAAWPQUYNIYaAFwAHgEgAGiAYgB6xaSAQQxLjIzmAEAoAEBoAECsAEAwAEB&amp;amp;sclient=gws-wiz-serp&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;Google Indexed on 220623 at 13:03 CET&amp;nbsp;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;&lt;b&gt;&lt;a href=&quot;https://www.verizon.com/&quot; target=&quot;_blank&quot;&gt;VERIZON&lt;/a&gt;&lt;/b&gt;&amp;nbsp;has just released their latest Data Breach Investigations Report (DBIR)&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;Aimed at Cybersecurity professionals the report contains in-depth analysis of data-driven, real-world instances of cybercrime and how cyberattacks play out across organizations of different sizes as well as from different verticals and disparate geographic locations.&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;As in previous years VERIZON examines what the data tells us about threat actors and the tools they employ against enterprises. This year, VERIZON looked at 16,312 security incidents, of which 5,199 were confirmed breaches. A must read for all Cybersecurity professionals!&amp;nbsp;&lt;a href=&quot;https://www.verizon.com/business/resources/reports/dbir/2023/master-guide/&quot; target=&quot;_blank&quot;&gt;Learn More /...&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;b&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;About VERIZON&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;We don&#39;t wait for the future - We build it.&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;We’re problem-solvers, engineers, technologists, innovators and thought-leaders. Who did Verizon build their network for? People. Every hole dug, every wire spliced, every tower raised, it was for people who wanted to connect to other people, businesses and the world around them. And when you know people are depending on you for those connections, you do whatever it takes.&amp;nbsp;&lt;a href=&quot;https://www.verizon.com/about/our-company/who-we-are&quot; target=&quot;_blank&quot;&gt;Learn More /...&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;span style=&quot;clear: left; float: left; font-family: Montserrat; margin-bottom: 1em; margin-right: 1em; text-align: left;&quot;&gt;&lt;img alt=&quot;Daily Cyber Insights&quot; border=&quot;0&quot; data-original-height=&quot;1394&quot; data-original-width=&quot;1920&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgjQkM0pCSUcwvhjKGjLW1uNCgye_6UNmmGwse1DSXVLgO5v_FOSpECvBmiL-54BdMayNHaQ8lEYVi1lmGiaWX1BYV-m3DRbS-Omd2YUBTrVUv7CQTKAlkFb6xXLCWZ3yIv2dsHxDPbwFr4NuIdYgcsha20rZ86tGzB4ZQc3KncrfnwWNuH1K7cIff9iP0/s16000/internet-3589684_1920.jpg&quot; title=&quot;Verizon Data Breach Report&quot; /&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-family: Montserrat;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;br /&gt;&lt;/div&gt;</description><link>https://iainfraserjournalist.blogspot.com/2023/06/human-error-vulnerability.html</link><author>noreply@blogger.com (Cybersecurity Journalist - Iain Fraser)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgjQkM0pCSUcwvhjKGjLW1uNCgye_6UNmmGwse1DSXVLgO5v_FOSpECvBmiL-54BdMayNHaQ8lEYVi1lmGiaWX1BYV-m3DRbS-Omd2YUBTrVUv7CQTKAlkFb6xXLCWZ3yIv2dsHxDPbwFr4NuIdYgcsha20rZ86tGzB4ZQc3KncrfnwWNuH1K7cIff9iP0/s72-c/internet-3589684_1920.jpg" height="72" width="72"/><thr:total>0</thr:total><georss:featurename>Gibraltar</georss:featurename><georss:point>36.140751 -5.353585</georss:point><georss:box>7.8305171638211561 -40.509835 64.450984836178847 29.802665</georss:box></item></channel></rss>