Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for Take It Down Act Exp ...

 Cyber News

U.S. legislation to criminalize non-consensual intimate images, videos and deepfakes has passed Congress with the overwhelming support of both parties, and even social media companies have voiced support for the bill. The Take It Down Act – short for the bill’s full title, “Tools to Address Known Exploitation by   show more ...

Immobilizing Technological Deepfakes on Websites and Networks Act” – also creates processes and requirements for removing non-consensual intimate imagery (NCII) within 48 hours of notification by victims. But some critics say the legislation, while well intended, doesn’t do enough to ensure that it won’t be misused to suppress lawful speech. The bill is awaiting President Donald Trump’s signature, but as both he and First Lady Melania Trump have voiced support for the bill, it is expected to become law. Take It Down Act Provisions The bill, which takes aim at revenge porn and other malicious or harmful uses of intimate images, would make it a federal crime to knowingly share – or threaten to share – non-consensual intimate images, including deepfakes generated by AI. Penalties include fines and imprisonment of up to two years for offenses involving adults, and imprisonment of up to three years for those involving minors. Online platforms would be required to remove NCII within 48 hours of notification by victims. In an effort to restrict abuses of the law, it excludes content that is a “matter of public concern,” commercial pornography, and materials used for legitimate purposes such as medical uses, law enforcement, national security and legal cases. Some Say Law Needs More Protections Against Misuse Some advocacy groups fear the law as written could be abused to remove lawful speech, among other concerns. The Electronic Frontier Foundation (EFF) said the law gives “the powerful a dangerous new route to manipulate platforms into removing lawful speech that they simply don't like.” “The takedown provision in TAKE IT DOWN applies to a much broader category of content—potentially any images involving intimate or sexual content—than the narrower NCII definitions found elsewhere in the bill,” EFF said in a statement. “The takedown provision also lacks critical safeguards against frivolous or bad-faith takedown requests. Services will rely on automated filters, which are infamously blunt tools. They frequently flag legal content, from fair-use commentary to news reporting. The law’s tight time frame requires that apps and websites remove speech within 48 hours, rarely enough time to verify whether the speech is actually illegal. As a result, online service providers, particularly smaller ones, will likely choose to avoid the onerous legal risk by simply depublishing the speech rather than even attempting to verify it.” EFF said the law “pressures platforms to actively monitor speech, including speech that is presently encrypted. The law thus presents a huge threat to security and privacy online.” The Cyber Civil Rights Initiative (CCRI) welcomed the criminalization of non-consensual distribution of intimate images (NDII), but echoed EFF’s concerns about the takedown provisions. “While we welcome the long-overdue federal criminalization of NDII, we regret that it is combined with a takedown provision that is highly susceptible to misuse and will likely be counter-productive for victims,” CCRI said. CCRI also took exception to a provision “that would seemingly allow a person to disclose intimate images without consent” if the disclosing person also appears in the image. The group said it has “serious concerns about the constitutionality, efficacy, and potential misuse” of the Act’s notice and removal provision: “While we wholeheartedly support the expeditious removal of nonconsensual intimate content and have long called for increased legal accountability for tech platforms that choose to distribute unlawful content, CCRI objects to the notice and removal provision because it is (1) unlikely to accomplish these goals and (2) likely to be selectively and improperly misused for political or ideological purposes that endanger the very communities most affected by image-based sexual abuse.” Unlike the Digital Millennium Copyright Act (DMCA), the Take It Down Act fails to include safeguards against false reports, CCRI said.

 Feed

Enterprise data backup platform Commvault has revealed that an unknown nation-state threat actor breached its Microsoft Azure environment by exploiting CVE-2025-3928 but emphasized there is no evidence of unauthorized data access. "This activity has affected a small number of customers we have in common with Microsoft, and we are working with those customers to provide assistance," the company

 Feed

SonicWall has revealed that two now-patched security flaws impacting its SMA100 Secure Mobile Access (SMA) appliances have been exploited in the wild. The vulnerabilities in question are listed below - CVE-2023-44221 (CVSS score: 7.2) - Improper neutralization of special elements in the SMA100 SSL-VPN management interface allows a remote authenticated attacker with administrative privilege to

 Feed

Security Operations Center (SOC) teams are facing a fundamentally new challenge — traditional cybersecurity tools are failing to detect advanced adversaries who have become experts at evading endpoint-based defenses and signature-based detection systems. The reality of these “invisible intruders” is driving a significant need for a multi-layered approach to detecting threats,

 Feed

Artificial intelligence (AI) company Anthropic has revealed that unknown threat actors leveraged its Claude chatbot for an "influence-as-a-service" operation to engage with authentic accounts across Facebook and X. The sophisticated activity, branded as financially-motivated, is said to have used its AI tool to orchestrate 100 distinct persons on the two social media platforms, creating a

 Feed

For over a decade, application security teams have faced a brutal irony: the more advanced the detection tools became, the less useful their results proved to be. As alerts from static analysis tools, scanners, and CVE databases surged, the promise of better security grew more distant. In its place, a new reality took hold—one defined by alert fatigue and overwhelmed teams. According to OX

 Feed

Russian companies have been targeted as part of a large-scale phishing campaign that's designed to deliver a known malware called DarkWatchman. Targets of the attacks include entities in the media, tourism, finance and insurance, manufacturing, retail, energy, telecom, transport, and biotechnology sectors, Russian cybersecurity company F6 said. The activity is assessed to be the work of a

 Feed

Cybersecurity researchers have shed light on a new campaign targeting WordPress sites that disguises the malware as a security plugin. The plugin, which goes by the name "WP-antymalwary-bot.php," comes with a variety of features to maintain access, hide itself from the admin dashboard, and execute remote code. "Pinging functionality that can report back to a command-and-control (C&C) server

 Law & order

He's not a pop star, but Jeffrey Bowie is alleged to have toured staff areas of a hospital in Oklahoma, hunting for computers he could install spyware on. We dive into the bizarre case of the man accused of hacking medical networks and then sharing how he did it on LinkedIn. Plus! Move over Nigerian princes —   show more ...

the WASPI scams are here. Fraudsters are now targeting UK women born in the 1950s, exploiting pension injustice for phishing gain. All this and more is discussed in the latest edition of the "Smashing Security" podcast by cybersecurity veterans Graham Cluley and Carole Theriault.

 Cyber Security News

Source: thehackernews.com – Author: . SonicWall has revealed that two now-patched security flaws impacting its SMA100 Secure Mobile Access (SMA) appliances have been exploited in the wild. The vulnerabilities in question are listed below – CVE-2023-44221 (CVSS score: 7.2) – Improper neutralization   show more ...

of special elements in the SMA100 SSL-VPN management interface allows a remote authenticated […] La entrada SonicWall Confirms Active Exploitation of Flaws Affecting Multiple Appliance Models – Source:thehackernews.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Billbug

Source: www.darkreading.com – Author: Robert Lemos, Contributing Writer Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have I been blocked? This website is using a security service to protect itself from online attacks. The action you just performed triggered   show more ...

the security solution. There are several actions that could […] La entrada Billbug Expands Cyber-Espionage Campaign in Southeast Asia – Source: www.darkreading.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.darkreading.com – Author: Jai Vijayan, Contributing Writer Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have I been blocked? This website is using a security service to protect itself from online attacks. The action you just performed triggered the   show more ...

security solution. There are several actions that could […] La entrada Prolific RansomHub Operation Goes Dark – Source: www.darkreading.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.darkreading.com – Author: Alexander Culafi, Senior News Writer, Dark Reading Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have I been blocked? This website is using a security service to protect itself from online attacks. The action you just   show more ...

performed triggered the security solution. There are several […] La entrada Former CISA Head Slams Trump Admin Over ‘Loyalty Mandate’ – Source: www.darkreading.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Adversaries

Source: www.darkreading.com – Author: Becky Bracken Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have I been blocked? This website is using a security service to protect itself from online attacks. The action you just performed triggered the security solution.   show more ...

There are several actions that could trigger this […] La entrada Adversaries Are Toying With US Networks & DC Is Short on Answers – Source: www.darkreading.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.darkreading.com – Author: Tara Seals Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have I been blocked? This website is using a security service to protect itself from online attacks. The action you just performed triggered the security solution.   show more ...

There are several actions that could trigger this […] La entrada TheWizards APT Casts a Spell on Asian Gamblers With Novel Attack – Source: www.darkreading.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.darkreading.com – Author: Elizabeth Montalbano, Contributing Writer Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have I been blocked? This website is using a security service to protect itself from online attacks. The action you just performed   show more ...

triggered the security solution. There are several actions that could […] La entrada Phishers Take Advantage of Iberian Blackout Before It’s Even Over – Source: www.darkreading.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.darkreading.com – Author: Becky Bracken Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have I been blocked? This website is using a security service to protect itself from online attacks. The action you just performed triggered the security solution.   show more ...

There are several actions that could trigger this […] La entrada DHS Boss Noem Vows to Get CISA Back ‘On Mission’ – Source: www.darkreading.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.darkreading.com – Author: Alexander Culafi, Senior News Writer, Dark Reading Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have I been blocked? This website is using a security service to protect itself from online attacks. The action you just   show more ...

performed triggered the security solution. There are several […] La entrada DARPA Highlights Critical Infrastructure Security Challenges – Source: www.darkreading.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.darkreading.com – Author: Agam Shah Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have I been blocked? This website is using a security service to protect itself from online attacks. The action you just performed triggered the security solution.   show more ...

There are several actions that could trigger this […] La entrada NVIDIA’s New AI Security Offering Protects Against Software Landmines – Source: www.darkreading.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.infosecurity-magazine.com – Author: The UK’s data protection regulator has said it will not press on with an investigation into the British Library’s catastrophic ransomware breach. The October 2023 attack by a Rhysida ransomware affiliate led to the theft of 600GB of internal data, including   show more ...

personally identifiable information (PII) on users and staff, which was put […] La entrada ICO: No Further Action on British Library Ransomware Breach – Source: www.infosecurity-magazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.infosecurity-magazine.com – Author: The FBI has released details of 42,000 phishing domains, which it said could help network defenders to build cyber resilience and investigate historic breaches. The domains are linked to prolific phishing-as-a-service (PhaaS) operation LabHost. According to   show more ...

British prosecutors, the platform resulted in fraud losses totalling more than £100m ($133m) between 2021 […] La entrada FBI Publishes 42,000 LabHost Phishing Domains – Source: www.infosecurity-magazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.infosecurity-magazine.com – Author: Growing concerns about the cyber risks posed by developments in quantum computing will be major focus at the upcoming Infosecurity Europe 2025 conference. The quantum discussion will begin with an opening keynote by world renowned physicist Brian Cox on Tuesday   show more ...

June 3 at 10.10 BST, in a talk titled ‘Quantum Computers […] La entrada #Infosec2025: How Advances in Quantum Computing Could Reshape Cybersecurity – Source: www.infosecurity-magazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.infosecurity-magazine.com – Author: RansomHub has refined its extortion model and expanded affiliate recruitment efforts amid increasing volatility in the ransomware ecosystem. Following law enforcement actions and multiple exit scams affecting major Ransomware-as-a-Service (RaaS) players, the   show more ...

group has positioned itself as a viable alternative for displaced affiliates. According to a new technical analysis by Group-IB, in […] La entrada RansomHub Refines Extortion Strategy as RaaS Market Fractures – Source: www.infosecurity-magazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.infosecurity-magazine.com – Author: A new initiative to expand cloud and AI infrastructure across Europe has been announced by Microsoft. Earlier today, the company revealed plans to increase its European data center capacity by 40% in the next two years. With operations expanding in 16 countries,   show more ...

Microsoft aims to double its footprint between 2023 and […] La entrada Microsoft Expands Cloud, AI Footprint Across Europe – Source: www.infosecurity-magazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.infosecurity-magazine.com – Author: Just a few days after Marks & Spencer reported suffering from a major cyber-attack, another UK-based major retailer confirmed an intrusion into its IT systems. After reports in UK media of an April 30 internal letter informing the retailer’s staff that the   show more ...

company has been forced to shut down parts of […] La entrada UK Retailer Co-op Confirms Hack, Reports “Small Impact” to Its Systems – Source: www.infosecurity-magazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 accuses

Source: www.infosecurity-magazine.com – Author: The head of Homeland Security has accused Cybersecurity and Infrastructure Security Agency (CISA) of losing sight of its original mission and behaving like “the ministry of truth.” Kristi Noem, Secretary of Homeland Security at the US Department of Homeland   show more ...

Security, which CISA is part of, said the agency had got too […] La entrada DHS Head Accuses CISA of Acting Like “the Ministry of Truth” – Source: www.infosecurity-magazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.infosecurity-magazine.com – Author: A new bill requiring the US Commerce Department to assess the national security risks associated with routers and modems controlled by adversarial nations is one step closer to becoming law after passing the House of Representatives. The House passed the Removing   show more ...

Our Unsecure Technologies to Ensure Reliability and Security (ROUTERS) Act […] La entrada US House Approves Bill to Assess Security Threats Posed by Foreign-Made Routers – Source: www.infosecurity-magazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.schneier.com – Author: Bruce Schneier vaadu • May 1, 2025 1:39 PM Modern surveillance state because of DOGE? Enough with the Elon Derangement Syndrome. The abuse of government data for surveillance started decades ago. Snowden showed some of that. DOGE’s mission is to root out fraud, waste and   show more ...

abuse. It can’t do that without […] La entrada US as a Surveillance State – Source: www.schneier.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: thehackernews.com – Author: . Cybersecurity researchers have shed light on a new campaign targeting WordPress sites that disguises the malware as a security plugin. The plugin, which goes by the name “WP-antymalwary-bot.php,” comes with a variety of features to maintain access, hide itself   show more ...

from the admin dashboard, and execute remote code. “Pinging functionality that […] La entrada Fake Security Plugin on WordPress Enables Remote Admin Access for Attackers – Source:thehackernews.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

2025-05
Aggregator history
Thursday, May 01
THU
FRI
SAT
SUN
MON
TUE
WED
MayJuneJuly