Tag: Cybersecurity

The Dull Roar of AI-Powered Cybercrime

(Tom Uren - Lawfare) A range of reports show that artificial intelligence (AI) adoption is, unsurprisingly, making threat actors' standard workflows quicker and easier. The...

Beyond Carpenter – A Legislative Framework for Mobile Location Privacy

(Jim Dempsey - Lawfare) In Carpenter v. United States, the Supreme Court held that the Fourth Amendment requires a warrant for compelled disclosure of...

Installing a Content Patch in the Stored Communications Act

(Stephanie Pell, Richard Salgado - Lawfare) The 1980s-era scheme in the Stored Communications Act that allows the government to compel service providers to disclose...

Data Proxies for the Stored Communications Act

(David Kris - Lawfare) When law enforcement obtains a customer’s cloud data from a cloud service provider (CSP) under the Stored Communications Act, a...

Harmonizing ECPA to Close Gaps and Increase Statutory Coherence

(Aaron R. Cooper - Lawfare) The Electronic Communications Privacy Act of 1986 (ECPA) was designed to protect the privacy of electronic communications while providing...

Limiting Reverse Searches in the Stored Communications Act

(Paul Ohm - Lawfare) Law enforcement increasingly conducts “reverse searches”—requests that ask online providers to search their massive databases not for information about a...

Cyber (In)Security and Surveillance

Iran's MuddyWater Hackers Hit US Firms with New 'Dindoor' Backdoor (Kevin Poireault - Infosecurity Magazine) Several US companies have been targeted by Iranian hacking group...

Cyber (In)Security and Surveillance (5 March 2026)

Human Rights at Risk in the Sprint Toward AI Sovereignty (Kian Vesteinsson and Grant Baker - Just Security) As AI tools are increasingly embedded in...

Cyber (In)Security and Surveillance (4 March 2026)

Global Takedown Neutralizes Tycoon2FA Phishing Service (Phil Muncaster - Infosecurity Magazine) Investigators claimed today to have taken out another key player in the global cybercrime...

AI and Deepfakes Supercharge Sophisticated Cyber-Attacks, Says Cloudflare

(Danny Palmer - Infosecurity Magazine) Easy access to large language models (LLMs) and other AI tools has significantly lowered the barrier to entry for...

Cyber (In)Security and Surveillance (27 February 2026)

North Korea's APT37 Expands Toolkit to Breach Air-Gapped Networks (Kevin Poireault - Infosecurity Magazine) A cyber espionage group linked to North Korea has been observed...

Cyber (In)Security and Surveillance (26 February 2026)

Ransomware payments dropped in 2025 as attack numbers reached record levels: Chainalysis (Jonathan Greig - The Record) The number of ransomware victims paying up to...

Cyber (In)Security and Surveillance (25 February 2026)

Phishing operation with links to Russia, Armenia compromised Western cargo companies, researchers find (James Reddick - The Record) Researchers have uncovered and taken down the...

Cyber (In)Security and Surveillance (24 February 2026)

Arkanix Stealer: AI-assisted info-stealer shuts down after brief campaign (Pierluigi Paganini - Security Affairs) Arkanix Stealer emerged in late 2025 as a short-lived information-stealing malware...

Cyber (In)Security and Surveillance (23 February 2026)

Anthropic unveils Claude Code Security to detect and fix code bugs (Pierluigi Paganini - Security Affairs) Anthropic has introduced Claude Code Security, a new AI-powered...

Hackers breach contractor linked to Ukraine’s central bank collectible coin store

(Daryna Antoniuk - The Record) Ukraine’s central bank said its online store for collectible coins and numismatic products was temporarily taken offline after a...