What Counts as “Good Faith Security Research?”
The U.S. Department of Justice (DOJ) recently revised its policy on charging violations of the Computer Fraud and Abuse Act (CFAA), a 1986 law that remains the primary statute by…
The U.S. Department of Justice (DOJ) recently revised its policy on charging violations of the Computer Fraud and Abuse Act (CFAA), a 1986 law that remains the primary statute by…
Colin Thierry Published on: June 3, 2022 ExpressVPN announced on Thursday its decision to remove Indian-based VPN servers in response to a recent law introduced in India requiring VPN providers to store…
Colin Thierry Published on: June 2, 2022 Europol announced on Wednesday the shutdown of the FluBot operation, one of the largest and fastest-growing Android malware operations in existence. The malware operation’s takedown…
Colin Thierry Published on: June 1, 2022 Italy’s Computer Security Incident Response Team (CSIRT) has issued an urgent alert on Monday to raise awareness about the high risk of distributed…
Colin Thierry Published on: June 1, 2022 A former US Marine has pleaded guilty to cyberstalking multiple young women in California in a sexual extortion campaign. According to court documents,…
Costa Rica’s national health service was hacked sometime earlier this morning by a Russian ransomware group known as Hive. The intrusion comes just weeks after Costa Rican President Rodrigo Chaves…
Aviva Zacks Published on: May 31, 2022 Maarten Verwaest, one of the co-founders and CEO of Limecraft, told Aviva Zacks of Safety Detectives about his company’s audiovisual asset management services.…
Colin Thierry Published on: May 31, 2022 A ransomware attack on the Somerset County government in New Jersey froze email communications and forced staff to use paper records for some services.…
SafetyDetectives Cybersecurity Team Published on: May 30, 2022 EFB (Electronic Flight Bag) information, including sensitive flight details, source code, and staff data, was left accessible. An AWS S3 bucket containing…
Colin Thierry Published on: May 27, 2022 State-sponsored actors have exploited five zero-day vulnerabilities to infect devices with Predator spyware, Google’s Threat Analysis Group (TAG) disclosed in a security report last…
Copyright © 2025 Nasni Consultants Ltd. All Rights Reserved