|
|
PHOTO: HWEE YOUNG/SHUTTERSTOCK
|
|
|
Suspected Chinese spies are targeting the Dutch semiconductor industry, Dutch Minister of Defense Ruben Brekelmans said Saturday. Maritime and aerospace companies are also being hit, cyber officials in the Netherlands said. Brekelmans said the country wants to reduce its dependency on China for raw materials. (Reuters)
|
|
|
Pay a ransom, file a report: An Australian law that mandates the disclosure of ransom payments went into effect Friday. Companies with annual revenues of more than three million Australian dollars must report such payments within 72 hours of turning over the funds. (InfoSecurity Magazine)
-
The U.K. is considering a similar law.
-
The Australian law, enacted in 2024, also calls for the creation of a cyber incident review board to analyze major hacks.
|
|
|
PHOTO: MARK SCHIEFELBEIN
/AP
|
|
|
The U.S. should reactivate the Cyber Safety Review Board, four Democratic Senators urged in a letter to the Department of Homeland Security. The board broke up when DHS recently took away a chunk of funding and staff from the Cybersecurity and Infrastructure Security Agency, in DOGE cuts.
|
|
|
-
"When building cyber security capabilities, the software and IT ecosystem benefits tremendously from transparent, accessible, and rigorous research and forensics," Richard Blumenthal of Connecticut and Ron Wyden of Oregon (pictured), along with Mark Warner of Virginia and Elissa Slotkin of Michigan, wrote to the Department of Homeland Security. (NextGov)
|
|
Genghis Khan and Scattered Spider: The tactics of today's hackers mirror those of ancient warriors and military leaders, including the "terror and deception" techniques of Mongolia's Genghis Khan and the "sabotage from within" concept Chinese general Sun Tzu. (History)
|
|
|
|
|
|
|