All Blogs

CISA Strongly Recommends End-to-End Encrypted Apps

The Cybersecurity and Infrastructure Security Agency (CISA) document “Mobile Communications Best Practice Guidance” strongly recommends using end-to-end encrypted messaging applications to secure communications, especially for individuals in high-risk positions. Here...

Unveiling Digital Repression: The Case of Surveillance and Spyware in Serbia

In February 2024, independent journalist Slaviša Milanov from Dimitrovgrad, Serbia, experienced an alarming incident during a traffic stop where he was taken to a police station. After his release, Slaviša...

Balancing Justice and Privacy: The Ethical Implications of Cellebrite and Digital Forensics Tools

As digital forensics tools like Cellebrite become increasingly powerful, the potential for privacy violations raises significant concerns. While these technologies play a vital role in law enforcement and national security...

Justice Department Shuts Down Rydox Cybercrime Marketplace, Arrests Three Administrators

The U.S. Department of Justice announced the successful takedown of Rydox, a notorious cybercrime marketplace, and the arrest of its three administrators. The Rydox platform, which facilitated the sale of...

INTERPOL's Operation HAECHI V: A Landmark Victory Against Cyber-Enabled Financial Crimes

In a landmark operation, INTERPOL has announced the arrest of over 5,500 suspects and the seizure of assets worth more than USD 400 million. This global effort, known as Operation...

Ron Wyden (D-OR) Objects to STOP CSAM Act on Senate Floor

In today’s video, we bring you an important and thought-provoking speech from Senator Ron Wyden (D-OR) as he addresses the Senate floor regarding the STOP CSAM Act. Senator Wyden passionately...