Tag - Ransomware

World’s money launderers are shifting to crypto, report warns
LONDON — Western governments are being urged to clamp down on cryptocurrency as new research suggests $350 billion has been laundered by criminals and hostile states using the technology in the past two decades. A new report for the Henry Jackson Society think tank, shared with POLITICO, finds that worldwide money laundering has shifted dramatically towards cryptocurrency in recent years — with the United States, Russia and Britain seeing the highest number of confirmed cases. The report draws on a database of 164 publicly identified and documented money laundering cases between 2005 and 2025. It was compiled by Alexander Browder, son of American-British financier and anti-corruption campaigner Bill Browder. Alexander Browder said that the true figure could even be “many multiples” higher than the hundreds of billions that have been identified. The study also sheds light on lax enforcement of money laundering powered by crypto. It finds that 79 percent of cases have resulted in no convictions, while only 29 percent of funds have been recovered by authorities. The researchers, based in the U.K., call on the British government to set up a new Cryptocurrency Asset Recovery Office. This would hold recovered funds to transfer back to their rightful owners. Chris Coghlan, a member of the House of Commons Treasury Select Committee told POLITICO: “The sophistication and speed of crypto currency money launderers is much higher and faster than our government’s ability to react.  “As a result, our sanctions and law enforcement are in an increasingly weak position to stop it. This report highlights the need for a robust policy response to this pressing issue.” POLITICAL ISSUE Cryptocurrency is increasingly becoming a regulatory battleground in both the U.K. and the U.S. In America, President Donald Trump has come under fire for his ties to the industry. In April last year the U.S. disbanded a Department for Justice unit tasked with investigating crypto-related fraud. In Britain, Nigel Farage’s right-wing Reform UK became the first major British political party to accept crypto donations. The British government is considering a ban on political donations through crypto. But cryptocurrency exchanges will not be regulated by the country’s Financial Conduct Authority until 2027. Much of Britain’s concern about crypto comes from Russia’s recent embrace of the currency as an alternate means of financing its war economy following the invasion of Ukraine. Browder said Russia is now successfully evading sanctions using cryptocurrency — and that it is becoming a global epicenter for its illicit use. “Half of the illicit exchanges identified in the database have been based in Russia. Four out of five major ransomware groups in the database have been based in Russia.  “It is the home to crypto darknet marketplaces such as Hydra — one of the largest in the world, which had processed over $5 billion in illicit funds through the sale of harmful drugs and other illegal services,” he warned. Browder added that British, American and EU policymakers have so far been unable to tackle the problem: “Criminals and rogue regimes are basically running circles around U.K., U.S. and EU prosecutors.” “Criminals are able to escape without legal consequences, and victims are left without redress and adequate compensation.”
UK
Rights
Technology
Fraud
Law enforcement
Top NATO allies believe cyberattacks on hospitals are an act of war. They’re still struggling to fight back.
NATO countries’ restrained response to hybrid attacks is at odds with public opinion, new polling shows: Broad swaths of the public in key allied countries say actions such as cyberattacks on hospitals should be considered acts of war. The POLITICO Poll, conducted in the United States, Canada, France, Germany and the United Kingdom, showed a majority of people agreed that a cyberattack that shuts down hospitals or power grids constitutes an act of war. Canadians felt the strongest about the issue, with 73 percent agreeing. Respondents from all five countries also rallied behind the idea that sabotaging undersea cables or energy pipelines — which has occurred more frequently in recent years — should be considered be an act of war. The online survey was conducted from Feb. 6 to 9 by the independent London-based polling company Public First. State-backed hackers — often linked to Russia — have increasingly targeted critical sectors in recent years. But NATO allies are struggling to respond effectively. In 2024, a Russia-based ransomware gang conducted a massive cyberattack on U.S.-based medical bill clearinghouse, Change Healthcare, which exposed sensitive data on more than 190 million people. The U.K.’s National Health Service confirmed last year that a cyberattack on its systems, also committed by a Russian hacking group, contributed to a patient’s death. And in 2022, the Federal Bureau of Investigation accused Iranian government-backed hackers of attempting to infiltrate the Boston Children’s Hospital computer network. While these actions have not been officially labeled as acts of war, global governments are taking attacks on critical systems more seriously. NATO in 2014 said that a foreign cyberattack could trigger the alliance’s mutual defense clause, Article 5, effectively calling for multilateral action in response to hacks. But a NATO official said in 2022 that it’s unclear how severe a cyberattack would have to be to trigger a response, which could include “diplomatic and economic sanctions, cyber measures or even conventional forces, depending on the nature of the attack.” Security services in Europe have also more firmly called out the Kremlin for orchestrating digital attacks in the West, most recently targeting Poland’s energy infrastructure. But views on Russia as a global threat vary greatly between Europe and North America. A majority of respondents in Germany, France and the U.K. said Russia represents the biggest threat to peace, while fewer in the U.S. (39 percent) and Canada (29 percent) agreed. While the people surveyed in these five countries overwhelmingly considered major cyberattacks by adversaries against public infrastructure as acts of war, they felt less strongly about smaller-scale acts of digital sabotage. Less than half of the respondents across all five countries said that hacking and leaking the private conversations of political leaders should be considered an act of war. Even fewer considered spreading misinformation to influence an election to be an act of war. Still, there is a clear understanding that governments need to incorporate cyber capabilities and AI into their defense strategies. A plurality of respondents from all countries said that cyber, AI and traditional military power all matter equally. At least a third of respondents in each country agreed that cybersecurity and defense against cyber attacks should be among their countries’ highest priorities for defense spending. “Just being resilient alone, you can’t absorb all threats,” Dag Baehr, Vice President of Germany’s federal intelligence service (BND), said at the Munich Cyber Security Conference last week. “You need to be active in defending.” U.S. officials are pushing for more offensive military responses to cyberattacks, particularly following the massive 2024 hack of global telecommunications networks by the China-linked hacking group Salt Typhoon. The White House is due to release a new national cyber strategy in the coming weeks that would encourage the U.S. to be less “reactive” in cyberspace. National Cyber Director Sean Cairncross told an audience at the Munich Security Conference last week that a “mindset change” was needed to make it harder for attackers to succeed. In recent months, the Trump administration has become more vocal about using its cyber strength to attack, revealing that U.S. cyber forces helped turn off the lights in Caracas during the January strikes that resulted in the capture of former Venezuelan President Nicolás Maduro. U.S. Cyber Command and the National Security Agency were also involved in last year’s U.S. missile strikes on Iranian nuclear facilities, and reportedly helped to disable Iranian air defense systems. In Germany, the government is preparing an overhaul of its intelligence and cybersecurity powers to strike back against foreign hackers and spies.
Data
Defense
Intelligence
Politics
Military
Cyber spying on the rise, EU agency warns
BRUSSELS — Crafty hacking groups backed by hostile states have increasingly targeted European public institutions with cyber espionage campaigns in the past year, the European Union’s cybersecurity agency said Wednesday. Public institutions were the most targeted type of organization, accounting for 38 percent of the nearly 5,000 incidents analyzed, the ENISA agency said in its yearly threat landscape report on European cyber threats. The EU itself is a regular target, it added. State-aligned hacking groups “steadily intensified their operations toward EU organizations,” ENISA said, adding that those groups carried out cyber espionage campaigns on public bodies while also attempting to sway the public through disinformation and interference.  The report looked at incidents from July 1, 2024 to June 30, 2025. Multiple European countries said in August that they had been affected by “Salt Typhoon,” a sprawling hacking and espionage campaign believed to be run by China’s Ministry of State Security. In May, the Netherlands also attributed a cyber espionage campaign to Russia, and the Czech government condemned China for carrying out a cyberattack against its foreign ministry exposing thousands of unclassified emails. These incidents underlined how European governments and organizations are increasingly plagued by cyber intrusions and disruption. Though state-backed cyber espionage is on the rise, ENISA said the most “impactful” threat in the EU is ransomware, a type of hack where criminals infiltrate a system, shut it down and demand payment to allow victims to regain control over their IT. Another type of attack, known as distributed denial-of-service (DDoS), was the most common type of incident, ENISA said. DDoS attacks are most commonly deployed by cyber activists. ENISA said different types of hacking groups are increasingly using each others’ tactics, most notably when state-aligned groups use cyber-activist techniques to hide their provenance. The agency also highlighted the threat to supply chains posed by cyberattacks, saying the interconnected nature of modern services can amplify the effect of a cyberattack.   Passengers at Brussels, Berlin and London Heathrow airports recently experienced severe delays due to a cyberattack on supplier Collins Aerospace, which provides check-in and boarding systems. “Everyone needs to take his or her responsibilities seriously,” Hans de Vries, the agency’s chief operations officer, told POLITICO. “Any company could have a ripple effect … We are so dependent on IT. That’s not a nice story but it’s the truth.”
Intelligence
Security
Supply chains
Services
Disinformation
The NHS digital revolution needs more than vision — it needs action now
In an AI-first era, where AI is becoming an integral part of everything we do, its applications spanning across different sectors and facilitating various parts of our daily routines, healthcare should be no exception. In an ideal world, this is what healthcare should look like: a patient goes to an app to book an appointment, AI directs them to the doctor with the best expertise, knows which equipment is available, and which location makes most sense, and puts the appointment in their respective diaries. The complexity with healthcare is that this isn’t just a system, but three interconnected worlds that must work together seamlessly. Patients rightly want care when and where they need it. Clinicians want to ensure their expert resource is directed as impactfully and efficiently as possible. And medical assets, from MRI scanners to life-saving medications, must be available when and where required. This is where investing in technology becomes key. The good news is that the AI revolution in healthcare is already beginning, and the early results are encouraging. Some GP practices have cut waiting times by 73 percent using smart triaging systems, reducing waits from 11 to three days. AI can help tackle the dreaded ‘8am rush’ when phone lines jam with appointment requests. In the same study, GP practices using these systems reduced phone-based contacts from 88 percent to 18 percent and saw a 30 percent drop in missed appointments — potentially saving £350 million annually from reduced non-attendance. Through ServiceNow’s work with NHS Trusts, we’ve identified five areas where change can make an immediate difference, as outlined in ServiceNow’s NHS Digital Transformation white paper: * improving the staff experience; * joining up corporate services; * protecting against cyber threats; * streamlining patient journeys; and * harnessing AI. The reward for getting this right? We could see £35 billion in productivity savings by 2030. That’s money that could be reinvested directly into patient care. Better staff systems could save £750 million annually — not through cuts, but by giving critical NHS workers back the 29 million hours currently lost to bureaucracy. Right now, it takes up to 120 days to get a new NHS employee properly started. In some trusts we have cut that to 25-40 days. Imagine the impact if this was rolled out across the whole NHS. When you’re trying to grow the workforce from 1.5 to 2.4 million people by 2036, every day matters. Joining up corporate services could save another £1.6 billion each year. This is especially urgent given that Integrated Care Systems are facing combined deficits and have been told to slash running costs by 50 percent. The NHS 10 Year Health Plan for England talks about rebuilding the NHS in working-class communities; areas that currently get 10 percent less funding per person. Digital transformation isn’t just about efficiency; it’s about equity. When systems work properly, everyone benefits, but the biggest gains go to those who currently struggle most to access care. The problem is these parts barely speak to each other. The white paper reveals just how costly this disconnection has become: 13.5 million hours wasted annually due to inadequate IT, a 7.5 million case waiting list, and nearly £3 billion spent each year compensating for care failures. Behind every statistic is a person. Someone facing a delayed diagnosis, a cancelled operation or simply not receiving the care they deserve. This fragmentation isn’t just inefficient, it has a direct effect on patients and clinicians too. We’re spending £15.5 billion annually, 6.5 percent of the entire NHS budget, on corporate services that don’t talk to each other. Nurses are spending over a quarter of their time on paperwork instead of caring for patients. GP practices are drowning in 240 million calls annually from frustrated patients who can’t get through. We have a patchwork of systems where crucial information gets lost in translation.  When it takes 20 separate manual processes just to say goodbye to a leaving employee, you know there’s room for improvement. In addition to internal challenges, there’s the cyber threat affecting the NHS. Healthcare cyberattacks doubled between 2022 and 2023. A single ransomware attack forced over 10,000 patients to have their appointments cancelled at just two trusts. Without proper digital defenses and monitoring, we’re one attack away from regional healthcare paralysis. But here’s the thing, AI is only as good as the systems it connects to. That’s where we need to be honest about the infrastructure challenge. You can’t build tomorrow’s healthcare on yesterday’s technology. We need systems that talk to each other, share information securely and put the right information in the right hands at the right moment. The truth is, the NHS can’t do this transformation alone. The scale is too big, the timeline too tight and the technical challenges too complex. It’s about partnership — because the best outcomes happen when public sector insight combines with private sector innovation and speed. We need genuine partnerships focused on outcomes, not just products. At ServiceNow, we’ve seen what’s possible when this approach works: connected systems, freed-up time and better patient experiences. We’re at a crossroads, and the path we choose in the next two to three years will determine the NHS our children inherit. We can keep tinkering around the edges, managing decline through small improvements or we can be bold and build the digital foundation that healthcare needs. This isn’t a distant dream; it’s an immediate opportunity. Patients have waited long enough. NHS staff have endured enough frustration with systems that make their jobs harder, not easier. The cost of inaction isn’t just measured in pounds, it’s measured in lives. The technology exists, the knowledge is there and the legal framework is in place. What we need now is to act on what we already know works for this transformation to happen.
Budget
Rights
Technology
Services
Health Care
British institutions to be banned from paying ransoms to Russian hackers
LONDON — Hospitals, local councils and operators of critical U.K. infrastructure are among the organizations who will be banned from paying ransoms to hackers under new plans unveiled by the British government. The move — which will cover all public sector bodies as well as the owners and operators of critical national infrastructure — comes after years of escalating cyber attacks on parts of the British state. Many of these attacks on British institutions and infrastructure can be traced back to Russia-aligned hacking groups that are now the subject of sanctions. Estimates from Chinalysis suggest ransomware payments globally generated $1 billion from victims in 2023 alone. The new measures, which also include the mandatory reporting of all ransomware incidents, come following a consultation in which three-quarters of respondents supported a targeted ban. Security Minister Dan Jarvis told MPs in a written statement on Tuesday that the government’s ransomware plan will provide “vital intelligence to expose, detect and disrupt these criminal networks” and to “defend the economy and our business we need to break the ransomware business model.” The government highlighted the case of the British Library — which suffered a cyber attack in 2023 but did not pay a ransom to hackers. But Rebecca Lawrence, its chief executive, said the library “which holds one of the world’s most significant collections of human knowledge” had its technology infrastructure destroyed by the attack, with users still feeling the impact. This year has seen an escalation in cyber attacks with luxury retailer Harrods, and high-street names the Co-op and Marks and Spencer all seeing their services disrupted by criminals.  INVESTMENT SHAKE-UP While the government is moving to strengthen one arm of its national security operation, it is also seeking to remove what it called “red tape” from other aspects of its defenses. The Cabinet Office announced Tuesday that it is making changes to its National Security and Investment Act — legislation aimed at safeguarding critical areas of the economy from malign or foreign influence. These include removing requirements for key businesses to tell the government about internal restructuring changes or alert officials when appointing a liquidator. Pat McFadden, the department’s lead minister, told MPs that the changes “reduce business burdens without exposing the country to greater risk.” Ministers will also consult on plans to shake up what are defined as key sectors under the legislation to update the importance of areas such as semiconductors and artificial intelligence. The consultation also will look at bringing the water sector under national security legislation.  This would mean that the industry in Britain — which itself is under extensive scrutiny due to debt-laden ownership structures — will have any potential buy-outs, such as those based overseas, escalated to national security experts. The annual review of the legislation, also published Tuesday, revealed that the government had only blocked one deal out of all those called in for further scrutiny. A further 16 saw a “final order” notice submitted to mitigate risks to national security, which could include stringent conditions applied to an investment deal.
Intelligence
Security
Water
Artificial Intelligence
Technology
Why hackers love Europe’s hospitals
Simon Meier, a trauma and orthopedic surgeon, was off duty when a colleague called one evening. University Hospital Frankfurt was the target of a massive cyberattack which required an urgent response. The next morning, Meier, who was also the hospital’s emergency planner, sat in a crisis meeting with hospital leadership. IT teams had worked through the night without success, and now, a critical decision loomed. “We had to cut off the whole hospital network from the internet,” Meier recalled. “We didn’t want to give anyone the chance to tamper with the IT systems anymore.” Internet access was severed, databases were frozen and hospital staff had to switch to pen and paper, as well as phone calls, to deliver care. “It severely impaired the communication between our electronic systems,” Meier said. Accessing lab results or data from mobile X-ray machines became a headache, with systems unable to report to the hospital database. “We had to reschedule appointments just to be able to have a look into the patient’s files and postpone some planned surgeries,” he said. Now, over one-and-a-half years later, the system is not yet back to “normal,” Meier said. Internet and database access remain restricted, and a costly infrastructure rebuild is underway to plug long-exploited vulnerabilities. This attack is just one of 309 cybersecurity incidents targeting the health care sector in the EU in 2023 alone — more than any other critical sector. The cost of a major incident typically reaches some €300,000. Beyond the financial impact, cyberattacks pose a threat to patients’ lives. The stakes became clear in a recent case in the U.K., where the death of a patient was linked — among other contributing factors — to a delayed blood test result caused by a cyberattack that disrupted pathology services last summer.  World Health Organization (WHO) chief Tedros Adhanom Ghebreyesus called cyberattacks on health care “issues of life and death.”  While health care has become the primary target for cybercriminals in recent years, putting lives at risk, the sector paradoxically invests less in cybersecurity than any other industry, leaving high-value data vulnerable to attack. PERFECT TARGET For cybercriminals, targeting health data “is a perfect business plan,” said Christos Xenakis, professor at the department of digital systems at the University of Piraeus, Greece. “It’s easy to steal data, and what you steal, you can sell it at a high price.” Ransomware attacks — where hackers lock data and demand a ransom — dominate the sector, an EU Agency for Cybersecurity (ENISA) report showed. “They achieve two targets: One is to get the data and sell (it), and the other is to encrypt the whole system, disrupt the whole system, and ask for money,” Xenakis said.  While health care has become the primary target for cybercriminals in recent years, putting lives at risk, the sector paradoxically invests less in cybersecurity than any other industry, leaving high-value data vulnerable to attack. | Andreas Arnold/Picture Alliance via Getty Images Stolen data can be sold on the dark web to criminals who use it to commit identity theft, insurance fraud or blackmail. To restore disrupted systems, criminals can demand millions of euros — hackers, for instance, wanted $4.5 million for the return of the stolen data after a cyberattack on Hospital Clínic in Barcelona. The hospital refused to pay.  However, other types of cyberattacks are also on the rise, including those by pro-Russian hacktivists aiming to disrupt health care operations, rather than for profit. Despite the risks, only 27 percent of health care organizations have a dedicated ransomware defense program, and 40 percent don’t offer any security awareness training for non-IT staff, a separate ENISA report found. CREATING CYBERSECURITY CULTURE Xenakis believes that the health care sector sees cybersecurity as “out of their business” scope and as a “luxury” rather than an essential. Health care staff are unaware of the risks, he believes, resulting in poor “cyber hygiene.” He recalls being left alone in a doctor’s office with unsecured computers — an easy target for hackers. “If I wanted to do something, it [would have been] easy for me,” he said. At the same time, he doubts that he would have been left in a room with critical medicines. Hospitals understand the risks if medicines got into the wrong hands, he said, “but they cannot understand cybersecurity.”  The task is to create a culture of good cybersecurity practices to protect data and the systems, Xenakis said. “Technology awareness education is … extremely low.” Findings from the Finnish Innovation Fund Sitra back this up. While many health care organizations have cybersecurity policies in place, they are often not “clearly communicated or consistently understood by their staff.” High personnel turnover — not just among medics but also cybersecurity officers — further “exacerbates training gaps and the ability to enforce cybersecurity policies.” Sabina Magalini, a former professor of surgery at the Catholic University of the Sacred Heart in Rome, who coordinated an EU-funded project PANACEA to improve hospital cybersecurity, believes that current laws overlook hospital-specific challenges. “Hospitals have different problems,” she said, listing high staff turnover, lack of training and overwork. “The hospital is not a nuclear power plant … It’s like a port … with a harbor: people coming in, going out, and everything is open,” Magalini said.  She argued that hospitals need continuous cybersecurity drills and streamlined systems that don’t slow down care. Health care staff “don’t want to pass half of the day logging in and logging out,” she said. BLAME THE SYSTEM, NOT THE STAFF However, training hospital personnel, while beneficial, is insufficient to address security threats. “If you have a hospital with 2,000 people working, the probability for someone to click the button (for a phishing link)” is unavoidable, Xenakis said. Especially as artificial intelligence is increasingly used by cybercriminals for automating attacks, such as phishing and deepfake-driven fraud, making the attacks “very sophisticated, very targeted,” Xenakis said.  Germany is backing sector-specific cybersecurity standards and also requires hospitals to invest at least 15 percent of cybersecurity funding received through a program on future-proofing hospitals under its recovery and resilience plan. | Andreas Arnold/Picture Alliance via Getty Images “You cannot blame the people,” Xenakis said. There must be intelligent detection tools “to eliminate the damage … or counteract the attack,” he said. Magalini also pointed out another shortcoming: cybersecurity consultancies that assist hospitals often originate from outside Europe. “They are either from the United States or Canada … also from Russia,” she said, adding that there should be a “European way of doing cybersecurity.” INVESTMENT GAPS While the risks are clear, national governments are skimping on prevention, Xenakis believes, saying that he has no good example of a country “that has invested a lot in cybersecurity in the health sector.”  In Germany, for example, “they are used to just putting new regulations in place, but invest nothing in the cybersecurity of hospitals,” Meier said. He believes his Frankfurt hospital would have found the attack earlier if it had an intrusion detection system. They were “very lucky” to discover the attack before it destroyed the entire database, Meier said. “It could have resulted in a complete shutdown of the hospital.” “Cybersecurity threats pose enormous challenges for the health care sector by endangering the availability of essential health care services,” a spokesperson from the German health ministry told POLITICO in a written response. Germany is backing sector-specific cybersecurity standards and also requires hospitals to invest at least 15 percent of cybersecurity funding received through a program on future-proofing hospitals under its recovery and resilience plan. Europe’s Health Commissioner Olivér Várhelyi has also made it clear that investment must come from national governments. “If you go to a hospital, you always see a guard in the door. There is money for that, so there should be money for protecting the data as well,” he said in January.  But with the health sector often suffering from underinvestment, how much governments can spend on cybersecurity “is a question,” Magalini said. “There are so many other (health care) problems which are not cybersecurity … so I don’t know how they can make the investments.” The cost of inaction can be hundreds of millions of euros, as it was with an attack on Ireland’s Health Service Executive in May 2021 that shut down IT systems of the country’s publicly funded health care system. The attack’s cost was estimated at least €101 million, with a further €657 million to be spent safeguarding against future attacks.  “Why did it cost so much? Not because of the damage but [because] then someone intelligent thought, ‘no, we have to rebuild the system in a secure way,’” Magalini said.  Ray Walley, general practitioner from Ireland, saw firsthand how the attack severed ties with the hospital system.“We couldn’t refer stuff in. It affected outflow from the hospital system. We weren’t getting the results of blood tests. We weren’t getting the results of X-rays and scans,” he said. Walley believes that “cybersecurity is just another form of health care.” “We need to invest in this,” he said. “We need to be proactive. We need to spend the money.” EU’S ACTION: GOOD, BUT COULD BE BETTER The increasing number of cyberattacks on health care systems triggered a response from the EU this year. The European Commission unveiled in January an “action plan” on cybersecurity for hospitals and the health care sector. The plan proposes setting up a European Cybersecurity Support Center for the health care sector within ENISA and a specific rapid response service. The plan also introduces “cybersecurity vouchers,” which will enable EU countries to provide financial support to smaller health care providers for enhancing their cyber resilience.  “It’s good,” said Markus Kalliola, Sitra’s program director. But it “could be stronger.” He is one of the authors of the Commission’s evaluation report by Sitra, which points to murky EU governance, a lack of clear targets or budgets and a missed opportunity to build a functioning single market for cybersecurity solutions.  Sitra calls for going beyond the EU’s plan by considering cybersecurity as a matter of national security; setting up mandatory cybersecurity readiness for health care organizations; incorporating cybersecurity skills into health professionals’ basic training; and organizing more pan-European cybersecurity exercises. With the changing geopolitical situation, “it’s also a matter of national security,” Kalliola said. “EU member states should focus on … what is the national strategy in securing these critical health care services,” he added. Whether or not Europe’s security will feature in the Commission’s final hospital cybersecurity plan remains to be seen; the EU executive has just concluded a consultation and promised to put forward a refined plan by the end of the year. Other pieces of EU legislation — including the NIS2 Directive, Cyber Resilience Act, AI Act and medical devices rules — also raise the bar for cybersecurity across different sectors, including health care.  However, “despite advancements in regulatory efforts and technical solutions, implementation remains inconsistent. There is no time to lose in turning regulations into reality,” Kalliola said.
Data
Security
Artificial Intelligence
Fraud
Health Care
France detains Russian basketball player at US request on hacking charge
Russian basketball player Daniil Kasatkin was arrested in France on a hacking charge at the request of the United States. U.S. authorities believe Kasatkin negotiated payoffs for a ransomware ring that hacked around 900 companies and two federal government entities in the U.S., demanding money to end their attacks, according to a report from AFP. Kasatkin, who was arrested on June 21, denies the allegations. His lawyer, Frédéric Bélot, told POLITICO that Kasatkin is a “collateral victim of that crime” because he bought a second-hand computer with malware.  “He’s not a computer guy,” Bélot said. “He didn’t notice any strange behavior on the computer because he doesn’t know how computers work.” A French court denied Kasatkin bail on Wednesday, and he remains in jail awaiting formal extradition notification from U.S. authorities, according to Bélot. Kasatkin had traveled to France to visit Paris with his fiancée and was detained shortly after arriving at the airport. He played collegiate basketball briefly at Penn State, then four seasons for the Moscow-based MBA-MAI team. Bélot said Kasatkin’s physical condition has deteriorated in jail, which he argued is harming his athletic career. Joshua Berlinger contributed to this report. 
Sport
Cybersecurity and Data Protection
Cybercrime
Hackers
Malware