Tag: country
-
Australia warns of BadCandy infections on unpatched Cisco devices
The Australian government is warning about ongoing cyberattacks against unpatched Cisco IOS XE devices in the country to infect routers with the BadCandy webshell. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/australia-warns-of-badcandy-infections-on-unpatched-cisco-devices/
-
Spam text scammer fined £200,000 for targeting people in debt, after sending nearly one million messages
The UK Information Commissioner’s Office (ICO) has levied a fine of £200,000 against a sole trader who sent almost one million spam text messages to people across the country – many of whom were already struggling with debt. First seen on bitdefender.com Jump to article: www.bitdefender.com/en-us/blog/hotforsecurity/spam-text-scammer-fined-200-000-for-targeting-people-in-debt-after-sending-nearly-one-million-messages
-
Spam text scammer fined £200,000 for targeting people in debt, after sending nearly one million messages
The UK Information Commissioner’s Office (ICO) has levied a fine of £200,000 against a sole trader who sent almost one million spam text messages to people across the country – many of whom were already struggling with debt. First seen on bitdefender.com Jump to article: www.bitdefender.com/en-us/blog/hotforsecurity/spam-text-scammer-fined-200-000-for-targeting-people-in-debt-after-sending-nearly-one-million-messages
-
Tips for CISOs switching between industries
Understand and demonstrate achieved results: Making the jump into a new industry isn’t about matching past job titles but about proving you can create impact in a new context. DiMarco says the key is to demonstrate relevance early.”When I pitch a candidate, I explain what they did, how they did it, and what their impact…
-
Hacktivists breach Canada’s critical infrastructure, cyber Agency warns
Canada’s cyber agency warns hacktivists breached critical infrastructure, altering industrial controls and risking public safety. The Canadian Centre for Cyber Security revealed that hacktivists have repeatedly breached systems of country’s critical infrastructure systems in the country. Attackers tampered with industrial controls at a water treatment facility, an oil & gas firm, and an agricultural facility.…
-
Canada says hacktivists breached water and energy facilities
The Canadian Centre for Cyber Security warned today that hacktivists have breached critical infrastructure systems multiple times across the country, allowing them to modify industrial controls that could have led to dangerous conditions. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/canada-says-hacktivists-breached-water-and-energy-facilities/
-
Australia’s Scam Prevention Framework: The Bubble That Burst
Treasury Yet to Release Sector-Specific Controls and Reimbursement Mechanisms Australia introduced the world to the first-ever Scam Prevention Framework law that promised to make the country the hardest place on earth for fraudsters. Eight months later, it’s trapped in bureaucratic limbo – passed, praised and still waiting to work. First seen on govinfosecurity.com Jump to…
-
Australia’s Scam Prevention Framework: The Bubble That Burst
Treasury Yet to Release Sector-Specific Controls and Reimbursement Mechanisms Australia introduced the world to the first-ever Scam Prevention Framework law that promised to make the country the hardest place on earth for fraudsters. Eight months later, it’s trapped in bureaucratic limbo – passed, praised and still waiting to work. First seen on govinfosecurity.com Jump to…
-
Russian Hackers Target Ukrainian Organizations Using Stealthy Livingthe-Land Tactics
Organizations in Ukraine have been targeted by threat actors of Russian origin with an aim to siphon sensitive data and maintain persistent access to compromised networks.The activity, according to a new report from the Symantec and Carbon Black Threat Hunter Team, targeted a large business services organization for two months and a local government entity…
-
Russian Hackers Target Ukrainian Organizations Using Stealthy Livingthe-Land Tactics
Organizations in Ukraine have been targeted by threat actors of Russian origin with an aim to siphon sensitive data and maintain persistent access to compromised networks.The activity, according to a new report from the Symantec and Carbon Black Threat Hunter Team, targeted a large business services organization for two months and a local government entity…
-
Data sovereignty proof: How to verify controls like ‘Project Texas’
“Verification regimes work best when they serve everyone’s interests. The reporting company wants a process that does not impose too many burdens or interrupt workflow while allowing it to demonstrate compliance. Oversight bodies want hard data that is difficult to fake and indicates adherence to the regime. Finally, these systems need to be simple enough…
-
Data sovereignty proof: How to verify controls like ‘Project Texas’
“Verification regimes work best when they serve everyone’s interests. The reporting company wants a process that does not impose too many burdens or interrupt workflow while allowing it to demonstrate compliance. Oversight bodies want hard data that is difficult to fake and indicates adherence to the regime. Finally, these systems need to be simple enough…
-
House Democrats Push Back at Reassignments, Firings of CISA Employees
Democrats in Congress are continuing to target the Trump Administrations actions with CISA, with the latest effort being a letter from House Democrats arguing the firing some employees and moving others to help with the president’s expansive immigration and deportation operations weaken the country’s security at a time when China’s cyber intrusions are accelerating. First…
-
UK facing ‘most contested and complex’ threat in decades, warns GCHQ director
Britain’s security agencies are grappling with the most “contested and complex” threat environment in decades, one of the country’s most senior spies warned. First seen on therecord.media Jump to article: therecord.media/facing-anne-keast-decades-gchq
-
Chinese Threat Actors Exploit ToolShell SharePoint Flaw Weeks After Microsoft’s July Patch
Tags: breach, china, country, exploit, flaw, government, microsoft, middle-east, technology, threat, update, usa, vulnerabilityThreat actors with ties to China exploited the ToolShell security vulnerability in Microsoft SharePoint to breach a telecommunications company in the Middle East after it was publicly disclosed and patched in July 2025.Also targeted were government departments in an African country, as well as government agencies in South America, a university in the U.S., as…
-
US NSA alleged to have launched a cyber attack on a Chinese agency
Tags: access, attack, authentication, breach, china, ciso, cloud, communications, control, country, cyber, cybersecurity, defense, finance, hacker, infrastructure, international, login, malicious, mfa, monitoring, network, RedTeam, resilience, sans, service, spy, supply-chain, technology“NSA does not confirm nor deny allegations in the media regarding its operations. Our core focus is countering foreign malign activities persistently targeting American interests, and we will continue to defend against adversaries wishing to threaten us.”The Chinese post says the country “shattered the US cyber attack plot of stealing secrets and infiltration and sabotage,…
-
US NSA alleged to have launched a cyber attack on a Chinese agency
Tags: access, attack, authentication, breach, china, ciso, cloud, communications, control, country, cyber, cybersecurity, defense, finance, hacker, infrastructure, international, login, malicious, mfa, monitoring, network, RedTeam, resilience, sans, service, spy, supply-chain, technology“NSA does not confirm nor deny allegations in the media regarding its operations. Our core focus is countering foreign malign activities persistently targeting American interests, and we will continue to defend against adversaries wishing to threaten us.”The Chinese post says the country “shattered the US cyber attack plot of stealing secrets and infiltration and sabotage,…
-
China’s spy agency accuses NSA of yearslong attack on the country’s timekeeping service
The NSA did not confirm nor deny the allegations made by China’s Ministry of State Security. China said the origins of the attack date back to March 2022. First seen on cyberscoop.com Jump to article: cyberscoop.com/china-mss-nsa-cyberattack-timekeeping-service/
-
TDL 007 – Cyber Warriors Digital Shadows: Insights from Canada’s Cybersecurity Leader
Tags: ai, awareness, backup, breach, browser, business, cio, ciso, communications, conference, control, corporate, country, cryptography, cyber, cybersecurity, dark-web, data, data-breach, defense, dns, email, encryption, finance, government, healthcare, identity, incident, infrastructure, intelligence, Internet, jobs, law, leak, linux, malicious, mfa, mitigation, network, organized, phone, privacy, ransom, ransomware, RedTeam, resilience, risk, risk-management, router, service, startup, strategy, supply-chain, switch, tactics, technology, theft, threat, tool, training, windowsSummary In this episode of The Defender’s Log, host David Redekop interviews Sami Khoury, the Senior Official for Cybersecurity for the Government of Canada. With a career spanning 33 years at the Communication Security Establishment (CSE), Khoury shares how a coincidental job application blossomed into a lifelong passion for national security. Khoury emphasizes that modern…
-
Cambodia to repatriate South Koreans ensnared by scam industry amid diplomatic pressure
Almost 60 South Koreans will be sent home from Cambodia after that country’s government agreed to repatriate people rescued from scam compounds. First seen on therecord.media Jump to article: therecord.media/cambodia-repatriating-south-koreans-scam-compounds
-
German parliamentarian urges officials to investigate Hungary for spyware abuse
A German member of the European Parliament has filed a complaint urging authorities to investigate Hungarian Prime Minister Viktor Orbán for allegedly ordering the country’s secret service to break into his phone with spyware. First seen on therecord.media Jump to article: therecord.media/german-parliament-hungary-spyware
-
Chinese Threat Group ‘Jewelbug’ Quietly Infiltrated Russian IT Network for Months
A threat actor with ties to China has been attributed to a five-month-long intrusion targeting a Russian IT service provider, marking the hacking group’s expansion to the country beyond Southeast Asia and South America.The activity, which took place from January to May 2025, has been attributed by Broadcom-owned Symantec to a threat actor it tracks…
-
NCSC warns companies to prepare for a day when your screens go dark
The UK’s National Cyber Security Centre warns that the country now faces four nationally significant cyberattacks every week – a 129% jump in a year. Some headlines claim the NCSC is urging organisations to “go back to pen and paper,” but the full report tells a more practical story about resilience, preparedness, and surviving a…
-
NCSC warns companies to prepare for a day when your screens go dark
The UK’s National Cyber Security Centre warns that the country now faces four nationally significant cyberattacks every week – a 129% jump in a year. Some headlines claim the NCSC is urging organisations to “go back to pen and paper,” but the full report tells a more practical story about resilience, preparedness, and surviving a…
-
NCSC warns companies to prepare for a day when your screens go dark
The UK’s National Cyber Security Centre warns that the country now faces four nationally significant cyberattacks every week – a 129% jump in a year. Some headlines claim the NCSC is urging organisations to “go back to pen and paper,” but the full report tells a more practical story about resilience, preparedness, and surviving a…
-
Cambodian Conglomerate a ‘Pig Butchering’ Outfit, Says US
Prince Holding Group CEO Chen Zhi Indicted, Sanctioned. A Cambodian multinational conglomerate with ties to the country’s ruling elite is actually a transnational criminal group raking in tens of millions per day from online scams perpetuated by forced labor held in compounds, say federal prosecutors. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/cambodian-conglomerate-pig-butchering-outfit-says-us-a-29723
-
Layoffs, reassignments further deplete CISA
Some CISA staffers have been pushed out, while others are being told to move across the country for jobs outside their skill sets. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/cisa-layoffs-reassignments-dhs-white-house-government-shutdown/802723/
-
Layoffs, reassignments further deplete CISA
Some CISA staffers have been pushed out, while others are being told to move across the country for jobs outside their skill sets. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/cisa-layoffs-reassignments-dhs-white-house-government-shutdown/802723/
-
UK hit by record number of ‘nationally significant’ cyberattacks
The British government is announcing on Tuesday it will be writing to the chief executives and chairs of the country’s leading businesses to “take concrete actions” to protect their enterprises from attacks. First seen on therecord.media Jump to article: therecord.media/uk-hit-by-record-number-significant-cyberattacks
-
Ukraine takes steps to launch dedicated cyber force for offensive strikes
Ukraine lawmakers are considering uniting the country’s offensive and defensive military cyber capabilities under a single command within the Armed Forces. First seen on therecord.media Jump to article: therecord.media/ukraine-takes-steps-dedicated-cyber-force

