Tag: government
-
Nach Entlassung: Festnahmen wegen massenhafter Löschung von Behördendaten
Zwei Brüder sollen 96 Datenbanken mit wichtigen Daten der US-Regierung gelöscht haben. Die nun drohenden Haftstrafen wären nicht ihre ersten. First seen on golem.de Jump to article: www.golem.de/news/nach-entlassung-brueder-wegen-vernichtung-von-us-regierungsdaten-verhaftet-2512-202946.html
-
Nach Entlassung: Brüder wegen Vernichtung von US-Regierungsdaten verhaftet
Die Beschuldigten sollen 96 Datenbanken mit wichtigen Daten der US-Regierung gelöscht haben. Die nun drohenden Haftstrafen wären nicht ihre ersten. First seen on golem.de Jump to article: www.golem.de/news/nach-entlassung-brueder-wegen-vernichtung-von-us-regierungsdaten-verhaftet-2512-202946.html
-
New Phishing Campaign Impersonates India’s Income Tax Department to Distribute AsyncRAT
In November 2025, security researchers at Raven AI identified a sophisticated zero-day phishing campaign impersonating the Income Tax Department of India, targeting enterprises across the country with a multi-stage malware chain. The attack combined authentic-looking government communications with advanced evasion techniques, delivering both a shellcode-based RAT loader and a malicious executable disguised as a GoTo…
-
UK Government Considers Computer Misuse Act Revision
Security Minister Dan Jarvis Endorses Security Researcher Protections. The U.K. government is considering amending its three-decade-old hacking law to include a statutory defense cover for security researchers. The announcement comes amid concerns that the law penalizes white hat hackers for essential security practices. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/uk-government-considers-computer-misuse-act-revision-a-30197
-
CISA Warns of ‘Ongoing’ Brickstorm Backdoor Attacks
State-sponsored actors tied to China continue to target VMware vSphere environments at government and technology organizations. First seen on darkreading.com Jump to article: www.darkreading.com/cyberattacks-data-breaches/cisa-ongoing-brickstorm-backdoor-attacks
-
AI creates new security risks for OT networks, warns NSA
Tags: ai, cisa, compliance, control, cyber, data, data-breach, government, healthcare, infrastructure, injection, intelligence, LLM, network, risk, technology, trainingPrinciples for the Secure Integration of Artificial Intelligence in Operational Technology, authored by the NSA in conjunction with the Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC) and a global alliance of national security agencies.While the use of AI in critical infrastructure OT is in its early days, the guidance reads like an attempt…
-
AI creates new security risks for OT networks, warns NSA
Tags: ai, cisa, compliance, control, cyber, data, data-breach, government, healthcare, infrastructure, injection, intelligence, LLM, network, risk, technology, trainingPrinciples for the Secure Integration of Artificial Intelligence in Operational Technology, authored by the NSA in conjunction with the Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC) and a global alliance of national security agencies.While the use of AI in critical infrastructure OT is in its early days, the guidance reads like an attempt…
-
Virginia brothers charged with hacking, deleting federal databases holding FOIA info
Twin brothers with a history of cybercrimes have been arrested on charges of abusing their roles as federal contractors to delete databases storing U.S. government information. First seen on therecord.media Jump to article: therecord.media/twin-brothers-arrested-hacking-deleting-foia-databases
-
Sanctioned spyware maker Intellexa had direct access to government espionage victims, researchers say
Based on a leaked video, security researchers alleged that Intellexa staffers have remote live access to their customers’ surveillance systems, allowing them to see hacking targets’ personal data. First seen on techcrunch.com Jump to article: techcrunch.com/2025/12/04/sanctioned-spyware-maker-intellexa-had-direct-access-to-government-espionage-victims-researchers-say/
-
From feeds to flows: Using a unified linkage model to operationalize threat intelligence
Tags: access, api, attack, authentication, automation, business, ciso, cloud, compliance, container, control, corporate, credentials, cyber, cybersecurity, data, defense, exploit, finance, firewall, framework, github, government, iam, identity, infrastructure, intelligence, ISO-27001, malicious, metric, mitre, monitoring, network, nist, open-source, phishing, risk, risk-assessment, risk-management, saas, service, siem, soc, software, supply-chain, tactics, threat, tool, update, vulnerability, zero-trustwhat to watch for, but not why it matters or how it moves through your environment.The result is a paradox of abundance: CISOs have more data than ever before, but less operational clarity. Analysts are overwhelmed by indicators disconnected from context or mission relevance.Each feed represents a snapshot of a potential threat, but it does…
-
Contractors with hacking records accused of wiping 96 govt databases
U.S. prosecutors have charged two Virginia brothers arrested on Wednesday with allegedly conspiring to steal sensitive information and destroy government databases after being fired from their jobs as federal contractors. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/contractors-with-hacking-records-accused-of-wiping-96-govt-databases/
-
Student Sells Gov’t, University Sites to Chinese Actors
It’s the best deal going in cybercrime: fully compromised websites belonging to high-value organizations, for just a couple hundred bucks each. First seen on darkreading.com Jump to article: www.darkreading.com/threat-intelligence/govt-university-sites-chinese-actors
-
ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts”, and 15 More Stories
Think your Wi-Fi is safe? Your coding tools? Or even your favorite financial apps? This week proves again how hackers, companies, and governments are all locked in a nonstop race to outsmart each other.Here’s a quick rundown of the latest cyber stories that show how fast the game keeps changing. DeFi exploit drains funds Critical…
-
India Withdraws Order Mandating Pre-Installation of Sanchar Saathi Cybersecurity App on Smartphones
India has reversed its earlier directive requiring mobile phone manufacturers and importers to pre-install the government-backed Sanchar Saathi application on all new smartphones sold in the country. The Communications Ministry announced on Wednesday that the government had “decided not to make the pre-installation mandatory for mobile manufacturers,” marking a notable shift just 48 hours after the original order was issued. First seen…
-
GoldFactory Hits Southeast Asia with Modified Banking Apps Driving 11,000+ Infections
Cybercriminals associated with a financially motivated group known as GoldFactory have been observed staging a fresh round of attacks targeting mobile users in Indonesia, Thailand, and Vietnam by impersonating government services.The activity, observed since October 2024, involves distributing modified banking applications that act as a conduit for Android malware, Group-IB said in a technical First…
-
Coach or mentor: What you need depends on where you are as a cyber leader
Tags: access, ai, business, ciso, cloud, compliance, control, cyber, cybersecurity, defense, government, jobs, network, programming, risk, risk-management, skills, technologyA good technical base can last decades: While mentees need the most help with aligning to the business, some argue that a technical baseline is equally as important to the role for managing technical staff and enabling business operations, particularly through innovative technologies like cloud and AI.One of those is Cynthia Madden, founder of Artemis…
-
India Scraps Mandatory App Preinstall Following Industry Pushback
The reversal comes just 48 hours after reports surfaced that Apple refused to comply with the order to preload the government’s Sanchar Saathi app. The post India Scraps Mandatory App Preinstall Following Industry Pushback appeared first on TechRepublic. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/news-india-scraps-mandatory-app-preinstall/
-
UK government pledges to rewrite Computer Misuse Act
Campaigners celebrate as security minister Dan Jarvis commits to amending the outdated Computer Misuse Act to protect security professionals from prosecution. First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366635624/UK-government-pledges-to-rewrite-Computer-Misuse-Act
-
UK national security strategy failing to account for online world
The UK government’s national security strategy is falling short on online matters, according to the independent reviewer of terrorism First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366635584/UK-national-security-strategy-failing-to-account-for-online-world
-
Iran-linked hackers target Israeli, Egyptian critical infrastructure through phishing campaign
Active between September 2024 and March 2025, the operation primarily targeted organizations in Israel’s technology, engineering, local government, educational and manufacturing sectors. First seen on therecord.media Jump to article: therecord.media/iran-linked-hackers-target-israel-egypt-phishing
-
Senators push to renew cyber grant program for state, local governments
Security experts and local officials say the program is vital to protecting the country. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/state-local-cybersecurity-grant-program-senators-introduce-reauthorization/806784/
-
India faces backlash over government cyber safety app mandate
Telecom Minister Jyotiraditya Scindia said Tuesday the system was optional and denied the app could be used for monitoring First seen on therecord.media Jump to article: therecord.media/india-faces-backlash-cyber-safety-app-mandate
-
India faces backlash over government cyber safety app mandate
Telecom Minister Jyotiraditya Scindia said Tuesday the system was optional and denied the app could be used for monitoring First seen on therecord.media Jump to article: therecord.media/india-faces-backlash-cyber-safety-app-mandate
-
Use of digital ID in UK achieves statutory status
A formal regime of certification and governance is now in place for digital identity services just as the UK government presses ahead with its controversial plan for a national ID scheme First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366635638/Use-of-digital-ID-in-UK-achieves-statutory-status
-
Use of digital ID in UK achieves statutory status
A formal regime of certification and governance is now in place for digital identity services just as the UK government presses ahead with its controversial plan for a national ID scheme First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366635638/Use-of-digital-ID-in-UK-achieves-statutory-status
-
Use of digital ID in UK achieves statutory status
A formal regime of certification and governance is now in place for digital identity services just as the UK government presses ahead with its controversial plan for a national ID scheme First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366635638/Use-of-digital-ID-in-UK-achieves-statutory-status
-
Iran-Linked Hackers Hits Israeli Sectors with New MuddyViper Backdoor in Targeted Attacks
Israeli entities spanning academia, engineering, local government, manufacturing, technology, transportation, and utilities sectors have emerged as the target of a new set of attacks undertaken by Iranian nation-state actors that have delivered a previously undocumented backdoor called MuddyViper.The activity has been attributed by ESET to a hacking group known as MuddyWater (aka Mango First seen…
-
India plans to verify and record every smartphone in circulation
The Indian government has ordered smartphone makers to preinstall its Sanchar Saathi app on all devices, a move that is raising fresh privacy concerns. First seen on techcrunch.com Jump to article: techcrunch.com/2025/12/02/india-plans-to-verify-and-record-every-smartphone-in-circulation/
-
Most Companies Fear State-Sponsored Cyber-Attacks and Want More Government Help
New IO study claims 88% of US and UK firms are concerned about state-sponsored cyber-attacks First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/companies-fear-state-attacks-more/

