Tag: government
-
Short-term renewal of cyber information sharing law appears in bill to end shutdown
An expired 2015 law that gives companies liability protection when they share cyberthreat information with the federal government would be renewed through January 30 under Senate legislation to end the government shutdown. First seen on therecord.media Jump to article: therecord.media/cisa-2015-information-sharing-law-renewal-bill-ending-shutdown
-
Short-term renewal of cyber information sharing law appears in bill to end shutdown
An expired 2015 law that gives companies liability protection when they share cyberthreat information with the federal government would be renewed through January 30 under Senate legislation to end the government shutdown. First seen on therecord.media Jump to article: therecord.media/cisa-2015-information-sharing-law-renewal-bill-ending-shutdown
-
Why a lot of people are getting hacked with government spyware
Government surveillance vendors want us to believe their spyware products are only used in limited and targeted operations against terrorists and serious criminals. That claim is increasingly difficult to justify, given the broad range of victims, journalists, activists, and now political consultants, that have come forward. First seen on techcrunch.com Jump to article: techcrunch.com/2025/11/10/why-a-lot-of-people-are-getting-hacked-with-government-spyware/
-
Why a lot of people are getting hacked with government spyware
Government surveillance vendors want us to believe their spyware products are only used in limited and targeted operations against terrorists and serious criminals. That claim is increasingly difficult to justify, given the broad range of victims, journalists, activists, and now political consultants, that have come forward. First seen on techcrunch.com Jump to article: techcrunch.com/2025/11/10/why-a-lot-of-people-are-getting-hacked-with-government-spyware/
-
Data Leak Exposes Chinese State-Sponsored Cyber Arsenal and Target Database
Tags: breach, china, cyber, cybersecurity, data, data-breach, government, hacking, international, leak, theft, toolIn early November 2025, a massive data breach at Knownsec, a prominent Chinese cybersecurity firm with government ties, sent shockwaves through the international security community. The incident, reported on November 2, resulted in the theft of over 12,000 classified documents exposing sophisticated state-sponsored cyber weapons, internal hacking tools, and a comprehensive global target list spanning…
-
Data Leak Exposes Chinese State-Sponsored Cyber Arsenal and Target Database
Tags: breach, china, cyber, cybersecurity, data, data-breach, government, hacking, international, leak, theft, toolIn early November 2025, a massive data breach at Knownsec, a prominent Chinese cybersecurity firm with government ties, sent shockwaves through the international security community. The incident, reported on November 2, resulted in the theft of over 12,000 classified documents exposing sophisticated state-sponsored cyber weapons, internal hacking tools, and a comprehensive global target list spanning…
-
Data Leak Exposes Chinese State-Sponsored Cyber Arsenal and Target Database
Tags: breach, china, cyber, cybersecurity, data, data-breach, government, hacking, international, leak, theft, toolIn early November 2025, a massive data breach at Knownsec, a prominent Chinese cybersecurity firm with government ties, sent shockwaves through the international security community. The incident, reported on November 2, resulted in the theft of over 12,000 classified documents exposing sophisticated state-sponsored cyber weapons, internal hacking tools, and a comprehensive global target list spanning…
-
Policy Meets AI: Why Broken Rules Break Customer Service
AI can streamline how government serves residents, but automating bad processes only accelerates frustration. Here’s why fixing policies is the first step to successful AI in customer service. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/11/policy-meets-ai-why-broken-rules-break-customer-service/
-
A new Italian citizen was targeted with Paragon’s Graphite spyware. We have a serious problem
An Italian political adviser was targeted with Paragon’s Graphite spyware, becoming the fifth Italian in the ongoing government surveillance activity. Italian political adviser Francesco Nicodemo said he was targeted with Paragon’s Graphite spyware, becoming the fifth Italian in the ongoing government surveillance activity. Graphite is an invasive, non-auditable spyware that covertly accesses sensitive phone data;…
-
How FedRAMP Agencies Evaluate CSP SAR Submissions
FedRAMP is the federal government’s framework for evaluating and enforcing standardized security across the cloud service providers operating as contractors. They take security seriously, and the protection of controlled information is their top priority. A key part of validating the security of a CSP is the SAR, or Security Assessment Report. What is the SAR,……
-
How FedRAMP Agencies Evaluate CSP SAR Submissions
FedRAMP is the federal government’s framework for evaluating and enforcing standardized security across the cloud service providers operating as contractors. They take security seriously, and the protection of controlled information is their top priority. A key part of validating the security of a CSP is the SAR, or Security Assessment Report. What is the SAR,……
-
The Government Shutdown Is a Ticking Cybersecurity Time Bomb
Many critical systems are still being maintained, and the cloud provides some security cover. But experts say that any lapses in protections like patching and monitoring could expose government systems. First seen on wired.com Jump to article: www.wired.com/story/the-government-shutdown-is-a-ticking-cybersecurity-time-bomb/
-
Congressional Budget Office Hit by Cyberattack During Shutdown
The CBO breach exposes how the government shutdown is weakening federal cybersecurity defenses when they’re needed most. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/threats/congressional-budget-office-hit-by-cyberattack-during-shutdown/
-
Congressional Budget Office Hit by Cyberattack During Shutdown
The CBO breach exposes how the government shutdown is weakening federal cybersecurity defenses when they’re needed most. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/threats/congressional-budget-office-hit-by-cyberattack-during-shutdown/
-
Report: Government data mining has gone too far and AI will make it worse
A digital privacy group says agencies are collecting too much data on Americans and using AI tools to make connections that may not be valid. First seen on cyberscoop.com Jump to article: cyberscoop.com/government-data-mining-has-gone-too-far-ai-will-make-it-worse/
-
Report: Government data mining has gone too far and AI will make it worse
A digital privacy group says agencies are collecting too much data on Americans and using AI tools to make connections that may not be valid. First seen on cyberscoop.com Jump to article: cyberscoop.com/government-data-mining-has-gone-too-far-ai-will-make-it-worse/
-
ISMG Editors: Lawsuits Follow Year’s Top Health Data Breach
Conduent Gets Sued; US Government’s Cyber Shutdown Woes; Hacktivist Hits Rise. The latest ISMG Editors’ Panel tackles: post-hack legal fallout for Conduent after it suffered the year’s biggest health data breach, the U.S. government’s shutdown complicating its response to the breach of vendor F5 and the rise in attacks targeting Western critical national infrastructure. First…
-
From Log4j to IIS, China’s Hackers Turn Legacy Bugs into Global Espionage Tools
A China-linked threat actor has been attributed to a cyber attack targeting an U.S. non-profit organization with an aim to establish long-term persistence, as part of broader activity aimed at U.S. entities that are linked to or involved in policy issues.The organization, according to a report from Broadcom’s Symantec and Carbon Black teams, is “active…
-
Industry calls for clarity on government digital ID plans
The digital identity industry asks UK government for transparency on its digital identity scheme and proposes a formal collaboration agreement First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366634197/Industry-calls-for-clarity-on-government-digital-ID-plans
-
Industry calls for clarity on government digital ID plans
The digital identity industry asks UK government for transparency on its digital identity scheme and proposes a formal collaboration agreement First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366634197/Industry-calls-for-clarity-on-government-digital-ID-plans
-
Industry calls for clarity on government digital ID plans
The digital identity industry asks UK government for transparency on its digital identity scheme and proposes a formal collaboration agreement First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366634197/Industry-calls-for-clarity-on-government-digital-ID-plans
-
Digital health can’t scale if cybersecurity falls behind
Tags: access, ai, attack, breach, cloud, compliance, control, cyber, cyberattack, cybersecurity, data, detection, encryption, endpoint, exploit, framework, GDPR, governance, government, healthcare, HIPAA, identity, infection, intelligence, malicious, network, nist, phishing, privacy, ransomware, regulation, resilience, risk, risk-management, strategy, technology, threat, training, virus, vulnerability, zero-trustThe unique vulnerabilities of AI systems: Traditional security frameworks are not enough for AI. Attacks on algorithms take subtler forms. I often explain to my clients that when you corrupt data, you corrupt intelligence. Data poisoning occurs when malicious data is inserted into the training process, teaching the AI to make wrong decisions later. Imagine…
-
Digital health can’t scale if cybersecurity falls behind
Tags: access, ai, attack, breach, cloud, compliance, control, cyber, cyberattack, cybersecurity, data, detection, encryption, endpoint, exploit, framework, GDPR, governance, government, healthcare, HIPAA, identity, infection, intelligence, malicious, network, nist, phishing, privacy, ransomware, regulation, resilience, risk, risk-management, strategy, technology, threat, training, virus, vulnerability, zero-trustThe unique vulnerabilities of AI systems: Traditional security frameworks are not enough for AI. Attacks on algorithms take subtler forms. I often explain to my clients that when you corrupt data, you corrupt intelligence. Data poisoning occurs when malicious data is inserted into the training process, teaching the AI to make wrong decisions later. Imagine…
-
Digital health can’t scale if cybersecurity falls behind
Tags: access, ai, attack, breach, cloud, compliance, control, cyber, cyberattack, cybersecurity, data, detection, encryption, endpoint, exploit, framework, GDPR, governance, government, healthcare, HIPAA, identity, infection, intelligence, malicious, network, nist, phishing, privacy, ransomware, regulation, resilience, risk, risk-management, strategy, technology, threat, training, virus, vulnerability, zero-trustThe unique vulnerabilities of AI systems: Traditional security frameworks are not enough for AI. Attacks on algorithms take subtler forms. I often explain to my clients that when you corrupt data, you corrupt intelligence. Data poisoning occurs when malicious data is inserted into the training process, teaching the AI to make wrong decisions later. Imagine…

