Tag: government
-
10 promising cybersecurity startups CISOs should know about
Tags: access, ai, attack, automation, business, ceo, ciso, cloud, compliance, container, control, cybersecurity, data, deep-fake, defense, detection, endpoint, exploit, finance, gartner, google, governance, government, grc, ibm, identity, linux, malicious, microsoft, military, monitoring, network, open-source, ransomware, RedTeam, risk, saas, software, startup, supply-chain, technology, threat, tool, vulnerability, vulnerability-management, zero-trust2. Chainguard: Category: Software supply chain securityWhy they’re here: Founded in 2021 by Dan Lorenc (formerly at Microsoft and Google), Chainguard offers a Linux-based platform for securely building applications. The company has raised more than $600M and is valued at $3.5B. In fiscal year 2025, Chainguard reached a $40M annual run rate and by the…
-
Silent Lynx APT New Attack Targeting Governmental Employees Posing as Officials
Seqrite Labs’ APT Team has documented fresh campaigns from Silent Lynx, a sophisticated threat actor group known for orchestrating spear-phishing operations that impersonate government officials to target diplomatic and governmental employees across Central Asia. The group, also tracked under aliases including YoroTrooper, Sturgeon Phisher, and Cavalry Werewolf, continues its espionage-focused activities with minimal operational security…
-
‘It’s Been a Mess’: Shutdown Slows Federal F5 Hack Response
Officials Say Major Staffing Cuts and Furloughs Undercut Response to F5 Cyberattack. Current and former federal officials tell Information Security Media Group furloughs and leadership gaps across the federal cyber ecosystem have hindered the U.S. government’s ability to coordinate response efforts after a nation-state actor exploited flaws in F5’s BIG-IP systems amid the shutdown. First…
-
North Korean companies, people sanctioned for money laundering from cybercrime, IT worker schemes
The Treasury Department on Tuesday sanctioned eight people and two companies it accused of laundering money obtained from cybercrime and IT worker schemes to fund North Korean government objectives. According to the department, over the last three years North Korea-linked cybercriminals have stolen over $3 billion, mostly in cryptocurrency. In addition, it said, North Korean…
-
North Korean companies, people sanctioned for money laundering from cybercrime, IT worker schemes
The Treasury Department on Tuesday sanctioned eight people and two companies it accused of laundering money obtained from cybercrime and IT worker schemes to fund North Korean government objectives. According to the department, over the last three years North Korea-linked cybercriminals have stolen over $3 billion, mostly in cryptocurrency. In addition, it said, North Korean…
-
Treasury sanctions 8 for laundering North Korea earnings from cybercrime, IT worker scheme
An IT company, a financial institution and eight men accused of aiding cybercrime and IT worker scams are now on the U.S. government’s list of sanctioned North Korean entities. First seen on therecord.media Jump to article: therecord.media/north-korea-us-sanctions-it-worker-scams-cybercrime
-
Consumer Financial Protection Bureau’s security falls apart amid layoffs
Security program fails to meet federal standards as government cuts drain resources First seen on theregister.com Jump to article: www.theregister.com/2025/11/04/us_cfpb_infosec_posture_crumbles/
-
UAE Sovereign Launchpad begins nationwide roll-out with support from e& and AWS
The cloud infrastructure platform aims to strengthen digital resilience and regulatory compliance across government and regulated sectors in the United Arab Emirates First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366634100/UAE-Sovereign-Launchpad-begins-nationwide-roll-out
-
China-Linked Hackers Target Cisco Firewalls in Global Campaign
New reports show China-based hackers are targeting US federal, state, and global government networks via unpatched Cisco firewalls. Get the full details and necessary steps to secure devices. First seen on hackread.com Jump to article: hackread.com/china-hackers-target-cisco-firewalls/
-
China-Linked Hackers Target Cisco Firewalls in Global Campaign
New reports show China-based hackers are targeting US federal, state, and global government networks via unpatched Cisco firewalls. Get the full details and necessary steps to secure devices. First seen on hackread.com Jump to article: hackread.com/china-hackers-target-cisco-firewalls/
-
Government Approach to Disrupt Cyber Scams is ‘Fragmented’
Users contend with cybersecurity scams throughout their day; a new Cyber Civic Engagement program wants to provide them with the skills to fight back. First seen on darkreading.com Jump to article: www.darkreading.com/cyber-risk/government-approach-to-disrupt-cyber-scams-is-fragmented-
-
Hacktivists increasingly target industrial control systems, Canada Cyber Centre warns
Tags: authentication, control, cyber, cybersecurity, data, data-breach, government, hacker, infrastructure, Internet, leak, mfa, military, service, technology, vpn, vulnerabilityHacked fuel tank gauges can lead to dangerous situations: In another incident reported by the Canadian Centre for Cyber Security, attackers accessed an internet-exposed automated tank gauge (ATG) belonging to a Canadian oil and gas company and manipulated its values, triggering false alarms.ATGs are used to monitor fuel level, pressure, and temperature inside fuel tanks.…
-
Hacktivists increasingly target industrial control systems, Canada Cyber Centre warns
Tags: authentication, control, cyber, cybersecurity, data, data-breach, government, hacker, infrastructure, Internet, leak, mfa, military, service, technology, vpn, vulnerabilityHacked fuel tank gauges can lead to dangerous situations: In another incident reported by the Canadian Centre for Cyber Security, attackers accessed an internet-exposed automated tank gauge (ATG) belonging to a Canadian oil and gas company and manipulated its values, triggering false alarms.ATGs are used to monitor fuel level, pressure, and temperature inside fuel tanks.…
-
Security Affairs newsletter Round 548 by Pierluigi Paganini INTERNATIONAL EDITION
A new round of the weekly Security Affairs newsletter has arrived! Every week, the best security articles from Security Affairs are free in your email box. Enjoy a new round of the weekly SecurityAffairs newsletter, including the international press. BadCandy Webshell threatens unpatched Cisco IOS XE devices, warns Australian government China-linked UNC6384 exploits Windows zero-day…
-
Security Affairs newsletter Round 548 by Pierluigi Paganini INTERNATIONAL EDITION
A new round of the weekly Security Affairs newsletter has arrived! Every week, the best security articles from Security Affairs are free in your email box. Enjoy a new round of the weekly SecurityAffairs newsletter, including the international press. BadCandy Webshell threatens unpatched Cisco IOS XE devices, warns Australian government China-linked UNC6384 exploits Windows zero-day…
-
A Walk in the Park
In August of 2024 I stopped in my local book shop (shoutout to The Raven Bookstore) as I often do to browse the shelves and see if there was anything I couldn’t live without. A very colorful book jacket caught my eye. It was Kevin Fedarko’s A Walk in the Park: The True Story of…
-
BadCandy Webshell threatens unpatched Cisco IOS XE devices, warns Australian government
Australia warns of attacks on unpatched Cisco IOS XE devices exploiting CVE-2023-20198, allowing BadCandy webshell install. The Australian Signals Directorate (ASD) warns of ongoing attacks on unpatched Cisco IOS XE devices exploiting CVE-2023-20198, allowing BadCandy webshell infections and admin takeover. >>Cyber actors are installing an implant dubbed ‘BADCANDY’ on Cisco IOS XE devices that are vulnerable…
-
Russia Arrests Meduza Stealer Developers After Government Hack
Russia arrests developers of the notorious Meduza Stealer MaaS operation. Learn how the group’s ‘fatal error’ led to the crackdown on domestic cybercrime. First seen on hackread.com Jump to article: hackread.com/russia-arrests-meduza-stealer-developers/
-
European governments opt for open source alternatives to Big Tech encrypted communications
European governments are rolling out decentralised secure messaging and collaboration services as they seek to reduce their reliance on Big Tech companies First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366633894/European-governments-opt-for-open-source-alternatives-to-Big-Tech-encrypted-communications
-
Chinese hackers scanning, exploiting Cisco ASA firewalls used by governments worldwide
In a report shared with Recorded Future News, Unit 42 attributed the targeting of Cisco ASA devices to Storm-1849, a China-based threat group that Cisco previously said has been attacking the tools since 2024. First seen on therecord.media Jump to article: therecord.media/chinese-hackers-scan-exploit-firewalls-government
-
Russian Police Bust Suspected Meduza Infostealer Developers
3 ‘Young IT Specialists’ Arrested After Malware Tied to Government Agency Infection. Russian police have arrested three young IT specialists in Moscow, charging them with developing and selling the notorious Meduza information-stealing malware, and members of their group using the infostealer to breach a Russian government institution in May and exfiltrate data. First seen on…
-
Chinese hackers scanning, exploiting Cisco ASA firewalls used by governments worldwide
In a report shared with Recorded Future News, Unit 42 attributed the targeting of Cisco ASA devices to Storm-1849, a China-based threat group that Cisco previously said has been attacking the tools since 2024. First seen on therecord.media Jump to article: therecord.media/chinese-hackers-scan-exploit-firewalls-government
-
Will AI Strengthen or Undermine Democracy?
Listen to the Audio on NextBigIdeaClub.com Below, co-authors Bruce Schneier and Nathan E. Sanders share five key insights from their new book, Rewiring Democracy: How AI Will Transform Our Politics, Government, and Citizenship. What’s the big idea? AI can be used both for and against the public interest within democracies. It is already being used…
-
Government hackers breached telecom giant Ribbon for months before getting caught
Ribbon, which provides software and technology to phone and internet giants, said nation-state hackers were in its systems since at least December 2024. First seen on techcrunch.com Jump to article: techcrunch.com/2025/10/31/government-hackers-breached-telecom-giant-ribbon-for-months-before-getting-caught/
-
Australia warns of BadCandy infections on unpatched Cisco devices
The Australian government is warning about ongoing cyberattacks against unpatched Cisco IOS XE devices in the country to infect routers with the BadCandy webshell. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/australia-warns-of-badcandy-infections-on-unpatched-cisco-devices/
-
FCC Chair Carr Looks to Eliminate Telecom Cybersecurity Ruling
FCC Chair Brendan Carr said the agency will look to eliminate a declaratory ruling made by his predecessor that aimed to give the government more power to force carriers to strengthen the security of their networks in the wake of the widespread hacks by China nation-state threat group Salt Typhoon last year. First seen on…

