Tag: government
-
“‹”‹How Chinese Hackers Reached America’s Surveillance Infrastructure
Chinese government-linked hackers have breached a network used by the Federal Bureau of Investigation to manage court-authorized surveillance operations. The intrusion, first detected on February 17, 2026, involved systems supporting the FBI’s Digital Collection System Network (DSCNet), infrastructure used to process wiretap and foreign intelligence surveillance requests. While the breach was initially handled quietly, the……
-
Dust Specter: Iran-Linked Hackers Weaponize Iraqi Government Sites in New Cyber Espionage Campaign
The post Dust Specter: Iran-Linked Hackers Weaponize Iraqi Government Sites in New Cyber Espionage Campaign appeared first on Daily CyberSecurity. First seen on securityonline.info Jump to article: securityonline.info/dust-specter-iran-linked-hackers-weaponize-iraqi-government-sites-in-new-cyber-espionage-campaign/
-
Trump’s new cybersecurity strategy makes promises but lacks details
The administration vowed to increase the government’s use of AI for rapid cyber defense. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/white-house-trump-cybersecurity-strategy/814120/
-
5 Actions Critical for Cybersecurity Leadership During International Conflicts
Tags: attack, backup, business, cloud, corporate, cyber, cybersecurity, data, exploit, government, incident response, infrastructure, international, iran, middle-east, military, network, resilience, risk, risk-assessment, russia, saas, service, supply-chain, technology, threat, ukraine, update, vulnerability, warfareThe recent military attacks involving Iran in the Middle East are a stark reminder that cybersecurity leadership must continually incorporate geopolitical risk into their enterprise cyber risk posture and preparedness. Every crisis that elevates to military engagements between cyber-active participants, changes the risk landscape of businesses, for people, operations, and data. This includes the…
-
Anthropic and the Pentagon
OpenAI is in and Anthropic is out as a supplier of AI technology for the US defense department. This news caps a week of bluster by the highest officials in the US government towards some of the wealthiest titans of the big tech industry, and the overhanging specter of the existential risks posed by a…
-
900+ Certificates Used by Fortune 500, Governments Exposed by Key Leaks
A joint study by Google and GitGuardian reveals that over 2,600 valid TLS certificates, protecting Fortune 500 companies and government agencies, were compromised due to private key leaks on GitHub and DockerHub. First seen on hackread.com Jump to article: hackread.com/certificates-fortune-500-gov-exposed-key-leaks/
-
Cyberattack on Mexico’s Gov’t Agencies Highlight AI Threat
Using Anthropic’s Claude, OpenAI’s ChatGPT, and a detailed playbook prompt, a handful of cyberattackers reportedly gained access to government agencies and its citizens’ data. First seen on darkreading.com Jump to article: www.darkreading.com/application-security/cyberattack-mexico-government-ai-threat
-
Son of government contractor arrested after alleged $46M crypto heist from US Marshals
FBI and French GIGN swoop on Saint Martin, John Daghita in cuffs First seen on theregister.com Jump to article: www.theregister.com/2026/03/06/contractor_son_crypto_arrest/
-
Iran-nexus APT Dust Specter targets Iraq officials with new malware
A campaign by Iran-linked group Dust Specter is targeting Iraqi officials with phishing emails delivering new malware families. Zscaler ThreatLabz researchers linked the Iran-nexus group Dust Specter to a campaign targeting Iraqi government officials. Threat actors impersonated the country’s Ministry of Foreign Affairs in phishing messages that delivered previously unseen malware, including SPLITDROP, TWINTASK, TWINTALK,…
-
FBI Detains U.S. Government Contractor in Massive $46 Million Fraud Scheme
In a major law enforcement operation, authorities have arrested a U.S. government contractor accused of executing a massive cryptocurrency theft. John Daghita allegedly stole over $46 million in digital assets from the United States Marshals Service (USMS). This successful apprehension highlights the growing intersection of insider threat management, cryptocurrency tracing, and international law enforcement collaboration.…
-
Western governments lay the groundwork for secure 6G networks
Governments are preparing for 6G, the next generation of mobile networks, placing security and resilience among their top priorities. In response, seven countries … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/03/06/global-coalition-telecoms-6g-security-resilience-principles/
-
Strengthening California’s Cyber Defenses: Apply Now for FFY 2024 SLCGP Grants
Tags: access, authentication, cloud, cyber, cybersecurity, defense, email, framework, google, governance, government, identity, infrastructure, mfa, mitigation, office, resilience, risk, service, software, threat, tool, vulnerabilityCal OES offers up to $250,000 to help California’s state, local, and tribal agencies strengthen their digital infrastructure against evolving cyber threats. Organizations must submit their applications by March 13, 2026. Key takeaways Significant competitive funding: Cal OES is distributing $9.7 million for local and tribal governments and $1.8 million for state agencies, with individual…
-
Tech Giants, Washington Rally for Anthropic in Pentagon Feud
Lawmakers, Industry Warn Supply-Chain Risk Label Sets Dangerous Precedent for Tech. Major tech firms, defense leaders and lawmakers are rallying behind Anthropic as the Pentagon threatens to label the AI developer a supply-chain risk after a dispute over surveillance safeguards, raising fears the move could chill AI investment and reshape government tech contracting. First seen…
-
Defending Against Iranian Cyber Threats in the Wake of Operation Epic Fury
On February 28, 2026, the United States and Israel launched Operation Epic Fury (U.S.) and Operation Roaring Lion (Israel), a coordinated military and cyber campaign targeting Iranian military installations, IRGC leadership, and government infrastructure. U.S. Cyber Command was designated the “first mover,” with cyber operations beginning before any kinetic weapons were deployed. In the first…
-
Pakistan-Linked APT36 Floods Indian Govt Networks With AI-Made ‘Vibeware’
Bitdefender research reveals Pakistani group APT36 is using AI-generated vibeware and trusted cloud services like Google Sheets to target Indian officials. First seen on hackread.com Jump to article: hackread.com/pakistan-apt36-indian-govt-networks-ai-vibeware/
-
FBI arrests suspect linked to $46M crypto theft from US Marshals
A U.S. government contractor’s son, accused of stealing more than $46 million in cryptocurrency from the U.S. Marshals Service, was arrested Wednesday on the island of Saint Martin. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/fbi-arrests-suspect-linked-to-46m-crypto-theft-from-us-marshals/
-
Government wants to build digital ID system in-house
Tags: governmentThe Home Affairs Committee hearing on digital ID reveals consultation is due next week; there will be no central database; and while government wants to build the system in-house, it will not replace private digital ID providers First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366639706/Government-wants-to-build-digital-ID-system-in-house
-
Dust Specter Targets Iraqi Officials with New SPLITDROP and GHOSTFORM Malware
A suspected Iran-nexus threat actor has been attributed to a campaign targeting government officials in Iraq by impersonating the country’s Ministry of Foreign Affairs to deliver a set of never-before-seen malware.Zscaler ThreatLabz, which observed the activity in January 2026, is tracking the cluster under the name Dust Specter. The attacks, which manifest in the form…
-
What to Expect from Iran’s Digital Counterstrike
Tags: attack, breach, cloud, communications, cyber, cyberattack, cybersecurity, data, defense, espionage, exploit, extortion, finance, government, group, hacking, infrastructure, intelligence, international, iran, leak, middle-east, military, network, ransomware, risk, risk-assessment, service, tool, update, vulnerability, wormAfter the United States and Israel began a bombing campaign on Iran, leading to the decapitation of its political and military leaders, the Middle East has erupted into waves of kinetic warfare. But what should we expect about cyber? Iran has a formidable offensive cybersecurity capability and is considered one of the four most aggressive…
-
Stealth and Deception: Transparent Tribe’s Multi-Stage Assault on Indian Government Entities
The post Stealth and Deception: Transparent Tribe’s Multi-Stage Assault on Indian Government Entities appeared first on Daily CyberSecurity. First seen on securityonline.info Jump to article: securityonline.info/stealth-and-deception-transparent-tribes-multi-stage-assault-on-indian-government-entities/
-
Agentic AI Emerges as the Next Frontier for State Government IT
State CIOs Are Exploring How AI Agents Can Boost Productivity, Efficiency. Reputation aside, most pen pushers in state governments don’t actually like pushing paper. They also don’t care to force citizens to fill out forms in triplicate. Two decades of promises to minimize those chores may be on the cusp of gloriously coming true with…
-
Iranian cyberattacks fail to materialize but threat remains acute
Tags: ai, application-security, attack, ceo, control, country, cyber, cyberattack, cybercrime, cybersecurity, defense, endpoint, finance, government, group, healthcare, infrastructure, intelligence, Internet, iran, malware, mfa, monitoring, phishing, risk, service, supply-chain, technology, threat, tool, update, vpnTargeting and response: According to Adrian Cheek, a senior cybercrime researcher at Canadian threat intelligence company Flare, the most at-risk sectors are critical infrastructure, including the defense and government supply chain, financial services, energy, and healthcare.”Water, energy, and healthcare sectors are currently the most exposed. These sectors combine high targeting priority with weak baseline security,…
-
Chinesische Cyberspionage-Gruppe Silver-Dragon hat Behörden in Europa und Asien im Visier
Die Sicherheitsforensiker von Check Point Research (CPR) haben eine Cyberspionage-kampagne identifiziert, die sich gegen Regierungs-organisationen in Südostasien und Teilen Europas richtet. CPR nennt die Gruppe ‘Silver Dragon>> und nach Einschätzung der Sicherheitsexperten ist sie seit mindestens Mitte 2024 aktiv. Die Kampagne kombiniert Server-Exploits, Phishing, maßgeschneiderte Malware und eine cloudbasierte Befehlsinfrastruktur, um langfristigen Zugriff auf die…
-
From phishing to Google Drive C2: Silver Dragon expands APT41 playbook
APT group Silver Dragon, linked to APT41, targets governments via server exploits and phishing, using Cobalt Strike and Google Drive for C2. Check Point researchers have identified Silver Dragon, an APT group tied to the China-linked group APT41, targeting government entities in Europe and Southeast Asia since mid-2024. The group gains initial access by exploiting…
-
Iran”‘Linked “Dust Specter” APT Deploys AI”‘Aided Malware Against Iraqi Officials
Iran”‘nexus APT group “Dust Specter” is targeting Iraqi government officials with AI”‘assisted custom .NET malware, using dual attack chains that blend DLL sideloading, in”‘memory PowerShell, and ClickFix”‘style lures. In January 2026, Zscaler ThreatLabz tracked a new campaign against Iraqi officials in which the actor impersonated Iraq’s Ministry of Foreign Affairs and abused compromised government infrastructure…
-
China’s Silver Dragon Razes Governments in EU, SE Asia
The emerging actor, part of the APT41 nexus, gains initial access via phishing, and uses legitimate network services to obscure cyberespionage activities. First seen on darkreading.com Jump to article: www.darkreading.com/threat-intelligence/china-silver-dragon-governments-eu-se-asia
-
Die Linke fordert mehr Transparenz – Regierung hat intern noch Redebedarf zu Cyberpakt mit Israel
First seen on security-insider.de Jump to article: www.security-insider.de/cypberpakt-israel-cyberdome-details-gesetzentwurf-cyberabwehr-a-dd0ca5d7b29115729c9db57140b0fcec/
-
Exploit-Kit Coruna: iPhone-Nutzer mit bis zu 23 iOS-Exploits attackiert
Russische und chinesische Hacker sind offenbar an alte iOS-Exploits der US-Regierung gelangt und greifen damit massenhaft iPhone-Nutzer an. First seen on golem.de Jump to article: www.golem.de/news/exploit-kit-coruna-massig-iphone-nutzer-mit-bis-zu-23-ios-exploits-attackiert-2603-206074.html
-
Exploit-Kit Coruna: Massig iPhone-Nutzer mit bis zu 23 iOS-Exploits attackiert
Russische und chinesische Hacker sind offenbar an alte iOS-Exploits der US-Regierung gelangt und greifen damit massenhaft iPhone-Nutzer an. First seen on golem.de Jump to article: www.golem.de/news/exploit-kit-coruna-massig-iphone-nutzer-mit-bis-zu-23-ios-exploits-attackiert-2603-206074.html

