Tag: government
-
Government funding bill temporarily revives cybersecurity information-sharing law
The spending legislation passed by Congress will reauthorize the CISA 2015 program through the end of January. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/cisa-2015-temporary-reauthorization-spending-bill/805320/
-
Google asks US court to shut down Lighthouse phishing-as-a-service operation
Tags: control, crime, cyber, cybercrime, cybersecurity, email, google, government, incident response, law, malicious, network, phishing, risk, sans, scam, service, smishing, technology, threatWill have ‘minimal impact’: Ed Dubrovsky, chief operating officer of incident response firm Cypher, is skeptical of the effectiveness of court action. Phishing-as-a-service operations don’t have to be on American soil, he explained, so court orders and legislation will likely have minimal impact on smishing or phishing attacks.”However,” he added, “I can understand that even…
-
UK Unveils Cyber Security and Resilience Bill
Legislation Proposes More Regulations for Greater Swath of the UK Economy. The British government introduced Wednesday long-anticipated cybersecurity legislation aimed at tackling disruptive hacks targeting critical national infrastructure. Companies that run afoul of the new regulations could face daily fines that amount to 10% of their global revenue. First seen on govinfosecurity.com Jump to article:…
-
British government unveils long-awaited landmark cybersecurity bill
After years of delays, the British government introduced its landmark Cyber Security and Resilience Bill to Parliament, threatening large fines for companies that fail to protect themselves from cyberattacks. First seen on therecord.media Jump to article: therecord.media/british-gov-cybersecurity-law
-
US cyber intel sharing law set for temporary extension
The US’ CISA 2015 cyber intelligence sharing law that lapsed just over a month ago amid a wider shutdown, will receive a temporary lease of life should attempts to reopen the federal government succeed. First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366634452/US-cyber-intel-sharing-law-set-for-temporary-extension
-
What Will Defense Contracting Look Like in 10 Years?
Global defense spending will reach $6.38 trillion by 2035, growing from $2.7 trillion in 2024 at a compound annual growth rate of 8.13%, according to Spherical Insights & Consulting research. This massive expansion coincides with fundamental shifts in how the U.S. government procures defense capabilities and manages contractor relationships. Margarita Howard, CEO and owner of…
-
What Will Defense Contracting Look Like in 10 Years?
Global defense spending will reach $6.38 trillion by 2035, growing from $2.7 trillion in 2024 at a compound annual growth rate of 8.13%, according to Spherical Insights & Consulting research. This massive expansion coincides with fundamental shifts in how the U.S. government procures defense capabilities and manages contractor relationships. Margarita Howard, CEO and owner of…
-
What Will Defense Contracting Look Like in 10 Years?
Global defense spending will reach $6.38 trillion by 2035, growing from $2.7 trillion in 2024 at a compound annual growth rate of 8.13%, according to Spherical Insights & Consulting research. This massive expansion coincides with fundamental shifts in how the U.S. government procures defense capabilities and manages contractor relationships. Margarita Howard, CEO and owner of…
-
US Congress Moves to Revive CISA 2015 After Shutdown
Lawmakers Include Extension of Cyberthreat Sharing Law in Shutdown Resolution. A statute underpinning corporate cybersecurity information sharing may come back into effect along with funding to reopen the U.S. federal government after six weeks of being shutdown. The Cybersecurity Information Sharing Act of 2015 expired the same day Washington shut down on Oct. 1. First…
-
WinRAR Vulnerability Exploited by APT08 to Target Government Agencies
The notorious APT-C-08 hacking group, also known as BITTER, has been observed weaponizing a critical WinRAR directory traversal vulnerability (CVE-2025-6218) to launch sophisticated attacks against government organizations across South Asia. This development marks a concerning evolution in the threat actor’s capabilities, as the group leverages this easily exploitable flaw to infiltrate sensitive systems and steal classified…
-
WinRAR Vulnerability Exploited by APT08 to Target Government Agencies
The notorious APT-C-08 hacking group, also known as BITTER, has been observed weaponizing a critical WinRAR directory traversal vulnerability (CVE-2025-6218) to launch sophisticated attacks against government organizations across South Asia. This development marks a concerning evolution in the threat actor’s capabilities, as the group leverages this easily exploitable flaw to infiltrate sensitive systems and steal classified…
-
FireTail Raises $5M to Accelerate API Security, Led by Paladin Capital Group FireTail Blog
Nov 11, 2025 – James Fulton – McLean, Va. Dec. 14, 2022, FireTail Inc, a disruptor in API security, announced today it has closed $5 million in early stage financing led by Paladin Capital Group, with participation from Zscaler, General Advance, Secure Octane, and a cadre of high-profile cyber security executives including SentinelOne VP of…
-
Senate moves to restore lapsed cybersecurity laws after shutdown
Tags: cisa, cyber, cyberattack, cybersecurity, data, defense, detection, government, infrastructure, intelligence, jobs, law, monitoring, network, service, threatWhat the lapse meant for enterprises: The expiration of CISA 2015 eliminated legal protections for sharing threat information, disrupting the real-time intelligence exchanges that had become routine over the past decade. Without its statutory shields, organizations faced potential liability for monitoring networks, sharing defensive measures, and coordinating responses with peers and federal agencies.The law had…
-
Senate moves to restore lapsed cybersecurity laws after shutdown
Tags: cisa, cyber, cyberattack, cybersecurity, data, defense, detection, government, infrastructure, intelligence, jobs, law, monitoring, network, service, threatWhat the lapse meant for enterprises: The expiration of CISA 2015 eliminated legal protections for sharing threat information, disrupting the real-time intelligence exchanges that had become routine over the past decade. Without its statutory shields, organizations faced potential liability for monitoring networks, sharing defensive measures, and coordinating responses with peers and federal agencies.The law had…
-
Öffentliche Verwaltung im Visier von Cyberspionen
Tags: access, alphv, bsi, cyberattack, cybercrime, encryption, germany, governance, government, infrastructure, lockbit, microsoft, open-source, phishing, qr, service, vulnerabilityLaut BSI haben es Cyberspione aktuell besonders auf die öffentliche Verwaltung abgesehen.Cyberspione haben es in Deutschland derzeit besonders auf die öffentliche Verwaltung abgesehen. Das geht aus dem aktuellen Lagebericht des Bundesamtes für Sicherheit in der Informationstechnik (BSI) hervor. Eine nennenswerte Anzahl von Geschädigten gab es demnach auch in den Sektoren Verteidigung, Rechtspflege, öffentliche Sicherheit und…
-
Threat Report: xHunt Targets Microsoft Exchange and IIS with Custom Backdoors
The xHunt advanced persistent threat group continues to pose a significant cybersecurity risk through sophisticated attacks targeting Microsoft Exchange and IIS web servers with custom-built backdoors. This highly focused cyber-espionage operation has maintained persistent, multi-year campaigns primarily aimed at organizations in Kuwait, with particular emphasis on the shipping, transportation, and government sectors. First identified in…
-
Critical federal cybersecurity funding set to resume as government shutdown draws to a close – for now
Resolution acquiesced to by 8 Dems includes CISA Act funding, layoff reversals, and could be easily undone First seen on theregister.com Jump to article: www.theregister.com/2025/11/10/federal_cybersecurity_funding_set_to_resume/
-
Critical federal cybersecurity funding set to resume as government shutdown draws to a close – for now
Resolution acquiesced to by 8 Dems includes CISA Act funding, layoff reversals, and could be easily undone First seen on theregister.com Jump to article: www.theregister.com/2025/11/10/federal_cybersecurity_funding_set_to_resume/
-
Short-term renewal of cyber information sharing law appears in bill to end shutdown
An expired 2015 law that gives companies liability protection when they share cyberthreat information with the federal government would be renewed through January 30 under Senate legislation to end the government shutdown. First seen on therecord.media Jump to article: therecord.media/cisa-2015-information-sharing-law-renewal-bill-ending-shutdown
-
Short-term renewal of cyber information sharing law appears in bill to end shutdown
An expired 2015 law that gives companies liability protection when they share cyberthreat information with the federal government would be renewed through January 30 under Senate legislation to end the government shutdown. First seen on therecord.media Jump to article: therecord.media/cisa-2015-information-sharing-law-renewal-bill-ending-shutdown
-
Why a lot of people are getting hacked with government spyware
Government surveillance vendors want us to believe their spyware products are only used in limited and targeted operations against terrorists and serious criminals. That claim is increasingly difficult to justify, given the broad range of victims, journalists, activists, and now political consultants, that have come forward. First seen on techcrunch.com Jump to article: techcrunch.com/2025/11/10/why-a-lot-of-people-are-getting-hacked-with-government-spyware/
-
Why a lot of people are getting hacked with government spyware
Government surveillance vendors want us to believe their spyware products are only used in limited and targeted operations against terrorists and serious criminals. That claim is increasingly difficult to justify, given the broad range of victims, journalists, activists, and now political consultants, that have come forward. First seen on techcrunch.com Jump to article: techcrunch.com/2025/11/10/why-a-lot-of-people-are-getting-hacked-with-government-spyware/
-
Data Leak Exposes Chinese State-Sponsored Cyber Arsenal and Target Database
Tags: breach, china, cyber, cybersecurity, data, data-breach, government, hacking, international, leak, theft, toolIn early November 2025, a massive data breach at Knownsec, a prominent Chinese cybersecurity firm with government ties, sent shockwaves through the international security community. The incident, reported on November 2, resulted in the theft of over 12,000 classified documents exposing sophisticated state-sponsored cyber weapons, internal hacking tools, and a comprehensive global target list spanning…
-
Data Leak Exposes Chinese State-Sponsored Cyber Arsenal and Target Database
Tags: breach, china, cyber, cybersecurity, data, data-breach, government, hacking, international, leak, theft, toolIn early November 2025, a massive data breach at Knownsec, a prominent Chinese cybersecurity firm with government ties, sent shockwaves through the international security community. The incident, reported on November 2, resulted in the theft of over 12,000 classified documents exposing sophisticated state-sponsored cyber weapons, internal hacking tools, and a comprehensive global target list spanning…
-
Data Leak Exposes Chinese State-Sponsored Cyber Arsenal and Target Database
Tags: breach, china, cyber, cybersecurity, data, data-breach, government, hacking, international, leak, theft, toolIn early November 2025, a massive data breach at Knownsec, a prominent Chinese cybersecurity firm with government ties, sent shockwaves through the international security community. The incident, reported on November 2, resulted in the theft of over 12,000 classified documents exposing sophisticated state-sponsored cyber weapons, internal hacking tools, and a comprehensive global target list spanning…
-
Policy Meets AI: Why Broken Rules Break Customer Service
AI can streamline how government serves residents, but automating bad processes only accelerates frustration. Here’s why fixing policies is the first step to successful AI in customer service. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/11/policy-meets-ai-why-broken-rules-break-customer-service/
-
A new Italian citizen was targeted with Paragon’s Graphite spyware. We have a serious problem
An Italian political adviser was targeted with Paragon’s Graphite spyware, becoming the fifth Italian in the ongoing government surveillance activity. Italian political adviser Francesco Nicodemo said he was targeted with Paragon’s Graphite spyware, becoming the fifth Italian in the ongoing government surveillance activity. Graphite is an invasive, non-auditable spyware that covertly accesses sensitive phone data;…
-
How FedRAMP Agencies Evaluate CSP SAR Submissions
FedRAMP is the federal government’s framework for evaluating and enforcing standardized security across the cloud service providers operating as contractors. They take security seriously, and the protection of controlled information is their top priority. A key part of validating the security of a CSP is the SAR, or Security Assessment Report. What is the SAR,……
-
How FedRAMP Agencies Evaluate CSP SAR Submissions
FedRAMP is the federal government’s framework for evaluating and enforcing standardized security across the cloud service providers operating as contractors. They take security seriously, and the protection of controlled information is their top priority. A key part of validating the security of a CSP is the SAR, or Security Assessment Report. What is the SAR,……
-
The Government Shutdown Is a Ticking Cybersecurity Time Bomb
Many critical systems are still being maintained, and the cloud provides some security cover. But experts say that any lapses in protections like patching and monitoring could expose government systems. First seen on wired.com Jump to article: www.wired.com/story/the-government-shutdown-is-a-ticking-cybersecurity-time-bomb/

