Tag: government
-
UK Foreign Office Cyber Breach Exposed Diplomatic Secrets
The government stopped short of directly attributing the attack to Chinese operatives or the Chinese state. The post UK Foreign Office Cyber Breach Exposed Diplomatic Secrets appeared first on TechRepublic. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/news-uk-foreign-office-cyber-breach/
-
UK confirms Foreign Office hacked, says ‘low risk’ of impact to individuals
The British government confirmed on Friday that data held on a Foreign Office system was compromised in a cyber incident this fall that media outlets have attributed to a China-based hacking group. First seen on therecord.media Jump to article: therecord.media/uk-foreign-office-hacked-china
-
Hacks, thefts and disruption: The worst data breaches of 2025
TechCrunch looks back at the biggest data breaches, disruptive cyberattacks, and damaging hacks of 2025, from the raiding of U.S. government databases to a hack every month in South Korea. First seen on techcrunch.com Jump to article: techcrunch.com/2025/12/19/hacks-thefts-and-disruption-the-worst-data-breaches-of-2025/
-
UK government confirms Foreign Office cyber attack
Reports blame Chinese hacking group but minister insists the source of the attack is unclear First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366636539/UK-government-confirms-Foreign-Office-cyber-attack
-
UK Foreign Office victim of cyber-attack in October, says Chris Bryant
Minister says ‘any individual’ at low risk from hack, while Sun reports Chinese cyber gang responsible for breach The UK’s Foreign, Commonwealth and Development Office was hacked in October, the minister Chris Bryant has said.Bryant, a trade minister in Keir Starmer’s government, told Sky News there was a low risk to “any individual” from the…
-
UK Foreign Office victim of cyber-attack in October, says Chris Bryant
Minister says ‘any individual’ at low risk from hack, while Sun reports Chinese cyber gang responsible for breach The UK’s Foreign, Commonwealth and Development Office was hacked in October, the minister Chris Bryant has said.Bryant, a trade minister in Keir Starmer’s government, told Sky News there was a low risk to “any individual” from the…
-
RegScale Open Sources OSCAL Hub to Further Compliance-as-Code Adoption
RegScale this week added an open source hub through which organizations can collect and organize compliance data based on the Open Security Controls Assessment Language (OSCAL) framework. Announced at the OSCAL Plugfest conference, the OSCAL Hub provides a central repository that makes it simpler for more organizations and government agencies to embrace a framework that..…
-
New China-linked hacker group spies on governments in Southeast Asia, Japan
The group, LongNosedGoblin, has been active since at least September 2023 and was uncovered after researchers detected new malware strains inside the network of a Southeast Asian government last year. First seen on therecord.media Jump to article: therecord.media/china-linked-hacker-group-spied-on-asian-govs
-
New China-linked hacker group spies on governments in Southeast Asia, Japan
The group, LongNosedGoblin, has been active since at least September 2023 and was uncovered after researchers detected new malware strains inside the network of a Southeast Asian government last year. First seen on therecord.media Jump to article: therecord.media/china-linked-hacker-group-spied-on-asian-govs
-
APT35 Leak Reveals Spreadsheets Containing Domains, Payments, and Server Information
Iranian cyber unit Charming Kitten, officially designated APT35, has long been dismissed as a noisy but relatively unsophisticated threat actor a politically motivated collective known for recycled phishing templates and credential-harvesting pages. Episode 4, the latest intelligence dump, fundamentally rewrites that assessment. What emerges is not a hacker collective but a government department, complete with…
-
ICE Seeks Cyber Upgrade to Better Surveil and Investigate Its Employees
The agency plans to renew a sweeping cybersecurity contract that includes expanded employee monitoring as the government escalates leak investigations and casts internal dissent as a threat. First seen on wired.com Jump to article: www.wired.com/story/ice-seeks-cyber-upgrade-to-better-surveil-and-investigate-its-employees/
-
Denmark says Russia was behind two ‘destructive and disruptive’ cyber-attacks
Intelligence service says attacks were work of groups connected to Russian state in ‘clear evidence’ of hybrid warThe Danish government has accused Russia of being behind two “destructive and disruptive” cyber-attacks in what it describes as “very clear evidence” of a hybrid war.The Danish Defence Intelligence Service (DDIS) announced on Thursday that Moscow was behind…
-
Senate Intel chair urges national cyber director to safeguard against open-source software threats
Tom Cotton, R-Okla., cited Chinese and Russian involvement in open-source tech and the risks to government and defense systems. First seen on cyberscoop.com Jump to article: cyberscoop.com/tom-cotton-open-source-software-foreign-influence-national-cyber-director/
-
Senate Intel chair urges national cyber director to safeguard against open-source software threats
Tom Cotton, R-Okla., cited Chinese and Russian involvement in open-source tech and the risks to government and defense systems. First seen on cyberscoop.com Jump to article: cyberscoop.com/tom-cotton-open-source-software-foreign-influence-national-cyber-director/
-
The Biggest Cyber Stories of the Year: What 2025 Taught Us
Tags: access, attack, authentication, awareness, banking, breach, business, ciso, cloud, compliance, container, control, cyber, cyberattack, cybersecurity, data, data-breach, email, encryption, endpoint, exploit, government, healthcare, iam, identity, incident, incident response, Internet, law, metric, mfa, monitoring, network, privacy, regulation, resilience, risk, service, software, strategy, supply-chain, technology, threat, tool, vulnerability, vulnerability-management, zero-day, zero-trustThe Biggest Cyber Stories of the Year: What 2025 Taught Us madhav Thu, 12/18/2025 – 10:30 2025 didn’t just test cybersecurity; it redefined it. From supply chains and healthcare networks to manufacturing floors and data centers, the digital world was reminded of a simple truth: everything is connected, and everything is at risk. Data Security…
-
Group Policy abuse reveals China-aligned espionage group targeting governments
ESET Research has identified a previously undocumented China-aligned advanced persistent threat group that uses Windows Group Policy to deploy malware and move through victim … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/12/18/eset-china-aligned-apt-group-policy/
-
AI safeguards improving, says UK government-backed body
Inaugural AI Security Institute report claims that safeguards in place to ensure AI models behave as intended seem to be improving First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366636655/AI-safeguards-improving-says-UK-government-backed-body
-
Group Policy abuse reveals China-aligned espionage group targeting governments
ESET Research has identified a previously undocumented China-aligned advanced persistent threat group that uses Windows Group Policy to deploy malware and move through victim … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/12/18/eset-china-aligned-apt-group-policy/
-
Group Policy abuse reveals China-aligned espionage group targeting governments
ESET Research has identified a previously undocumented China-aligned advanced persistent threat group that uses Windows Group Policy to deploy malware and move through victim … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/12/18/eset-china-aligned-apt-group-policy/
-
AI safeguards improving, says UK government-backed body
Inaugural AI Security Institute report claims that safeguards in place to ensure AI models behave as intended seem to be improving First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366636655/AI-safeguards-improving-says-UK-government-backed-body
-
AI safeguards improving, says UK government-backed body
Inaugural AI Security Institute report claims that safeguards in place to ensure AI models behave as intended seem to be improving First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366636655/AI-safeguards-improving-says-UK-government-backed-body
-
Chinese Ink Dragon Breaches European Government Networks, Affecting Asia and South America
Ink Dragon, a Chinese espionage group, has significantly expanded its operational reach from Southeast Asia and South America into European government networks, according to ongoing research by Check Point Research. The threat actor employs a methodical approach that combines strategic server compromises with sophisticated relay infrastructure to maintain persistent access and support global operations. The…
-
‘Ink Dragon’ threat group targets IIS servers to build stealthy global network
Tags: access, attack, china, control, credentials, data, exploit, firewall, government, group, infrastructure, intelligence, microsoft, network, office, threat, vulnerability, wafmodus operandi to several other Chinese threat groups engaged in nation-state surveillance, such as UNC6384, whose campaigns targeted European diplomats.However, during a recent investigation at the office of a European government, Check Point said it had discovered that the group has now pivoted towards what it called “an unusually sophisticated playbook” with longer term goals.Key…
-
Ink Dragon’s Global Mesh: How Chinese Spies Turn Compromised Government Servers into C2 Relay Nodes
The post Ink Dragon’s Global Mesh: How Chinese Spies Turn Compromised Government Servers into C2 Relay Nodes appeared first on Daily CyberSecurity. First seen on securityonline.info Jump to article: securityonline.info/ink-dragons-global-mesh-how-chinese-spies-turn-compromised-government-servers-into-c2-relay-nodes/
-
Complying with the Monetary Authority of Singapore’s Cloud Advisory: How Tenable Can Help
Tags: access, advisory, attack, authentication, best-practice, business, cloud, compliance, container, control, country, credentials, cyber, cybersecurity, data, data-breach, finance, fintech, framework, google, governance, government, iam, identity, incident response, infrastructure, intelligence, Internet, kubernetes, least-privilege, malicious, malware, mfa, microsoft, mitigation, monitoring, oracle, regulation, resilience, risk, risk-assessment, risk-management, service, software, strategy, technology, threat, tool, vulnerability, vulnerability-management, zero-trustThe Monetary Authority of Singapore’s cloud advisory, part of its 2021 Technology Risk Management Guidelines, advises financial institutions to move beyond siloed monitoring to adopt a continuous, enterprise-wide approach. These firms must undergo annual audits. Here’s how Tenable can help. Key takeaways: High-stakes compliance: The MAS requires all financial institutions in Singapore to meet mandatory…
-
Chinese Hackers Hijack European Networks for Espionage
Ink Dragon Compromised IIS Networks to Relay ShadowPad Malware. A Chinese hacking group is using compromised European government networks as relay nodes to route commands and support other hacking operations. Security firm Check Point attributed the campaign to a Chinese espionage group it tracks as Ink Dragon. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/chinese-hackers-hijack-european-networks-for-espionage-a-30319
-
Why a 17-Year-Old Built an AI Model to Expose Deepfake Maps
A high-school student is tackling the overlooked risk of AI-generated satellite imagery that could mislead governments and emergency responders. First seen on darkreading.com Jump to article: www.darkreading.com/threat-intelligence/why-17-year-old-built-ai-expose-deepfake-maps
-
Securing the AI Revolution: NSFOCUS LLM Security Protection Solution
As Artificial Intelligence technology rapidly advances, Large Language Models (LLMs) are being widely adopted across countless domains. However, with this growth comes a critical challenge: LLM security issues are becoming increasingly prominent, posing a major constraint on further development. Governments and regulatory bodies are responding with policies and regulations to ensure the safety and compliance…The…
-
Why a 17-Year-Old Built an AI to Expose Deepfake Maps
A high school student is tackling the overlooked risk of AI-generated satellite imagery that could mislead governments and emergency responders. First seen on darkreading.com Jump to article: www.darkreading.com/threat-intelligence/why-17-year-old-built-ai-expose-deepfake-maps
-
Why a 17-Year-Old Built an AI to Expose Deepfake Maps
A high school student is tackling the overlooked risk of AI-generated satellite imagery that could mislead governments and emergency responders. First seen on darkreading.com Jump to article: www.darkreading.com/threat-intelligence/why-17-year-old-built-ai-expose-deepfake-maps

