Tag: government
-
Cyber information-sharing law and state grants set to go dark as Congress stalls over funding
Congress is unlikely to move this week to renew two key cybersecurity efforts that were expected to hitch a ride on legislation to keep the government running. First seen on therecord.media Jump to article: therecord.media/cisa-2015-state-cyber-grants-lapse-congress-government-shutdown
-
Cloud provider publishes ‘tech sovereignty’ plan for UK
In the face of mounting data sovereignty concerns across Europe, UK cloud provider Civo lays out high-level plan for how the government can retain control and access of its data should the geopolitical situation sour First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366632179/Cloud-provider-publishes-tech-sovereignty-plan-for-UK
-
FTC alleges messaging app violated child privacy law, duped users into subscriptions
A civil complaint filed by the federal government alleges that the Sendit app illegally collected data from users under 13 and tricked people into paying for subscriptions. First seen on therecord.media Jump to article: therecord.media/ftc-alleges-sendit-app-violated-children-privacy-rule
-
New Chinese Nexus APT Group Targeting Organizations to Deploy NET-STAR Malware Suite
China-linked advanced persistent threat (APT) group Phantom Taurus has intensified espionage operations against government and telecommunications targets across Africa, the Middle East, and Asia, deploying a newly discovered .NET malware suite called NET-STAR. First tracked by Unit 42 in June 2023 as cluster CL-STA-0043 and temporarily designated TGR-STA-0043 (Operation Diplomatic Specter) in May 2024, the…
-
US Cuts Federal Funding for MS-ISAC Cybersecurity Program
The Trump administration wants CISA to transition to a “new model” for supporting local government agencies’ cyber strategy First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/us-cuts-funding-ms-isac/
-
APT35 Hackers Targeting Government and Military to Steal Login Credentials
Tags: credentials, cyber, government, hacker, intelligence, login, malicious, military, phishing, threatStormshield CTI researchers have identified two active phishing servers linked to APT35, revealing ongoing credential-stealing operations targeting government and military entities. In an active threat-hunting operation, Stormshield’s Cyber Threat Intelligence (CTI) team discovered two malicious servers exhibiting hallmark characteristics of APT35 infrastructure. These servers, mirroring footprints documented by Check Point, are hosting phishing pages designed…
-
Feds cut funding to program that shared cyber threat info with local governments
The federal government’s not the only thing shutting down on Oct. 1 First seen on theregister.com Jump to article: www.theregister.com/2025/09/30/cisa_kills_cis_agreement/
-
IoT Security Flounders Amid Churning Risk
The Internet of Things (IoT) has made everything more interconnected than ever, but an important US government security initiative is stuck in limbo even as threat actors step up attacks on everything from medical gear to printers. First seen on darkreading.com Jump to article: www.darkreading.com/iot/iot-security-flounders-amid-churning-risk
-
UK grants £1.5B loan to Jaguar Land Rover after cyberattack
UK grants Jaguar Land Rover a £1.5B loan guarantee after a major cyberattack, though cybersecurity experts voice concerns about the government’s support plan. The UK government has announced a support package of £1.5 billion ($2 billion) for Jaguar Land Rover (JLR) in response to the disruptive cyberattack that recently hit the company. UK pledges decisive…
-
UK Government Backs Jaguar Land Rover With 1.5B Pound Loan
Carmaker Anticipates Phased Restart of Production. The British government will guarantee a 1.5 billion pound loan to Jaguar Land Rover as the embattled carmaker grapples with the fallout of a September cyberattack that froze production and sales across the globe. The government backed-loan shows the hack endangered national economic security. First seen on govinfosecurity.com Jump…
-
JLR tentatively restarts production, following £1.5bn government backing
Jaguar Land Rover is to resume car production after a £1.5bn government loan guarantee amid its cyber attack fallout. Debate is growing over the bailout and insurance First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366632149/JLR-tentatively-restarts-production-following-15bn-government-backing
-
UK government to be guarantor for Jaguar Land Rover loan as it recovers from cyberattack
JLR itself is responsible for repaying the £1.5 billion ($2 billion) five-year loan from an unnamed commercial bank, but the lender has received a guarantee that the British government would step in if JLR fails to repay it. First seen on therecord.media Jump to article: therecord.media/jaguar-land-rover-loan-guarantor-cyberattack
-
UK govt backs JLR with £1.5 billion loan guarantee after cyberattack
The UK Government is providing Jaguar Land Rover (JLR) with a £1.5 billion loan guarantee to restore its supply chain after a catastrophic cyberattack forced the automaker to halt production. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/uk-govt-backs-jlr-with-15-billion-loan-guarantee-after-cyberattack/
-
CISA to furlough 65% of staff if government shuts down this week
Employees are worried about threatened mass firings and the cybersecurity ripple effects of a funding lapse. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/cisa-government-shutdown-plan-employees/761365/
-
Jaguar Land Rover cyber-attack: what’s the latest news?
How is the government helping the carmaker? Will jobs be protected? And when will production restart?<ul><li><a href=”https://www.theguardian.com/business/live/2025/sep/29/moral-hazard-fears-jlr-jaguar-land-rover-government-loan-gsk-ceo-astrazeneca-listing-dollar-shutdown-business-live-news”>Business live latest updates</li></ul>Jaguar Land Rover’s factories have been shut for almost a month after <a href=”https://www.theguardian.com/business/2025/sep/02/jaguar-land-rover-cyber-incident-manufacturing-retail”>a cyber-attack that forced it to turn off computer systems in the UK, Slovakia, India and Brazil.The UK government has stepped in with…
-
UK government bails out Jaguar Land Rover with £1.5B loan after hack disrupts vehicle production for weeks
The Indian-owned carmaking giant will be bailed out after a cyberattack stalled car production and its downstream supply chain. Critics argue that the bailout sends the wrong message to hackers and crime groups. First seen on techcrunch.com Jump to article: techcrunch.com/2025/09/29/uk-government-bails-out-jaguar-land-rover-with-1-5b-loan-after-hack-disrupts-vehicle-production-for-weeks/
-
Chinese hackers breached critical infrastructure globally using enterprise network gear
Tags: access, backdoor, breach, business, china, communications, control, cve, defense, exploit, framework, germany, government, group, hacker, infrastructure, Internet, korea, law, malware, military, monitoring, network, open-source, penetration-testing, programming, service, threat, tool, update, vpn, vulnerability72-hour vulnerability exploitation window: RedNovember demonstrated the ability to weaponize newly disclosed vulnerabilities faster than most organizations could deploy patches, researchers found. When researchers published proof-of-concept code for Check Point VPN vulnerability CVE-2024-24919 on May 30, 2024, RedNovember was attacking vulnerable systems by June 3.That campaign hit at least 60 organizations across Brazil, Germany, Japan,…
-
UK minister suggests government could ditch ‘dangerous’ Elon Musk’s X
Ed Miliband takes aim at social media overlord for promoting violence and disinformation First seen on theregister.com Jump to article: www.theregister.com/2025/09/29/uk_government_x_twiter/
-
Jaguar Land Rover gets £1.5B government jump-start after cyber breakdown
Hundreds of thousands of workers in financial despair supported with landmark loan First seen on theregister.com Jump to article: www.theregister.com/2025/09/29/jlr_government_loan/
-
SVG Files Abused to Deploy PureMiner Malware and Exfiltrate Data
Cybercriminals are exploiting SVG files as an initial attack vector in a multi-stage campaign designed to impersonate Ukrainian government communications. FortiGuard Labs has uncovered a sophisticated phishing campaign targeting Ukrainian government agencies through malicious Scalable Vector Graphics (SVG) files, ultimately deploying both cryptocurrency mining malware and information stealers to compromise victim systems. The attack begins…
-
UK government will underwrite £1.5bn loan guarantee to Jaguar Land Rover after cyber-attack
Britain’s largest automotive employer plans to restart engine manufacturing in early October, report saysThe government has said it will underwrite a £1.5bn loan guarantee to Jaguar Land Rover (JLR) as the car maker battles the consequences of a recent cyber-attack.JLR had to suspend production at its UK factories for several weeks after being targeted by…
-
Researchers Expose Phishing Threats Distributing CountLoader and PureRAT
A new campaign has been observed impersonating Ukrainian government agencies in phishing attacks to deliver CountLoader, which is then used to drop Amatera Stealer and PureMiner.”The phishing emails contain malicious Scalable Vector Graphics (SVG) files designed to trick recipients into opening harmful attachments,” Fortinet FortiGuard Labs researcher Yurren Wan said in a report shared with…
-
Shutdown Threat Puts Federal Cyber on Edge
Cybersecurity Programs, Workforce Face Disruption If Congress Fails to Act. A potential government shutdown threatens to gut federal cybersecurity operations, with key programs set to expire, agency cyber staff facing layoffs and no public contingency plans in place – leaving core defenses, threat sharing and incident response at risk. First seen on govinfosecurity.com Jump to…
-
Cyber threat-sharing law set to shut down, along with US government
Act passed in 2015 is due to lapse unless a continuing resolution passes – and that’s unlikely First seen on theregister.com Jump to article: www.theregister.com/2025/09/26/government_shutdown_cisa_law/
-
Senate Bill Seeks Privacy Protection for Brain Wave Data
MIND Act Asks FTC to Study Exploitation Risks for Neural Data Collected by Devices. Are brain waves and similar neural data the next frontier in consumer privacy worries? A trio of U.S. senators have introduced federal legislation aiming to get ahead of risks that such brain-related data could be collected and misused by tech firms,…
-
Researchers Expose SVG and PureRAT Phishing Threats Targeting Ukraine and Vietnam
A new campaign has been observed impersonating Ukrainian government agencies in phishing attacks to deliver CountLoader, which is then used to drop Amatera Stealer and PureMiner.”The phishing emails contain malicious Scalable Vector Graphics (SVG) files designed to trick recipients into opening harmful attachments,” Fortinet FortiGuard Labs researcher Yurren Wan said in a report shared with…
-
Keir Starmer launches digital ID scheme, but does it stand a chance?
Amid an economic crisis, public scepticism and confusing messages, could the government’s digital identity programme fail before it even gets off the ground? First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366631981/Keir-Starmer-launches-digital-ID-scheme-but-does-it-stand-a-chance
-
Okta introduces Identity Security Fabric to secure AI agents
Tags: ai, backup, control, credentials, data, deep-fake, government, identity, infrastructure, malicious, mobile, okta, privacy, vulnerabilityDigital credentials round out the platform: The third fabric component is digital credentials capabilities through the Okta Verifiable Digital Credentials (VDC) platform, scheduled for fiscal 2027 release.The system would allow organizations to issue cryptographically secure versions of government IDs, employment records, and professional certifications.”Built on open standards for maximum control and future interoperability, VDCs will…
-
Okta introduces Identity Security Fabric to secure AI agents
Tags: ai, backup, control, credentials, data, deep-fake, government, identity, infrastructure, malicious, mobile, okta, privacy, vulnerabilityDigital credentials round out the platform: The third fabric component is digital credentials capabilities through the Okta Verifiable Digital Credentials (VDC) platform, scheduled for fiscal 2027 release.The system would allow organizations to issue cryptographically secure versions of government IDs, employment records, and professional certifications.”Built on open standards for maximum control and future interoperability, VDCs will…

