Tag: government
-
Salt Typhoon Exploits Cisco, Ivanti, Palo Alto Flaws to Breach 600 Organizations Worldwide
The China-linked advanced persistent threat (APT) actor known as Salt Typhoon has continued its attacks targeting networks across the world, including organizations in the telecommunications, government, transportation, lodging, and military infrastructure sectors.”While these actors focus on large backbone routers of major telecommunications providers, as well as provider edge (PE) and First seen on thehackernews.com Jump…
-
ShadowSilk Targets Penetration-Testing Tools and Public Exploits to Breach Organizations
Tags: breach, cyber, cybersecurity, data, exploit, government, group, penetration-testing, threat, toolCybersecurity experts discovered an advanced persistent threat (APT) cluster called ShadowSilk in a thorough research published by Group-IB. Since at least 2023, this group has been actively breaching government institutions in Central Asia and the Asia-Pacific area. The group’s operations, ongoing as of July 2025, focus primarily on data exfiltration, leveraging a sophisticated blend of…
-
CISA steps in to help Nevada state government recover from cyberattack
The Cybersecurity and Infrastructure Security Agency, FBI and others are supporting Nevada as it recovers from a cyberattack that has affected a range of state government services. First seen on therecord.media Jump to article: therecord.media/cisa-steps-nevada-cyber-state
-
Chinesische Hackergruppe Salt Typhoon greift weltweit (Telekommunikations-)Unternehmen an
Die US National Security Agency (NSA) und andere US-amerikanische und ausländische Organisationen (z.B. das BSI) haben eine Sicherheitswarnung herausgegeben. Cybergruppen wie Salt Typhoon, die von der chinesischen Regierung unterstützt werden, greifen weltweit Netzwerke in den Bereichen Telekommunikation, Regierung, Transport, Beherbergung … First seen on borncity.com Jump to article: www.borncity.com/blog/2025/08/28/chinesische-hackergruppe-salt-typhoon-greift-weltweit-telekom-unternehmen-an/
-
NSA, NCSC, and allies detailed TTPs associated with Chinese APT actors targeting critical infrastructure Orgs
NSA and allies warn that Chinese APT actors, including Salt Typhoon, are targeting critical infrastructure worldwide. The U.S. National Security Agency (NSA), the UK’s National Cyber Security Centre (NCSC), and allies warn Chinese APT actors, linked to Salt Typhoon, are targeting global telecom, government, transport, lodging, and military sectors. >>The National Security Agency (NSA) and…
-
Qualys erhält höchste US-Cloud Sicherheitszertifizierung FedRAMP High ATO
Die FedRAMP High Autorisierung unterstreicht unsere erheblichen Investitionen in erstklassige Sicherheit und bekräftigt unser Engagement als vertrauenswürdiger Partner, um den Auftrag der US-Regierung zur Stärkung der Cybersicherheit voranzubringen First seen on infopoint-security.de Jump to article: www.infopoint-security.de/qualys-erhaelt-hoechste-us-cloud-sicherheitszertifizierung-fedramp-high-ato/a41812/
-
Regierung plant stärkere Cyberabwehr
Die Bundesregierung will Ende des Jahres einen Gesetzentwurf vorlegen, der die Cyberabwehr in Deutschland stärken soll.Die Bundesregierung hat ein entschiedeneres Vorgehen gegen Sicherheitsbedrohungen im digitalen Raum angekündigt. Wie Regierung und Bundesinnenministerium mitteilten, beschloss das Kabinett entsprechende Eckpunkte zur Erhöhung der Cybersicherheit.Das Innenministerium plant demnach, bis Ende des Jahres einen Gesetzentwurf vorzulegen, der den Sicherheitsbehörden mehr…
-
Chinesische Telekom-Hacker in 80 Ländern aktiv
Laut FBI hat es die chinesische Hackergruppe “Salt Typhoon” auf mindestens 80 Länder abgesehen.Die mutmaßlich chinesischen Hacker, die Telekommunikations-Anbieter in den USA ausspähten, greifen rund um die Welt an. Die US-Bundespolizei FBI informierte im Zuge mindestens 80 Länder, in denen Aktivität der Gruppe “Salt Typhoon” festgestellt worden sei. Eine ausführliche Beschreibung der Vorgehensweise der Hacker…
-
Chinesische Hackergruppe Salt Typhoon greift weltweit (Telekom-)Unternehmen an
Die US National Security Agency (NSA) und andere US-amerikanische und ausländische Organisationen (z.B. das BSI) haben eine Sicherheitswarnung herausgegeben. Cybergruppen wie Salt Typhoon, die von der chinesischen Regierung unterstützt werden, greifen weltweit Netzwerke in den Bereichen Telekommunikation, Regierung, Transport, Beherbergung … First seen on borncity.com Jump to article: www.borncity.com/blog/2025/08/28/chinesische-hackergruppe-salt-typhoon-greift-weltweit-telekom-unternehmen-an/
-
If you thought China’s Salt Typhoon was booted off critical networks, think again
13 governments sound the alarm about ongoing unpleasantness First seen on theregister.com Jump to article: www.theregister.com/2025/08/28/china_salt_typhoon_alert/
-
Treasury sanctions North Korea IT worker scheme facilitators and front organizations
As the sanctions-evading scheme has grown, so too has the U.S. government’s response. First seen on cyberscoop.com Jump to article: cyberscoop.com/treasury-department-sanctions-north-korea-worker-scheme/
-
Salt Typhoon hacking campaign goes beyond previously disclosed targets, world cyber agencies say
The Chinese government-linked hackers were the subject of an alert from U.S. and international partners. First seen on cyberscoop.com Jump to article: cyberscoop.com/salt-typhoon-hacking-campaign-goes-beyond-previously-disclosed-targets-world-cyber-agencies-say/
-
Google previews cyber ‘disruption unit’ as U.S. government, industry weigh going heavier on offense
There are still impediments to overcome before companies and agencies can get more broadly aggressive in cyberspace, both legal and commercial. First seen on cyberscoop.com Jump to article: cyberscoop.com/google-cybersecurity-disruption-unit-active-defense-hack-back/
-
Putin on the code: DoD reportedly relies on utility written by Russian dev
Fast-glob is widely used in government, security lab says First seen on theregister.com Jump to article: www.theregister.com/2025/08/27/popular_nodejs_utility_used_by/
-
TDL001 – Cybersecurity Explained: Privacy, Threats, and the Future – Chester Wisniewski
Tags: access, ai, attack, backdoor, breach, business, ciso, computer, country, crime, crimes, cyber, cybercrime, cybersecurity, data-breach, defense, detection, edr, email, finance, firewall, gartner, government, guide, hacker, hacking, Hardware, infosec, Internet, jobs, linkedin, mail, malicious, microsoft, military, monitoring, network, password, phishing, phone, privacy, programming, ransomware, risk, russia, scam, skills, software, sophos, spam, sql, strategy, switch, technology, threat, update, virus, vulnerability, wifi, windowsSummary “The Defenders Log” Episode 1 features host David Redekop and guest Chet Wisniewski discussing the dynamic world of cybersecurity. Wisniewski, with decades of experience, traces his journey from early BBS and phone network exploration to becoming a cybersecurity expert. They delve into the evolution of hacking, the emergence of profitable cybercrime like email spam,…
-
Nevada “Network Security Incident” Shuts Down State Offices and Services
The Office of the Governor of Nevada revealed that the incident has shut down in-person State services, while government phone lines and websites are offline First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/nevada-security-incident-shuts-down/
-
Anthropic Disrupts AI-Powered Cyberattacks Automating Theft and Extortion Across Critical Sectors
Anthropic on Wednesday revealed that it disrupted a sophisticated operation that weaponized its artificial intelligence (AI)-powered chatbot Claude to conduct large-scale theft and extortion of personal data in July 2025.”The actor targeted at least 17 distinct organizations, including in healthcare, the emergency services, and government, and religious institutions,” the company said. “ First seen on…
-
ShadowSilk Hits 35 Organizations in Central Asia and APAC Using Telegram Bots
A threat activity cluster known as ShadowSilk has been attributed to a fresh set of attacks targeting government entities within Central Asia and Asia-Pacific (APAC).According to Group-IB, nearly three dozen victims have been identified, with the intrusions mainly geared towards data exfiltration. The hacking group shares toolset and infrastructural overlaps with campaigns undertaken by threat…
-
Spanish police arrest student suspected of hacking school system to change grades
Spanish police have arrested a university student suspected of hacking the local government’s education management system to alter grades and gain access to professors’ emails. First seen on therecord.media Jump to article: therecord.media/spanish-police-hacker-arrest-grades
-
US sanctions fraud network used by North Korean ‘remote IT workers’ to seek jobs and steal money
Treasury officials say the North Korea government used the fraud network to generate money for the regime’s nuclear weapons program. First seen on techcrunch.com Jump to article: techcrunch.com/2025/08/27/us-sanctions-fraud-network-used-by-north-korea-to-seek-jobs-and-steal-money/
-
ShadowSilk Campaign Targets Central Asian Governments
A series of cyber-attacks against government organizations in Central Asia and Asia- Pacific has been linked to the ShadowSilk threat cluster First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/shadowsilk-targets-central-asian/
-
ShadowSilk Hits 36 Government Targets in Central Asia and APAC Using Telegram Bots
A threat activity cluster known as ShadowSilk has been attributed to a fresh set of attacks targeting government entities within Central Asia and Asia-Pacific (APAC).According to Group-IB, nearly three dozen victims have been identified, with the intrusions mainly geared towards data exfiltration. The hacking group shares toolset and infrastructural overlaps with campaigns undertaken by threat…
-
TAG-144: Actors Attacking Government Entities With New Tactics, Techniques, and Procedures
The threat actor known as TAG-144, also referred to as Blind Eagle or APT-C-36, has been linked to five distinct activity clusters operating from May 2024 through July 2025, primarily targeting Colombian government entities at local, municipal, and federal levels. This cyber threat group, active since at least 2018, employs a sophisticated blend of cyber-espionage…
-
Blind Eagle’s Five Clusters Target Colombia Using RATs, Phishing Lures, and Dynamic DNS Infra
Cybersecurity researchers have discovered five distinct activity clusters linked to a persistent threat actor known as Blind Eagle between May 2024 and July 2025.These attacks, observed by Recorded Future Insikt Group, targeted various victims, but primarily within the Colombian government across local, municipal, and federal levels. The threat intelligence firm is tracking the activity under…
-
DOGE Allegedly Uploaded SSA’s Live Numident Database to Unsecured Cloud Server
The Government Accountability Project submitted a protected disclosure from Charles Borges”, SSA’s Chief Data Officer”, to the Office of Special Counsel and congressional oversight committees. Borges reports that since DOGE’s inception in January 2025, its officials have systematically circumvented SSA’s normal review procedures and a March 20, 2025 temporary restraining order forbidding external access to…
-
How compliance teams can turn AI risk into opportunity
AI is moving faster than regulation, and that creates opportunities and risks for compliance teams. While governments work on new rules, businesses cannot sit back and wait. … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/08/27/matt-hillary-drata-ai-regulatory-compliance/
-
TDL003 – Breaking Barriers: IPv6 Adoption and DNS Transformation with Tommy Jensen
Tags: access, ai, apple, attack, backup, banking, browser, business, ceo, chrome, ciso, compliance, computer, computing, control, country, credentials, cybersecurity, data, data-breach, ddos, dns, encryption, endpoint, google, government, group, international, Internet, jobs, law, microsoft, mobile, network, phishing, phone, privacy, programming, radius, risk, service, smishing, strategy, switch, technology, threat, update, vpn, windows, zero-trustSummary This episode of the Defender’s Log features special guest Tommy Jensen, an internet technologist specializing in IPv6, Zero Trust, and standards. Jensen’s career path, from an AppleCare contractor to a key figure in advancing internet technologies, is explored. The discussion highlights the critical importance and challenges of migrating to IPv6 and the necessity of…
-
Transparent Tribe Deploys Malicious Files Against India Govt
Pakistan-Linked Threat Actor Targets Indian Linux Operation System. Pakistan-linked hackers are targeting an Indian Linux-based operating system by tricking government employees into clicking malicious files that look like PDFs. When opened, the files install spyware, giving attackers long-term access to sensitive government systems. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/transparent-tribe-deploys-malicious-files-against-india-govt-a-29305
-
Whistleblower: DOGE Made Live Copy of Social Security Data
Department of Government Efficiency Staffers Created ‘Live Replica’ of SSA Data. The Social Security Administration’s chief data officer is warning in a whistleblower complaint that DOGE created a cloud replica of the Social Security database without proper authorization or oversight, potentially exposing the personal data of 300 million Americans. First seen on govinfosecurity.com Jump to…

