Tag: government
-
Google warns quantum computers could hack encrypted systems by 2029
Banks, governments and tech providers urged to upgrade security because current systems will soon be obsolete Banks, governments and technology providers need to be prepared for quantum computer hackers capable of breaking most existing encryption systems by 2029, <a href=”https://blog.google/innovation-and-ai/technology/safety-security/cryptography-migration-timeline/”>Google has warned.The tech company said in a <a href=”https://blog.google/innovation-and-ai/technology/safety-security/cryptography-migration-timeline/”>blogpost that quantum computers will pose a…
-
UK sanctions Chinese crypto marketplace tied to scam compounds
The British government sanctioned Xinbi, a Chinese-language cryptocurrency marketplace accused of enabling large-scale online fraud and human exploitation, in a move targeting the financial infrastructure behind global scam networks. First seen on therecord.media Jump to article: therecord.media/xinbi-crypto-marketplace-sanctioned
-
Intermediaries Driving Global Spyware Market Expansion
Third-party resellers and brokers foil transparency efforts and allow spyware to spread despite government restrictions, a study finds. First seen on darkreading.com Jump to article: www.darkreading.com/cyber-risk/intermediaries-driving-global-spyware-market-expansion
-
Indian government probes CCTV espionage operation linked to Pakistan
Police found cameras pointing at infrastructure First seen on theregister.com Jump to article: www.theregister.com/2026/03/26/india_pakistan_cctv/
-
US government launches Bureau of Emerging Threats
The US’ new Bureau of Emerging Threats sits within the State Department and will supposedly help address national security threats arising from cyber attacks, the weaponisation of space, and other emerging technologies. First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366640778/US-government-launches-Bureau-of-Emerging-Threats
-
At RSAC, the EU Leads While US Officials Are Sidelined
While US government sits out this year, EU officials are on the ground in San Francisco leading the conversations on today’s top cybersecurity challenges. First seen on darkreading.com Jump to article: www.darkreading.com/cyber-risk/rsac-eu-leads-us-officials-sidelined
-
Convicted spyware chief hints that Greece’s government was behind dozens of phone hacks
The spyware founder’s comments are the most direct suggestion yet from anyone inside Intellexa that the Mitsotakis government authorized the hacking of dozens of phones belonging to senior Greek government ministers, opposition leaders, military officials, and journalists. First seen on techcrunch.com Jump to article: techcrunch.com/2026/03/25/convicted-spyware-chief-hints-that-greeces-government-was-behind-dozens-of-phone-hacks/
-
Convicted spyware chief hints that Greece’s government was behind dozens of phone hacks
The spyware founder’s comments are the most direct suggestion yet from anyone inside Intellexa that the Mitsotakis government authorized the hacking of dozens of phones belonging to senior Greek government ministers, opposition leaders, military officials, and journalists. First seen on techcrunch.com Jump to article: techcrunch.com/2026/03/25/convicted-spyware-chief-hints-that-greeces-government-was-behind-dozens-of-phone-hacks/
-
Puerto Rico government agency cancels driver’s license appointments after cyberattack
Services at Centros de Servicios al Conductor (CESCO), the agency responsible for issuing licenses, permits and vehicle registrations in Puerto Rico, cancelled all appointments due to a cyber incident. First seen on therecord.media Jump to article: therecord.media/puerto-rico-gov-agency-cancels-driver-license-appointments-cyber-incident
-
6 key trends reshaping the IAM market
Tags: access, ai, attack, authentication, ciso, compliance, corporate, cyber, cybersecurity, data, dora, finance, framework, governance, government, Hardware, iam, identity, mfa, mobile, network, nis-2, passkey, password, PCI, phone, regulation, saas, service, startup, strategy, technologyPasswordless authentication on the rise: Passwords have long been the weakest link in most security architectures.Many mobile phones and laptops already use biometrics for authentication, and the user experience is typically far better than typing a long and complex password into an interface.The growing uptake of passwordless authentication (FIDO2/passkeys, biometrics) is redefining the scope of…
-
6 key trends reshaping the IAM market
Tags: access, ai, attack, authentication, ciso, compliance, corporate, cyber, cybersecurity, data, dora, finance, framework, governance, government, Hardware, iam, identity, mfa, mobile, network, nis-2, passkey, password, PCI, phone, regulation, saas, service, startup, strategy, technologyPasswordless authentication on the rise: Passwords have long been the weakest link in most security architectures.Many mobile phones and laptops already use biometrics for authentication, and the user experience is typically far better than typing a long and complex password into an interface.The growing uptake of passwordless authentication (FIDO2/passkeys, biometrics) is redefining the scope of…
-
6 key trends reshaping the IAM market
Tags: access, ai, attack, authentication, ciso, compliance, corporate, cyber, cybersecurity, data, dora, finance, framework, governance, government, Hardware, iam, identity, mfa, mobile, network, nis-2, passkey, password, PCI, phone, regulation, saas, service, startup, strategy, technologyPasswordless authentication on the rise: Passwords have long been the weakest link in most security architectures.Many mobile phones and laptops already use biometrics for authentication, and the user experience is typically far better than typing a long and complex password into an interface.The growing uptake of passwordless authentication (FIDO2/passkeys, biometrics) is redefining the scope of…
-
6 key trends reshaping the IAM market
Tags: access, ai, attack, authentication, ciso, compliance, corporate, cyber, cybersecurity, data, dora, finance, framework, governance, government, Hardware, iam, identity, mfa, mobile, network, nis-2, passkey, password, PCI, phone, regulation, saas, service, startup, strategy, technologyPasswordless authentication on the rise: Passwords have long been the weakest link in most security architectures.Many mobile phones and laptops already use biometrics for authentication, and the user experience is typically far better than typing a long and complex password into an interface.The growing uptake of passwordless authentication (FIDO2/passkeys, biometrics) is redefining the scope of…
-
UK pilot program to test social media restrictions on families before government decides on ban
Tags: governmentThe U.K. government will try out various social media restrictions on certain families as part of a pilot program as it mulls a potential social media ban for teens. First seen on therecord.media Jump to article: therecord.media/uk-social-media-ban-pilot
-
US government bans imported routers, raising tough questions
The US communications regulator has enacted a ban on all router hardware made outside America citing security concerns, but experts say the move may risk creating more issues than it solves First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366640628/US-government-bans-imported-routers-raising-tough-questions
-
Irish government launches CNI resilience plan
Ireland’s National Strategy on the Resilience of Critical Entities sets out a pathway to improved cyber resilience for the nation’s critical infrastructure, and establishes compliance with an EU directive First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366640673/Irish-government-launches-CNI-resilience-plan
-
Attackers Hide Infostealer in Copyright Infringement Notices
A phishing campaign targeting healthcare, government, hospitality, and education sectors in various countries uses several evasion techniques to avoid detection. First seen on darkreading.com Jump to article: www.darkreading.com/cyberattacks-data-breaches/attackers-hide-infostealer-copyright-infringement-notices
-
FBI says Iranian hackers are using Telegram to steal data in malware attacks
Hackers working for Iran’s government are using Telegram in hacking operations that use malware to target dissidents, opposition groups, and journalists who oppose its regime, according to the FBI. First seen on techcrunch.com Jump to article: techcrunch.com/2026/03/23/fbi-says-iranian-hackers-are-using-telegram-to-steal-data-in-malware-attacks/
-
RSA Launches ID Plus Sovereign Deployment for Organizations That Can’t Afford Identity Downtime
RSA opened RSAC 2026 with a new deployment model for its ID Plus identity platform, aimed squarely at government agencies, financial services firms, and critical infrastructure operators that need identity security to work even when everything else fails. RSA ID Plus Sovereign Deployment is a >>deploy anywhere<< identity and access management solution that gives organizations..…
-
CISA Orders US Government to Patch Maximum Severity Cisco Flaw
CISA added CVE-2026-20131 to its KEV catalog as it is being used in ransomware campaigns First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/cisa-orders-us-government-patch/
-
Why US companies must be ready for quantum by 2030: A practical roadmap
Tags: api, backup, control, crypto, cryptography, data, encryption, endpoint, firmware, government, identity, infrastructure, ml, nist, risk, service, software, strategy, supply-chain, update, vpn“Harvest now, decrypt later” is not theoretical. If an attacker steals encrypted session captures or archived backups, the confidentiality loss happens the day quantum-capable decryption becomes practical. Your risk horizon is set by the shelf life of your data, not the arrival date of a quantum computer.Government and critical infrastructure guidance are converging. The National…
-
Why US companies must be ready for quantum by 2030: A practical roadmap
Tags: api, backup, control, crypto, cryptography, data, encryption, endpoint, firmware, government, identity, infrastructure, ml, nist, risk, service, software, strategy, supply-chain, update, vpn“Harvest now, decrypt later” is not theoretical. If an attacker steals encrypted session captures or archived backups, the confidentiality loss happens the day quantum-capable decryption becomes practical. Your risk horizon is set by the shelf life of your data, not the arrival date of a quantum computer.Government and critical infrastructure guidance are converging. The National…
-
CISA orders feds to patch DarkSword iOS flaws exploited attacks
CISA ordered U.S. government agencies to patch three iOS vulnerabilities targeted in cryptocurrency theft and cyberespionage attacks using the DarkSword exploit kit. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/cisa-orders-feds-to-patch-darksword-ios-flaws-exploited-attacks/
-
What Is Physical AI, and What Does It Mean for Government?
From Davos insights to state readiness, let’s explore how robotics and sensors are moving artificial intelligence into the physical world. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/03/what-is-physical-ai-and-what-does-it-mean-for-government/
-
UK to rethink tech buying after Palantir contracts
Tags: governmentGovernment looks for sovereign tech as NHS deal nears break clause First seen on theregister.com Jump to article: www.theregister.com/2026/03/20/uk_palantir_contracts/
-
Copyright Complaint Lures Linked to New PureLog Stealer Credential Theft Wave
Threat actors are actively distributing the PureLog Stealer through a sophisticated, multi-stage attack campaign disguised as legal copyright violation notices. This information-stealing malware is engineered to silently harvest sensitive data, including browser credentials, browser extensions, cryptocurrency wallets, and detailed system information. The campaign selectively targets organizations within the healthcare, government, hospitality, and education sectors across…
-
7,500+ Magento sites defaced in global hacking campaign
Hackers defaced 7,500 Magento sites since Feb 27, uploading files across 15,000 hostnames, mostly opportunistic attacks. Since February 27, a large-scale campaign has defaced over 7,500 Magento sites, targeting e-commerce platforms, global brands, and government services. According to cybersecurity firm Netcraft, attackers placed plaintext defacement files across more than 15,000 hostnames, directly compromising affected infrastructure.…
-
US accuses Iran’s government of operating hacktivist group that hacked Stryker
The U.S. Justice Department said an Iranian security ministry operates the fake activist persona known as Handala, which claimed responsibility for the destructive hack targeting medical tech giant Stryker. First seen on techcrunch.com Jump to article: techcrunch.com/2026/03/20/u-s-accuses-irans-government-of-operating-hacktivist-group-that-hacked-stryker/
-
U.S. accuses Iran’s government of operating hacktivist group that hacked Stryker
The U.S. Justice Department said an Iranian security ministry operates the fake activist persona known as Handala, which claimed responsibility for the destructive hack targeting medical tech giant Stryker. First seen on techcrunch.com Jump to article: techcrunch.com/2026/03/20/u-s-accuses-irans-government-of-operating-hacktivist-group-that-hacked-stryker/
-
With Government’s Role Uncertain, Businesses Unite to Combat Fraud
Major industry leaders agree to share information and collaborate to boost defenses in the wake of distressing online scams. First seen on darkreading.com Jump to article: www.darkreading.com/cyber-risk/with-government-role-uncertain-businesses-unite-to-combat-fraud

