Tag: usa
-
UAT-8302 Targets Government Agencies With Custom Malware and Open-Source Tools
A new China-linked hacking group, tracked as UAT-8302, that is using custom malware and open-source tools to spy on government organizations in South America and southeastern Europe. The campaign focuses on long-term access and data theft, combining advanced backdoors like NetDraft and CloudSorcerer with aggressive network reconnaissance and credential theft. Researchers assess with high confidence…
-
Angst vor Cyberangriffen und ihren Konsequenzen – USA planen Sicherheitsprüfung für KI-Modelle vor Veröffentlichung
First seen on security-insider.de Jump to article: www.security-insider.de/usa-pflichtpruefung-ki-modelle-sicherheitscheck-caisi-nist-a-4a1bc900e9cf38ba38939efe058fb5fe/
-
Watchguard übernimmt CloudSpezialisten Perimeters.io und erweitert das Cloud-Sicherheitsportfolio
Mit der gerade bekannt gegebenen Akquise des in den USA ansässigen Unternehmens Perimeters.io sichert sich Watchguard Technologies zusätzliche Kompetenz im Bereich Cloud-Application- Security. Zeitgleich wurde bereits die Lösung <> (CloudDR) vorgestellt, die auf der Sicherheitstechnologie von Perimeters basiert. CloudDR bietet durchgängige Transparenz, integrierte Erkennung und automatisierte Reaktionsmöglichkeiten für Cloud-Anwendungen über eine […] First seen on…
-
In 82 Prozent der Sicherheitsvorfälle ist die künstliche Intelligenz bereits involviert
Gigamon, ein führender Anbieter von Deep-Observability, veröffentlicht die neue Ausgabe seiner jährlichen Studie zur Hybrid-Cloud-Sicherheit, die einen umfassenden weitgehend von KI getriebenen Wandel in der Cyberbedrohungs-landschaft aufzeigt. Für die bereits zum vierten Mal durchgeführte Studie wurden mehr als 1.000 IT- und Sicherheitsentscheider in Australien, Frankreich, Deutschland, Singapur, Großbritannien und den USA befragt. Eine […] First…
-
Iran and Hezbollah Are Relocating Terror Networks Across Latin America
The post Iran and Hezbollah Are Relocating Terror Networks Across Latin America appeared first on Daily CyberSecurity. First seen on securityonline.info Jump to article: securityonline.info/irgc-hezbollah-venezuela-disruption-colombia-ecuador-relocation/
-
China-Linked UAT-8302 Targets Governments Using Shared APT Malware Across Regions
A sophisticated China-nexus advanced persistent threat (APT) group has been attributed to attacks targeting government entities in South America since at least late 2024 and government agencies in southeastern Europe in 2025.The activity is being tracked by Cisco Talos under the moniker UAT-8302, with post-exploitation involving the deployment of custom-made malware families that have been…
-
Iranian Proxy Networks in Latin America Post-Maduro: IRGC
First seen on resecurity.com Jump to article: www.resecurity.com/blog/article/iranian-proxy-networks-in-latin-america-post-maduro-irgc
-
UAT-8302 and its box full of malware
Cisco Talos is disclosing UAT-8302, a sophisticated, China-nexus advanced persistent threat (APT) group targeting government entities in South America since at least late 2024 and government agencies in southeastern Europe in 2025. First seen on blog.talosintelligence.com Jump to article: blog.talosintelligence.com/uat-8302/
-
UAT-8302 and its box full of malware
Cisco Talos is disclosing UAT-8302, a sophisticated, China-nexus advanced persistent threat (APT) group targeting government entities in South America since at least late 2024 and government agencies in southeastern Europe in 2025. First seen on blog.talosintelligence.com Jump to article: blog.talosintelligence.com/uat-8302/
-
Visaprogramm: So weit geht der geplante Datenaustausch mit den USA
Tags: usaUS-Behörden könnten künftig Informationen zu politischen Überzeugungen und Sexualleben von EU-Bürgern auswerten. Nur ein EU-Staat lehnt das offenbar ab. First seen on golem.de Jump to article: www.golem.de/news/visaprogramm-so-weit-geht-der-geplante-datenaustausch-mit-den-usa-2605-208304.html
-
Alleged Silk Typhoon hacker extradited to the United States to face charges
A man accused of working as a hacker for China’s Ministry of State Security has been extradited to the USA from Italy, and faces – if found guilty – the prospect of decades behind bars. First seen on bitdefender.com Jump to article: www.bitdefender.com/en-us/blog/hotforsecurity/silk-typhoon-hacker-extradited-united-states
-
GUEST ESSAY: How augmented reality (AR) can turn building images into ad space with no control
Every major building in America has three things: a physical address, a legal owner, and an unmonitored attack surface. Related: Sam Altman’s quest to usurp the browswer That surface extends from the ground up through every floor, every facade, and… (more”¦) First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/04/guest-essay-how-augmented-reality-ar-can-turn-building-images-into-ad-space-with-no-control/
-
‘Inakzeptable” Destillation – USA werfen China Diebstahl von KI-Technologie vor
First seen on security-insider.de Jump to article: www.security-insider.de/usa-beschuldigt-china-ki-geheimnisse-wissensdestillation-a-724ef52f9543f59c21c47b3a509baaf7/
-
TDL 020 – Why DNS Is Your First Line of Cyber Defense – Chris Buijs
Tags: access, attack, automation, business, cisco, ciso, cloud, container, corporate, country, cyber, cybersecurity, data, ddos, defense, dns, encryption, endpoint, finance, firewall, group, hacker, ibm, infrastructure, Internet, iot, jobs, malicious, microsoft, network, office, phone, programming, router, saas, service, software, startup, strategy, switch, technology, threat, tool, training, update, usa, vulnerability, zero-trustIn Episode 20 of The Defender’s Log, host David Redekop sits down with Amsterdam-based tech veteran Chris Buijs to discuss the often-overlooked backbone of internet security: DNS (Domain Name System). The “Set-it-and-Forget-it” Trap Buijs, who transitioned from an electrician to a network architect, notes that many organizations treat DNS as a “utility” rather than a…
-
TDL 020 – Why DNS Is Your First Line of Cyber Defense – Chris Buijs
Tags: access, attack, automation, business, cisco, ciso, cloud, container, corporate, country, cyber, cybersecurity, data, ddos, defense, dns, encryption, endpoint, finance, firewall, group, hacker, ibm, infrastructure, Internet, iot, jobs, malicious, microsoft, network, office, phone, programming, router, saas, service, software, startup, strategy, switch, technology, threat, tool, training, update, usa, vulnerability, zero-trustIn Episode 20 of The Defender’s Log, host David Redekop sits down with Amsterdam-based tech veteran Chris Buijs to discuss the often-overlooked backbone of internet security: DNS (Domain Name System). The “Set-it-and-Forget-it” Trap Buijs, who transitioned from an electrician to a network architect, notes that many organizations treat DNS as a “utility” rather than a…
-
The curious case of Sean Plankey’s derailed CISA nomination
Questions over who wanted Plankey blocked: On March 3, Ana Visneski, a former head of global disaster response at Amazon Web Services and former chief of digital media for the US Coast Guard, posted on Bluesky that she was “hearing from multiple sources” that Plankey “has been fired and escorted out of Coast Guard HQ…
-
Africa Relinquishes Cyberattack Lead to Latin America, For Now
The volume of cyberattacks targeting Africa declined in the past year, with weekly attacks down 22%, as attackers seemingly shifted their focus to other regions. First seen on darkreading.com Jump to article: www.darkreading.com/threat-intelligence/african-organizations-see-easing-of-cyberattacks
-
Meta-Urteil – Datenübermittlung in die USA ist rechtmäßig
Tags: usaFirst seen on security-insider.de Jump to article: www.security-insider.de/lg-ellwangen-meta-daten-usa-uebermittlung-a-934fc6047c5c9d03fd4e4195c8d8db5f/
-
Meta Is Sued Over Scam Ads on Facebook and Instagram
A lawsuit from the Consumer Federation of America accuses Meta of misleading consumers about its efforts to combat scams advertisements on its platforms. First seen on wired.com Jump to article: www.wired.com/story/meta-is-sued-over-scam-ads-on-facebook-and-instagram/
-
The Ungoverned Workforce: Cybersecurity Insiders Finds 92% Lack Visibility Into AI Identities
Washington D.C., USA, April 21st, 2026, CyberNewswire Cybersecurity Insiders, in collaboration with Saviynt, has released new research indicating that AI identities are increasingly operating within core enterprise systems, often without established governance or visibility. The study finds that while 71% of CISOs and senior security leaders confirm AI tools have access to core systems such…
-
The Ungoverned Workforce: Cybersecurity Insiders Finds 92% Lack Visibility Into AI Identities
Washington D.C., USA, 21st April 2026, CyberNewswire First seen on hackread.com Jump to article: hackread.com/the-ungoverned-workforce-cybersecurity-insiders-finds-92-lack-visibility-into-ai-identities/
-
Seiko USA website defaced as hacker claims customer data theft
The Seiko USA website was defaced over the weekend, displaying a message from attackers claiming they stole its Shopify customer database and threatening to leak it unless a ransom is paid. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/seiko-usa-website-defaced-as-hacker-claims-customer-data-theft/
-
USA auf Platz 1: Globaler Deepfake-Betrug hat 2,19 Milliarden US-Dollar erreicht
First seen on datensicherheit.de Jump to article: www.datensicherheit.de/usa-platz-1-global-deepfake-betrug-219-milliarden-us-dollar
-
Cargo thieving hackers running sophisticated remote access campaigns, researchers find
Losses from cargo theft in North America rose to $6.6 billion in 2025, driven largely by digital attacks, according to the fleet management company Geotab. First seen on therecord.media Jump to article: therecord.media/cargo-thieving-hackers-running-sophisticated-campaigns
-
OpenAI Courts Banks in Trusted Access for Cyber Partner Push
Bank of America, Citi and Goldman Anchor Partner Cohort for OpenAI’s GPT-5.4-Cyber. OpenAI’s Trusted Access for Cyber program prioritizes financial institutions to drive adoption of GPT-5.4-Cyber in regulated environments, highlighting a split with Anthropic’s developer-centric, tech-heavy partnerships and raising questions about partnership value and data-sharing models. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/openai-courts-banks-in-trusted-access-for-cyber-partner-push-a-31447
-
OpenAI Courts Banks in Trusted Access for Cyber Partner Push
Bank of America, Citi and Goldman Anchor Partner Cohort for OpenAI’s GPT-5.4-Cyber. OpenAI’s Trusted Access for Cyber program prioritizes financial institutions to drive adoption of GPT-5.4-Cyber in regulated environments, highlighting a split with Anthropic’s developer-centric, tech-heavy partnerships and raising questions about partnership value and data-sharing models. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/openai-courts-banks-in-trusted-access-for-cyber-partner-push-a-31447
-
TDL 019 – The Psychology Behind a Cyber Breach and the Leaders Who Survive It – Nim Nadarajah
Tags: access, ai, apple, automation, breach, business, cctv, ceo, cio, ciso, cloud, computing, conference, control, corporate, crowdstrike, cve, cyber, cyberattack, cybersecurity, data, dns, edr, email, finance, firewall, governance, group, healthcare, incident, incident response, infrastructure, injection, insurance, Internet, jobs, law, LLM, metric, microsoft, msp, network, office, powershell, privacy, programming, psychology, risk, saas, service, siem, soar, soc, software, startup, strategy, supply-chain, switch, technology, threat, tool, training, usa, vulnerability, windows, zero-trustLeading Through the Cyber Abyss In Episode 019 of The Defender’s Log, host David Redekop sits down with Nim Nadarajah, CISO and Managing Partner of Critical Matrix, to explore the evolving landscape of cybersecurity leadership. From the “annual pilgrimage” of RSAC 2026 to the front lines of incident response, the conversation shifts from technical bits…
-
TDL 019 – The Psychology Behind a Cyber Breach and the Leaders Who Survive It – Nim Nadarajah
Tags: access, ai, apple, automation, breach, business, cctv, ceo, cio, ciso, cloud, computing, conference, control, corporate, crowdstrike, cve, cyber, cyberattack, cybersecurity, data, dns, edr, email, finance, firewall, governance, group, healthcare, incident, incident response, infrastructure, injection, insurance, Internet, jobs, law, LLM, metric, microsoft, msp, network, office, powershell, privacy, programming, psychology, risk, saas, service, siem, soar, soc, software, startup, strategy, supply-chain, switch, technology, threat, tool, training, usa, vulnerability, windows, zero-trustLeading Through the Cyber Abyss In Episode 019 of The Defender’s Log, host David Redekop sits down with Nim Nadarajah, CISO and Managing Partner of Critical Matrix, to explore the evolving landscape of cybersecurity leadership. From the “annual pilgrimage” of RSAC 2026 to the front lines of incident response, the conversation shifts from technical bits…

