US Agencies Say Russian Hackers Compromised Defense Contractors
Hackers backed by the Russian government have breached the networks of multiple US defense contractors in a sustained campaign that has revealed sensitive information about US weapons-development communications infrastructure, the federal government.....»»
Apple pulls US-funded Radio Free Europe app from Russia
The Radio Free Europe/Radio Liberty news app has been removed from the App Store in Russia, in another case of the state mandating what apps are allowed.The App Store is a powerful digital ecosystem.The move comes less than a month after the Russian.....»»
Citing “decreasing” launch opportunities, ABL Space will pivot to missile defense
"Our path to making a big contribution as a commercial launch company narrowed considerably." A 7-year-old launch company that has yet to have a rocket successfully lift off annou.....»»
Toxin was released into the Congaree River in South Carolina: Agencies did little to stop it, greens say
High amounts of a toxic chemical are being discharged into the Congaree and Cooper rivers from plastics factories in South Carolina, but state and federal regulators are doing little to control the pollution, a new report says......»»
USX Cyber strengthens phishing defense in GUARDIENT XDR
USX Cyber released advanced phishing protection tools within its GUARDIENT XDR platform. This latest enhancement enables organizations to strengthen defenses against sophisticated phishing attacks by providing employees with realistic training and h.....»»
Three innovative ways to help countries hit by climate disasters, beyond a loss and damage fund
These days, it's hard to escape news stories discussing how climate change is contributing to extreme weather disasters, including the recent U.S. hurricanes. Aid agencies are increasingly worried about the widespread damage......»»
Study of US law enforcement co-responder programs identifies wide variations
In response to demands for police reform, agencies have begun to pursue alternative responses to calls involving mental health crises. Across the United States, jurisdictions are adopting co-responder teams that bring qualified mental or behavioral h.....»»
We Need Scientific Brainstorming about Shared Global Dangers
It is difficult to disentangle Russian and Chinese scientists from international science cooperation. That is a good thing.....»»
Zero-days dominate top frequently exploited vulnerabilities
A joint report by leading cybersecurity agencies from the U.S., UK, Canada, Australia, and New Zealand has identified the most commonly exploited vulnerabilities of 2023. Zero-day vulnerabilities on the rise The advisory highlights that malicious cyb.....»»
If you use one of these passwords, hackers will love you
Password manager NordPass released its annual list of the most popular passwords, and the results are nothing short of shocking......»»
Aerospace employees targeted with malicious “dream job” offers
It’s not just North Korean hackers who reach out to targets via LinkedIn: since at least September 2023, Iranian threat actor TA455 has been trying to compromise workers in the aerospace industry by impersonating job recruiters on the popular e.....»»
Hot Topic breach: Has your credit card info been compromised?
If you’re wondering whether your personal and financial data has been compromised in the massive Hot Topic breach, you can use two separate online tools to check: Have I Been Pwned? or DataBreach.com. Which data was compromised? News of a poten.....»»
Massive troves of Amazon, HSBC employee data leaked
A threat actor who goes by the online moniker “Nam3L3ss” has leaked employee data belonging to a number of corporations – including Amazon, 3M, HSBC and HP – ostensibly compromised during the May 2023 MOVEit hack by the Cl0p r.....»»
North Korean hackers use infected crypto apps to target Macs
North Korean hackers have disguised malware in seemingly harmless macOS apps using sophisticated code to bypass security checks and target unsuspecting users.Malware apps continue to target Mac usersIn a recent discovery, researchers at Jamf Threat L.....»»
The US Has a Cloned Sheep Contraband Problem
After a Montana man illegally cloned and bred an endangered giant sheep species, government agencies must now contend with the illicit offspring......»»
Planetary defense mission Hera blasts off toward Mars
The European Space Agency's Hera mission is on its way toward Mars, where it will get a gravity assist before going on to its asteroid target......»»
Claude AI to process secret government data through new Palantir deal
Critics worry Anthropic is endangering its "ethical" AI stance due to defense associations. Anthropic has announced a partnership with Palantir and Amazon Web Services to bring it.....»»
A new form of macOS malware is being used by devious North Korean hackers
North Korean hackers are targeting crypto businesses with backdoors again......»»
Law enforcement operation takes down 22,000 malicious IP addresses worldwide
Operation Synergia II took aim at phishing, ransomware, and information stealing. An international coalition of police agencies has taken a major whack at criminals accused of run.....»»
North Korean hackers employ new tactics to compromise crypto-related businesses
North Korean hackers are targeting crypto-related businesses with phishing emails and novel macOS-specific malware. The crypto-related phishing campaign Since July 2024, phishing emails seemingly containing helpful information on risks related to the.....»»
Addigy simplifies compliance for Apple devices with one-click CMMC and DISA STIG benchmarks
For managed service providers (MSPs) and IT administrators working with the Department of Defense or its contractors, staying compliant with cybersecurity rules isn’t just important—it’s essential. Yet, ensuring compliance with standards like t.....»»