US Tightens Rules on China Tech Investments
The US moves to restrict investments in Chinese tech sectors. Beijing opposes the US decision, emphasizing market economy rules. These…
DHS Streamlines Cybersecurity Job Clearances to Fill Vacancies
DHS is simplifying the clearance process for cybersecurity jobs. Efforts include reducing clearance requirements and expanding interim clearances. Emphasis on…
Lawmakers Push for Federal Privacy Bill Amid New Challenges
APRA aims to create a federal consumer privacy framework. Industry groups and civil rights advocates express concerns. Lawmakers face challenges…
Maryland Grand Jury Indicts Russian for Cyber Attacks on Ukraine
Maryland grand jury indicts Russian for cyberattacks on Ukraine. WhisperGate malware used in attacks on military and civilian targets. U.S.…
Supreme Court Blocks Effort to Limit Government’s Fight Against Misinformation
The Supreme Court rejected the effort to limit government information-sharing. Plaintiffs lacked standing and evidence to prove claims of censorship.…
Cyber Defense Needs Bold Actions Against Global Threats
Cyberattacks on critical U.S. infrastructure remain a significant threat. Strengthening cybersecurity defenses and adding offensive deterrence is crucial. Preparation and…
Chinese Hackers Intensify Ransomware Campaigns: Researchers Report
Chinese-linked cyberespionage groups increasingly use ransomware. This tactic complicates attribution and serves strategic purposes. Recent analysis shows overlaps with Chinese…
Google Cloud Hires Former Federal CISO Chris DeRusha
Chris DeRusha joins Google Cloud to enhance cybersecurity efforts. He previously served as Federal Chief Information Security Officer. His expertise…
CDK Global Ransomware Attack Hits Major Auto Dealers
CDK Global ransomware attack disrupts major U.S. car dealers. BlackSuit demands millions, linked to Royal and Conti ransomware. Affected dealers…
Chinese Hackers Target Foreign Ministries and Embassies Globally
Chinese-speaking hackers target foreign ministries worldwide. SneakyChef uses SugarGh0st and SpiceRAT tools for espionage. Vigilance and collaboration are key to…