Government

Six metrics policymakers need to track cyber resilience

Six metrics policymakers need to track cyber resilience 2025-10-09 at 07:48 By Anamarija Pogorelec Most countries are still making national cyber policy decisions without reliable numbers. Regulations often focus on incident reporting after damage is done, but they fail to give governments a forward-looking picture of resilience. A new report from Zurich Insurance Group argues […]

React to this headline:

Loading spinner

Six metrics policymakers need to track cyber resilience Read More »

North Korea’s IT workers are targeting firms beyond tech, crypto, and the U.S.

North Korea’s IT workers are targeting firms beyond tech, crypto, and the U.S. 2025-10-01 at 17:24 By Zeljka Zorz North Korea’s clandestine IT Worker (ITW) program, which is long known for targeting U.S. technology firms and crypto firms, has broadened its scope to attempt to infiltrate a variety of industries worldwide, including finance, healthcare, public

React to this headline:

Loading spinner

North Korea’s IT workers are targeting firms beyond tech, crypto, and the U.S. Read More »

Too many Cisco ASA firewalls still unsecure despite zero-day attack alerts

Too many Cisco ASA firewalls still unsecure despite zero-day attack alerts 2025-10-01 at 13:36 By Zeljka Zorz Despite Cisco and various cybersecurity agencies warning about attackers actively exploting zero-day vulnerabilities (CVE-2025-20333 and CVE-2025-20362) in Cisco Adaptive Security Appliances (ASA) for months, there are still around 48,000 vulnerable appliances out there. The number is provided by

React to this headline:

Loading spinner

Too many Cisco ASA firewalls still unsecure despite zero-day attack alerts Read More »

CISA says it will fill the gap as some federal funding for MS-ISAC dries up

CISA says it will fill the gap as some federal funding for MS-ISAC dries up 2025-09-30 at 18:45 By Zeljka Zorz The cooperative agreement between the U.S. Cybersecurity and Infrastructure Security Agency (CISA) and the not-for-profit Center for Internet Security is ending today, the agency has announced on Monday, and CISA will take it upon

React to this headline:

Loading spinner

CISA says it will fill the gap as some federal funding for MS-ISAC dries up Read More »

New Guidance Calls on OT Operators to Create Continually Updated System Inventory

New Guidance Calls on OT Operators to Create Continually Updated System Inventory 2025-09-30 at 15:06 By Eduard Kovacs Agencies in several countries have created guidance titled ‘Creating and Maintaining a Definitive View of Your OT Architecture’. The post New Guidance Calls on OT Operators to Create Continually Updated System Inventory appeared first on SecurityWeek. This

React to this headline:

Loading spinner

New Guidance Calls on OT Operators to Create Continually Updated System Inventory Read More »

California Gov. Gavin Newsom Signs Bill Creating AI Safety Measures

California Gov. Gavin Newsom Signs Bill Creating AI Safety Measures 2025-09-30 at 14:53 By Mike Lennon The Transparency in Frontier Artificial Intelligence Act (TFAIA) requires AI companies to implement and disclose publicly safety protocols to prevent their most advanced models from being used to cause major harm. The post California Gov. Gavin Newsom Signs Bill

React to this headline:

Loading spinner

California Gov. Gavin Newsom Signs Bill Creating AI Safety Measures Read More »

The Cybersecurity Information Sharing Act Faces Expiration

The Cybersecurity Information Sharing Act Faces Expiration 2025-09-30 at 04:02 By Kevin Townsend The CISA is set to expire on September 30, 2025, raising urgent questions about risk, politics, and the future of threat intelligence. The post The Cybersecurity Information Sharing Act Faces Expiration appeared first on SecurityWeek. This article is an excerpt from SecurityWeek

React to this headline:

Loading spinner

The Cybersecurity Information Sharing Act Faces Expiration Read More »

Cyberattack on JLR Prompts £1.5 Billion UK Government Intervention

Cyberattack on JLR Prompts £1.5 Billion UK Government Intervention 2025-09-29 at 14:37 By Eduard Kovacs The government has announced a support package, but a cybersecurity expert has raised some concerns. The post Cyberattack on JLR Prompts £1.5 Billion UK Government Intervention appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source

React to this headline:

Loading spinner

Cyberattack on JLR Prompts £1.5 Billion UK Government Intervention Read More »

Cisco ASA zero-day vulnerabilities exploited in sophisticated attacks

Cisco ASA zero-day vulnerabilities exploited in sophisticated attacks 2025-09-26 at 14:19 By Zeljka Zorz A widespread campaign aimed at breaching organizations via zero-day vulnerabilities in Cisco Adaptive Security Appliances (ASA) has been revealed by the US, UK, Canadian and Australian cybersecurity agencies. The suspected state-sponsored threat actor behind it is believed to be the one

React to this headline:

Loading spinner

Cisco ASA zero-day vulnerabilities exploited in sophisticated attacks Read More »

Perspective: Why Politics in the Workplace is a Cybersecurity Risk

Perspective: Why Politics in the Workplace is a Cybersecurity Risk 2025-09-25 at 15:33 By Joshua Goldfarb Bringing politics into professional spaces undermines decision-making, collaboration, and ultimately weakens security teams. The post Perspective: Why Politics in the Workplace is a Cybersecurity Risk appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source

React to this headline:

Loading spinner

Perspective: Why Politics in the Workplace is a Cybersecurity Risk Read More »

The fight to lock down drones and their supply chains

The fight to lock down drones and their supply chains 2025-09-25 at 10:12 By Sinisa Markovic Drones have already shown their impact in military operations, and their influence is spreading across the agricultural and industrial sectors. Given their technological capabilities, we need to be aware of the risks they bring. Drones as a new attack

React to this headline:

Loading spinner

The fight to lock down drones and their supply chains Read More »

US Secret Service Blocks Massive Telecom Attack in New York

US Secret Service Blocks Massive Telecom Attack in New York 2025-09-24 at 19:44 By Karl Sigler The Secret Service’s takedown in New York shines a light on a type of threat that is technically fascinating and deeply concerning for national security: large-scale cellular interception networks leveraging cell-site simulators (CSS), also known as IMSI catchers or

React to this headline:

Loading spinner

US Secret Service Blocks Massive Telecom Attack in New York Read More »

U.S. Secret Service takes down network of devices threatening government officials

U.S. Secret Service takes down network of devices threatening government officials 2025-09-23 at 16:48 By Sinisa Markovic The U.S. Secret Service has broken up a network of electronic devices spread across the New York tristate area that officials say posed an imminent threat to national security. The devices were being used to launch telecommunications attacks

React to this headline:

Loading spinner

U.S. Secret Service takes down network of devices threatening government officials Read More »

CISA looks to partners to shore up the future of the CVE Program

CISA looks to partners to shore up the future of the CVE Program 2025-09-12 at 15:32 By Zeljka Zorz The US Cybersecurity and Infrastructure Security Agency (CISA) has affirmed its continuing support for the Common Vulnerabilities and Exposures (CVE) program. “If we want to outpace and outmaneuver our adversaries, we must first ensure that defenders

React to this headline:

Loading spinner

CISA looks to partners to shore up the future of the CVE Program Read More »

CISA: CVE Program to Focus on Vulnerability Data Quality

CISA: CVE Program to Focus on Vulnerability Data Quality 2025-09-12 at 14:01 By Ionut Arghire CISA says it is time for the CVE Program to focus on improving trust, responsiveness, and the caliber of vulnerability data. The post CISA: CVE Program to Focus on Vulnerability Data Quality appeared first on SecurityWeek. This article is an

React to this headline:

Loading spinner

CISA: CVE Program to Focus on Vulnerability Data Quality Read More »

Deepfakes are rewriting the rules of geopolitics

Deepfakes are rewriting the rules of geopolitics 2025-09-10 at 09:21 By Sinisa Markovic Deception and media manipulation have always been part of warfare, but AI has taken them to a new level. Entrust reports that deepfakes were created every five minutes in 2024, while the European Parliament estimates that 8 million will circulate across the

React to this headline:

Loading spinner

Deepfakes are rewriting the rules of geopolitics Read More »

How Managed Detection and Response (MDR) Helps Navigate Regulatory Requirements

How Managed Detection and Response (MDR) Helps Navigate Regulatory Requirements 2025-09-05 at 21:17 By Discover how MDR services and MDR providers can help you meet complex regulatory requirements like HIPAA, GDPR, and FedRAMP with ease. Enhance your security posture: Learn how managed detection and response (MDR) goes beyond basic security, providing the 24/7 monitoring and

React to this headline:

Loading spinner

How Managed Detection and Response (MDR) Helps Navigate Regulatory Requirements Read More »

US Offers $10 Million for Three Russian Energy Firm Hackers

US Offers $10 Million for Three Russian Energy Firm Hackers 2025-09-04 at 15:41 By Ionut Arghire Marat Tyukov, Mikhail Gavrilov, and Pavel Akulov targeted US critical infrastructure and over 500 energy companies in 135 countries. The post US Offers $10 Million for Three Russian Energy Firm Hackers appeared first on SecurityWeek. This article is an

React to this headline:

Loading spinner

US Offers $10 Million for Three Russian Energy Firm Hackers Read More »

Nevada State Offices Closed Following Disruptive Cyberattack

Nevada State Offices Closed Following Disruptive Cyberattack 2025-08-27 at 16:56 By Ionut Arghire State websites and phone lines were taken offline, but officials say emergency services and personal data remain unaffected. The post Nevada State Offices Closed Following Disruptive Cyberattack appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source React

React to this headline:

Loading spinner

Nevada State Offices Closed Following Disruptive Cyberattack Read More »

Scroll to Top