(Getty Images) Clop is back to wreak havoc via vulnerable file-transfer software In what we can assure you is a new cybersecurity incident despite sounding incredibly similar to incidents of past notoriety: threat actors tied to a notorious ransomware… By Greg Otto
A hacker with China’s national flag in background. (Getty Images) PHP backdoor looks to be work of Chinese-linked APT group Cybercrime By Greg Otto
(Getty Images) Playbook advises federal grant managers how to build cybersecurity into their programs Government By Tim Starks
CISA pitches updated cyber incident response plan as an ‘agile, actionable’ framework By Matt Bracken
Amnesty International exposes Serbian police’s use of spyware on journalists, activists By Tim Starks
The NSO Group company logo is displayed on a wall of a building next to one of their branches in the southern Israeli Arava valley near Sapir community centre on February 8, 2022. NSO Group currently has 39 legal cases against it due to the fallout around its Pegasus spyware product. (Photo by MENAHEM KAHANA / AFP) Legal barriers complicate justice for spyware victims Some recent court rulings show the difficult road of anti-spyware litigation, but those in the fight also see signs of promise. By Tim Starks
(Getty Images) Exclusive: Feds are probing 764, The Com’s use of cybercriminal tactics to carry out violent crimes By Greg Otto Jana Winter
Broken RGB screen close-up with a missing pixel on the bottom right. (Getty Images) Zero trust: How the ‘Jia Tan’ hack complicated open-source software By Christian Vasquez
Benjamin Franklin writing his Autobiography. Franklin’s creation of a volunteer fire department has sparked an idea amongst the cybersecurity community. (Photo by Culture Club/Getty Images) How Benjamin Franklin is inspiring defenders to protect critical infrastructure By Christian Vasquez
Want to scale cyber defenders? Focus on AI-enabled security and organization-wide training By Jay Bhalodia
Palo Alto Networks’ Eric Trexler talks how AI is affecting cybersecurity planning By Scoop News Group
Scoop News Group Graphic Tackling AI-powered threats with zero trust and least privilege access By Scoop News Group
(Department of Justice) Cybercriminal marketplace Rydox seized in international law enforcement operation
(Photo by STEFANI REYNOLDS/AFP via Getty Images) Notorious Nigerian cybercriminal tied to BEC scams extradited to U.S.
U.S. Senator Ben Ray Lujan, D-N.M., leaves the Senate floor following a vote on Jan. 23. (Photo by Samuel Corum/Getty Images) ***Local Caption *** Ben Ray Lujan Senators, witnesses: $3B for ‘rip and replace’ a good start to preventing Salt Typhoon-style breaches
Turla was able bypass traditional security measures and gain long-term access to Ukrainian military networks. (Getty Images) Turla living off other cybercriminals’ tools in order to attack Ukrainian targets
MITRE at the 2020 RSA Conference in San Francisco. (Greg Otto / Scoop News Group) Latest round of MITRE ATT&CK evaluations put cybersecurity products through rigors of ransomware
The Microsoft logo is illuminated on a wall during a Microsoft launch event on May 2, 2017 in New York City. (Photo by Drew Angerer/Getty Images) Microsoft closes 2024 with extensive security update
Sen. Ron Wyden, D-Ore., talks with reporters as he leaves the U.S. Capitol following the first vote of the week on June 17. (Photo by Chip Somodevilla/Getty Images) Wyden legislation would mandate FCC cybersecurity rules for telecoms
The spotlight is on the Transportation Security Administration and other agencies’ work on pipeline cybersecurity. (Photo by Joe Raedle/Getty Images) Steady leadership prepares TSA to face evolving cyber threats
Feb 19 2025 Zero Trust Summit INTERNATIONAL SPY MUSEUM, WASHINGTON, DC Register for Zero Trust Summit
Mar 4 2025 Cybersecurity Modernization Summit Virtual Event Register for Cybersecurity Modernization Summit
Mar 19 2025 Elastic Public Sector Summit Waldorf Astoria, Washington, D.C. Register for Elastic Public Sector Summit