Court indicts 14 North Korean IT workers tied to $88 million in illicit gains It’s part of a broader effort to counter Pyongyang’s use of tech professionals to fool U.S. companies and nonprofits. By Tim Starks
U.S. Senator Ben Ray Lujan, D-N.M., leaves the Senate floor following a vote on Jan. 23. (Photo by Samuel Corum/Getty Images) ***Local Caption *** Ben Ray Lujan Senators, witnesses: $3B for ‘rip and replace’ a good start to preventing Salt Typhoon-style breaches Geopolitics By Tim Starks
Latest round of MITRE ATT&CK evaluations put cybersecurity products through rigors of ransomware By Greg Otto
The NSO Group company logo is displayed on a wall of a building next to one of their branches in the southern Israeli Arava valley near Sapir community centre on February 8, 2022. NSO Group currently has 39 legal cases against it due to the fallout around its Pegasus spyware product. (Photo by MENAHEM KAHANA / AFP) Legal barriers complicate justice for spyware victims Some recent court rulings show the difficult road of anti-spyware litigation, but those in the fight also see signs of promise. By Tim Starks
(Getty Images) Exclusive: Feds are probing 764, The Com’s use of cybercriminal tactics to carry out violent crimes By Greg Otto Jana Winter
Broken RGB screen close-up with a missing pixel on the bottom right. (Getty Images) Zero trust: How the ‘Jia Tan’ hack complicated open-source software By Christian Vasquez
Benjamin Franklin writing his Autobiography. Franklin’s creation of a volunteer fire department has sparked an idea amongst the cybersecurity community. (Photo by Culture Club/Getty Images) How Benjamin Franklin is inspiring defenders to protect critical infrastructure By Christian Vasquez
Want to scale cyber defenders? Focus on AI-enabled security and organization-wide training By Jay Bhalodia
Palo Alto Networks’ Eric Trexler talks how AI is affecting cybersecurity planning By Scoop News Group
Scoop News Group Graphic Tackling AI-powered threats with zero trust and least privilege access By Scoop News Group
The Microsoft logo is illuminated on a wall during a Microsoft launch event on May 2, 2017 in New York City. (Photo by Drew Angerer/Getty Images) Microsoft closes 2024 with extensive security update
Sen. Ron Wyden, D-Ore., talks with reporters as he leaves the U.S. Capitol following the first vote of the week on June 17. (Photo by Chip Somodevilla/Getty Images) Wyden legislation would mandate FCC cybersecurity rules for telecoms
The spotlight is on the Transportation Security Administration and other agencies’ work on pipeline cybersecurity. (Photo by Joe Raedle/Getty Images) Steady leadership prepares TSA to face evolving cyber threats
Power lines for new Bitcoin mining warehouses under construction at the Whinstone U.S. Bitcoin mining facility in Rockdale, Texas, are pictured on Oct. 9, 2021. (Photo by MARK FELIX/AFP /AFP via Getty Images) Public and private sectors must partner to address generative AI’s interdependent energy and security requirements
Jessica Rosenworcel (L), Chairwoman of the Federal Communications Commission (FCC) and FCC Commissioner Brendan Carr arrives to testify during a House Energy and Commerce Committee Subcommittee hearing in 2022. (Photo by Kevin Dietsch/Getty Images) FCC, for first time, proposes cybersecurity rules tied to wiretapping law
Rep. Andrew Garbarino, R-N.Y., chair of the House Homeland Security Subcommittee on Cybersecurity and Infrastructure Protection, holds a hearing on CISA’s secure-by-design initiative on Dec. 5, 2024, in Washington, D.C. (Screenshot) Industry leaders on CISA’s secure-by-design pledge: A great program with some issues
Katherine Rawls, the Department of Transportation’s director of sector cyber engagement, participates in a Scoop News Group-produced GDIT event on Dec. 3, 2024, in Washington, D.C. Also pictured are John Garstka, left, cyber warfare director at DOD’s Office of the Under Secretary of Defense for Acquisition & Sustainment, Dr. Matthew Rogers, right, industrial control systems expert at CISA, and Dr. Emma Stewart, second from right, chief power grid scientist & research strategist at the Idaho National Laboratory. (Scoop News Group photo) Federal transportation officials aim to ‘bridge gaps’ in OT cybersecurity
The Russian flag flies over the country’s embassy in Washington, D.C., on Feb. 16, 2024. (Photo by Brendan SMIALOWSKI / AFP) Russian-linked Turla caught using Pakistani APT infrastructure for espionage
Kenstocker, iStock / Getty Images Plus Study shows potentially higher prevalence of spyware infections than previously thought
Feb 19 2025 Zero Trust Summit INTERNATIONAL SPY MUSEUM, WASHINGTON, DC Register for Zero Trust Summit
Mar 4 2025 Cybersecurity Modernization Summit Virtual Event Register for Cybersecurity Modernization Summit
Mar 19 2025 Elastic Public Sector Summit Waldorf Astoria, Washington, D.C. Register for Elastic Public Sector Summit