The Russian flag flies over the country’s embassy in Washington, D.C., on Feb. 16, 2024. (Photo by Brendan SMIALOWSKI / AFP) (Photo by BRENDAN SMIALOWSKI/AFP via Getty Images) US officials warn foreign disinformation from Russia may flood post-election period The IC said Moscow-directed actors and other countries could threaten election officials with violence to disrupt vote counting and certification. By Derek B. Johnson
Ambulances lined up outside NYU Langone Health hospital on April 23, 2020 in New York City. Ransomware cases on health care facilities have led to increase in stroke and cardiac arrest cases at hospitals receiving patients from nearby facilities paralyzed by such attacks. (Getty Images) Ransomware attacks on health care sector are driving increase in emergency patient care Cybersecurity By Tim Starks
(Photo by SUZANNE CORDEIRO / AFP) (Photo by SUZANNE CORDEIRO/AFP via Getty Images) SEC hits four companies with fines for misleading disclosures around SolarWinds hack Cybersecurity By Derek B. Johnson
Justice Department rule aims to curb the sale of Americans’ personal data overseas By Derek B. Johnson
Broken RGB screen close-up with a missing pixel on the bottom right. (Getty Images) Zero trust: How the ‘Jia Tan’ hack complicated open-source software The volunteers that maintain open-source software have always been knocked around by the tech community. The Jia Tan hack made it all so much worse. By Christian Vasquez
David Wall/Getty Images Sanctioned and exposed, Predator spyware maker group has gone awfully quiet By Tim Starks
Benjamin Franklin writing his Autobiography. Franklin’s creation of a volunteer fire department has sparked an idea amongst the cybersecurity community. (Photo by Culture Club/Getty Images) How Benjamin Franklin is inspiring defenders to protect critical infrastructure By Christian Vasquez
The front of the U.S. Supreme Court building is seen after sunset on June 24, 2024, in Washington, DC. (Photo by J. David Ake/Getty Images) Cybersecurity regulations face ‘uphill battle’ after Chevron ruling By Derek B. Johnson
The pressing threat of Chinese-made drones flying above U.S. critical infrastructure By Brian Harrell Travis Moran
Want to scale cyber defenders? Focus on AI-enabled security and organization-wide training By Jay Bhalodia
Ted Schlein on the cybersecurity industry and the latest twist in the Trump-Iran hacking saga By CyberScoop Staff
Hack-and-leak op targets Trump; a technical deep dive with John Hammond on the CrowdStrike outage By CyberScoop Staff
A deep dive with Tim Starks on the Biden administration’s cybersecurity initiatives By CyberScoop Staff
(Courtesy of Brazil Federal Police) Brazil’s Federal Police arrest alleged National Public Data hacker
The original stock picture (left) and an AI fake (right) used by a North Korean threat actor who posed as a U.S.-based software engineer and was hired by the cyber firm KnowBe4. (Photo credit: KnowBe4) Pyongyang on the payroll? Signs that your company has hired a North Korean IT worker
PARIS, FRANCE – JUNE 04: In this photo illustration the GitHub logo is seen on the screen of an iPhone in front of a computer screen showing a Microsoft logo on June 04, 2018 in Paris, France. (Photo Illustration by Chesnot/Getty Images) GitHub patches critical vulnerability in its Enterprise Servers
Monday, December 7, 2020 – Cedars-Sinai Hospital, a victim of the gang. (Robert Gauthier/ Los Angeles Times) Alleged Anonymous Sudan leaders charged, prolific gang’s tool disabled
Bojanikus, iStock/Getty Images Plus Iranian hackers are going after critical infrastructure sector passwords, agencies caution
Hispanic voters go to the polls for early voting at the Miami-Dade Government Center on Oct. 21, 2004 in Miami. (Photo by G. De Cardenas/Getty Images) Spanish-speaking voters are in the crosshairs of disinformation agents
LONDON,ENGLAND – MARCH 21: (Editors note: The email address has been pixelated) In this photo illustration a spam ‘Phishing’ email is displayed on a laptop screen on March 21,2022 in London,England. (Photo by Peter Dazeley/Getty Images) Here’s how attackers are getting around phishing defenses
NEW YORK, NY – Exterior view of the Microsoft Times Square building on January 29, 2023 in New York City. (Photo by Kena Betancur/VIEWpress) Ransomware encryption down amid surge of attacks, Microsoft says
Cyber, internet security and privacy concept. (Getty Images) Organizations can substantially lower vulnerabilities with secure-by-design practices, report finds
A prototype satellite used in Amazon’s Project Kuiper. (Courtesy of Amazon) How satellites are pushing security innovation at Amazon
FrankyDeMeyer/Getty Images Tens of thousands of IPs vulnerable to Fortinet flaw dubbed ‘must patch’ by feds
Cybersecurity and Infrastructure Security Agency Director Jen Easterly testified before a House Homeland Security Subcommittee, at the Rayburn House Office Building on April 28, 2022. (Photo by Kevin Dietsch/Getty Images) CISA advisory committee approves four draft reports on critical infrastructure resilience
Visitors walk past the U.S. Capitol on September 11, 2023 in Washington, DC. (Photo by Chip Somodevilla/Getty Images) Lawmakers press agencies, telecoms for more details on Salt Typhoon hacks
Dec 3 2024 Emerge: Operational Technology Waldorf Astoria, Washington, D.C. Register for Emerge: Operational Technology
Feb 19 2025 Zero Trust Summit INTERNATIONAL SPY MUSEUM, WASHINGTON, DC Register for Zero Trust Summit