Ranking member Raja Krishnamoorthi (D-IL) participates in the first hearing of the U.S. House Select Committee on Strategic Competition between the United States and the Chinese Communist Party, in the Cannon House Office Building on February 28, 2023 in Washington, DC. In an exclusive, Rep. Raja Krishnamoorthi, D-Ill., told CyberScoop that policymakers must learn from past mistakes around 5G. (Photo by Kevin Dietsch/Getty Images)
A laparoscopic surgical robot demonstrates grasping rose petals during the third phase of the 138th edition of the China Import and Export Fair (Canton Fair) at the Canton Fair Complex on Nov. 1, 2025 in Guangzhou, Guangdong Province of China. A Commerce Department office should investigate Chinese government-connected products in more than a dozen emerging industries for security threats, a group of House GOP committee leaders said in a letter they released Wednesday. (Photo by Huang Taiming/VCG via Getty Images)
At this very moment, nation-state actors and opportunistic criminals are looking for any way to target Americans and undermine our national security. Their battlefield of choice is…
National Cyber Director Sean Cairncross, then-CEO, Millenium Challenge Corporation, speaks onstage during the 2019 Concordia Annual Summit – Day 2 at Grand Hyatt New York on Sept. 24, in New York City. (Photo by Riccardo Savi/Getty Images for Concordia Summit)
In recent years, the cybersecurity industry has made significant strides in securing endpoints with advanced Endpoint Detection and Response (EDR) solutions, and we have been successful in…
A sign for the National Security Agency (NSA), U.S. Cyber Command and Central Security Service, is seen near the visitor’s entrance to the headquarters of the NSA at the entrance in Fort Meade, Maryland, February 14, 2018. (Photo by SAUL LOEB/AFP via Getty Images)
The Chinese hacking group gained persistent access to a popular mapping tool by turning one of its features into a webshell and hardcoding access, according to ReliaQuest. (Image Via Getty)
The Chinese hacking group gained persistent access to a popular mapping tool by turning one of its features into a webshell and hardcoding access, according to ReliaQuest.
The Signal encrypted messaging application is seen on a mobile device in this illustration photo taken in Warsaw, Poland on March 25, 2025. (Photo by Jaap Arriens/NurPhoto)
Phantom Taurus has stolen sensitive data from ministries of foreign affairs, embassies, diplomats and telecom networks in the Middle East, Africa and Asia, researchers said.