Rep. Delia Ramirez, D-ll., speaks during an oversight forum with Democratic members of the House Homeland Security Committee at the U.S. Capitol Building on July 22, 2025. (Photo by Anna Moneymaker/Getty Images)
She replaces Rep. Eric Swalwell following his resignation, giving her the position of ranking member of the Subcommittee on Cybersecurity and Infrastructure Protection.
Xu Zewei was allegedly directed by China’s intelligence services to conduct a sweeping espionage campaign to steal data on COVID-19 research and other U.S. policy interests.
The National Vulnerability Database will now only analyze vulnerabilities in critical software, systems used in the federal government and those under active exploitation.
The vendor disclosed one actively exploited zero-day vulnerability in Microsoft Office SharePoint that allows attackers to view information and make changes to disclosed information.
Forest Blizzard, a threat group attributed to Russia’s GRU, hijacked network traffic to steal credentials and tokens for Microsoft accounts and other services.
The program comes as the tech industry races to secure software before similar AI-powered offensive capabilities become too much for defenders to handle.
A corporate logo for Microsoft hangs above the door to its office building on 8th Avenue on June 24, 2025, in New York City. (Photo by Gary Hershorn/Getty Images)
Attackers have turned AI into a “force multiplier” for the country’s expansive scheme to get and keep operatives hired at global companies, researchers said.
Microsoft and authorities dismantled Tycoon 2FA’s infrastructure. A seizure notice is displayed on of the phishing platform’s domains March 4, 2026. (Microsoft)
Microsoft, which led the effort, said it seized 330 domains that powered the phishing platform’s core infrastructure. The alleged creator was also named in a civil complaint.