Keyword: cybersecurity
-
Major AI service providers continue to deploy content moderation algorithms designed to suppress and manipulate viewpoints, actively enforcing censorship under the guise of moderation. From Foreign PsyOps to Domestic Thought Control The censorship and content manipulation we see today did not emerge organically—it was the result of government-directed psychological operations (PsyOps) repurposed for domestic control. What was once used in foreign influence campaigns to destabilize adversarial regimes or control narratives abroad was turned inward—against the American people. The Twitter Files, exposed by investigative journalists Matt Taibbi and Michael Shellenberger, provided irrefutable evidence that U.S. government agencies used taxpayer dollars to...
-
WASHINGTON — Former chief information security officer (CISO) for acquisition and sustainment at the Department of Defense is headed back to the Pentagon — this time as DoD’s CISO — following her previous suspension from the department for allegedly disclosing classified data.Katie Arrington served as a state lawmaker for South Carolina and had an unsuccessful bid for Congress before taking her post in 2019 as the chief information officer for A&S during President Donald Trump’s first administration. She played an active role in standing up the department’s Cybersecurity Maturity Model Certification (CMMC) program before she was put on administrative leave...
-
Less than three years before Elon Musk tapped him to take part in a sweeping overhaul of the US government, Edward Coristine, then 17, was the subject of a heated dispute between two executives at the Arizona-based cybersecurity firm where he was an intern. At issue was whether to allow Coristine to keep his job even though he was suspected of leaking proprietary information to a competitor. “You’re willing to risk our entire network to a 17-year-old?” one frustrated executive asked the company’s CEO in 2022. “Are you for real right now?” In a recording of the call, reviewed by...
-
New York -- When a suspicious video of ballots being ripped up in Pennsylvania gained attention on social media last October, federal agencies responded quickly and called it out as Russian disinformation. On Election Day in November, bomb threats to polling places in numerous states caused relatively few disruptions to voting. It’s one of the many scenarios covered by the nation’s cybersecurity agency in its outreach to state and local officials.The Trump administration’s downsizing and disbanding of federal agencies has hit efforts that improve election security and monitor foreign influence. That could create gaps for America’s enemies to exploit the...
-
Rhode Island Governor Dan McKee announced late on Friday that the state’s data system has been hit with a major cyberattack. McKee will hold an unprecedented press conference Friday at 7:30 PM regarding a cybersecurity breach of the RIBridges system. That system is managed by Deloitte, one of Rhode Island’s largest tech vendors, and the exposed data includes HealthSource, Medicaid, and SNAP. According to McKee’s office, on December 13, [today] the State was informed by its vendor, Deloitte, that there was a major security threat to the RIBridges system. In response, we have proactively taken the system offline so that...
-
CISA has urged ‘highly targeted’ individuals in the US Government or in senior political positions to immediately review and implement strict security measures with their mobile devices. This comes after multiple major US telecoms firms were hit by security breaches earlier in 2024, most likely originating from state-sponsored Chinese hackers. Recent reports also confirmed that the group behind the attack, Salt Typhoon, had not yet been fully eradicated, and still lurks inside US telecoms networks. As part of its advisory, CISA also released a best practice guide for mobile communications, which includes instructions on using end-to-end encryption, password managers, Fast...
-
The Trump administration has moved to push out a swathe of federal workers previously involved in combating election-related disinformation, according to three people familiar with the matter, amid allegations from congressional Republicans that their work unfairly targeted conservative speech online. Roughly half a dozen employees from the Cybersecurity and Infrastructure Security Agency who once worked in its Election Security and Resilience division were notified Thursday night they were being put on administrative leave, said the three people, who were granted anonymity to discuss sensitive personnel matters.
-
SNIP The two officials, who spoke to Reuters on condition of anonymity for fear of retaliation, said some senior career employees at OPM have had their access revoked to some of the department's data systems.SNIPOfficials affected by the move can still log on and access functions such as email but can no longer see the massive datasets that cover every facet of the federal workforce.SNIP"This makes it much harder for anyone outside Musk's inner circle at OPM to know what's going on," Moynihan said.MUSK INFLUENCEA team including current and former employees of Musk assumed command of OPM on Jan. 20,...
-
Intelligence firm Graphika said a Beijing-linked campaign known as "Spamouflage" spread disinformation about Spain's deadly floods last year. A Chinese online influence operation impersonated a human rights group in Spain to spread calls on social media for the Spanish government to be overthrown following deadly floods in Valencia last year, according to research by intelligence firm Graphika. The Chinese state-linked campaign — dubbed "Spamouflage" by analysts — posed as the Spain-based NGO Safeguard Defenders on social media platforms including Facebook, TikTok and X to circulate content criticising the government's response to the floods that killed at least 225 people last...
-
Chinese startup DeepSeek - whose new low-cost AI model rattled tech stocks Monday - suffered a large-scale cyberattack, causing it to temporarily limit registrations. Earlier in the day, DeepSeek said it was hit by outages on its website after its AI assistant became the top-rated free app in Apple's U.S. App Store and overtook ChatGPT in downloads. DeepSeek claims it uses cheaper chips and less data, challenging the idea that advanced semiconductors, like those made by Nvidia, are needed to run AI applications. That sent major tech stocks tumbling, with shares of Nvidia falling as much as 17.8% at one...
-
When Attorney General William Barr stated "spying did occur" against the 2016 Trump campaign, most attention was focused on the FBI's surveillance of former junior foreign policy aide Carter Page. But the spying Barr was thinking of, and which he said may or may not have been legally authorized, is more likely to be that carried out by Stefan Halper, a former Republican operative and White House aide who became a foreign policy academic with close ties to both American and British intelligence. One could be forgiven for believing Halper was a creation of the spy novelist John Le Carré....
-
The FBI announced the arrest of a suspect Friday in the killing of U.S. Border Patrol Agent David "Chris" Maland near the Vermont-Canada border. Washington state resident Teresa Youngblut, 21, was taken into custody following the fatal shooting on Monday, according to the FBI’s office in Albany, N.Y. "The United States Attorney’s Office District of Vermont has charged Youngblut with assault on a federal law enforcement officer," it said. "Our hearts remain with our partners at U.S. Border Patrol Swanton Sector as they mourn this tremendous loss."
-
The federal government is considering new options to aggressively counter foreign cyberattackers, with some in Washington considering the use of private companies to hit back. The Biden administration created new partnerships with thousands of cyber companies, ostensibly to fortify defenses, share information and build resilience. As Republicans take charge across Washington with President Trump at the helm, some policymakers are considering using those private-sector partners in an offensive capacity.During the House Homeland Security Committee’s first hearing of the new Congress, Rep. Clay Higgins questioned CrowdStrike Senior Vice President Adam Meyers about his view on his sector’s lack of ability to...
-
The Department of Homeland Security has dismissed the members of its advisory committees—including the Cyber Safety Review Board, which investigates major cybersecurity incidents—as part of a Trump-administration drive to cut costs at the agency, according to three people familiar with the matter. An internal Jan. 20 memo from DHS Acting Secretary Benjamine Huffman said, “In alignment with the Department of Homeland Security's (DHS) commitment to eliminating the misuse of resources and ensuring that DHS activities prioritize our national security, I am directing the termination of all current memberships on advisory committees within DHS, effective immediately...Future committee activities will be focused...
-
Nearly 100 domains hosting Sneaky 2FA phishing pages have been identified as of this month, suggesting moderate adoption by threat actors. "This kit is being sold as phishing-as-a-service (PhaaS) by the cybercrime service 'Sneaky Log,' which operates through a fully-featured bot on Telegram," the company said in an analysis. "Customers reportedly receive access to a licensed obfuscated version of the source code and deploy it independently." Phishing campaigns have been observed sending payment receipt-related emails to entice recipients into opening bogus PDF documents containing QR code that, upon scanning, redirects them to Sneaky 2FA page Sekoia said the phishing pages...
-
BREAKING: TikTok has shut down in the U.S.
-
The FBI has unveiled details of a massive international cyberattack orchestrated by the Chinese hacker group Mustang Panda, which used the PlugX malware to compromise thousands of computers in at least 170 countries. According to the Justice Department, the group—described as “PRC state-sponsored hackers”—is funded by the Chinese government and has primarily targeted European government devices. Since 2014, Mustang Panda has utilized PlugX malware to infiltrate government and business systems across the U.S., Europe, and Asia. The malware, initially designed to exploit Windows-based devices, was modified in 2020 to spread via USB flash drives. Thousands of devices, including many home...
-
NEW YORK, Jan 15 (Reuters) - Colonial Pipeline's main U.S. gasoline artery is expected to remain shut through Friday as the company continues to search for the source of a suspected leak in Paulding County, Georgia, the company said in a statement on Wednesday. Line 1, one of two mainlines on the more than 5,500-mile Colonial system, was shut on Monday night after Colonial received reports of a gasoline release. The pipeline moves gasoline from Texas to North Carolina and was earlier expected to resume service on Tuesday night, according to market sources. "Colonial continues on-site work to identify the...
-
Outgoing FBI Director Christopher Wray revealed during an interview on Sunday, a week before he steps down, that China has penetrated America’s water treatment plants, electric grid, and other critical civilian infrastructure, and is lying “in wait” for an opportunity to cyberattack at a time and place of its choosing. Asked on CBS’s 60 Minutes about Chinese penetration of U.S. cyber and infrastructure, Wray said China’s cyber program is the largest in the world and has stolen more of Americans’ personal and corporate data than every nation combined. Then, he added: But even beyond the cyber theft. There’s another part...
-
A US Army soldier has been arrested in Texas after being indicted on two counts of unlawful transfer of confidential phone records information. While the indictment doesn't specify any hacking activity or victims' names, Cameron John Wagenius, 20, is suspected of being a cybercriminal known as Kiberphant0m, who claimed to have breached at least 15 telecommunications firms including AT&T and Verizon, according to KrebsOnSecurity. Wagenius is allegedly an associate of Connor Riley Moucka, one of the men accused of compromising multiple organizations' Snowflake-hosted environments, stealing sensitive customer data housed in the cloud storage service, and then extorting victims for millions...
|
|
|