-
CHINA WATCHWhat is Salt Typhoon? A Security Expert Explains the Chinese Hackers and Their Aattack on U.S. Telecommunications Networks
Lost in the noise of the story is that Salt Typhoon has proved that the decades of warnings by the internet security community were correct. No mandated secret or proprietary access to technology products is likely to remain undiscovered or used only by “the good guys” – and efforts to require them are likely to backfire.
-
-
CHINA WATCHChinese Hackers Still Lurk in U.S. Telecommunications systems
Chinese hackers blamed for compromising U.S. telecommunications infrastructure and spying on American presidential campaigns and American officials are still entrenched in those systems.
-
-
CYBERTHREATSU.S. Army Cyber Command, DARPA Evaluate Advanced Cyber Threat Detection Technologies
Joint activities through the Constellation program accelerate maturation of tactical and strategic cyber capabilities.
-
-
CHINA WATCHSuspected Chinese Hack of U.S. Telecoms Reveals Broader Plot
A hack of U.S. telecommunications systems linked to China that initially appeared to focus on the American presidential campaigns goes much deeper, according to investigators, and is likely part of a vast effort by Beijing to spy on the United States.
-
-
CYBERSECURITYAI-driven Cyberattacks More Sophisticated and Scalable, but There Are Solutions
Cyberattacks used to be engineered by crafty hackers looking to infiltrate computer systems. Artificial intelligence now allows hackers to create a new scale of attacks that penetrate banking, critical infrastructure, intellectual property, and even traffic lights and baby monitors.
-
-
CYBERSECURITYCyberForce Competition Challenges College Students to Use Cybersecurity Skills to Defend Their Wind Energy System
College teams will work to outsmart a simulated attack on a U.S. wind energy plant. The CyberForce Competition offers students hands-on experience, igniting their passion for cybersecurity.
-
-
CYBERSECURITYSalt Typhoon Hack Shows There's No Security Backdoor That's Only for The "Good Guys"
If U.S. policymakers care about China and other foreign countries engaging in espionage on U.S. citizens, it’s time to speak up in favor of encryption by default. If these policymakers don’t want to see bad actors take advantage of their constituents, domestic companies, or security agencies, again—they should speak up for encryption by default.
-
-
AIOversight Revealed in AI Image Recognition Tools
Artificial intelligence can help people process and comprehend large amounts of data with precision, but the image recognition platforms and computer vision models that are built into AI frequently overlook an important back-end feature called the alpha channel. Researchers developed a proprietary attack called AlphaDog to study how hackers can exploit this oversight.
-
-
HOMELAND THREATAS2025 Homeland Threat Assessment
DHS has issued its 2025 threat assessment, focusing on the most direct, pressing threats to the U.S. homeland during the next year. The assessment is organized around DHS missions that most closely align or apply to these threats—public safety, border and immigration, critical infrastructure, and economic security.
-
-
ELECTION INTEGRITYElection Security: When to Worry, When to Not
Everyone wants an election that is secure and reliable and that will ensure that the voters’ actual choices are reflected in the results. At the same time, not every problem in voting technology or systems is worth pulling the fire alarm —we have to look at the bigger story and context. And we have to stand down when our worst fears turn out to be unfounded.
-
-
ELECTION INTEGRITYU.S. Warns Voters of Disinformation Deluge
American voters are likely about to be swamped by a flood of misinformation and influence campaigns engineered by U.S. adversaries aiming, according to senior U.S. intelligence officials, to sway the results of the upcoming presidential election and cast doubt on the process itself.
-
-
CYBERSECURITYYou’d Never Fall for an Online Scam, Right?
Wrong, says cybersecurity expert. Con artists use time-tested tricks that can work on anyone regardless of age, IQ — what’s changed is scale.
-
-
CYBERSECURITYNew Security Protocol Shields Data from Attackers During Cloud-Based Computation
The technique leverages quantum properties of light to guarantee security while preserving the accuracy of a deep-learning model.
-
-
DHSDHS Awards $279.9 million in Grant Funding for State and Local Cybersecurity Grant Program
DHS announced the availability of $279.9 million in grant funding for the Fiscal Year (FY) 2024 State and Local Cybersecurity Grant Program (SLCGP). Now in its third year, this program provides funding to state, local, and territorial (SLT) governments to help reduce cyber risk and build resilience against evolving cybersecurity threats.
-
-
ELECTION INTEGRITYIntelligence Suggests Iran Sought to Ensnare Trump, Biden in Hack-and-Leak
Iran’s efforts to upend U.S. politics ahead of November’s presidential election by targeting the campaign of former President Donald Trump went well beyond a standard hack-and-leak operation. According to U.S. intelligence officials, Tehran sought to ensnare the campaign of Trump’s then-opponent, incumbent U.S. President Joe Biden.
-