-
Protecting Americans’ Sensitive Data from Foreign Adversaries
Last week DOJ took steps to move forward with implementing a program to prevent China, Russia, Iran, and other foreign adversaries from using commercial activities to access and exploit U.S. government-related data and Americans’ sensitive personal data to commit espionage and economic espionage, conduct surveillance and counterintelligence activities, and otherwise undermine our national security.
-
-
Israeli Startup Raises $50m to Stop App-Based Cyberattacks
Oligo Security’s platform allows for quick identification of vulnerabilities in cloud-native software before they are exploited by third parties.
-
-
Standardized Security Playbooks Improve Protection Against Cyberattacks
Each company relies on its own security concepts and devises its playbooks individually. This means hardly any security-related information is shared between these organizations. And that is a problem, especially when business partners regularly exchange data, as is the case with industrial firms and their suppliers.
-
-
Security Scheme Could Protect Sensitive Data During Cloud Computation
MIT researchers crafted a new approach that could allow anyone to run operations on encrypted data without decrypting it first.
-
-
South Korea Has Acted Decisively on DeepSeek. Other Countries Must Stop Hesitating
South Korea has suspended new downloads of DeepSeek, and it was right to do so. Chinese tech firms operate under the shadow of state influence, misusing data for surveillance and geopolitical advantage. Any country that values its data and sovereignty must watch this national security threat and take note of South Korea’s response.
-
-
In Case We Forgot, Typhoon Attacks Remind Us of China’s Cyber Capability—and Intent
The Salt Typhoon incident reminds us that China has the intent, and increasingly the capability, to seriously challenge US and Western technology advantage.
-
-
DOGE Threat: How Government Data Would Give an AI Company Extraordinary Power
The Department of Government Efficiency, or DOGE, has secured unprecedented access to at least seven sensitive federal databases. Since information is power, concentrating unprecedented data in the hands of a private entity with an explicit political agenda represents a profound challenge to the republic. I believe that the question is whether the American people can stand up to the potentially democracy-shattering corruption such a concentration would enable. If not, Americans should prepare to become digital subjects rather than human citizens.
-
-
Election Officials Blast Trump’s “Retreat” from Protecting Voting Against Foreign Threats
The Trump administration has begun dismantling the nation’s defenses against foreign interference in voting, a sweeping retreat that has alarmed state and local election officials. The administration is shuttering the FBI’s Foreign Influence Task Force and last week cut more than 100 positions at the U.S. Cybersecurity and Infrastructure Security Agency.
-
-
Is DOGE a Cybersecurity Threat? Explaining the Dangers of Violating Protocols and Regulations That Protect Government Computer Systems
Teams from the Department of Government Efficiency (DOGE) are dropping into federal agencies with a practically unlimited mandate to reform the federal government in accordance with recent executive orders. As a 30-year cybersecurity veteran, I find the activities of DOGE thus far concerning. Its broad mandate across government, seemingly nonexistent oversight, and the apparent lack of operational competence of its employees have demonstrated that DOGE could create conditions that are ideal for cybersecurity or data privacy incidents that affect the entire nation.
-
-
Researchers Calculate Cyberattack Risk for All 50 States
Local governments are common victims of cyberattack, with economic damage often extending to the state and federal levels. Scholars aggregate threats to thousands of county governments to draw conclusions.
-
-
Security Vulnerabilities Discovered in Apple Processors
The US tech giant Apple has always advertised security assurances alongside ever faster processor performance for its products. Now an international team of cybersecurity researchers has discovered at least two security vulnerabilities.
-
-
Treasury Sanctions Company, Hacker Associated with Salt Typhoon
The Department of the Treasury has sanctioned a Chinese national and a Chinese company for their direct involvement in the Salt Typhoon cyber group, which recently compromised the network infrastructure of multiple major U.S. telecommunication and internet service provider companies.
-
-
Keep the U.S. Government Focused on Combating Foreign Interference Operations
Countering foreign interference requires concerted policy efforts to raise the costs for adversaries. Harnessing military and intelligence capabilities to push back forcefully must be part of policy discussions to address foreign interference.
-
-
U.S. Slow to React to Pervasive Chinese Hacking: Experts
As new potential threats from Chinese hackers were identified this week, the federal government issued one of its strongest warnings to date about the need for Americans —and in particular government officials and other “highly targeted” individuals —to secure their communications against eavesdropping and interception.
-
-
China-Based Hacker Conspired to Develop and Deploy Malware That Exploited Tens of Thousands of Firewalls Worldwide
Chinese hacker and his co-conspirators worked at the offices of Sichuan Silence Information Technology Co. Ltd. to discover and exploit a previously-unknown vulnerability (an “0-day” vulnerability) in certain firewalls.
-