Category: cyberscoop

Consensus forms on reauthorizing 2015 cyber info-sharing law now, upgrading it later
16
May
2025

Consensus forms on reauthorizing 2015 cyber info-sharing law now, upgrading it later

The message was consistent at a House cybersecurity hearing Thursday: pass legislation extending an expiring information-sharing law before it lapses…

Rishi Kaushal
16
May
2025

Preparing for the post-quantum era: a CIO’s guide to securing the future of encryption

Quantum computing is on the verge of revolutionizing the technology landscape, much like AI did in 2024. By the end…

Proofpoint, RSA 2019
16
May
2025

Proofpoint to acquire Hornetsecurity for over $1 billion

Proofpoint has entered into an agreement to acquire Hornetsecurity Group, a Germany-based provider of Microsoft 365 security services, in a…

Derek B. Johnson
16
May
2025

 FTC wants a new, segregated software system to police deepfake porn 

The head of the Federal Trade Commission described to lawmakers Thursday new technology, personnel and infrastructure the agency needs as…

FBI warns of fake texts, deepfake calls impersonating senior U.S. officials
15
May
2025

FBI warns of fake texts, deepfake calls impersonating senior U.S. officials

The FBI said Thursday that malicious actors have been impersonating senior U.S. government officials in a text and voice messaging…

SAP cyberattack widens, drawing Salt Typhoon and Volt Typhoon comparisons
15
May
2025

SAP cyberattack widens, drawing Salt Typhoon and Volt Typhoon comparisons

Hundreds of victims are surfacing across the world from zero-day cyberattacks on Europe’s biggest software manufacturer and company, in a…

North Korea’s ‘state-run syndicate’ looks at cyber operations as a survival mechanism
15
May
2025

North Korea’s ‘state-run syndicate’ looks at cyber operations as a survival mechanism

Over the past few years, cybersecurity experts have increasingly said that nation-state operatives and cybercriminals often blur the boundaries between…

Matt Kapko
15
May
2025

Who needs VC funding? How cybercriminals spread their ill-gotten gains to everyday business ventures

Cybercriminals aren’t so different from the rest of us — they live in the real world, and their spending and investment…

Fancy Bear campaign sought emails of high-level Ukrainians and their military suppliers
15
May
2025

Fancy Bear campaign sought emails of high-level Ukrainians and their military suppliers

Fancy Bear, the hacking group linked to Russia’s Main Intelligence Directorate (GRU), has been targeting the email accounts of high-ranking…

CFPB to withdraw rule targeting data brokers
14
May
2025

CFPB to withdraw rule targeting data brokers

The Consumer Financial Protection Bureau is set to withdraw a Biden-era rule aimed at cracking down on data brokers and…

DHS won’t tell Congress how many people it’s cut from CISA
14
May
2025

DHS won’t tell Congress how many people it’s cut from CISA

The Department of Homeland Security won’t tell Congress how many employees at the Cybersecurity and Infrastructure Security Agency it has…

Cynthia Brumfield
14
May
2025

CVE Foundation eyes year-end launch following 11th-hour rescue of MITRE program

In late March, the nonprofit research organization MITRE celebrated the 25th anniversary of the Common Vulnerability and Exposures (CVE) program,…