Tag: Cybersecurity

Romanian hacker faces up to 7 years for breaching Oregon emergency management department

(Jonathan Greig - The Record) A 45-year-old Romanian national pleaded guilty this week to hacking into computers at Oregon’s Department of Emergency Management in...

Ukrainian national gets 5-year sentence for involvement in North Korea IT worker scheme

(Jonathan Greig - The Record) A 29-year-old Ukrainian man was sentenced to five years in prison for his years-long role in a scheme that...

Leading Japanese semiconductor supplier responding to ransomware attack

(Jonathan Greig - The Record) Japanese semiconductor test equipment supplier Advantest said it is dealing with a ransomware attack that has impacted several company...

FBI: More than 700 ATM jackpotting incidents with losses over $20 million occurred in 2025

(Jonathan Greig - The Record) Criminals are increasingly using malware to steal money out of ATMs, with hundreds of incidents taking place in 2025...

Researchers warn Volt Typhoon still embedded in US utilities and some breaches may never be found

(Jonathan Greig - The Record) U.S. military and law enforcement officials have been on a dedicated mission for nearly three years to uncover and...

Cyber (In)Security and Surveillance (19 February 2026)

Fed agencies ordered to patch Dell bug by Saturday after exploitation warning (Jonathan Greig - The Record) A Chinese state-backed hacking group is targeting Dell...

Cyber (In)Security and Surveillance (18 February 2026)

Docs reveal significant increase in ICE data stored on Microsoft cloud: What info is it collecting? (Konstancija Gasaitytė - Cybernews) An increase in ICE’s budget...

Cyber (In)Security and Surveillance (17 February 2026)

Darknet marketplaces increasingly tap into top privacy coin monero (Linas Kmieliauskas - Cybernews) As blockchain analysts improve their abilities to track various crypto assets, including...

Cyber (In)Security and Surveillance (16 February 2026)

Dior, Louis Vuitton, Tiffany Fined $25 Million in South Korea After Data Breaches (Eduard Kovacs - Security Week) South Korea’s Personal Information Protection Commission (PIPC)...

The Promptware Kill Chain

(Bruce Schneier, Oleg Brodt, Elad Feldman, Ben Nassi - Lawfare) Attacks against modern generative artificial intelligence (AI) large language models (LLMs) pose a real...

Cyber (In)Security and Surveillance (13 February 2026)

(Kevin Poireault - Infosecurity Magazine) G7 nations have identified cyber threats as the most significant risk they face, for the second consecutive year. As...

Google Calls on Governments And Industry to Prepare Now For Quantum-Era Cybersecurity

(Quantum Insider) Google is urging governments and industry to accelerate adoption of post-quantum cryptography, warning that advances in quantum computing could soon undermine the...

Precision Becomes the New Playbook for Software Supply Chain Attacks

(Keith McCammon - Infosecurity Magazine) Software supply chain attacks have become one of the most difficult risks for security leaders to anticipate. Recent incidents...

Google Disrupts Extensive Residential Proxy Networks

(Alessandro Mascellino - Infosecurity Magazine) Google and several industry partners have taken coordinated action to disrupt what is believed to be one of the...

Operation Winter SHIELD: FBI Issues Call to Arms for Organizations to Improve Cybersecurity

(Danny Palmer - Infosecurity Magazine) The FBI has launched Operation Winter SHIELD outlining ten actions which organizations should implement to help protect themselves, society...

New CISA Guidance Targets Insider Threat Risks

(Alessandro Mascellino - Infosecurity Magazine) The risk posed by insiders with authorized access to sensitive systems has prompted a renewed call to action from...