#nation-state-hacking

[ follow ]
fromNextgov.com
2 days ago

AI has leveled the field between cybercriminals and nation-state hackers, FBI official says

The FBI has not been as quick to adopt AI in its day-to-day operations because it handles sensitive data that requires stringent protections and oversight to maintain security and legal standards, he said. "We're trying to catch up in many ways, and part of that is because we have very sensitive datasets that we have to make sure we protect because of the authorities that we have," Leatherman said.
Information security
#cybersecurity
fromTechCrunch
1 day ago
Information security

Government hackers breached telecom giant Ribbon for months before getting caught | TechCrunch

fromNextgov.com
2 months ago
US politics

Wyden calls for review of US court systems' cyber posture after case system hack

U.S. federal courts' outdated cybersecurity and lack of mandatory standards allowed a breach exposing sensitive legal records and informant identities, posing national security risks.
fromThe Hacker News
4 months ago
Artificial intelligence

OpenAI Bans ChatGPT Accounts Used by Russian, Iranian and Chinese Hacker Groups

OpenAI identified and banned accounts used by threat actors for developing malware and social media manipulation.
fromTechCrunch
1 day ago
Information security

Government hackers breached telecom giant Ribbon for months before getting caught | TechCrunch

Science
fromTheregister
2 weeks ago

CISA exec blames hackers, Democrats for network risk

Exploitable vulnerabilities in F5 BIG-IP devices create imminent risk of lateral access and full compromise of US federal networks; urgent patches and inventories are required.
Information security
fromArs Technica
2 weeks ago

Breach of F5 requires "emergency action" from BIG-IP users, feds warn

A nation-state hacking group breached F5, stole BIG-IP build systems, source code, and customer configurations, creating imminent supply-chain exploitation risk for thousands of networks.
Information security
fromBusiness Insider
1 month ago

Fake military IDs, bogus resumes: How North Korean and Chinese hackers use AI tools to infiltrate companies and other targets

North Korean and Chinese hackers use AI tools like ChatGPT and Claude to create fake IDs, résumés, and phishing materials to enable espionage and unauthorized access.
Information security
fromThe Hacker News
2 months ago

Weekly Recap: Password Manager Flaws, Apple 0-Day, Hidden AI Prompts, In-the-Wild Exploits & More

Effective cybersecurity requires strategic alignment with business, trust, and geopolitics rather than relying solely on technical tools.
Information security
fromIT Pro
2 months ago

Russian hackers are using an old Cisco flaw to target network devices - here's how you can stay safe

Russian government-linked hackers exploit unpatched Cisco Smart Install (CVE-2018-0171) and SNMP to exfiltrate and manipulate network device configurations across critical infrastructure sectors globally.
[ Load more ]