News

Nextgov. com
nextgov. com > cybersecurity > 2026 > 03 > north-korea-linked-hackers-suspected-axios-open-source-hijack-google-analysts-say > 412523

North Korea-linked hackers suspected in Axios open-source hijack, Google analysts say

2+ week, 2+ day ago  (589+ words) North Korea-aligned hackers are believed to have seized a widely-used, open-source Java Script library, Google intelligence analysts said Tuesday, in a move that could put a significant number of software developers at risk of system compromise. The hackers introduced compromised…...

Nextgov. com
nextgov. com > cybersecurity > 2026 > 03 > google-launches-threat-disruption-unit-stops-short-calling-it-offensive > 412321

Google launches threat disruption unit, stops short of calling it "offensive

3+ week, 2+ day ago  (434+ words) SAN FRANCISCO " Google's threat intelligence arm officially launched its anticipated disruptive cyber unit on Monday, which comes as the Trump administration seeks to create a more offensive, proactive U. S. culture in cyberspace against foreign hacker groups and cybercriminals. Company officials notably…...

Nextgov. com
nextgov. com > cybersecurity > 2026 > 03 > national-cyber-director-doesnt-envision-industry-doing-offensive-hacking > 412176

National cyber director doesn't envision industry doing offensive hacking

4+ week, 2+ day ago  (285+ words) National Cyber Director Sean Cairncross said Monday that he does not intend for the private sector to fully engage in offensive cyber operations on behalf of the U. S. government. "There's an enormous amount of capability on the private sector side," he…...

Nextgov. com
nextgov. com > cybersecurity > 2026 > 03 > iran-linked-hacktivists-could-target-governments-experts-warn > 411876

Iran-linked hacktivists could target governments, experts warn

1+ mon, 1+ week ago  (435+ words) ATTA KENARE via Getty Images Further escalating hostilities in Iran could leave state and local governments in the crosshairs of hacktivists aligned with the regime as they look to retaliate in cyberspace, experts warned this week. While internet traffic in…...

Nextgov. com
nextgov. com > cybersecurity > 2026 > 03 > potential-us-built-hacking-tools-obtained-foreign-spies-and-cybercriminals-research-says > 411861

Potential US-built hacking tools obtained by foreign spies and cybercriminals, research says

1+ mon, 1+ week ago  (411+ words) A powerful i Phone hacking toolkit that researchers say may have originated as a U. S. -built capability has surfaced in the hands of foreign espionage actors and financially motivated criminal groups, according to new analyses from Google and mobile security firm…...

Nextgov. com
nextgov. com > cybersecurity > 2026 > 02 > chinese-telecom-hackers-likely-holding-stolen-data-perpetuity-later-attempts-fbi-official-says > 411528

Chinese telecom hackers likely holding stolen data "in perpetuity" for later attempts, FBI official says

1+ mon, 3+ week ago  (434+ words) A Chinese state-backed hacking group that was discovered in telecom operators and other communications systems is likely holding onto pilfered data "in perpetuity" for future theft and cyber exploitation, a top FBI official said Thursday. Salt Typhoon, as the group…...

Nextgov. com
nextgov. com > people > 2026 > 02 > def-con-bans-hackers-technologists-named-epstein-documents > 411502

DEF CON bans hackers, technologists named in Epstein documents

1+ mon, 3+ week ago  (729+ words) The DEF CON hacker conference has banned three people involved with the organization whose names appeared in recently released Justice Department files that exposed their ties to convicted sex offender Jeffrey Epstein. The conference banned Vincenzo Iozzo, Joichi Ito and…...

Nextgov. com
nextgov. com > cybersecurity > 2025 > 12 > china-using-advanced-brickstorm-malware-against-government-and-it-orgs-us-assesses > 409940

China is using advanced "Brickstorm" malware against government and IT orgs, US assesses

4+ mon, 1+ week ago  (356+ words) The NSA and the Cybersecurity and Infrastructure Security Agency have assessed that China is using an advanced malware family to access government agencies and technology companies, according to extensive findings made public Thursday. The malware analysis, coauthored with Canadian cyber…...

Nextgov. com
nextgov. com > cybersecurity > 2025 > 12 > new-bill-proposes-government-wide-processes-attribute-sanction-hackers > 409863

New bill proposes government-wide processes to attribute, sanction hackers

4+ mon, 2+ week ago  (387+ words) Congressman August Pfluger (R-TX) speaks during a press conference with other members of the Republican Study Committee as well as members of House Republican leadership in Washington, DC on October 28, 2025. Nathan Posner/Anadolu via Getty Images Legislation introduced Monday night…...

Nextgov. com
nextgov. com > cybersecurity > 2025 > 10 > cisa-orders-government-patch-f5-products-after-nation-state-cyber-intrusion > 408824

CISA orders government to patch F5 products after "nation-state" cyber intrusion

6+ mon, 1+ day ago  (508+ words) The Cybersecurity and Infrastructure Security Agency ordered federal civilian agencies on Wednesday to catalog and patch a suite of products offered by application security and cloud management company F5. CISA said a "nation-state affiliated cyber threat actor" compromised F5 systems, including source…...