News

Nextgov.com
nextgov.com > cybersecurity > 2026 > 03 > iran-linked-hacktivists-could-target-governments-experts-warn > 411876

Iran-linked hacktivists could target governments, experts warn

3+ day, 8+ hour ago  (435+ words) ATTA KENARE via Getty Images Further escalating hostilities in Iran could leave state and local governments in the crosshairs of hacktivists aligned with the regime as they look to retaliate in cyberspace, experts warned this week. While internet traffic in…...

Nextgov.com
nextgov.com > cybersecurity > 2026 > 03 > potential-us-built-hacking-tools-obtained-foreign-spies-and-cybercriminals-research-says > 411861

Potential US-built hacking tools obtained by foreign spies and cybercriminals, research says

4+ day, 1+ hour ago  (411+ words) A powerful iPhone hacking toolkit that researchers say may have originated as a U.S.-built capability has surfaced in the hands of foreign espionage actors and financially motivated criminal groups, according to new analyses from Google and mobile security firm iVerify....

Nextgov.com
nextgov.com > cybersecurity > 2026 > 02 > chinese-telecom-hackers-likely-holding-stolen-data-perpetuity-later-attempts-fbi-official-says > 411528

Chinese telecom hackers likely holding stolen data ‘in perpetuity’ for later attempts, FBI official says

2+ week, 2+ day ago  (434+ words) A Chinese state-backed hacking group that was discovered in telecom operators and other communications systems is likely holding onto pilfered data "in perpetuity" for future theft and cyber exploitation, a top FBI official said Thursday. Salt Typhoon, as the group…...

Nextgov.com
nextgov.com > people > 2026 > 02 > def-con-bans-hackers-technologists-named-epstein-documents > 411502

DEF CON bans hackers, technologists named in Epstein documents

2+ week, 3+ day ago  (729+ words) The DEF CON hacker conference has banned three people involved with the organization whose names appeared in recently released Justice Department files that exposed their ties to convicted sex offender Jeffrey Epstein. The conference banned Vincenzo Iozzo, Joichi Ito and…...

Nextgov.com
nextgov.com > cybersecurity > 2025 > 12 > china-using-advanced-brickstorm-malware-against-government-and-it-orgs-us-assesses > 409940

China is using advanced ‘Brickstorm’ malware against government and IT orgs, US assesses

3+ mon, 3+ day ago  (356+ words) The NSA and the Cybersecurity and Infrastructure Security Agency have assessed that China is using an advanced malware family to access government agencies and technology companies, according to extensive findings made public Thursday. The malware analysis, coauthored with Canadian cyber…...

Nextgov.com
nextgov.com > cybersecurity > 2025 > 12 > new-bill-proposes-government-wide-processes-attribute-sanction-hackers > 409863

New bill proposes government-wide processes to attribute, sanction hackers

3+ mon, 5+ day ago  (387+ words) Congressman August Pfluger (R-TX) speaks during a press conference with other members of the Republican Study Committee as well as members of House Republican leadership in Washington, DC on October 28, 2025. Nathan Posner/Anadolu via Getty Images Legislation introduced Monday night…...

Nextgov.com
nextgov.com > cybersecurity > 2025 > 10 > cisa-orders-government-patch-f5-products-after-nation-state-cyber-intrusion > 408824

CISA orders government to patch F5 products after ‘nation-state’ cyber intrusion

4+ mon, 3+ week ago  (508+ words) The Cybersecurity and Infrastructure Security Agency ordered federal civilian agencies on Wednesday to catalog and patch a suite of products offered by application security and cloud management company F5. CISA said a "nation-state affiliated cyber threat actor" compromised F5 systems, including source…...

Nextgov.com
nextgov.com > cybersecurity > 2025 > 10 > attorneys-scramble-advise-clients-after-lapse-key-cyber-info-sharing-law > 408525

Attorneys scramble to advise clients after lapse of key cyber info-sharing law

5+ mon, 6+ day ago  (548+ words) Legal professionals are working to help clients navigate the lapse of a longstanding cybersecurity information-sharing law that gave companies various forms of legal cover when they transmitted cyber threat data to the government. The Cybersecurity Information Sharing Act of 2015 lapsed…...

Nextgov.com
nextgov.com > cybersecurity > 2025 > 09 > widespread-breach-let-hackers-steal-employee-data-fema-and-cbp > 408456

‘Widespread’ breach let hackers steal employee data from FEMA and CBP

5+ mon, 1+ week ago  (667+ words) A "widespread cybersecurity incident" at the Federal Emergency Management Agency allowed hackers to make off with employee data from both the disaster management office and U.S. Customs and Border Protection, according to a screenshot of an incident overview presentation obtained by…...

Nextgov.com
nextgov.com > cybersecurity > 2025 > 09 > cisa-wants-more-international-involvement-cyber-vulnerability-catalog-official-says > 408178

CISA wants more international involvement in cyber vulnerability catalog, official says

5+ mon, 2+ week ago  (558+ words) CISA Assistant Executive Director for Cybersecurity Nick Andersen speaks at the Billington Cybersecurity Summit Sept. 11. David DiMolfetta/Staff The Cybersecurity and Infrastructure Security Agency wants to involve more international partners in overwatching a long-standing cyber vulnerability cataloging project, which narrowly…...