The open-source software company said exposure is limited to consulting engagements, adding that it hasn’t found evidence of personal or sensitive data theft. The post Red Hat confirms breach of GitLab instance, which stored company’s consulting data appeared first on CyberScoop.| CyberScoop
The emails, which are littered with broken English, aim to instill fear, apply pressure, threaten public exposure and seek negotiation for a ransom payment. The post Here is the email Clop attackers sent to Oracle customers appeared first on CyberScoop.| CyberScoop
The campaign involves apps posing as Signal and the defunct ToTok, according to ESET. The post Android spyware disguised as legitimate messaging apps targets UAE victims, researchers reveal appeared first on CyberScoop.| CyberScoop
Okta Threat Intelligence uncovered a large-scale and sustained operation, reflecting the North Korean regime’s pursuit of any opportunity that allows for remote employment. The post North Korea IT worker scheme swells beyond US companies appeared first on CyberScoop.| CyberScoop
Researchers tell CyberScoop that notorious ransomware group Clop may be behind the email barrage. The post Oracle customers being bombarded with emails claiming widespread data theft appeared first on CyberScoop.| CyberScoop
Sen. Marsha Blackburn did not provide a timeline for any formal rollout by the administration, and also pointed to her proposed bill with Michigan Sen. Gary Peters. The post GOP senator confirms pending White House quantum push, touts legislative alternatives appeared first on CyberScoop.| CyberScoop
Phantom Taurus has stolen sensitive data from ministries of foreign affairs, embassies, diplomats and telecom networks in the Middle East, Africa and Asia, researchers said. The post Palo Alto Networks spots new China espionage group showcasing advanced skills appeared first on CyberScoop.| CyberScoop
The company agreed to pay $875,000, with neither side conceding to the other as part of resolving the suit. The post DOJ, Georgia Tech affiliate company settle over alleged failure to meet DOD contract cyber requirements appeared first on CyberScoop.| CyberScoop
A DHS inspector general report found that CISA doesn’t have plans for what to do with AIS if the Cybersecurity Information Sharing Act lapses. The post Watchdog: Cyber threat information-sharing program’s future uncertain with expected expiration of 2015 law appeared first on CyberScoop.| CyberScoop
Even with all the testing, the company said in its released research that the model tightened up once it was “aware” it was being evaluated.| CyberScoop
Ukrainian officials accused the Russian government of 5,000 cyberattacks on 1,500 Ukrainian entites over several years in new report.| CyberScoop
Global network overlay on world map.| CyberScoop
A vendors looks at her phone in Hanoi on March 31. (Photo by Nhac Nguyen/AFP via Getty Images) | CyberScoop
Russia declared war against Ukraine on Feb. 24., 2022. Before, during and after the military campaign began, the CyberScoop staff has been tracking the cyber dimensions of the conflict.| CyberScoop
Symantec looks at how the spies use infected Microsoft Word attachments to implant backdoor files allowing for the delivery of more malware.| CyberScoop
Safe Mode | CyberScoop
A view of the Las Vegas Strip on November 16, 2023. (Jakub Porzycki/NurPhoto via Getty Images) | CyberScoop
The sun flares over the headquarters of the U.S. Treasury on Jan. 3, 2024, in Washington, D.C. | CyberScoop
A picture of a toll booth in New Jersey. Scammers have been sending text messages about unpaid toll violations. (Getty Images) | CyberScoop
Authorities spanning 14 countries in Africa seized devices allegedly used for romance scams and extortion. (Interpol) | CyberScoop
(Getty Images) | CyberScoop
Hackers are sending spoofed emails that appear to be from FedEx, UPS and DHL that are meant to infect victims’ computers with Dridex.| CyberScoop
Treasury announced sanctions Thursday against two people and four entities allegedly involved in illicit remote IT workforce operations.| CyberScoop
(Getty Images) | CyberScoop
(Getty Images) | CyberScoop
Security leaders at Mandiant and Google Cloud say nearly every major company has hired or received applications from North Korean nationals working on behalf of the country’s regime.| CyberScoop
Authorities said they froze and seized the allegedly illegally obtained funds when North Korean nationals attempted to launder money linked to the long-running conspiracy.| CyberScoop
REST Media has garnered millions of views on social media for its content targeting Moldova’s pro-EU leadership. Researchers say it’s a Kremlin operation.| CyberScoop
Rep. Mark Green, R-Tenn., chairman of the House Homeland Security Committee, arrives before the start of a House Homeland Security Committee hearing in January of 2024. (Photo by Kent Nishimura/Getty Images) | CyberScoop
Chairman Sen. Rand Paul, R-Ky., (L), accompanied by Ranking Member Sen. Gary Peters, D-Mich. (R), speaks during a Senate Homeland Security and Governmental Affairs confirmation hearing for U.S. President-elect Donald Trump’s nominee for Office of Management and Budget Director Russell Vought on Jan. 15, 2025. (Photo by Andrew Harnik/Getty Images) | CyberScoop
zhen li, Getty Images | CyberScoop
(L-R) Rep. Nick LaLota R-N.Y., Rep. Tony Gonzales, R-Texas, Rep. Marjorie Taylor Greene, R-Ga. and Rep. Andrew Garbarino, R-N.Y., listen during a hearing with the House Committee on Homeland Security on Jan. 30, 2024. (Photo by Anna Moneymaker/Getty Images) | CyberScoop
The company says securing its products is its top priority after a series of damaging, embarrassing breaches.| CyberScoop
The Cyber Safety Review Board concluded in a report that Microsoft’s corporate culture has inappropriately deprioritized security.| CyberScoop
The NIST standards show that with one year of progress behind us, there are five years of opportunity ahead.| CyberScoop
Twitch is still investigating the apparent hack.| CyberScoop
The company didn't immediately respond to a request for comment.| CyberScoop
Algorithm disgorgement requires companies to remove products built on data they shouldn't have used in the first place.| CyberScoop
The agency sees ways that AI could help protect cyber networks, but also ways it could be an ethical quagmire or a tool for enemies of the United States.| CyberScoop
The CNIL hit the tech giants over their policy on cookies.| CyberScoop
"A couple folks have struggled with the idea that we're going to pat companies on the back for doing things they should already be doing," said one observer.| CyberScoop
Jeff Stone is the editor-in-chief of CyberScoop, with a special interest in cybercrime, disinformation and the U.S. justice system. He previously worked as an editor at the Wall Street Journal, and covered technology policy for sites including the Christian Science Monitor and the International Business Times.| CyberScoop
There are few bigger realms of innovation than technology dedicated to outer space. Amazon is using that realm to spurn innovation in its own cybersecurity practices.| CyberScoop
Threat intel experts expounded on how their data does not only serve to temporarily disrupt malicious activity, but find, arrest and convict cybercriminals for their offenses.| CyberScoop
The logo of X, formerly known as Twitter, is displayed on a smart phone screen. (Photo by Matt Cardy/Getty Images) | CyberScoop
A sign is seen at the Microsoft headquarters on July 3, 2024, in Redmond, Washington. (David Ryder/Getty Images) | CyberScoop
A hearing to review FTC Chair Lina Khan's leadership turned into a debate over the commission's role overseeing Twitter's privacy practices.| CyberScoop
The incident follows a spree of ransomware and extortion attacks targeting multiple U.S.- and U.K.-based retailers, including grocery stores. The logistics company said its operations are impacted.| CyberScoop
According to the Securities and Exchange Commission, the company’s failures led to the loss of $6.6 million in client funds.| CyberScoop
Eric Council Jr. was charged with aggravated identity theft and access device fraud in connection with the January 2024 incident.| CyberScoop
Unisys, Avaya, Check Point and Mimecast will pay fines to settle charges that they downplayed in SEC filings the extent of the compromise.| CyberScoop
A study from Paul Hastings LLP new SEC cybersecurity disclosure rules have led to a 60% increase in reported incidents.| CyberScoop
The agency is rebranding a tech-focused unit in a move that some critics worry may be part of a larger shift away from regulating the crypto space.| CyberScoop
The electronics manufacturer and software vendor serves major automotive suppliers and top tech firms.| CyberScoop
The unknown hackers accessed CreditRiskMonitor employee data but not customer personal information, the company said.| CyberScoop
Latest incident involves stolen employee data, the company said in a federal filing.| CyberScoop
Securities and Exchange Commission Chair Gary Gensler testifies before the Financial Services and General Government Subcommittee July 19, 2023 in Washington, DC. (Win McNamee/Getty Images) | CyberScoop
(Getty Images) | CyberScoop
Disaster was averted after widely used open-source packages were compromised via social engineering.| CyberScoop
CyberScoop delivers up-to-the-minute breaking cybersecurity news and is the leading public sector media company reaching top leaders| CyberScoop
The Cybersecurity and Infrastructure Agency is delaying finalization of CIRCIA until next year, according to a recent regulatory notice.| CyberScoop
Then-Millenium challenge corporation CEO Sean Cairncross speaks during a ceremony on Aug. 5, 2019 at the presidential palace in Abidjan. (Photo by ISSOUF SANOGO / AFP) (Photo credit should read ISSOUF SANOGO/AFP via Getty Images) | CyberScoop
(L-R) Rep. Nick LaLota R-N.Y., Rep. Tony Gonzales, R-Texas, Rep. Marjorie Taylor Greene, R-Ga. and Rep. Andrew Garbarino, R-N.Y., listen during a hearing with the House Committee on Homeland Security on Jan. 30, 2024. (Photo by Anna Moneymaker/Getty Images) | CyberScoop
President Donald Trump holds up an executive order on creating a White House 2028 Olympics task force after signing it in the South Court Auditorium of the White House on Aug. 5, 2025. (Photo by Brendan SMIALOWSKI / AFP) | CyberScoop
Then-Millenium challenge corporation CEO Sean Cairncross speaks during a ceremony on Aug. 5, 2019 at the presidential palace in Abidjan. (Photo by ISSOUF SANOGO / AFP) (Photo credit should read ISSOUF SANOGO/AFP via Getty Images) | CyberScoop
President Donald Trump holds up an executive order on creating a White House 2028 Olympics task force after signing it in the South Court Auditorium of the White House on Aug. 5, 2025. (Photo by Brendan SMIALOWSKI / AFP) | CyberScoop
Then-Millenium challenge corporation CEO Sean Cairncross speaks during a ceremony on Aug. 5, 2019 at the presidential palace in Abidjan. (Photo by ISSOUF SANOGO / AFP) (Photo credit should read ISSOUF SANOGO/AFP via Getty Images) | CyberScoop
Hundreds of victims are surfacing across the world from zero-day cyberattacks on Europe’s biggest software manufacturer and company.| CyberScoop
The Trump administration can start by returning CISA to its core mission, former DHS and California officials argue.| CyberScoop
The law is due to lapse in September, something cyber experts and industry officials say would be a huge loss.| CyberScoop
CrowdStrike observed significant growth in China’s offensive cyber capabilities last year as more groups used sector-specific skills to target critical industries and technologies.| CyberScoop
In this op-ed, cybersecurity expert Dave Kennedy argues that the U.S. must pivot to offensive cyber operations in 2025.| CyberScoop
Brett Leatherman told CyberScoop in an interview that while the group still poses a threat, the bureau is focused on resilience and victim support, and going on offense could be in the future.| CyberScoop
President Donald Trump’s pick to lead CISA told senators Thursday that he would prioritize evicting China from the U.S. supply chain.| CyberScoop
The bipartisan legislation would codify the agency’s position as the one in charge of coordinating responses to incidents like the breach on U.S. telecoms.| CyberScoop
It’s a “pivotal” moment for Sean Cairncross, fresh off his Senate confirmation in a changing federal cyber landscape.| CyberScoop
Federal analysts are still sizing up what the Chinese hackers known as Volt Typhoon might have intended by setting up shop there, a CISA official said Thursday.| CyberScoop
The Oregon Democrat has vowed to place a hold on the nomination to lead the agency until CISA releases the report.| CyberScoop
Sean Plankey, of Pennsylvania, responds to questioning during Senate Committee on Homeland Security and Governmental Affairs hearings to examine his nomination to be Director of the Cybersecurity and Infrastructure Security Agency, of the Department of Homeland Security, in the Dirksen Senate office building, in Washington, DC, on Wednesday July 24, 2025. (Mattie Neretin/CNP/Sipa USA) | CyberScoop
A series of moves from the president raises questions about what’s next for the federal government’s many cyber grant and aid initiatives.| CyberScoop
The guidance comes from the Office of the Director of National Cybersecurity and the Cybersecurity and Infrastructure Security Agency.| CyberScoop
Mark Green, R-Tenn., has championed legislation on the cyber workforce, renewal of a cyber threat information sharing bill and more.| CyberScoop
The social media giant is looking for improvements that focus on abuse detection, anti-phishing, password authentication and user safety.| CyberScoop
The Department of Energy doled out $4 million in grant funding earlier this month to four different cybersecurity firms in an effort to spur the development of new technology that can help protect against electrical grid cyberattacks. The move comes just three months after a complex cyberattack aimed at Ukrainian energy company Ukrenergo caused widespread blackouts across northern Kiev.| CyberScoop
But the South Dakota governor has touted cybersecurity as her state’s “next big industry” and signed cyber legislation into law.| CyberScoop
Without dedicated funds cybersecurity requirements tend to get short shrift, says former DHS official Greg Garcia, a champion of the new bill.| CyberScoop
Democrats voted against a bill they once supported, citing President Trump’s actions on cyber personnel.| CyberScoop
Contact the reporter on this story via email Shaun.Waterman@FedScoop.com, or follow him on Twitter @WatermanReports. Subscribe to CyberScoop to get all the cybersecurity news you need in your inbox every day at CyberScoop.com.| CyberScoop
The order seeks to withhold federal funding from states that don’t comply, sparking a heated backlash from legal and election experts.| CyberScoop
(Getty Images) | CyberScoop
Requests to block federal agencies from sharing federal data with states and to condition federal election funding were denied by Judge Colleen Kollar-Kotelly.| CyberScoop
bugs, flaws, software and hardware| CyberScoop
Analysis of a recent phishing campaign targeting Ukrainian entities using Russian war crimes themes. (Computer Emergency Response Team of Ukraine) | CyberScoop
Source: Getty Images | CyberScoop
SimpleImages, Getty Images | CyberScoop
SimpleImages, Getty Images | CyberScoop
SimpleImages, Getty Images | CyberScoop
U.S. regulatory agency.| CyberScoop
An analysis of four states with data broker registry laws found that hundreds of brokers are registered as such in one state but not in others. (Image Credit: Getty Images) | CyberScoop
Members of Congress also asked nominees for their thoughts on how the FTC should tackle AI.| CyberScoop