Tag: government
-
New Zealand Probes Ransomware Hack of Health Portal
More Than 100,000 Affected by Hack Detected on Dec. 30. The New Zealand government is probing a year-end ransomware hack of private healthcare service provider Manage My Health that impacted thousands of patients. Digital extortion group Kazu has claimed responsibility and threatened to leak the data on Jan. 15 unless it receives a $60,000 ransom.…
-
Russia-Aligned Hackers Abuse Viber to Target Ukrainian Military and Government
The Russia-aligned threat actor known as UAC-0184 has been observed targeting Ukrainian military and government entities by leveraging the Viber messaging platform to deliver malicious ZIP archives.”This organization has continued to conduct high-intensity intelligence gathering activities against Ukrainian military and government departments in 2025,” the 360 Threat Intelligence Center said in First seen on thehackernews.com…
-
New Zealand orders review into ManageMyHealth cyberattack
Government ‘incredibly’ concerned about breach potentially affecting more than 100,000 patients First seen on theregister.com Jump to article: www.theregister.com/2026/01/05/nz_managemyhealth_breach_review/
-
New Zealand orders review into ManageMyHealth cyberattack
Government ‘incredibly’ concerned about breach potentially affecting more than 100,000 patients First seen on theregister.com Jump to article: www.theregister.com/2026/01/05/nz_managemyhealth_breach_review/
-
Time to restore America’s cyberspace security system
China’s campaign to break into our critical infrastructure and federal government networks is persistent and growing. Beijing is stealing information while also planting tools and maintaining access in key systems, giving it the option to pressure the United States in the future. Russia also continues to test our critical infrastructure with increasingly sophisticated operations, support…
-
Pakistan-linked hackers target Indian government, universities in new spying campaign
The campaign has been attributed to APT36, also known as Transparent Tribe, a long-running threat actor accused of spying on Indian government bodies, military-linked organizations and universities. First seen on therecord.media Jump to article: therecord.media/pakistan-linked-hacking-group-targets-indian-orgs
-
APT36 Uses Malicious Windows Shortcuts to Target Indian Government
APT36 is targeting Indian government entities using malicious Windows shortcut files disguised as PDFs. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/threats/apt36-uses-malicious-windows-shortcuts-to-target-indian-government/
-
Brit lands invite-only Aussie visa after uncovering vuln in government systems
Tags: governmentJacob Riggs is set to swap London for Sydney some time in the next year First seen on theregister.com Jump to article: www.theregister.com/2026/01/02/brit_security_australia_visa/
-
Brit lands invite-only Aussie visa after uncovering vuln in government systems
Tags: governmentJacob Riggs is set to swap London for Sydney some time in the next year First seen on theregister.com Jump to article: www.theregister.com/2026/01/02/brit_security_australia_visa/
-
Brit lands invite-only Aussie visa after uncovering vuln in government systems
Tags: governmentJacob Riggs is set to swap London for Sydney some time in the next year First seen on theregister.com Jump to article: www.theregister.com/2026/01/02/brit_security_australia_visa/
-
Transparent Tribe Launches New RAT Attacks Against Indian Government and Academia
The threat actor known as Transparent Tribe has been attributed to a fresh set of attacks targeting Indian governmental, academic, and strategic entities with a remote access trojan (RAT) that grants them persistent control over compromised hosts.”The campaign employs deceptive delivery techniques, including a weaponized Windows shortcut (LNK) file masquerading as a legitimate PDF document…
-
Transparent Tribe Launches New RAT Attacks Against Indian Government and Academia
The threat actor known as Transparent Tribe has been attributed to a fresh set of attacks targeting Indian governmental, academic, and strategic entities with a remote access trojan (RAT) that grants them persistent control over compromised hosts.”The campaign employs deceptive delivery techniques, including a weaponized Windows shortcut (LNK) file masquerading as a legitimate PDF document…
-
Transparent Tribe Launches New RAT Attacks Against Indian Government and Academia
The threat actor known as Transparent Tribe has been attributed to a fresh set of attacks targeting Indian governmental, academic, and strategic entities with a remote access trojan (RAT) that grants them persistent control over compromised hosts.”The campaign employs deceptive delivery techniques, including a weaponized Windows shortcut (LNK) file masquerading as a legitimate PDF document…
-
The Ghost in the Kernel: How HoneyMyte Weaponized a Rootkit to Hijack Asian Governments
Tags: governmentThe post The Ghost in the Kernel: How HoneyMyte Weaponized a Rootkit to Hijack Asian Governments appeared first on Daily CyberSecurity. First seen on securityonline.info Jump to article: securityonline.info/the-ghost-in-the-kernel-how-honeymyte-weaponized-a-rootkit-to-hijack-asian-governments/
-
APT36 Targets Indian Government Systems Using Malicious Windows LNK Files
A sophisticated cyber-espionage operation attributed to APT36, also known as Transparent Tribe, has been identified targeting Indian governmental, academic, and strategic entities through weaponized Windows shortcut files designed to evade detection and establish persistent remote access. The Pakistan-aligned threat actor deployed a deceptive LNK-based infection chain that leverages trusted system binaries and fileless execution techniques…
-
Fears Mount That US Federal Cybersecurity Is Stagnating”, or Worse
Government staffing cuts and instability, including this year’s prolonged shutdown, could be hindering US digital defense and creating vulnerabilities. First seen on wired.com Jump to article: www.wired.com/story/expired-tired-wired-federal-cybersecurity/
-
Equifax Europe CISO: Notorious breach spurred cybersecurity transformation
Tags: access, ai, attack, authentication, awareness, breach, business, ceo, cio, ciso, cloud, computer, control, corporate, cyber, cyberattack, cybercrime, cybersecurity, data, defense, dora, espionage, finance, framework, google, government, identity, infrastructure, intelligence, network, nis-2, phishing, regulation, risk, risk-management, security-incident, service, strategy, technology, threat, updateCloud as a new technological axis: Equifax’s $3 billion migration to the cloud, “which had been brewing for about seven years” and which the company says is the largest technological investment in its history, has involved moving more than 300 systems, over 30 product families, and thousands of customers to the company’s cloud platform, Equifax Cloud, in Spain…
-
Chinese Hackers Deploy Rootkit to Stealthily Mask ToneShell Malware
Tags: apt, backdoor, china, cyber, cyberespionage, government, group, hacker, malicious, malware, technology, toolA sophisticated cyberespionage campaign leveraging kernel-mode rootkit technology has been discovered targeting government organizations across Southeast and East Asia, with Myanmar and Thailand bearing the brunt of attacks. Security researchers identified a malicious driver delivering the ToneShell backdoor, a hallmark tool of the Chinese-nexus HoneyMyte APT group, also tracked as Mustang Panda or Bronze President.…
-
HoneyMyte (aka Mustang Panda) Deploys ToneShell Backdoor in New Attacks
HoneyMyte (Mustang Panda) is back with a new ToneShell backdoor. Read how this stealthy attack blinds Microsoft Defender to target government entities in Asia. First seen on hackread.com Jump to article: hackread.com/honeymyte-mustang-panda-toneshell-backdoor/
-
HoneyMyte (aka Mustang Panda) Deploys ToneShell Backdoor in New Attacks
HoneyMyte (Mustang Panda) is back with a new ToneShell backdoor. Read how this stealthy attack blinds Microsoft Defender to target government entities in Asia. First seen on hackread.com Jump to article: hackread.com/honeymyte-mustang-panda-toneshell-backdoor/
-
You’ve been targeted by government spyware. Now what?
Tech companies are increasingly warning their customers that they have been targeted by governments with advanced government spyware, such as NSO’s Pegasus or Paragon’s Graphite. What happens after receiving a threat notification? First seen on techcrunch.com Jump to article: techcrunch.com/2025/12/29/youve-been-targeted-by-government-spyware-now-what/
-
You’ve been targeted by government spyware. Now what?
Tech companies are increasingly warning their customers that they have been targeted by governments with advanced government spyware, such as NSO’s Pegasus or Paragon’s Graphite. What happens after receiving a threat notification? First seen on techcrunch.com Jump to article: techcrunch.com/2025/12/29/youve-been-targeted-by-government-spyware-now-what/
-
Meet the team that investigates when journalists and activists get hacked with government spyware
For years, Access Now’s Digital Security Helpline has been aiding journalists and dissidents who have been targeted with government spyware. This is how they operate. First seen on techcrunch.com Jump to article: techcrunch.com/2025/12/27/meet-the-team-that-investigates-when-journalists-and-activists-get-hacked-with-government-spyware/
-
Inside the Biggest Cyber Attacks of 2025
Tags: attack, breach, credentials, cyber, cybersecurity, finance, government, healthcare, incident, infrastructure, leak, saas, supply-chain2025 has emerged as one of the most disruptive years for cybersecurity, marked by unprecedented breach volumes, record-breaking credential leaks, and cascading supply-chain failures. Across just 12 months, cyber incidents have impacted governments, healthcare systems, financial institutions, SaaS providers, airlines, retailers, and critical infrastructure, proving that no industry or geography remains insulated. 2025 Global Cybersecurity……
-
U.S. Federal Communications Commission (FCC) bans foreign-made drones over national security concerns
The FCC announced a ban on drones and critical components made in foreign countries, citing national security concerns. The U.S. Federal Communications Commission (FCC) said it has banned drones and key components manufactured abroad over national security concerns. The U.S. government said drones can improve safety and innovation but also pose security risks if used…
-
FBI seizes domain storing bank credentials stolen from U.S. victims
The U.S. government has seized the ‘web3adspanels.org’ domain and the associated database used by cybercriminals to host bank login credentials stolen in account takeover attacks. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/fbi-seizes-domain-storing-bank-credentials-stolen-from-us-victims/
-
Indian Vehicle Owners Warned as Browser-Based e-Challan Phishing Gains Momentum
A renewed RTO scam campaign targeting Indian vehicle owners is gaining momentum. This follows a sharp rise in browser-based e-challan phishing operations that rely on shared and reusable fraud infrastructure. The latest findings indicate that attackers are exploiting trust in government transport services, continuing a pattern of RTO-themed threats that have persisted over recent years. First seen on thecyberexpress.com Jump to article: thecyberexpress.com/rto-scam-browser-based-e-challan-phishing/
-
APT-36 Uses Fake >>WhatsApp Fraud<< Advisory to Hack Government Systems
The post APT-36 Uses Fake >>WhatsApp Fraud
-
UK Government Urged to Review Palantir Contracts After Swiss Security Report
The report warned that sensitive military data shared with Palantir could potentially be accessed by US government bodies, including intelligence services. The post UK Government Urged to Review Palantir Contracts After Swiss Security Report appeared first on TechRepublic. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/news-uk-government-palantir-contracts/

