John Thune (R-SD) speaks after being elected Senate Majority Leader for the 119th Congress following the Senate Republican leadership elections at the U.S. Capitol on Nov. 13. (Photo by Kevin Dietsch/Getty Images) Trio of South Dakota politicians set to have bigger roles on cybersecurity The little-populated state is seeing its governor and two senators move into key positions to influence cyber policy. By Tim Starks
(Getty Images) Malware linked to Salt Typhoon used to hack telcos around the world Cybersecurity By Greg Otto
The NSO Group company logo is displayed on a wall of a building next to one of their branches in the southern Israeli Arava valley near Sapir community centre on February 8, 2022. NSO Group currently has 39 legal cases against it due to the fallout around its Pegasus spyware product. (Photo by MENAHEM KAHANA / AFP) Legal barriers complicate justice for spyware victims Some recent court rulings show the difficult road of anti-spyware litigation, but those in the fight also see signs of promise. By Tim Starks
Broken RGB screen close-up with a missing pixel on the bottom right. (Getty Images) Zero trust: How the ‘Jia Tan’ hack complicated open-source software By Christian Vasquez
David Wall/Getty Images Sanctioned and exposed, Predator spyware maker group has gone awfully quiet By Tim Starks
Benjamin Franklin writing his Autobiography. Franklin’s creation of a volunteer fire department has sparked an idea amongst the cybersecurity community. (Photo by Culture Club/Getty Images) How Benjamin Franklin is inspiring defenders to protect critical infrastructure By Christian Vasquez
The pressing threat of Chinese-made drones flying above U.S. critical infrastructure By Brian Harrell Travis Moran
Want to scale cyber defenders? Focus on AI-enabled security and organization-wide training By Jay Bhalodia
Palo Alto Networks’ Eric Trexler talks how AI is affecting cybersecurity planning By Scoop News Group
Cal-Berkeley’s Elijah Baucom on how students are helping nonprofits avoid spyware By CyberScoop Staff
An Egyptian Fisherman holds a fishing net on the waters of the Pharaonic Sea in the village of Kafr Fisha, province of Monufia, in 2019. (MOHAMED EL-SHAHED/AFP via Getty Images) Microsoft seizes websites tied to Egypt-based DIY phishing kit-maker
Hogs are raised on the farm of Ted Fox in 2018 near Osage, Iowa. (Photo by Scott Olson/Getty Images) Meta cracks down on millions of accounts it tied to pig-butchering scams
A pedestrian walks past a seal reading “Department of Justice Federal Bureau of Investigation”, displayed on the J. Edgar Hoover FBI building, in Washington, DC, on August 15, 2022. (Photo by MANDEL NGAN/AFP via Getty Images) US charges five men linked to ‘Scattered Spider’ with wire fraud
Sen. Mark Warner, D-Va., speaks during a press conference in Washington, D.C., on March 20, 2018. From left, Sens. John Cornyn, James Lankford, Susan Collins and Richard Burr listen. (NICHOLAS KAMM/AFP via Getty Images) Vulnerability disclosure policy bill for federal contractors clears Senate panel
Sen. Richard Blumenthal speaks on July 11 in Washington, D.C. (Photo by Bonnie Cash/Getty Images) Sen. Blumenthal wants FCC to get busy on telecom wiretap security rules
(Jeenah Moon/Getty Images) Microsoft launches ‘Zero Day Quest’ competition to enhance cloud and AI security
Sen. Gary Peters, D-Mich., speaks during a Senate Homeland Security and Governmental Affairs Committee hearing on March 25, 2021 on Capitol Hill in Washington, D.C. (Photo by Astrid Riecken/Getty Images) Bipartisan Senate bill targets supply chain threats from foreign adversaries
East Steps of the US Capitol from the ground with a clear blue sky. (Getty Images) Rail and pipeline representatives push to dial back TSA’s cyber mandates
Shakhtar Donetsk’s Ukrainian midfielder #10 Georgiy Sudakov (C) vies for the ball during the UEFA Champions League football match FC Shakhtar Donetsk vs BSC Young Boys in Gelsenkirchen, western Germany, on November 6, 2024. Hackers were recently found to be exploiting Jupyter notebooks to host illegal streams of this particular Champions League game. (Photo by INA FASSBENDER/AFP via Getty Images) Attackers are hijacking Jupyter notebooks to host illegal Champions League streams
Dec 3 2024 Emerge: Operational Technology Waldorf Astoria, Washington, D.C. Register for Emerge: Operational Technology
Feb 19 2025 Zero Trust Summit INTERNATIONAL SPY MUSEUM, WASHINGTON, DC Register for Zero Trust Summit
Mar 4 2025 Cybersecurity Modernization Summit Virtual Event Register for Cybersecurity Modernization Summit
Mar 19 2025 Elastic Public Sector Summit Waldorf Astoria, Washington, D.C. Register for Elastic Public Sector Summit