FBI investigating ‘suspicious’ cyber activities on critical surveillance network | CNN Politics

“The FBI identified and addressed suspicious activities on FBI networks, and we have leveraged all technical capabilities to respond,” the bureau said in a statement to CNN on Thursday, declining to elaborate.

Google Links China, Iran, Russia, North Korea to Coordinated Defense Sector Cyber Operations

Several state-sponsored actors, hacktivist entities, and criminal groups from China, Iran, North Korea, and Russia have trained their sights on the defense industrial base (DIB) sector, according to findings from Google Threat Intelligence Group (GTIG).

The WIRED Guide to Digital Opsec for Teens | WIRED

Protecting your digital privacy isn’t a blanket prescription. Some people are more private by nature, and others prioritize putting themselves out there. But even if you’re a 24/7 streamer, you can still think about your operations security, commonly known as opsec. What can viewers see in your room while you’re streaming? Which people from your life have appeared onscreen? Could viewers figure out where you live from what they can see out your window?

US emergency alert systems down after cyberattack • The Register

Various municipalities have issued near-identical advisories about the attack on the OnSolve CodeRED platform, now owned by Crisis24, which enables residents to receive real-time alerts for emergencies such as weather warnings, missing children, terror threats, and more.

Study concludes cybersecurity training doesn’t work | KPBS Public Media

Some people with training were slightly less likely to click on a phishing lure than the untrained. But some trained people were more likely to click.

Satellites Are Leaking the World’s Secrets: Calls, Texts, Military and Corporate Data | WIRED

With just $800 in basic equipment, researchers found a stunning variety of data—including thousands of T-Mobile users’ calls and texts and even US military communications—sent by satellites unencrypted.

Hackers Leverage Google Classroom in Phishing Attack Targeting Over 13,500 Organizations

The operation demonstrated significant scale and coordination, delivering a high volume of emails in just one week. The use of a widely used collaboration tool like Google Classroom allowed the attackers to reach a broad, multi-sector audience with minimal initial effort.

Pentests once a year? Nope. It’s time to build an offensive SOC

In the real world, adversaries don’t operate in bursts. Their recon is continuous, their tools and tactics are always evolving, and new vulnerabilities are often reverse-engineered into working exploits within hours of a patch release.

So, if your offensive validation isn’t just as dynamic, you’re not just lagging, you’re exposed.

Microsoft says China-backed cybercriminals hacked into US nuclear weapons agency

“The early exploitation resembled government-sponsored activity, and then spread more widely to include hacking that ‘looks like China’,” Meyers told Bloomberg News. CrowdStrike’s investigation into the campaign remains ongoing.

This Tool Upgrades Everything on Ubuntu with One Command – OMG! Ubuntu

Which is where the Topgrade utility comes in. It lets you run a single command to update software from multiple sources, in one fell swoop.