Cybersecurity
Exclusive

Lawmakers seek DHS records in probe of US response to Chinese cyber campaigns

The House Homeland Security Committee wants DHS to provide internal documents on China’s Volt and Salt Typhoon hacking units, according to a letter being sent Monday.

US spy chief probing classified chat rooms to pursue leakers

Tulsi Gabbard said recent examples of unauthorized leaks involve data about Iran, Israel, U.S.-Russia relations and activities in ODNI’s counterintelligence office.

US lawmakers ask UK court for transparency into Apple backdoor order

The court order issued by the United Kingdom centers on the UK’s 2016 Investigatory Powers Act, which was invoked to demand Apple provide a backdoor into users’ encrypted iCloud backups.

Elon Musk paid a visit to NSA, Cyber Command amid DOGE-led overhauls

Musk’s trip to the signals intelligence office and combatant command is the first recorded instance of him visiting an intelligence agency since President Trump assumed office.

Cyberspace Solarium Commission turns five years old

The commission has largely influenced cybersecurity policymaking in Congress through the first half of the decade.

Republicans urge Trump admin to launch offensive cyber operations against China

The letter cites high-profile Chinese intrusions into U.S. systems that have made headlines in recent months. Trump’s national security officials have expressed a desire to engage in offensive cyber ops against adversaries.

Top House cyber lawmaker to press DHS on key infrastructure group’s shutdown

Industry representatives say the Critical Infrastructure Partnership Advisory Council has been a valuable information-sharing tool. It was disbanded last week under an order from DHS Secretary Kristi Noem.

OPM watchdog to investigate IT risks tied to DOGE’s agency access

The agency’s deputy inspector general began “an engagement to assess risks associated with new and modified information systems at OPM,” a letter to lawmakers says.

Civil liberties groups urge spy chief to declassify parts of contested surveillance program

Tulsi Gabbard’s views on the Section 702 program have run atypical to those of past spy chiefs, but it’s not clear what declassification authorities she immediately has.

Former intelligence officials denounce job cuts to federal cyber roles

In testimony before a House panel, they said the moves — which have largely affected the Cybersecurity and Infrastructure Security Agency — are harmful to national security.

US charges 12 Chinese nationals for hacks into government systems

Some of the people have ties to i-Soon, the Chinese tech firm whose hacking-for-hire activities were exposed in a leak last year. Others are linked to Silk Typhoon, a hacking unit that recently breached the Treasury Department.

Hegseth orders suspension of cyber, information operations planning against Russia

Kremlin spokesman Dmitry Peskov said Sunday that new U.S. foreign policy configurations “largely coincides with our vision.”

IBM contract for overseas cyber assistance canned amid USAID shutdown

The foreign aid agency — a prime target of President Donald Trump’s agenda to eliminate perceived government waste — declared cybersecurity an economic development issue in 2021.

US spy chief directs legal review of UK’s Apple backdoor demand

Tulsi Gabbard called the order, which demands Apple permit the United Kingdom backdoor access into global users’ iCloud backups, a “clear and egregious” violation of Americans’ privacy.

Democrats open investigation into DOGE access to national security information

Multiple media reports have indicated DOGE has accessed classified or highly sensitive data across the government.

DOJ watchdog to review FBI data retrieval uses under contested spying authority

The audit came from Congress as part of a law that reauthorized Section 702 of the Foreign Intelligence Surveillance Act.

Salt Typhoon hackers exploited stolen credentials and a 7-year-old software flaw in Cisco systems

The Chinese hacking collective has widely leveraged vulnerabilities in communications infrastructure to breach dozens of telecom providers in the U.S. and overseas.