Moving CVEs past one-nation control
A near-miss episode of attempted defunding spotlights a need for a better way
Swati Nair reports: Infosys announced that its subsidiary, Infosys McCamish Systems (IMS), has reached an agreement with the US State of Vermont’s Department of Financial Regulation (DFR). This agreement, known as a stipulation and consent order, resolves issues related to a cyber incident without requiring a hearing. IMS is obligated to pay a USD 125,000…
From the U.S. Department of Justice: John Murray Rowe Jr., 67, of Lead, South Dakota, was sentenced today to 126 months in prison followed by three years of supervised release and a $25,000 fine for attempted espionage. The defendant was charged by indictment in December 2021 and pleaded guilty in April of last year to one count……
The comfort zone in cybersecurity is gone. Attackers are scaling down, focusing tighter, and squeezing more value from fewer, high-impact targets. At the same time, defenders face growing blind spots — from spoofed messages to large-scale social engineering. This week’s findings show how that shrinking margin of safety is redrawing the threat landscape. Here’s what’s
Divya reports: Swedish authorities have launched formal investigations into a significant data breach affecting Miljödata, a prominent IT company whose security lapse exposed the personal information of over 1.5 million individuals. The Swedish Data Protection Authority (IMY) initiated the probe following the August attack, which resulted in sensitive data being published on the Darknet and affecting multiple……
CBC reports: Both Ontario’s privacy commissioner and Ontario Health are investigating a reported data breach affecting Ontario Health atHome, the province’s home-care coordination service. The incident may have exposed personal health information for at least 200,000 home-care patients, the Ontario Liberals alleged in a news release Friday morning. The breach occurred on or around March 17 of this year but…
Cyber threats today don’t just evolve—they mutate rapidly, testing the resilience of everything from global financial systems to critical infrastructure. As cybersecurity confronts new battlegrounds—ranging from nation-state espionage and ransomware to manipulated AI chatbots—the landscape becomes increasingly complex, prompting vital questions: How secure are our cloud environments? Can our