Cyberattacks
Search documents
X @Bloomberg
Bloomberg· 2025-11-14 15:02
Hybrid Threats & Cooperation - European defense ministers pledged increased cooperation to counter hybrid threats [1] - Hybrid threats include drones, cyberattacks, and disinformation [1] - Disruptions from unmanned aerial vehicles are becoming a near-daily occurrence in Europe [1]
X @Bloomberg
Bloomberg· 2025-11-12 00:41
Cyber Security Legislation - The UK government is set to introduce a new law to bolster defenses against disruptive cyberattacks [1] - These cyberattacks have cost the British economy billions of pounds (currency unspecified) [1]
U.S. Sanctions North Korean Bankers Over Crypto Laundering Tied to Cyberattacks
Yahoo Finance· 2025-11-04 16:28
The U.S. Treasury has imposed fresh sanctions on a group of North Korean bankers and institutions accused of laundering millions in cryptocurrency tied to cyberattacks and illicit IT work schemes that help fund Pyongyang’s weapons programs. The Office of Foreign Assets Control (OFAC) said Tuesday that eight individuals and two entities were designated for “laundering funds derived from cybercrime and information technology worker fraud,” including proceeds linked to ransomware and crypto thefts. “North K ...
X @Bloomberg
Bloomberg· 2025-11-03 21:32
As voters across the US prepare to cast ballots Tuesday, election officials are operating with reduced support from a federal government agency that previously helped states and localities counter threats and cyberattacks https://t.co/OlHJXVKvcU ...
Telenor warns in new Nordic security report: Increased risk of cyberattacks, sabotage and disinformation
Globenewswire· 2025-10-30 06:00
Core Insights - Telenor's annual Nordic security report emphasizes the need for a coordinated regional approach to security amid rising geopolitical tensions and digital threats [1][2] - The report identifies six main security risks that the Nordic region must prepare for, highlighting the interdependence of critical services [3][6] Security Risks - The six main threat categories identified are: 1. Destructive cyberattacks 2. Sabotage of digital and physical infrastructure 3. Foreign influence and disinformation campaigns 4. Intelligence operations targeting critical infrastructure 5. Organised digital financial crime 6. Advanced online fraud [6] Resilience and Preparedness - Telenor stresses that resilience requires long-term investment, preparedness, and coordination between governments and industry [5] - The report calls for predictable funding, aligned frameworks, and operations to ensure effective regional response during crises [5] Hybrid Threats and Critical Infrastructure - Hybrid threats are reshaping the security landscape, with state-backed and criminal actors blurring the lines between different types of attacks [7] - Critical infrastructure, including subsea cables and mobile networks, is identified as a strategic battleground and prime target for attacks [7] Data Sovereignty and Regional Cooperation - Data sovereignty is becoming a crucial issue, prompting investments in sovereign or regionally governed cloud solutions [7] - The report highlights the importance of Nordic alignment, shared situational awareness, and joint exercises to meet NATO's resilience objectives [7] Recommendations for Strengthening Resilience - The report includes recommendations for governments and operators to enhance preparedness and build lasting resilience across the Nordic region [8] - Key recommendations include making resilience a Nordic priority, aligning frameworks across borders, and strengthening information sharing [9]
X @Bloomberg
Bloomberg· 2025-10-28 14:18
Recent cyberattacks on public defenders’ offices in multiple Western US states have spotlighted the technological vulnerabilities of an often overlooked but critical part of the US judicial system https://t.co/EtDdaahftf ...
Palo Alto Networks debuts automated AI agents to fight cyberattacks
CNBC· 2025-10-28 14:00
Core Insights - Palo Alto Networks has launched new AI agents called Cortex AgentiX to automate cybersecurity actions, addressing the increasing demand for automation in the industry [2][3] - The new agents can perform tasks such as threat intelligence investigations and responding to email breaches, and will be available through existing cloud services and as a separate platform next year [2][3] - CEO Nikesh Arora highlighted the need for companies to enhance their security measures, especially in light of recent sophisticated cyberattacks, such as a 10% stock drop for F5 following a nation-state hack [3][4] Company Developments - The company is integrating its $25 billion acquisition of CyberArk, an Israeli identity security vendor, into its AI and security strategies [4] - Arora emphasized the importance of finding great products and capable teams to execute the integration effectively [4] Industry Context - The cybersecurity industry is experiencing a shift towards more automated solutions as companies face increasingly complex cyber threats [3][4] - There is a concern that some enterprises may have a false sense of security regarding their defenses, indicating a need for improved awareness and action in cybersecurity [4]
X @Bloomberg
Bloomberg· 2025-10-27 16:57
RT Bloomberg Live (@BloombergLive)ICYMI: "Hackers are leveraging the simplest tools - they can leverage AI to get a much bigger scale in general with the same tools even," @ArmisSecurity's Yevgeny Dibrov explains how hackers are using AI to increase cyberattacks at #BloombergTech.⏯️https://t.co/14dUvkqp0j https://t.co/Xrq6hKbVTT ...
X @Bloomberg
Bloomberg· 2025-10-22 22:45
The recent wave of cyberattacks against Japanese businesses has exposed critical weaknesses in the country’s corporate digital defenses https://t.co/sOi9lu7apR ...