<?xml version="1.0" encoding="utf-8"?>
<rss xmlns:nb="https://www.newsbreak.com/" xmlns:media="http://search.yahoo.com/mrss/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/"><channel><title>Nextgov/FCW - Cybersecurity</title><link>https://www.nextgov.com/cybersecurity/</link><description></description><atom:link href="https://www.nextgov.com/rss/cybersecurity/" rel="self"></atom:link><language>en-us</language><lastBuildDate>Fri, 17 Apr 2026 13:09:00 -0400</lastBuildDate><item><title>CISA resources ‘more limited than I would like’ amid shutdown, top official says</title><link>https://www.nextgov.com/cybersecurity/2026/04/cisa-resources-more-limited-i-would-amid-shutdown-top-official-says/412939/</link><description>Many “preparatory activities” and “outreach that we’d typically be able to do” are not allowed during an ongoing DHS shutdown, Nick Andersen told lawmakers.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">David DiMolfetta</dc:creator><pubDate>Fri, 17 Apr 2026 13:09:00 -0400</pubDate><guid>https://www.nextgov.com/cybersecurity/2026/04/cisa-resources-more-limited-i-would-amid-shutdown-top-official-says/412939/</guid><category>Cybersecurity</category><content:encoded>&lt;![CDATA[&lt;p&gt;The Cybersecurity and Infrastructure Security Agency&amp;rsquo;s top official said resources to detect and counter hacking threats are &amp;ldquo;more limited than I would like&amp;rdquo; as the cyberdefense office grapples with funding issues facing the Department of Homeland Security.&lt;/p&gt;

&lt;p&gt;CISA acting Director Nick Andersen &lt;a href="https://appropriations.house.gov/schedule/hearings/budget-hearing-department-homeland-security-cisa-tsa-us-coast-guard-us-secret"&gt;told House appropriators&lt;/a&gt; on Thursday that many &amp;ldquo;preparatory activities within the environment, a lot of the outreach that we&amp;rsquo;d typically be able to do&amp;rdquo; are not allowed during an ongoing shutdown in the department.&lt;/p&gt;

&lt;p&gt;DHS employees were called back to the office this week, after President Donald Trump ordered the department to use funds from the One Big Beautiful Bill Act to pay civilian employees and their furloughed colleagues who hadn&amp;rsquo;t received pay throughout the shutdown.&lt;/p&gt;

&lt;p&gt;But due to its current cash issues, CISA is unable to cover costs beyond employee salaries, according to an email Andersen sent to staff on Monday that was obtained by &lt;em&gt;Nextgov/FCW&lt;/em&gt;. The email specified that any non-salary expenditures now require an exception under the Antideficiency Act, which governs how agencies use their congressionally appropriated funds.&lt;/p&gt;

&lt;p&gt;DHS has now been unfunded for about two months, amid a partisan stalemate over immigration enforcement reforms.&lt;/p&gt;

&lt;p&gt;The cyberdefense agency also canceled plans to onboard summer interns participating in a government scholarship program for cyber talent due to the funding lapse, &lt;em&gt;Nextgov/FCW&lt;/em&gt; &lt;a href="https://www.nextgov.com/people/2026/04/cisa-cancels-cybercorps-summer-internship-hiring-amid-dhs-shutdown/412837/?oref=ng-author-river"&gt;reported&lt;/a&gt; Tuesday.&lt;/p&gt;

&lt;p&gt;Even beyond current financial limitations, the fiscal year 2027 budget request for CISA proposes to make&amp;nbsp;&lt;a href="https://www.nextgov.com/cybersecurity/2026/04/trump-proposes-cutting-cisa-election-security-program-fy27-budget/412672/?oref=ng-author-river"&gt;significant reductions&lt;/a&gt; to election security, workforce development, stakeholder engagement and a range of infrastructure protection resources.&lt;/p&gt;

&lt;p&gt;The budget plans reflect long-standing skepticism from the Trump administration and its allies toward the agency, particularly over its role in 2020 election security efforts and concurrent work to counter false information online. Critics have argued CISA strayed beyond its &amp;ldquo;core&amp;rdquo; mission of infrastructure protection and federal cyber defense.&lt;/p&gt;

&lt;p&gt;Cyber practitioners and former officials have frequently said that even the cuts put in place in the last year go too far.&lt;/p&gt;

&lt;p&gt;Those reductions, compounded by the current shutdown, come as the U.S. continues to face cyber threats from Iran, despite recent efforts by the Trump administration to broker a deal with Tehran and Israel.&lt;/p&gt;

&lt;p&gt;Earlier this month, CISA and other agencies said Iran-aligned hackers &lt;a href="https://www.nextgov.com/cybersecurity/2026/04/pro-iran-hackers-are-targeting-us-industrial-control-systems-advisory-says/412679/"&gt;exploited and disrupted&lt;/a&gt; operational technology control systems embedded in multiple U.S. critical infrastructure sectors.&lt;/p&gt;

&lt;p&gt;Iran has been &amp;ldquo;opportunistically focused&amp;rdquo; in its hacking efforts and has targeted unsecured devices connected to the internet, added Andersen.&lt;/p&gt;
]]&gt;</content:encoded><media:content url="https://cdn.nextgov.com/media/img/cd/2026/04/17/041726AndersenNG/large.jpg" width="618" height="284"><media:description>Nick Andersen, Acting Director of the Cybersecurity and Infrastructure Security Agency, speaks during a House Committee on Appropriations and Subcommittee on Homeland Security hearing on April 16, 2026 in Washington, DC. </media:description><media:credit>Roberto Schmidt/Getty Images</media:credit><media:thumbnail url="https://cdn.nextgov.com/media/img/cd/2026/04/17/041726AndersenNG/thumb.jpg" width="138" height="83"></media:thumbnail></media:content></item><item><title>Expect more cybersecurity executive orders soon, national cyber director says</title><link>https://www.nextgov.com/cybersecurity/2026/04/expect-more-cybersecurity-executive-orders-soon-national-cyber-director-says/412861/</link><description>Sean Cairncross also said that his office and others in the administration are in touch with AI and tech companies following Anthropic’s Project Glasswing announcement.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">David DiMolfetta</dc:creator><pubDate>Wed, 15 Apr 2026 12:34:00 -0400</pubDate><guid>https://www.nextgov.com/cybersecurity/2026/04/expect-more-cybersecurity-executive-orders-soon-national-cyber-director-says/412861/</guid><category>Cybersecurity</category><content:encoded>&lt;![CDATA[&lt;p&gt;President Donald Trump is expected to sign more cybersecurity-focused executive orders in the near future, following the release of his administration&amp;rsquo;s national cyber strategy, National Cyber Director Sean Cairncross said Wednesday.&lt;/p&gt;

&lt;p&gt;At the Semafor World Economy forum in Washington, D.C., Cairncross said, &amp;ldquo;I think that that&amp;#39;s the case, yeah,&amp;rdquo; when asked about the likelihood of more cyber executive actions from the president.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;There&amp;rsquo;s more coming and we expect that it will be relatively soon,&amp;rdquo; he added, without elaborating.&lt;/p&gt;

&lt;p&gt;The second Trump administration&amp;rsquo;s national cyber strategy was &lt;a href="https://www.nextgov.com/cybersecurity/2026/03/trumps-new-cyber-strategy-details-more-offensive-response-cyber-threats/411963/"&gt;unveiled&lt;/a&gt; early last month, alongside an executive order focused on &amp;ldquo;combating cybercrime, fraud, and predatory schemes.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;Executive orders and possible revisions to long-standing cybersecurity laws were expected to follow the strategy&amp;rsquo;s release, &lt;em&gt;Nextgov/FCW&lt;/em&gt; &lt;a href="https://www.nextgov.com/cybersecurity/2025/12/trump-admin-revisit-bedrock-cyber-policies-it-implements-new-strategy/410173/"&gt;previously reported&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The strategy&amp;rsquo;s pillars include goals to reshape adversary behavior; promote common sense regulation; modernize and secure federal government networks; secure critical infrastructure; sustain superiority in critical and emerging technologies; and build cyber talent and capacity.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Asked about the recent announcement of Anthropic&amp;rsquo;s Project Glasswing initiative and its concurrent Mythos Preview model, Cairncross said that Mythos is &amp;ldquo;the model right now that everyone&amp;rsquo;s talking about&amp;rdquo; but that AI capabilities, generally, are getting more sophisticated.&lt;/p&gt;

&lt;p&gt;Advanced AI threats have &lt;a href="https://www.wsj.com/tech/ai/white-house-races-to-head-off-threats-from-powerful-ai-tools-5c6f22e2"&gt;caught the attention&lt;/a&gt; of senior administration officials, including Cairncross. The intelligence community has already been &lt;a href="https://www.nextgov.com/cybersecurity/2026/04/anthropics-glasswing-initiative-raises-questions-us-cyber-operations/412721/"&gt;eyeing&lt;/a&gt; the Mythos Preview capabilities.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Earlier this year, Anthropic declined to ease restrictions against its tools being used for domestic surveillance or fully autonomous weapons for Pentagon use, triggering a &amp;ldquo;supply chain risk&amp;rdquo; designation from the Defense Department and a White House order that all federal agencies phase out their uses of Anthropic tools. The company has legally challenged the move.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Cairncross didn&amp;rsquo;t directly answer questions about whether Mythos Preview should be widely distributed. Anthropic says it held back the full, public release of its Claude Mythos Preview model because it was deemed too dangerous due to its advanced, autonomous hacking capabilities.&lt;/p&gt;

&lt;p&gt;Project Glasswing grants certain companies selective access to Mythos for further safety and capability testing.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Asked about U.S. agencies &amp;mdash; including the &lt;a href="https://www.bloomberg.com/news/articles/2026-04-14/us-treasury-seeking-access-to-anthropic-s-mythos-to-find-flaws"&gt;Treasury Department&lt;/a&gt; and &lt;a href="https://www.politico.com/news/2026/04/14/anthropic-mythos-federal-agency-testing-00872439?_bhlid=1681e2adfd7d3ce5f04ec99b06852f353d0c21ee&amp;amp;utm_campaign=google-adds-ai-skills-to-chrome&amp;amp;utm_medium=newsletter&amp;amp;utm_source=memo-daily.beehiiv.com"&gt;Commerce Department&lt;/a&gt; &amp;mdash; seeking access to the Mythos model, he said,&amp;nbsp;&amp;ldquo;we&amp;rsquo;re working closely with the large-language model companies, we&amp;rsquo;re working closely with the tech sector [and] we&amp;rsquo;re working closely with industry to make sure that we do this in a responsible fashion.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;&amp;ldquo;This is not a special model,&amp;rdquo; Anthropic co-founder Jack Clark said Monday, referring to Mythos Preview. &amp;ldquo;There will be other systems just like this in a few months from other companies, and then a year to a year and a half later, there&amp;rsquo;ll be open-weight models from China that have these capabilities. So the world is going to have to get ready for more powerful systems that are going to exist within it.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Nextgov/FCW Staff Reporter Alexandra Kelley contributed to this report.&lt;/em&gt;&lt;/p&gt;
]]&gt;</content:encoded><media:content url="https://cdn.nextgov.com/media/img/cd/2026/04/15/GettyImages_2271485955/large.jpg" width="618" height="284"><media:description>National Cyber Director Sean Cairncross and Morgan Chalfant, deputy Washington editor at Semafor, speak on stage during Semafor World Economy 2026 on April 15, 2026 in Washington, DC..</media:description><media:credit>Tasos Katopodis/Getty Images for Semafor World Economy</media:credit><media:thumbnail url="https://cdn.nextgov.com/media/img/cd/2026/04/15/GettyImages_2271485955/thumb.jpg" width="138" height="83"></media:thumbnail></media:content></item><item><title>FCC selects ioXt Alliance to lead cyber labeling program</title><link>https://www.nextgov.com/cybersecurity/2026/04/fcc-selects-ioxt-alliance-lead-cyber-labeling-program/412800/</link><description>The prior lead administrator withdrew from the Biden-era Cyber Trust Mark initiative after the launch of a Trump administration probe into its alleged China ties.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">David DiMolfetta</dc:creator><pubDate>Mon, 13 Apr 2026 12:25:00 -0400</pubDate><guid>https://www.nextgov.com/cybersecurity/2026/04/fcc-selects-ioxt-alliance-lead-cyber-labeling-program/412800/</guid><category>Cybersecurity</category><content:encoded>&lt;![CDATA[&lt;p&gt;The Federal Communications Commission announced Monday that California-based ioXt Alliance will be the lead administrator for its cybersecurity labeling program after the prior administrator pulled out of the initiative amid an investigation into its China ties.&lt;/p&gt;

&lt;p&gt;The program, called the Cyber Trust Mark, was launched during the Biden administration and is designed to certify consumer smart devices with a label that deems them cybersecure.&lt;/p&gt;

&lt;p&gt;The ioXt Alliance is a standards and certifications body for internet-of-things devices like remote thermostats, fitness trackers and connected cars.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&amp;ldquo;ioXt is an independent, U.S.-based non-profit organization, whose focus is on improving the security, privacy, and transparency of IoT products,&amp;rdquo; the FCC said in a statement announcing the decision.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;UL Solutions, the prior Cyber Trust Mark lead, &lt;a href="https://www.nextgov.com/cybersecurity/2026/01/ul-solutions-withdraws-lead-admin-fcc-cyber-label-program-amid-probe-china-ties/410448/"&gt;withdrew&lt;/a&gt; in December after FCC Chairman Brendan Carr launched a national security review earlier that year into its alleged ties to China, including the presence of technology testing locations in China&amp;rsquo;s borders.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;We are honored to be selected as a Cyber Labeling Authority for this transformative program,&amp;rdquo; Gary Jabara, CEO and Founder of ioXt Alliance said. &amp;ldquo;This recognition aligns with our mission to drive IoT security forward, and we are committed to collaborating with the FCC, UL Solutions, and industry stakeholders to make this program a success.&amp;rdquo;&lt;/p&gt;
]]&gt;</content:encoded><media:content url="https://cdn.nextgov.com/media/img/cd/2026/04/13/041326trustmarkNG/large.jpg" width="618" height="284"><media:credit>Olemedia/Getty Images</media:credit><media:thumbnail url="https://cdn.nextgov.com/media/img/cd/2026/04/13/041326trustmarkNG/thumb.jpg" width="138" height="83"></media:thumbnail></media:content></item><item><title>US push to counter hackers draws industry deeper into offensive cyber debate</title><link>https://www.nextgov.com/cybersecurity/2026/04/us-push-counter-hackers-draws-industry-deeper-offensive-cyber-debate/412770/</link><description>The White House is expanding the market for offensive cyber capabilities — and drawing more of the private sector into that ecosystem — even as policy boundaries around their use remain unclear.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">David DiMolfetta</dc:creator><pubDate>Fri, 10 Apr 2026 12:22:00 -0400</pubDate><guid>https://www.nextgov.com/cybersecurity/2026/04/us-push-counter-hackers-draws-industry-deeper-offensive-cyber-debate/412770/</guid><category>Cybersecurity</category><content:encoded>&lt;![CDATA[&lt;p&gt;The U.S. government has an offensive cyber wish list, and the private sector is already bidding. Many federal contractors back the effort, though they still have deeper questions about semantics and where offense ends and defense begins.&lt;/p&gt;

&lt;p&gt;Terms like &amp;ldquo;disruption,&amp;rdquo; &amp;ldquo;cyber effects&amp;rdquo; and &amp;ldquo;defensive operations&amp;rdquo; were flung around in discussions at the RSAC Conference in San Francisco last month, one of the largest cybersecurity gatherings in the world. In discussions during and after the conference, &lt;em&gt;Nextgov/FCW&lt;/em&gt; sought to learn how industry players perceive the vision under President Donald Trump to punch back harder against cyber adversaries, and how those industry leaders might contribute to the cause.&lt;/p&gt;

&lt;p&gt;For the past year, industry executives and U.S. officials in closed-door meetings have weighed the concept of &lt;a href="https://www.nextgov.com/cybersecurity/2025/05/18th-century-war-power-resurfaces-cyber-policy-talks/405526/"&gt;enlisting&lt;/a&gt; private sector cyber titans to hack for the government, inspired by the centuries-old practice of letters of marque and reprisal that made waves in the old days of naval warfare. But last month, National Cyber Director Sean Cairncross appeared to pour cold water on the concept.&lt;/p&gt;

&lt;p&gt;He &lt;a href="https://www.nextgov.com/cybersecurity/2026/03/national-cyber-director-doesnt-envision-industry-doing-offensive-hacking/412176/"&gt;told audience members&lt;/a&gt; at an event that there&amp;rsquo;s &amp;ldquo;an enormous amount of capability on the private sector side,&amp;rdquo; but that he&amp;rsquo;s &amp;ldquo;not talking about private sector, industry or companies engaged in a cyber offensive campaign.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;Cairncross said he wants to use the &amp;ldquo;ability of our private sector &amp;hellip; to inform and share information so that the [U.S. government] can respond&amp;rdquo; either defensively or in a more agile way to enemy hackers. His remarks came after the release of Trump&amp;rsquo;s &lt;a href="https://www.nextgov.com/cybersecurity/2026/03/trumps-new-cyber-strategy-details-more-offensive-response-cyber-threats/411963/"&gt;national cyber strategy&lt;/a&gt;, whose first pillar focuses on ways to create obstacles for foreign state cyber operatives and criminal hackers.&lt;/p&gt;

&lt;p&gt;But nearly a dozen interviews with industry stakeholders and former officials indicate that it remains an open question where companies draw the line on cyber offense and where the government does. The boundaries around offensive cyber are often blurred, and the private sector is still trying to learn its place. That uncertainty leaves more questions than answers about how offensive cyber operations should be structured, regulated and integrated into a broader U.S. national security strategy.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;New market force&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;There&amp;rsquo;s consensus among security leaders that the private sector doesn&amp;rsquo;t want to be deployed for offensive hacking, said Adam Marr&amp;egrave;, chief information security officer at Arctic Wolf. The talk of &amp;ldquo;hacking back&amp;rdquo; comes up every five to ten years, he said, but those talks break down every time for a number of reasons, mainly because of legal and ethical concerns.&lt;/p&gt;

&lt;p&gt;Still, there&amp;rsquo;s &lt;a href="https://www.nextgov.com/cybersecurity/2026/04/pro-iran-hackers-are-targeting-us-industrial-control-systems-advisory-says/412679/?oref=ng-homepage-river"&gt;no indication&lt;/a&gt; that the global cybersecurity environment is calming. Foreign adversaries would &amp;ldquo;absolutely&amp;rdquo; want access to powerful exploits that can steal information or wreak havoc on systems, Marr&amp;egrave; said.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&amp;ldquo;[Adversaries] are mainly worried about what&amp;rsquo;s effective. So if it works, and if it ain&amp;rsquo;t broke, don&amp;rsquo;t fix it,&amp;rdquo; he said. &amp;ldquo;But if I can find a more exotic exploit that is going to allow me to have more access or access without being detected, or be able to get to somewhere I haven&amp;rsquo;t been able to get before, 100% they&amp;rsquo;re going to be looking for that.&amp;quot;&lt;/p&gt;

&lt;p&gt;Governments across the world are hankering for the latest and greatest hacking tools, said Elad Schulman, CEO of Lasso Security.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&amp;ldquo;If we are not developing capabilities, our enemies are developing those capabilities,&amp;rdquo; he said. &amp;ldquo;That is why we need to assume that, at any point in time, someone will find and use exploits against us.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;For years, companies have helped develop special technologies for the U.S. government&amp;rsquo;s secret cyber missions. But the new White House cyber strategy&amp;rsquo;s offensive focus sets a tone for companies and their investors, said Rob Joyce, the NSA&amp;rsquo;s former cybersecurity director.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&amp;ldquo;There&amp;rsquo;s been companies that are defense industrial base firms that know how to sell to the government, and there&amp;rsquo;s been some very boutique cyber companies that sell into the military cyber and intel community,&amp;rdquo; he said. &amp;ldquo;But this has the whole community and people out here in Silicon Valley who are not government-adjacent talking about ideas that they can help with in offensive cyber. I think it changes that ecosystem a little bit.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;Joyce is now a venture partner at DataTribe, which invests in early-stage cybersecurity companies often led by people who worked in the intelligence community. He said the government is in the market for an array of cyber capabilities, including vulnerability scanning, exploit development, tooling to analyze cyber threat data and digital infrastructure to obscure the origin of covert cyber operations.&lt;/p&gt;

&lt;p&gt;This week, the cybersecurity world was sent into shock when Anthropic revealed it was holding back a powerful frontier AI model that could find previously undiscovered vulnerabilities at mass scale. The intelligence community is already eyeing its capabilities, &lt;em&gt;Nextgov/FCW&lt;/em&gt; &lt;a href="https://www.nextgov.com/cybersecurity/2026/04/anthropics-glasswing-initiative-raises-questions-us-cyber-operations/412721/?oref=ng-homepage-river"&gt;reported&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Still operating defensively&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Many practitioners are advising the cyber ecosystem to invest in defensive measures, regardless of the White House&amp;rsquo;s more offensive posture.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;Being a defender, an ounce of prevention is worth a pound of cure,&amp;rdquo; said Ryan Anschutz, the incident response lead at IBM&amp;rsquo;s X-Force threat intelligence arm and a former FBI official. &amp;ldquo;A defensive prevention perspective, I think, would have more of an impact &amp;hellip; than offensive capabilities, which, quite frankly, some arms of the federal government &amp;mdash; their offensive capabilities far surpass the private sector.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;Even among companies that simulate adversary cyberattacks to improve network defenses, known formally as red-teaming, the definition of &amp;ldquo;offensive hacking&amp;rdquo; can get fuzzy.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;Would you classify offensive hacking as going out and fingerprinting the threat that was attacking you to gain the threat intelligence?&amp;rdquo; Anschutz said. &amp;ldquo;Is that offensive? Where does that change? Where&amp;rsquo;s the line drawn between what is offensive and what&amp;rsquo;s not offensive?&amp;rdquo;&lt;/p&gt;

&lt;p&gt;The answer depends on who you ask.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Hacking back, in the sense of breaking into adversaries&amp;rsquo; computer systems for data and geopolitical intelligence, takes a level of access that only belongs in the government space, said another industry executive that works closely with the intelligence community on cyber matters.&lt;/p&gt;

&lt;p&gt;Google&amp;rsquo;s threat intelligence arm recently came out swinging with discussions of its new &lt;a href="https://www.nextgov.com/cybersecurity/2026/03/google-launches-threat-disruption-unit-stops-short-calling-it-offensive/412321/"&gt;disruption unit&lt;/a&gt;, though executives soon quashed the notion that the unit is &amp;ldquo;offensive&amp;rdquo; in any way, arguing that removing infrastructure that hackers sit on is a defensive move that impedes their forward operations onto U.S. and allied systems.&lt;/p&gt;

&lt;p&gt;Some companies are building out advanced defensive cyber solutions at as rapid a pace as the offensive market, a sign that a more capable offense is driving equally urgent demand for stronger digital shielding.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;We had just seen too many examples over and over again of how burned out these poor kids in these security operations centers are, how just overwhelmed at the enormity of all the alerts, all the boxes always flashing red,&amp;rdquo; said Bill MacMillan, a former CIA official and now the chief product officer at security operations center solutions provider Andesite.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;We have to transform. We have to adopt this technology because this is the threat environment and the resource environment that we&amp;rsquo;re operating in,&amp;rdquo; he said.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Considering new frameworks&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The offensive philosophy in Washington, D.C., has made some cyber experts weigh the pros and cons of the current legal environment that facilitates hacking activities.&lt;/p&gt;

&lt;p&gt;The NSA, Cyber Command and others are permitted to take more aggressive cyber actions to stop foreign adversaries and criminal hacker gangs. This week, the FBI said it covertly sent &lt;a href="https://www.justice.gov/opa/pr/justice-department-conducts-court-authorized-disruption-dns-hijacking-network-controlled"&gt;shutdown commands&lt;/a&gt; to kick Russian state-backed hackers out of thousands of routers housed in organizations around the world.&lt;/p&gt;

&lt;p&gt;The move, like many FBI takedowns of digital infrastructure, required court authorization. More broadly, some of the most sensitive intelligence operations do not rely on a standard U.S. court warrant at all.&lt;/p&gt;

&lt;p&gt;Even so, private companies lack those authorities. They may build the capabilities used in cyber operations, but &amp;mdash; like a defense contractor manufacturing a missile &amp;mdash; the decision to deploy them and the consequences that follow rest with the government, not the company.&lt;/p&gt;

&lt;p&gt;But what happens if a firm is hacked and wants to take action? There&amp;rsquo;s room to discuss &amp;ldquo;stand-your-ground&amp;rdquo; laws that could permit companies to respond to intrusions, at least to a certain degree, said Philip George, executive technical strategist at Merlin Cyber.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;Obviously, there are some authority issues and some rules of engagement concerns, and we don&amp;rsquo;t necessarily want everyone returning fire or preemptively thwarting an attack,&amp;rdquo; he said. But if attacked in cyberspace, &amp;ldquo;what&amp;rsquo;s the extent that I can return fire, to at least take down infrastructure that may be targeting me?&amp;rdquo;&lt;/p&gt;

&lt;p&gt;Asked if such a legal authority constitutes a counter-attack, he clarified it as a &amp;ldquo;counter-action&amp;rdquo; or &amp;ldquo;counter-response&amp;rdquo; because the former term carries &amp;ldquo;a lot of weight.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;Some serious conversations will need to be had about the future of legal measures under this offensive posture, said John Fokker, head of threat intelligence at Trellix and a former official in the Dutch National Police&amp;rsquo;s High-Tech Crime Unit.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;If authorities are operating in the grey area with certain private sector entities, I&amp;rsquo;d much rather define and start talking about that grey area,&amp;rdquo; he said.&lt;/p&gt;

&lt;p&gt;Information-sharing between the public and private sectors &amp;mdash; a cornerstone of modern efforts to stop cyberattacks &amp;mdash; should also continue, he said, though he argued the process should be streamlined given the number of existing groups.&lt;/p&gt;

&lt;p&gt;But one executive said they expect the U.S. government will ultimately find ways to involve private contractors in offensive cyber operations, even as the administration publicly draws limits.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;I believe that the government will contract for cyber operations under carefully crafted contracts,&amp;rdquo; said Kevin Spease, president at ISSE Services. &amp;ldquo;It simply depends on how you define it.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;He pointed to past U.S. conflicts where &lt;a href="https://www.govexec.com/management/2007/12/after-blackwater/25928/"&gt;private firms&lt;/a&gt; supported offensive missions, arguing cyber operations could follow a similar path.&lt;/p&gt;

&lt;p&gt;The rationale, Spease added, comes down to capability. The government, in both civilian and defense agencies, already predominantly relies on technology made by the private sector for day-to-day operations.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;The private companies have far better expertise,&amp;rdquo; he said. &amp;ldquo;Sometimes it&amp;rsquo;s easier to have a contractor do it.&amp;rdquo;&lt;/p&gt;
]]&gt;</content:encoded><media:content url="https://cdn.nextgov.com/media/img/cd/2026/04/10/041026hackNG/large.jpg" width="618" height="284"><media:credit>Anton Petrus/Getty Images</media:credit><media:thumbnail url="https://cdn.nextgov.com/media/img/cd/2026/04/10/041026hackNG/thumb.jpg" width="138" height="83"></media:thumbnail></media:content></item><item><title>Treasury debuts effort to share cyber threat intel with crypto firms</title><link>https://www.nextgov.com/cybersecurity/2026/04/treasury-debuts-effort-share-cyber-threat-intel-crypto-firms/412756/</link><description>The move signals that Treasury is increasingly treating cryptocurrency firms as part of the nation’s core financial infrastructure, making them a prime target for hackers.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">David DiMolfetta</dc:creator><pubDate>Thu, 09 Apr 2026 16:25:00 -0400</pubDate><guid>https://www.nextgov.com/cybersecurity/2026/04/treasury-debuts-effort-share-cyber-threat-intel-crypto-firms/412756/</guid><category>Cybersecurity</category><content:encoded>&lt;![CDATA[&lt;p&gt;The Treasury Department said Thursday it will begin sharing cyber threat intelligence with cryptocurrency firms following a string of incidents in which hackers siphoned off millions of dollars in customer funds.&lt;/p&gt;

&lt;p&gt;The department&amp;rsquo;s Office of Cybersecurity and Critical Infrastructure Protection &lt;a href="https://home.treasury.gov/news/press-releases/sb0437"&gt;announced&lt;/a&gt; the effort to &amp;ldquo;provide timely, actionable cybersecurity information to eligible U.S. digital asset firms and industry organizations, helping them better identify, prevent, and respond to cyber threats targeting their customers and networks.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;Under the program, qualifying U.S. digital asset firms and industry groups that meet agency criteria will be able to access the same threat intelligence the department already distributes to traditional financial institutions at no cost.&lt;/p&gt;

&lt;p&gt;The move signals Treasury is increasingly treating cryptocurrency firms as part of the nation&amp;rsquo;s core financial infrastructure, folding them into existing cyber threat-sharing channels as officials grow more concerned about the scale and sophistication of attacks targeting the sector.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;Cyber threats targeting digital asset platforms are growing in frequency and sophistication,&amp;rdquo; said Cory Wilson, deputy assistant secretary for cybersecurity at the Treasury Department. &amp;ldquo;This initiative expands access to actionable threat information that helps firms strengthen defenses, reduce risk, and respond more effectively to incidents.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;Cryptocurrency is becoming increasingly central to U.S. entities seeking to go after hackers, as such bad actors often seek to steal cryptocurrency or use it as a payment method to exchange stolen data.&lt;/p&gt;

&lt;p&gt;North Korea has built a reputation for installing &lt;a href="https://www.nextgov.com/cybersecurity/2025/06/us-unveils-multiple-operations-shutter-north-korean-it-worker-schemes/406421/"&gt;shadow workers&lt;/a&gt; in firms around the world to steal cryptocurrency and other financial assets to fund their regime, especially its missile program. Earlier this month, DPRK-aligned hackers &lt;a href="https://www.chainalysis.com/blog/lessons-from-the-drift-hack/"&gt;stole&lt;/a&gt; some $285 million from Drift Protocol, a Solana-based decentralized derivatives exchange, in a breach that wiped out more than half of the platform&amp;rsquo;s total value in the system.&lt;/p&gt;
]]&gt;</content:encoded><media:content url="https://cdn.nextgov.com/media/img/cd/2026/04/09/040926TreasuryNG/large.jpg" width="618" height="284"><media:credit>Yasin Ozturk/Anadolu Agency via Getty Images</media:credit><media:thumbnail url="https://cdn.nextgov.com/media/img/cd/2026/04/09/040926TreasuryNG/thumb.jpg" width="138" height="83"></media:thumbnail></media:content></item><item><title>Anthropic’s Glasswing initiative raises questions for US cyber operations</title><link>https://www.nextgov.com/cybersecurity/2026/04/anthropics-glasswing-initiative-raises-questions-us-cyber-operations/412721/</link><description>Intelligence officials and industry are weighing how Claude Mythos Preview could reshape hacking and cyberdefense. The company has also briefed senior officials on the AI model it says has already uncovered thousands of cyber vulnerabilities.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Patrick Tucker, Alexandra Kelley, and David DiMolfetta</dc:creator><pubDate>Wed, 08 Apr 2026 17:08:00 -0400</pubDate><guid>https://www.nextgov.com/cybersecurity/2026/04/anthropics-glasswing-initiative-raises-questions-us-cyber-operations/412721/</guid><category>Cybersecurity</category><content:encoded>&lt;![CDATA[&lt;p&gt;Anthropic&amp;rsquo;s decision to hold back a powerful frontier AI model over cybersecurity risks, paired with a new initiative to study its effects on global networks, is prompting discussions about how such tools could reshape hacking operations within the U.S. intelligence community, and how they might be used to identify and exploit weaknesses in adversary systems.&lt;/p&gt;

&lt;p&gt;The company unveiled Project Glasswing on Tuesday, seeking to help secure critical software against AI-driven attacks, with partners including Amazon Web Services, Apple, Cisco, Google, Microsoft and others. Those participants will gain access to Claude Mythos Preview, an unreleased model the company says has already uncovered thousands of vulnerabilities as Anthropic looks to steer its tools toward defensive cybersecurity use.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;The fallout &amp;mdash; for economies, public safety, and national security &amp;mdash; could be severe. Project Glasswing is an urgent attempt to put these capabilities to work for defensive purposes,&amp;rdquo; the AI company said in a &lt;a href="https://www.anthropic.com/glasswing"&gt;Tuesday blog&lt;/a&gt;. The Mythos Preview model &amp;ldquo;has already found thousands of high-severity vulnerabilities, including some in every major operating system and web browser,&amp;rdquo; it says.&lt;/p&gt;

&lt;p&gt;The intelligence community is reacting to the news, according to a person familiar with the thinking of multiple IC agencies.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&amp;ldquo;They want secure code and to use AI to find network vulnerabilities as well,&amp;rdquo; said the person, who, like some others in this story, spoke on the condition of anonymity to describe sensitive internal deliberations.&lt;/p&gt;

&lt;p&gt;Prior to any external release, Anthropic briefed senior officials across the U.S. government on Mythos Preview&amp;rsquo;s full capabilities, including both offensive and defensive cyber applications, said an Anthropic official. That engagement has included discussions with the Cybersecurity and Infrastructure Security Agency and NIST&amp;rsquo;s Center for AI Standards and Innovation, among others.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&amp;ldquo;Bringing government into the loop early &amp;mdash; on what the model can do, where the risks are, and how we&amp;rsquo;re managing them &amp;mdash; was a priority from the start,&amp;rdquo; the company official said.&lt;/p&gt;

&lt;p&gt;Analysts inside the National Security Agency have also been casually chatting about the release of the Mythos model, another person familiar with the matter told &lt;em&gt;Nextgov/FCW&lt;/em&gt;.&lt;/p&gt;

&lt;p&gt;Multiple intelligence agencies and Defense Department components play roles in both offensive cyber operations and defending U.S. networks. Because offensive missions often depend on understanding a target&amp;rsquo;s defenses, tools like the Mythos model in the wrong hands could help adversaries identify and exploit weaknesses in critical systems. Agencies are already known to &lt;a href="https://vce.usc.edu/volume-6-issue-1/the-ethics-of-stockpiling-zero-day-vulnerabilities/"&gt;stockpile hacking exploits&lt;/a&gt; for future use.&lt;/p&gt;

&lt;p&gt;The development is also drawing major attention and concern, in some cases, from cyber-focused firms that engage with the intelligence community.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&amp;ldquo;How is anyone supposed to defend against all of this at once?&amp;rdquo; said one executive at a cyber investment firm, alarmed by the scale at which the Anthropic model was able to identify vulnerabilities.&lt;/p&gt;

&lt;p&gt;The Glasswing news is &amp;ldquo;scary and ominous&amp;rdquo; because it isn&amp;rsquo;t clear how Mythos Preview could be used offensively, especially if it falls into the hands of a foreign adversary, said Hayden Smith, a co-founder at Hunted Labs, a company focused on software supply chain risks.&lt;/p&gt;

&lt;p&gt;It&amp;rsquo;s very possible the model could land in the possession of governments considered hostile to the U.S., he said, explaining that &amp;ldquo;even with deep vetting, the odds of Mythos flowing into the wrong hands is barely a hypothetical given the landscape of current attacks on the open source ecosystem and software supply chain.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;Because much of the internet runs on widely used open-source software maintained by developers around the world, tools like Mythos could uncover weaknesses in code that underpin large parts of the digital ecosystem.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;That dynamic has come into sharper focus following recent software supply chain incidents that had widespread repercussions &amp;mdash; including a compromise of the &lt;a href="https://www.nextgov.com/cybersecurity/2026/03/north-korea-linked-hackers-suspected-axios-open-source-hijack-google-analysts-say/412523/"&gt;Axios JavaScript library&lt;/a&gt; disclosed last week &amp;mdash; and amid concerns that some developers behind critical open-source projects are &lt;a href="https://www.nextgov.com/cybersecurity/2025/08/report-russia-based-yandex-employee-oversees-open-source-software-approved-dod-use/407703/"&gt;affiliated with companies&lt;/a&gt; the U.S. government considers tied to foreign adversaries.&lt;/p&gt;

&lt;p&gt;Capitol Hill is also paying attention to the Anthropic development.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;We are already seeing cyber threat actors using AI tools to improve their capabilities, putting government, businesses and consumers&amp;rsquo; security and personal information at risk,&amp;rdquo; said Sen. Mark Warner, D-Va., the vice chairman of the Senate Intelligence Committee. &amp;ldquo;As AI dramatically accelerates the discovery of new vulnerabilities, I hope industry will correspondingly accelerate and reprioritize patching.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;Observers have been awaiting the release of a model like Mythos Preview that could identify and exploit cyber vulnerabilities at scale for some time, said Morgan Adamski, the former executive director at U.S. Cyber Command and lead for PwC&amp;rsquo;s Cyber, Data &amp;amp; Technology Risk services.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;For those in the offensive cyber community, for the U.S. government, there&amp;rsquo;s obviously a huge potential there from an adversarial perspective,&amp;rdquo; she said in an interview.&lt;/p&gt;

&lt;p&gt;But offense and defense are, in many ways, one and the same. If cyberintelligence analysts find a novel vulnerability in an enemy computer network, it&amp;rsquo;s possible a U.S. system might have the same vulnerability, too.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;There&amp;rsquo;s going to be a real equity conversation that occurs,&amp;rdquo; Adamski said. &amp;ldquo;If we exploit something in an adversarial network, we&amp;rsquo;re going to have to be able to defend against it in our own critical infrastructure.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;She also said to expect more of these innovations in the AI space, as &amp;ldquo;typically, when these types of models come out, other models aren&amp;rsquo;t far behind.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;In an interview, Gary DePreta, the senior vice president of Cisco&amp;rsquo;s U.S. Public Sector Organization, told &lt;em&gt;Nextgov/FCW&lt;/em&gt; that the company&amp;rsquo;s participation in Project Glasswing is part of its larger aim to address cybersecurity threats while bringing the benefits of AI to its customer base.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&amp;ldquo;We&amp;rsquo;re going from an age of detect-and-respond &amp;mdash; and as we automate with AI &amp;mdash; to predict-and-prevent threats,&amp;rdquo; DePreta said on Wednesday. &amp;ldquo;We keep saying this phrase at Cisco: &amp;lsquo;there is a paradox of progress as it relates to AI and the enterprise.&amp;rsquo; And what it simply means is the capabilities of AI are far exceeding the enterprise&amp;rsquo;s ability to implement it in a safe and secure way.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;Anthropic has become a major voice in the line AI companies are willing to draw in ethical uses of their technology, though that stance has drawn friction with the U.S. military. Earlier this year, the company declined to ease restrictions against its tools being used for domestic surveillance or fully autonomous weapons &lt;a href="https://www.defenseone.com/threats/2026/02/it-would-take-pentagon-months-replace-anthropics-ai-tools-sources/411741/"&gt;for Pentagon use&lt;/a&gt;, triggering a &amp;ldquo;supply chain risk&amp;rdquo; designation from the Defense Department and a White House order that all federal agencies phase out their uses of Anthropic tools. The company has &lt;a href="https://www.cnbc.com/2026/03/26/anthropic-pentagon-dod-claude-court-ruling.html"&gt;legally challenged&lt;/a&gt; the move.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;It&amp;rsquo;s possible that the Mythos announcement may reshape how the Defense Department interacts with the company.&lt;/p&gt;

&lt;p&gt;The government &amp;ldquo;needs to make amends with Anthropic and help them and Glasswing members maintain the American lead on AI by preventing Chinese model theft,&amp;rdquo; said Leah Siskind, an AI research fellow at the Foundation for Defense of Democracies think tank.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&amp;ldquo;Anthropic is making the responsible call &amp;mdash; but adversaries won&amp;rsquo;t,&amp;rdquo; she said. &amp;ldquo;China is already exploiting U.S. AI models to accelerate its own capabilities, and when they reach Mythos-level performance, they will weaponize it.&amp;rdquo;&lt;/p&gt;
]]&gt;</content:encoded><media:content url="https://cdn.nextgov.com/media/img/cd/2026/04/08/040826GlasswingNG/large.jpg" width="618" height="284"><media:credit>Samuel Boivin/NurPhoto via Getty Images</media:credit><media:thumbnail url="https://cdn.nextgov.com/media/img/cd/2026/04/08/040826GlasswingNG/thumb.jpg" width="138" height="83"></media:thumbnail></media:content></item><item><title>Pro-Iran hackers are targeting US industrial control systems, advisory says</title><link>https://www.nextgov.com/cybersecurity/2026/04/pro-iran-hackers-are-targeting-us-industrial-control-systems-advisory-says/412679/</link><description>This latest cyber assessment released during the war with Iran mirrors similar cyber intrusions made by an Iran-aligned group that targeted Pennsylvania water systems in late 2023.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">David DiMolfetta</dc:creator><pubDate>Tue, 07 Apr 2026 15:21:00 -0400</pubDate><guid>https://www.nextgov.com/cybersecurity/2026/04/pro-iran-hackers-are-targeting-us-industrial-control-systems-advisory-says/412679/</guid><category>Cybersecurity</category><content:encoded>&lt;![CDATA[&lt;p&gt;Iran-aligned hackers have exploited and disrupted operational technology control systems embedded in multiple U.S. critical infrastructure sectors, targeting equipment manufactured by Rockwell Automation, according to an advisory issued Tuesday.&lt;/p&gt;

&lt;p&gt;The hackers have set their sights on the company&amp;rsquo;s Allen-Bradley line of programmable logic controllers, or PLCs, which are digital computers that interface with operational equipment to monitor and automate industrial processes like water treatment, power generation and manufacturing.&lt;/p&gt;

&lt;p&gt;The cyber intrusions have, in some cases, resulted in operational disruption and financial loss, according to &lt;a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa26-097a?utm_source=IranPLC202604&amp;amp;utm_medium=GovDelivery"&gt;the assessment&lt;/a&gt; signed by the Cybersecurity and Infrastructure Security Agency, FBI, NSA, EPA, the Department of Energy and U.S. Cyber Command&amp;rsquo;s Cyber National Mission Force.&lt;/p&gt;

&lt;p&gt;The disruptions occurred by manipulating data on human-machine interfaces and on supervisory control and data acquisition, or SCADA, displays, as well as harmful interactions with project files, it adds.&lt;/p&gt;

&lt;p&gt;The advisory is the latest signal indicating that Iran-aligned hacker groups have successfully targeted and impeded U.S. systems amid the ongoing U.S.-Israel war against Iran that broke out Feb. 28.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;It comes after an apparent Tehran-backed hacker group carried out a &lt;a href="https://www.nextgov.com/cybersecurity/2026/03/cisa-launches-investigation-stryker-cyberattack/412079/"&gt;cyberattack&lt;/a&gt; against medical technology giant Stryker last month, which wiped employees&amp;rsquo; phones and prevented workers from accessing their computers.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;The authoring agencies assess a group of Iranian-affiliated advanced persistent threat (APT) actors is conducting this activity to cause disruptive effects within the United States.&amp;rdquo; the advisory reads. &amp;ldquo;The group has targeted devices spanning multiple U.S. critical infrastructure sectors, including Government Services and Facilities (to include local municipalities), Water and Wastewater Systems (WWS), and Energy Sectors.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;A request for comment sent to Rockwell Automation&amp;rsquo;s media relations email bounced back.&lt;/p&gt;

&lt;p&gt;Pro-Iran hackers have made a habit of targeting any computer systems tied to nations deemed foreign adversaries by Tehran, especially the U.S. and Israel. In late 2023, amid the Israel-Hamas war, one hacker group &lt;a href="https://www.nextgov.com/cybersecurity/2023/12/cisa-fbi-warn-iran-backed-infrastructure-hacks/392452/"&gt;defaced&lt;/a&gt; the interfaces of water treatment systems in Pennsylvania, which had Israel-made Unitronics equipment built inside.&lt;/p&gt;

&lt;p&gt;In 2020, Rockwell Automation &lt;a href="https://www.rockwellautomation.com/en-us/company/news/press-releases/Rockwell-Automation-to-Acquire-Avnet-to-Expand-Cybersecurity-Expertise.html"&gt;acquired&lt;/a&gt; Israel-based Avnet Data Security, aiming to bolster the cyber posture of its industrial control systems and operational technology.&lt;/p&gt;

&lt;p&gt;The assessment urged organizations to keep PLCs off the open internet, review logs for suspicious activity and lock down affected Rockwell devices to prevent unauthorized access. Unsecured internet-connected operational technology can expose industrial systems to remote access, giving attackers a pathway to disrupt or manipulate functions.&lt;/p&gt;

&lt;p&gt;The Iran war has been &lt;a href="https://www.defenseone.com/threats/2026/02/strikes-iran-will-test-us-cyber-strategy-abroad-and-defenses-home/411782/"&gt;widely expected&lt;/a&gt; to test the strength of U.S. cyberdefenses, and experts have warned that exposed devices would be a potential target for pro-Iran hackers.&lt;/p&gt;

&lt;p&gt;President Donald Trump escalated his threats against Tehran on Tuesday, saying a &amp;ldquo;whole civilization will die tonight&amp;rdquo; if Iran doesn&amp;rsquo;t open the Strait of Hormuz by an 8 p.m. ET deadline.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Trump has promised to attack &amp;ldquo;every bridge&amp;rdquo; and power station in the country if a deal isn&amp;rsquo;t reached. Iran has promised a &amp;ldquo;devastating&amp;rdquo; response if such an attack occurs. Any sharp escalation could heighten the risk of retaliatory cyberattacks.&lt;/p&gt;
]]&gt;</content:encoded><media:content url="https://cdn.nextgov.com/media/img/cd/2026/04/07/040726IranNG-1/large.jpg" width="618" height="284"><media:credit>daoleduc/Getty Images</media:credit><media:thumbnail url="https://cdn.nextgov.com/media/img/cd/2026/04/07/040726IranNG-1/thumb.jpg" width="138" height="83"></media:thumbnail></media:content></item><item><title>Trump proposes cutting CISA election security program in FY27 budget</title><link>https://www.nextgov.com/cybersecurity/2026/04/trump-proposes-cutting-cisa-election-security-program-fy27-budget/412672/</link><description>The move is part of $700 million in proposed program cuts, resulting in a net funding reduction of about $360 million. The budget also projects eliminating some 860 positions.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">David DiMolfetta</dc:creator><pubDate>Tue, 07 Apr 2026 10:25:00 -0400</pubDate><guid>https://www.nextgov.com/cybersecurity/2026/04/trump-proposes-cutting-cisa-election-security-program-fy27-budget/412672/</guid><category>Cybersecurity</category><content:encoded>&lt;![CDATA[&lt;p&gt;The Trump administration is hoping to eliminate roughly $700 million in programs across the Cybersecurity and Infrastructure Security Agency in fiscal year 2027, a sweeping set of cuts that translate to a net reduction of about $360 million after accounting for internal transfers and other adjustments, according to a detailed &lt;a href="https://www.dhs.gov/sites/default/files/2026-04/26_0403_ocfo-budget-cisa.pdf"&gt;budget justification&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The proposal targets election security, workforce development, stakeholder engagement and a range of infrastructure protection efforts, marking one of the most significant overhauls of the nation&amp;rsquo;s civilian cyber defense agency since its creation.&lt;/p&gt;

&lt;p&gt;The budget would notably eliminate CISA&amp;rsquo;s election security program entirely, including cutting funding for information-sharing support to state and local officials and removing dedicated election security advisors across the country.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The proposal would also end CISA&amp;rsquo;s support for the Elections Infrastructure Information Sharing and Analysis Center, or EI-ISAC, a key hub for sharing threat intelligence, cyber alerts and incident response resources with state and local election officials.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The moves would scale back one of the federal government&amp;rsquo;s main avenues for coordinating with state and local election officials on election cybersecurity risks like ransomware attacks, phishing campaigns and efforts by foreign adversaries to probe election systems and conduct &lt;a href="https://www.nextgov.com/cybersecurity/2025/10/inside-americas-next-information-war/408796/"&gt;influence operations&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;The 2027 proposal would significantly scale back CISA&amp;rsquo;s stakeholder engagement operations, eliminating offices focused on stakeholder coordination and international affairs while shifting more responsibility for certain infrastructure security and emergency communications programs to state and local governments.&lt;/p&gt;

&lt;p&gt;Any move to eliminate these stakeholder engagement functions could have far-reaching effects, as those offices serve as a main conduit between CISA and state, local, private-sector and international partners that play a role in protecting critical infrastructure in the U.S. and around the world.&lt;/p&gt;

&lt;p&gt;The budget also calls for significant workforce reductions, including through cuts to funded but unfilled positions.&lt;/p&gt;

&lt;p&gt;Collectively, the changes would eliminate roughly 867 positions across CISA, according to the budget justification, as more than 1,100 positions tied to program cuts would be partially offset by transfers into the agency and targeted hiring.&lt;/p&gt;

&lt;p&gt;Also notable is the proposed elimination of CISA&amp;rsquo;s chemical security program, which would cut more than 200 positions tied to inspections and oversight of high-risk facilities. At the same time, roughly $300 million and hundreds of personnel from the Department of Homeland Security&amp;rsquo;s Countering Weapons of Mass Destruction office would be transferred into CISA, shifting broader chemical, biological, radiological and nuclear threat functions into the agency.&lt;/p&gt;

&lt;p&gt;Congress would have to approve the entire budget structure in upcoming appropriations talks. Prior efforts to reduce CISA&amp;rsquo;s funding met resistance on Capitol Hill last year, when the White House sought roughly $490 million in reductions but ultimately faced pushback from lawmakers that significantly narrowed the scope of the cuts.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;CISA has a vital role in fulfilling DHS&amp;rsquo;s core mission, one that I continue to strongly support,&amp;rdquo; Rep. Andrew Garbarino, R-N.Y., the chairman of the House Homeland Security Committee, told &lt;em&gt;Nextgov/FCW&lt;/em&gt; after this story was published.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&amp;ldquo;Congress has a responsibility to ensure the agency has the resources it needs to succeed,&amp;rdquo; he said. &amp;ldquo;I look forward to discussing this in greater detail with Secretary Mullin and having him testify for the first time before the committee in our annual budget hearing in the coming months.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;The budget preserves funding for various technical cybersecurity functions, including investments in threat hunting and analysis tools.&lt;/p&gt;

&lt;p&gt;The proposal also includes about $4.9 million to support cybersecurity and incident response planning for the 2028 Los Angeles Olympics, designated as a&amp;nbsp;National Special Security Event under DHS standards. The funding would support exercises, drone threat assessments and coordination with federal, state and local partners ahead of the games, even as the budget scales back many of the agency&amp;rsquo;s broader coordination efforts.&lt;/p&gt;

&lt;p&gt;Additional funding would also be diverted toward CISA&amp;rsquo;s implementation of the Cyber Incident Reporting for Critical Infrastructure Act, or CIRCIA. Amid the ongoing DHS funding lapse, the cyber agency has been delayed in developing a final rule for the law, which, in essence, mandates critical infrastructure entities report major cyber incidents to CISA within 72 hours and ransomware payments within 24 hours.&lt;/p&gt;

&lt;p&gt;Also notable is a small increase in funding and staffing for CISA&amp;rsquo;s Office of the Chief Counsel, which the justification cites as a rising volume of litigation, including cases on employment-related matters, as the agency moves forward with workforce reductions and other staffing changes. The increase suggests the agency is preparing for a heavier &lt;a href="https://www.nextgov.com/people/2025/11/dhs-says-shutdown-layoffs-cisa-will-proceed-despite-court-injunction/409332/"&gt;legal workload&lt;/a&gt; as it implements the proposed cuts.&lt;/p&gt;

&lt;p&gt;The budget plans reflect long-standing skepticism from the Trump administration and its allies toward CISA, particularly over the agency&amp;rsquo;s role in 2020 election security efforts and concurrent work to counter false information online. Critics have argued the agency strayed beyond its &amp;ldquo;core&amp;rdquo; mission of infrastructure protection and federal cyber defense.&lt;/p&gt;

&lt;p&gt;Cyber practitioners and former officials have frequently said that even the cuts put in place in the last year go too far.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;You don&amp;rsquo;t cut the fire department and then wonder why buildings burn. CISA isn&amp;rsquo;t the bureaucratic overhead; for practitioners it&amp;rsquo;s the lifeline between government intelligence and the private sector running the infrastructure this country depends on,&amp;rdquo; said Seemant Sehgal, founder and CEO of BreachLock, which sells a variety of cyberdefense services.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;Cutting its budget by $707 million, on top of what&amp;rsquo;s already been cut, is a gift to every nation-state actor that&amp;#39;s been quietly targeting U.S. critical infrastructure,&amp;rdquo; he added.&lt;/p&gt;

&lt;p&gt;The tensions between the Trump administration and CISA date back to the 2020 election, when its then-director Chris Krebs publicly affirmed the security of the vote and was subsequently dismissed by Trump. In his second term, Trump has continued to target Krebs, including ordering a &lt;a href="https://www.nextgov.com/cybersecurity/2025/04/former-cyber-official-chris-krebs-leave-sentinelone-bid-fight-trump-pressure/404634/"&gt;federal investigation&lt;/a&gt; last year into his government tenure.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Editor&amp;rsquo;s note: This story was updated to include a comment from Rep. Andrew Garbarino, R-N.Y.&lt;/em&gt;&lt;/p&gt;
]]&gt;</content:encoded><media:content url="https://cdn.nextgov.com/media/img/cd/2026/04/07/040726CISANG/large.jpg" width="618" height="284"><media:credit> Thomas Fuller/SOPA Images/LightRocket via Getty Images</media:credit><media:thumbnail url="https://cdn.nextgov.com/media/img/cd/2026/04/07/040726CISANG/thumb.jpg" width="138" height="83"></media:thumbnail></media:content></item><item><title>Government official impersonation scam complaints doubled in 2025, FBI report shows</title><link>https://www.nextgov.com/cybersecurity/2026/04/government-official-impersonation-scam-complaints-doubled-2025-fbi-report-shows/412656/</link><description>The scams, some of which were fueled by AI, can be especially effective because they exploit the built-in authority and urgency people associate with institutions.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">David DiMolfetta</dc:creator><pubDate>Mon, 06 Apr 2026 16:41:00 -0400</pubDate><guid>https://www.nextgov.com/cybersecurity/2026/04/government-official-impersonation-scam-complaints-doubled-2025-fbi-report-shows/412656/</guid><category>Cybersecurity</category><content:encoded>&lt;![CDATA[&lt;p&gt;The number of complaints filed with the FBI that described cyberscammers impersonating government officials nearly doubled between 2024 and 2025 and resulted in some $800 million in losses last year, FBI data released Monday shows.&lt;/p&gt;

&lt;p&gt;Recorded government impersonation complaints rose from some 17,300 in 2024 to nearly 32,500 in 2025, the FBI&amp;rsquo;s 2025 Internet Crime Complaint Center &lt;a href="https://www.ic3.gov/AnnualReport/Reports/2025_IC3Report.pdf"&gt;report&lt;/a&gt; shows. The center, dubbed IC3, documented some $797 million in losses in 2025 from those efforts, up from around $405 million in the year prior.&lt;/p&gt;

&lt;p&gt;That type of scam was listed among the top five cyber-enabled fraud crimes by both number of recorded occurrences and amount of money lost. Other major cyber crimes include romance, tech support and investment scams.&lt;/p&gt;

&lt;p&gt;The spike comes amid a broader surge in &lt;a href="https://www.socure.com/news-and-press/federal-fraud-crisis-report"&gt;impersonation-based fraud&lt;/a&gt;, fueled by artificial intelligence-driven voice and messaging tools that can allow scammers to convincingly pose as government officials at scale.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;AI was referenced 260 times in complaints involving government impersonations, the report shows, with $7 million lost in cases with those AI references. AI involvement was documented the most in complaints involving investment scams.&lt;/p&gt;

&lt;p&gt;Government impersonation can be especially effective because scammers often exploit the built-in authority people associate with official institutions, prompting victims to act quickly out of fear of penalties, legal trouble or loss of benefits.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;It has never been more important to be diligent with your cybersecurity, social media footprint, and electronic interactions. Cyber threats and cyber-enabled crime will continue to evolve as the world embraces emerging technologies such as artificial intelligence,&amp;rdquo; the IC3 report says.&lt;/p&gt;

&lt;p&gt;The increase coincides with a period of &lt;a href="https://www.govexec.com/workforce/2026/03/continuing-shed-federal-workers-remains-priority-number-one-white-house-official-says/411907/"&gt;upheaval&lt;/a&gt; across much of the government&amp;rsquo;s workforce, though IC3 did not detail any evidence linking the rise in complaints to mass federal layoffs.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Cyber threats, additionally, continue to become more prevalent. Data breaches and ransomware were among the most prominent cyber threat complaints documented in 2025. Over 60 new ransomware variants &amp;mdash; modified versions of ransom malware crafted by hackers to evade detection &amp;mdash; were discovered last year, the report says. Government facilities also remain a top target of cyber adversaries.&lt;/p&gt;
]]&gt;</content:encoded><media:content url="https://cdn.nextgov.com/media/img/cd/2026/04/06/GettyImages_2221852023/large.jpg" width="618" height="284"><media:credit>Thomas Fuller/SOPA Images/LightRocket via Getty Images</media:credit><media:thumbnail url="https://cdn.nextgov.com/media/img/cd/2026/04/06/GettyImages_2221852023/thumb.jpg" width="138" height="83"></media:thumbnail></media:content></item><item><title>Suspected Chinese breach of FBI system exposed surveillance targets’ phone numbers</title><link>https://www.nextgov.com/cybersecurity/2026/04/suspected-chinese-breach-fbi-system-exposed-surveillance-targets-phone-numbers/412612/</link><description>Access to this data could help foreign hackers determine who the U.S. is spying on.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">David DiMolfetta</dc:creator><pubDate>Fri, 03 Apr 2026 12:17:00 -0400</pubDate><guid>https://www.nextgov.com/cybersecurity/2026/04/suspected-chinese-breach-fbi-system-exposed-surveillance-targets-phone-numbers/412612/</guid><category>Cybersecurity</category><content:encoded>&lt;![CDATA[&lt;p&gt;A suspected China-linked breach of an FBI surveillance system likely revealed phone numbers of targets being monitored by the bureau, according to a person familiar with a recent notification of the breach sent to Congress and a second person familiar with the matter.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;On February 17, the FBI began investigating abnormal activity in an unclassified system that stores pen register and tap-and-trace surveillance data, said the people, describing a Justice Department notice transmitted to Congress earlier this week. The agency has currently identified that phone numbers were exposed, the people said.&lt;/p&gt;

&lt;p&gt;The DOJ assessed that, under standards codified in the Federal Information Security Modernization Act, the breach was a &amp;ldquo;major incident,&amp;rdquo; and remediation efforts are ongoing, the people added.&lt;/p&gt;

&lt;p&gt;Pen register and trap-and-trace tools let the FBI collect metadata on who a target is communicating with, though they do not capture the content of those communications.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Access to this data could allow foreign hackers to determine who the U.S. is surveilling. Phone numbers don&amp;rsquo;t necessarily reveal the identities of individuals, but they can be used to map relationships and build networks of associates and intelligence targets.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;The FBI, part of their job is counterintelligence,&amp;rdquo; said John Fokker, head of threat intelligence at Trellix and a former official in the Dutch National Police&amp;rsquo;s High-Tech Crime Unit. &amp;ldquo;So if they&amp;rsquo;re conducting any investigations on U.S. soil against, maybe some Chinese spies &amp;hellip; that could be interesting for a party like the Chinese or the Russians, it could be anyone, just to get an inside look. It can give them a heads up of who they need to cut ties with, or bring back, or if their asset is compromised.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;Politico &lt;a href="https://subscriber.politicopro.com/article/2026/04/fbi-hack-phone-numbers-wiretaps-00856327"&gt;first reported&lt;/a&gt; the details of the breach involving targets&amp;rsquo; phone numbers and the &amp;ldquo;major incident&amp;rdquo; determination under FISMA. The Wall Street Journal &lt;a href="https://www.wsj.com/politics/national-security/china-suspected-in-breach-of-fbi-surveillance-network-2c9d1691?gaa_at=eafs&amp;amp;gaa_n=AWEtsqe09lkZqIhCEcLHvg5d7z2uTXA1rYL_QEkb1t96CBi5Awmu650NsWjLnzMJ3dE=&amp;amp;gaa_ts=69ced067&amp;amp;gaa_sig=aacPVI-7FmfIbfrhzqxkPDISQZpGyLaO0r-hOVz4bVYYoYG_Tc831JOkLftzcQRAlF7VPwJeE4TMTPEzsfiaCg=="&gt;reported&lt;/a&gt; a suspected Chinese nexus to the hack. &lt;em&gt;Nextgov/FCW&lt;/em&gt; has not independently confirmed a definitive link to China.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;The FBI identified anomalous activity on an unclassified network and quickly leveraged all technical capabilities to remediate the incident,&amp;rdquo; an FBI spokesperson said. &amp;ldquo;It was determined the access was obtained through a third party and constitutes a major incident under the Federal Information Security Modernization Act (FISMA). The FBI is following the required steps under FISMA, including notifying Congress, and remains focused on countering nation-state and cybercriminal activity.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;&amp;ldquo;Reports that China-linked threat actors compromised sensitive FBI systems are disturbing &amp;mdash; and are even more evidence that the Trump administration has taken its eye off the ball when it comes to defending government and critical infrastructure networks from our adversaries,&amp;rdquo; said Mississippi Rep. Bennie Thompson, the top Democrat on the House Homeland Security Committee. &amp;ldquo;From its bare bones cyber strategy to pushing cyber talent out of government, the president is ignoring pressing cyber threats and leaving our nation vulnerable. It&amp;rsquo;s time for him to focus on what&amp;rsquo;s important.&amp;rdquo;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The development is the most recent known example of a potential foreign adversary attempting to acquire data tied to phone records collected by U.S. law enforcement.&lt;/p&gt;

&lt;p&gt;In 2024, investigators concluded the Chinese state-backed Salt Typhoon group breached global telecom networks, including systems that facilitate &amp;ldquo;lawful intercept&amp;rdquo; requests used by law enforcement to &lt;a href="https://www.nextgov.com/cybersecurity/2025/08/salt-typhoon-hackers-targeted-over-80-countries-fbi-says/407719/"&gt;surveil targets&lt;/a&gt; via court orders. It allowed them to directly target the calls of major political figures, including President Donald Trump and Vice President JD Vance when they were campaigning for the White House.&lt;/p&gt;

&lt;p&gt;Rep. Andrew Garbarino, R-N.Y., the chairman of the House Homeland Security Committee, said the panel was in touch with the Cybersecurity and Infrastructure Security Agency about the incident.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;The PRC&amp;rsquo;s continued targeting of U.S. government systems, including through trusted third-party infrastructure as seen in the Salt Typhoon campaign, underscores the growing sophistication and persistence of these actors. CISA&amp;rsquo;s mission to work in close partnership with interagency partners and the private sector to identify and mitigate vulnerabilities before they are exploited is essential,&amp;rdquo; Garbarino said. &amp;ldquo;The fact that this intrusion took place during the ongoing DHS shutdown highlights the dangerous consequences of playing politics with our national security. The committee is actively engaged with CISA as we assess the scope and implications of this intrusion.&amp;rdquo;&lt;/p&gt;
]]&gt;</content:encoded><media:content url="https://cdn.nextgov.com/media/img/cd/2026/04/03/040326FBING/large.jpg" width="618" height="284"><media:credit>Celal GÃ¼neÅ/Anadolu Agency via Getty Images</media:credit><media:thumbnail url="https://cdn.nextgov.com/media/img/cd/2026/04/03/040326FBING/thumb.jpg" width="138" height="83"></media:thumbnail></media:content></item><item><title>North Korea-linked hackers suspected in Axios open-source hijack, Google analysts say</title><link>https://www.nextgov.com/cybersecurity/2026/03/north-korea-linked-hackers-suspected-axios-open-source-hijack-google-analysts-say/412523/</link><description>“The full breadth of this incident is still unclear, but given the popularity of the compromised package, we expect it will have far reaching impacts,” a chief Google analyst said.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">David DiMolfetta</dc:creator><pubDate>Tue, 31 Mar 2026 14:42:00 -0400</pubDate><guid>https://www.nextgov.com/cybersecurity/2026/03/north-korea-linked-hackers-suspected-axios-open-source-hijack-google-analysts-say/412523/</guid><category>Cybersecurity</category><content:encoded>&lt;![CDATA[&lt;p&gt;North Korea-aligned hackers are believed to have seized a widely-used, open-source JavaScript library, Google intelligence analysts said Tuesday, in a move that could put a significant number of software developers at risk of system compromise.&lt;/p&gt;

&lt;p&gt;The hackers introduced compromised versions of Axios, a popular open-source JavaScript library, on Monday. Developers use the package, which is downloaded millions of times weekly, to enable internet connectivity for their software. The open-source library is not related to the national news organization also named Axios.&lt;/p&gt;

&lt;p&gt;Security firm StepSecurity &lt;a href="https://www.stepsecurity.io/blog/axios-compromised-on-npm-malicious-versions-drop-remote-access-trojan"&gt;detected and halted&lt;/a&gt; the hack within a few hours of its deployment between late Monday and early Tuesday.&lt;/p&gt;

&lt;p&gt;Google&amp;rsquo;s Threat Intelligence Group is investigating the attack and has attributed it to a suspected North Korean group they track as UNC1069, said John Hultquist, the group&amp;rsquo;s chief analyst.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;North Korean hackers have deep experience with supply chain attacks, which they&amp;rsquo;ve historically used to steal cryptocurrency. The full breadth of this incident is still unclear, but given the popularity of the compromised package, we expect it will have far reaching impacts,&amp;rdquo; Hultquist added.&lt;/p&gt;

&lt;p&gt;Rather than tampering with Axios itself, the attackers slipped in rogue code that executed during installation, bringing in a cross-platform remote access trojan, according to StepSecurity. The malware immediately reached out to a command-and-control server, deployed additional payloads and then wiped its own tracks, making detection difficult.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;This is among the most operationally sophisticated supply chain attacks ever documented against a top-10 npm package,&amp;rdquo; the StepSecurity blog says, referring to packaged collections of JavaScript code.&lt;/p&gt;

&lt;p&gt;A supply chain attack occurs when hackers compromise a third-party software or service provider to distribute malware to its users downstream. The attack on Axios could give hackers remote access to infected systems, allowing them to steal credentials, move through networks and potentially compromise connected software used by thousands of other users.&lt;/p&gt;

&lt;p&gt;Both the FBI and the Cybersecurity and Infrastructure Security Agency declined&amp;nbsp;comment when contacted by &lt;em&gt;Nextgov/FCW&lt;/em&gt;. It&amp;rsquo;s not immediately clear if that campaign has directly impacted U.S. government systems, though the attack vector could raise concerns for federal agencies and contractors that rely on widely used open-source packages.&lt;/p&gt;

&lt;p&gt;Chinese, Russian and North Korean-affiliated hackers have been covertly working to insert backdoor hijacks and exploits into major publicly available software used by countless organizations, developers and governments around the world, according to &lt;a href="https://www.striderintel.com/newsroom/lying-in-wait-new-strider-report-finds-high-risk-contributors-connected-to-adversarial-nation-states-in-open-source-software-ecosystems/"&gt;findings&lt;/a&gt; released last August from Strider Technologies.&lt;/p&gt;

&lt;p&gt;Open-source projects &amp;mdash; which underpin software systems used everywhere &amp;mdash; rely on contributions from community members to keep them updated with patches. The updates are often discussed on forums with volunteer software maintainers, who chat with one another about proposed changes.&lt;/p&gt;

&lt;p&gt;Historically, community practices have operated under the premise that all contributors are benevolent. But that notion was &lt;a href="https://www.nextgov.com/cybersecurity/2024/04/linux-backdoor-was-long-con-possibly-nation-state-support-experts-say/395511/"&gt;challenged in 2024&lt;/a&gt; when a user dubbed &amp;ldquo;Jia Tan&amp;rdquo; tried to quietly plant a backdoor into XZ Utils, a file transfer tool used in several Linux builds that power software in leading global companies.&lt;/p&gt;

&lt;p&gt;In December, the chairman of the Senate Intelligence Committee &lt;a href="https://www.nextgov.com/cybersecurity/2025/12/sen-cotton-urges-top-white-house-cyber-official-protect-open-source-software/410264/?oref=ng-topic-lander-top-story"&gt;asked the White House national cyber director&lt;/a&gt; to take steps to address vulnerabilities in open-source software projects that help power many systems used in U.S. military and civilian agencies.&lt;/p&gt;

&lt;p&gt;Last August, &lt;em&gt;Nextgov/FCW&lt;/em&gt; &lt;a href="https://www.nextgov.com/cybersecurity/2025/08/report-russia-based-yandex-employee-oversees-open-source-software-approved-dod-use/407703/"&gt;first reported&lt;/a&gt; that a Russia-based Yandex employee was the sole maintainer of a widely used open-source tool embedded in at least 30 pre-built software packages in the Department of Defense.&lt;/p&gt;
]]&gt;</content:encoded><media:content url="https://cdn.nextgov.com/media/img/cd/2026/03/31/033126NKoreaNG/large.jpg" width="618" height="284"><media:credit>namussi/Getty Images</media:credit><media:thumbnail url="https://cdn.nextgov.com/media/img/cd/2026/03/31/033126NKoreaNG/thumb.jpg" width="138" height="83"></media:thumbnail></media:content></item><item><title>DHS drops investigation into former acting CISA chief’s failed polygraph exam</title><link>https://www.nextgov.com/cybersecurity/2026/03/dhs-drops-investigation-former-acting-cisa-chiefs-failed-polygraph-exam/412473/</link><description>“We are pleased that the CISA personnel punished by previous DHS and CISA leadership for doing their jobs have been cleared of wrongdoing and invited back to work, as we demanded three months ago,” said a joint statement from Democratic Reps. Bennie Thompson and Eric Swalwell.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">David DiMolfetta</dc:creator><pubDate>Mon, 30 Mar 2026 08:00:00 -0400</pubDate><guid>https://www.nextgov.com/cybersecurity/2026/03/dhs-drops-investigation-former-acting-cisa-chiefs-failed-polygraph-exam/412473/</guid><category>Cybersecurity</category><content:encoded>&lt;![CDATA[&lt;p&gt;The Department of Homeland Security has dropped a probe into seven Cybersecurity and Infrastructure Security Agency staffers who were placed on leave after arranging a counterintelligence polygraph exam that the agency&amp;rsquo;s former acting director failed, according to two DHS officials familiar with the matter.&lt;/p&gt;

&lt;p&gt;The investigation was closed about a week ago and the staffers were cleared, one of the officials said. Both spoke on the condition of anonymity because they weren&amp;rsquo;t authorized to communicate details of the non-public investigation.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The move is a major reprieve for CISA staff who arranged the counterintelligence polygraph for then-acting director Madhu Gottumukkala. Gottumukkala failed the polygraph in July 2025, which was needed for access to a highly sensitive intelligence program.&lt;/p&gt;

&lt;p&gt;The staff involved were subsequently placed on leave. At least five career CISA staff members and one contractor involved in scheduling or approving the polygraph examinations were impacted, and received letters from DHS Acting Chief Security Officer Michael Boyajian informing them their security clearances were suspended.&lt;/p&gt;

&lt;p&gt;The news of the investigation being dropped was &lt;a href="https://www.politico.com/news/2026/03/28/cisa-polygraph-investigation-closed-00849376"&gt;first reported&lt;/a&gt; by Politico, which also first reported the initial story about the polygraph incident late last year.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;The investigation has concluded, and this matter has been handled internally,&amp;rdquo; a DHS spokesperson said.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Nextgov/FCW&lt;/em&gt; has also asked Gottumukkala&amp;nbsp;for comment.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;We are pleased that the CISA personnel punished by previous DHS and CISA leadership for doing their jobs have been cleared of wrongdoing and invited back to work, as we demanded three months ago,&amp;rdquo; said a joint statement from Reps. Bennie Thompson, D-Miss., and Eric Swalwell, D-Calif., top lawmakers on the House Homeland Security Committee that has jurisdiction over CISA.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;We cannot, and will not, tolerate political leadership punishing career employees for faithfully executing their security mission,&amp;rdquo; they added. &amp;ldquo;We thank the career employees for their continued service and express our sincere regrets for the turmoil they experienced over the past several months.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;&amp;ldquo;Nonpartisan civil servants should never be targeted for political reasons,&amp;rdquo; Rep. James Walkinshaw, D-Va., said in an &lt;a href="https://x.com/Rep_Walkinshaw/status/2037937715266588968"&gt;X post&lt;/a&gt; responding to news of the probe&amp;rsquo;s dismissal.&lt;/p&gt;

&lt;p&gt;The polygraph incident was among a smattering of other matters reported in recent months by Politico about Gottumukkala&amp;rsquo;s tenure. Last month, Gottumukkala was &lt;a href="https://www.nextgov.com/people/2026/02/cisa-acting-director-moved-new-dhs-role/411737/?oref=ng-homepage-river"&gt;moved&lt;/a&gt; into a strategic implementation role in DHS, and executive assistant director for cybersecurity Nick Andersen took his place leading CISA in an acting capacity.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Nextgov/FCW&lt;/em&gt; could not determine if all affected staffers would choose to return to CISA. It&amp;rsquo;s also possible that some of them resigned in full and would not go back to public service.&lt;/p&gt;

&lt;p&gt;CISA remains without permanent leadership. Earlier this month, CISA director nominee Sean Plankey &lt;a href="https://www.nextgov.com/people/2026/03/trumps-cisa-nominee-said-he-left-coast-guard-address-gop-hold/411894/"&gt;told &lt;em&gt;Nextgov/FCW&lt;/em&gt;&lt;/a&gt; that he &lt;a href="https://www.nextgov.com/people/2026/03/trumps-cisa-nominee-exit-coast-guard-role-still-running-lead-cyber-agency/411863/"&gt;left a role in the Coast Guard&lt;/a&gt; to address concerns from a Republican senator with a hold on his nomination, but the status of that hold is unclear.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;DHS, which houses CISA, got &lt;a href="https://www.govexec.com/management/2026/03/mullin-confirmed-lead-dhs-shutdown-drags-and-100000-employees-remain-unpaid/412314/?oref=ge-homepage-river"&gt;new leadership&lt;/a&gt; last week after Oklahoma Republican Senator Markwayne Mullin was confirmed to the post in a 54-45 vote.&lt;/p&gt;
]]&gt;</content:encoded><media:content url="https://cdn.nextgov.com/media/img/cd/2026/03/29/GettyImages_2257442668/large.jpg" width="618" height="284"><media:description>Madhu Gottumukkala, acting director of the Cybersecurity and Infrastructure Security Agency, testifies during the DHS oversight hearing in the Cannon House office building on January 21, 2026 in Washington, DC. </media:description><media:credit>Heather Diehl/Getty Images</media:credit><media:thumbnail url="https://cdn.nextgov.com/media/img/cd/2026/03/29/GettyImages_2257442668/thumb.jpg" width="138" height="83"></media:thumbnail></media:content></item><item><title>Pro-Iran hackers claim breach of FBI director’s email</title><link>https://www.nextgov.com/cybersecurity/2026/03/pro-iran-hackers-claim-breach-fbi-directors-email/412440/</link><description>The leaks appear to be authentic, according to a person familiar with the matter.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">David DiMolfetta</dc:creator><pubDate>Fri, 27 Mar 2026 11:51:00 -0400</pubDate><guid>https://www.nextgov.com/cybersecurity/2026/03/pro-iran-hackers-claim-breach-fbi-directors-email/412440/</guid><category>Cybersecurity</category><content:encoded>&lt;![CDATA[&lt;p&gt;A pro-Iran hacker group claimed to have accessed FBI Director Kash Patel&amp;rsquo;s personal email and posted purported contents from the inbox online.&lt;/p&gt;

&lt;p&gt;Handala, which claimed responsibility in recent weeks for hacks against &lt;a href="https://www.nextgov.com/cybersecurity/2026/03/cisa-launches-investigation-stryker-cyberattack/412079/"&gt;Stryker&lt;/a&gt; and &lt;a href="https://www.cybersecuritydive.com/news/lockheed-martin-breach-pro-iran-hacktivist/815430/"&gt;Lockheed Martin&lt;/a&gt; in response to the Iran war, circulated images and documents online that they claimed to be from Patel&amp;rsquo;s email account. Many images include pictures of Patel in a personal capacity before becoming FBI director.&lt;/p&gt;

&lt;p&gt;The leaks appear to be authentic, according to a person familiar with the matter who requested anonymity because they weren&amp;rsquo;t authorized to publicly discuss details of the breach.&lt;/p&gt;

&lt;p&gt;The incident was &lt;a href="https://www.reuters.com/world/us/iran-linked-hackers-claim-breach-of-fbi-directors-personal-email-doj-official-2026-03-27/"&gt;first reported&lt;/a&gt; by Reuters.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&amp;ldquo;The FBI is aware of malicious actors targeting Director Patel&amp;rsquo;s personal email information, and we have taken all necessary steps to mitigate potential risks associated with this activity. The information in question is historical in nature and involves no government information,&amp;rdquo; the bureau said in a statement after this story published.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Handala said it carried out the intrusion after the FBI last week said it &lt;a href="https://www.justice.gov/opa/pr/justice-department-disrupts-iranian-cyber-enabled-psychological-operations"&gt;seized domains&lt;/a&gt; used by the group.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;Today, once again, the world witnessed the collapse of America&amp;rsquo;s so-called security legends,&amp;rdquo; the group wrote on its website. &amp;ldquo;While the FBI proudly seized our domains and immediately announced a $10 million reward for the heads of Handala Hack members, we decided to respond to this ridiculous show in a way that will be remembered forever.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;The breach is likely legitimate, according to a former U.S. official who said that administration officials&amp;rsquo; personal email accounts are a frequent target of Iranian hackers.&lt;/p&gt;

&lt;p&gt;It would not be the first time that Iran-aligned hackers executed a &amp;ldquo;hack and leak&amp;rdquo; operation against U.S. targets. In 2024, the Trump campaign was &lt;a href="https://www.nextgov.com/cybersecurity/2024/09/us-charges-iranian-operatives-hacking-trump-campaign/399900/"&gt;accessed&lt;/a&gt; in an Iranian hack that exposed vetting documents for Vice President JD Vance.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Editor&amp;rsquo;s note: This story has been updated to include remarks from a former U.S. official and the FBI.&lt;/em&gt;&lt;/p&gt;
]]&gt;</content:encoded><media:content url="https://cdn.nextgov.com/media/img/cd/2026/03/27/032726PatelNG/large.jpg" width="618" height="284"><media:description>FBI Director Kash Patel testifies during a House Select Committee on Intelligence hearing on the 2026 Annual Worldwide Threats Assessment at the U.S. Capitol in Washington, DC on March 19, 2026.</media:description><media:credit>Nathan Posner/Anadolu via Getty Images</media:credit><media:thumbnail url="https://cdn.nextgov.com/media/img/cd/2026/03/27/032726PatelNG/thumb.jpg" width="138" height="83"></media:thumbnail></media:content></item><item><title>Lawmakers question VPN impact on Americans' FISA surveillance protections</title><link>https://www.nextgov.com/cybersecurity/2026/03/lawmakers-question-vpn-impact-americans-fisa-surveillance-protections/412437/</link><description>Democrats from both chambers sent a letter questioning the impacts to the Director of National Intelligence as Congress faces a deadline to renew FISA Section 702, which allows warrantless collection of foreigners’ communications overseas.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">David DiMolfetta</dc:creator><pubDate>Fri, 27 Mar 2026 10:40:00 -0400</pubDate><guid>https://www.nextgov.com/cybersecurity/2026/03/lawmakers-question-vpn-impact-americans-fisa-surveillance-protections/412437/</guid><category>Cybersecurity</category><content:encoded>&lt;![CDATA[&lt;p&gt;Senate and House Democrats asked Director of National Intelligence Tulsi Gabbard on Thursday to clarify whether the use of virtual private networks could affect Americans&amp;rsquo; protections against warrantless surveillance authorities.&lt;/p&gt;

&lt;p&gt;The &lt;a href="https://www.wyden.senate.gov/download/wyden-letter"&gt;letter&lt;/a&gt; &amp;mdash; signed by Sens. Ron Wyden, D-Ore., Alex Padilla, D-Calif., Ed. Markey, D-Mass., and Elizabeth Warren, D-Mass., alongside Reps. Sara Jacobs, D-Calif. and Pramila Jayapal, D-Wash. &amp;mdash; argues VPN use may complicate how intelligence agencies assess a user&amp;rsquo;s location, which in turn can shape the legal protections applied to their communications.&lt;/p&gt;

&lt;p&gt;Under domestic surveillance law, Americans are generally afforded stronger protections than foreigners overseas, including through requirements for court-approved warrants before their communications are &lt;a href="https://legal-resources.uslegalforms.com/l/lawful-interception"&gt;lawfully intercepted&lt;/a&gt;. But VPNs &amp;mdash; which route traffic through private servers to mask device locations &amp;mdash; can obscure where a user is truly based. Under U.S. surveillance rules, users with unknown locations may be treated as foreigners, potentially altering the legal protections applied to their communications, the lawmakers say.&lt;/p&gt;

&lt;p&gt;The letter points to provisions underpinning FISA Section 702 &amp;mdash; which allows warrantless surveillance of foreigners overseas &amp;mdash; and Executive Order 12333 as evidence that users with unknown locations may be treated as foreigners, affecting the protections applied to their communications.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;Under both Section 702 and EO 12333, the government is obligated to seek to determine the non-U.S. person status and location of its targets. Nonetheless, the federal government has taken the position that communications whose source remains unknown are treated as foreign, and thus subject to few privacy protections,&amp;rdquo; the letter says.&lt;/p&gt;

&lt;p&gt;It adds: &amp;ldquo;While Americans should be warned of these risks, they should also be told if these VPN services, which are advertised as a privacy protection, including by elements of the federal government, could, in fact, negatively impact their rights against U.S. government surveillance.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;The letter comes as Congress faces an April 20 deadline to renew FISA 702, which expires unless renewed by lawmakers. The controversial law is widely deemed a powerful spying authority by intelligence professionals, but the collection mechanisms permit incidental collection of U.S. person communications, which leave the door open to unauthorized queries that privacy advocates say circumvent the Fourth Amendment.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Nextgov/FCW&lt;/em&gt; has asked a Gabbard spokesperson for comment.&lt;/p&gt;

&lt;p&gt;President Donald Trump said in a &lt;a href="https://t.co/cAZ3j6CgxK"&gt;Truth Social post&lt;/a&gt; this week that he supports a clean, 18-month extension of the 702 statute.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&amp;ldquo;The fact is, whether you like it or not, it is extremely important to our military,&amp;rdquo; he said, adding that he has spoken to military leaders and &amp;ldquo;they consider it vital.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;The Congressional Progressive Caucus recently came out against renewing FISA Section 702, its strongest stance yet, binding its 98 members &amp;mdash; nearly a quarter of the House &amp;mdash; against a clean reauthorization and complicating Republican efforts to secure enough votes.&lt;/p&gt;

&lt;p&gt;Lawmakers&amp;rsquo; concerns about Trump-era immigration enforcement and affiliated Fourth Amendment compliance are weighing on the reauthorization fight for 702, congressional aides &lt;a href="https://www.nextgov.com/cybersecurity/2026/02/domestic-surveillance-fears-loom-over-congress-debate-renew-spying-power/411214/"&gt;previously told&lt;/a&gt; &lt;em&gt;Nextgov/FCW&lt;/em&gt;.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;While Donald Trump and Stephen Miller are showing unprecedented disregard for the basic Constitutional rights of Americans, the last thing we should be doing is handing them massive surveillance powers they will abuse.,&amp;rdquo; Rep. Greg Casar, D-Texas, the CPC&amp;rsquo;s chair, said in an &lt;a href="https://x.com/RepCasar/status/2034979342493651114"&gt;X post&lt;/a&gt; last week.&lt;/p&gt;
]]&gt;</content:encoded><media:content url="https://cdn.nextgov.com/media/img/cd/2026/03/27/032726VPNNG/large.jpg" width="618" height="284"><media:credit>Prykhodov/Getty Images</media:credit><media:thumbnail url="https://cdn.nextgov.com/media/img/cd/2026/03/27/032726VPNNG/thumb.jpg" width="138" height="83"></media:thumbnail></media:content></item><item><title>EU wants to support bedrock cyber vulnerability program, top official says</title><link>https://www.nextgov.com/cybersecurity/2026/03/eu-wants-support-bedrock-cyber-vulnerability-program-top-official-says/412429/</link><description>U.S. congressional staffers are also working on legislation to give CISA more oversight of the Common Vulnerabilities and Exposures program after a contracting incident last April.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">David DiMolfetta</dc:creator><pubDate>Thu, 26 Mar 2026 20:16:00 -0400</pubDate><guid>https://www.nextgov.com/cybersecurity/2026/03/eu-wants-support-bedrock-cyber-vulnerability-program-top-official-says/412429/</guid><category>Cybersecurity</category><content:encoded>&lt;![CDATA[&lt;p&gt;SAN FRANCISCO &amp;mdash; The European Union wants to assist with and help modernize a cornerstone cyber cataloging program after a contracting scare last year prompted renewed discussions and concerns over how to sustain the vulnerability-tracking system relied upon by hundreds of thousands of security practitioners worldwide.&lt;/p&gt;

&lt;p&gt;The Common Vulnerabilities and Exposures Program faced a contracting fiasco last spring when MITRE, the non-profit research giant that funds much of the program&amp;rsquo;s functions, warned of an imminent end to federal backing for the project. The matter was &lt;a href="https://www.nextgov.com/cybersecurity/2025/04/cisa-extends-mitre-backed-cve-contract-hours-its-lapse/404601/"&gt;addressed&lt;/a&gt; within hours amid outcry from the cybersecurity community.&lt;/p&gt;

&lt;p&gt;The EU wants to help &amp;ldquo;build upon&amp;rdquo; the foundation of the program and &amp;ldquo;the great work that has been done there,&amp;rdquo; Hans de Vries, the chief cybersecurity and operational officer for the European Union Agency for Cybersecurity, or ENISA, said Thursday at the RSAC Conference in California.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;After the initial contracting issue, EU member states asked ENISA to explore ways to strengthen the CVE process, de Vries explained.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&amp;ldquo;We cannot build on one contract alone, so we have to strengthen it, and make sure that foundation, that basic mechanism &amp;mdash; and it&amp;rsquo;s a huge program &amp;mdash; but that mechanism stays, and stays to the core that we want to build on,&amp;rdquo; he said.&lt;/p&gt;

&lt;p&gt;CVE provides a standardized methodology for identifying and cataloging publicly known cybersecurity vulnerabilities. Each flaw is assigned a unique identifier, designed to help security researchers, vendors and officials more effectively communicate about the same issue. It was first launched in 1999.&lt;/p&gt;

&lt;p&gt;The remarks from de Vries are some of the first showing how European officials are weighing a more formal role in contributing to the CVE program, amid growing concerns that its long-term stability cannot rely on a sole U.S. government contract.&lt;/p&gt;

&lt;p&gt;Congressional staffers have also drafted legislation to codify the CVE program and address how the Cybersecurity and Infrastructure Security Agency would take a more active oversight role in its management, said Moira Bergin, who leads cyber policy work for the Democrat side of the House Homeland Security Committee.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;While CISA is certainly authorized to execute this program, it&amp;rsquo;s not specifically tasked with doing it, which, as an oversight committee, makes it harder for us to hold an agency accountable for executing a task,&amp;rdquo; she said. &amp;ldquo;And it doesn&amp;#39;t give any of the stakeholders any expectation of what they can expect from the program and hold it accountable for.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;A newer version of the program managed under CISA should also &amp;ldquo;endure political cycles,&amp;rdquo; said Mike McLaughlin, a shareholder and Cybersecurity and Data Privacy Practice Group co-lead at Buchanan Ingersoll &amp;amp; Rooney PC, arguing that if CVE is housed in CISA but is perceived as politicized or fragile, other regions will fragment off and force competing programs to emerge.&lt;/p&gt;

&lt;p&gt;Bergin said that, in the draft text, staffers are seeking to &amp;ldquo;inoculate the [CVE] board membership from political cycles&amp;rdquo; so those risks are diminished.&lt;/p&gt;

&lt;p&gt;The discussion also came amid &lt;a href="https://www.nextgov.com/ideas/2026/03/why-convergence-ai-and-cybersecurity-must-be-top-priority-administration/411837/"&gt;growing recognition&lt;/a&gt; among industry practitioners that AI has now become a core tool in hackers&amp;rsquo; arsenals that can accelerate the speed and scale of cyberattacks.&lt;/p&gt;

&lt;p&gt;On a regular basis, some people &amp;ldquo;seem to think that CVE records should be just read by humans,&amp;rdquo; said Bob Lord, a former Cybersecurity and Infrastructure Security Agency official who helped lead the agency&amp;rsquo;s &lt;a href="https://www.cisa.gov/securebydesign"&gt;Secure by Design&lt;/a&gt; initiative.&lt;/p&gt;

&lt;p&gt;In the CVE program, a vulnerability record is created when a flaw is first published, while later &amp;ldquo;enrichment&amp;rdquo; can add details such as severity and exploitability. But as cyberattacks now move at machine speed, many experts argue those records need to be far more complete upfront, because waiting to fill in the gaps can leave defenders exposed.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;While there certainly is a component where humans should be able to go in and look at CVE and understand what&amp;rsquo;s in there, what we really need to do is start making sure that we have high-quality records,&amp;rdquo; said Lord, referring to individual vulnerability entries. &amp;ldquo;Today, we&amp;rsquo;re going to really need to talk a lot more about record quality at the time of issuance, not enrichment later, but at the time of issuance.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;A CISA spokesperson told &lt;em&gt;Nextgov/FCW&lt;/em&gt; that a &amp;ldquo;broad internal contracting review caused a brief renewal delay in April 2025, but operations continued without disruption and MITRE was ultimately retained as the program operator.&amp;rdquo; CISA and the Department of Homeland Security have since &amp;ldquo;taken proactive contracting steps to maintain MITRE&amp;rsquo;s support, ensure stable global vulnerability tracking and expand its usage,&amp;rdquo; the spokesperson added.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;MITRE, in support of CISA, is committed to CVE as a critical global resource,&amp;rdquo; Jordan Graham, a company spokesperson said.&lt;/p&gt;

&lt;p&gt;Today, everyone uses CVE identifiers as a common vernacular, said McLaughlin. If it disappears, vendors and defenders can&amp;rsquo;t easily tell if they&amp;rsquo;re talking about the same bug, and regulators and service providers lose a shared reference system.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;I think if the program were to go away, you&amp;rsquo;d have fragmentation, which leads to inefficiency, which leads to less security,&amp;rdquo; Bergin said. &amp;ldquo;And when we make the case to our members that this is something that they should take their time with, that&amp;rsquo;s what we say: fragmentation, inefficiency, less security &amp;mdash; it&amp;rsquo;s that simple.&amp;rdquo;&lt;/p&gt;
]]&gt;</content:encoded><media:content url="https://cdn.nextgov.com/media/img/cd/2026/03/26/032626panelNG/large.jpg" width="618" height="284"><media:description>Former CISA official Bob Lord, Chief Cybersecurity and Operational Officer for the European Union Agency for Cybersecurity Hans de Vries, House Homeland Security Committee staffer Moira Bergin, and Shareholder and Cybersecurity and Data Privacy Practice Group Co-Lead at Buchanan Ingersoll &amp; Rooney PC Mike McLaughlin speak with Nextgov/FCW reporter David DiMolfetta at RSAC March 26.</media:description><media:credit>Francesca Spidalieri</media:credit><media:thumbnail url="https://cdn.nextgov.com/media/img/cd/2026/03/26/032626panelNG/thumb.jpg" width="138" height="83"></media:thumbnail></media:content></item><item><title>European officials highlight private sector help in major cybercrime takedowns</title><link>https://www.nextgov.com/cybersecurity/2026/03/european-officials-highlight-private-sector-help-major-cybercrime-takedowns/412388/</link><description>Industry helped European law enforcement groups in operations that tracked and dismantled assets tied to major cybercrime gangs like Scattered Spider.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">David DiMolfetta</dc:creator><pubDate>Wed, 25 Mar 2026 19:02:00 -0400</pubDate><guid>https://www.nextgov.com/cybersecurity/2026/03/european-officials-highlight-private-sector-help-major-cybercrime-takedowns/412388/</guid><category>Cybersecurity</category><content:encoded>&lt;![CDATA[&lt;p&gt;SAN FRANCISCO &amp;mdash; Private sector partners got a special shoutout in a panel of top European cyber law enforcement officials Wednesday as they discussed industry involvement in major takedowns of cybercrime groups.&lt;/p&gt;

&lt;p&gt;At RSAC Conference, Dutch National Police cybercrime director Stan Dujif, UK National Crime Agency cyber crime unit lead Paul Foster, and Germany&amp;rsquo;s Bundeskriminalamt cyber division head Carsten Meywirth all acknowledged industry&amp;rsquo;s role in takedowns of cybercriminals&amp;rsquo; digital infrastructure and the arrests of those allegedly involved in hacking schemes.&lt;/p&gt;

&lt;p&gt;Just days before the U.S. and international partners &lt;a href="https://www.nextgov.com/cybersecurity/2024/02/us-international-partners-disrupt-lockbit-ransomware-operations/394289/"&gt;went after&lt;/a&gt; LockBit &amp;mdash; a prolific ransomware group &amp;mdash; Foster said that private sector partners were brought in to be briefed about the forthcoming takedown. Industry was especially helpful in affirming that the takedown was legitimate so other criminal hackers couldn&amp;rsquo;t fill the void.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&amp;ldquo;So much of the amplification narrative came from private partners, rather than just law enforcement,&amp;rdquo; Foster said.&lt;/p&gt;

&lt;p&gt;Private sector partners also estimated how long any law enforcement action would keep the notorious &lt;a href="https://www.nextgov.com/cybersecurity/2023/11/cisa-fbi-warn-social-engineering-based-ransomware/392089/"&gt;Scattered Spider group&lt;/a&gt; suppressed before it was able to reconstitute. Last July, arrests of alleged criminal gang operatives &lt;a href="https://www.justice.gov/opa/pr/united-kingdom-national-charged-connection-multiple-cyber-attacks-including-critical"&gt;commenced&lt;/a&gt;. Paul said that estimates came in at six weeks and the true number ended up being five weeks.&lt;/p&gt;

&lt;p&gt;Cybercrime is unique in the cybersecurity world because, unlike nation-state intelligence services, criminal hackers can operate across jurisdictions and rely on commercial infrastructure, often leaving a trail that private cybersecurity firms can track and help disrupt.&lt;/p&gt;

&lt;p&gt;Industry involvement was designed as part of Operation Endgame, an ongoing &lt;a href="https://operation-endgame.com/"&gt;international law enforcement initiative&lt;/a&gt; led by Europol and others that launched in May 2024 to dismantle critical criminal hacker infrastructure, said Maywirth.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;Nowadays for us, it is quite normal to integrate private partners as well in the operations. We proved that, and we had a very good success from those corporations,&amp;rdquo; he said.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The private sector often partakes in &amp;ldquo;covert&amp;rdquo; investigation support phases where they identify digital infrastructure for law enforcement to take down, Maywirth added.&lt;/p&gt;

&lt;p&gt;And about two weeks ago, European officials and private company representatives came together in Germany to discuss strategy and approaches for takedowns and disruptions of hackers&amp;rsquo; infrastructure, Maywirth said.&lt;/p&gt;

&lt;p&gt;The discussions underscore how modern cybercrime responses increasingly hinge on collaboration between law enforcement and the private sector, with industry playing a hands-on role in tracking, disrupting and sometimes helping dismantle criminal operations, rather than just supplying intelligence.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;If we look at the intelligence job that we have to do, we would like to understand, really, how the kill chain of cybercrime is working,&amp;rdquo; Dujif said. &amp;ldquo;So we need information from our colleagues, from law enforcement agencies, but also from the private sector to understand &amp;hellip; what&amp;rsquo;s the most impactful intervention we can take?&amp;rdquo;&lt;/p&gt;
]]&gt;</content:encoded><media:content url="https://cdn.nextgov.com/media/img/cd/2026/03/25/032526RSACNG/large.mpo" width="618" height="284"><media:description>(L-R) Dutch National Police cybercrime director Stan Dujif, UK National Crime Agency cyber crime unit lead Paul Foster, and Germany’s Bundeskriminalamt cyber division head Carsten Meywirth speak with Microsoft Vice President and Deputy Chief Information Security Officer Bryan Vorndran March 24, 2025 at RSAC.</media:description><media:credit>David DiMolfetta/Staff</media:credit><media:thumbnail url="https://cdn.nextgov.com/media/img/cd/2026/03/25/032526RSACNG/thumb.mpo" width="138" height="83"></media:thumbnail></media:content></item><item><title>Ex-NSA leaders say Americans are becoming ‘numb’ to cyber threats</title><link>https://www.nextgov.com/cybersecurity/2026/03/ex-nsa-leaders-say-americans-are-becoming-numb-cyber-threats/412359/</link><description>A serious cyberattack hasn’t prompted a strong enough policy or public reaction, one former director said.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">David DiMolfetta</dc:creator><pubDate>Wed, 25 Mar 2026 09:35:00 -0400</pubDate><guid>https://www.nextgov.com/cybersecurity/2026/03/ex-nsa-leaders-say-americans-are-becoming-numb-cyber-threats/412359/</guid><category>Cybersecurity</category><content:encoded>&lt;![CDATA[&lt;p&gt;SAN FRANCISCO &amp;mdash; American society is becoming increasingly apathetic to major cyberattacks, and the U.S. has still not achieved a hardline strategy to deter foreign adversaries and their hacker operatives, former NSA and Cyber Command leaders said Tuesday.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;I think we&amp;rsquo;ve become numb to it,&amp;rdquo; said retired Gen. Paul Nakasone, who served as director of Cyber Command and NSA from 2018 to 2024. He was joined on stage at an RSAC Conference discussion with other retired officials who held the dual-hatted role over the years, including Gen. Keith Alexander, Adm. Mike Rogers and, most recently, Gen. Tim Haugh.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;I think we continue to see these different intrusions, and intrusions have gotten to a size that the scale is just incredible to me&amp;rdquo; Nakasone said. &amp;ldquo;And I think that we are out of balance in terms of being able to keep up with the adversary, whether or not it&amp;rsquo;s ransomware, whether or not it&amp;rsquo;s deepfakes, whether or not it&amp;rsquo;s the brain drain within our government.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;&amp;ldquo;I think for society, we are just becoming so numb to this,&amp;rdquo; said Rogers. &amp;ldquo;We&amp;rsquo;re starting to accept this, in some ways, as the price of living in the digital age, and we have not yet had a level of trauma that has driven fundamental behavioral change.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;The sobering remarks underscore a growing concern among former U.S. cyber leaders that the steady drumbeat of high-impact cyber intrusions has failed to galvanize a proportional policy or societal response.&lt;/p&gt;

&lt;p&gt;Recent incidents highlight that threat picture, from China-linked hackers like Volt Typhoon embedding in U.S. critical infrastructure systems and Salt Typhoon targeting global telecom networks for espionage, to ongoing disruptions at home, including a &lt;a href="https://www.nextgov.com/cybersecurity/2026/03/cisa-fbi-have-engaged-stryker-staff-after-cyberattack-official-says/412192/"&gt;March breach&lt;/a&gt; at medical device maker Stryker that&amp;rsquo;s been tied to a pro-Iran hacker gang.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;I would definitely say we have not achieved deterrence,&amp;rdquo; Rogers said. &amp;ldquo;I see a private sector, network owners, that are very energized and focused. I see a government that&amp;rsquo;s unwilling to expend political capital to really drive fundamental change in cyber, and it&amp;rsquo;s a reflection of the fact that, politically, we are so divided. And as a society, we are so divided.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;Alexander reinforced the same worry over a lack of national readiness against major cyber players.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&amp;ldquo;What I&amp;rsquo;m concerned about is what we&amp;rsquo;re doing as a nation to think about what China could do to hurt us,&amp;rdquo; he said.&lt;/p&gt;

&lt;p&gt;The Trump White House has released a long-anticipated national cyber strategy, which includes a pillar focused on reshaping the behavior of cyber adversaries to create incentives to not target U.S. networks. Details of that effort remain to be seen, though the private sector is expected to play a &lt;a href="https://www.nextgov.com/cybersecurity/2026/03/national-cyber-director-doesnt-envision-industry-doing-offensive-hacking/412176/"&gt;major part&lt;/a&gt;.&lt;/p&gt;
]]&gt;</content:encoded><media:content url="https://cdn.nextgov.com/media/img/cd/2026/03/25/IMG_6280/large.mpo" width="618" height="284"><media:description>(L-R) Ted Schlein, chairman and general partner of Ballistic Ventures and general partner of Kleiner Perkins, speaks with former NSA directors Gen. Keith Alexander, Adm. Mike Rogers, Gen. Paul Nakasone and Gen. Tim Haugh at RSAC on March 24, 2026.</media:description><media:credit>David DiMolfetta/Staff</media:credit><media:thumbnail url="https://cdn.nextgov.com/media/img/cd/2026/03/25/IMG_6280/thumb.mpo" width="138" height="83"></media:thumbnail></media:content></item><item><title>Google launches threat disruption unit, stops short of calling it ‘offensive’</title><link>https://www.nextgov.com/cybersecurity/2026/03/google-launches-threat-disruption-unit-stops-short-calling-it-offensive/412321/</link><description>The unit will use legal authorizations and technical capabilities to impede cyber threat groups, though company execs say it will not go so far as to hack into adversaries' systems.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">David DiMolfetta</dc:creator><pubDate>Mon, 23 Mar 2026 21:54:00 -0400</pubDate><guid>https://www.nextgov.com/cybersecurity/2026/03/google-launches-threat-disruption-unit-stops-short-calling-it-offensive/412321/</guid><category>Cybersecurity</category><content:encoded>&lt;![CDATA[&lt;p&gt;SAN FRANCISCO &amp;mdash; Google&amp;rsquo;s threat intelligence arm officially launched its anticipated disruptive cyber unit on Monday, which comes as the Trump administration seeks to create a more offensive, proactive U.S. culture in cyberspace against foreign hacker groups and cybercriminals.&lt;/p&gt;

&lt;p&gt;Company officials notably deemed the unit a defensive operation, however because it focuses on cutting off the paths hackers rely on to breach systems, rather than using technical capabilities to hack into other governments&amp;rsquo; or foreign firms&amp;rsquo; computer networks.&lt;/p&gt;

&lt;p&gt;The unit was made public in a keynote address delivered at RSAC Conference by Sandra Joyce, the vice president of Google&amp;rsquo;s Threat Intelligence Group. &amp;ldquo;We&amp;rsquo;re now in a position where we can and we must actively shape the outcome of adversary behaviors,&amp;rdquo; she said on stage.&lt;/p&gt;

&lt;p&gt;Google, like other major tech firms with cybersecurity services, can impede cyber adversaries by leveraging visibility into and control over widely used platforms and infrastructure that attackers routinely depend on to stage, deliver or manage their hacking operations. In recent months, Google has highlighted a series of &lt;a href="https://cloud.google.com/blog/topics/threat-intelligence/disrupting-gridtide-global-espionage-campaign"&gt;intricate takedown efforts&lt;/a&gt;, and the announcement, executives say, is meant to encourage other firms in the cybersecurity and tech community to adopt a culture of proactive disruption.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;The private sector operates the very infrastructure that adversaries abuse,&amp;rdquo; Joyce said. &amp;ldquo;This gives us a unique vantage point of the technical capabilities that government agencies sometimes don&amp;rsquo;t have, and disrupting threat actors must become the status quo in our industry.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;The announcement dovetails with the release of the Trump administration&amp;rsquo;s national cyber strategy, which has focused, in part, on crafting a more offensive culture among U.S. cyber warriors and their private sector counterparts.&lt;/p&gt;

&lt;p&gt;But Sean Cairncross, the White House cyber czar, made it clear earlier this month that he &lt;a href="https://www.nextgov.com/cybersecurity/2026/03/national-cyber-director-doesnt-envision-industry-doing-offensive-hacking/412176/?oref=ng-author-river"&gt;doesn&amp;rsquo;t want&lt;/a&gt; private sector firms hacking on behalf of the government. Joyce, in a similar fashion, said the unit is not a &amp;ldquo;hacking back&amp;rdquo; initiative, but makes &amp;ldquo;legal and ethical use of intelligence to protect our own platforms.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;Those legal actions include the practice of getting court orders to take down certain web infrastructure being used by hackers. Other aspects of the unit&amp;rsquo;s modus operandi include publicly exposing hacking groups, taking down their infrastructure and driving product improvements to prevent hackers from attempting further intrusions.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;I think people have had it,&amp;rdquo; John Hultquist, the company&amp;rsquo;s chief threat analyst, told reporters of the choice to launch the unit now after years of related efforts involving &lt;a href="https://www.nextgov.com/cybersecurity/2025/01/fbi-deleted-chinese-malware-4200-us-computers/402174/"&gt;law enforcement takedowns&lt;/a&gt; of hacker infrastructure. &amp;ldquo;What we&amp;rsquo;re talking about is &amp;mdash; can we deny the adversary the resources it needs to get between the water and the castle?&amp;rdquo;&lt;/p&gt;

&lt;p&gt;&amp;ldquo;It&amp;rsquo;s not just about disabling things within the Google ecosystem,&amp;rdquo; added Charles Carmakal, the chief technology officer at Google subsidiary Mandiant. &amp;ldquo;We&amp;rsquo;re doing this in a way where we want to get more and more collaboration with other partners, so that the disruption is much broader and more impactful to the adversary.&amp;rdquo;&lt;/p&gt;
]]&gt;</content:encoded><media:content url="https://cdn.nextgov.com/media/img/cd/2026/03/23/032326GoogleNG/large.jpg" width="618" height="284"><media:credit>Smith Collection/Gado/Getty Images</media:credit><media:thumbnail url="https://cdn.nextgov.com/media/img/cd/2026/03/23/032326GoogleNG/thumb.jpg" width="138" height="83"></media:thumbnail></media:content></item><item><title>CISA, FBI have engaged with Stryker staff after cyberattack, official says</title><link>https://www.nextgov.com/cybersecurity/2026/03/cisa-fbi-have-engaged-stryker-staff-after-cyberattack-official-says/412192/</link><description>Industry groups are seeing a “steady state” of Iran-linked hacking activity but observers should still keep their eyes peeled, CISA’s Nick Andersen said.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">David DiMolfetta</dc:creator><pubDate>Tue, 17 Mar 2026 18:05:00 -0400</pubDate><guid>https://www.nextgov.com/cybersecurity/2026/03/cisa-fbi-have-engaged-stryker-staff-after-cyberattack-official-says/412192/</guid><category>Cybersecurity</category><content:encoded>&lt;![CDATA[&lt;p&gt;The Cybersecurity and Infrastructure Security Agency and the FBI have engaged with executives at Stryker as they work to assess and mitigate the fallout from a major hack of the medical technology giant last week that an Iran-aligned group took credit for, a top official said.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;We&amp;rsquo;ve engaged with them. Our teams have worked with them, as well as some of the FBI teams, and our regional personnel have been engaged with them,&amp;rdquo; Nick Andersen, CISA&amp;rsquo;s acting director, told reporters after he spoke at a McCrary Institute event on Tuesday. He didn&amp;rsquo;t provide other updates.&lt;/p&gt;

&lt;p&gt;The worldwide cyberattack wiped employees&amp;rsquo; phones and prevented workers from accessing their computers and other remote work tools. The logo of Handala, a pro-Iran and pro-Palestinian hacking group, appeared on employee login pages, and the hacking collective&amp;rsquo;s X account also claimed responsibility.&lt;/p&gt;

&lt;p&gt;Andersen added that CISA is engaging further with sector-based industry groups on foreign cyber threats. On Iran, &amp;ldquo;we still are seeing a steady state. [The groups have] not seen an increase in the rise of threat actor activity, which is fantastic,&amp;rdquo; he said.&lt;/p&gt;

&lt;p&gt;But he cautioned that &amp;ldquo;we just can&amp;rsquo;t take our eyes off of the fact that other adversaries continue to make maneuvers in this space. Cybercriminal groups continue to make moves within this space. It&amp;rsquo;s not just about one nation-state at one particular point in time.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;Stryker, one of the largest medical tech providers in the world, said last week it believed the incident was contained but the effects of the hack may continue causing &amp;ldquo;disruptions and limitations of access&amp;rdquo; to certain company information systems and applications supporting parts of their operations and functions.&lt;/p&gt;

&lt;p&gt;Pro-Iran hacking groups frequently target the computer systems of nations considered adversaries to Tehran, namely the U.S. and Israel. In late 2023, during the Israel-Hamas war, another Iran-aligned hacking group defaced the interfaces of Pennsylvania water treatment systems that contained Israel-made Unitronics equipment.&lt;/p&gt;

&lt;p&gt;Stryker acquired the Israeli medical technology firm OrthoSpace in 2019. It also has significant contracts with both the U.S. departments of Defense and Veterans Affairs.&lt;/p&gt;

&lt;p&gt;It&amp;rsquo;s widely believed that a &lt;a href="https://www.bleepingcomputer.com/news/security/stryker-attack-wiped-tens-of-thousands-of-devices-no-malware-needed/"&gt;wiper attack&lt;/a&gt; was used against Stryker&amp;rsquo;s devices after the Handala group compromised a company Microsoft Intune administrative account. Intune is used to manage users&amp;rsquo; access to company resources across their devices, and it can be used to remotely access specific computers or factory reset machines.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;The real failure here is that our core systems still rely on &amp;lsquo;God-like&amp;rsquo; administrative keys that lack deep cryptographic validation,&amp;rdquo; said Denis Mandich, a former CIA official and co-founder of Qrypt. &amp;ldquo;We are essentially giving attackers a single point of failure that allows one compromised credential to execute a global factory reset.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;&amp;ldquo;All Stryker products across our global portfolio, including connected, digital, and life-saving technologies, remain safe to use,&amp;rdquo; the company said in a &lt;a href="https://www.stryker.com/us/en/about/news/2026/a-message-to-our-customers-03-2026.html"&gt;Sunday statement&lt;/a&gt;, but it added that there may be supply chain disruptions as ordering systems come back online. The company also said the incident &amp;ldquo;was not a ransomware attack, and there is no evidence of malware deployed to our systems.&amp;rdquo;&lt;/p&gt;
]]&gt;</content:encoded><media:content url="https://cdn.nextgov.com/media/img/cd/2026/03/17/IMG_5598/large.mpo" width="618" height="284"><media:description>CISA Acting Director Nick Andersen (right) speaks with Frank Cilluffo, director of the McCrary Institute for Cyber and Critical Infrastructure (left), at a McCrary Institute event on March 17, 2026.</media:description><media:credit>David DiMolfetta/Staff</media:credit><media:thumbnail url="https://cdn.nextgov.com/media/img/cd/2026/03/17/IMG_5598/thumb.mpo" width="138" height="83"></media:thumbnail></media:content></item><item><title>National cyber director doesn’t envision industry doing offensive hacking</title><link>https://www.nextgov.com/cybersecurity/2026/03/national-cyber-director-doesnt-envision-industry-doing-offensive-hacking/412176/</link><description>Sean Cairncross wants the private sector to use its technical prowess to inform U.S. government offensive and defensive decisions.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">David DiMolfetta</dc:creator><pubDate>Tue, 17 Mar 2026 13:22:00 -0400</pubDate><guid>https://www.nextgov.com/cybersecurity/2026/03/national-cyber-director-doesnt-envision-industry-doing-offensive-hacking/412176/</guid><category>Cybersecurity</category><content:encoded>&lt;![CDATA[&lt;p&gt;National Cyber Director Sean Cairncross said Tuesday that he does not intend for the private sector to fully engage in offensive cyber operations on behalf of the U.S. government.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;There&amp;rsquo;s an enormous amount of capability on the private sector side,&amp;rdquo; he said. &amp;ldquo;I&amp;rsquo;m not talking about private sector, industry or companies engaged in a cyber offensive campaign.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;The statement, made during a fireside chat at a McCrary Institute event, pushes back on speculation&amp;nbsp;that private industry would be tasked in hacking campaigns authorized by government officials, a concept that surfaced in discussions leading up to the &lt;a href="https://www.nextgov.com/cybersecurity/2026/03/trumps-new-cyber-strategy-details-more-offensive-response-cyber-threats/411963/"&gt;release&lt;/a&gt; of the Trump National Cyber Strategy earlier this month.&lt;/p&gt;

&lt;p&gt;Cairncross said he wants to use the &amp;ldquo;ability of our private sector &amp;hellip; to inform and share information so that the [U.S. government] can respond&amp;rdquo; defensively or in a more agile way.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Private-sector cyber firms provide myriad services like threat intelligence, defensive products and specialized hacking toolkits that are relied on heavily by U.S. government operators and analysts. But the government has not directed the private sector to directly carry out cyber intrusions or &amp;ldquo;hack backs&amp;rdquo; against adversaries on its behalf.&lt;/p&gt;

&lt;p&gt;The private sector engagement hits on one of the cyber strategy&amp;rsquo;s key pillars, which is focused on reshaping the behavior of foreign adversaries to disincentivize hacking. Cairncross said he wants various U.S. agencies &amp;mdash; including non-cyber offices like the Departments of State and Commerce &amp;mdash; to contribute to that goal.&lt;/p&gt;

&lt;p&gt;American cyber and intelligence giants like the NSA, CIA, FBI, Cyber Command and others already have legal authorities to offensively target foreign adversaries using their own hacking capabilities.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The cyber strategy&amp;rsquo;s other pillars include promoting common-sense regulation; modernizing and securing federal government networks; securing critical infrastructure; sustaining superiority in critical and emerging technologies; and building cyber talent and capacity.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Editor&amp;#39;s note: This article has been updated to note that Cairncross made his remarks on Tuesday.&lt;/em&gt;&lt;/p&gt;
]]&gt;</content:encoded><media:content url="https://cdn.nextgov.com/media/img/cd/2026/03/17/031726CairncrossNG/large.jpg" width="618" height="284"><media:description>Sean Cairncross, then-CEO of the Millenium Challenge Corporation, speaks onstage during the 2019 Concordia Annual Summit on September 24, 2019 in New York City.</media:description><media:credit>Riccardo Savi/Getty Images for Concordia Summit</media:credit><media:thumbnail url="https://cdn.nextgov.com/media/img/cd/2026/03/17/031726CairncrossNG/thumb.jpg" width="138" height="83"></media:thumbnail></media:content></item><item><title>Stryker hack could set stage for more pro-Iran cyber sabotage</title><link>https://www.nextgov.com/cybersecurity/2026/03/stryker-hack-could-set-stage-more-pro-iran-cyber-sabotage/412115/</link><description>A top lawmaker said his team is in touch with the company.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">David DiMolfetta</dc:creator><pubDate>Fri, 13 Mar 2026 12:33:00 -0400</pubDate><guid>https://www.nextgov.com/cybersecurity/2026/03/stryker-hack-could-set-stage-more-pro-iran-cyber-sabotage/412115/</guid><category>Cybersecurity</category><content:encoded>&lt;![CDATA[&lt;p&gt;Cybersecurity experts say the recent hack of medical technology giant Stryker may be an early indicator of wider, pro-Iran cyber sabotage activity.&lt;/p&gt;

&lt;p&gt;Pro-Iran and pro-Palestinian hacking group Handala claimed responsibility for the cyberattack, which saw the hacking collective apparently deploy wiper malware targeting Microsoft InTune management services installed on employees&amp;rsquo; phones, including their personal devices.&lt;/p&gt;

&lt;p&gt;Pro-Iran hacking groups frequently target systems in the U.S. and Israel, as seen in late 2023 when a group defaced water treatment systems in Pennsylvania that utilized Israel-made Unitronics equipment. Stryker acquired the Israeli medical technology company OrthoSpace in 2019 and holds significant contracts with the departments of Defense and Veterans Affairs.&lt;/p&gt;

&lt;p&gt;The Unit 42 threat intelligence arm of Palo Alto Networks is &amp;ldquo;tracking an increased risk of wiper attacks related to the conflict with Iran, including multiple related incidents impacting organizations in Israel and the U.S.,&amp;rdquo; the company said in a Thursday &lt;a href="https://unit42.paloaltonetworks.com/handala-hack-wiper-attacks/"&gt;blog post&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;The reported wiper attack &amp;hellip; may represent a similar dynamic, an early signal of activity that could expand beyond a single target,&amp;rdquo; said Justin Kohler, a former Air Force analyst and chief product officer at SpecterOps. &amp;ldquo;Organizations need to assume that attackers will gain a foothold and focus on proactively shutting down the attack paths adversaries rely on to escalate privileges, move laterally and expand their impact.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;A wiper-style attack on a company like Stryker is dangerous because &amp;ldquo;it targets operational continuity rather than just data theft. In the healthcare ecosystem, outages affecting device manufacturers or support systems can ripple across hospitals, supply chains and patient care environments,&amp;rdquo; said Ensar Seker, chief information security officer at SOCRadar.&lt;/p&gt;

&lt;p&gt;The hack has challenged notions that direct &lt;a href="https://www.politico.com/news/2026/03/04/israel-iran-cyber-headquarters-00813364"&gt;physical targeting&lt;/a&gt; of apparent Iran state-funded cyberwarfare infrastructure would reduce the likelihood of any successful hacking attempts tied to the war. Pro-Iran hacking groups, until recently, have typically made overstated, unverifiable or false claims about their wartime activities.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;Organizations should take this as a reminder that destructive cyber operations are no longer limited to nation-state military targets,&amp;rdquo; Seker added.&lt;/p&gt;

&lt;p&gt;The Cybersecurity and Infrastructure Security Agency said Thursday it is &lt;a href="https://www.nextgov.com/cybersecurity/2026/03/cisa-launches-investigation-stryker-cyberattack/412079/?oref=ng-homepage-river"&gt;investigating&lt;/a&gt; the Stryker incident. The war, which broke out Feb. 28, was expected to &lt;a href="https://www.nextgov.com/defense/2026/02/strikes-iran-will-test-us-cyber-strategy-abroad-and-defenses-home/411783/?oref=ng-author-river"&gt;test the strength&lt;/a&gt; of U.S. cyberdefenses.&lt;/p&gt;

&lt;p&gt;California Rep. Eric Swalwell, the top Democrat on the House Homeland Security Committee&amp;rsquo;s cybersecurity panel, told reporters Thursday that his team was in touch with Stryker and evaluating how they&amp;rsquo;re working with federal responders, as well as how the hack may have impacted others that rely on the company&amp;rsquo;s devices.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;We want to understand from CISA &amp;hellip; what is the vulnerability status right now for companies in the United States because of Iran&amp;rsquo;s capabilities?&amp;rdquo; he said, referring to workforce reduction mechanisms put in place over the last year within the Department of Homeland Security cyber agency that have shed around a third of its staff.&lt;/p&gt;

&lt;p&gt;Complicating matters is an ongoing DHS shutdown, which has further reduced the number of working employees at CISA. Those employees are also not getting paid while the shutdown continues.&lt;/p&gt;
]]&gt;</content:encoded><media:content url="https://cdn.nextgov.com/media/img/cd/2026/03/13/031326IranNG/large.jpg" width="618" height="284"><media:credit>Alex Sholom/Getty Images</media:credit><media:thumbnail url="https://cdn.nextgov.com/media/img/cd/2026/03/13/031326IranNG/thumb.jpg" width="138" height="83"></media:thumbnail></media:content></item><item><title>FBI queries of Americans’ data under FISA 702 rose 35% in 2025</title><link>https://www.nextgov.com/cybersecurity/2026/03/fbi-queries-americans-data-under-fisa-702-rose-35-2025/412103/</link><description>The controversial spying power, which allows agencies to access foreigners’ overseas communications without a warrant, will expire in April unless Congress renews it. The White House is pushing for a clean extension.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">David DiMolfetta</dc:creator><pubDate>Thu, 12 Mar 2026 18:21:00 -0400</pubDate><guid>https://www.nextgov.com/cybersecurity/2026/03/fbi-queries-americans-data-under-fisa-702-rose-35-2025/412103/</guid><category>Cybersecurity</category><content:encoded>&lt;![CDATA[&lt;p&gt;FBI searches of U.S. person data collected using a controversial spying authority rose some 35% in 2025, according to an FBI letter to Congress that was obtained by &lt;em&gt;Nextgov/FCW&lt;/em&gt;.&lt;/p&gt;

&lt;p&gt;The bureau&amp;rsquo;s searches of Americans&amp;rsquo; data, collected under Section 702 of the Foreign Intelligence Surveillance Act, rose from 5,518 in December 2024 to 7,413 in November 2025, according to the March 11 letter signed by Ted Groves, the acting assistant director of the FBI&amp;rsquo;s Office of Congressional Affairs.&lt;/p&gt;

&lt;p&gt;The letter was sent to Sens. Chuck Grassley, R-Iowa,&amp;nbsp;and Dick Durbin, D-Ill., the top lawmakers on the Senate Judiciary Committee.&lt;/p&gt;

&lt;p&gt;The 702 authority, which permits the NSA, FBI and other agencies to access foreigners&amp;rsquo; communications overseas without a court warrant, can incidentally sweep up communications of Americans talking to targeted persons, raising major civil liberties concerns.&lt;/p&gt;

&lt;p&gt;The number of U.S. person communications gathered under 702 is often a key statistic cited by civil society organizations that&amp;nbsp;have long pushed for major reforms to the law.&lt;/p&gt;

&lt;p&gt;In 2024, only 38% of queries &amp;ldquo;returned either content or non-content 702-acquired information,&amp;rdquo; the letter says, adding that the figure dropped to 28% in 2025.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;Content&amp;rdquo; refers to the substance of the communications, such as the actual text of emails, chat messages or recorded phone calls. Conversely, &amp;ldquo;non-content&amp;rdquo; information is metadata about communications, including details like the email addresses or phone numbers used, IP addresses or the time a message was transmitted.&lt;/p&gt;

&lt;p&gt;Collected 702 communications are stored in classified databases, where analysts query them for foreign intelligence. Search terms &amp;mdash; known as &amp;ldquo;selectors&amp;rdquo; &amp;mdash; can include names, phone numbers or email addresses of targeted individuals. Analysts may query stored U.S. person data when they believe doing so is reasonably likely to return useful information for investigations.&lt;/p&gt;

&lt;p&gt;The letter was &lt;a href="https://therecord.media/new-data-shows-increase-fbi-searches-on-americans"&gt;reported earlier&lt;/a&gt; by The Record, the news unit of cyber threat intelligence firm Recorded Future.&lt;/p&gt;

&lt;p&gt;The FBI declined to comment.&lt;/p&gt;

&lt;p&gt;Section 702 is due to expire in April unless Congress acts to renew it.&lt;/p&gt;

&lt;p&gt;The Trump administration is pushing for a &lt;a href="https://www.nextgov.com/policy/2026/02/white-house-seeks-clean-extension-controversial-spying-law/411701/?oref=ng-homepage-river"&gt;clean reauthorization&lt;/a&gt; of the law. FBI Director Kash Patel and CIA Director John Ratcliffe &lt;a href="https://rollcall.com/2026/03/11/fbi-cia-chiefs-meet-with-senate-gop-over-spy-authority-renewal/"&gt;met privately&lt;/a&gt; with Senate Republicans Wednesday to push for an extension, as House Speaker Mike Johnson, R-La., said he intends to try passing a renewal the week before the authority lapses.&lt;/p&gt;

&lt;p&gt;Ratcliffe has previously told Congress that the Trump administration attributes many of its national security achievements to Section 702, according to a person familiar with the matter who spoke on the condition of anonymity to share details of private discussions about the statute.&lt;/p&gt;

&lt;p&gt;The increase outlined in the FBI letter will likely disappoint civil liberties groups, which have long pushed for a warrant requirement for searches of U.S. person data. National security officials have historically and successfully pushed back against a warrant measure in prior reauthorization cycles, though it came close to fruition during the &lt;a href="https://www.nextgov.com/policy/2024/04/biden-signs-extension-controversial-spying-program-2026/395945/"&gt;2024 reauthorization&lt;/a&gt; debate, when a House amendment failed in a 212&amp;ndash;212 vote.&lt;/p&gt;

&lt;p&gt;The FBI has acknowledged its improper use of Section 702, specifically admitting to searching for information on individuals involved in the January 6, 2021, U.S. Capitol riot, as well as people arrested during 2020 racial justice protests following the police killing of George Floyd.&lt;/p&gt;

&lt;p&gt;The law, enacted in 2008, codified parts of the once-secret Stellarwind surveillance program created under the Bush administration after the Sept. 11, 2001, attacks. In 2013, former NSA contractor Edward Snowden disclosed documents detailing how the authority was used, fueling a global debate over privacy and mass surveillance.&lt;/p&gt;
]]&gt;</content:encoded><media:content url="https://cdn.nextgov.com/media/img/cd/2026/03/12/031226FBING/large.jpg" width="618" height="284"><media:credit> J. David Ake/Getty Images</media:credit><media:thumbnail url="https://cdn.nextgov.com/media/img/cd/2026/03/12/031226FBING/thumb.jpg" width="138" height="83"></media:thumbnail></media:content></item><item><title>CISA launches investigation into Stryker cyberattack</title><link>https://www.nextgov.com/cybersecurity/2026/03/cisa-launches-investigation-stryker-cyberattack/412079/</link><description>The hack arguably represents the most significant cyber incident linked to the recent Iran war.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">David DiMolfetta</dc:creator><pubDate>Thu, 12 Mar 2026 11:00:00 -0400</pubDate><guid>https://www.nextgov.com/cybersecurity/2026/03/cisa-launches-investigation-stryker-cyberattack/412079/</guid><category>Cybersecurity</category><content:encoded>&lt;![CDATA[&lt;p&gt;The Cybersecurity and Infrastructure Security Agency has launched an investigation into the hack of medical technology giant Stryker a day after an apparent pro-Tehran hacker group sabotaged employees&amp;rsquo; devices around the world in response to the U.S.-Israel war against Iran.&lt;/p&gt;

&lt;p&gt;The worldwide cyberattack wiped employees&amp;rsquo; phones and prevented workers from accessing their computers. The logo of Handala, a pro-Iran and pro-Palestinian hacking group, reportedly appeared on employee login pages, and the hacking collective&amp;rsquo;s X account also &lt;a href="https://x.com/HPRNEW/status/2031723940360355898"&gt;claimed responsibility&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;We are working shoulder-to-shoulder with our public- and private‑sector partners as we continue to uncover relevant information and provide technical assistance for the targeted attack on Stryker, while steadfastly standing at the ready to defend our nation&amp;rsquo;s critical infrastructure,&amp;rdquo; CISA acting director Nick Andersen said in a statement to &lt;em&gt;Nextgov/FCW&lt;/em&gt;. &amp;ldquo;As with all cyber incidents, we have launched an investigation into this matter.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;Stryker is based in Michigan and has business units worldwide. The company is one of the largest medical technology organizations in the world and specializes in creating devices and equipment for use in hospitals and surgeries.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Pro-Iran hacking groups have made a habit of targeting any computer systems tied to nations deemed foreign adversaries to Tehran, especially the U.S. and Israel. In late 2023, amid the Israel-Hamas war, one hacker group &lt;a href="https://www.nextgov.com/cybersecurity/2023/12/cisa-fbi-warn-iran-backed-infrastructure-hacks/392452/"&gt;defaced&lt;/a&gt; the interfaces of water treatment systems in Pennsylvania, which had Israel-made Unitronics equipment built inside.&lt;/p&gt;

&lt;p&gt;In 2019, Stryker acquired Israeli medical technology company OrthoSpace. The company and some of its business units have major contracts with the departments of Defense and Veterans Affairs.&lt;/p&gt;

&lt;p&gt;In a &lt;a href="https://www.sec.gov/Archives/edgar/data/310764/000119312526102460/d76279d8k.htm"&gt;filing&lt;/a&gt; with the Securities and Exchange Commission, Stryker said it believes the hack is &amp;ldquo;contained&amp;rdquo; but is expected to continue causing &amp;ldquo;disruptions and limitations of access&amp;rdquo; to certain company information systems and applications supporting parts of their operations and functions.&lt;/p&gt;

&lt;p&gt;The filing acknowledges a &amp;ldquo;cybersecurity incident&amp;rdquo; that impacted &amp;ldquo;certain information technology systems of the company that has resulted in a global disruption to the company&amp;rsquo;s Microsoft environment.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;The FBI declined to comment when asked if it was investigating the hack.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;We&amp;rsquo;re in a new phase here, as this is our first public example of Iranian cyber retaliation in the course of this conflict,&amp;rdquo; said Alex Orleans, head of threat intelligence at cybersecurity firm Sublime Security. &amp;ldquo;Before, we were seeing mostly hacktivist groups or hacktivist front personas (including Handala) making unverifiable claims. Now we have an apparently concrete incident with a known Iranian intelligence front taking credit for the operation.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;&amp;ldquo;We expected to see some groups emerging from the rubble, so to speak, following the initial stage of this conflict. The nature of this incident functions as a strong leading indicator, in that it&amp;rsquo;s unlikely to have been an isolated case,&amp;rdquo; he added. &amp;ldquo;Additional Iranian state-nexus groups likely have attempted, or will attempt, similar disruptive operations in the near-term.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;On Thursday, Polish officials said Iran &lt;a href="https://www.reuters.com/world/poland-says-foiled-cyberattack-nuclear-centre-may-have-come-iran-2026-03-12/"&gt;may have attempted&lt;/a&gt; to hack into the European nation&amp;rsquo;s National Centre for Nuclear Research.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Editor&amp;#39;s note: This article has been updated to note that the FBI declined to comment.&lt;/em&gt;&lt;/p&gt;
]]&gt;</content:encoded><media:content url="https://cdn.nextgov.com/media/img/cd/2026/03/12/031226StrykerNG/large.jpg" width="618" height="284"><media:credit>Igor Golovniov/SOPA Images/LightRocket via Getty Images</media:credit><media:thumbnail url="https://cdn.nextgov.com/media/img/cd/2026/03/12/031226StrykerNG/thumb.jpg" width="138" height="83"></media:thumbnail></media:content></item><item><title>Suspected pro-Iran hacker group tied to Stryker cyberattack</title><link>https://www.nextgov.com/cybersecurity/2026/03/suspected-pro-iran-hacker-group-tied-stryker-cyberattack/412050/</link><description>“We are currently experiencing a global network disruption affecting the Windows environment. Our teams are actively working to restore systems and operations. Stryker has business continuity measures in place, and we’re committed to serve our customers,” the company said in a statement.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">David DiMolfetta</dc:creator><pubDate>Wed, 11 Mar 2026 13:17:00 -0400</pubDate><guid>https://www.nextgov.com/cybersecurity/2026/03/suspected-pro-iran-hacker-group-tied-stryker-cyberattack/412050/</guid><category>Cybersecurity</category><content:encoded>&lt;![CDATA[&lt;p&gt;A pro-Iran hacker group is believed to be behind a worldwide cyberattack affecting medical device company Stryker, wiping employees&amp;rsquo; phones and preventing workers from accessing their computers.&lt;/p&gt;

&lt;p&gt;The logo of Handala, a pro-Iran and pro-Palestinian hacking group, appeared on employee login pages, according to &lt;a href="https://www.reddit.com/r/cybersecurity/comments/1rqopq0/stryker_hit_by_handala_intune_managed_devices/"&gt;posts&lt;/a&gt; on social media site Reddit. Several purported employees described being locked out of company-linked phones and other devices. The hacking collective&amp;rsquo;s X account also &lt;a href="https://x.com/HPRNEW/status/2031723940360355898"&gt;claimed responsibility&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Stryker is based in Michigan and has business units worldwide. Many colleagues&amp;rsquo; phones have been wiped, and employees have been instructed to remove various company management features like Microsoft Intune from personal devices, according to one person on Reddit claiming to be an employee based in Australia.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;We are currently experiencing a global network disruption affecting the Windows environment. Our teams are actively working to restore systems and operations. Stryker has business continuity measures in place, and we&amp;rsquo;re committed to serve our customers,&amp;rdquo; the company said in a statement.&lt;/p&gt;

&lt;p&gt;Stryker is one of the largest medical technology companies in the world and specializes in creating devices and equipment for use in hospitals and surgeries.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;If fully confirmed, the hack would represent, arguably, the most significant cyber incident linked to the recent Iran war so far.&lt;/p&gt;

&lt;p&gt;Pro-Iran hacking groups have made a habit of targeting any computer systems tied to nations deemed foreign adversaries to Tehran, especially the U.S. and Israel. In late 2023, amid the Israel-Hamas war, one hacker group &lt;a href="https://www.nextgov.com/cybersecurity/2023/12/cisa-fbi-warn-iran-backed-infrastructure-hacks/392452/"&gt;defaced&lt;/a&gt; the interfaces of water treatment systems in Pennsylvania, which had Israeli-made Unitronics equipment built inside.&lt;/p&gt;

&lt;p&gt;In 2019, Stryker &lt;a href="https://investors.stryker.com/press-releases/news-details/2019/Stryker-acquires-OrthoSpace-Ltd/default.aspx"&gt;acquired&lt;/a&gt; Israeli medical technology company OrthoSpace. The company and some of its business units also have significant contracts with the Departments of Defense and Veterans Affairs, according to GovTribe, a federal market intelligence platform owned by &lt;em&gt;Nextgov/FCW&lt;/em&gt; parent company GovExec.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Nextgov/FCW&lt;/em&gt; has also asked the FBI and the Cybersecurity and Infrastructure Security Agency for comment.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;This incident, if confirmed, is a significant escalation because it moves from theater-linked cyber noise into disruptive, potentially destructive effects against a major U.S. medical technology firm,&amp;rdquo; said Alexander Leslie, a senior advisor at cyber threat intelligence firm Recorded Future.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;The big risk now is copycat escalation and opportunistic follow-on activity, especially if the attackers pair disruption with &amp;lsquo;proof&amp;rsquo; drops and narrative packaging to manufacture momentum and, therefore, enable influence operations,&amp;rdquo; he added.&lt;/p&gt;

&lt;p&gt;The U.S.-Israel war on Iran, launched Feb. 28, is expected to &lt;a href="https://www.nextgov.com/defense/2026/02/strikes-iran-will-test-us-cyber-strategy-abroad-and-defenses-home/411783/?oref=ng-author-river"&gt;test U.S. cyberdefenses&lt;/a&gt;. Experts for weeks have advised organizations to stay on guard for cyber retaliation from Iran-aligned groups.&lt;/p&gt;
]]&gt;</content:encoded><media:content url="https://cdn.nextgov.com/media/img/cd/2026/03/11/GettyImages_1398853253/large.jpg" width="618" height="284"><media:credit>Smith Collection/Gado / Contributor / Getty Images</media:credit><media:thumbnail url="https://cdn.nextgov.com/media/img/cd/2026/03/11/GettyImages_1398853253/thumb.jpg" width="138" height="83"></media:thumbnail></media:content></item><item><title>Russia-linked hackers appear on Iran war’s cyber front, but their impact is murky</title><link>https://www.nextgov.com/cybersecurity/2026/03/russia-linked-hackers-appear-iran-wars-cyber-front-their-impact-murky/412011/</link><description>Some experts question the significance of pro-Russia “hacktivist” groups.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">David DiMolfetta</dc:creator><pubDate>Tue, 10 Mar 2026 12:21:00 -0400</pubDate><guid>https://www.nextgov.com/cybersecurity/2026/03/russia-linked-hackers-appear-iran-wars-cyber-front-their-impact-murky/412011/</guid><category>Cybersecurity</category><content:encoded>&lt;![CDATA[&lt;p&gt;Apparent Russia-linked hacking collectives backing Iran have been observed joining the cyber activity unfolding alongside the U.S.-Israel war against Iran, though analysts have mixed views on whether their involvement represents a meaningful escalation or little more than online noise.&lt;/p&gt;

&lt;p&gt;The outlook on such &amp;ldquo;hacktivist&amp;rdquo; groups &amp;mdash; hackers who attempt to penetrate systems and steal information for political activism &amp;mdash; comes days after The Washington Post reported that Russia is &lt;a href="https://www.washingtonpost.com/national-security/2026/03/06/russia-iran-intelligence-us-targets/"&gt;supplying Iran&lt;/a&gt; with intelligence to help target U.S. forces in the Middle East and adds another dimension to the already &lt;a href="https://www.defenseone.com/threats/2026/03/fake-dod-memo-about-compromised-apps-shows-swift-spread-deceptive-messaging/411790/"&gt;complex cyber and information environment&lt;/a&gt; surrounding the war.&lt;/p&gt;

&lt;p&gt;One well-known pro-Russia group dubbed &amp;ldquo;NoName057(16)&amp;rdquo; recently claimed massive distributed denial-of-service attacks against Israeli defense contractors and also claimed to have gained full access to the human-machine interfaces of Israeli water management systems, said Kathryn Raines, a cyber threat intelligence team lead at cybersecurity firm Flashpoint. But company analysts have not verified these claims, she said.&lt;/p&gt;

&lt;p&gt;Distributed denial-of-service hacks, known colloquially as &amp;ldquo;DDoS&amp;rdquo; attacks, overwhelm websites with large amounts of artificial internet traffic to stop legitimate users from accessing them.&lt;/p&gt;

&lt;p&gt;CrowdStrike has similarly observed a surge in pro-Iran hacktivists with ties to Russia. In the first few days after the war broke out on Feb. 28, one Russia-aligned hacktivist group the company dubs &amp;ldquo;Z-Pentest&amp;rdquo; claimed responsibility for compromising several U.S.-based entities, said Adam Meyers, the company&amp;rsquo;s head of counter adversary operations.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Those claims are also unverified, though &amp;ldquo;Western organizations should continue to remain on high alert for potential cyber response as the conflict continues and activity may move beyond hacktivism and into destructive operations,&amp;rdquo; he said.&lt;/p&gt;

&lt;p&gt;The United States has long supplied Ukraine with intelligence and equipment to strike Russian targets within its borders. Now, as the war unfolds in Iran, Moscow could be seizing its own opportunity for retaliation by aiding Tehran.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;Russia is comfortable providing some proxy support to Iran, or at least taking advantage of an unstable situation,&amp;rdquo; Cynthia Kaiser, a former deputy director at the FBI&amp;rsquo;s Cyber Division, said in a &lt;a href="https://www.linkedin.com/my-items/saved-posts/"&gt;LinkedIn post&lt;/a&gt; this weekend. &amp;ldquo;Expect exaggeration, but don&amp;#39;t dismiss the underlying access. These groups regularly inflate the impact of their attacks for media attention. But they have caused real physical damage to critical infrastructure. Calling their bluff shouldn&amp;#39;t mean ignoring the threat.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;&amp;ldquo;Russia has a variety of partner engagements with Iran that could prompt Moscow to get involved in the conflict, particularly if Russia perceives that U.S. military operations dragging out would further pull the White House&amp;rsquo;s focus from Ukraine,&amp;rdquo; said Justin Sherman, founder and CEO of Global Cyber Strategies, a Washington, D.C.-based research and advisory firm.&lt;/p&gt;

&lt;p&gt;The Kremlin&amp;rsquo;s vast and complex cyber ecosystem allows it to leverage state elements, hired or coerced cybercriminals and patriotic hackers encouraged by propaganda to pursue its goals, Sherman said, explaining that &amp;ldquo;one of the benefits of Russia&amp;rsquo;s cyber web for the state is how the Kremlin can pick and choose its actors and capability sets as it pleases, depending on its needs.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;In a recent case, Russian state-backed groups initiated a massive global campaign targeting the Signal and WhatsApp accounts of officials, military personnel and civil servants, Dutch intelligence &lt;a href="https://english.aivd.nl/latest/news/2026/03/09/russia-targets-signal-and-whatsapp-accounts-in-cyber-campaign"&gt;said Monday&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;But Sherman said that attributing Russian-origin cyber operations is complex, and that analysts should try to examine which parts of Vladimir Putin&amp;rsquo;s government may have authorized an operation to better understand how Moscow would be aiding Iran in cyberspace.&lt;/p&gt;

&lt;p&gt;Some are skeptical that Russia sharing targeting intelligence would translate directly into cyber support for Tehran.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;Russia providing intelligence assistance to the Iranian government to support kinetic strikes, and the idea of Russian cyber actors as implied by the conventional use of the phrase &amp;mdash; i.e., those with a nexus to the Russian state &amp;mdash; &amp;lsquo;joining the cyber aspect of this conflict&amp;rsquo; are two very different things,&amp;rdquo; said Alex Orleans, a former National Security Council contractor and head of threat intelligence at Sublime Security.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;I have not encountered Russian APTs inserting themselves into a conflict to support a third-party and I&amp;rsquo;d be surprised if they did now,&amp;rdquo; he said, referring to &amp;ldquo;advanced persistent threat&amp;rdquo; groups that are typically well-resourced, highly skilled and backed by a nation-state.&lt;/p&gt;

&lt;p&gt;Other analysts have not publicly attributed any hacktivist activity to a particular nation.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;While we have observed some initial hacktivist groups supporting the Iranian regime, these activities are in the very early stages. There is currently no clear indication that this is being directed by a state actor like Russia or Iran, and it remains difficult to verify,&amp;rdquo; said John Fokker, vice president of threat intelligence at Trellix. &amp;ldquo;That said, in any geopolitical conflict, it is common practice for involved countries to provide aid in various forms.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;Iran&amp;rsquo;s cyber capabilities have likely diminished in recent days, said Dave DeWalt, CEO of NightDragon, a venture capital firm that manages a portfolio of cybersecurity companies.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&amp;ldquo;We&amp;rsquo;ve been monitoring almost every actor and every indicator of compromise that we possibly can, and we&amp;#39;ve seen next to zero activity &amp;hellip; and that&amp;rsquo;s largely because we believe that most of their cyber operations have been dismantled physically,&amp;rdquo; he said in an interview.&lt;/p&gt;

&lt;p&gt;Israel&amp;nbsp;said last week it &lt;a href="https://www.politico.com/news/2026/03/04/israel-iran-cyber-headquarters-00813364"&gt;destroyed&lt;/a&gt; Iran&amp;rsquo;s cyberwarfare headquarters, though it&amp;rsquo;s not immediately clear how much effect that&amp;rsquo;s had on its cyber operations.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;We&amp;rsquo;ve seen little activity from [Iran] globally, that doesn&amp;rsquo;t mean that it&amp;rsquo;s completely dismantled,&amp;rdquo; DeWalt said. &amp;ldquo;I don&amp;rsquo;t have full confirmation, but I would tell you it certainly looks like no other case I&amp;#39;ve seen in 20 years, where we&amp;rsquo;ve seen such silence in the digital world from [Iran].&amp;rdquo;&lt;/p&gt;

&lt;p&gt;Asked about whether China and Russia are sharing capabilities with Iran at this point, he said those nations may be keeping their distance, but there&amp;rsquo;s possible sharing of satellite, electronic warfare and radar-jamming services. &amp;ldquo;I would not be surprised at all,&amp;rdquo; he said.&lt;/p&gt;
]]&gt;</content:encoded><media:content url="https://cdn.nextgov.com/media/img/cd/2026/03/10/031026RussiaNG/large.jpg" width="618" height="284"><media:credit>Dragon Claws/Getty Images</media:credit><media:thumbnail url="https://cdn.nextgov.com/media/img/cd/2026/03/10/031026RussiaNG/thumb.jpg" width="138" height="83"></media:thumbnail></media:content></item></channel></rss>