"These incidents involve the intentional use of deceptive or illegal practices to fraudulently obtain money, assets, or information from individuals or institutions, and include actions carried out over cyber channels."
Retired Army Special Forces officer Mike Nelson criticized Hegseth's rhetoric, stating, 'That's a necessary end to achieve goals through military force - you have to kill people to achieve them. That's not the end. It's a weird obsession with death for the sake of it.'
Sommers was arrested Thursday in Pittsfield, where authorities say he had been living under the victim's identity at Soldier On, a facility that provides transitional housing for military veterans. According to charging documents, Sommers allegedly began impersonating a real U.S. Army veteran as early as 1994. That veteran served honorably in the Army from 1979 to 1982.
According to the justice department, Aurelio Luis Perez-Lugones illegally provided sensitive and secret information related to national defense to a reporter who it says then wrote and published at least five articles using it. The indictment was not immediately available, and a press release announcing five charges against Perez-Lugones of mishandling classified information did not identify the journalist or their employer.
Sensitive details of around 4,500 ICE and Border Patrol employees-including almost 2,000 agents working in frontline enforcement-have allegedly been released by a Department of Homeland Security whistleblower following last week's fatal shooting of Renee Nicole Good. The Jan. 7 killing of the mother by ICE agent Jonathan Ross in Minneapolis, Minnesota, has sparked nationwide protests and worldwide outrage, including among some DHS employees.
A man falsely claiming to be an FBI agent showed up to a federal jail in New York City on Wednesday night and told officers he had a court order to release Luigi Mangione, authorities said. Mark Anderson, 36, of Mankato, Minnesota, was arrested and charged with impersonating an FBI agent in a foiled bid to free Mangione from the Metropolitan Detention Center,
Over the past year, waves of federal layoffs have left thousands of government employees and contractor clients suddenly out of work. For foreign intelligence services, that disruption has opened new opportunities. With more former U.S. officials seeking employment or freelance work - often in specialized national security fields - adversaries, namely China, have stepped in, posing as consulting firms, research groups and recruiters.
The email seen by at least some customers of the Emma email platform was a phishing scam. Hackers hoped to inspire instant panic with the words, 'As part of our commitment to supporting U.S. Immigration and Customs Enforcement (ICE), we will be adding a Support ICE donation button to the footer of every email sent through our platform.'
Impostors are impersonating our reporters to extract sensitive business information from unsuspecting targets. In several cases we know about, scammers have adopted the identity of actual staff members, crafting what looks like a standard media inquiry about a company's products and requesting an introductory call.
Peter Williams, a former executive at U.S. defense contractor L3Harris, was sentenced on Tuesday to 87 months in prison for leaking his former company's trade secrets in exchange for $1.3 million in crypto between 2022 and 2025. Williams sold the exploits to Operation Zero, which the U.S. government calls 'one of the world's most nefarious exploit brokers.'
Peter Williams stole a U.S. defense contractor's trade secrets about highly sensitive cyber capabilities and sold them to a broker whose clients include the Russian government, putting our national security and countless potential victims at risk.
The report catalogues a relentless barrage of cyber operations, most by state-sponsored groups, against EU and US industrial supply chains. It suggests the range of targets for these hackers has grown to encompass the broader industrial base of the US and Europe from German aerospace firms to UK carmakers. State-linked hackers have long targeted the global defence industry, but Luke McNamara, an analyst for Google's threat intelligence group, said they had seen more personalised and direct to individual targeting of employees.
Security researchers have discovered a live infection in which an infostealer has stolen the configuration files of an OpenClaw AI agent. The attack was carried out through a broad file-theft routine that automatically searched for sensitive file extensions and specific folder names, including .openclaw. The malware was not specifically designed for OpenClaw; it arose by chance from capturing the operational context of the victim's AI assistant. What makes the attack particularly serious is the combination of stolen data.
Near-identical password reuse occurs when users make small, predictable changes to an existing password rather than creating a completely new one. While these changes satisfy formal password rules, they do little to reduce real-world exposure. Here are some classic examples: Adding or changing a number Summer2023! → Summer2024! Appending a character Swapping symbols or capitalization Welcome! → Welcome? AdminPass → adminpass Another common scenario occurs when organizations issue a standard starter password to new employees, and instead of replacing it entirely, users make incremental changes over time to remain compliant.
Commanders and security personnel review posts to identify potential threats to operational security, assess character and judgment, and ensure service members uphold the standards expected of those in uniform. Understanding what triggers military scrutiny can help service members navigate social media responsibly while avoiding career-damaging mistakes. Military regulations explicitly permit commanders to review publicly accessible social media accounts when mission requirements or security concerns justify it.