Cybersecurity News Hub
No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Security
  • Data Breach
  • Mobile Security
  • Videos
  • Advertise
  • Privacy Policy
  • Contact Us
  • Home
  • Cyber Crime
  • Cyber Security
  • Data Breach
  • Mobile Security
  • Videos
  • Advertise
  • Privacy Policy
  • Contact Us
No Result
View All Result
Cybersecurity News Hub
No Result
View All Result
Home Cyber Security

News brief: U.S. cyberdefenses take aim at foreign threats

Cyberinchief by Cyberinchief
November 24, 2025
Reading Time: 3 mins read
0
News brief: U.S. cyberdefenses take aim at foreign threats


U.S. cyberdefenders said they are stepping up efforts to counter foreign attacks that target American citizens and companies. In recent days, the Trump administration has taken several actions against groups it blames for cyber schemes and has outlined a strategy for a more assertive and better coordinated deterrence strategy.

Decisions from Washington this week struck some as mixed messages, however. The Federal Communications Commission voted 2-1 to scrap cybersecurity regulations the Biden administration placed on U.S. telecom providers, a move that Senate Democrats said would weaken defenses against attacks, such as the 2024 Salt Typhoon attack attributed to China-backed threat actors. Leaders at CISA, meanwhile, said they plan to make hiring a priority in 2026. Layoffs and voluntary departures have significantly affected CISA this year. Security efforts, the agency’s acting director wrote in a recent memo to staff, are “hampered by an approximately 40% vacancy rate across key mission areas.”

This week’s featured news examines a new U.S. cybersecurity strategy, the creation of the Scam Center Strike Force and sanctions imposed on a Russian hosting company by U.S., U.K. and Australian governments.

U.S. strategy strives to deter cyberattacks from Russia and China

National Cyber Director Sean Cairncross outlined a new cyber strategy at the Aspen Cyber Summit, emphasizing a coordinated approach with six pillars of activity. Key focuses include countering foreign adversaries, such as Russia, China and international ransomware gangs, by imposing costs for cyberattacks, as current deterrence efforts have failed while threats become more aggressive. The aim, he said, is to make U.S. responses significant enough to deter foreign actors from continuing their malicious behavior.

The strategy prioritizes partnering with the private sector to identify and eliminate regulations Cairncross characterized as “burdensome,” enabling companies to redirect resources toward protecting critical assets.

Another pillar involves growing the U.S. cyber workforce through a new initiative that unites businesses, venture capitalists and educational institutions, including the creation of a cybersecurity academy. While these priorities mirror the Biden administration’s agenda, specific action items and implementation details remain unclear, with Cairncross promising a concise statement of intent and policy.

Read the full story by Eric Geller on Cybersecurity Dive.

U.S. government takes aim at foreign scammers

The U.S. government has launched a collaborative Scam Center Strike Force involving representatives from the Justice, Treasury, State and Homeland Security departments to combat cybercriminal syndicates operating from Burma, Cambodia and Laos. These scam centers, primarily run by transnational Chinese organized crime groups, stole more than $9 billion from Americans in 2024 through romance scams and pig-butchering scams. The Strike Force aims to identify perpetrators, charge leaders, seize stolen funds and shut down infrastructure.

RELATED POSTS

How Russia’s Largest Private University is Linked to a $25M Essay Mill – Krebs on Security

Malicious Go Packages Impersonate Google’s UUID Library to Steal Sensitive Data

Warning: React2Shell vulnerability already being exploited by threat actors

The syndicates generate tens of billions of dollars annually, with profits reportedly accounting for 40% of Cambodia’s GDP in 2024. The Strike Force initiative includes visa restrictions, rewards up to $25 million for high-level figures, sanctions and partnerships with private companies, including Meta and Microsoft, to disrupt these criminal networks.

Read full article by Robert Lemos on Dark Reading.

U.S. and allies sanction Russian company over hosting allegations

The U.S., Australia and the U.K. have sanctioned Russian company Media Land and its leaders for providing so-called “bulletproof hosting services” to LockBit and BlackSuit, two of the most prominent ransomware gangs. The Western nations accused the company of supplying infrastructure for cyberattacks against U.S. critical infrastructure and of aiding in DDoS attacks. The sanctions targeted Media Land’s general director, financial manager, payment collector and three sister companies.

The nations also sanctioned Aeza Group’s U.K. front company, Hypercore, which helped the previously sanctioned hosting provider evade restrictions, along with its director and subsidiaries in Serbia and Uzbekistan.

Treasury officials emphasized that this trilateral action demonstrates a collective commitment to combating cybercrime, while CISA released guidance to help network defenders mitigate attacks from bulletproof hosting services.

Read the full article by Eric Geller on Cybersecurity Dive.

Buy JNews
ADVERTISEMENT

Editor’s note: An editor used AI tools to aid in the generation of this news brief. Our expert editors always review and edit content before publishing.

Phil Sweeney is an industry editor and writer focused on cybersecurity topics.



Source link

Tags: AimcyberdefensesforeignNewsthreatsU.S
ShareTweetPin
Cyberinchief

Cyberinchief

Related Posts

How Russia’s Largest Private University is Linked to a $25M Essay Mill – Krebs on Security
Cyber Security

How Russia’s Largest Private University is Linked to a $25M Essay Mill – Krebs on Security

December 8, 2025
Malicious Go Packages Impersonate Google’s UUID Library to Steal Sensitive Data
Cyber Security

Malicious Go Packages Impersonate Google’s UUID Library to Steal Sensitive Data

December 8, 2025
Warning: React2Shell vulnerability already being exploited by threat actors
Cyber Security

Warning: React2Shell vulnerability already being exploited by threat actors

December 7, 2025
News brief: RCE flaws persist as top cybersecurity threat
Cyber Security

News brief: RCE flaws persist as top cybersecurity threat

December 7, 2025
Barts Health NHS Confirms Cl0p Ransomware Behind Data Breach – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Cyber Security

Barts Health NHS Confirms Cl0p Ransomware Behind Data Breach – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More

December 6, 2025
GOLD BLADE’s strategic evolution – Sophos News
Cyber Security

GOLD BLADE’s strategic evolution – Sophos News

December 6, 2025
Next Post
Aise Fraud Calls Se Kaise Bache – Scam Call Exposed #shorts #shortvideo

Aise Fraud Calls Se Kaise Bache - Scam Call Exposed #shorts #shortvideo

CW3551 – Data & Information Security | Unitwise Important Questions | Nov/Dec 2025 | AuR-2021

CW3551 – Data & Information Security | Unitwise Important Questions | Nov/Dec 2025 | AuR-2021

Recommended Stories

How to Change the Directory in Command Prompt

How to Change the Directory in Command Prompt

November 4, 2025
Cyber Fraud: साइबर ठगों ने बदली अपनी तरकीब…एक झटके में कर सकते हैं आपका अकाउंट खाली | Podcast

Cyber Fraud: साइबर ठगों ने बदली अपनी तरकीब…एक झटके में कर सकते हैं आपका अकाउंट खाली | Podcast

December 6, 2025
Getting started with IaC workflows in your environment

Getting started with IaC workflows in your environment

November 22, 2025

Popular Stories

  • Allianz Life – 1,115,061 breached accounts

    Allianz Life – 1,115,061 breached accounts

    0 shares
    Share 0 Tweet 0
  • Prosper – 17,605,276 breached accounts

    0 shares
    Share 0 Tweet 0
  • साइबर अपराध | Illegal Payment Gateway & Rented Bank Accounts | MAMTA CHOPRA

    0 shares
    Share 0 Tweet 0
  • Miljödata – 870,108 breached accounts

    0 shares
    Share 0 Tweet 0
  • Snowflake Data Breach Explained: Lessons and Protection Strategies

    0 shares
    Share 0 Tweet 0

Search

No Result
View All Result

Recent Posts

  • Top 5 Mobile App Security Threats Leaders Must Prepare for in 2026
  • Microsoft On Women In Cybersecurity At Black Hat Europe 2025 In London
  • Polisi kembali ungkap sindikat Cyber Crime kejahatan Internasional – iNews Malam 09/03

Categories

  • Cyber Crime
  • Cyber Security
  • Data Breach
  • Mobile Security
  • Videos

Newsletter

© 2025 All rights reserved by cyberinchief.com

No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Security
  • Data Breach
  • Mobile Security
  • Videos
  • Advertise
  • Privacy Policy
  • Contact Us

© 2025 All rights reserved by cyberinchief.com

Newsletter Signup

Subscribe to our weekly newsletter below and never miss the latest News.

Enter your email address

Thanks, I’m not interested