Iran, cyber
Digest more
President Donald Trump has finally unveiled his strategy to combat cybersecurity attacks against the U.S. with a more aggressive approach against countries such as Russia and China
Axios on MSN
Trump calls for more offensive cyber operations, streamlined regulations in new cyber strategy
President Trump on Friday unveiled a cybersecurity strategy calling for modernizing federal systems, expanding offensive and defensive cyber operations and streamlining regulations. Why it matters: The seven-page plan is designed to set the administration's cyber policy for the next three years.
Apparent Russia-linked hacking collectives backing Iran have been observed joining the cyber activity unfolding alongside the U.S.-Israel war against Iran, though analysts have mixed views on whether their involvement represents a meaningful escalation or little more than online noise.
After U.S. and Israeli forces started bombing Iran, reports say cyber operations have disrupted communications, supported surveillance activities, and have been used in psychological operations.
The Senate has confirmed President Donald Trump’s pick to lead Cyber Command and the National Security Agency in a dual-hatted capacity, giving the signals intelligence and hacking titans their first permanent leader in almost a year.
The digital combatant command was among the “first movers” in the operation against Iran, Joint Chiefs Chair Dan Caine said.
In his National Cybersecurity Strategy, President Trump sought an expanded role for private firms in cyberwarfare. He did not take on China or Russia in the document.
"Russian state hackers are engaged in a large-scale global cyber campaign to gain access to Signal and WhatsApp accounts belonging to dignitaries, military personnel and civil servants," Dutch
Coordinated space and cyber operations left Iran "without the ability to see, coordinate or respond effectively," Gen. Caine said.
Russia's direct losses as a result of Ukrainian offensive cyber operations in 2025 amounted to $220 million. — Ukrinform.
Tool sprawl is eroding cloud security. Enterprises must rethink identity, access, and operations through a unified, cloud-first lens.