Thursday , April 24 2025

FBI Focuses on Cybersecurity With $90M Budget Request

The FBI is requesting more than $63 million in new funding to fight cyber threats in 2024.

On the docket was foreign intelligence threats, violent crime, human trafficking, and more, but the director wasted no time getting to cyber. Barely 20 seconds into his opening statement, he launched into the problem of cyber threats to America, using China as a measuring stick.

SonicWall patched SSLVPN Vuln Allowing Firewall Crashing

SonicWall has revealed a vulnerability in its SonicOS SSLVPN Virtual Office interface that could let remote attackers crash firewall appliances....
Read More
SonicWall patched SSLVPN Vuln Allowing Firewall Crashing

GitLab Releases Security Update For Multiple Vulns

GitLab has announced a security advisory urging users to upgrade their self-managed installations right away. Versions 17.11.1, 17.10.5, and 17.9.7...
Read More
GitLab Releases Security Update For Multiple Vulns

ISPAB president “whatsapp” got hacked via phishing link

Imdadul Haque, the president of Internet Service Provider of Bangladesh (ISPAB) said, I automatically got back my WhatsApp account. What...
Read More
ISPAB president “whatsapp” got hacked via phishing link

Zyxel released patches 2 vulns in its USG FLEX H series firewalls

Zyxel Networks has issued critical security patches for two high-severity vulnerabilities in its USG FLEX H series firewalls. These flaws...
Read More
Zyxel released patches 2 vulns in its USG FLEX H series firewalls

South Korea’s largest SK Telecom Hit by Malware: SIM-related info leaked

South Korea's largest mobile operator, SK Telecom, is warning that a malware infection allowed threat actors to access sensitive USIM-related...
Read More
South Korea’s largest SK Telecom Hit by Malware: SIM-related info leaked

ChatGPT Develops Exploit for CVEs Before Public PoCs Share

Security researcher Matt Keeley showed that artificial intelligence can now develop working exploits for critical vulnerabilities before public proof-of-concept (PoC)...
Read More
ChatGPT Develops Exploit for CVEs Before Public PoCs Share

TP-Link Router Vulns Allow to Execute Malicious SQL Commands

Several vulnerabilities have been found in TP-Link routers, exposing users to serious security risks from SQL injection flaws in their...
Read More
TP-Link Router Vulns Allow to Execute Malicious SQL Commands

SSL.com’s domain validation system’s bug found: Hacker exploited

SSL.com has revealed a major security flaw in its domain validation system, which could enable attackers to acquire fake SSL...
Read More
SSL.com’s domain validation system’s bug found: Hacker exploited

Amazon Follows Microsoft’s Lead, Halts Some Data Center Deals

Amazon has paused some data center lease negotiations for its cloud division, particularly in international markets, according to Wells Fargo...
Read More
Amazon Follows Microsoft’s Lead, Halts Some Data Center Deals

Hackers Exploit Zoom’s Remote Control Feature for System Access

ELUSIVE COMET is a threat actor conducting a sophisticated attack campaign that uses Zoom's remote control feature to access victims'...
Read More
Hackers Exploit Zoom’s Remote Control Feature for System Access

“A key part of the Chinese government’s multi-pronged strategy to lie, cheat, and steal their way to surpassing us as the global superpower is cyber,” Wray told the committee. “To give you a sense of what we’re up against, if each one of the FBI’s cyber agents and intel analysts focused exclusively on the China threat, Chinese hackers would still outnumber FBI Cyber personnel by at least 50 to 1.”

To help even the odds, the FBI request includes an additional 192 positions — 31 special agents, 8 intelligence analysts, and 153 other staff — plus $63.4 million “to enhance cyber information-sharing abilities and increase cyber tools and capacities,” according to Wray’s statement for the record. In addition, the request includes 4 jobs and an additional $27.2 million “to help protect internal FBI networks.”

Will 90 million in new funding enable the FBI to make a meaningful dent in the worlds of cybercrime and nation-state APTs?

Can the FBI Help Clean Up Cyberspace?

The FBI has “a lot of very interesting capabilities and creative approaches to cyber,” says Rex Booth, CISO at SailPoint. He witnessed the agency’s work up close in his former capacities as chief of cyber threat analysis and senior advisor for CISA, as well as director of stakeholder engagement for the office of the national cyber director at the White House. “A lot of those impacts aren’t going to be publicly visible,” he admits, due to the nature of how government agencies operate, “but they’re real.”

And, increasingly, they are publicly visible. In recent months, the federal government has made headlines with takedowns of some of the world’s biggest cybercrime rings and most dangerous threat actors.

“The FBI’s ongoing efforts have produced profound impacts in the last few years,” says Steve Stone, head of Rubrik Zero Labs. In light of that, $63 million feels like a drop in the bucket. “This is a handful of intrusions when it comes down to victim costs,” he says, “and would likely produce far more than it would cost to fund.”

Booth agrees. “The FBI is uniquely positioned to look into US-based cloud infrastructure that is increasingly used by adversaries to hide from the NSA. We need a well-funded FBI to cover this Achilles heel.”

However, Booth points out, it’s not all about the money.

The Role of the Private Sector

“The FBI is challenged to meet the needs of cyber victims,” Booth says, citing how “their approach to incident response can be so disruptive to victim organizations that victims are reluctant to call in the first place. Funding will help, but victims need an approach that fosters recovery rather than treating their networks and systems like a crime scene for evidence collection.”

Just as the FBI will have to learn to deal better with targeted organizations, so too will targeted organizations need to learn to help the FBI.

“As a law enforcement agency, the FBI culturally gravitates towards putting bad guys behind bars,” Booth explains. “To make that happen, they need evidence. Enterprises can help by collecting the right kinds of records, logs, and artifacts that investigators need — and by proactively making them available when they come across something interesting.”

Wray emphasized the importance of collaboration in his statement, noting how “we have been putting a lot of energy and resources into all those partnerships, especially with the private sector.”

“The more the private sector can help,” Stone concludes, “the better the DoJ and FBI can resource and take actions against bad actors.”

Check Also

Australian Cyber Security Centre Alert for Fortinet Products

The Australian Cyber Security Centre (ACSC) has alerted technical users in both private and public …

Leave a Reply

Your email address will not be published. Required fields are marked *