Cybersecurity News that Matters

Cybersecurity News that Matters

Daily briefing: Trump revenge, CVE program, North Korea’s drone hack

Illustration by Areum Hwang, The Readable

by Dain Oh

Apr. 16, 2025
8:56 PM GMT+9

Daily Briefing is a curated listicle made available by The Readable. We select a handful of significant stories worth sharing with our readers and present them in an easy-to-read, accessible format.


1. Trump revenge tour targets cyber leaders, elections – Krebs on Security

In April 2025, the Trump administration revoked the security clearance of former Cybersecurity and Infrastructure Security Agency (CISA) director Chris Krebs and opened a U.S. Department of Justice (DOJ) investigation into his tenure. Revoking a security clearance restricts access to classified information and is considered a severe punitive measure that can end careers and signal political retaliation.

The White House accused Krebs of abusing his authority and improperly sharing classified information. Other professionals at SentinelOne, where Krebs currently works, also had their clearances suspended.

Simultaneously, CISA is undergoing major budget cuts, with plans to eliminate around 1,300 positions. The administration is also working to remove civil service protections for a large portion of CISA staff, prompting concerns about politically motivated dismissals.

2. Funding expires for key cyber vulnerability database – Krebs on Security

The Common Vulnerabilities and Exposures (CVE) program—an essential system for cataloging software and hardware flaws—is at risk of shutting down as its federal funding expires on April 16, 2025. Without renewal, the nonprofit MITRE Corporation, which manages the program, warns that new CVE entries will stop, disrupting global vulnerability tracking and response.

Traditionally funded by the Department of Homeland Security (DHS), the CVE system provides standardized identifiers for software and hardware vulnerabilities, helping tools and teams speak a common language. These identifiers are essential for cybersecurity professionals to track, assess, and remediate security flaws effectively.

Experts warn its loss could hinder patching efforts and heighten the risk of exploitation by threat actors. Although the CVE website will remain online, the lack of updates could result in critical threat data going unshared.

3. South Korea’s cyber chief warns of North Korean cyberattacks targeting drone technology – Munhwa Ilbo

North Korea is intensifying its cyberattacks, targeting South Korean drone and medical device firms to steal strategic technologies. Yoon Oh-jun, Third Deputy Director of South Korea’s National Intelligence Service (NIS), revealed that these attacks are part of Pyongyang’s push to enhance its military capabilities and domestic stability—especially after Kim Jong-un declared 2024 the “Year of the Health Revolution.”

Since 2016, North Korean hackers have stolen an estimated $4.3 billion in cryptocurrency—key funding for the regime’s economy and weapons programs. Their tactics have grown increasingly sophisticated, involving fake companies, decentralized finance exploits, and foreign IT operatives posing as freelancers.

The NIS also warns of growing cyber collaboration between North Korea and Russia, potentially involving shared hacking tools and laundering methods. In addition, North Korean hackers are increasingly targeting ordinary users by posing as employers or service providers to spread malware and steal cryptocurrency wallets.

4. Climate activists were hacked. There was a link between victims and an alleged attacker – NPR

U.S. prosecutors allege that a fossil fuel lobbyist led a hacking campaign to sabotage climate lawsuits by targeting environmental activists. The operation, starting around 2016, reportedly involved mercenary hackers and was commissioned by public affairs firm DCI Group, then working for ExxonMobil.

At the center of the case is Israeli investigator Amit Forlit, who faces extradition to the U.S. over his alleged role. Court records show DCI Group was also consulting for a progressive nonprofit at the time, raising conflict-of-interest concerns.

Stolen data was allegedly used to discredit activists and derail climate litigation. The case highlights fears over cyberespionage being weaponized to protect corporate interests and suppress environmental accountability.

5. NIST updates privacy framework, tying it to recent cybersecurity guidelines – NIST

The National Institute of Standards and Technology (NIST) has released a draft update to its Privacy Framework (Version 1.1) to better align with the new Cybersecurity Framework (CSF) 2.0 and address growing privacy risks, particularly from AI technologies.

Key changes include updates to the “Govern” and “Protect” functions and a new section focused on AI-related privacy threats. NIST also moved its usage guidance to an interactive online FAQ for easier access and faster updates.

Public comments on the draft are open until June 13, 2025, as NIST aims to ensure the Framework stays practical and relevant in an increasingly complex data environment.


Editor’s note: Each item in this briefing was initially summarized or translated by ChatGPT-4o based on the author’s specific instructions, which included news judgment, fact-checking, and thorough editing before publication.

Subscription

Subscribe to our newsletter for the latest insights and trends. Tailor your subscription to fit your interests:

By subscribing, you agree to our Privacy Policy. We respect your privacy and are committed to protecting your personal data. Your email address will only be used to send you the information you have requested, and you can unsubscribe at any time through the link provided in our emails.

  • Dain Oh
    : Author

    Dain Oh is a distinguished journalist based in South Korea, recognized for her exceptional contributions to the field. As the founder and editor-in-chief of The Readable, she has demonstrated her expe...

    View all posts
Stay Ahead with The Readable's Cybersecurity Insights