Plane Carrying Kentucky Governor Almost Shot DownToday’s Washington Post reports that the top general at the North American Aerospace Defense Command came close to giving an order for an F-16 fighter to shoot down an unidentified plane that turned out to be carrying the governor of Kentucky to former president Ronald Reagan’s funeral last month. According to the report, the close call caused officials to reassess safeguards for the airspace around Washington and prompted calls to expand the no-fly zone beyond its current 16-mile radius.Full Story in the Washington PostStolen Explosives RecoveredThe Seattle Post-Intelligencer reports that 200 pounds of explosives and bomb-making hardware stolen from a storage locker used by two public safety agencies have been recovered from a stolen van. According to the report, the items were stolen sometime over the July 4 weekend from storage magazines in a depot used by the San Francisco Police Department and the San Mateo County Sheriff’s office.Full Story in the Seattle Post-Intelligencer Return of the Bagle WormComputerworld reports that antivirus software companies are warning customers that new editions of the Bagle family of e-mail worms are spreading on the Internet and depositing copies of the worm’s source code on computers they infect. According to the report, the new Bagle versions are almost identical to each other and very similar to earlier variants, which spread through shared file folders and in e-mail messages carrying the worm as an attachment.Full Story in Computerworld Related content feature Top cybersecurity M&A deals for 2023 Fears of recession, rising interest rates, mass tech layoffs, and conservative spending trends are likely to make dealmakers cautious, but an ever-increasing need to defend against bigger and faster attacks will likely keep M&A activity steady in By CSO Staff Sep 22, 2023 24 mins Mergers and Acquisitions Mergers and Acquisitions Mergers and Acquisitions brandpost Unmasking ransomware threat clusters: Why it matters to defenders Similar patterns of behavior among ransomware treat groups can help security teams better understand and prepare for attacks By Joan Goodchild Sep 21, 2023 3 mins Cybercrime news analysis China’s offensive cyber operations support “soft power” agenda in Africa Researchers track Chinese cyber espionage intrusions targeting African industrial sectors. By Michael Hill Sep 21, 2023 5 mins Advanced Persistent Threats Cyberattacks Critical Infrastructure brandpost Proactive OT security requires visibility + prevention You cannot protect your operation by simply watching and waiting. It is essential to have a defense-in-depth approach. By Austen Byers Sep 21, 2023 4 mins Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe