Lulz Security, the hacker group that earlier attacked websites of the Central Intelligence Agency and Sony, released Wednesday information that it claimed was hacked from the computers of an Arizona law enforcement agency. Lulz Security, the hacker group that earlier attacked websites of the Central Intelligence Agency and Sony, released Wednesday information that it claimed was hacked from the computers of an Arizona law enforcement agency.LulzSec said it was releasing hundreds of private intelligence bulletins, training manuals, personal e-mail correspondence, names, phone numbers, addresses and passwords belonging to Arizona law enforcement. The group said it was targeting AZDPS (Arizona Department of Public Safety), as it is opposed to the State’s SB 1070 immigration legislation, and its “racial profiling anti-immigrant police state”. The website of the Arizona Department of Public Safety was not accessible late Thursday. The agency could not be immediately reached for comment. LulzSec and another hacker group Anonymous came together recently to target government and related agencies in Operation Anti-Security. “Top priority is to steal and leak any classified government information, including email spools and documentation,” LulzSec said in a statement. “Prime targets are banks and other high-ranking establishments,” it added.LulzSec appears to be undaunted despite the arrest in the U.K. this week of a man who was allegedly involved with the group. The hacker group said the man, Ryan Cleary, was not a leader, but merely operated an Internet Relay Chat (IRC) server used by the group. The group soon after invited people on Twitter to join its Operation Anti-Security. By Wednesday it claimed to have attacked two Brazilian government sites, and the Connecticut chapter of Infragard, an organization affiliated to the U.S. Federal Bureau of Investigation. These sites were not accessible on Thursday. John Ribeiro covers outsourcing and general technology breaking news from India for The IDG News Service. Follow John on Twitter at @Johnribeiro. John’s e-mail address is john_ribeiro@idg.com Related content news Google Chrome zero-day jumps onto CISA's known vulnerability list A serious security flaw in Google Chrome, which was discovered under active exploitation in the wild, is a new addition to the Cybersecurity and Infrastructure Agency’s Known Exploited vulnerabilities catalog. By Jon Gold Oct 03, 2023 3 mins Zero-day vulnerability brandpost The advantages and risks of large language models in the cloud Understanding the pros and cons of LLMs in the cloud is a step closer to optimized efficiency—but be mindful of security concerns along the way. By Daniel Prizmant, Senior Principal Researcher at Palo Alto Networks Oct 03, 2023 5 mins Cloud Security news Arm patches bugs in Mali GPUs that affect Android phones and Chromebooks The vulnerability with active exploitations allows local non-privileged users to access freed-up memory for staging new attacks. By Shweta Sharma Oct 03, 2023 3 mins Android Security Vulnerabilities news UK businesses face tightening cybersecurity budgets as incidents spike More than a quarter of UK organisations think their cybersecurity budget is inadequate to protect them from growing threats. By Michael Hill Oct 03, 2023 3 mins CSO and CISO Risk Management Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe