The Congressional Budget Office was hacked. It says it has implemented new security measures

**Congressional Budget Office Confirms Data Breach, Launches Investigation**

WASHINGTON (AP) — The Congressional Budget Office (CBO) announced Thursday that it had been hacked, potentially exposing sensitive government data to malicious actors. The breach raises concerns about the security of an agency that plays a vital role in providing objective, impartial analysis for lawmakers during the budget process.

With a staff of approximately 275 employees, the CBO is responsible for producing cost estimates for nearly every bill approved by a House or Senate committee and often offers analysis earlier at lawmakers’ request.

Caitlin Emma, a CBO spokeswoman, stated in writing that the agency “has identified the security incident, has taken immediate action to contain it, and has implemented additional monitoring and new security controls to further protect the agency’s systems going forward.”

The incident was first reported by The Washington Post, which cited four anonymous sources familiar with the situation. According to the Post, the breach was believed to be the work of a suspected foreign actor. However, the CBO did not officially confirm the origin of the attack.

“The incident is being investigated and work for the Congress continues,” said Emma. “Like other government agencies and private sector entities, CBO occasionally faces threats to its network and continually monitors to address those threats.”

The CBO manages extensive data sources covering a wide range of policy issues, including mass deportation plans from the Trump administration, the implementation of sweeping tariffs on countries around the world, and the massive tax and spending cuts enacted into law this summer.

Further details about the scope of the breach and the potential impact on government operations have not yet been released as the investigation continues.
https://wgntv.com/business/ap-business/ap-the-congressional-budget-office-was-hacked-it-says-it-has-implemented-new-security-measures/

Mumbai-Delhi IndiGo flight receives bomb-threat; emergency declared at Delhi airport

**Mumbai-Delhi IndiGo Flight Receives Bomb Threat; Emergency Declared at Delhi Airport**

*By Chanshimla Varah | Sep 30, 2025, 12:32 PM*

Delhi Airport was placed on high alert early Tuesday morning after a bomb threat was received on an IndiGo flight traveling from Mumbai to Delhi.

The incident involved IndiGo flight 6E 762. Upon receiving the threat, airport authorities immediately implemented heightened security measures to ensure passenger safety. The flight landed at around 7:53 AM, according to data from the flight tracking website Flightradar24.com.

Passengers onboard flight 6E 762 were temporarily held for precautionary screening. Following thorough inspections and security checks, they were cleared to continue their journey.

An IndiGo spokesperson confirmed the bomb threat and stated that the airline promptly informed the relevant authorities. “A security threat was noticed onboard IndiGo flight 6E 762 operating from Mumbai to Delhi on September 30, 2025,” the spokesperson said.

The airline assured full cooperation with officials during security procedures before allowing the aircraft to resume operations.

To minimize inconvenience, IndiGo offered refreshments to passengers and provided regular updates throughout the situation. The spokesperson emphasized, “As always, the safety and security of our customers, crew, and aircraft are our topmost priorities.”

Authorities have confirmed that the situation is now under control, and normal operations at Delhi Airport have resumed.
https://www.newsbytesapp.com/news/india/bomb-threat-to-mumbai-delhi-flight-emergency-declared-at-delhi-airport/story

Tucson woman arrested for allegedly making threat against Tempe City Council meeting

**Tucson Woman Arrested for Online Threat That Postponed Tempe City Council Meeting**

PHOENIX — A Tucson woman was arrested Wednesday for allegedly making an online threat that led to the postponement of a Tempe City Council meeting last month, authorities said.

Kathleen Tierney faces one felony count of computer tampering and two misdemeanor counts of disorderly conduct, according to the Tempe Police Department. The computer tampering charge is based on a state statute that prohibits recklessly using a computer, computer system, or network to engage in a scheme or course of conduct directed at another person that seriously alarms, torments, threatens, or terrorizes that person.

Tierney was taken into custody in Tucson by Tempe Criminal Apprehension Surveillance Team officers, with support from the U.S. Marshals Service.

“This arrest demonstrates our unwavering commitment to protecting the safety of our community members and elected leaders,” Tempe Police Chief Ken McCoy said in a press release. “Threats like this not only endanger lives, they disrupt civic engagement and silence the voices of the people we serve.”

### What Happened When the Threat Was Made Against the Tempe City Council Meeting?

Wednesday’s arrest follows an investigation into a threatening social media post targeting attendees of the August 28 Tempe City Council meeting. The threat was posted just as the council chamber was filling up shortly before the meeting was scheduled to begin.

“The concern was specific in nature and credible enough that we could not in good conscience proceed with the meeting,” Assistant Chief James Sweig said in a press release at the time.

As a result, about 75 people were escorted from the room, and the meeting was rescheduled to September 2 and conducted virtually as a precaution. Additionally, a work study session on September 4 was also changed to a virtual format.

Tempe resumed in-person City Council meetings last Thursday after police implemented several new security measures.

Tempe City Council meetings are held at the East Valley suburb’s City Hall, a distinctive inverted pyramid building on Fifth Street just east of Mill Avenue.
https://ktar.com/arizona-news/tempe-city-council-threat-arrest/5754114/

Exit mobile version