Skip to content
  Sunday 15 March 2026
Trending
September 11, 2024Cybersecurity Architect III September 21, 2023Real Time Automation 460 Series April 27, 2025ISSO Cybersecurity Assessment and Authorization Analyst December 9, 2023SOC Cybersecurity Analyst July 14, 2025<h3>Claroty Tackles Nation-State Threats with Bold Risk Reduction Strategy</h3> January 26, 2026CISA Adds Five Known Exploited Vulnerabilities to Catalog September 24, 2024CISA Releases Eight Industrial Control Systems Advisories November 1, 2024Cybersecurity Engineer January 7, 2025CISA Releases Two Industrial Control Systems Advisories December 2, 2023CISA and Partners Release Joint Advisory on IRGC-Affiliated Cyber Actors Exploiting PLCs
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
  Industry News  

US DOGE Staffer Leaks Sensitive Treasury Data via Unencrypted Email

Industry News

US DOGE Staffer Leaks Sensitive Treasury Data via Unencrypted Email

SecuredyouadmSecuredyouadm—March 18, 20250
FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail
More stories

Scattered Spider & ShinyHunters Plot Explosive Data Leak

August 11, 2025

Exploit Alert: Ivanti Flaw Used to Spread TRAILBLAZE and BRUSHFIRE Malware in Active Attacks

April 4, 2025

Microsoft Patches 72 Flaws, Stops Hackers in Their Tracks with CLFS Fix

December 11, 2024

Russia Boasts Capture of Pro-Ukraine Hackers

July 8, 2025



In a recent development, a significant breach of data security policies has come to light involving a former staffer from the Department of Government Efficiency (DOGE). Court documents reveal that the staffer sent an unencrypted database containing personally identifiable information to two high-ranking officials from the Trump administration. This action represents a clear violation of the Department of Treasury’s security protocols. The database, which should have been encrypted and transmitted only with the necessary approvals, was sent without such precautions, raising serious concerns about the agency’s data handling practices.

David Ambrose, the acting chief information security officer at the Bureau of the Fiscal Service (BFS), provided sworn testimony regarding the breach. Ambrose, a long-serving civil servant, emphasized the gravity of the situation in a case brought forth by state attorneys general against DOGE. He detailed how Marko Elez, the staffer in question, transmitted the sensitive information without agency consent. This breach has not only sparked legal action but also highlighted potential lapses in the understanding and implementation of federal data security policies by DOGE personnel.

The lawsuit against DOGE is one among many that accuse the department of neglecting essential data protection guidelines. The testimony by Ambrose underscores the risks posed by DOGE’s expedited efforts to streamline the federal workforce, which seemingly includes employing individuals with insufficient knowledge of crucial security practices. The specific data breach involved “low-risk” information, yet it has illuminated broader issues regarding the safeguarding of more sensitive governmental data.

Despite the limited nature of the information in the spreadsheet, the incident has been met with criticism from former federal cybersecurity officials. They argue that such breaches either indicate a blatant disregard for established security measures or a profound misunderstanding of federal information management protocols. The incident has prompted judicial intervention, with Judge Paul Engelmayer issuing a temporary restraining order to prevent further unauthorized access to critical Treasury Department data.

As the case progresses, the lack of response from DOGE, the Treasury Department, and the White House to requests for comment only adds to the mounting concerns. The ongoing litigation and the court’s directive to destroy unauthorized copies of the data underscore the seriousness of the breach and the potential vulnerabilities within federal data systems. This situation serves as a stark reminder of the importance of stringent adherence to data security policies, especially in government agencies handling sensitive information.

FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail

Securedyouadm

UK Official Claims Success in Blocking Russian Disinfo in 2024 Election

CISA Issues Urgent Alert on GitHub Action Supply Chain Attack
Related posts
  • Related posts
  • More from author
Industry News

5 Reasons AI-Driven Business Need Dedicated Servers – SmartData Collective

October 14, 20250
Industry News

The Future of Cyberthreat Sharing Post-CISA 2015: What’s Next?

October 1, 20250
Industry News

Meta Strikes $14.2B AI Deal with CoreWeave for Cutting-Edge Infrastructure

October 1, 20250
Load more
Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Read also
Careers

Cybersecurity – Information System Security Manager (ISSM)

March 15, 20260
Careers

Sr. Cybersecurity Engineer Security Controls Assessor Representative

March 15, 20260
Careers

Consultant, Cybersecurity

March 15, 20260
Careers

Senior Cybersecurity Manager

March 15, 20260
Careers

Senior Cybersecurity Analyst

March 15, 20260
Careers

Space Intelligence and Weapon Systems Classified Cybersecurity Operations Senior Manager

March 15, 20260
Load more
Stay Social!
192Likes
4,500Followers
13Subscribers
46Followers
Recent posts
  • Cybersecurity – Information System Security Manager (ISSM)
  • Sr. Cybersecurity Engineer Security Controls Assessor Representative
  • Consultant, Cybersecurity
  • Senior Cybersecurity Manager
  • Senior Cybersecurity Analyst

    # TRENDING

    how old is my computerhow old is my dell laptophow old is my HP laptophow old is my laptophow old is my toshiba laptophow to find computer ageverify computer agestar wars theme wallpapersThe Best Hacking Bookswiresharkusb device not found windows 10/11usb device not recognized windows 10/11 errorWhat is AIGPUSnifferuTorrentvulnerability scanner downloadWifi Hacking SoftwareWifi Hacking Appsolved windows 10/11 usb device not recognizedstar wars windows 7 theme downloadTwitter Account Security
    © Copyright Mister Cybersecurity LLC 2023, All Rights Reserved
    • About
    • Contact
    • Privacy
    • ToS
    • Disclosures