Mike Waltz Grilled on Signal App Use at UN Ambassadorship Hearing
Mike Waltz Confirmation Hearing
Mike Waltz faced scrutiny during his confirmation hearing for the U.S. ambassador to the United Nations. This hearing was pivotal as it represented the first opportunity for lawmakers to question him regarding the "Signalgate" incident, where he mistakenly included a journalist in a sensitive group chat.
During the hearing, Waltz defended his actions, stating that the use of the Signal app was recommended and authorized. He claimed, "The use of Signal was not only authorized, it's still authorized and highly recommended." The chat's content, which included military plans, was downplayed by administration officials, asserting that no classified information was shared.
Democrats on the committee pressed Waltz on the implications of sharing sensitive military information through an unclassified platform. Senator Chris Coons expressed concern, asking for Waltz's sense of regret regarding the incident.
The session highlighted the ongoing investigations into the incident, including inquiries by the Pentagon's Inspector General. Waltz reaffirmed that no classified information was disclosed, despite the scrutiny from Democratic senators.
Waltz’s nomination comes after a turbulent tenure as national security adviser, where he faced backlash over the Signal chat incident. President Donald Trump expressed his support for Waltz amidst the controversies, reinforcing his confidence in the nominee.
For more details on the hearing, you can refer to original source.
Microsoft Patch Tuesday Update
Microsoft addressed 130 vulnerabilities in its recent security update, with none having been actively exploited in the wild. Notable vulnerabilities include a high-severity defect in SQL Server, identified as CVE-2025-49719, which has a CVSS score of 7.5. This vulnerability could allow attackers to access uninitialized memory, leading to potential data exposure.
Ben McCarthy, lead cyber security engineer at Immersive, highlighted that this vulnerability enables unauthenticated remote code execution with minimal attack complexity. The most critical vulnerability this month, CVE-2025-47981, presents a significant risk due to its potential for lateral movement in enterprise networks.
Security experts recommend immediate patching of these vulnerabilities to mitigate risks. For further information on Microsoft's security updates and vulnerabilities, please visit Microsoft's Security Response Center.
Image courtesy of ABC News
For a comprehensive approach to safeguarding your systems, consider exploring our services at Gopher Security, where we offer solutions to enhance your security posture. Visit our website at Gopher Security for more information.