The Anonymous group is known to use distributed denial of service (DDoS) cyberattacks in order to overwhelm website servers with traffic and force them offline.
The two-page file, lifted from the conference's website, was created on 4 October and researchers from Cisco Talos said attacks peaked three days later.
The DHS and FBI said in a joint report that the threat actors are "actively pursuing their ultimate objectives over a long-term campaign".
Hackers infected the installers of the Eltima Player and Folx apps with the Proton malware, which in turn was downloaded by unsuspecting users.
Pompeo said "the world has moved" and pledged that the CIA will now refine how it works to combat "non-state threats" and "state intelligence adversaries."
Research suggested that the new botnet is evolving at a rapid pace, and could soon be weaponised to launch cyberattacks in the same fashion as "Mirai" last year.
The programme encourages researchers to scour for bugs in select popular apps created by Google as well as third-party developers,
"According to our intelligence services, the Russian government has made a project of turning Americans against each other," Bush said.
The zero-day vulnerability, which was previously exploited by the BlackOasis group, was made public and patched on 16 October.
Malaysian technology website Lowyat reported that the files were offered for sale by an unknown user of its forums.
Don Meij insisted that the firm does not store credit card information on its systems and stressed: "No financial data was accessed in this incident."
The leaked records contained citizen ID numbers, names, genders, martial statuses, home ownership information, employment details and income data.
The hacker group has been active since 2014 and is particularly interested in naval industries, primarily focusing on targets in the US, Western Europe and the South China Sea.
Ad buyers can choose the demography, what apps they want to cover, and the location that they want their ads to appear in.
Symantec researchers said these infected apps were downloaded between 600,000 and 2.6 million times.
Hackers have now reportedly launched a new site called ATMjackpot that sells a modified version of CutletMaker, complete with video tutorials on how to successfully exploit it.
A researcher has posted video of the Lovense sex toy being sent commands via his computer after what he says began as a 'joke' with another researcher.
The 27GB-sized cache was titled "MasterDeeds" and contained millions of records. The leaked records reportedly date back to the late 1990s.
Norwegian Consumer Council (NCC) released a report this week detailing the issues after testing a number of the devices: the Gator 2, Tinitell, Viksfjord and Xplora.
According to reports, the hermit kingdom's hacking unit has swelled to 6,000-people strong - conducting operations even as the country's internet remains weak.
The newer version of the remote access trojan (RAT) has been updated to run on modern operating systems and 64-bit platforms.
British spy agencies have been accused of collecting personal, social media, travel, medical and related data for years, unchecked and without oversight.
The latest cryptominer comes amid an uptick in cryptocurrency mining malware campaigns and growing JavaScript-based cryptominers
British cybersecurity analyst Matt Tait claimed that he was recruited by the late GOP operative Peter W. Smith to help verify hacked Clinton emails.
BlackOasis targets various figures involved in Middle Eastern politics, including people in the UN, opposition bloggers, activists and regional news reporters, researchers said.
Security experts say the attack was reminiscent of the infamous $81m Bangladesh Bank cyberheist, with similar malware and hacking tools used.
The company said it was alerted by Troy Hunt, security expert and founder of the data breach notification website Have I Been Pwned.
The spam email campaign was sent from domains that closely resembled those used by the legitimate HMRC – in this case it was using hmirc-gov.co.uk, Trustwave experts said.
"Any device that uses WiFi is likely vulnerable," the security expert has warned – a shocking assertion as so much of modern technology relies on such networks.
WikiLeaks steadily published thousands of embarrassing emails and documents linked to Democratic officials in the months leading up to the November election.