Close Menu
  • Home
  • Cybercrime and Ransomware
  • Emerging Tech
  • Threat Intelligence
  • Expert Insights
  • Careers and Learning
  • Compliance

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

Vectra AI Unveils Next-Gen Platform for Enterprise Security

February 2, 2026

AI Fuels Surge in Industrial Cyber Threats, Redefining OT Defense Challenges

February 1, 2026

AXA XL Unveils Dedicated Team for Alternative Risk Solutions

February 1, 2026
Facebook X (Twitter) Instagram
The CISO Brief
  • Home
  • Cybercrime and Ransomware
  • Emerging Tech
  • Threat Intelligence
  • Expert Insights
  • Careers and Learning
  • Compliance
Home » Tennessee Man Admits to Hacking Supreme Court Systems

Tennessee Man Admits to Hacking Supreme Court Systems

Staff WriterBy Staff WriterJanuary 17, 2026No Comments3 Mins Read1 Views
Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest WhatsApp Email

Fast Facts

  1. Guilty Plea: Nicholas Moore, a 24-year-old from Tennessee, pleaded guilty to hacking the U.S. Supreme Court’s filing system over 25 times and accessing sensitive records from AmeriCorps and Veterans Affairs.

  2. Hacking Details: Moore used stolen credentials to breach the Supreme Court’s system and disclosed personal information on an Instagram account named “@ihackedthegovernment.”

  3. Legal Consequences: He faces a maximum of one year in prison for a misdemeanor count of computer fraud, with sentencing set for April 17.

  4. Security Breaches: In addition to the Supreme Court, Moore illegally accessed records from AmeriCorps and a VA veteran’s account, publicly sharing the stolen data online.

[gptA technology journalist, write a short news story divided in two subheadings, at 12th grade reading level about ‘Tennessee man pleads guilty to repeatedly hacking Supreme Court’in short sentences using transition words, in an informative and explanatory tone, from the perspective of an insightful Tech News Editor, ensure clarity, consistency, and accessibility. Use concise, factual language and avoid jargon that may confuse readers. Maintain a neutral yet engaging tone to provide balanced perspectives on practicality, possible widespread adoption, and contribution to the human journey. Avoid passive voice. The article should provide relatable insights based on the following information ‘

WASHINGTON (AP) — A Tennessee man pleaded guilty on Friday to hacking the U.S. Supreme Court’s filing system more than two dozen times, court records show.

Nicholas Moore, 24, of Springfield, Tennessee, also admitted that he illegally accessed records from AmeriCorps’ computer servers and a Department of Veterans Affairs electronic platform.

U.S. District Judge Beryl Howell in Washington, D.C., is scheduled to sentence Moore on April 17.

Moore pleaded guilty to one misdemeanor count of computer fraud, which carries a maximum prison sentence of one year. U.S. Attorney Jeanine Pirro’s office charged him last week.

In 2023, Moore used stolen credentials to hack into the Supreme Court’s filing system on 25 different days, a court filing says. He accessed personal records belonging to the person whose credentials he used, then posted information about the person on an Instagram account using the handle “@ihackedthegovernment,” according to the filing.

Moore also pleaded guilty to using stolen credentials to access a user’s personal information from AmeriCorps’ computer servers and from a U.S. Marine Corps veteran’s account on the Department of Veterans Affairs’ “MyHealtheVet” platform. He posted screenshots of information that he accessed from both computer systems on the same Instagram account.

‘. Do not end the article by saying In Conclusion or In Summary. Do not include names or provide a placeholder of authors or source. Make Sure the subheadings are in between html tags of

[/gpt3]

Continue Your Tech Journey

Dive deeper into the world of Cryptocurrency and its impact on global finance.

Stay inspired by the vast knowledge available on Wikipedia.

Cybercrime-V1

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleAppGuard Challenges AI Hype, Rolls Out Next-Gen Insider Platform
Next Article Microsoft Crowned Leader in Unified AI Governance Platforms
Avatar photo
Staff Writer
  • Website

John Marcelli is a staff writer for the CISO Brief, with a passion for exploring and writing about the ever-evolving world of technology. From emerging trends to in-depth reviews of the latest gadgets, John stays at the forefront of innovation, delivering engaging content that informs and inspires readers. When he's not writing, he enjoys experimenting with new tech tools and diving into the digital landscape.

Comments are closed.

Latest Posts

AI Fuels Surge in Industrial Cyber Threats, Redefining OT Defense Challenges

February 1, 2026

Startup Unveils Linux Security Overhaul to Halt Hackers

January 30, 2026

Protecting MCP Security: Defeating Prompt Injection & Tool Poisoning

January 30, 2026

AI’s Rapid Rise in Detecting and Exploiting Security Flaws

January 30, 2026
Don't Miss

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Recent Posts

  • Vectra AI Unveils Next-Gen Platform for Enterprise Security
  • AI Fuels Surge in Industrial Cyber Threats, Redefining OT Defense Challenges
  • AXA XL Unveils Dedicated Team for Alternative Risk Solutions
  • Guarding the Future: Securing AI Application Supply Chains
  • Alles Technology Unveils Game-Changing Tabletop Service for Cyber Readiness
About Us
About Us

Welcome to The CISO Brief, your trusted source for the latest news, expert insights, and developments in the cybersecurity world.

In today’s rapidly evolving digital landscape, staying informed about cyber threats, innovations, and industry trends is critical for professionals and organizations alike. At The CISO Brief, we are committed to providing timely, accurate, and insightful content that helps security leaders navigate the complexities of cybersecurity.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Vectra AI Unveils Next-Gen Platform for Enterprise Security

February 2, 2026

AI Fuels Surge in Industrial Cyber Threats, Redefining OT Defense Challenges

February 1, 2026

AXA XL Unveils Dedicated Team for Alternative Risk Solutions

February 1, 2026
Most Popular

Nokia Alerts Telecoms to Rising Stealth Attacks, DDoS Surge, and Cryptography Pressures

October 8, 20259 Views

Cyberattack Cripples 34 Devices in Telecoms Using LinkedIn Lures & MINIBIKE Malware

September 19, 20259 Views

Tonic Security Secures $7 Million to Transform Cyber Risk Reduction

July 28, 20259 Views

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025

Categories

  • Compliance
  • Cyber Updates
  • Cybercrime and Ransomware
  • Editor's pick
  • Emerging Tech
  • Events
  • Featured
  • Insights
  • Threat Intelligence
  • Uncategorized
© 2026 thecisobrief. Designed by thecisobrief.
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions

Type above and press Enter to search. Press Esc to cancel.