
Image by Shino Nakamura, from Unsplash
AI To Slash U.S. Federal Rules Under Trump’s Deregulation Plan
- Written by Kiara Fabbri Former Tech News Writer
- Fact-Checked by Sarah Frazier Former Content Manager
The Trump administration is using AI systems to reduce government regulations at a fast pace.
In a rush? Here are the quick facts:
- DOGE has reviewed 1,083 rules at the Housing Department so far.
- AI flagged 100% of rules for elimination at the Consumer Finance agency.
- Critics warn AI may misread complex laws and cut vital protections.
The Washington Post obtained documents showing that the U.S. Department of Government Efficiency (DOGE) will use its “DOGE AI Deregulation Decision Tool” to reduce federal regulations by 50% by January 2026.
The Post reports that the AI system has already processed 1,083 regulatory sections at the Department of Housing and Urban Development (HUD) in under two weeks. At the Consumer Financial Protection Bureau, it reportedly wrote “100% of deregulations.”
The AI tool will analyze 200,000 federal rules to suggest the removal of 100,000 regulations which have lost their legal basis. “Creative deployment of artificial intelligence to advance the president’s regulatory agenda is one logical strategy,” said James Burnham, former DOGE chief attorney, as reported by The Post.
White House spokesperson Harrison Fields confirmed, “All options are being explored,” but noted that “no single plan has been approved or green-lit,” as reported by the Post.
He added, “The DOGE experts creating these plans are the best and brightest in the business and are embarking on a never-before-attempted transformation of government systems and operations to enhance efficiency and effectiveness.”
Critics warn that AI may misinterpret legal language. One HUD employee said the tool wrongly flagged some rules as outside legal bounds. “Actually, no—the AI read the language wrong, and it is actually correct,” the employee noted, as reported by The Post.
Despite concerns, DOGE expects the tool to be rolled out across federal agencies over the next five months. The Post added that Trump’s executive order requires cutting 10 rules for every new one added, part of his goal to “unleash prosperity through deregulation.”
The goal, according to a DOGE PowerPoint , is to “Relaunch America on Jan. 20, 2026.”

Image by Xavier Cee, from Unsplash
CastleLoader Malware Campaign Hits U.S. Government and Developers
- Written by Kiara Fabbri Former Tech News Writer
- Fact-Checked by Sarah Frazier Former Content Manager
A new and dangerous malware called CastleLoader is infecting users through fake websites and GitHub repositories.
In a rush? Here are the quick facts:
- CastleLoader malware infected 469 devices, including U.S. government systems.
- Malware spreads via fake ClickFix updates and GitHub repos.
- GitHub deception tricks developers into downloading malicious files.
Since its discovery in early 2025, CastleLoader has infected at least 469 devices across the world, including U.S. government systems, as first reported by cybersecurity firm PRODAFT .
Researchers explain that CastleLoader functions as a malware distribution platform, which spreads RedLine alongside StealC, DeerStealer, NetSupport RAT, and HijackLoader.
The malicious programs enable attackers to steal passwords, cookies, and crypto wallets, while providing them with remote access to victim devices.
Attackers use fake ClickFix phishing sites that mimic legitimate sources, such as Google Meet, browser updates, and document checks. Users who follow fake error correction instructions on the screen end up running malicious PowerShell commands, which initiate the infection sequence without their knowledge.
“Castle Loader is a new and active threat, rapidly adopted by various malicious campaigns to deploy an array of other loaders and stealers,” PRODAFT said, as reported by The Hacker News .
“Its sophisticated anti-analysis techniques and multi-stage infection process highlight its effectiveness as a primary distribution mechanism in the current threat landscape,” the researchers added.
CastleLoader also spreads through fake GitHub repositories that appear to host trusted developer tools. These deceptive pages lead users to install malware, exploiting trust in platforms like GitHub.
The malware also uses fake GitHub repositories, which pretend to host developer tools to spread its infection. Users who visit these deceptive pages end up installing malware because they trust the GitHub platform.
The researchers identify this malware as part of a broader MaaS operation. The C2 control panel provides hackers with real-time capabilities to manage infected systems, execute attacks, and modify their campaigns.
“This technique exploits developers’ trust in GitHub and their tendency to run installation commands from repositories that appear reputable,” PRODAFT noted.
With an infection rate of nearly 29%, experts warn users to avoid unfamiliar update sites and double-check all software sources.