February 28, 2024
Via: The RegisterUS President Joe Biden is expected to sign an executive order today that aims to prevent the sale or transfer of Americans’ sensitive personal information and government-related data to adversarial countries including China and Russia. In addition to the executive […]
February 2, 2024
Via: The RegisterJoshua Schulte, a former CIA employee and software engineer accused of sharing material with WikiLeaks, was sentenced to 40 years in prison by the US Southern District of New York on Thursday. Schulte was sent down for crimes including espionage, […]
January 31, 2024
Via: The RegisterVolt Typhoon, the Chinese government-backed cyberspies whose infrastructure was at least partially disrupted by Uncle Sam, has been homing in on other US energy, satellite and telecommunications systems, according to Robert Lee, CEO of security shop Dragos. Lee reported that […]
January 19, 2024
Via: SecureWorldMicrosoft has released a report detailing recent activity by Mint Sandstorm, an Iranian state-sponsored hacking group, targeting high-profile academics and researchers working on Middle Eastern affairs. The report highlights new tactics and malware, signaling an escalation in capabilities. According to […]
Threats & Malware, Virus & Malware
June 9, 2023
Via: The Hacker NewsA new custom backdoor dubbed Stealth Soldier has been deployed as part of a set of highly-targeted espionage attacks in North Africa. “Stealth Soldier malware is an undocumented backdoor that primarily operates surveillance functions such as file exfiltration, screen and […]
Threats & Malware, Virus & Malware
May 24, 2023
Via: The Hacker NewsThe Computer Emergency Response Team of Ukraine (CERT-UA) has warned of cyber attacks targeting state bodies in the country as part of an espionage campaign. The intrusion set, attributed to a threat actor tracked by the authority as UAC-0063 since […]
February 23, 2023
Via: Security AffairsAccording to a joint report published by the Dutch General Intelligence and Security Service (AIVD), and the Military Intelligence and Security Service (MIVD), many cyber operations conducted by Russia-linked hackers against Ukraine and NATO members during the past year have […]
October 19, 2022
Via: The Hacker NewsAn advanced persistent threat (APT) group of Chinese origin codenamed DiceyF has been linked to a string of attacks aimed at online casinos in Southeast Asia for years. Russian cybersecurity company Kaspersky said the activity aligns with another set of […]
August 23, 2022
Via: The Hacker NewsA suspected Iranian threat activity cluster has been linked to attacks aimed at Israeli shipping, government, energy, and healthcare organizations as part of an espionage-focused campaign that commenced in late 2020. Cybersecurity firm Mandiant is tracking the group under its […]
Mobile security, Wireless security
November 14, 2019
Via: Security WeekThe Canadian Security Intelligence Service (CSIS) and the Communications Security Establishment (CSE) were tasked with conducting a cybersecurity review to evaluate the risks as well as the economic costs to Canadian telecoms and consumers of blacklisting the equipment supplier. The […]
Application security, Cyber warfare, Cyber-crime, Security
November 11, 2019
Via: Security WeekThe allegations of spying by former Twitter employees for Saudi Arabia underscore the risks for Silicon Valley firms holding sensitive data which make the platforms ripe for espionage. The two Saudis and one US citizen allegedly worked together to unmask […]
May 9, 2019
Via: Threat PostCorporate espionage is on the rise as a motivation for cyberattacks, with a full quarter of all network compromises associated with reconnaissance and data exfiltration in the last 12 months. However, financially motivated attacks aren’t going anywhere; social-engineering attacks aimed […]
January 29, 2019
Via: Security AffairsThe US Justice Department charges the Chinese telecommunications giant Huawei in two cases, including the one that led the arrest of a top executive in Canada on a US warrant. According to the US DoJ, the charges are the response […]
Cyber warfare, Network security
December 13, 2018
Via: The HillTop security officials issued a stark warning about China’s espionage efforts against the United States on Wednesday, labeling the country as one of the greatest global threats to the U.S. economy and national security. During a Senate Judiciary Committee hearing, […]
July 2, 2018
Via: CSO OnlineCorporate espionage — sometimes also called industrial espionage, economic espionage or corporate spying — is the practice of using espionage techniques for commercial or financial purposes. We usually think of “espionage” in terms of spies working on behalf of one […]
January 19, 2018
Via: Security WeekAn espionage campaign using malware-infected messaging apps has been stealing smartphone data from activists, soldiers, lawyers, journalists and others in more than 20 countries, researchers said in a report Thursday. A report authored by digital rights group Electronic Frontier Foundation […]
August 31, 2017
Via: Threat PostA toolset belonging to the Russian-speaking Turla APT has been publicly disclosed, and along with it details on its capabilities and indicators of compromise. The tools, called WhiteBear, were used to attack defense organizations as recently as June, and diplomatic […]
March 13, 2017
Via: Dark ReadingJulian Assange follows up leak of alleged CIA cyber espionage hack tools with promise of assistance against these. Julian Assange of WikiLeaks says he will help tech companies defend themselves against the cyberespionage tools used by the CIA whose existence […]
September 1, 2016
Via: CSO OnlineSmartphone infection rates nearly doubled during the first half of this year, from 0.25 percent to 0.49 percent compared to the second half of 2015, according to a report released today by Nokia. Nokia provides endpoint malware detection services to […]
September 1, 2016
Via: CSO OnlineCambridge, Mass. – As the threat landscape continues to evolve, cybersecurity experts rely more on detection and incident response, making security a collaborative exercise. But, where do they start? Many security executives used the MASSTLC Conference as a launching point. […]