Advertisement
Top

Tag: Espionage


Cyber warfare, Cyber-crime

Uncle Sam tells nosy nations to keep their hands off Americans’ personal data

February 28, 2024

Via: The Register

US President Joe Biden is expected to sign an executive order today that aims to prevent the sale or transfer of Americans’ sensitive personal information and government-related data to adversarial countries including China and Russia. In addition to the executive […]


Hacker, Threats & Malware

Wikileaks source and former CIA worker Joshua Schulte sentenced to 40 years jail

February 2, 2024

Via: The Register

Joshua Schulte, a former CIA employee and software engineer accused of sharing material with WikiLeaks, was sentenced to 40 years in prison by the US Southern District of New York on Thursday. Schulte was sent down for crimes including espionage, […]


Cyber warfare, Cyber-crime

We know nations are going after critical systems, but what happens when crims join in?

January 31, 2024

Via: The Register

Volt Typhoon, the Chinese government-backed cyberspies whose infrastructure was at least partially disrupted by Uncle Sam, has been homing in on other US energy, satellite and telecommunications systems, according to Robert Lee, CEO of security shop Dragos. Lee reported that […]


Cyber warfare, Cyber-crime

Microsoft: Iranian Hackers Evolving Techniques in Espionage Campaigns

January 19, 2024

Via: SecureWorld

Microsoft has released a report detailing recent activity by Mint Sandstorm, an Iranian state-sponsored hacking group, targeting high-profile academics and researchers working on Middle Eastern affairs. The report highlights new tactics and malware, signaling an escalation in capabilities. According to […]


Threats & Malware, Virus & Malware

Stealth Soldier: A New Custom Backdoor Targets North Africa with Espionage Attacks

June 9, 2023

Via: The Hacker News

A new custom backdoor dubbed Stealth Soldier has been deployed as part of a set of highly-targeted espionage attacks in North Africa. “Stealth Soldier malware is an undocumented backdoor that primarily operates surveillance functions such as file exfiltration, screen and […]


Threats & Malware, Virus & Malware

Cyber Attacks Strike Ukraine’s State Bodies in Espionage Operation

May 24, 2023

Via: The Hacker News

The Computer Emergency Response Team of Ukraine (CERT-UA) has warned of cyber attacks targeting state bodies in the country as part of an espionage campaign. The intrusion set, attributed to a threat actor tracked by the authority as UAC-0063 since […]


Cyber warfare, Cyber-crime

Many cyber operations conducted by Russia are yet to be publicly disclosed, says Dutch intelligence

February 23, 2023

Via: Security Affairs

According to a joint report published by the Dutch General Intelligence and Security Service (AIVD), and the Military Intelligence and Security Service (MIVD), many cyber operations conducted by Russia-linked hackers against Ukraine and NATO members during the past year have […]


Cyber-crime, Malware

Chinese Hackers Targeting Online Casinos with GamePlayerFramework Malware

October 19, 2022

Via: The Hacker News

An advanced persistent threat (APT) group of Chinese origin codenamed DiceyF has been linked to a string of attacks aimed at online casinos in Southeast Asia for years. Russian cybersecurity company Kaspersky said the activity aligns with another set of […]


Cyber warfare, Cyber-crime

Suspected Iranian Hackers Targeted Several Israeli Organizations for Espionage

August 23, 2022

Via: The Hacker News

A suspected Iranian threat activity cluster has been linked to attacks aimed at Israeli shipping, government, energy, and healthcare organizations as part of an espionage-focused campaign that commenced in late 2020. Cybersecurity firm Mandiant is tracking the group under its […]


Mobile security, Wireless security

Canada Spy Agencies Split Over Proposed Huawei 5G Ban: Media

November 14, 2019

Via: Security Week

The Canadian Security Intelligence Service (CSIS) and the Communications Security Establishment (CSE) were tasked with conducting a cybersecurity review to evaluate the risks as well as the economic costs to Canadian telecoms and consumers of blacklisting the equipment supplier. The […]


Application security, Cyber warfare, Cyber-crime, Security

Twitter Spy Case Highlights Risks for Big Tech Platforms

November 11, 2019

Via: Security Week

The allegations of spying by former Twitter employees for Saudi Arabia underscore the risks for Silicon Valley firms holding sensitive data which make the platforms ripe for espionage. The two Saudis and one US citizen allegedly worked together to unmask […]


Cloud security, Malware

Verizon Data Breach Report: Espionage, C-Suite and Cloud Attacks on the Rise

May 9, 2019

Via: Threat Post

Corporate espionage is on the rise as a motivation for cyberattacks, with a full quarter of all network compromises associated with reconnaissance and data exfiltration in the last 12 months. However, financially motivated attacks aren’t going anywhere; social-engineering attacks aimed […]


Cyber warfare

US DoJ charges Huawei sanctions violations and in technology espionage

January 29, 2019

Via: Security Affairs

The US Justice Department charges the Chinese telecommunications giant Huawei in two cases, including the one that led the arrest of a top executive in Canada on a US warrant. According to the US DoJ, the charges are the response […]


Cyber warfare, Network security

Top security officials issue stark warning of Chinese espionage efforts

December 13, 2018

Via: The Hill

Top security officials issued a stark warning about China’s espionage efforts against the United States on Wednesday, labeling the country as one of the greatest global threats to the U.S. economy and national security. During a Senate Judiciary Committee hearing, […]


Network security

What is corporate espionage? Inside the murky world of private spying

July 2, 2018

Via: CSO Online

Corporate espionage — sometimes also called industrial espionage, economic espionage or corporate spying — is the practice of using espionage techniques for commercial or financial purposes. We usually think of “espionage” in terms of spies working on behalf of one […]


Mobile security

Booby-Trapped Messaging Apps Used for Spying: Researchers

January 19, 2018

Via: Security Week

An espionage campaign using malware-infected messaging apps has been stealing smartphone data from activists, soldiers, lawyers, journalists and others in more than 20 countries, researchers said in a report Thursday. A report authored by digital rights group Electronic Frontier Foundation […]


Malware

Turla APT Used WhiteBear Espionage Tools Against Defense Industry, Embassies

August 31, 2017

Via: Threat Post

A toolset belonging to the Russian-speaking Turla APT has been publicly disclosed, and along with it details on its capabilities and indicators of compromise. The tools, called WhiteBear, were used to attack defense organizations as recently as June, and diplomatic […]


Network security

WikiLeaks Says It Will Help Firms Thwart ‘CIA Hack Tools’

March 13, 2017

Via: Dark Reading

Julian Assange follows up leak of alleged CIA cyber espionage hack tools with promise of assistance against these. Julian Assange of WikiLeaks says he will help tech companies defend themselves against the cyberespionage tools used by the CIA whose existence […]


Mobile, Mobile security

Smartphone infection rate doubled in first half of 2016

September 1, 2016

Via: CSO Online

Smartphone infection rates nearly doubled during the first half of this year, from 0.25 percent to 0.49 percent compared to the second half of 2015, according to a report released today by Nokia. Nokia provides endpoint malware detection services to […]


Network security, Security

Detection and response, where to begin

September 1, 2016

Via: CSO Online

Cambridge, Mass. – As the threat landscape continues to evolve, cybersecurity experts rely more on detection and incident response, making security a collaborative exercise. But, where do they start? Many security executives used the MASSTLC Conference as a launching point. […]