#china-linked-threat

[ follow ]
#ai-security
fromAxios
2 days ago
Privacy professionals

U.S. accuses China of "industrial-scale" campaigns to steal AI secrets

fromNextgov.com
2 days ago
Intellectual property law

White House accuses China of 'deliberate, industrial-scale campaigns' to steal US AI models

Intellectual property law
fromTechRepublic
2 days ago

White House Says China-Linked Actors Tried to 'Steal American AI'

Foreign entities, particularly from China, are allegedly extracting American AI models through unauthorized methods, raising national security concerns.
Privacy professionals
fromAxios
2 days ago

U.S. accuses China of "industrial-scale" campaigns to steal AI secrets

China-based actors are using proxy accounts to exploit U.S. AI models and extract proprietary information.
Intellectual property law
fromNextgov.com
2 days ago

White House accuses China of 'deliberate, industrial-scale campaigns' to steal US AI models

The White House accused foreign entities of industrial-scale campaigns to distill U.S. AI systems and plans to safeguard domestic AI products.
#china
fromTNW | China
2 hours ago
Europe politics

Beijing warns EU after 27 Chinese firms included in 20th Russia sanctions package, retaliates against European defence companies

fromTNW | China
2 hours ago
EU data protection

China formalises gig worker protections for 200 million platform workers with algorithm transparency and 2027 deadline

Europe politics
fromTNW | China
2 hours ago

Beijing warns EU after 27 Chinese firms included in 20th Russia sanctions package, retaliates against European defence companies

China condemned the EU's sanctions and retaliated by placing seven EU defense firms on its export control list, framing it as a Taiwan issue.
EU data protection
fromTNW | China
2 hours ago

China formalises gig worker protections for 200 million platform workers with algorithm transparency and 2027 deadline

China's CPC Central Committee and State Council formalized protections for gig workers, mandating minimum wage, maximum hours, and algorithm transparency.
World politics
fromAxios
3 days ago

China stockpiled huge amounts of oil before Iran war

China benefits significantly from the Iran war due to its energy strategy and dominance in renewable supply chains.
World politics
fromwww.aljazeera.com
4 days ago

How China is gaining from Iran war by showing it is different from US

Beijing is strategically positioning itself amid the US-Israel war on Iran, advocating for peace while maintaining economic ties with key nations.
#cybersecurity
Information security
fromTheregister
2 days ago

China-linked crews turn routers into covert attack proxies

China-linked threat actors exploit compromised routers and IoT devices to create proxy networks for cyber intrusions and data theft.
Information security
fromThe New Yorker
2 days ago

How Big a Threat Are Iranian-Backed Cyber Attacks?

Iranian cyber actors have accessed critical U.S. infrastructure, highlighting vulnerabilities in cybersecurity and the ongoing nature of nation-state hacking.
Information security
fromSecurityWeek
3 days ago

Chinese Cybersecurity Firm's AI Hacking Claims Draw Comparisons to Claude Mythos

A Chinese cybersecurity firm claims AI-driven vulnerability discovery capabilities rivaling Anthropic's Claude Mythos model.
Information security
fromTheregister
2 days ago

China-linked crews turn routers into covert attack proxies

China-linked threat actors exploit compromised routers and IoT devices to create proxy networks for cyber intrusions and data theft.
Privacy professionals
fromThe Hacker News
1 day ago

NASA Employees Duped in Chinese Phishing Scheme Targeting U.S. Defense Software

A Chinese national impersonated U.S. researchers to obtain sensitive information from NASA and other entities, violating export control laws.
Information security
fromComputerWeekly.com
3 days ago

Chinese hackers using compromised networks to spy on Western companies, says Five Eyes | Computer Weekly

China-linked hackers are using vulnerable internet-connected devices to obscure espionage and hacking operations against Western organizations.
Information security
fromThe New Yorker
2 days ago

How Big a Threat Are Iranian-Backed Cyber Attacks?

Iranian cyber actors have accessed critical U.S. infrastructure, highlighting vulnerabilities in cybersecurity and the ongoing nature of nation-state hacking.
Information security
fromSecurityWeek
3 days ago

Chinese Cybersecurity Firm's AI Hacking Claims Draw Comparisons to Claude Mythos

A Chinese cybersecurity firm claims AI-driven vulnerability discovery capabilities rivaling Anthropic's Claude Mythos model.
#us-ai-policy
European startups
fromFast Company
1 day ago

Trump administration vows crackdown on China's 'exploiting' of AI models made in the U.S.

The Trump administration aims to combat foreign exploitation of U.S. AI models, particularly targeting China amid rising competition in the AI sector.
European startups
fromSecurityWeek
2 days ago

Trump Administration Vows Crackdown on Chinese Companies 'Exploiting' AI Models Made in US

The Trump administration aims to combat foreign exploitation of U.S. AI models, particularly targeting China amid rising competition in the AI sector.
European startups
fromFast Company
1 day ago

Trump administration vows crackdown on China's 'exploiting' of AI models made in the U.S.

The Trump administration aims to combat foreign exploitation of U.S. AI models, particularly targeting China amid rising competition in the AI sector.
European startups
fromSecurityWeek
2 days ago

Trump Administration Vows Crackdown on Chinese Companies 'Exploiting' AI Models Made in US

The Trump administration aims to combat foreign exploitation of U.S. AI models, particularly targeting China amid rising competition in the AI sector.
Science
fromwww.theguardian.com
8 hours ago

The tortoise and the hare: will China beat the US in the race back to the moon?

The US and China are in a space race to establish lunar bases and claim resources, with China potentially having the upper hand.
#iran
World news
fromwww.aljazeera.com
1 day ago

Iran's Infowar: Lego, AI and ever tightening control

The Iranian government employs innovative online strategies for international PR while enforcing strict internet controls domestically.
World news
fromwww.aljazeera.com
1 day ago

Iran's Infowar: Lego, AI and ever tightening control

The Iranian government employs innovative online strategies for international PR while enforcing strict internet controls domestically.
US politics
fromwww.bbc.com
2 days ago

White House memo claims mass AI theft by Chinese firms

The White House aims to combat foreign exploitation of US AI technology, particularly by China, through enhanced cooperation with American firms.
Digital life
fromWIRED
2 days ago

Rednote Draws a Line Between China and the World

Rednote users are experiencing automatic account conversions from the Chinese to the international version, raising concerns about content availability and platform identity.
Artificial intelligence
fromTNW | China
2 days ago

The US just told China to stop copying its AI. Enforcing that is the hard part.

The White House accused China of industrial-scale theft of American AI models and committed to sharing intelligence with US companies.
#ai-development
Tech industry
fromwww.businessinsider.com
2 days ago

A former ByteDance engineer says China's AI industry is 'far behind' the US and the gap is getting worse

China is falling further behind the US in AI development, according to a former ByteDance engineer.
Artificial intelligence
fromThe Verge
2 days ago

China's DeepSeek previews new AI model a year after jolting US rivals

DeepSeek's V4 AI model competes with US systems, showcasing advancements in coding and compatibility with Huawei technology.
Tech industry
fromwww.businessinsider.com
2 days ago

A former ByteDance engineer says China's AI industry is 'far behind' the US and the gap is getting worse

China is falling further behind the US in AI development, according to a former ByteDance engineer.
Artificial intelligence
fromThe Verge
2 days ago

China's DeepSeek previews new AI model a year after jolting US rivals

DeepSeek's V4 AI model competes with US systems, showcasing advancements in coding and compatibility with Huawei technology.
Business
from24/7 Wall St.
1 day ago

DEM's 4% Yield Hides a Taiwan Bet as China Falters in 2026

WisdomTree Emerging Markets High Dividend Fund offers a 4% yield, but its sustainability is challenged by economic factors in China and Taiwan.
Media industry
fromFuturism
1 day ago

Chinese Netflix Competitor Opens Floodgates to AI Slop

iQIYI plans to shift to primarily AI-generated content within five years, transforming its platform into a social media destination.
UK politics
fromwww.bbc.com
2 days ago

Proxy attacks in UK a real and growing concern, says PM

The UK government is increasingly concerned about hostile states using proxies for attacks, particularly against the Jewish community.
Remote teams
fromWRAL.com
3 days ago

One Tech Tip: Logging on at a cafe? Privacy and security guidelines for remote workers

Remote work offers flexibility but poses privacy and security risks in public spaces.
Information security
fromSecurityWeek
1 day ago

China-Linked APT GopherWhisper Abuses Legitimate Services in Government Attacks

GopherWhisper is a newly identified APT using legitimate services for command-and-control communication and data exfiltration, primarily targeting a Mongolian government entity.
#us-china-relations
Intellectual property law
fromTNW | China
19 hours ago

The US wants to cut off China's chip equipment. China says the supply chain will break for everyone.

US chip export legislation threatens global semiconductor supply chains, prompting China's Ministry of Commerce to issue a warning about severe disruptions.
European startups
fromwww.dw.com
6 days ago

How China is reshaping the global chip industry

The US imposed export curbs on advanced semiconductors to limit China's technological advancements and military capabilities.
European startups
fromTechRepublic
2 weeks ago

Trump Eyes Sweeping Expansion of China Tech Ban Across Critical Infrastructure

The White House is considering expanding the ban on Chinese equipment for critical infrastructure, impacting telecom networks and data centers.
Intellectual property law
fromTNW | China
19 hours ago

The US wants to cut off China's chip equipment. China says the supply chain will break for everyone.

US chip export legislation threatens global semiconductor supply chains, prompting China's Ministry of Commerce to issue a warning about severe disruptions.
European startups
fromwww.dw.com
6 days ago

How China is reshaping the global chip industry

The US imposed export curbs on advanced semiconductors to limit China's technological advancements and military capabilities.
European startups
fromTechRepublic
2 weeks ago

Trump Eyes Sweeping Expansion of China Tech Ban Across Critical Infrastructure

The White House is considering expanding the ban on Chinese equipment for critical infrastructure, impacting telecom networks and data centers.
#china-economy
UK politics
fromwww.independent.co.uk
4 days ago

Iran, Russia and China behind most major cyberattacks on UK, security chief warns

The Independent provides critical journalism on key issues without paywalls, emphasizing the importance of accessible reporting.
US news
fromWIRED
6 days ago

The Weird, Twisting Tale of How China Spied on Alysa Liu and Her Dad

A Chinese operative stalked a US figure skater's family, attempting to gather personal information under false pretenses.
#artificial-intelligence
fromNextgov.com
3 days ago
Artificial intelligence

US needs to flesh out strategy to counter China's robotics advances, lawmakers say

fromFortune
3 days ago
Information security

Former national cyber director: Anthropic's 'Mythos' AI can hack nearly anything and we aren't ready | Fortune

Artificial intelligence
fromNextgov.com
3 days ago

US needs to flesh out strategy to counter China's robotics advances, lawmakers say

The U.S. needs a better strategy to counter China's growing dominance in robotics despite leading in AI development.
Information security
fromFortune
3 days ago

Former national cyber director: Anthropic's 'Mythos' AI can hack nearly anything and we aren't ready | Fortune

Mythos, Anthropic's advanced AI model, poses significant risks to critical infrastructure, necessitating urgent investment and collaboration to enhance cybersecurity.
European startups
fromwww.aljazeera.com
2 days ago

China's DeepSeek unveils latest models a year after upending global tech

DeepSeek-V4-Pro outperforms rival open models in maths and coding, trailing only Google's Gemini 3.1-Pro in world knowledge.
Privacy professionals
fromFast Company
3 days ago

How the government is ramping up mass surveillance with AI-driven tech

Surveillance capitalism collects extensive personal data through various devices and technologies, often without user consent or effective opt-out options.
fromTechRepublic
4 days ago

China Deploys Robot Dogs, Drones, and Humanoids to Run a 'Full-Space' Metro System

The full-space robot intelligent dispatching platform mainly operates in three areas: intelligent service within stations, vehicle inspection, and tunnel inspection.
Artificial intelligence
European startups
fromwww.dw.com
6 days ago

China's chip ambitions shake up global tech industry

The US imposed export curbs on advanced semiconductors to limit China's technological and military advancements.
Privacy professionals
fromTechCrunch
3 days ago

UK government says 100 countries have spyware that can hack people's phones | TechCrunch

More than half of the world's governments now have access to commercial spyware, increasing risks for citizens and critical infrastructure.
Artificial intelligence
fromFuturism
4 days ago

Chinese Workers Horrified as Bosses Direct Them to Train Their AI Replacements

Mercor hires job-seekers to train AI models that may replace them, reflecting a trend towards automation in the workforce.
Information security
fromSecurityWeek
2 days ago

US Federal Agency's Cisco Firewall Infected With 'Firestarter' Backdoor

A US federal agency was infected with malware due to vulnerabilities in Cisco firewalls linked to a China-backed espionage campaign.
Information security
fromSecurityWeek
2 days ago

Why Cybersecurity Must Rethink Defense in the Age of Autonomous Agents

Agentic AI is transforming cybersecurity, presenting both opportunities for defenders and risks for attackers, necessitating a strategic response from the industry.
#ai
Information security
fromSecurityWeek
3 days ago

AI Can Autonomously Hack Cloud Systems With Minimal Oversight: Researchers

AI systems can autonomously hack cloud environments, demonstrating advanced capabilities in executing sophisticated attacks without specific instructions.
European startups
fromFortune
1 month ago

China could be the 'big winner' in the AI race, thanks to abundant power, cheap manufacturing, and an open-source craze | Fortune

China's AI sector is gaining momentum due to cheaper energy, increased capital spending, and a growing number of open-source developers.
Information security
fromSecurityWeek
3 days ago

AI Can Autonomously Hack Cloud Systems With Minimal Oversight: Researchers

AI systems can autonomously hack cloud environments, demonstrating advanced capabilities in executing sophisticated attacks without specific instructions.
European startups
fromFortune
1 month ago

China could be the 'big winner' in the AI race, thanks to abundant power, cheap manufacturing, and an open-source craze | Fortune

China's AI sector is gaining momentum due to cheaper energy, increased capital spending, and a growing number of open-source developers.
Information security
fromIT Brew
2 days ago

Asking around: When does ransomware threat intelligence become noise?

Effective threat intelligence requires filtering information relevant to specific market segments to avoid overwhelming alerts.
Information security
fromWIRED
3 days ago

AI Tools Are Helping Mediocre North Korean Hackers Steal Millions

AI tools have enabled unskilled hackers to execute sophisticated cybercrime operations, resulting in significant financial theft.
Intellectual property law
fromWIRED
4 weeks ago

AI Research Is Getting Harder to Separate From Geopolitics

NeurIPS faced backlash over restrictions on international participants, particularly affecting Chinese researchers, highlighting tensions between geopolitics and scientific collaboration.
Privacy professionals
fromSecurityWeek
3 weeks ago

FBI Warns of Data Security Risks From China-Made Mobile Apps

Foreign-developed mobile applications pose significant data security risks, particularly those from China, according to an FBI alert.
World politics
fromNature
1 month ago

Geopolitical tensions are leading China to rethink research collaboration

International research collaboration is evolving in China, focusing on domestic priorities while maintaining global partnerships amid geopolitical tensions.
Privacy professionals
fromTheregister
1 month ago

Private sector wants Feds' help to tackle China's Typhoons

Real-time collaboration between public and private sectors on cyber threats was proposed but never implemented, leading to ongoing challenges in combating cybercrime.
World news
fromThe Hacker News
2 months ago

China-Linked UNC3886 Targets Singapore Telecom Sector in Cyber Espionage Campaign

China-linked APT UNC3886 conducted a deliberate cyber-espionage campaign against all four major Singapore telcos, using zero-day exploits and rootkits to access critical systems.
European startups
fromSecurityWeek
1 month ago

EU Sanctions Chinese, Iranian Firms Supporting Hacking Operations

The EU sanctioned three companies and two individuals for hacking activities targeting member states, including Chinese firms Integrity Technology Group and Anxun Information Technology.
#cyberespionage
Information security
fromSecurityWeek
1 month ago

China-Linked Hackers Hit Asian Militaries in Patient Espionage Operation

China-linked cyberespionage campaign CL-STA-1087 has targeted Southeast Asian military organizations since at least 2020, using custom backdoors and credential stealers to extract military intelligence and Western collaboration details.
Information security
fromTheregister
1 month ago

Google and friends disrupt suspected Beijing espionage op

Google disrupted UNC2814, a China-linked group conducting widespread cyberattacks on telecommunications and government organizations across multiple continents using Google Sheets API for command-and-control operations.
Information security
fromTechzine Global
1 month ago

China and spyware companies dominate zero-day attacks

Zero-day vulnerability exploits reached 90 cases in 2025, with Chinese cyber espionage groups and commercial spyware companies driving attacks increasingly toward enterprise infrastructure and security equipment.
Information security
fromNextgov.com
2 months ago

Chinese telecom hackers likely holding stolen data 'in perpetuity' for later attempts, FBI official says

Chinese state-backed Salt Typhoon likely retains stolen telecom data indefinitely for surveillance, future exploitation, and aggregation with other exfiltrated information.
Information security
fromThe Hacker News
2 months ago

Google Links China, Iran, Russia, North Korea to Coordinated Defense Sector Cyber Operations

State-sponsored and criminal actors from China, Iran, North Korea, and Russia target the defense industrial base, prioritizing drones, hiring exploitation, edge-device access, and supply-chain risk.
fromSecurityWeek
2 months ago

China Revives Tianfu Cup Hacking Contest Under Increased Secrecy

Tianfu Cup was launched as an alternative to the Zero Day Initiative's Pwn2Own competition, which regularly pays out more than $1 million to white hat hackers who demonstrate critical vulnerabilities in consumer and enterprise hardware and software, industrial control systems, and automotive products. Tianfu Cup made headlines in 2021, when participants earned a total of $1.9 million for exploits targeting Windows, Ubuntu, iOS, Microsoft Exchange, Chrome, Safari, Adobe Reader, Asus routers, and various virtualization products.
Information security
Information security
fromAxios
2 months ago

Exclusive: Suspected Chinese hackers impersonate U.S. briefings in phishing lure

China-linked Mustang Panda used file-based phishing to infect diplomatic and election officials with data-stealing persistent malware, detected by an AI agent at Dream.
[ Load more ]