#geopolitical-technology-risks

[ follow ]
World news
fromThe Washington Post
13 hours ago

Chinese firms market Iran war intelligence 'exposing' U.S. forces

Chinese firms are leveraging AI and open-source data to track U.S. military movements, posing potential security risks amid the Iran conflict.
#cybersecurity
fromTNW | Eu
8 hours ago
Information security

European Commission breached after hackers poisoned open-source security tool Trivy

fromTechCrunch
1 day ago
EU data protection

Europe's cyber agency blames hacking gangs for massive data breach and leak | TechCrunch

Information security
fromTechCrunch
9 hours ago

After fighting malware for decades, this cybersecurity veteran is now hacking drones | TechCrunch

Mikko Hyppönen emphasizes the invisible nature of cybersecurity work, comparing it to Tetris where successes vanish and failures accumulate.
Information security
fromSilicon Canals
1 hour ago

Mikko Hypponen says the age of viruses is over - now he's building defences against drones - Silicon Canals

Mikko Hyppönen is applying cybersecurity methods to develop anti-drone systems at Sensofusion, focusing on drone communication detection.
Information security
fromThe Hacker News
1 day ago

China-Linked TA416 Targets European Governments with PlugX and OAuth-Based Phishing

TA416 has intensified cyberattacks on European government and diplomatic organizations since mid-2025, utilizing advanced malware delivery techniques.
EU data protection
fromSecurityWeek
12 hours ago

European Commission Confirms Data Breach Linked to Trivy Supply Chain Attack

Hackers stole over 300GB of data from the European Commission's AWS environment using a compromised API key from the Trivy supply chain attack.
Information security
fromTNW | Eu
8 hours ago

European Commission breached after hackers poisoned open-source security tool Trivy

A major data breach at the European Commission was caused by TeamPCP exploiting a supply chain attack on the Trivy security tool.
EU data protection
fromTechCrunch
1 day ago

Europe's cyber agency blames hacking gangs for massive data breach and leak | TechCrunch

A cybercriminal group known as TeamPCP hacked the EU's executive body, stealing 92 gigabytes of data, including personal information.
Information security
fromTechCrunch
9 hours ago

After fighting malware for decades, this cybersecurity veteran is now hacking drones | TechCrunch

Mikko Hyppönen emphasizes the invisible nature of cybersecurity work, comparing it to Tetris where successes vanish and failures accumulate.
Information security
fromSilicon Canals
1 hour ago

Mikko Hypponen says the age of viruses is over - now he's building defences against drones - Silicon Canals

Mikko Hyppönen is applying cybersecurity methods to develop anti-drone systems at Sensofusion, focusing on drone communication detection.
Intellectual property law
fromNextgov.com
1 day ago

Tech bills of the week: Limiting adversaries' access to US tech; and boosting cyber apprenticeships

New legislation aims to strengthen U.S. export controls on sensitive technologies to prevent adversaries from exploiting them for economic gain.
Privacy professionals
fromNextgov.com
1 day ago

Suspected Chinese breach of FBI system exposed surveillance targets' phone numbers

A breach linked to China exposed phone numbers of FBI surveillance targets, raising concerns about counterintelligence risks.
Law
fromABA Journal
2 days ago

Sanctions ramping up in cases involving AI hallucinations

Monetary sanctions against attorneys for AI-generated hallucinations in case documents are increasing as courts take these issues more seriously.
Silicon Valley
fromSilicon Canals
1 day ago

U.S. and China control 90% of AI data centres - the Global South is building a different kind of AI - Silicon Canals

Frugal AI movements in the Global South aim to reclaim sovereignty by developing independent, low-cost AI systems for critical services.
#iran
Podcast
fromWIRED
2 days ago

'Uncanny Valley': Iran's Threats on US Tech, Trump's Plans for Midterms, and Polymarket's Pop-up Flop

Iran threatens US tech firms amid ongoing tensions and preparations for midterm elections are underway.
World news
fromwww.mediaite.com
20 hours ago

Former Trump NatSec Advisor Says President Probably in Panic Mode' After Two U.S. Jets Shot Down

Trump's credibility is undermined after Iran shot down U.S. military planes, contradicting his claims of air supremacy.
World news
fromEngadget
4 days ago

Iran threatens imminent attacks on US tech companies in the Middle East

The Islamic Revolutionary Guard Corps threatens to target major US tech companies in the Middle East, urging employees to evacuate for safety.
World news
fromTechRepublic
3 days ago

Iran Threatens to Attack Apple, Google, and Other US Tech Firms in Middle East

Iran's IRGC threatens 18 American tech companies, warning of retaliation for perceived involvement in high-tech warfare.
Privacy professionals
fromAxios
4 days ago

Cyber warfare starts to get personal in war between U.S., Israel and Iran

Iran-linked hackers are using data leaks and intimidation tactics against individuals to influence public perception during the current conflict.
World news
fromWIRED
4 days ago

Iran Threatens to Start Attacking Major US Tech Firms on April 1

Iran's IRGC plans to attack American companies in the Middle East in retaliation for the killing of Iranian citizens.
Podcast
fromWIRED
2 days ago

'Uncanny Valley': Iran's Threats on US Tech, Trump's Plans for Midterms, and Polymarket's Pop-up Flop

Iran threatens US tech firms amid ongoing tensions and preparations for midterm elections are underway.
World news
fromwww.mediaite.com
20 hours ago

Former Trump NatSec Advisor Says President Probably in Panic Mode' After Two U.S. Jets Shot Down

Trump's credibility is undermined after Iran shot down U.S. military planes, contradicting his claims of air supremacy.
World news
fromEngadget
4 days ago

Iran threatens imminent attacks on US tech companies in the Middle East

The Islamic Revolutionary Guard Corps threatens to target major US tech companies in the Middle East, urging employees to evacuate for safety.
World news
fromTechRepublic
3 days ago

Iran Threatens to Attack Apple, Google, and Other US Tech Firms in Middle East

Iran's IRGC threatens 18 American tech companies, warning of retaliation for perceived involvement in high-tech warfare.
Privacy professionals
fromAxios
4 days ago

Cyber warfare starts to get personal in war between U.S., Israel and Iran

Iran-linked hackers are using data leaks and intimidation tactics against individuals to influence public perception during the current conflict.
World news
fromWIRED
4 days ago

Iran Threatens to Start Attacking Major US Tech Firms on April 1

Iran's IRGC plans to attack American companies in the Middle East in retaliation for the killing of Iranian citizens.
Cryptocurrency
fromnews.bitcoin.com
11 hours ago

Human Error, Not Hacking, Cited as Top Cause for Crypto Access Loss

Human error is the leading cause of cryptocurrency access loss, affecting 35% of holders, primarily due to forgotten passwords and lost seed phrases.
European startups
fromFortune
5 hours ago

Trump sons to Gulf states: we've got some drone interception tech to sell you | Fortune

A drone company backed by Trump’s sons is selling to Gulf nations amid conflict with Iran, potentially profiting from the war initiated by their father.
Science
fromSilicon Canals
14 hours ago

SpaceX, Amazon, and Google want orbital data centers - four engineering barriers reveal who really benefits - Silicon Canals

Orbital data centers will concentrate AI infrastructure power among a few dominant companies, limiting access for smaller competitors and national regulators.
#data-privacy
Europe politics
fromwww.theguardian.com
1 day ago

The Guardian view on the US and Europe: the UK tried to be a bridge, but Trump likes to burn them | Editorial

Donald Trump's unpredictability undermines traditional alliances and the liberal international order, causing concern among European leaders.
#openclaw
DevOps
fromInfoWorld
1 day ago

Understanding the risks of OpenClaw

OpenClaw is an orchestration layer that requires external services to function effectively, rather than being a standalone cloud platform.
Information security
fromArs Technica
1 day ago

OpenClaw gives users yet another reason to be freaked out about security

OpenClaw's vulnerabilities pose severe security risks, allowing attackers to gain administrative access with minimal permissions.
DevOps
fromInfoWorld
1 day ago

Understanding the risks of OpenClaw

OpenClaw is an orchestration layer that requires external services to function effectively, rather than being a standalone cloud platform.
Information security
fromArs Technica
1 day ago

OpenClaw gives users yet another reason to be freaked out about security

OpenClaw's vulnerabilities pose severe security risks, allowing attackers to gain administrative access with minimal permissions.
Marketing tech
fromExchangewire
1 day ago

The Stack: AI Surges while Social Platforms Face Scrutiny

AI is growing rapidly, streaming models are evolving, and regulatory pressures on platforms are increasing globally.
fromThe New Yorker
1 day ago

How Donald Trump's War on Iran Helps Vladimir Putin's War on Ukraine

In 2021, when Olga Rudenko and other journalists launched the Kyiv Independent, they were committed to making a publication that wouldn't face political pressure from an owner. A few months later, Russia launched a full-scale invasion of Ukraine, and the Independent began reporting breaking news from the front lines.
Russo-Ukrainian War
US politics
fromIntelligencer
1 day ago

Trump's Priority Is Now Militarism, at Home and Abroad

Trump and Republicans are pre-funding ICE and Border Patrol without new regulations, limiting Democratic influence on immigration enforcement.
Higher education
fromThe Nation
1 day ago

How Gaza Broke Big Tech's Campus Pipeline

Students are protesting the use of technology in military actions, particularly in relation to Israel's actions in Gaza.
#us-foreign-policy
World politics
fromThe Cipher Brief
2 days ago

Taking a Stand on Adversaries' Influence in the Western Hemisphere

The US operation on January 3rd aimed to counteract adversarial influence in Latin America, particularly against Venezuela and Cuba.
World politics
fromThe Cipher Brief
2 days ago

Taking a Stand on Adversaries' Influence in the Western Hemisphere

The US operation on January 3rd aimed to counteract adversarial influence in Latin America, particularly against Venezuela and Cuba.
Digital life
fromExchangewire
4 days ago

Regulating Social Media: Where do we go from here?

Social media platforms are designed for addiction, prompting global legislative actions to restrict children's access.
#data-integrity
fromComputerworld
4 days ago
Data science

IT lesson from the Iran war: AI makes your data problems so much worse

AI can exacerbate existing data issues in enterprises, as demonstrated by the US military's bombing due to outdated intelligence.
Information security
fromSecurityWeek
4 days ago

The Next Cybersecurity Crisis Isn't Breaches-It's Data You Can't Trust

Data integrity now encompasses data trust, emphasizing the importance of reliable data in AI-driven decision-making.
Data science
fromComputerworld
4 days ago

IT lesson from the Iran war: AI makes your data problems so much worse

AI can exacerbate existing data issues in enterprises, as demonstrated by the US military's bombing due to outdated intelligence.
Information security
fromSecurityWeek
4 days ago

The Next Cybersecurity Crisis Isn't Breaches-It's Data You Can't Trust

Data integrity now encompasses data trust, emphasizing the importance of reliable data in AI-driven decision-making.
fromThe Walrus
4 days ago

The Man Who Put AI at the Centre of America's War Machine | The Walrus

"War is terrible, war is terrible, war is terrible," he intones, holding my gaze and giving voice to a universal chorus.
DC food
Roam Research
fromThe Cipher Brief
4 days ago

The Chalk Mark Still Matters: Russian Espionage Handling in the Modern Era

Russian intelligence tradecraft has evolved in agent handling, incorporating advanced communication techniques and urban geography for signaling.
Science
fromSilicon Canals
20 hours ago

SpaceX, Amazon, and Google want data centers in orbit - four engineering barriers stand in the way - Silicon Canals

The race for orbital data centers is about controlling the future of computing on Earth, not just computing in space.
US politics
fromwww.npr.org
1 day ago

As DOJ prepares to share state voter data with DHS, a key privacy officer resigns

The DOJ is acquiring sensitive voter registration data, raising privacy concerns, as a key privacy officer resigns amid ongoing legal challenges.
Europe politics
fromNextgov.com
3 days ago

State official to EU: Work with us on tech policy or fall behind a generation

The EU's regulatory regime hinders innovation and collaboration with the U.S., threatening economic competitiveness and technological advancement.
#trump
World politics
fromThe Atlantic
3 days ago

The Perils of One-Man Rule

Trump admires Xi Jinping's strongman leadership, but Xi's ruthlessness is weakening China, as seen in military purges and leadership instability.
#ai
Privacy technologies
fromComputerWeekly.com
2 days ago

Identity and AI: Questions of data security, trust and control | Computer Weekly

AI-driven identity solutions improve access control but raise compliance, privacy, and ethical concerns that organizations must address.
fromHarvard Business Review
5 days ago
Artificial intelligence

AI Agents Act a Lot Like Malware. Here's How to Contain the Risks.

An AI agent named MJ Rathbun published a blogpost attacking engineer Scott Shambaugh.
Privacy technologies
fromComputerWeekly.com
2 days ago

Identity and AI: Questions of data security, trust and control | Computer Weekly

AI-driven identity solutions improve access control but raise compliance, privacy, and ethical concerns that organizations must address.
Privacy professionals
fromSecurityWeek
3 days ago

FBI Warns of Data Security Risks From China-Made Mobile Apps

Foreign-developed mobile applications pose significant data security risks, particularly those from China, according to an FBI alert.
Artificial intelligence
fromTechRepublic
1 day ago

AI Breakthroughs, Security Breaches, and Industry Shakeups Define the Week in Tech - TechRepublic

Tech industry faces rapid AI advancements alongside significant security vulnerabilities and human costs.
fromElectronic Frontier Foundation
1 week ago

Digital Hopes, Real Power: From Revolution to Regulation

66% of internet users live where political or social sites are blocked, and 78% are in countries where people have been arrested for online posts. New social media regulations have emerged in dozens of countries in the past year alone.
World politics
Privacy technologies
fromZDNET
4 days ago

The best way to protect your phone from a warrantless search in 2026

US authorities are increasingly aggressive in detaining and seizing devices, with biometrics remaining vulnerable.
#data-breach
fromSilicon Canals
1 day ago
Privacy professionals

A fintech app asked users for their passports - then left 360,000 files unprotected for five years - Silicon Canals

fromSilicon Canals
2 days ago
Privacy professionals

Fintech apps demand your passport for verification - then leave it on an unprotected server - Silicon Canals

Privacy professionals
fromSilicon Canals
1 day ago

A fintech app asked users for their passports - then left 360,000 files unprotected for five years - Silicon Canals

A money transfer app exposed over 360,000 sensitive files on a public server for nearly five years, including unencrypted personal documents.
Privacy professionals
fromSilicon Canals
2 days ago

Fintech apps demand your passport for verification - then leave it on an unprotected server - Silicon Canals

Duc's exposed server revealed unprotected sensitive personal data, highlighting significant gaps in fintech data protection practices.
Information security
fromSecuritymagazine
1 day ago

AI Startup Mercor, Which Works With Open AI and Anthropic, Confirms Data Breach

Mercor, an AI startup, experienced a data breach involving 4 terabytes of stolen data linked to a supply chain attack by hacking groups.
fromTechCrunch
1 day ago

Anthropic ramps up its political activities with a new PAC | TechCrunch

Anthropic's political activities have ramped up as the company continues to be enmeshed in a nasty legal battle with the Defense Department. The dispute erupted earlier this year over the government's use of Anthropic's AI models and what guidelines (if any) should exist for that usage.
Artificial intelligence
World news
fromIrish Independent
1 day ago

Trump vows to strike civilian infrastructure as Iran strikes at Gulf tech sites

Tehran plans to charge for passage through the Strait of Hormuz, aiming to ensure safe navigation amid rising tensions with the US.
Russo-Ukrainian War
fromwww.theguardian.com
4 days ago

Russia slowly trying to splinter its internet from rest of world, analysts say

Russia is gradually isolating its internet from the world, impacting millions through mobile blackouts and restrictions on essential communication platforms.
EU data protection
fromSecurityWeek
5 days ago

European Commission Reports Cyber Intrusion and Data Theft

The European Commission confirmed a cyberattack that compromised its cloud infrastructure, resulting in the theft of hundreds of gigabytes of data.
Information security
fromWIRED
1 day ago

Meta Pauses Work With Mercor After Data Breach Puts AI Industry Secrets at Risk

Meta has paused work with Mercor due to a major security breach affecting data used for AI training.
Intellectual property law
fromWIRED
1 week ago

AI Research Is Getting Harder to Separate From Geopolitics

NeurIPS faced backlash over restrictions on international participants, particularly affecting Chinese researchers, highlighting tensions between geopolitics and scientific collaboration.
#artificial-intelligence
Artificial intelligence
fromNextgov.com
3 days ago

Old-school spycraft could make a comeback as AI undermines trust

AI may enhance intelligence gathering but also revive traditional espionage methods due to reliability issues with digital communications.
Artificial intelligence
fromNextgov.com
3 days ago

Old-school spycraft could make a comeback as AI undermines trust

AI may enhance intelligence gathering but also revive traditional espionage methods due to reliability issues with digital communications.
EU data protection
fromwww.dw.com
6 days ago

German public sector tries to reduce reliance on US tech

German authorities' data is at risk due to US access through the CLOUD Act, prompting calls for digital sovereignty alternatives.
fromTheregister
1 week ago

Only Trump decides when cyberwar turns into real war

The president should have a lot of leeway in which he determines whether or not the nation's going to respond kinetically. This flexibility is crucial in the evolving landscape of cyber warfare.
World politics
Artificial intelligence
fromTechCrunch
5 days ago

As more Americans adopt AI tools, fewer say they can trust the results | TechCrunch

Americans increasingly use AI tools but lack trust, with 76% expressing skepticism about AI's reliability.
Privacy professionals
fromHer Campus
4 days ago

Who's Watching The Watchers? AI, Age Verification, And Online Privacy

Parents are increasingly concerned about children's exposure to harmful online content despite regulations like CIPA and platforms like YouTube Kids.
fromComputerworld
1 day ago

A core infrastructure engineer pleads guilty to federal charges in insider attack

Rhyne's attack involved unauthorized remote desktop sessions, deletion of network administrator accounts, and changing of passwords, showcasing significant security vulnerabilities.
Information security
Venture
fromThe Cipher Brief
1 month ago

What the Latest Policy and Tech Shifts Mean for National Security

Counter-Unmanned Aerial Systems require integrated, multi-layered defense architectures combining non-kinetic and kinetic responses rather than isolated legacy technologies, as modern autonomous drones render traditional electronic warfare ineffective.
Privacy professionals
fromSilicon Canals
6 days ago

The real US surveillance threat isn't AI - it's the data infrastructure we already built - Silicon Canals

The infrastructure for mass surveillance already exists, relying on pre-existing technology and data rather than new AI advancements.
Information security
fromInfoWorld
1 day ago

CERT-EU blames Trivy supply chain attack for Europa.eu data breach

TeamPCP exploited Trivy to access sensitive cloud credentials and data, creating significant vulnerabilities for organizations.
Information security
fromSecurityWeek
1 day ago

Mobile Attack Surface Expands as Enterprises Lose Control

Mobile device security is inadequate, with many organizations using critically outdated operating systems and exposing sensitive data to potential attacks.
Privacy professionals
fromTheregister
1 week ago

Private sector wants Feds' help to tackle China's Typhoons

Real-time collaboration between public and private sectors on cyber threats was proposed but never implemented, leading to ongoing challenges in combating cybercrime.
Information security
fromTechRepublic
4 days ago

New North Korean AI Hiring Scheme Targets US Companies

A North Korean operative attempted to infiltrate a cybersecurity firm using a stolen identity and AI-generated resume, highlighting vulnerabilities in hiring processes.
Miscellaneous
fromTheregister
1 month ago

'The EU runs on Microsoft' - and Uncle Sam could turn it off

European governments are reducing dependence on US tech by replacing Microsoft services with open-source alternatives to enhance digital sovereignty and support local industry.
Information security
fromTheregister
1 month ago

Google and friends disrupt suspected Beijing espionage op

Google disrupted UNC2814, a China-linked group conducting widespread cyberattacks on telecommunications and government organizations across multiple continents using Google Sheets API for command-and-control operations.
Information security
fromComputerWeekly.com
1 month ago

Western cyber alliances risk fragmenting in new world order | Computer Weekly

Geopolitical fragmentation in 2025 drove cyber shifts toward coercion, disrupted alliances and intelligence sharing, decentralised resilient cybercrime, and intensified US–China AI competition.
Information security
fromThe Hacker News
1 month ago

Google Links China, Iran, Russia, North Korea to Coordinated Defense Sector Cyber Operations

State-sponsored and criminal actors from China, Iran, North Korea, and Russia target the defense industrial base, prioritizing drones, hiring exploitation, edge-device access, and supply-chain risk.
fromComputerWeekly.com
2 months ago

UK and China reach out across cyber no-man's land | Computer Weekly

The so-called 'Cyber Dialogue' will supposedly help manage cyber threats to both country's national security, revealed Bloomberg, which was first to reported the move citing anonymous sources with knowledge of the forum, It claimed that the forum will improve communication, enable private discussions, and deescalate tensions. It also establishes a direct line between London and Beijing to enable senior officials to discuss ongoing cyber incidents.
Information security
fromSecurityWeek
1 month ago

Cyber Insights 2026: Cyberwar and Rising Nation State Threats

Entering the cyber world is stepping into a warzone. Cyber is considered a war zone, and what happens there is described as cyberwar. But it's not that simple. War is conducted by nations (political), not undertaken by criminals (financial). Both are increasing in this war zone we call cyber, but the political threat is growing fast. Cyberwar is a complex subject, and a formal definition is difficult.
Information security
[ Load more ]