#secret-agent

[ follow ]
UK news
fromwww.independent.co.uk
9 hours ago

Britain is losing hybrid war with Russia and cannot cope with conflict, warns ex-aide

The UK is unprepared for major disruptions and needs a strategic response to current global threats.
World news
fromIndependent
1 day ago

Decryption tech breakthrough that helped snare Kinahan may now take down his army of hitmen

Deciphered phone messages led to the arrest of Daniel Kinahan and may help dismantle his criminal organization.
World politics
fromwww.aljazeera.com
3 days ago

Infiltration from Within: Israelis recruited to spy for enemy countries

Israel's intelligence is exposed as flawed, revealing vulnerabilities from internal betrayals and arrogance leading to security failures.
Information security
fromSecurityWeek
1 day ago

China-Linked APT GopherWhisper Abuses Legitimate Services in Government Attacks

GopherWhisper is a newly identified APT using legitimate services for command-and-control communication and data exfiltration, primarily targeting a Mongolian government entity.
US news
fromwww.aljazeera.com
1 day ago

Presence of reported US CIA agents killed in crash not authorised: Mexico

Mexican government investigates unauthorized US agents involved in a drug raid after two were killed in a car crash.
Germany politics
fromThe Local Germany
1 day ago

Germany launches spying probe into Signal attacks targeting MPs

German prosecutors investigate phishing attacks on lawmakers, linked to Russia, highlighting the need for vigilance against espionage threats.
#espionage
Germany news
fromwww.dw.com
3 days ago

Germany news: Bavarian police arrest suspected spies

Two suspected spies were arrested in Bavaria with various suspicious items, charged with espionage and linked to activities outside Germany.
Germany news
fromenglish.elpais.com
1 month ago

Security forces arrest two suspected Russian spies in Germany and Spain

Two individuals were arrested for allegedly spying on a businessman supplying drones to Ukraine, with intentions possibly including his assassination.
Germany news
fromwww.dw.com
3 days ago

Germany news: Bavarian police arrest suspected spies

Two suspected spies were arrested in Bavaria with various suspicious items, charged with espionage and linked to activities outside Germany.
Germany news
fromenglish.elpais.com
1 month ago

Security forces arrest two suspected Russian spies in Germany and Spain

Two individuals were arrested for allegedly spying on a businessman supplying drones to Ukraine, with intentions possibly including his assassination.
fromFast Company
2 days ago

Officials charge a U.S. soldier for using intel on this $400K Polymarket bet

Gannon Ken Van Dyke was part of the operation to capture Maduro in January and used his access to classified information to make money on the prediction market site Polymarket, the federal prosecutor's office in New York said.
US Elections
fromReadWrite
2 days ago

US soldier charged over secret operation betting scheme

Prosecutors argue that Van Dyke's actions meet the definition of insider trading in substance, if not in traditional market form, because they relied on nonpublic military intelligence to generate profit.
Poker
London
fromCN Traveller
2 days ago

Where was Secret Service filmed? The real-life locations behind ITV's gripping spy drama

Secret Service is filmed in various locations including Ealing and Brent, London, showcasing suburban family life and action elements.
Privacy professionals
fromTechCrunch
4 days ago

UK government says 100 countries have spyware that can hack people's phones | TechCrunch

More than half of the world's governments now have access to commercial spyware, increasing risks for citizens and critical infrastructure.
UK politics
fromwww.theguardian.com
3 days ago

Thousands call on UK ministers to cut ties with US tech giant Palantir

Public concern over Palantir's contracts with UK entities has led to petitions urging the government to terminate these agreements.
#artificial-intelligence
fromSecuritymagazine
3 days ago
Artificial intelligence

How Should Effective AI Red Teams Operate?

AI-specific red teaming is essential for organizations to understand and mitigate risks associated with AI tools.
fromNextgov.com
3 weeks ago
Artificial intelligence

Old-school spycraft could make a comeback as AI undermines trust

AI may enhance intelligence gathering but also revive traditional espionage methods due to reliability issues with digital communications.
Artificial intelligence
fromNextgov.com
3 weeks ago

Old-school spycraft could make a comeback as AI undermines trust

AI may enhance intelligence gathering but also revive traditional espionage methods due to reliability issues with digital communications.
#russia
Europe politics
fromwww.thelocal.se
5 days ago

Swedish intelligence says Russia manipulates economic data

Russia is manipulating economic data to project resilience despite a weak economy and ongoing strategic military objectives.
fromLondon Business News | Londonlovesbusiness.com
6 days ago

SAS soldiers quit amid fears of 'witch hunts' over the 'betrayal' of war crimes probes - London Business News | Londonlovesbusiness.com

Many sources have informed The Telegraph that personnel have submitted applications for premature voluntary release, with departures from the regiment described as significant and even considered a 'threat to national security.'
SF politics
World news
fromwww.aljazeera.com
1 day ago

Iran's Infowar: Lego, AI and ever tightening control

The Iranian government employs innovative online strategies for international PR while enforcing strict internet controls domestically.
#cybersecurity
Information security
fromTheregister
3 days ago

China-linked crews turn routers into covert attack proxies

China-linked threat actors exploit compromised routers and IoT devices to create proxy networks for cyber intrusions and data theft.
fromSecurityWeek
4 days ago
Information security

Most Serious Cyberattacks Against the UK Now From Russia, Iran and China, Cyber Chief Says

Information security
fromComputerWeekly.com
3 days ago

Chinese hackers using compromised networks to spy on Western companies, says Five Eyes | Computer Weekly

China-linked hackers are using vulnerable internet-connected devices to obscure espionage and hacking operations against Western organizations.
Information security
fromTheregister
3 days ago

China-linked crews turn routers into covert attack proxies

China-linked threat actors exploit compromised routers and IoT devices to create proxy networks for cyber intrusions and data theft.
Privacy professionals
fromTheregister
5 days ago

Crook claims to leak 'video surveillance footage' of firms

Be Prime confirmed a cybersecurity incident involving alleged access to its surveillance footage and client data by a criminal hacker.
Information security
fromSecurityWeek
4 days ago

Most Serious Cyberattacks Against the UK Now From Russia, Iran and China, Cyber Chief Says

Hostile nations like Russia, Iran, and China are the primary sources of serious cyberattacks in the U.K.
Information security
fromComputerWeekly.com
3 days ago

Chinese hackers using compromised networks to spy on Western companies, says Five Eyes | Computer Weekly

China-linked hackers are using vulnerable internet-connected devices to obscure espionage and hacking operations against Western organizations.
UK politics
fromwww.independent.co.uk
5 days ago

Iran, Russia and China behind most major cyberattacks on UK, security chief warns

The Independent provides critical journalism on key issues without paywalls, emphasizing the importance of accessible reporting.
Privacy professionals
fromFast Company
3 days ago

Meta tracking employee keystrokes to train AI is probably legal. Experts say that doesn't make it ethical

Meta Platforms is implementing software to track employee computer usage to train AI models, raising privacy concerns amid potential layoffs.
Artificial intelligence
fromTechCrunch
6 days ago

NSA spies are reportedly using Anthropic's Mythos, despite Pentagon feud | TechCrunch

The NSA is reportedly using Anthropic's Mythos model for cybersecurity despite previous tensions over access to AI capabilities.
US news
fromwww.npr.org
6 days ago

U.K police investigating if attacks in London are the work of Iranian proxies

London police investigate arson attacks on Jewish sites, suspecting Iranian proxies may be involved.
#cia
fromThe Local Germany
6 days ago

Russia arrests German woman in alleged bomb plot

The FSB security agency stated that the woman, born in 1969, had been dragged into the alleged plot by a citizen from a Central Asian country, who was working on orders from Ukraine.
Germany news
fromwww.theguardian.com
4 days ago

Ian Collard: the Foreign Office insider who may be key to Mandelson scandal

Collard had been having a live dialogue about Mandelson with the separate UK Security Vetting (UKSV) team, based in the Cabinet Office. Collard had then asked to speak to Robbins for what turned out to be a critical meeting: it concluded with Mandelson being granted vetting clearance.
UK politics
fromThe Cipher Brief
2 weeks ago

Why Australia Needs a National Spy Museum

Many of the foundations that have underpinned Australia's security, prosperity and democracy are being tested: social cohesion is eroding, trust in institutions is declining, intolerance is growing, even truth itself is being undermined by conspiracy, mis- and disinformation.
World politics
#russian-intelligence
Python
fromAntocuni
1 month ago

Inside SPy, part 2: Language semantics

SPy aims to enhance Python's performance while integrating static typing, balancing between an interpreter and a compiler.
Privacy professionals
fromWIRED
2 weeks ago

Men Are Buying Hacking Tools to Use Against Their Wives and Friends

Telegram groups facilitate the sale of hacking and surveillance services, promoting abusive content targeting women and girls.
Information security
fromComputerWeekly.com
5 days ago

Nation states responsible for 'nationally significant' cyber attacks against UK, says NCSC chief | Computer Weekly

The UK faces increased cyber security threats from hostile states and AI advancements, with an average of four significant attacks weekly.
Information security
fromAxios
4 days ago

Exclusive: OpenAI briefs feds and Five Eyes on new cyber product

OpenAI demonstrated its GPT-5.4-Cyber model to federal cyber defense practitioners, emphasizing a dual-track access approach for government and commercial users.
Information security
fromWIRED
4 days ago

AI Tools Are Helping Mediocre North Korean Hackers Steal Millions

AI tools have enabled unskilled hackers to execute sophisticated cybercrime operations, resulting in significant financial theft.
#russian-military-intelligence
fromwww.independent.co.uk
1 month ago

Police given more time to question three men arrested on suspicion of spying for Iran

This investigation continues at pace with a number of lines of inquiry being pursued by our detectives. The warrants of further detention for these three men will allow us to continue the investigation, while mitigating any potential risk to the public as we do so. This has been a long-running investigation and part of our ongoing work to disrupt malign activity where we suspect it.
UK news
Privacy technologies
fromInfoWorld
1 month ago

What I learned as an undercover agent on Moltbook

OpenClaw AI agents on Moltbook social network pose severe cybersecurity risks through unauthorized access to sensitive user data and financial systems.
#counter-terrorism
UK news
fromwww.theguardian.com
1 month ago

UK counter-terrorism agents granted more time to question men suspected of spying for Iran

Four men arrested on suspicion of spying for Iran on Jewish community locations and individuals in Britain can be held in custody until 13 March for questioning.
UK news
fromwww.theguardian.com
1 month ago

UK counter-terrorism agents granted more time to question men suspected of spying for Iran

Four men arrested on suspicion of spying for Iran on Jewish community locations and individuals in Britain can be held in custody until 13 March for questioning.
NYC LGBT
fromwww.theguardian.com
1 month ago

Undercover officer deceived women with grotesque and cruel' lies, spycops inquiry told

An undercover police officer engaged in long-term sexual relationships with women through emotional manipulation, deception about his personal life, and fraudulent use of taxpayer funds.
fromLondon Business News | Londonlovesbusiness.com
2 months ago

Former UK spy chief warns Putin 'is more comfortable than he should be' - London Business News | Londonlovesbusiness.com

Sir Richard Moore the former UK's MI6 spy chief has told Sky News that he finds the tens of thousands of Russian troops killed in Ukraine just in December 2025, "astonishing." Vladimir Putin has lost more troops in Ukraine during fighting in December 2025 than Moscow lost during the ten-year Soviet-Afghan war. The Soviet-Afghan war started in 1979 until 1989 and around 20,000 Soviet soldiers were killed. The Russia President Mikhail Gorbachev called the war a "bleeding wound" and was viewed as a "humiliating mistake." Putin has made the same mistake as Gorbachev made in 1979, as he believed the Afghan war would be a "quick operation," as Moscow wanted to takeover Afghanistan.
Miscellaneous
World politics
fromNextgov.com
1 month ago

Russia-linked hackers appear on Iran war's cyber front, but their impact is murky

Russia-linked hacktivist groups supporting Iran have increased cyber activity against U.S. and Israeli targets during the Middle East conflict, though their impact remains unclear and largely unverified.
US news
fromwww.theguardian.com
1 month ago

The Russian honeytrap: alleged spy for Moscow faces five years in US prison

Nomma Zarubina, an FSB-recruited Russian intelligence operative, pleaded guilty to lying to the FBI about her contacts with Russian intelligence while posing as a legitimate activist to infiltrate American political and academic circles.
fromThe Cipher Brief
2 months ago

The Kremlin Files: Russian Double Agents and Operational Games

A double agent, by contrast, is an intelligence asset who is knowingly and deliberately directed by one service to engage another in espionage. The controlling service uses that agent to feed information (called feed material) -true, false, or mixed-to the adversary. They do so to simultaneously study the adversary's tradecraft, collection priorities, and decision-making. In the Russian system, double agents also serve a bureaucratic function: they generate statistics, "success stories," and operational narratives that demonstrate effectiveness to political overseers and ultimately to Putin himself.
World news
fromTheregister
2 months ago

Hackers suspected of spying on UK officials' calls for years

The Telegraph reports that the activity focused on phones used by senior aides around former prime ministers Boris Johnson, Liz Truss, and Rishi Sunak, with the suspected access stretching back to 2021. Intelligence sources described the compromise as extensive, with one saying the activity went "right into the heart of Downing Street," although it remains unclear whether the prime ministers' own devices were accessed directly.
UK news
UK politics
fromwww.independent.co.uk
2 months ago

Universities and politicians briefed on China and Russia spy threat

UK intelligence warns universities and politicians about significant foreign interference from China and Russia, citing recruitment, LinkedIn approaches, and financial inducements to influence research and politics.
UK news
fromwww.theguardian.com
2 months ago

Burner phones and lead-lined bags: a history of UK security tactics in China

UK prime ministers and entourages use burner phones, temporary emails, and other countermeasures during China visits due to expected Chinese espionage and surveillance.
fromwww.theguardian.com
1 month ago

North Korean agents using AI to trick western firms into hiring them, Microsoft says

The scam typically involves state-backed fraudsters applying for remote IT work in the west, using fake identities and the help of facilitators in the country where the company targeted is based. Once hired, they send their wages back to Kim Jong-un's state and have even been known to threaten to release sensitive company data after being fired.
Information security
[ Load more ]