#telecommunications-espionage

[ follow ]
#signal
Privacy technologies
fromThe Local Germany
7 hours ago

As phishing attacks hit Germany - how secure is Signal messenging app?

Signal, a secure messaging app, faces phishing attacks linked to Russian groups, raising concerns about its security despite its end-to-end encryption.
Apple
fromArs Technica
3 days ago

Apple stops weirdly storing data that let cops spy on Signal chats

Signal's patch deletes preserved notifications and prevents future preservation for deleted apps, but user concerns about privacy remain.
Privacy technologies
fromThe Local Germany
7 hours ago

As phishing attacks hit Germany - how secure is Signal messenging app?

Signal, a secure messaging app, faces phishing attacks linked to Russian groups, raising concerns about its security despite its end-to-end encryption.
Apple
fromArs Technica
3 days ago

Apple stops weirdly storing data that let cops spy on Signal chats

Signal's patch deletes preserved notifications and prevents future preservation for deleted apps, but user concerns about privacy remain.
#cybersecurity
Careers
fromEntrepreneur
1 day ago

How to Know Where Your Security Threat Is Before It's Too Late

Organizations winning the security talent war operationalize key questions to prevent knowledge loss and enhance cybersecurity resilience.
Careers
fromEntrepreneur
1 day ago

How to Know Where Your Security Threat Is Before It's Too Late

Organizations winning the security talent war operationalize key questions to prevent knowledge loss and enhance cybersecurity resilience.
Privacy professionals
fromThe Hacker News
2 days ago

NASA Employees Duped in Chinese Phishing Scheme Targeting U.S. Defense Software

A Chinese national impersonated U.S. researchers to obtain sensitive information from NASA and other entities, violating export control laws.
Privacy technologies
fromMail Online
2 days ago

How to create secure passwords - it might be time to switch to passkey

Using unique passwords and transitioning to passkeys enhances online security and reduces the risk of cyber threats.
Germany politics
fromThe Local Germany
1 day ago

Germany launches spying probe into Signal attacks targeting MPs

German prosecutors investigate phishing attacks on lawmakers, linked to Russia, highlighting the need for vigilance against espionage threats.
Information security
fromSecurityWeek
1 day ago

China-Linked APT GopherWhisper Abuses Legitimate Services in Government Attacks

GopherWhisper is a newly identified APT using legitimate services for command-and-control communication and data exfiltration, primarily targeting a Mongolian government entity.
#ai
Artificial intelligence
fromFuturism
5 hours ago

Experts Warn of AI Swarms Hijacking Democracy With Fake Citizens

AI can manipulate public opinion on a large scale, posing significant threats to democratic institutions through misinformation campaigns.
Information security
fromSecurityWeek
3 days ago

AI Can Autonomously Hack Cloud Systems With Minimal Oversight: Researchers

AI systems can autonomously hack cloud environments, demonstrating advanced capabilities in executing sophisticated attacks without specific instructions.
Artificial intelligence
fromFuturism
5 hours ago

Experts Warn of AI Swarms Hijacking Democracy With Fake Citizens

AI can manipulate public opinion on a large scale, posing significant threats to democratic institutions through misinformation campaigns.
Information security
fromSecurityWeek
3 days ago

AI Can Autonomously Hack Cloud Systems With Minimal Oversight: Researchers

AI systems can autonomously hack cloud environments, demonstrating advanced capabilities in executing sophisticated attacks without specific instructions.
US politics
fromWIRED
2 days ago

The Latest Push to Extend Key US Spy Powers Is Still a Mess

The bill lacks meaningful constitutional safeguards and allows broad discretion to the attorney general regarding access to the 702 program.
World news
fromIndependent
1 day ago

Decryption tech breakthrough that helped snare Kinahan may now take down his army of hitmen

Deciphered phone messages led to the arrest of Daniel Kinahan and may help dismantle his criminal organization.
Startup companies
fromFuturism
1 day ago

Your Former Employer Is Selling Your Slacks and Emails to Train AI

Founders of defunct startups are monetizing their digital remains, such as Slack messages and emails, through a growing ecosystem of buyers and middlemen.
#ai-security
fromAxios
3 days ago
Privacy professionals

U.S. accuses China of "industrial-scale" campaigns to steal AI secrets

Intellectual property law
fromTechRepublic
3 days ago

White House Says China-Linked Actors Tried to 'Steal American AI'

Foreign entities, particularly from China, are allegedly extracting American AI models through unauthorized methods, raising national security concerns.
Privacy professionals
fromAxios
3 days ago

U.S. accuses China of "industrial-scale" campaigns to steal AI secrets

China-based actors are using proxy accounts to exploit U.S. AI models and extract proprietary information.
Information security
fromSecuritymagazine
4 days ago

Unauthorized Users Accessed Claude Mythos, New Reports Suggest

Unauthorized access to Anthropic's AI model, Claude Mythos Preview, raises security concerns among experts due to its ability to identify digital vulnerabilities.
World politics
fromwww.aljazeera.com
3 days ago

Infiltration from Within: Israelis recruited to spy for enemy countries

Israel's intelligence is exposed as flawed, revealing vulnerabilities from internal betrayals and arrogance leading to security failures.
California
fromABC7 San Francisco
1 day ago

Copper thieves slicing telephone lines in North Bay, cutting phone and Wi-Fi service

Copper wire thefts in Sonoma County are disrupting phone and internet services for residents.
US news
fromFortune
1 day ago

North Korean IT workers are stealing remote jobs and raking in billions-and Americans are helping them do it | Fortune

Kejia Wang was sentenced to nine years for leading a fraud scheme involving North Korean IT workers in U.S. companies.
#remote-work
fromWRAL.com
3 days ago
Remote teams

One Tech Tip: Logging on at a cafe? Privacy and security guidelines for remote workers

Remote teams
fromSFGATE
3 days ago

One Tech Tip: Logging on at a cafe? Privacy and security guidelines for remote workers

Remote work in public spaces offers flexibility but poses privacy and security risks that require precautions.
Remote teams
fromAP News
3 days ago

One Tech Tip: Logging on at a cafe? Privacy and security guidelines for remote workers

Remote work offers flexibility but comes with privacy and security risks when working in public spaces.
Remote teams
fromFast Company
3 days ago

4 tips for remote workers to safeguard data and privacy

Remote work in public spaces offers convenience but poses privacy and security risks that require precautions.
Remote teams
fromFast Company
3 days ago

4 tips for remote workers to safeguard data and privacy

Remote work in public spaces offers convenience but poses privacy and security risks that require careful management.
Remote teams
fromFast Company
3 days ago

4 tips for remote workers to safeguard data and privacy

Remote work in public spaces offers convenience but poses privacy and security risks that require precautions.
Remote teams
fromWRAL.com
3 days ago

One Tech Tip: Logging on at a cafe? Privacy and security guidelines for remote workers

Remote work offers flexibility but poses privacy and security risks in public spaces.
Remote teams
fromSFGATE
3 days ago

One Tech Tip: Logging on at a cafe? Privacy and security guidelines for remote workers

Remote work in public spaces offers flexibility but poses privacy and security risks that require precautions.
Remote teams
fromAP News
3 days ago

One Tech Tip: Logging on at a cafe? Privacy and security guidelines for remote workers

Remote work offers flexibility but comes with privacy and security risks when working in public spaces.
DevOps
fromTechRepublic
2 years ago

What is Cloud Security? Fundamental Guide

Cloud security requires specialized processes and technologies to protect assets and data from evolving threats in a dynamic environment.
fromFast Company
2 days ago

Officials charge a U.S. soldier for using intel on this $400K Polymarket bet

Gannon Ken Van Dyke was part of the operation to capture Maduro in January and used his access to classified information to make money on the prediction market site Polymarket, the federal prosecutor's office in New York said.
US Elections
#palantir
UK politics
fromwww.theguardian.com
3 days ago

Thousands call on UK ministers to cut ties with US tech giant Palantir

Public concern over Palantir's contracts with UK entities has led to petitions urging the government to terminate these agreements.
Privacy professionals
fromTechCrunch
1 day ago

Palantir is reportedly helping the IRS investigate financial crimes | TechCrunch

Palantir has assisted the IRS in investigating financial crimes, receiving $130 million since 2018 for its data analysis software.
UK politics
fromwww.theguardian.com
3 days ago

Thousands call on UK ministers to cut ties with US tech giant Palantir

Public concern over Palantir's contracts with UK entities has led to petitions urging the government to terminate these agreements.
Privacy professionals
fromTechCrunch
1 day ago

Palantir is reportedly helping the IRS investigate financial crimes | TechCrunch

Palantir has assisted the IRS in investigating financial crimes, receiving $130 million since 2018 for its data analysis software.
fromwww.cbc.ca
3 days ago

Police arrest 3 people in cybercrime investigation, seize SMS blasters' used to defraud victims | CBC News

The investigation began in November 2025, when police were alerted to a suspected SMS blaster operating in downtown Toronto. Police later determined that the blaster was operating out of a car, which allowed it to move around the city and Greater Toronto Area.
Canada news
fromSecuritymagazine
4 days ago

Hackers Claim 19M Records Stolen From French Government Agency

"No action is required from users," the agency's statement on the matter says. "However, they are advised to remain highly vigilant regarding any suspicious or unusual messages they may receive (SMS, phone calls, emails, etc.) that appear to come from ANTS."
France news
#ransomware
Healthcare
fromNextgov.com
5 days ago

Former FBI official proposes terror designations for ransomware hackers targeting hospitals

Ransomware actors targeting critical infrastructure may be designated as terrorists, allowing for expanded legal actions against them.
Law
fromTheregister
5 days ago

Third ransomware pro pleads guilty to cybercrime U-turn

Angelo Martino pleaded guilty to aiding the ALPHV/BlackCat ransomware gang in extorting US businesses.
Information security
fromFuturism
2 hours ago

Ransomware Negotiator Pleads Guilty to Deploying Ransomware Himself

A ransomware negotiator conspired with hackers, betraying clients and facilitating attacks against multiple companies.
Healthcare
fromNextgov.com
5 days ago

Former FBI official proposes terror designations for ransomware hackers targeting hospitals

Ransomware actors targeting critical infrastructure may be designated as terrorists, allowing for expanded legal actions against them.
Law
fromTheregister
5 days ago

Third ransomware pro pleads guilty to cybercrime U-turn

Angelo Martino pleaded guilty to aiding the ALPHV/BlackCat ransomware gang in extorting US businesses.
Information security
fromFuturism
2 hours ago

Ransomware Negotiator Pleads Guilty to Deploying Ransomware Himself

A ransomware negotiator conspired with hackers, betraying clients and facilitating attacks against multiple companies.
Fundraising
fromIndependent
6 days ago

Company has more than 2m stolen from account following cyber attack

Future Energy Capital Limited lost over €2m due to a cyber attack last October.
fromTechCrunch
2 days ago

Another spyware maker caught distributing fake Android snooping apps | TechCrunch

Morpheus, a new malware identified by Osservatorio Nessuno, masquerades as a phone updating app and is capable of stealing a broad range of data from an intended target's device.
Privacy professionals
fromwww.dw.com
3 days ago

Germany news: Bavarian police arrest suspected spies

The two men had been arrested during a routine check on the A6 autobahn near the small town of Neuendettelsau just outside Nuremberg on April 12.
Germany news
UK politics
fromwww.independent.co.uk
4 days ago

Iran, Russia and China behind most major cyberattacks on UK, security chief warns

The Independent provides critical journalism on key issues without paywalls, emphasizing the importance of accessible reporting.
Artificial intelligence
fromTechCrunch
6 days ago

NSA spies are reportedly using Anthropic's Mythos, despite Pentagon feud | TechCrunch

The NSA is reportedly using Anthropic's Mythos model for cybersecurity despite previous tensions over access to AI capabilities.
#data-privacy
Privacy professionals
fromNextgov.com
1 day ago

Tech bills of the week: Creating data privacy standards; Securing critical infrastructure from drones; and more

Republican lawmakers introduced two data privacy bills focusing on consumer control and national standards for data management.
Privacy professionals
fromNextgov.com
1 day ago

Tech bills of the week: Creating data privacy standards; Securing critical infrastructure from drones; and more

Republican lawmakers introduced two data privacy bills focusing on consumer control and national standards for data management.
Apple
fromThe Hacker News
3 days ago

Apple Patches iOS Flaw That Stored Deleted Signal Notifications in FBI Forensic Case

Apple has released a software update to fix a flaw in iOS and iPadOS that retained deleted notifications on devices.
#anthropic
Information security
fromEngadget
4 days ago

Anthropic is investigating 'unauthorized access' of its Mythos cybersecurity tool

Anthropic is investigating unauthorized access to its Claude Mythos model, which is designed to identify cybersecurity flaws.
Information security
fromEngadget
4 days ago

Anthropic is investigating 'unauthorized access' of its Mythos cybersecurity tool

Anthropic is investigating unauthorized access to its Claude Mythos model, which is designed to identify cybersecurity flaws.
Information security
fromSecurityWeek
2 days ago

US Federal Agency's Cisco Firewall Infected With 'Firestarter' Backdoor

A US federal agency was infected with malware due to vulnerabilities in Cisco firewalls linked to a China-backed espionage campaign.
Privacy professionals
fromTechCrunch
4 days ago

UK government says 100 countries have spyware that can hack people's phones | TechCrunch

More than half of the world's governments now have access to commercial spyware, increasing risks for citizens and critical infrastructure.
Privacy professionals
fromFast Company
3 days ago

Meta tracking employee keystrokes to train AI is probably legal. Experts say that doesn't make it ethical

Meta Platforms is implementing software to track employee computer usage to train AI models, raising privacy concerns amid potential layoffs.
Privacy professionals
fromFast Company
3 days ago

How the government is ramping up mass surveillance with AI-driven tech

Surveillance capitalism collects extensive personal data through various devices and technologies, often without user consent or effective opt-out options.
#malware
Information security
fromTheregister
2 days ago

CISA, NCSC issue Firestarter backdoor warning

Firestarter malware targets a US federal agency, maintaining persistent access to compromised devices, posing risks to government and critical infrastructure.
Information security
fromThe Hacker News
1 day ago

Researchers Uncover Pre-Stuxnet 'fast16' Malware Targeting Engineering Software

A new Lua-based malware, fast16, predates Stuxnet and targets high-precision calculation software for cyber sabotage.
Information security
fromTheregister
2 days ago

Researchers find sabotage malware that may predate Stuxnet

Malware named fast16 aims to sabotage engineering and physics simulation software, predating Stuxnet and targeting high-precision tools.
Information security
fromTechRepublic
4 days ago

Fake Google Antigravity Installer Can Steal Accounts in Minutes

A fake Google Antigravity download exposes user accounts to compromise by delivering malware alongside the legitimate application.
Information security
fromTheregister
2 days ago

CISA, NCSC issue Firestarter backdoor warning

Firestarter malware targets a US federal agency, maintaining persistent access to compromised devices, posing risks to government and critical infrastructure.
Information security
fromThe Hacker News
1 day ago

Researchers Uncover Pre-Stuxnet 'fast16' Malware Targeting Engineering Software

A new Lua-based malware, fast16, predates Stuxnet and targets high-precision calculation software for cyber sabotage.
Information security
fromTheregister
2 days ago

Researchers find sabotage malware that may predate Stuxnet

Malware named fast16 aims to sabotage engineering and physics simulation software, predating Stuxnet and targeting high-precision tools.
Information security
fromTechRepublic
4 days ago

Fake Google Antigravity Installer Can Steal Accounts in Minutes

A fake Google Antigravity download exposes user accounts to compromise by delivering malware alongside the legitimate application.
Information security
fromTechCrunch
3 days ago

Surveillance vendors caught abusing access to telcos to track people's phone locations, researchers say | TechCrunch

Two spying campaigns exploit telecom infrastructure weaknesses to track individuals' locations, revealing ongoing vulnerabilities in global phone networks.
Information security
fromIT Brew
2 days ago

Asking around: When does ransomware threat intelligence become noise?

Effective threat intelligence requires filtering information relevant to specific market segments to avoid overwhelming alerts.
Information security
fromSecurityWeek
2 days ago

Why Cybersecurity Must Rethink Defense in the Age of Autonomous Agents

Agentic AI is transforming cybersecurity, presenting both opportunities for defenders and risks for attackers, necessitating a strategic response from the industry.
Information security
fromArs Technica
2 days ago

Now, even ransomware is using post-quantum cryptography

Kyber's use of PQC key-exchange algorithms serves more as a marketing tactic than a practical security measure against imminent quantum threats.
Information security
fromWIRED
4 days ago

AI Tools Are Helping Mediocre North Korean Hackers Steal Millions

AI tools have enabled unskilled hackers to execute sophisticated cybercrime operations, resulting in significant financial theft.
Information security
fromZDNET
3 days ago

The shadowy SIM farms behind those incessant scam texts - and how to stay safe

SIM farms are used by cybercriminals for financial fraud, spam, phishing, and online product scalping.
Information security
fromFortune
3 days ago

Former national cyber director: Anthropic's 'Mythos' AI can hack nearly anything and we aren't ready | Fortune

Mythos, Anthropic's advanced AI model, poses significant risks to critical infrastructure, necessitating urgent investment and collaboration to enhance cybersecurity.
Information security
fromComputerWeekly.com
4 days ago

Nation states responsible for 'nationally significant' cyber attacks against UK, says NCSC chief | Computer Weekly

The UK faces increased cyber security threats from hostile states and AI advancements, with an average of four significant attacks weekly.
Information security
fromTechCrunch
1 month ago

The mystery of a globetrotting iPhone-hacking toolkit

A sophisticated iPhone hacking toolkit called Coruna, likely developed by U.S. military contractor L3Harris, was stolen and used by Russian and Chinese hackers to target victims in Ukraine and China.
Information security
fromTechCrunch
1 month ago

A suite of government hacking tools targeting iPhones is now being used by cybercriminals | TechCrunch

Government-designed iPhone exploit kit Coruna leaked from surveillance vendor to cybercriminals, Russian espionage groups, and Chinese hackers, demonstrating how state-sponsored tools proliferate into criminal markets.
fromComputerworld
1 month ago

FBI wiretap system tapped by hackers

The FBI identified and addressed suspicious activities on FBI networks, and we have leveraged all technical capabilities to respond.
Information security
Information security
fromtechcrunch.com
1 month ago

FBI investigating hack on its wiretap and surveillance systems: report

Hackers breached FBI networks managing wiretaps and foreign intelligence surveillance warrants, marking another major U.S. government cybersecurity incident amid ongoing threats from Chinese and Russian threat actors.
Information security
fromSecurityWeek
2 months ago

Cyberspy Group Hacked Governments and Critical Infrastructure in 37 Countries

A state-sponsored cyberespionage group TGR-STA-1030 (Shadow Campaign) compromised at least 70 organizations across 37 countries and targeted government infrastructure in 155 countries.
[ Load more ]