Tag: spy
-
How Lazarus Group used fake job ads to spy on Europe’s drone and defense sector
ESET researchers have uncovered a fresh wave of Operation DreamJob, a long-running campaign linked to North Korea’s Lazarus Group. This latest activity targeted several … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/10/23/eset-lazarus-operation-dreamjob/
-
US NSA alleged to have launched a cyber attack on a Chinese agency
Tags: access, attack, authentication, breach, china, ciso, cloud, communications, control, country, cyber, cybersecurity, defense, finance, hacker, infrastructure, international, login, malicious, mfa, monitoring, network, RedTeam, resilience, sans, service, spy, supply-chain, technology“NSA does not confirm nor deny allegations in the media regarding its operations. Our core focus is countering foreign malign activities persistently targeting American interests, and we will continue to defend against adversaries wishing to threaten us.”The Chinese post says the country “shattered the US cyber attack plot of stealing secrets and infiltration and sabotage,…
-
US NSA alleged to have launched a cyber attack on a Chinese agency
Tags: access, attack, authentication, breach, china, ciso, cloud, communications, control, country, cyber, cybersecurity, defense, finance, hacker, infrastructure, international, login, malicious, mfa, monitoring, network, RedTeam, resilience, sans, service, spy, supply-chain, technology“NSA does not confirm nor deny allegations in the media regarding its operations. Our core focus is countering foreign malign activities persistently targeting American interests, and we will continue to defend against adversaries wishing to threaten us.”The Chinese post says the country “shattered the US cyber attack plot of stealing secrets and infiltration and sabotage,…
-
China’s spy agency accuses NSA of yearslong attack on the country’s timekeeping service
The NSA did not confirm nor deny the allegations made by China’s Ministry of State Security. China said the origins of the attack date back to March 2022. First seen on cyberscoop.com Jump to article: cyberscoop.com/china-mss-nsa-cyberattack-timekeeping-service/
-
Government considered destroying its data hub after decade-long intrusion
Tags: access, backdoor, breach, china, data, detection, endpoint, exploit, government, group, Hardware, incident response, infrastructure, network, risk, spy, supply-chain, threat, tool, vpn, vulnerabilityBridewell, a supplier to the UK government critical network infrastructure, endorsed the severity of this approach. He said, “it’s like when a device is compromised, the only way to truly be sure there are no remnants, or unidentified backdoors is to restore the asset to a known good state. In the physical realm, in particular…
-
ThreatsDay Bulletin: $15B Crypto Bust, Satellite Spying, Billion-Dollar Smishing, Android RATs & More
The online world is changing fast. Every week, new scams, hacks, and tricks show how easy it’s become to turn everyday technology into a weapon. Tools made to help us work, connect, and stay safe are now being used to steal, spy, and deceive.Hackers don’t always break systems anymore, they use them. They hide inside…
-
ThreatsDay Bulletin: $15B Crypto Bust, Satellite Spying, Billion-Dollar Smishing, Android RATs & More
The online world is changing fast. Every week, new scams, hacks, and tricks show how easy it’s become to turn everyday technology into a weapon. Tools made to help us work, connect, and stay safe are now being used to steal, spy, and deceive.Hackers don’t always break systems anymore, they use them. They hide inside…
-
ICE bought vehicles equipped with fake cell towers to spy on phones
The federal contract shows ICE spent $825,000 on vans equipped with “cell-site simulators” which allow the real-world location tracking of nearby phones and their owners. First seen on techcrunch.com Jump to article: techcrunch.com/2025/10/07/ice-bought-vehicles-equipped-with-fake-cell-towers-to-spy-on-phones/
-
UK government says digital ID won’t be compulsory honest
Even spy-tech biz Palantir says ‘steady on’ as 2.76M Brits demand it be ditched First seen on theregister.com Jump to article: www.theregister.com/2025/10/03/uk_digital_id_clarity/
-
UK government says digital ID won’t be compulsory honest
Even spy-tech biz Palantir says ‘steady on’ as 2.76M Brits demand it be ditched First seen on theregister.com Jump to article: www.theregister.com/2025/10/03/uk_digital_id_clarity/
-
UK government says digital ID won’t be compulsory honest
Even spy-tech biz Palantir says ‘steady on’ as 2.76M Brits demand it be ditched First seen on theregister.com Jump to article: www.theregister.com/2025/10/03/uk_digital_id_clarity/
-
Chinese APT Phantom Taurus Targeted MS Exchange Servers Over 3 Years
Cybersecurity researchers at Palo Alto Networks’ Unit 42 say Chinese APT Phantom Taurus breached Microsoft Exchange servers for years using a backdoor to spy on diplomats and defense data. First seen on hackread.com Jump to article: hackread.com/chinese-apt-phantom-taurus-ms-exchange-servers/
-
Dutch teens arrested for trying to spy on Europol for Russia
Two Dutch teenage boys aged 17, reportedly used hacking devices to spy for Russia, have been arrested by the Politie on Monday. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/dutch-teens-arrested-for-trying-to-spy-on-europol-for-russia/
-
Google warns of Brickstorm backdoor targeting U.S. legal and tech sectors
China-linked actors used Brickstorm malware to spy on U.S. tech and legal firms, stealing data undetected for over a year, Google warns. Google Threat Intelligence Group (GTIG) observed the use of the Go-based backdoor BRICKSTORM to maintain persistence in U.S. organizations since March 2025. Targets include legal, Software as a Service (SaaS) providers, Business Process Outsourcers…
-
Chinese APT Leans on Researcher PoCs to Spy on Other Countries
RedNovember is both lazy and punctual: always quick to do its homework on new vulnerabilities, but always getting the answers from cyber defenders. First seen on darkreading.com Jump to article: www.darkreading.com/threat-intelligence/chinese-apt-oss-pocs-spy-countries
-
Chinese APT Leans on Researcher PoCs to Spy on Other Countries
RedNovember is both lazy and punctual: always quick to do its homework on new vulnerabilities, but always getting the answers from cyber defenders. First seen on darkreading.com Jump to article: www.darkreading.com/threat-intelligence/chinese-apt-oss-pocs-spy-countries
-
New plan would give Congress another 18 months to revisit Section 702 surveillance powers
Senate Intelligence Chairman Tom Cotton wants to put off debate over rewriting a controversial spy program until 2027, sources say, keeping it out of midterm election season while giving a special panel time to make recommendations. First seen on therecord.media Jump to article: therecord.media/fisa-section-702-legislation-sen-tom-cotton-plan
-
MI6 Opens Dark Web Portal >>Silent Courier<< for Russians to Share Secrets
The UK’s spy agency, MI6, has launched a new dark web portal called Silent Courier to securely recruit agents worldwide, particularly from Russia. Learn how this shift to the dark web marks a new era in modern espionage and national security. First seen on hackread.com Jump to article: hackread.com/mi6-dark-web-portal-silent-courier-russia-secrets/
-
Russian spy groups Turla, Gamaredon join forces to hack Ukraine, researchers say
Slovak cybersecurity firm ESET said it had detected four cases in which both groups compromised the same Ukrainian machines. First seen on therecord.media Jump to article: therecord.media/russian-spy-groups-turla-gamaredon-target-ukraine
-
Panda-monium: China-backed cyber crew spoof Congressman to dig for dirt on US trade talks
Proofpoint spots efforts to spy on US economic policy nerds First seen on theregister.com Jump to article: www.theregister.com/2025/09/18/pandamonium_chinabacked_attackers_spoof_congressman/
-
The Silent Spy: How Chinese Hackers are Exploiting U.S.-China Policy
The post The Silent Spy: How Chinese Hackers are Exploiting U.S.-China Policy appeared first on Daily CyberSecurity. First seen on securityonline.info Jump to article: securityonline.info/the-silent-spy-how-chinese-hackers-are-exploiting-u-s-china-policy/
-
Chinese TA415 Uses VS Code Remote Tunnels to Spy on U.S. Economic Policy Experts
A China-aligned threat actor known as TA415 has been attributed to spear-phishing campaigns targeting the U.S. government, think tanks, and academic organizations utilizing U.S.-China economic-themed lures.”In this activity, the group masqueraded as the current Chair of the Select Committee on Strategic Competition between the United States and the Chinese Communist Party (CCP), as well as…
-
Apple patches critical zero-day in ImageIO amid reports of targeted exploits
Attackers shifting to core image services: Attackers seem to be moving focus to image processing modules in core system software, rather than going after obvious network-facing services or applications. Last week, Samsung patched a critical bug (CVE-2025-21043) affecting its supplied image library ‘libimagecodec.quram.so’ that allowed remote code execution via a crafted image with zero user…
-
Apple patches critical zero-day in ImageIO amid reports of targeted exploits
Attackers shifting to core image services: Attackers seem to be moving focus to image processing modules in core system software, rather than going after obvious network-facing services or applications. Last week, Samsung patched a critical bug (CVE-2025-21043) affecting its supplied image library ‘libimagecodec.quram.so’ that allowed remote code execution via a crafted image with zero user…
-
Apple 0-day likely used in spy attacks affected devices as old as iPhone 8
May have been used in ‘extremely sophisticated’ attacks against ‘specific targeted individuals’ First seen on theregister.com Jump to article: www.theregister.com/2025/09/16/apple_0day_spy_attacks/
-
Samsung fixes Android 0-day that may have been used to spy on WhatsApp messages
A similar vuln on Apple devices was used against ‘specific targeted users’ First seen on theregister.com Jump to article: www.theregister.com/2025/09/12/samsung_fixes_android_0day/
-
Chinese Group Accused of Using Fake U.S. Rep. Email to Spy on Trade Talks
The Chinese state-sponsored group APT41 is accused of using a fake email impersonating a U.S. representative containing spyware and sent to government agencies, trade groups, and laws firms to gain information about U.S. strategy in trade talks with China. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/09/chinese-group-accused-of-using-fake-u-s-rep-email-to-spy-on-trade-talks/
-
Chinese Group Accused of Using Fake U.S. Rep. Email to Spy on Trade Talks
The Chinese state-sponsored group APT41 is accused of using a fake email impersonating a U.S. representative containing spyware and sent to government agencies, trade groups, and laws firms to gain information about U.S. strategy in trade talks with China. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/09/chinese-group-accused-of-using-fake-u-s-rep-email-to-spy-on-trade-talks/
-
Chinese Group Accused of Using Fake U.S. Rep. Email to Spy on Trade Talks
The Chinese state-sponsored group APT41 is accused of using a fake email impersonating a U.S. representative containing spyware and sent to government agencies, trade groups, and laws firms to gain information about U.S. strategy in trade talks with China. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/09/chinese-group-accused-of-using-fake-u-s-rep-email-to-spy-on-trade-talks/
-
ICE Has Spyware Now
Plus: An AI chatbot system is linked to a widespread hack, details emerge of a US plan to plant a spy device in North Korea, your job’s security training isn’t working, and more. First seen on wired.com Jump to article: www.wired.com/story/ice-has-spyware-now/

