Tag: spy
-
Smart Buses flaws expose vehicles to tracking, control, and spying
Researchers showed how hackers can exploit flaws in a bus’ onboard and remote systems for tracking, control and spying. Researchers Chiao-Lin ‘Steven Meow’ Yu of Trend Micro Taiwan and Kai-Ching ‘Keniver’ Wang of CHT Security, found that vulnerabilities in smart bus systems could let hackers remotely track, control, or spy on vehicles, exposing risks from…
-
NSA partnering with cyber firms to support under-resourced defense contractors
The spy agency has sought out creative ways to help protect small companies supplying the U.S. military. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/nsa-defense-contractors-cybersecurity-help-black-hat/757169/
-
Russia Uses ISPs to Spy on Diplomats, Warns Microsoft
Russian Intelligence Tied to SSL Stripping Attacks Designed for Eavesdropping. Russian intelligence since 2024 has been using their country’s internet service providers to run adversary-in-the-middle attacks designed to infect diplomats inside the country’s borders with intelligence-gathering malware, Microsoft warns. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/russia-uses-isps-to-spy-on-diplomats-warns-microsoft-a-29113
-
Top spy says LinkedIn profiles that list defense work ‘recklessly invite attention of foreign intelligence services’
Workers on joint US/UK/Australia nuclear submarine program are painting a target on themselves First seen on theregister.com Jump to article: www.theregister.com/2025/08/01/asio_espionage_social_media_warning/
-
Spying on People Through Airportr Luggage Delivery Service
Airportr is a service that allows passengers to have their luggage picked up, checked, and delivered to their destinations. As you might expect, it’s used by wealthy or important people. So if the company’s website is insecure, you’d be able to spy on lots of wealthy or important people. And maybe even steal their luggage.…
-
Top spy says LinkedIn profiles that list defence work ‘recklessly invite attention of foreign intelligence services’
Workers on joint US/UK/Australia nuclear submarine program are painting a target on themselves First seen on theregister.com Jump to article: www.theregister.com/2025/08/01/asio_espionage_social_media_warning/
-
Russian State Hackers Spy on Moscow Embassies via ISP-Level AiTM Attacks
The post Russian State Hackers Spy on Moscow Embassies via ISP-Level AiTM Attacks appeared first on Daily CyberSecurity. First seen on securityonline.info Jump to article: securityonline.info/russian-state-hackers-spy-on-moscow-embassies-via-isp-level-aitm-attacks/
-
Kremlin goons caught abusing ISPs to spy on Moscow-based diplomats, Microsoft says
Russia spying on foreign embassies? Say it ain’t so First seen on theregister.com Jump to article: www.theregister.com/2025/07/31/kremlin_goons_caught_abusing_isps/
-
Humans can be tracked with unique ‘fingerprint’ based on how their bodies block Wi-Fi signals
Wi-Fi spy with my little eye that same guy I saw at another hotspot First seen on theregister.com Jump to article: www.theregister.com/2025/07/22/whofi_wifi_identifier/
-
Humans can be tracked with unique ‘fingerprint’ based on how their bodies block Wi-Fi signals
Wi-Fi spy with my little eye that same guy I saw at another hotspot First seen on theregister.com Jump to article: www.theregister.com/2025/07/22/whofi_wifi_identifier/
-
Iran-Linked DCHSpy Android Malware Masquerades as VPN Apps to Spy on Dissidents
Cybersecurity researchers have unearthed new Android spyware artifacts that are likely affiliated with the Iranian Ministry of Intelligence and Security (MOIS) and have been distributed to targets by masquerading as VPN apps and Starlink, a satellite internet connection service offered by SpaceX.Mobile security vendor Lookout said it discovered four samples of a surveillanceware tool it…
-
House hearing will use Stuxnet to search for novel ways to confront OT cyberthreats
The House Homeland Committee will revisit the malware to use the knowledge from the spy effort to explore the domestic threats facing the U.S. in 2025. First seen on cyberscoop.com Jump to article: cyberscoop.com/house-homeland-stuxnet-hearing-garbarino-critical-infrastructure-ot/
-
US Treasury Department sanctions individuals and entities over illegal IT worker scheme
How not to hire a North Korean IT spy (Apr 14, 2025)North Korean group infiltrated 100-plus companies with imposter IT pros: CrowdStrike report (Aug 6, 2024)North Korean hackers impersonated recruiters to steal credentials from over 1,500 developer systems (Jan 30, 2025)> First seen on csoonline.com Jump to article: www.csoonline.com/article/4019820/us-treasury-department-sanctions-individuals-and-entities-over-illegal-it-worker-scheme.html
-
Chinese Data Leak Reveals Salt Typhoon Contractors
China’s Hack-For-Hire Scene Disgorges Another Leak. The Chinese nation-state threat actor tracked as Salt Typhoon is operated by a clutch of private firms whose clients include multiple Chinese government agencies, finds analysis of leaked data by Spy Cloud. Researchers found a spreadsheet listing buyers, sellers and financial transaction details. First seen on govinfosecurity.com Jump to…
-
Chinese Data Leak Reveals Salt Typhoon Contractors
China’s Hack-For-Hire Scene Disgorges Another Leak. The Chinese nation-state threat actor tracked as Salt Typhoon is operated by a clutch of private firms whose clients include multiple Chinese government agencies, finds analysis of leaked data by Spy Cloud. Researchers found a spreadsheet listing buyers, sellers and financial transaction details. First seen on govinfosecurity.com Jump to…
-
NightEagle hackers exploit Microsoft Exchange flaw to spy on China’s strategic sectors
Attackers pursued stealthy persistence: Following successful exploitation of the zero-day, attackers deploy a modified Go-based version of Chisel, an open-source SOCKS tunneling tool, scheduling it to run every four hours and establish covert tunnels to their C2 servers.This allowed them to move in and out of the network whenever they wanted, enabling persistence for over…
-
A flaw in Catwatchful spyware exposed logins of +62,000 users
A flaw in Catwatchful spyware exposed logins of 62,000 users, turning the spy tool into a data leak, security researcher Eric Daigle revealed. A flaw in the Catwatchful Android spyware exposed its full user database, leaking email addresses and plaintext passwords of both customers and its admin, TechCrunch first reported. Security researcher Eric Daigle first discovered…
-
A flaw in Catwatchful spyware exposed logins of +62,000 users
A flaw in Catwatchful spyware exposed logins of 62,000 users, turning the spy tool into a data leak, security researcher Eric Daigle revealed. A flaw in the Catwatchful Android spyware exposed its full user database, leaking email addresses and plaintext passwords of both customers and its admin, TechCrunch first reported. Security researcher Eric Daigle first discovered…
-
Second espionage-linked cyberattack hits ICC, exposing persistent threats to global justice systems
Tags: attack, crime, crimes, cyber, cyberattack, cybersecurity, data, disinformation, espionage, identity, infrastructure, intelligence, international, Internet, office, resilience, russia, spy, threat, ukrainePattern of sophisticated cyber espionage: This marks the second major cybersecurity incident targeting the ICC in recent years. In September 2023, the court disclosed it had suffered what it later characterized as “a targeted and sophisticated attack with the objective of espionage” that was “a serious attempt to undermine the Court’s mandate.”According to reports following…
-
Ghost in the Machine: A Spy’s Digital Lifeline
Tags: access, ai, attack, authentication, best-practice, cloud, communications, control, country, crypto, cyber, data, encryption, endpoint, framework, government, Hardware, identity, infrastructure, intelligence, jobs, law, linux, mfa, military, network, resilience, risk, software, spy, strategy, technology, threat, tool, vpn, windows, zero-trust -
Hired Hacker Assists Drug Cartel in Finding, Killing FBI Sources
According to a government report, El Chapo’s Sinaloa drug cartel used a hacker to spy on people connected to the FBI’s 2018 investigation against the kingpin, which led to deadly consequences. First seen on darkreading.com Jump to article: www.darkreading.com/cyberattacks-data-breaches/hacker-drug-cartel-killing-fbi-sources
-
SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 51
Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape Ransomware Gangs Collapse as Qilin Seizes Control Dissecting a Python Ransomware distributed through GitHub repositories SparkKitty, SparkCat’s little brother: A new Trojan spy found in the App Store and Google Play Uncovering a Tor-Enabled Docker Exploit…
-
Bluetooth flaws could let hackers spy through your microphone
Vulnerabilities affecting a Bluetooth chipset present in more than two dozen audio devices from ten vendors can be exploited for eavesdropping or stealing sensitive information. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/bluetooth-flaws-could-let-hackers-spy-through-your-microphone/
-
Hackers Make Hay? Smart Tractors Vulnerable to Full Takeover
Hackers can spy on tens of thousands of connected tractors in the latest IoT threat, and brick them too, thanks to poor security in an aftermarket steering system. First seen on darkreading.com Jump to article: www.darkreading.com/cloud-security/hackers-hay-smart-tractors-vulnerable-takeover
-
Salt Typhoon Targets Telecoms via Router Flaws, Warn FBI and Canada
Salt Typhoon, a China-linked group, is exploiting router flaws to spy on global telecoms, warns a joint FBI and Canadian advisory issued in June 2025. First seen on hackread.com Jump to article: hackread.com/salt-typhoon-targets-telecoms-router-flaws-fbi-canada/
-
Chinese Hackers Turn Unpatched Routers Into ORB Spy Network
ShortLeash Backdoor Hijacks SOHO Linux Devices. Likely Chinese nation-state hackers are converting Internet of Things devices including Ruckus Wireless home routers into an operational relay box network – a run of infections creating more digital infrastructure almost certainly used for cyberespionage. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/chinese-hackers-turn-unpatched-routers-into-orb-spy-network-a-28784
-
Argentina uncovers suspected Russian spy ring behind disinformation campaigns
Argentina’s government told local media that authorities had detected an operation led by Russians that was spreading propaganda and disinformation. First seen on therecord.media Jump to article: therecord.media/argentina-russia-spies-disinformation-project-lakhta
-
Spy ships, cyber-attacks and shadow fleets: the crack security team braced for trouble at sea
As international tensions mount and hackers grow more sophisticated and audacious, the Nordic Maritime Cyber Resilience Centre is constantly monitoring the global threat of war, terror and piracyShips being taken over remotely by hackers and made to crash is a scenario made in Hollywood. But in a security operations room in Oslo, just a few…
-
UK appoints first-ever female chief of foreign intelligence service MI6
Blaise Metreweli, previously the leader of MI6’s real-life “Q branch” responsible for technology and innovation, is now the spy agency’s chief. First seen on therecord.media Jump to article: therecord.media/blaise-metreweli-new-mi6-chief

