#china-linked-hacking

[ follow ]
#iran
World news
fromwww.aljazeera.com
16 hours ago

Iran expands limited internet access but restrictions remain for most

Limited internet access in Iran is expanding for select individuals, while the majority remain disconnected amid ongoing conflict.
World news
fromnews.bitcoin.com
2 days ago

Iran's Digital Blockade Continues: Citizens Endure 50 Days Without Internet Connectivity

Iran's 50-day digital blockade has reduced internet connectivity to 2%, causing $1.8 billion in economic losses.
World news
fromwww.aljazeera.com
16 hours ago

Iran expands limited internet access but restrictions remain for most

Limited internet access in Iran is expanding for select individuals, while the majority remain disconnected amid ongoing conflict.
World news
fromnews.bitcoin.com
2 days ago

Iran's Digital Blockade Continues: Citizens Endure 50 Days Without Internet Connectivity

Iran's 50-day digital blockade has reduced internet connectivity to 2%, causing $1.8 billion in economic losses.
US news
fromWIRED
23 hours ago

The Weird, Twisting Tale of How China Spied on Alysa Liu and Her Dad

A Chinese operative stalked a US figure skater's family, attempting to gather personal information under false pretenses.
#palantir
Right-wing politics
fromwww.aljazeera.com
2 hours ago

Technofacism? Why Palantir's pro-West manifesto' has critics alarmed

Palantir's manifesto advocates for national service, defense participation, and hard power, raising concerns about its implications for democracy and societal values.
World politics
fromwww.aljazeera.com
22 hours ago

Technofascism': Critics accuse Palantir of pushing AI war doctrine

Palantir's CEO advocates for using advanced software to enhance US military power and warns of AI weaponization by adversaries.
Right-wing politics
fromwww.aljazeera.com
2 hours ago

Technofacism? Why Palantir's pro-West manifesto' has critics alarmed

Palantir's manifesto advocates for national service, defense participation, and hard power, raising concerns about its implications for democracy and societal values.
World politics
fromwww.aljazeera.com
22 hours ago

Technofascism': Critics accuse Palantir of pushing AI war doctrine

Palantir's CEO advocates for using advanced software to enhance US military power and warns of AI weaponization by adversaries.
Artificial intelligence
fromTechCrunch
17 hours ago

NSA spies are reportedly using Anthropic's Mythos, despite Pentagon feud | TechCrunch

The NSA is reportedly using Anthropic's Mythos model for cybersecurity despite previous tensions over access to AI capabilities.
European startups
fromwww.dw.com
1 day ago

How China is reshaping the global chip industry

The US imposed export curbs on advanced semiconductors to limit China's technological advancements and military capabilities.
#cryptocurrency
Cryptocurrency
fromThe Hacker News
3 days ago

$13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims

Grinex suspends operations after a $13.74 million hack, blaming Western intelligence agencies for the cyber attack.
Cryptocurrency
fromThe Hacker News
3 days ago

$13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims

Grinex suspends operations after a $13.74 million hack, blaming Western intelligence agencies for the cyber attack.
fromThe New Yorker
23 hours ago

When Your Digital Life Vanishes

A broken phone or corrupted drive can mean the loss of work, evidence, art, or the last traces of the dead. But sometimes data-recovery experts can summon lost files from the void.
Digital life
#anthropic
fromAxios
1 day ago
Intellectual property law

Scoop: NSA using Anthropic's Mythos despite Defense Department blacklist

fromThe Verge
3 days ago
Artificial intelligence

Anthropic's new cybersecurity model could get it back in the government's good graces

fromAxios
1 day ago
Intellectual property law

Scoop: NSA using Anthropic's Mythos despite Defense Department blacklist

Artificial intelligence
fromThe Verge
3 days ago

Anthropic's new cybersecurity model could get it back in the government's good graces

Anthropic's relationship with the Trump administration has improved due to its new cybersecurity model, Claude Mythos Preview.
US politics
fromTNW | Artificial-Intelligence
1 day ago

Trump's campaign to preempt state AI regulation faces resistance from states and Congress alike

The Trump administration is actively working to prevent state regulation of AI, while states are increasingly introducing their own legislation.
Philosophy
fromEngadget
1 day ago

Palantir posted a manifesto that reads like the ramblings of a comic book villain

Silicon Valley has a moral obligation to contribute to national defense and address the limitations of technology in society.
Privacy technologies
fromComputerWeekly.com
3 days ago

Privacy, power, and encryption: why end-to-end security matters | Computer Weekly

Privacy is a fundamental human condition, and end-to-end encryption is essential for protecting communications in a surveillance-heavy world.
EU data protection
fromSecurityWeek
4 days ago

53 DDoS Domains Taken Down by Law Enforcement

Law enforcement in 21 countries coordinated to disrupt DDoS-for-hire services, resulting in arrests and the takedown of numerous domains.
#ai-governance
Artificial intelligence
fromFortune
3 days ago

AI cybersecurity capabilities require urgent international cooperation, AI godfather Bengio says | Fortune

Yoshua Bengio emphasizes the urgent need for international cooperation in addressing AI's risks, particularly with the release of Anthropic's Mythos model.
Artificial intelligence
fromFortune
3 days ago

AI cybersecurity capabilities require urgent international cooperation, AI godfather Bengio says | Fortune

Yoshua Bengio emphasizes the urgent need for international cooperation in addressing AI's risks, particularly with the release of Anthropic's Mythos model.
#cybersecurity
fromTechCrunch
5 days ago
Russo-Ukrainian War

Sweden blames Russian hackers for attempting 'destructive' cyberattack on thermal plant | TechCrunch

fromTechCrunch
3 days ago
Information security

Hackers are abusing unpatched Windows security flaws to hack into organizations | TechCrunch

Information security
fromThe Cipher Brief
5 days ago

Copy of Trump's Cyber Strategy Is a Strong Playbook, but It's All in the Execution

The National Cyber Strategy aims to enhance U.S. national security through aggressive defense and collaboration with the private sector.
Russo-Ukrainian War
fromTechCrunch
5 days ago

Sweden blames Russian hackers for attempting 'destructive' cyberattack on thermal plant | TechCrunch

Russian-linked hackers attempted to disrupt a Swedish thermal power plant, highlighting increasing risks of hybrid attacks beyond cyberspace.
Information security
fromThe Hacker News
2 hours ago

CISA Adds 8 Exploited Flaws to KEV, Sets April-May 2026 Federal Deadlines

CISA added eight new vulnerabilities to its KEV catalog, including critical flaws in Cisco Catalyst SD-WAN Manager, indicating active exploitation.
Information security
fromTechRepublic
16 hours ago

2026's Breach List So Far: FBI Hacked, 1B Androids at Risk, 270M iPhones Vulnerable

2026 has seen significant cyber threats, including a major FBI hack and the discovery of the DarkSword iPhone exploit framework.
Information security
fromTechCrunch
3 days ago

Hackers are abusing unpatched Windows security flaws to hack into organizations | TechCrunch

Hackers exploited Windows vulnerabilities published by a researcher, affecting Windows Defender and allowing high-level access.
Information security
fromThe Cipher Brief
5 days ago

Copy of Trump's Cyber Strategy Is a Strong Playbook, but It's All in the Execution

The National Cyber Strategy aims to enhance U.S. national security through aggressive defense and collaboration with the private sector.
fromSecurityWeek
5 days ago

Sweden Blames Pro-Russian Group for Cyberattack Last Year on Its Energy Infrastructure

Sweden's minister for civil defense, Carl-Oskar Bohlin, stated that the cyberattack targeted a heating plant in western Sweden but ultimately failed. He did not provide further details.
Europe news
Social media marketing
fromAxios
6 days ago

The first AI-era war is a "slopaganda" battle to control memes

AI-generated content is rapidly spreading propaganda, making it easier for influencers to adopt conspiracy theories.
Science
fromwww.scientificamerican.com
6 days ago

China said it could break military encryption. DARPA built an AI to find out if that's true

Chinese researchers claim quantum computers could potentially unlock encrypted information, raising concerns for national security.
fromArtforum
12 hours ago

Epic Fury: The Dark Art of Defense Tech

Today's prominent founders and investors communicate in a visual grammar that shares a great deal with the aesthetic languages of Italian Futurism, primarily, but also of 'return to order' neoclassicism, World War II-era propaganda, and modernist museum branding.
Right-wing politics
US news
fromwww.npr.org
1 day ago

U.K police investigating if attacks in London are the work of Iranian proxies

London police investigate arson attacks on Jewish sites, suspecting Iranian proxies may be involved.
#china
World politics
fromArs Technica
4 days ago

New undersea cable cutter risks Internet's backbone

China's cable-cutting technology showcases its dual role as a builder and potential disruptor of global submarine infrastructure.
World news
fromThe Washington Post
2 weeks ago

Chinese firms market Iran war intelligence 'exposing' U.S. forces

Chinese firms are leveraging AI and open-source data to track U.S. military movements, posing potential security risks amid the Iran conflict.
World politics
fromArs Technica
4 days ago

New undersea cable cutter risks Internet's backbone

China's cable-cutting technology showcases its dual role as a builder and potential disruptor of global submarine infrastructure.
World news
fromThe Washington Post
2 weeks ago

Chinese firms market Iran war intelligence 'exposing' U.S. forces

Chinese firms are leveraging AI and open-source data to track U.S. military movements, posing potential security risks amid the Iran conflict.
Privacy professionals
fromTechCrunch
3 days ago

Man who hacked US Supreme Court filing system sentenced to probation | TechCrunch

Nicholas Moore was sentenced to a year of probation for hacking the U.S. Supreme Court and other government systems.
Privacy technologies
fromAbove the Law
3 days ago

438 Experts Said Age Verification Is Dangerous. Legislators Are Moving Forward With It Anyway. - Above the Law

Age verification mandates for the internet are technically flawed, threaten privacy, and may cause more harm than good, according to 438 researchers from 32 countries.
#ai
European startups
fromwww.businessinsider.com
4 days ago

I've lived in China for over 10 years and saw the OpenClaw craze unfold. The West needs to keep up.

AI tools like OpenClaw are transforming small businesses in China, supported by government initiatives and a growing microeconomy.
Artificial intelligence
fromTNW | Insights
2 days ago

Nvidia's Jensen Huang warns DeepSeek running on Huawei chips would be 'horrible outcome' for America

DeepSeek's optimization of AI models for Huawei chips poses a significant threat to US technological dominance.
European startups
fromwww.businessinsider.com
4 days ago

I've lived in China for over 10 years and saw the OpenClaw craze unfold. The West needs to keep up.

AI tools like OpenClaw are transforming small businesses in China, supported by government initiatives and a growing microeconomy.
Artificial intelligence
fromTNW | Insights
2 days ago

Nvidia's Jensen Huang warns DeepSeek running on Huawei chips would be 'horrible outcome' for America

DeepSeek's optimization of AI models for Huawei chips poses a significant threat to US technological dominance.
Philosophy
fromApaonline
4 days ago

The Paradox of China's Crypto Regulation and Capital Going Global (Part 2)

China's crypto capital expands globally despite domestic regulatory tightening, focusing on infrastructure and sovereign digital currency rather than token-based financialization.
EU data protection
fromComputerWeekly.com
1 week ago

UK reliance on US big tech companies is 'national security risk', claims report | Computer Weekly

The UK is at risk due to over-reliance on US tech companies for critical infrastructure, impacting national security.
Intellectual property law
fromNature
1 week ago

Boycott of major AI conference exposes a growing US-China divide

A key Chinese research organization is boycotting the NeurIPS conference due to a policy perceived as excluding Chinese researchers.
#north-korea
Information security
fromComputerWeekly.com
3 days ago

North Korean social engineering campaign targets macOS users | Computer Weekly

A North Korean campaign targeting macOS users tricked victims into executing malicious files, leading to credential and data theft.
fromElectronic Frontier Foundation
5 days ago

Digital Hopes, Real Power: The Rise of Network Shutdowns

In 2024 alone, authorities imposed 304 internet shutdowns across 54 countries - the highest number ever recorded. This reflects a growing trend of governments treating connectivity as a weapon.
World politics
fromSecurityWeek
22 hours ago

Bluesky Disrupted by Sophisticated DDoS Attack

The attack is impacting our application, with users experiencing intermittent interruptions in service for their feeds, notifications, threads and search.
Information security
Information security
fromThe Hacker News
1 day ago

Researchers Detect ZionSiphon Malware Targeting Israeli Water, Desalination OT Systems

ZionSiphon malware targets Israeli water treatment systems, showcasing a trend in politically motivated attacks on critical infrastructure.
#fbi
Privacy professionals
fromNextgov.com
2 weeks ago

Suspected Chinese breach of FBI system exposed surveillance targets' phone numbers

A breach linked to China exposed phone numbers of FBI surveillance targets, raising concerns about counterintelligence risks.
Privacy professionals
fromNextgov.com
2 weeks ago

Suspected Chinese breach of FBI system exposed surveillance targets' phone numbers

A breach linked to China exposed phone numbers of FBI surveillance targets, raising concerns about counterintelligence risks.
Artificial intelligence
fromFortune
4 days ago

China has 'nearly erased' America's lead in AI-and the flow of tech experts moving to the U.S. is slowing to a trickle, Stanford report says | Fortune

China has nearly closed the gap with the U.S. in artificial intelligence performance and leads in patents, publications, and industrial robot installations.
fromwww.businessinsider.com
4 days ago

Jensen Huang says it's 'lunacy' to compare selling chips to China to selling nukes to North Korea

Huang, who has repeatedly defended his belief that US companies should be able to sell advanced chips in China, didn't take kindly to Amodei comparing such sales to 'selling nuclear weapons to North Korea.'
Artificial intelligence
Information security
fromArs Technica
3 days ago

Recent advances push Big Tech closer to the Q-Day danger zone

Organizations are transitioning to new algorithms to replace RSA and elliptic curves due to vulnerabilities exposed by quantum computing threats.
European startups
fromSecurityWeek
1 month ago

EU Sanctions Chinese, Iranian Firms Supporting Hacking Operations

The EU sanctioned three companies and two individuals for hacking activities targeting member states, including Chinese firms Integrity Technology Group and Anxun Information Technology.
fromSecuritymagazine
1 week ago

Chinese Supercomputer Allegedly Hacked, 10 Petabytes of Data Stolen

The dataset reportedly contains more than 10 petabytes of sensitive information, including classified defense documents, missile schematics, and technical files, among others.
Information security
Digital life
fromNature
1 month ago

The hidden lives behind China's great Internet firewall

Chinese internet users navigate digital censorship through coded language and creative expression while seeking freedom and connection within state-controlled digital systems.
Privacy technologies
fromwww.theguardian.com
2 months ago

Chinese technology underpins Iran's internet control, report finds

Iran's internet control relies heavily on Chinese surveillance technologies and infrastructure, enabling near-total blackouts and refined censorship that facilitate human rights abuses.
World news
fromThe Hacker News
2 months ago

China-Linked UNC3886 Targets Singapore Telecom Sector in Cyber Espionage Campaign

China-linked APT UNC3886 conducted a deliberate cyber-espionage campaign against all four major Singapore telcos, using zero-day exploits and rootkits to access critical systems.
#cyberespionage
Information security
fromSecurityWeek
1 month ago

China-Linked Hackers Hit Asian Militaries in Patient Espionage Operation

China-linked cyberespionage campaign CL-STA-1087 has targeted Southeast Asian military organizations since at least 2020, using custom backdoors and credential stealers to extract military intelligence and Western collaboration details.
Information security
fromSecurityWeek
1 month ago

Iran-Linked Hackers Take Aim at US and Other Targets, Raising Risk of Cyberattacks During War

Pro-Iranian hackers are expanding cyberattacks from the Middle East into the United States, targeting defense contractors, medical device companies, and critical infrastructure like power stations and water plants.
Information security
fromTechzine Global
1 month ago

China and spyware companies dominate zero-day attacks

Zero-day vulnerability exploits reached 90 cases in 2025, with Chinese cyber espionage groups and commercial spyware companies driving attacks increasingly toward enterprise infrastructure and security equipment.
Information security
fromNextgov.com
1 month ago

Chinese telecom hackers likely holding stolen data 'in perpetuity' for later attempts, FBI official says

Chinese state-backed Salt Typhoon likely retains stolen telecom data indefinitely for surveillance, future exploitation, and aggregation with other exfiltrated information.
Information security
fromAxios
2 months ago

Exclusive: Suspected Chinese hackers impersonate U.S. briefings in phishing lure

China-linked Mustang Panda used file-based phishing to infect diplomatic and election officials with data-stealing persistent malware, detected by an AI agent at Dream.
Information security
fromTheregister
1 month ago

Google and friends disrupt suspected Beijing espionage op

Google disrupted UNC2814, a China-linked group conducting widespread cyberattacks on telecommunications and government organizations across multiple continents using Google Sheets API for command-and-control operations.
Information security
fromThe Hacker News
2 months ago

Google Links China, Iran, Russia, North Korea to Coordinated Defense Sector Cyber Operations

State-sponsored and criminal actors from China, Iran, North Korea, and Russia target the defense industrial base, prioritizing drones, hiring exploitation, edge-device access, and supply-chain risk.
fromComputerWeekly.com
2 months ago

UK and China reach out across cyber no-man's land | Computer Weekly

The so-called 'Cyber Dialogue' will supposedly help manage cyber threats to both country's national security, revealed Bloomberg, which was first to reported the move citing anonymous sources with knowledge of the forum, It claimed that the forum will improve communication, enable private discussions, and deescalate tensions. It also establishes a direct line between London and Beijing to enable senior officials to discuss ongoing cyber incidents.
Information security
fromSecurityWeek
2 months ago

Cyber Insights 2026: Cyberwar and Rising Nation State Threats

Entering the cyber world is stepping into a warzone. Cyber is considered a war zone, and what happens there is described as cyberwar. But it's not that simple. War is conducted by nations (political), not undertaken by criminals (financial). Both are increasing in this war zone we call cyber, but the political threat is growing fast. Cyberwar is a complex subject, and a formal definition is difficult.
Information security
Information security
fromThe Hacker News
2 months ago

China-Linked Amaranth-Dragon Exploits WinRAR Flaw in Espionage Campaigns

China-linked Amaranth-Dragon (APT41-associated) carried out stealthy, narrowly focused cyber espionage against Southeast Asian government and law enforcement, exploiting WinRAR CVE-2025-8088.
fromSecurityWeek
2 months ago

China Revives Tianfu Cup Hacking Contest Under Increased Secrecy

Tianfu Cup was launched as an alternative to the Zero Day Initiative's Pwn2Own competition, which regularly pays out more than $1 million to white hat hackers who demonstrate critical vulnerabilities in consumer and enterprise hardware and software, industrial control systems, and automotive products. Tianfu Cup made headlines in 2021, when participants earned a total of $1.9 million for exploits targeting Windows, Ubuntu, iOS, Microsoft Exchange, Chrome, Safari, Adobe Reader, Asus routers, and various virtualization products.
Information security
fromTheregister
2 months ago

Google: China's APT31 used Gemini to plan US cyberattacks

A Chinese government hacking group that has been sanctioned for targeting America's critical infrastructure used Google's AI chatbot, Gemini, to auto-analyze vulnerabilities and plan cyberattacks against US organizations, the company says. While there's no indication that any of these attacks were successful, "APT groups like this continue to experiment with adopting AI to support semi-autonomous offensive operations," Google Threat Intelligence Group chief analyst John Hultquist told The Register. "We anticipate that China-based actors in particular will continue to build agentic approaches for cyber offensive scale."
Information security
fromThe Hacker News
2 months ago

China-Linked Hackers Have Used the PeckBirdy JavaScript C2 Framework Since 2023

The cybersecurity company said it identified the PeckBirdy script framework in 2023 after it observed multiple Chinese gambling websites being injected with malicious scripts, which are designed to download and execute the primary payload in order to facilitate the remote delivery and execution of JavaScript. The end goal of this routine is to serve fake software update web pages for Google Chrome so as to trick users into downloading and running bogus update files, thereby infecting the machines with malware in the process.
Information security
[ Load more ]