#cia-technology

[ follow ]
#cybersecurity
Information security
fromFast Company
7 hours ago

Why the Iran cyberattack everyone warned about hasn't really happened yet

Iran-linked hackers have conducted minor cyberattacks in the U.S. but have focused on other regions with more significant incursions.
Information security
fromTechzine Global
14 hours ago

How AI could drive cyber investigation tools from niche to core stack

The rise of AI presents new cybersecurity risks, necessitating a shift from traditional defensive strategies to proactive measures against sophisticated threats.
Information security
fromThe Hacker News
14 hours ago

Weekly Recap: Fiber Optic Spying, Windows Rootkit, AI Vulnerability Hunting and More

A critical zero-day vulnerability in Adobe Acrobat Reader is actively exploited, alongside state-sponsored cyber threats targeting U.S. infrastructure.
Silicon Valley
fromWIRED
17 hours ago

The Dumbest Hack of the Year Exposed a Very Real Problem

A cyberattack in Silicon Valley exploited weak passwords to spoof crosswalk button recordings with voices of tech CEOs, raising security concerns.
Privacy technologies
fromYahoo Tech
3 days ago

Hackers Are Using Your Home Router to Spy on Microsoft 365 Users

Russian spies exploited consumer routers to steal Microsoft 365 credentials from thousands of users, turning home devices into espionage tools.
Information security
fromFast Company
7 hours ago

Why the Iran cyberattack everyone warned about hasn't really happened yet

Iran-linked hackers have conducted minor cyberattacks in the U.S. but have focused on other regions with more significant incursions.
Information security
fromTechzine Global
14 hours ago

How AI could drive cyber investigation tools from niche to core stack

The rise of AI presents new cybersecurity risks, necessitating a shift from traditional defensive strategies to proactive measures against sophisticated threats.
EU data protection
fromComputerWeekly.com
5 hours ago

UK reliance on US big tech companies is 'national security risk', claims report | Computer Weekly

The UK is at risk due to over-reliance on US tech companies for critical infrastructure, impacting national security.
fromElectronic Frontier Foundation
10 hours ago

Hot Off the Press: EFF's Updated Guide to Tech at the US-Mexico Border

"The Battalion Search and Rescue always carries the Electronic Frontier Foundation's zine in our desert rig. We're finding new surveillance all the time, and without a resource like that, we wouldn't know what the hell we're looking at."
Roam Research
Privacy professionals
fromSecurityWeek
14 hours ago

BrowserGate: Claims of LinkedIn 'Spying' Clash With Security Research Findings

LinkedIn allegedly scans users' computers to collect data on browser extensions, raising concerns about corporate espionage.
#ai
Artificial intelligence
fromFuturism
10 hours ago

Meta Secretly Building a Photorealistic AI Clone of Mark Zuckerberg so No Employee Can Ever Escape His Watchful Eye

Meta CEO Mark Zuckerberg is using AI to create a 3D avatar of himself for employee interaction and feedback.
fromFortune
2 days ago
Artificial intelligence

These niche AI startups are trying to protect the Pentagon's secrets | Fortune

Information security
fromFortune
8 hours ago

Anthropic caused panic that Mythos will expose cybersecurity weak spots, but one industry veteran says real problem is fixing, not finding, them | Fortune

Anthropic's Claude Mythos Preview AI model identifies cybersecurity vulnerabilities, but experts question its impact on fixing existing issues.
Information security
fromTechzine Global
8 hours ago

Runtime security becomes critical as AI accelerates threats

Artificial intelligence accelerates innovation and cyber threats, necessitating a focus on runtime security for effective enterprise protection.
Artificial intelligence
fromFuturism
10 hours ago

Meta Secretly Building a Photorealistic AI Clone of Mark Zuckerberg so No Employee Can Ever Escape His Watchful Eye

Meta CEO Mark Zuckerberg is using AI to create a 3D avatar of himself for employee interaction and feedback.
Artificial intelligence
fromFortune
2 days ago

These niche AI startups are trying to protect the Pentagon's secrets | Fortune

AI companies face challenges in balancing technology use with government secrecy, highlighted by Anthropic's conflict with the Pentagon.
Information security
fromFortune
8 hours ago

Anthropic caused panic that Mythos will expose cybersecurity weak spots, but one industry veteran says real problem is fixing, not finding, them | Fortune

Anthropic's Claude Mythos Preview AI model identifies cybersecurity vulnerabilities, but experts question its impact on fixing existing issues.
Information security
fromTechzine Global
8 hours ago

Runtime security becomes critical as AI accelerates threats

Artificial intelligence accelerates innovation and cyber threats, necessitating a focus on runtime security for effective enterprise protection.
UK news
fromwww.independent.co.uk
19 hours ago

Phone firms should use technology to stop children taking nudes, police chief says

Tech firms must enhance children's online safety by preventing the creation of nude images on their devices, according to law enforcement officials.
fromThe Cipher Brief
3 days ago

Why Australia Needs a National Spy Museum

Many of the foundations that have underpinned Australia's security, prosperity and democracy are being tested: social cohesion is eroding, trust in institutions is declining, intolerance is growing, even truth itself is being undermined by conspiracy, mis- and disinformation.
World politics
US news
fromSecuritymagazine
4 days ago

Top Secret Clearance Holder Charged With Leaking Classified National Defense Information

Courtney Williams was arrested for allegedly sharing classified national defense information with unauthorized individuals, including a journalist, from 2022 to 2025.
US politics
fromwww.theguardian.com
1 day ago

The Guardian view on AI politics: US datacentre protests are a warning to big tech | Editorial

Voters across the political spectrum are uniting against big tech's influence, particularly regarding AI datacentres and their environmental impact.
Digital life
fromCbsnews
1 day ago

Is your phone listening to you?

Phones are not listening to conversations; targeted ads are based on user behavior and interests.
SF politics
fromFast Company
1 day ago

The Pentagon is doubling down on laser weapons research

The U.S. military plans to invest over $2 billion in directed energy weapons research for fiscal year 2027.
Cryptocurrency
fromnews.bitcoin.com
2 days ago

Scarcity, Surveillance, and the Return of Hard Power Week In Review

Bitcoin remains above $71,000, indicating institutional demand and potential for broader adoption amid macroeconomic developments and a 4-year cycle breakout test.
Law
fromIndependent
3 days ago

Computer engineer claims he was penalised for flagging Israeli links of firm given 'bananas' server access at top Irish cybersecurity company

A cyber-security firm reprimanded an engineer for discriminatory comments regarding an Israeli company's access to its servers amid concerns about Palestinian genocide.
Washington DC
fromNextgov.com
3 days ago

DHS intelligence office restructuring would still keep it under ODNI oversight

The White House plans to restructure DHS's intelligence unit while maintaining its oversight under the Office of the Director of National Intelligence.
#apple-intelligence
Apple
fromTheregister
4 days ago

Security reserchers tricked Apple Intelligence into cursing

Apple Intelligence can be hijacked through prompt injection, exposing millions of users to risk, but a fix was implemented in iOS 26.4 and macOS 26.4.
Apple
fromSecurityWeek
4 days ago

Apple Intelligence AI Guardrails Bypassed in New Attack

Researchers have successfully bypassed Apple's AI safety protocols using adversarial techniques, allowing for the execution of arbitrary tasks and manipulation of private data.
Apple
fromTheregister
4 days ago

Security reserchers tricked Apple Intelligence into cursing

Apple Intelligence can be hijacked through prompt injection, exposing millions of users to risk, but a fix was implemented in iOS 26.4 and macOS 26.4.
Apple
fromSecurityWeek
4 days ago

Apple Intelligence AI Guardrails Bypassed in New Attack

Researchers have successfully bypassed Apple's AI safety protocols using adversarial techniques, allowing for the execution of arbitrary tasks and manipulation of private data.
Intellectual property law
fromNextgov.com
3 days ago

Tech bills of the week: Boosting export controls; AI-focused workforce development; and more

Bipartisan senators introduced the MATCH Act to strengthen semiconductor export controls and prevent adversaries from acquiring critical technology.
fromwww.mediaite.com
3 days ago

Weird Obsession With Death': Current and Former Defense Officials Sound the Alarm on Hegseth

Retired Army Special Forces officer Mike Nelson criticized Hegseth's rhetoric, stating, 'That's a necessary end to achieve goals through military force - you have to kill people to achieve them. That's not the end. It's a weird obsession with death for the sake of it.'
Right-wing politics
OMG science
fromwww.scientificamerican.com
5 days ago

What is the quantum Ghost Murmur' purportedly used in Iran? Scientists question CIA's claim of long-range heartbeat detection

Ghost Murmur technology for locating heartbeats is unsupported by physics, despite claims of its effectiveness in rescue missions.
Science
fromTheregister
5 days ago

DARPA launches program to improve agent-to-agent AI collabs

DARPA's MATHBAC program aims to enhance AI communication for better scientific discoveries through foundational mathematics and systems theory.
#iran
World news
fromTechCrunch
1 week ago

Iran threatens 'Stargate' AI data centers | TechCrunch

Iran threatens retaliation against U.S. data centers in response to ongoing military actions and threats from the United States.
World news
fromTechCrunch
1 week ago

Iran threatens 'Stargate' AI data centers | TechCrunch

Iran threatens retaliation against U.S. data centers in response to ongoing military actions and threats from the United States.
Privacy professionals
fromFuturism
8 hours ago

Huge Group of Experts Warns Meta That Its Pervert Glasses Will Enable Terrible Crimes

Meta's Ray-Ban AI glasses face backlash for privacy violations and plans for facial recognition technology, prompting outrage from civil rights groups.
#ice
US politics
fromTechCrunch
1 week ago

ICE says it bought Paragon's spyware to use in drug trafficking cases | TechCrunch

ICE has utilized spyware from Paragon Solutions to combat drug trafficking and foreign terrorist organizations' use of encrypted communications.
US politics
fromSilicon Canals
1 week ago

ICE confirms it deployed Paragon spyware inside the United States for drug trafficking cases - Silicon Canals

ICE is using commercial spyware domestically, raising constitutional concerns about warrantless surveillance and lack of oversight.
US politics
fromTechCrunch
1 week ago

ICE says it bought Paragon's spyware to use in drug trafficking cases | TechCrunch

ICE has utilized spyware from Paragon Solutions to combat drug trafficking and foreign terrorist organizations' use of encrypted communications.
US politics
fromSilicon Canals
1 week ago

ICE confirms it deployed Paragon spyware inside the United States for drug trafficking cases - Silicon Canals

ICE is using commercial spyware domestically, raising constitutional concerns about warrantless surveillance and lack of oversight.
#fbi
fromTechCrunch
9 hours ago
Information security

FBI announces takedown of phishing operation that targeted thousands of victims | TechCrunch

fromSecuritymagazine
1 week ago
Privacy professionals

Breach of FBI Surveillance System Considered a "Major Incident," Security Experts Weigh In

FBI confirms major breach of surveillance system, exposing sensitive data and potentially revealing criminal probes and surveillance targets.
Privacy professionals
fromNextgov.com
1 week ago

Suspected Chinese breach of FBI system exposed surveillance targets' phone numbers

A breach linked to China exposed phone numbers of FBI surveillance targets, raising concerns about counterintelligence risks.
fromTechCrunch
9 hours ago
Information security

FBI announces takedown of phishing operation that targeted thousands of victims | TechCrunch

Privacy professionals
fromTechRepublic
1 week ago

FBI Declares Surveillance System Breach a 'Major Incident'

A China-linked breach of an FBI surveillance system has been classified as a major incident, posing significant risks to US national security.
Privacy professionals
fromSecuritymagazine
1 week ago

Breach of FBI Surveillance System Considered a "Major Incident," Security Experts Weigh In

FBI confirms major breach of surveillance system, exposing sensitive data and potentially revealing criminal probes and surveillance targets.
Privacy professionals
fromNextgov.com
1 week ago

Suspected Chinese breach of FBI system exposed surveillance targets' phone numbers

A breach linked to China exposed phone numbers of FBI surveillance targets, raising concerns about counterintelligence risks.
Privacy technologies
fromArs Technica
5 days ago

How our digital devices are putting our right to privacy at risk

Digital convenience comes at the cost of personal data privacy, raising concerns about its potential use against individuals by law enforcement.
Roam Research
fromThe Cipher Brief
1 week ago

The Chalk Mark Still Matters: Russian Espionage Handling in the Modern Era

Russian intelligence tradecraft has evolved in agent handling, incorporating advanced communication techniques and urban geography for signaling.
Privacy professionals
fromWIRED
5 days ago

Men Are Buying Hacking Tools to Use Against Their Wives and Friends

Telegram groups facilitate the sale of hacking and surveillance services, promoting abusive content targeting women and girls.
#data-breach
Privacy professionals
fromTechCrunch
5 days ago

Hackers steal and leak sensitive LAPD police documents | TechCrunch

Cybercriminals leaked sensitive LAPD documents online, including personnel files and internal investigations, allegedly by the extortion gang World Leaks.
Information security
fromTechCrunch
13 hours ago

Hack at Anodot leaves over a dozen breached companies facing extortion | TechCrunch

Hackers stole data from multiple companies after breaching Anodot, exposing customers to extortion and potential data publication.
Privacy professionals
fromTechCrunch
5 days ago

Hackers steal and leak sensitive LAPD police documents | TechCrunch

Cybercriminals leaked sensitive LAPD documents online, including personnel files and internal investigations, allegedly by the extortion gang World Leaks.
Information security
fromTechCrunch
13 hours ago

Hack at Anodot leaves over a dozen breached companies facing extortion | TechCrunch

Hackers stole data from multiple companies after breaching Anodot, exposing customers to extortion and potential data publication.
Artificial intelligence
fromNextgov.com
1 week ago

Old-school spycraft could make a comeback as AI undermines trust

AI may enhance intelligence gathering but also revive traditional espionage methods due to reliability issues with digital communications.
fromWIRED
1 month ago

How Vulnerable Are Computers to an 80-Year-Old Spy Technique? Congress Wants Answers

The movements of a hard drive's components, keystrokes on a keyboard, even the electric charge in a semiconductor's wires produce radio waves, sound, and vibrations that transmit in all directions and can-when picked up by someone with sufficiently sensitive equipment and enough spycraft to decipher those signals-reveal your private data and activities.
Privacy technologies
fromThe New Yorker
2 months ago

National Security Begins Behind the Toaster

Dear Secretary Pete Hegseth, I realize that this is a big ask, but would you please invade and take possession of my son and daughter-in-law's apartment? Or maybe you'd like to make them an offer first? Either way, as a concerned mother and patriot who believes that national security begins at home, I feel it's my duty to let you know that Otis and Luna, the co-dictators of Unit 4-C, at 439 Bergen Street, in Park Slope, Brooklyn, must be overthrown.
Humor
Privacy professionals
fromSecurityWeek
1 month ago

FBI Investigating 'Suspicious' Cyber Activity on System Holding Sensitive Surveillance Information

The FBI is investigating suspicious activities on an internal system containing sensitive surveillance data, with an unidentified actor using sophisticated techniques to exploit network security controls.
Information security
fromThe Hacker News
5 days ago

Shrinking the IAM Attack Surface through Identity Visibility and Intelligence Platforms (IVIP)

Enterprise IAM faces fragmentation, leading to Identity Dark Matter and a significant gap in visibility and security oversight.
fromNextgov.com
2 months ago

Now accepting applications - for classified intel

Over the past year, waves of federal layoffs have left thousands of government employees and contractor clients suddenly out of work. For foreign intelligence services, that disruption has opened new opportunities. With more former U.S. officials seeking employment or freelance work - often in specialized national security fields - adversaries, namely China, have stepped in, posing as consulting firms, research groups and recruiters.
US news
US politics
fromNextgov.com
2 months ago

CIA announces new acquisition framework to speed tech adoption

The CIA implemented a centralized, streamlined acquisition framework to speed vendor vetting, IT authorization, and rapid procurement of breakthrough technologies for urgent national security missions.
Information security
fromThe Hacker News
6 days ago

The Hidden Cost of Recurring Credential Incidents

Credential incidents cause significant operational costs and disruptions, impacting IT teams and overall business productivity beyond just breach prevention.
Information security
fromTechCrunch
6 days ago

Russian government hackers broke into thousands of home routers to steal passwords | TechCrunch

Russian hackers hijacked thousands of routers globally to redirect internet traffic and steal passwords and access tokens.
Information security
fromtechcrunch.com
1 month ago

FBI investigating hack on its wiretap and surveillance systems: report

Hackers breached FBI networks managing wiretaps and foreign intelligence surveillance warrants, marking another major U.S. government cybersecurity incident amid ongoing threats from Chinese and Russian threat actors.
#iphone-security-vulnerabilities
Information security
fromNextgov.com
1 month ago

Potential US-built hacking tools obtained by foreign spies and cybercriminals, research says

A sophisticated iPhone hacking toolkit called Coruna, likely originating from U.S. government development, has proliferated to foreign intelligence agencies and criminal groups, compromising iOS devices through multiple exploit chains.
Information security
fromTechCrunch
1 month ago

A suite of government hacking tools targeting iPhones is now being used by cybercriminals | TechCrunch

Government-designed iPhone exploit kit Coruna leaked from surveillance vendor to cybercriminals, Russian espionage groups, and Chinese hackers, demonstrating how state-sponsored tools proliferate into criminal markets.
Information security
fromNextgov.com
1 month ago

Potential US-built hacking tools obtained by foreign spies and cybercriminals, research says

A sophisticated iPhone hacking toolkit called Coruna, likely originating from U.S. government development, has proliferated to foreign intelligence agencies and criminal groups, compromising iOS devices through multiple exploit chains.
Information security
fromTechCrunch
1 month ago

A suite of government hacking tools targeting iPhones is now being used by cybercriminals | TechCrunch

Government-designed iPhone exploit kit Coruna leaked from surveillance vendor to cybercriminals, Russian espionage groups, and Chinese hackers, demonstrating how state-sponsored tools proliferate into criminal markets.
[ Load more ]