#codename-hexe

[ follow ]
#anthropic
fromAxios
8 hours ago
Intellectual property law

Scoop: NSA using Anthropic's Mythos despite Defense Department blacklist

fromAxios
8 hours ago
Intellectual property law

Scoop: NSA using Anthropic's Mythos despite Defense Department blacklist

#north-korea
fromComputerWeekly.com
2 days ago
Information security

North Korean social engineering campaign targets macOS users | Computer Weekly

A North Korean campaign targeting macOS users tricked victims into executing malicious files, leading to credential and data theft.
Information security
fromComputerWeekly.com
2 days ago

North Korean social engineering campaign targets macOS users | Computer Weekly

A North Korean campaign targeting macOS users tricked victims into executing malicious files, leading to credential and data theft.
Video games
fromKotaku
6 days ago

Pragmata Review: A Heartwarming Sci-Fi Puzzle Shooter

Capcom's sci-fi puzzle shooter offers a refreshing take on parenthood themes, featuring a positive father-daughter dynamic in a unique gaming experience.
fromThe Cipher Brief
1 week ago

Why Australia Needs a National Spy Museum

Many of the foundations that have underpinned Australia's security, prosperity and democracy are being tested: social cohesion is eroding, trust in institutions is declining, intolerance is growing, even truth itself is being undermined by conspiracy, mis- and disinformation.
World politics
US news
fromSecuritymagazine
1 week ago

Top Secret Clearance Holder Charged With Leaking Classified National Defense Information

Courtney Williams was arrested for allegedly sharing classified national defense information with unauthorized individuals, including a journalist, from 2022 to 2025.
Privacy professionals
fromWIRED
1 week ago

Men Are Buying Hacking Tools to Use Against Their Wives and Friends

Telegram groups facilitate the sale of hacking and surveillance services, promoting abusive content targeting women and girls.
Information security
fromThe Hacker News
3 days ago

Obsidian Plugin Abuse Delivers PHANTOMPULSE RAT in Targeted Finance, Crypto Attacks

A social engineering campaign exploits Obsidian to distribute PHANTOMPULSE trojan targeting financial and cryptocurrency sectors.
US politics
fromTechCrunch
2 weeks ago

ICE says it bought Paragon's spyware to use in drug trafficking cases | TechCrunch

ICE has utilized spyware from Paragon Solutions to combat drug trafficking and foreign terrorist organizations' use of encrypted communications.
#russian-intelligence
#cia
fromSecurityWeek
5 days ago

Triad Nexus Evades Sanctions to Fuel Cybercrime

Triad Nexus has reinstated its global fraud engine, shifting its focus toward emerging markets while maintaining a persistent threat to Western enterprise assets.
Information security
Privacy professionals
fromNextgov.com
2 weeks ago

Suspected Chinese breach of FBI system exposed surveillance targets' phone numbers

A breach linked to China exposed phone numbers of FBI surveillance targets, raising concerns about counterintelligence risks.
Artificial intelligence
fromNextgov.com
2 weeks ago

Old-school spycraft could make a comeback as AI undermines trust

AI may enhance intelligence gathering but also revive traditional espionage methods due to reliability issues with digital communications.
Python
fromAntocuni
3 weeks ago

Inside SPy, part 2: Language semantics

SPy aims to enhance Python's performance while integrating static typing, balancing between an interpreter and a compiler.
fromFinbold
5 days ago

Kraken insider extortion reveals remote work security blind spot

"Shortly after access was terminated, we began receiving extortion demands. The criminals threatened to distribute materials from both the February 2025 incident and the recent incident to media outlets and on social media if we did not comply. We will not pay these criminals," Percoco stated.
Information security
#espionage
Germany news
fromenglish.elpais.com
3 weeks ago

Security forces arrest two suspected Russian spies in Germany and Spain

Two individuals were arrested for allegedly spying on a businessman supplying drones to Ukraine, with intentions possibly including his assassination.
Germany news
fromwww.dw.com
3 weeks ago

Germany detains two of suspected spying for Russia

Two suspects have been accused of spying for Russia, targeting a German national supplying drones to Ukraine.
Germany news
fromwww.dw.com
3 weeks ago

Germany detains two suspected of spying for Russia

Two suspects have been accused of spying for Russia, targeting a German national supplying drones to Ukraine.
fromNew York Post
1 month ago
US politics

Love-struck suspected Moscow mole in NYC tells FBI agent, 'Catch me, baby' - only to land behind bars

Germany news
fromenglish.elpais.com
3 weeks ago

Security forces arrest two suspected Russian spies in Germany and Spain

Two individuals were arrested for allegedly spying on a businessman supplying drones to Ukraine, with intentions possibly including his assassination.
Germany news
fromwww.dw.com
3 weeks ago

Germany detains two of suspected spying for Russia

Two suspects have been accused of spying for Russia, targeting a German national supplying drones to Ukraine.
Germany news
fromwww.dw.com
3 weeks ago

Germany detains two suspected of spying for Russia

Two suspects have been accused of spying for Russia, targeting a German national supplying drones to Ukraine.
fromNew York Post
1 month ago
US politics

Love-struck suspected Moscow mole in NYC tells FBI agent, 'Catch me, baby' - only to land behind bars

#cybersecurity
fromSilicon Canals
1 week ago
Information security

How Russia's GRU turned $50 routers into a global intelligence platform spanning 120 countries - Silicon Canals

Information security
fromThe Hacker News
6 days ago

Weekly Recap: Fiber Optic Spying, Windows Rootkit, AI Vulnerability Hunting and More

A critical zero-day vulnerability in Adobe Acrobat Reader is actively exploited, alongside state-sponsored cyber threats targeting U.S. infrastructure.
Information security
fromThe Hacker News
1 week ago

Bitter-Linked Hack-for-Hire Campaign Targets Journalists Across MENA Region

A hack-for-hire campaign linked to the Indian government targeted journalists and activists in the MENA region through phishing attacks.
Information security
fromThe Hacker News
1 week ago

APT28 Deploys PRISMEX Malware in Campaign Targeting Ukraine and NATO Allies

A Russian threat actor is conducting a spear-phishing campaign targeting Ukraine using a new malware suite called PRISMEX, exploiting zero-day vulnerabilities.
Information security
fromSilicon Canals
1 week ago

How Russia's GRU turned $50 routers into a global intelligence platform spanning 120 countries - Silicon Canals

Russia's GRU hijacked consumer routers to create a global intelligence platform, compromising 18,000 devices for surveillance and credential harvesting.
Information security
fromThe Hacker News
2 weeks ago

China-Linked TA416 Targets European Governments with PlugX and OAuth-Based Phishing

TA416 has intensified cyberattacks on European government and diplomatic organizations since mid-2025, utilizing advanced malware delivery techniques.
Information security
fromSecurityWeek
2 weeks ago

Russian APT Star Blizzard Adopts DarkSword iOS Exploit Kit

Star Blizzard, a Russian hacking group, is using the DarkSword iOS exploit kit in a new campaign targeting Apple devices and iCloud accounts.
fromKotaku
1 month ago

Hunting Nazis Makes For Satisfying Detective Work In The Ratline

Set in 1971, it casts you as a private detective tasked by a mysterious figure with tracing down various Nazi war criminals who escaped justice. Living new lives under assumed names, as was very much the case in reality, these senior members of Hitler's regime are now dentists, wine merchants, perhaps even senior members of South American police forces, and with the scant documentation you're handed, you need to find them.
Board games
Berlin
fromwww.theguardian.com
1 month ago

Hit Netflix series has Germany's spy agency dreaming of a less gaffe-prone future

Netflix's Unfamiliar depicts German spies conducting illegal surveillance and hacking operations that violate real data protection laws, portraying the BND as rule-bound yet willing to break regulations.
World politics
fromNextgov.com
1 month ago

Russia-linked hackers appear on Iran war's cyber front, but their impact is murky

Russia-linked hacktivist groups supporting Iran have increased cyber activity against U.S. and Israeli targets during the Middle East conflict, though their impact remains unclear and largely unverified.
UK news
fromwww.theguardian.com
1 month ago

UK counter-terrorism agents granted more time to question men suspected of spying for Iran

Four men arrested on suspicion of spying for Iran on Jewish community locations and individuals in Britain can be held in custody until 13 March for questioning.
Information security
fromTechzine Global
2 weeks ago

North Korea behind social engineering attack on Axios project

Attackers compromised the Axios maintainer's account through social engineering, publishing malicious versions that installed a Remote Access Trojan on victims' systems.
fromTechCrunch
1 month ago

Hacker broke into FBI and compromised Epstein files, report says | TechCrunch

An unidentified foreign hacker broke into the FBI's field office in New York in 2023 and compromised files related to the bureau's investigation into the sex offender Jeffrey Epstein, according to Reuters. The hack took advantage of a server at the Child Exploitation Forensic Lab in the FBI's New York Field Office that was left inadvertently vulnerable by an FBI special agent working on the case.
Privacy professionals
Privacy technologies
fromInfoWorld
1 month ago

What I learned as an undercover agent on Moltbook

OpenClaw AI agents on Moltbook social network pose severe cybersecurity risks through unauthorized access to sensitive user data and financial systems.
#russian-military-intelligence
Gadgets
fromwww.theguardian.com
2 months ago

TR-49 review inventive narrative deduction game steeped in the strangest of wartime secrets

TR-49 is a mystery game where a machine consumes esoteric books, sending players to specific pages via codes to uncover the pivotal text Endpeace.
fromwww.theguardian.com
2 months ago

Secret love letter shows softer side of Cambridge spy ring's alleged fifth man

It was a love letter written by one of the more important British spies of the cold war that made Tom Brass realise he had never fully known his mother. The spy in question was John Cairncross, the alleged fifth man in the Cambridge spy ring, whose spycraft also helped the Soviets win the Battle of Kursk and turn the tide of the second world war.
History
fromThe New Yorker
2 months ago

National Security Begins Behind the Toaster

Dear Secretary Pete Hegseth, I realize that this is a big ask, but would you please invade and take possession of my son and daughter-in-law's apartment? Or maybe you'd like to make them an offer first? Either way, as a concerned mother and patriot who believes that national security begins at home, I feel it's my duty to let you know that Otis and Luna, the co-dictators of Unit 4-C, at 439 Bergen Street, in Park Slope, Brooklyn, must be overthrown.
Humor
Germany news
fromwww.dw.com
1 month ago

Is Germany increasingly targeted by Iranian intelligence?

German security authorities warn of potential Iranian retaliatory attacks targeting Jewish institutions, Israeli sites, and Iranian opposition members following US-Israeli strikes on Iran.
fromNextgov.com
2 months ago

Now accepting applications - for classified intel

Over the past year, waves of federal layoffs have left thousands of government employees and contractor clients suddenly out of work. For foreign intelligence services, that disruption has opened new opportunities. With more former U.S. officials seeking employment or freelance work - often in specialized national security fields - adversaries, namely China, have stepped in, posing as consulting firms, research groups and recruiters.
US news
US news
fromwww.theguardian.com
1 month ago

The Russian honeytrap: alleged spy for Moscow faces five years in US prison

Nomma Zarubina, an FSB-recruited Russian intelligence operative, pleaded guilty to lying to the FBI about her contacts with Russian intelligence while posing as a legitimate activist to infiltrate American political and academic circles.
fromThe Cipher Brief
2 months ago

The Kremlin Files: Russian Double Agents and Operational Games

A double agent, by contrast, is an intelligence asset who is knowingly and deliberately directed by one service to engage another in espionage. The controlling service uses that agent to feed information (called feed material) -true, false, or mixed-to the adversary. They do so to simultaneously study the adversary's tradecraft, collection priorities, and decision-making. In the Russian system, double agents also serve a bureaucratic function: they generate statistics, "success stories," and operational narratives that demonstrate effectiveness to political overseers and ultimately to Putin himself.
World news
US politics
fromLos Angeles Times
2 months ago

He worked for and romanced Arcadia councilwoman, and he was a covert agent for China

A Southern California man acted as a covert agent for China and was sentenced to four years after aiding a local council member's election.
Privacy professionals
fromWIRED
2 months ago

Palantir Defends Work With ICE to Staff Following Killing of Alex Pretti

Palantir employees pressed leadership for transparency and reconsideration of the company's work with ICE after federal agents fatally shot Minneapolis nurse Alex Pretti.
Information security
fromComputerWeekly.com
1 month ago

Interpol obliterates cyber criminal infrastructure | Computer Weekly

Interpol's Operation Synergia III neutralized 45,000 malicious IP addresses and servers across 72 countries, resulting in 94 arrests and over 100 investigations targeting cyber fraud, phishing, malware, and ransomware infrastructure.
Information security
fromSecurityWeek
1 month ago

Iran-Linked Hackers Take Aim at US and Other Targets, Raising Risk of Cyberattacks During War

Pro-Iranian hackers are expanding cyberattacks from the Middle East into the United States, targeting defense contractors, medical device companies, and critical infrastructure like power stations and water plants.
fromWIRED
2 months ago

Jeffrey Epstein Had a 'Personal Hacker,' Informant Claims

As the standoff between the United States government and Minnesota continues this week over immigration enforcement operations that have essentially occupied the Twin Cities and other parts of the state, a federal judge delayed a decision this week and ordered a new briefing on whether the Department of Homeland Security is using armed raids to pressure Minnesota into abandoning its sanctuary policies for immigrants.
US politics
#apt28
Information security
fromThe Hacker News
1 month ago

APT28 Uses BEARDSHELL and COVENANT Malware to Spy on Ukrainian Military

APT28, a Russian state-sponsored hacking group, has deployed BEARDSHELL and COVENANT malware since April 2024 to conduct long-term surveillance of Ukrainian military personnel.
Information security
fromThe Hacker News
1 month ago

APT28-Linked Campaign Deploys BadPaw Loader and MeowMeow Backdoor in Ukraine

Russian state-sponsored APT28 deployed two new malware families, BadPaw and MeowMeow, targeting Ukrainian entities through phishing emails with Ukrainian-language lures about border crossing appeals.
Information security
fromThe Hacker News
1 month ago

APT28 Uses BEARDSHELL and COVENANT Malware to Spy on Ukrainian Military

APT28, a Russian state-sponsored hacking group, has deployed BEARDSHELL and COVENANT malware since April 2024 to conduct long-term surveillance of Ukrainian military personnel.
Information security
fromThe Hacker News
1 month ago

APT28-Linked Campaign Deploys BadPaw Loader and MeowMeow Backdoor in Ukraine

Russian state-sponsored APT28 deployed two new malware families, BadPaw and MeowMeow, targeting Ukrainian entities through phishing emails with Ukrainian-language lures about border crossing appeals.
Information security
fromTechCrunch
1 month ago

The mystery of a globetrotting iPhone-hacking toolkit

A sophisticated iPhone hacking toolkit called Coruna, likely developed by U.S. military contractor L3Harris, was stolen and used by Russian and Chinese hackers to target victims in Ukraine and China.
fromEngadget
1 month ago

Dutch intelligence services warn of Russian hackers targeting Signal and WhatsApp

Russian hackers have launched "a large-scale global cyber campaign to gain access to Signal and WhatsApp accounts belonging to dignitaries, military personnel and civil servants." According to the Dutch alert, hackers are imitating support chatbots to trick key targets into revealing their PINs for those communication platforms, which allows the bad actors to access incoming messages.
Information security
Information security
fromTechzine Global
1 month ago

China and spyware companies dominate zero-day attacks

Zero-day vulnerability exploits reached 90 cases in 2025, with Chinese cyber espionage groups and commercial spyware companies driving attacks increasingly toward enterprise infrastructure and security equipment.
Information security
fromThe Hacker News
1 month ago

China-Linked Hackers Use TernDoor, PeerTime, BruteEntry in South American Telecom Attacks

A China-linked APT group targets South American telecommunications infrastructure with three new implants across Windows, Linux, and edge devices since 2024.
Information security
fromtechcrunch.com
1 month ago

FBI investigating hack on its wiretap and surveillance systems: report

Hackers breached FBI networks managing wiretaps and foreign intelligence surveillance warrants, marking another major U.S. government cybersecurity incident amid ongoing threats from Chinese and Russian threat actors.
Information security
fromNextgov.com
1 month ago

Potential US-built hacking tools obtained by foreign spies and cybercriminals, research says

A sophisticated iPhone hacking toolkit called Coruna, likely originating from U.S. government development, has proliferated to foreign intelligence agencies and criminal groups, compromising iOS devices through multiple exploit chains.
Information security
fromSecurityWeek
2 months ago

Cyberspy Group Hacked Governments and Critical Infrastructure in 37 Countries

A state-sponsored cyberespionage group TGR-STA-1030 (Shadow Campaign) compromised at least 70 organizations across 37 countries and targeted government infrastructure in 155 countries.
fromTheregister
2 months ago

Infosec exec sold eight zero-day exploit kits to Russia: DoJ

That changed last week when the US Department of Justice published a sentencing memorandum [PDF] that frames Williams' conduct as a betrayal of his employer and the US government, and the cause of significant harm to US national security. Williams "made it possible for the Russian Broker to arm its clients with powerful cyber exploits that could be used against any manner of victim, civilian or military around the world," the DoJ said.
Information security
fromThe Hacker News
2 months ago

China-Linked Hackers Have Used the PeckBirdy JavaScript C2 Framework Since 2023

The cybersecurity company said it identified the PeckBirdy script framework in 2023 after it observed multiple Chinese gambling websites being injected with malicious scripts, which are designed to download and execute the primary payload in order to facilitate the remote delivery and execution of JavaScript. The end goal of this routine is to serve fake software update web pages for Google Chrome so as to trick users into downloading and running bogus update files, thereby infecting the machines with malware in the process.
Information security
Information security
fromAxios
2 months ago

Exclusive: Suspected Chinese hackers impersonate U.S. briefings in phishing lure

China-linked Mustang Panda used file-based phishing to infect diplomatic and election officials with data-stealing persistent malware, detected by an AI agent at Dream.
Information security
fromThe Hacker News
2 months ago

China-Linked Amaranth-Dragon Exploits WinRAR Flaw in Espionage Campaigns

China-linked Amaranth-Dragon (APT41-associated) carried out stealthy, narrowly focused cyber espionage against Southeast Asian government and law enforcement, exploiting WinRAR CVE-2025-8088.
fromTechCrunch
2 months ago

Informant told FBI that Jeffrey Epstein had a 'personal hacker' | TechCrunch

A confidential informant told the FBI in 2017 that Jeffrey Epstein had a "personal hacker," according to a document released by the Department of Justice on Friday. The document, which was released as part of the Justice Department's legally required effort to publish documents related to its investigation into the late sex offender, does not identify who the alleged hacker was, but does include several details about them.
Information security
Information security
fromNextgov.com
1 month ago

Intelligence firms watch for uptick in Iran cyber activity after US, Israel strikes

Tehran-linked hackers are escalating digital reconnaissance and preparing potentially disruptive cyber operations following recent U.S. and Israeli strikes on Iran.
Information security
fromThe Hacker News
1 month ago

Aeternum C2 Botnet Stores Encrypted Commands on Polygon Blockchain to Evade Takedown

Aeternum C2 botnet uses Polygon blockchain for command-and-control infrastructure, making it resistant to traditional takedown methods by storing instructions on immutable public ledgers.
Information security
fromNextgov.com
1 month ago

Chinese telecom hackers likely holding stolen data 'in perpetuity' for later attempts, FBI official says

Chinese state-backed Salt Typhoon likely retains stolen telecom data indefinitely for surveillance, future exploitation, and aggregation with other exfiltrated information.
Information security
fromwww.mercurynews.com
2 months ago

Asian hackers hit sensitive targets in 37 nations in spying plot

State-aligned Asian cyberespionage group infiltrated networks of 70 organizations across 37+ countries to steal emails, financial, military, and diplomatic information.
Information security
fromThe Hacker News
2 months ago

APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks

Russia-linked UAC-0001 exploited CVE-2026-21509 in malicious Office RTFs to deliver MiniDoor and PixyNetLoader targeting users in Ukraine, Slovakia, and Romania.
Information security
fromThe Hacker News
2 months ago

Infy Hackers Resume Operations with New C2 Servers After Iran Internet Blackout Ends

Infy, an Iranian state-backed threat group, paused C2 operations during Iran's nationwide internet blackout and reestablished new C2 infrastructure immediately before connectivity was restored.
Information security
fromThe Hacker News
2 months ago

ThreatsDay Bulletin: New RCEs, Darknet Busts, Kernel Bugs & 25+ More Stories

Small, quiet shifts across systems—abused trusted tools and unnoticed vulnerabilities—are causing privilege escalation, cryptomining infections, and broader erosion of access, data, and trust.
[ Load more ]