#industrial-espionage

[ follow ]
#cybersecurity
fromFortune
2 days ago
Privacy professionals

First they went after medtech, then Kash Patel. Iranian hackers' next target is likely 'low-hanging fruit' in water, energy, and tourism, experts say | Fortune

fromTechCrunch
1 week ago
EU data protection

Europe's cyber agency blames hacking gangs for massive data breach and leak | TechCrunch

Privacy technologies
fromYahoo Tech
2 days ago

Hackers Are Using Your Home Router to Spy on Microsoft 365 Users

Russian spies exploited consumer routers to steal Microsoft 365 credentials from thousands of users, turning home devices into espionage tools.
Privacy professionals
fromFortune
2 days ago

First they went after medtech, then Kash Patel. Iranian hackers' next target is likely 'low-hanging fruit' in water, energy, and tourism, experts say | Fortune

Iran-linked hackers are targeting high-profile figures and critical infrastructure in the U.S. and Israel to sow disruption.
Information security
fromNextgov.com
2 days ago

US push to counter hackers draws industry deeper into offensive cyber debate

The U.S. government seeks private sector involvement in cyber defense, but clarity on offensive roles remains uncertain.
Information security
fromTheregister
3 days ago

'Several dozen' orgs targeted by a new extortion crew

A new extortion crew, UNC6783, targets high-value corporations using phishing and social engineering tactics to steal sensitive data.
EU data protection
fromTechCrunch
1 week ago

Europe's cyber agency blames hacking gangs for massive data breach and leak | TechCrunch

A cybercriminal group known as TeamPCP hacked the EU's executive body, stealing 92 gigabytes of data, including personal information.
Law
fromIndependent
2 days ago

Computer engineer claims he was penalised for flagging Israeli links of firm given 'bananas' server access at top Irish cybersecurity company

A cyber-security firm reprimanded an engineer for discriminatory comments regarding an Israeli company's access to its servers amid concerns about Palestinian genocide.
fromThe Cipher Brief
2 days ago

Why Australia Needs a National Spy Museum

Many of the foundations that have underpinned Australia's security, prosperity and democracy are being tested: social cohesion is eroding, trust in institutions is declining, intolerance is growing, even truth itself is being undermined by conspiracy, mis- and disinformation.
World politics
US news
fromSecuritymagazine
2 days ago

Top Secret Clearance Holder Charged With Leaking Classified National Defense Information

Courtney Williams was arrested for allegedly sharing classified national defense information with unauthorized individuals, including a journalist, from 2022 to 2025.
Apple
fromTheregister
3 days ago

Security reserchers tricked Apple Intelligence into cursing

Apple Intelligence can be hijacked through prompt injection, exposing millions of users to risk, but a fix was implemented in iOS 26.4 and macOS 26.4.
#supermicro
European startups
fromTheregister
4 days ago

Supermicro investigating alleged China chip smuggling

Supermicro is investigating charges against employees for violating US export restrictions related to AI servers sent to China.
fromFortune
4 days ago
Toronto startup

Supermicro launches probe after co-founder's arrest on charges of $2.5 billion in chip smuggling | Fortune

Intellectual property law
fromTechzine Global
4 days ago

Supermicro launches investigation following case over server exports

Supermicro is investigating potential employee involvement in circumventing export regulations for advanced technology following a criminal case against three individuals.
European startups
fromTheregister
4 days ago

Supermicro investigating alleged China chip smuggling

Supermicro is investigating charges against employees for violating US export restrictions related to AI servers sent to China.
fromFortune
4 days ago
Toronto startup

Supermicro launches probe after co-founder's arrest on charges of $2.5 billion in chip smuggling | Fortune

Intellectual property law
fromTechzine Global
4 days ago

Supermicro launches investigation following case over server exports

Supermicro is investigating potential employee involvement in circumventing export regulations for advanced technology following a criminal case against three individuals.
#north-korea
fromTechCrunch
6 days ago
Remote teams

Watch this video of how a job interviewer exposes a North Korean fake IT worker | TechCrunch

Information security
fromTechRepublic
1 week ago

New North Korean AI Hiring Scheme Targets US Companies

A North Korean operative attempted to infiltrate a cybersecurity firm using a stolen identity and AI-generated resume, highlighting vulnerabilities in hiring processes.
fromTechCrunch
6 days ago
Remote teams

Watch this video of how a job interviewer exposes a North Korean fake IT worker | TechCrunch

Information security
fromTechRepublic
1 week ago

New North Korean AI Hiring Scheme Targets US Companies

A North Korean operative attempted to infiltrate a cybersecurity firm using a stolen identity and AI-generated resume, highlighting vulnerabilities in hiring processes.
fromFast Company
6 days ago

The workers secretly influencing their companies' AI usage

Estefania Angel noticed that while her company helped other enterprises set up AI, it did not use those systems internally. She began using AI apps in Slack, Outlook, and Google to track assignments, which garnered attention from her superiors.
Artificial intelligence
World news
fromThe Washington Post
1 week ago

Chinese firms market Iran war intelligence 'exposing' U.S. forces

Chinese firms are leveraging AI and open-source data to track U.S. military movements, posing potential security risks amid the Iran conflict.
Privacy professionals
fromTechCrunch
4 days ago

Hack-for-hire group caught targeting Android devices and iCloud backups | TechCrunch

A hack-for-hire group is targeting journalists and officials in the Middle East and North Africa using phishing and spyware tactics.
Roam Research
fromThe Cipher Brief
1 week ago

The Chalk Mark Still Matters: Russian Espionage Handling in the Modern Era

Russian intelligence tradecraft has evolved in agent handling, incorporating advanced communication techniques and urban geography for signaling.
Privacy professionals
fromWIRED
4 days ago

Men Are Buying Hacking Tools to Use Against Their Wives and Friends

Telegram groups facilitate the sale of hacking and surveillance services, promoting abusive content targeting women and girls.
Artificial intelligence
fromNextgov.com
1 week ago

Old-school spycraft could make a comeback as AI undermines trust

AI may enhance intelligence gathering but also revive traditional espionage methods due to reliability issues with digital communications.
Silicon Valley
fromSecurityWeek
3 weeks ago

3 Men Charged With Conspiring to Smuggle US Artificial Intelligence to China

Three individuals, including a senior VP of Super Micro, were charged with smuggling advanced Nvidia chips to China, violating U.S. export laws.
#trade-secrets
Intellectual property law
fromPatently-O
1 week ago

Disclosed but Still Secret? The Federal Circuit Weighs Patent Publications Against Trade Secret Claims

The case examines the balance between patent disclosures and trade secret protection under California law regarding a cosmetic penile implant.
Intellectual property law
fromPatently-O
1 week ago

Disclosed but Still Secret? The Federal Circuit Weighs Patent Publications Against Trade Secret Claims

The case examines the balance between patent disclosures and trade secret protection under California law regarding a cosmetic penile implant.
Remote teams
fromCity AM
2 weeks ago

The Debate: Is employee tracking justified in the modern workplace?

Tracking junior employees' work hours ensures accountability and productivity, addressing issues of underreporting and resource allocation.
#data-breach
Privacy professionals
fromTechCrunch
4 days ago

Hackers steal and leak sensitive LAPD police documents | TechCrunch

Cybercriminals leaked sensitive LAPD documents online, including personnel files and internal investigations, allegedly by the extortion gang World Leaks.
Privacy professionals
fromTechCrunch
4 days ago

Hackers steal and leak sensitive LAPD police documents | TechCrunch

Cybercriminals leaked sensitive LAPD documents online, including personnel files and internal investigations, allegedly by the extortion gang World Leaks.
fromFast Company
1 month ago

The real reason your ideas get stolen at work-and how to stop it

Before the idea was announced, one of my coworkers, a PR guy, shared the idea-my idea-with the CEO and CMO. While he didn't exactly say he'd done the work himself, how he talked about it made it seem like it was all his.
Humor
#fbi
fromSecuritymagazine
6 days ago
Privacy professionals

Breach of FBI Surveillance System Considered a "Major Incident," Security Experts Weigh In

FBI confirms major breach of surveillance system, exposing sensitive data and potentially revealing criminal probes and surveillance targets.
Privacy professionals
fromNextgov.com
1 week ago

Suspected Chinese breach of FBI system exposed surveillance targets' phone numbers

A breach linked to China exposed phone numbers of FBI surveillance targets, raising concerns about counterintelligence risks.
Privacy professionals
fromTechRepublic
1 week ago

FBI Declares Surveillance System Breach a 'Major Incident'

A China-linked breach of an FBI surveillance system has been classified as a major incident, posing significant risks to US national security.
Privacy professionals
fromSecuritymagazine
6 days ago

Breach of FBI Surveillance System Considered a "Major Incident," Security Experts Weigh In

FBI confirms major breach of surveillance system, exposing sensitive data and potentially revealing criminal probes and surveillance targets.
Privacy professionals
fromNextgov.com
1 week ago

Suspected Chinese breach of FBI system exposed surveillance targets' phone numbers

A breach linked to China exposed phone numbers of FBI surveillance targets, raising concerns about counterintelligence risks.
#trade-secret-theft
Toronto startup
fromTESLARATI
1 month ago

Tesla VP explains latest updates in trade secret theft case

Tesla won a permanent injunction against Matthews International for stealing trade secrets related to battery manufacturing technology and selling it to competitors.
fromSFGATE
1 month ago
Silicon Valley

3 Bay Area engineers face prison after allegedly leaking Google trade secrets

Toronto startup
fromTESLARATI
1 month ago

Tesla VP explains latest updates in trade secret theft case

Tesla won a permanent injunction against Matthews International for stealing trade secrets related to battery manufacturing technology and selling it to competitors.
fromSFGATE
1 month ago
Silicon Valley

3 Bay Area engineers face prison after allegedly leaking Google trade secrets

#shadow-ai
fromSecuritymagazine
1 month ago
Privacy professionals

Shadow AI: The Invisible Insider Threat

Make safe, governed AI easier to use than unsafe alternatives to prevent Shadow AI data exfiltration and accuracy risks in healthcare.
Privacy technologies
fromInfoWorld
1 month ago

What I learned as an undercover agent on Moltbook

OpenClaw AI agents on Moltbook social network pose severe cybersecurity risks through unauthorized access to sensitive user data and financial systems.
#cybercrime
Privacy professionals
fromTheregister
2 weeks ago

Private sector wants Feds' help to tackle China's Typhoons

Real-time collaboration between public and private sectors on cyber threats was proposed but never implemented, leading to ongoing challenges in combating cybercrime.
Information security
fromNextgov.com
2 weeks ago

European officials highlight private sector help in major cybercrime takedowns

Private sector partners play a crucial role in cybercrime takedowns, aiding law enforcement in disrupting criminal activities and infrastructure.
Information security
fromTechCrunch
5 days ago

Russian government hackers broke into thousands of home routers to steal passwords | TechCrunch

Russian hackers hijacked thousands of routers globally to redirect internet traffic and steal passwords and access tokens.
Information security
fromThe Hacker News
5 days ago

The Hidden Cost of Recurring Credential Incidents

Credential incidents cause significant operational costs and disruptions, impacting IT teams and overall business productivity beyond just breach prevention.
Tech industry
fromIndependent
2 months ago

US Justice Department opens probe in alleged corporate spy plot involving Irish executive

The U.S. Justice Department opened a criminal investigation into allegations that Deel recruited an Irish spy inside rival Rippling.
Information security
fromSecurityWeek
5 days ago

The New Rules of Engagement: Matching Agentic Attack Speed

AI-enabled cyberattacks are currently occurring, with significant impacts on organizations and a widening gap between attackers and defenders.
Business intelligence
fromSecuritymagazine
2 months ago

Private Sector Intelligence Careers

Private-sector intelligence roles require public-sector analytic skills plus explicit training in cognitive tradecraft, decision support, and structured reasoning for business contexts.
fromSecuritymagazine
1 week ago

World Cloud Security Day: Breaking Down the State of the Cloud Cybersecurity and Physical Security

"World Cloud Security Day is a useful reminder to recognize how much cloud risk now comes down to everyday access decisions and overlooked misconfigurations," says James Maude, Field CTO at BeyondTrust.
Information security
Artificial intelligence
fromComputerWeekly.com
1 month ago

US artificial intelligence developers accuse Chinese firms of stealing their data | Computer Weekly

US AI developers report Chinese competitors using distillation attacks to extract model data, while facing accusations of training models on unlicensed data themselves.
#economic-espionage
fromAxios
2 months ago
Artificial intelligence

Ex-Google engineer found guilty of stealing AI secrets for China

fromAxios
2 months ago
Artificial intelligence

Ex-Google engineer found guilty of stealing AI secrets for China

fromComputerworld
1 week ago

A core infrastructure engineer pleads guilty to federal charges in insider attack

Rhyne's attack involved unauthorized remote desktop sessions, deletion of network administrator accounts, and changing of passwords, showcasing significant security vulnerabilities.
Information security
Information security
fromSecurityWeek
1 week ago

Stolen Logins Are Fueling Everything From Ransomware to Nation-State Cyberattacks

Stolen credentials significantly enhance ransomware attacks, enabling illegitimate access and operational disruption within networks.
Information security
fromThe Hacker News
2 weeks ago

Hackers Use Fake Resumes to Steal Enterprise Credentials and Deploy Crypto Miner

A phishing campaign targets French-speaking corporations with fake resumes, deploying malware for credential theft and cryptocurrency mining.
Information security
fromTechCrunch
1 month ago

The mystery of a globetrotting iPhone-hacking toolkit

A sophisticated iPhone hacking toolkit called Coruna, likely developed by U.S. military contractor L3Harris, was stolen and used by Russian and Chinese hackers to target victims in Ukraine and China.
fromwww.theguardian.com
1 month ago

North Korean agents using AI to trick western firms into hiring them, Microsoft says

The scam typically involves state-backed fraudsters applying for remote IT work in the west, using fake identities and the help of facilitators in the country where the company targeted is based. Once hired, they send their wages back to Kim Jong-un's state and have even been known to threaten to release sensitive company data after being fired.
Information security
Information security
fromNextgov.com
1 month ago

Potential US-built hacking tools obtained by foreign spies and cybercriminals, research says

A sophisticated iPhone hacking toolkit called Coruna, likely originating from U.S. government development, has proliferated to foreign intelligence agencies and criminal groups, compromising iOS devices through multiple exploit chains.
Information security
fromTheregister
1 month ago

Google and friends disrupt suspected Beijing espionage op

Google disrupted UNC2814, a China-linked group conducting widespread cyberattacks on telecommunications and government organizations across multiple continents using Google Sheets API for command-and-control operations.
#cyber-espionage
Information security
fromTheregister
1 month ago

Payroll pirates conned the help desk, stole employee's pay

Attackers used compromised shared-mailbox credentials and a help-desk MFA reset via social engineering to divert a physician's salary into the attacker's account.
fromTheregister
2 months ago

Singapore spent 11 months evicting suspected telco spies

The Cyber Security Agency of Singapore said advanced persistent threat UNC3886 dug itself into the networks of all four major telecom providers, sparking an 11-month digital eviction effort involving more than 100 personnel from across government, military, intelligence, and industry. Branded "Operation Cyber Guardian," the cleanup saw the state and telco engineers teaming up to flush the intruders out while keeping the nation's phone and data pipes flowing.
Information security
Information security
fromSecurityWeek
2 months ago

Cyberspy Group Hacked Governments and Critical Infrastructure in 37 Countries

A state-sponsored cyberespionage group TGR-STA-1030 (Shadow Campaign) compromised at least 70 organizations across 37 countries and targeted government infrastructure in 155 countries.
[ Load more ]