#influence-infiltration

[ follow ]
Social media marketing
fromAxios
11 hours ago

The first AI-era war is a "slopaganda" battle to control memes

AI-generated content is rapidly spreading propaganda, making it easier for influencers to adopt conspiracy theories.
#iran
World news
fromwww.theguardian.com
1 hour ago

Viral victory: Iran is beating the land of tech bros in the social media wars

Iran excels in social media engagement, using humor and creativity to challenge the West despite domestic internet restrictions.
Right-wing politics
fromPoynter
3 weeks ago

Trump says Iran is 'based on disinformation.' Experts say its influence operations go far beyond that. - Poynter

The Iranian regime is using generative AI to spread disinformation, complicating the misinformation landscape during the Iran war.
World news
fromwww.aljazeera.com
3 weeks ago

War spirals as information control tightens

The war on Iran has escalated with increased leadership assassinations, a blockade of the Strait of Hormuz, and strikes on energy infrastructure.
World news
fromwww.theguardian.com
1 hour ago

Viral victory: Iran is beating the land of tech bros in the social media wars

Iran excels in social media engagement, using humor and creativity to challenge the West despite domestic internet restrictions.
Right-wing politics
fromPoynter
3 weeks ago

Trump says Iran is 'based on disinformation.' Experts say its influence operations go far beyond that. - Poynter

The Iranian regime is using generative AI to spread disinformation, complicating the misinformation landscape during the Iran war.
World news
fromwww.aljazeera.com
3 weeks ago

War spirals as information control tightens

The war on Iran has escalated with increased leadership assassinations, a blockade of the Strait of Hormuz, and strikes on energy infrastructure.
fromThe Cipher Brief
4 days ago

Why Australia Needs a National Spy Museum

Many of the foundations that have underpinned Australia's security, prosperity and democracy are being tested: social cohesion is eroding, trust in institutions is declining, intolerance is growing, even truth itself is being undermined by conspiracy, mis- and disinformation.
World politics
#cia
fromMail Online
2 weeks ago
Right-wing politics

CIA's chilling plot to turn ordinary Americans into 'assassins'

CIA experimented with mind control during the Cold War to create assassins with split personalities.
fromBusiness Insider
2 months ago
US politics

How CIA black ops actually work, according to a former CIA spy

Former CIA counterterrorism chief in Pakistan who captured Al Qaeda members, survived an assassination attempt, disclosed CIA torture, and now consults, writes, and hosts podcasts.
Privacy professionals
fromWIRED
6 days ago

Men Are Buying Hacking Tools to Use Against Their Wives and Friends

Telegram groups facilitate the sale of hacking and surveillance services, promoting abusive content targeting women and girls.
SF politics
fromWIRED
5 days ago

Politicians Are Spending More Money on Security as They Increasingly Become Targets

Federal campaign spending on security for the 2024 election cycle exceeds five times that of the 2016 election due to rising threats against public servants.
#cybersecurity
fromSilicon Canals
1 week ago
Information security

Iranian hackers used Stryker's own security tools against it - and U.S. agencies say it's just the beginning - Silicon Canals

fromSilicon Canals
6 days ago
Information security

How Russia's GRU turned $50 routers into a global intelligence platform spanning 120 countries - Silicon Canals

fromTechCrunch
3 weeks ago
Privacy professionals

FBI seizes pro-Iranian hacking group's websites after destructive Stryker hack | TechCrunch

Information security
fromSilicon Canals
1 week ago

Iranian hackers used Stryker's own security tools against it - and U.S. agencies say it's just the beginning - Silicon Canals

Iran-backed hackers are escalating cyberattacks against U.S. critical infrastructure, targeting water utilities and energy systems to cause operational disruption.
Information security
fromSecurityWeek
6 days ago

US Disrupts Russian Espionage Operation Involving Hacked Routers and DNS Hijacking

The US disrupted a Russian espionage operation using hacked SOHO routers to capture sensitive data from victims.
Information security
fromThe Hacker News
6 days ago

APT28 Deploys PRISMEX Malware in Campaign Targeting Ukraine and NATO Allies

A Russian threat actor is conducting a spear-phishing campaign targeting Ukraine using a new malware suite called PRISMEX, exploiting zero-day vulnerabilities.
Information security
fromSilicon Canals
6 days ago

How Russia's GRU turned $50 routers into a global intelligence platform spanning 120 countries - Silicon Canals

Russia's GRU hijacked consumer routers to create a global intelligence platform, compromising 18,000 devices for surveillance and credential harvesting.
Information security
fromThe Hacker News
2 weeks ago

China-Linked Red Menshen Uses Stealthy BPFDoor Implants to Spy via Telecom Networks

A China-nexus threat actor has embedded itself in telecom networks for espionage, utilizing stealthy access mechanisms and advanced malware tools.
Privacy professionals
fromTechCrunch
3 weeks ago

FBI seizes pro-Iranian hacking group's websites after destructive Stryker hack | TechCrunch

The FBI seized two websites operated by pro-Iranian hacktivist group Handala, which conducted cyberattacks against U.S. companies and published information about individuals linked to Israeli military and defense contractors.
#ice
fromSilicon Canals
1 week ago
US politics

ICE confirms it deployed Paragon spyware inside the United States for drug trafficking cases - Silicon Canals

US politics
fromTechCrunch
1 week ago

ICE says it bought Paragon's spyware to use in drug trafficking cases | TechCrunch

ICE has utilized spyware from Paragon Solutions to combat drug trafficking and foreign terrorist organizations' use of encrypted communications.
US politics
fromSilicon Canals
1 week ago

ICE confirms it deployed Paragon spyware inside the United States for drug trafficking cases - Silicon Canals

ICE is using commercial spyware domestically, raising constitutional concerns about warrantless surveillance and lack of oversight.
NYC parents
fromWIRED
2 weeks ago

Why ICE Is Allowed to Impersonate Law Enforcement

ICE agents misled campus security to detain a student without proper identification or judicial warrant.
#disinformation
Media industry
fromThe Cipher Brief
1 week ago

Iran Is Building the Disinformation Architecture of the Future-Right Now

Iran's disinformation tactics demonstrate the potential of AI in conflict, emphasizing speed, encryption, and narrative manipulation.
World news
fromThe Cipher Brief
3 weeks ago

When Deepfakes Become Doctrine

Artificial intelligence is being used to create and spread disinformation during the U.S. and Israeli strikes against Iranian military and nuclear infrastructure.
Media industry
fromThe Cipher Brief
1 week ago

Iran Is Building the Disinformation Architecture of the Future-Right Now

Iran's disinformation tactics demonstrate the potential of AI in conflict, emphasizing speed, encryption, and narrative manipulation.
World news
fromThe Cipher Brief
3 weeks ago

When Deepfakes Become Doctrine

Artificial intelligence is being used to create and spread disinformation during the U.S. and Israeli strikes against Iranian military and nuclear infrastructure.
Roam Research
fromThe Cipher Brief
2 weeks ago

The Chalk Mark Still Matters: Russian Espionage Handling in the Modern Era

Russian intelligence tradecraft has evolved in agent handling, incorporating advanced communication techniques and urban geography for signaling.
#fbi
Privacy professionals
fromNextgov.com
1 week ago

Suspected Chinese breach of FBI system exposed surveillance targets' phone numbers

A breach linked to China exposed phone numbers of FBI surveillance targets, raising concerns about counterintelligence risks.
fromwww.mediaite.com
2 months ago
US politics

Senior FBI Official Describes Surreal' Call Where Kash Patel Dictated Social Media Strategy Right After Kirk Assassination

Privacy professionals
fromTechRepublic
1 week ago

FBI Declares Surveillance System Breach a 'Major Incident'

A China-linked breach of an FBI surveillance system has been classified as a major incident, posing significant risks to US national security.
Privacy professionals
fromNextgov.com
1 week ago

Suspected Chinese breach of FBI system exposed surveillance targets' phone numbers

A breach linked to China exposed phone numbers of FBI surveillance targets, raising concerns about counterintelligence risks.
fromwww.mediaite.com
2 months ago
US politics

Senior FBI Official Describes Surreal' Call Where Kash Patel Dictated Social Media Strategy Right After Kirk Assassination

Psychology
fromwww.theguardian.com
2 weeks ago

They feel true': political deepfakes are growing in influence even if people know they aren't real

Online content creators are fabricating people and images for propaganda and profit, blurring the lines between reality and fiction.
Artificial intelligence
fromNextgov.com
1 week ago

Old-school spycraft could make a comeback as AI undermines trust

AI may enhance intelligence gathering but also revive traditional espionage methods due to reliability issues with digital communications.
Python
fromAntocuni
3 weeks ago

Inside SPy, part 2: Language semantics

SPy aims to enhance Python's performance while integrating static typing, balancing between an interpreter and a compiler.
Relationships
fromPsychology Today
3 weeks ago

5 Manipulation Tactics You Might Not See Until It's Too Late

Gaslighting, guilt-tripping, moving the goalposts, and triangulation are manipulative tactics that undermine reality and self-worth in relationships.
Information security
fromTechzine Global
1 week ago

North Korea behind social engineering attack on Axios project

Attackers compromised the Axios maintainer's account through social engineering, publishing malicious versions that installed a Remote Access Trojan on victims' systems.
fromwww.bbc.com
1 month ago

Overseas 'content farms' creating political deepfakes uncovered

I don't think you'll find a politician who hasn't had this done to them... to say it out loud makes me feel quite sad. Several Welsh politicians told the BBC about their experiences as victims of deepfakes, highlighting the widespread nature of AI-generated manipulated content targeting elected officials across the UK political landscape.
UK politics
Media industry
fromwww.mediaite.com
1 month ago

War Propaganda Is Now Made for the Algorithm. Journalism Can't Keep Up.

Foreign and domestic propaganda spreads through social media when users amplify content that aligns with their existing beliefs, regardless of its manipulative intent or source.
Law
fromThe Atlantic
1 month ago

The Unbearable Lightness of Signalgate

The Uniform Code of Military Justice enforces discipline across all military ranks through 158 articles covering both civilian crimes and military-specific offenses, with recent courts-martial demonstrating consistent enforcement of conduct standards.
World politics
fromwww.aljazeera.com
1 month ago

The battle on the propaganda front intensifies

Iran employs asymmetric economic tactics against U.S.-Israeli military superiority while misinformation complicates public understanding of the conflict.
Privacy technologies
fromInfoWorld
1 month ago

What I learned as an undercover agent on Moltbook

OpenClaw AI agents on Moltbook social network pose severe cybersecurity risks through unauthorized access to sensitive user data and financial systems.
fromThe New Yorker
1 month ago

War in the Age of the Online "Information Bomb"

On TikTok, the war against Iran began with a series of videos from influencer types in Dubai, Doha, and elsewhere in the Middle East. They sat on restaurant patios or on hotel-room balconies and pointed their phone cameras skyward to document missiles flying through the air of their respective cities, then disappearing into puffs of smoke as they were shot down.
Social media marketing
World politics
fromNextgov.com
1 month ago

Russia-linked hackers appear on Iran war's cyber front, but their impact is murky

Russia-linked hacktivist groups supporting Iran have increased cyber activity against U.S. and Israeli targets during the Middle East conflict, though their impact remains unclear and largely unverified.
US news
fromwww.theguardian.com
1 month ago

The Russian honeytrap: alleged spy for Moscow faces five years in US prison

Nomma Zarubina, an FSB-recruited Russian intelligence operative, pleaded guilty to lying to the FBI about her contacts with Russian intelligence while posing as a legitimate activist to infiltrate American political and academic circles.
Information security
fromSecurityWeek
1 month ago

Iran-Linked Hackers Take Aim at US and Other Targets, Raising Risk of Cyberattacks During War

Pro-Iranian hackers are expanding cyberattacks from the Middle East into the United States, targeting defense contractors, medical device companies, and critical infrastructure like power stations and water plants.
Privacy professionals
fromTheregister
1 month ago

FBI investigating breach that reportedly hit wiretapping net

The FBI is investigating a breach of its wiretapping and surveillance systems, while Europol dismantled major cybercrime platforms including a phishing service and stolen data marketplace.
Artificial intelligence
fromFuturism
1 month ago

AI Tools Are Supercharging Hackers

AI systems are increasingly weaponized for cybercrime, enabling hackers to exploit vulnerabilities at scale with minimal technical expertise, as demonstrated by recent attacks on Mexican government networks and global firewall systems.
Venture
fromThe Cipher Brief
1 month ago

What the Latest Policy and Tech Shifts Mean for National Security

Counter-Unmanned Aerial Systems require integrated, multi-layered defense architectures combining non-kinetic and kinetic responses rather than isolated legacy technologies, as modern autonomous drones render traditional electronic warfare ineffective.
Information security
fromTheregister
1 month ago

Hackers: Democracy's last line of cyber defense

The hacker mindset—analytical curiosity combined with systemic thinking—can defend democracy by creating decentralized communication tools that resist censorship and empower oppressed communities.
fromThe New Yorker
2 months ago

National Security Begins Behind the Toaster

Dear Secretary Pete Hegseth, I realize that this is a big ask, but would you please invade and take possession of my son and daughter-in-law's apartment? Or maybe you'd like to make them an offer first? Either way, as a concerned mother and patriot who believes that national security begins at home, I feel it's my duty to let you know that Otis and Luna, the co-dictators of Unit 4-C, at 439 Bergen Street, in Park Slope, Brooklyn, must be overthrown.
Humor
fromwww.scientificamerican.com
1 month ago

How to win The Traitors, according to science

We watch people lying, and we know they're lying. And also, you watch people dealing with lying not very well and not enjoying it. The lying, backstabbing and manipulation the game inspires does indeed make for delightful TV viewing.
Television
Information security
fromTechCrunch
1 month ago

The mystery of a globetrotting iPhone-hacking toolkit

A sophisticated iPhone hacking toolkit called Coruna, likely developed by U.S. military contractor L3Harris, was stolen and used by Russian and Chinese hackers to target victims in Ukraine and China.
fromThe New Yorker
2 months ago

Russia Is Swarming Europe with Young Agents

Russian military intelligence is recruiting young people online to carry out arson and other acts of sabotage across Europe. In this week's issue, Joshua Yaffa reports on the Kremlin's secret campaign to undermine the West's support for Ukraine-and breaks down how "single-use agents" are being deployed across the Continent. Some of their missions are small-putting up posters, or picking up a package-while others involve physical attacks, for example setting off explosives and starting fires.
Business
fromThe Local Germany
1 month ago

German spy chief warns of Russian threat to local polls

Elections in Moldova and Romania are recent examples, and we expect more hybrid campaigns throughout this election year in Germany,
Germany news
fromNextgov.com
2 months ago

Now accepting applications - for classified intel

Over the past year, waves of federal layoffs have left thousands of government employees and contractor clients suddenly out of work. For foreign intelligence services, that disruption has opened new opportunities. With more former U.S. officials seeking employment or freelance work - often in specialized national security fields - adversaries, namely China, have stepped in, posing as consulting firms, research groups and recruiters.
US news
Psychology
fromBackyard Garden Lover
2 months ago

Modern Day Mind Control: 16 Hidden Ways Society Is Steering Our Thoughts

Subtle influence tactics, from targeted advertising to social proof, shape beliefs, choices, and autonomy, requiring awareness and critical thinking to resist.
US politics
fromMail Online
1 month ago

CIA memo reveals plot to turn citizens into political assassins

Project Artichoke was a classified CIA mind control program from 1951-1956 that attempted to create unwitting assassins through psychological manipulation and drug administration.
Information security
fromTheregister
1 month ago

Manage attack infrastructure? AI agents can now help

AI agents enable cybercriminals and nation-state hackers to automate reconnaissance, infrastructure management, and attack planning, significantly increasing the speed and scale of cyberattacks.
US politics
fromFortune
1 month ago

CIA's social media guide to evading Iranian internet restrictions racks up millions of views as Trump considers military action | Fortune

The CIA publicly recruited Iranian informants via social media in Farsi during escalating U.S.-Iran tensions and nuclear negotiations.
fromwww.theguardian.com
1 month ago

North Korean agents using AI to trick western firms into hiring them, Microsoft says

The scam typically involves state-backed fraudsters applying for remote IT work in the west, using fake identities and the help of facilitators in the country where the company targeted is based. Once hired, they send their wages back to Kim Jong-un's state and have even been known to threaten to release sensitive company data after being fired.
Information security
Media industry
fromEurasia Review
1 month ago

'Anti-Social Media': The Changing Tech Of Terror - Analysis

Engagement-driven social media algorithms amplify incendiary content, making hate and misinformation profitable while undermining public safety and complicating regulation.
US politics
fromThe Atlantic
2 months ago

The Trump Administration's War on Data

The CIA World Factbook website has been shut down, removing a longstanding public global-data resource and reflecting an administration effort to curtail publicly available information.
Information security
fromtechcrunch.com
1 month ago

FBI investigating hack on its wiretap and surveillance systems: report

Hackers breached FBI networks managing wiretaps and foreign intelligence surveillance warrants, marking another major U.S. government cybersecurity incident amid ongoing threats from Chinese and Russian threat actors.
Information security
fromThe Hacker News
1 month ago

Iran-Linked MuddyWater Hackers Target U.S. Networks With New Dindoor Backdoor

Iranian state-sponsored hacking group MuddyWater infiltrated U.S. and Israeli networks across banks, airports, and defense contractors using previously unknown backdoors Dindoor and Fakeset.
fromThe Cipher Brief
2 months ago

The Kremlin Files: Russian Double Agents and Operational Games

A double agent, by contrast, is an intelligence asset who is knowingly and deliberately directed by one service to engage another in espionage. The controlling service uses that agent to feed information (called feed material) -true, false, or mixed-to the adversary. They do so to simultaneously study the adversary's tradecraft, collection priorities, and decision-making. In the Russian system, double agents also serve a bureaucratic function: they generate statistics, "success stories," and operational narratives that demonstrate effectiveness to political overseers and ultimately to Putin himself.
World news
fromWIRED
2 months ago

AI-Powered Disinformation Swarms Are Coming for Democracy

We are moving into a new phase of informational warfare on social media platforms where technological advancements have made the classic bot approach outdated,
US politics
fromComputerWeekly.com
1 month ago

Spyware suppliers exploit more zero-days than nation states | Computer Weekly

Historically, traditional state-sponsored cyber espionage groups have been the most prolific attributed users of zero-day vulnerabilities. [But] over the last few years, the increase of zero-day exploitation attributed to CSVs and their customers has demonstrated the growing ability of these vendors to provide zero-day access to a wider range of threat actors than ever before.
Information security
World news
fromEmptywheel
2 months ago

Hybrid or Ambiguous, Asymmetric Warfare is Here to Stay

Asymmetric and ambiguous warfare doctrines from China and Russia anticipated cyber and hybrid attacks that the U.S. failed to adequately prepare for.
US politics
fromEmptywheel
2 months ago

Massive Obama Administration Leaks on Covert CIA Program Training Syrian Rebels

Numerous anonymous U.S. officials disclosed detailed information about a covert CIA program to train Syrian rebels while the CIA declined to comment.
Information security
fromNextgov.com
1 month ago

Potential US-built hacking tools obtained by foreign spies and cybercriminals, research says

A sophisticated iPhone hacking toolkit called Coruna, likely originating from U.S. government development, has proliferated to foreign intelligence agencies and criminal groups, compromising iOS devices through multiple exploit chains.
US politics
fromEmptywheel
2 months ago

The Scandal of Lying about "Thwarted" "Plots" Started 4 Years Ago

Only one or two U.S. terrorist plots were actually thwarted by the Section 215 call-detail dragnet; the widely cited figure of 54 is incorrect.
fromElectronic Frontier Foundation
2 months ago

Beware: Government Using Image Manipulation for Propaganda

A short while later, the White House posted the same photo - except that version had been digitally altered to darken Armstrong's skin and rearrange her facial features to make it appear she was sobbing or distraught. The Guardian one of many media outlets to report on this image manipulation, created a handy slider graphic to help viewers see clearly how the photo had been changed.
US politics
#misinformation
Information security
fromNextgov.com
1 month ago

Fake DOD memo about 'compromised' apps shows swift spread of deceptive messaging

A fake U.S. Cyber Command memo falsely claiming apps were compromised and revealing servicemembers' locations circulated during military channels, but DOD confirmed it was not authentic.
Information security
fromNextgov.com
1 month ago

Fake DOD memo about 'compromised' apps shows swift spread of deceptive messaging

A fake U.S. Cyber Command memo falsely claiming apps were compromised and revealing servicemembers' locations circulated during military channels, but DOD confirmed it was not authentic.
US politics
fromThe Cipher Brief
2 months ago

The Country's First 'Cognitive Advantage' Chief: Influence Is the New Battlefield

Integrates information, perception, culture, and behavior operations to provide nonkinetic strategic options and counter adversary cognitive campaigns.
US politics
fromEmptywheel
2 months ago

Should Ex-Senator Tied to CIA "Accountability" Be Involved in This Kind of Propaganda?

A new American Security Initiative ad uses nuclear fear-mongering about Iran, echoing LBJ's "Daisy" tactic to pressure policy and public opinion.
fromEmptywheel
2 months ago

Igor Danchenko Would Have Been a Crucial Witness to Understanding the Disinformation in the Dossier

As one supervisory special agent has agreed, "one of the upshots [of the Crossfire Hurricane Investigation] has been a relationship with [Mr. Danchenko] which has provided the FBI insights into individuals and to areas that it otherwise was lacking [ ] because of the difficulty with which the FBI has in recruiting people from that part of the world." The agent further agreed that the FBI's relationship with Mr. Danchenko was "one thing that in terms of usefulness really did result from this [investigation]."
Information security
fromAxios
2 months ago

Exclusive: Suspected Chinese hackers impersonate U.S. briefings in phishing lure

China-linked Mustang Panda used file-based phishing to infect diplomatic and election officials with data-stealing persistent malware, detected by an AI agent at Dream.
US politics
fromLos Angeles Times
2 months ago

He worked for and romanced Arcadia councilwoman, and he was a covert agent for China

A Southern California man acted as a covert agent for China and was sentenced to four years after aiding a local council member's election.
Information security
fromTechRepublic
2 months ago

Asian Cyber Espionage Campaign Hit 37 Countries

A state-aligned Asian hacking group ran a large cyber espionage campaign compromising government agencies and critical infrastructure across 37 countries to gather economic and geopolitical intelligence.
Information security
fromTheregister
1 month ago

Google and friends disrupt suspected Beijing espionage op

Google disrupted UNC2814, a China-linked group conducting widespread cyberattacks on telecommunications and government organizations across multiple continents using Google Sheets API for command-and-control operations.
Information security
fromSecurityWeek
2 months ago

Cyberspy Group Hacked Governments and Critical Infrastructure in 37 Countries

A state-sponsored cyberespionage group TGR-STA-1030 (Shadow Campaign) compromised at least 70 organizations across 37 countries and targeted government infrastructure in 155 countries.
fromZDNET
2 months ago

This new 'sleeperware' doesn't set off alarms or crash your system - it sneaks in and waits

In its annual Red Report, a body of research that analyzes real-world attacker techniques using large-scale attack simulation data, Picus Labs warns cybersecurity professionals that threat actors are rapidly shifting away from ransomware encryption to parasitic "sleeperware" extortion as their means to loot organizations for millions of dollars per attack. Released today and now in its sixth year, the 278-page Red Report gets its name from Picus-organized cybersecurity exercises that take the perspective of the attacker's team, otherwise known as the "red team."
Information security
fromSecurityWeek
2 months ago

Cyber Insights 2026: Cyberwar and Rising Nation State Threats

Entering the cyber world is stepping into a warzone. Cyber is considered a war zone, and what happens there is described as cyberwar. But it's not that simple. War is conducted by nations (political), not undertaken by criminals (financial). Both are increasing in this war zone we call cyber, but the political threat is growing fast. Cyberwar is a complex subject, and a formal definition is difficult.
Information security
Information security
fromTechzine Global
2 months ago

Researchers hack malware gang via its own weak spot

An XSS flaw in StealC’s web panel allowed takeover of operator sessions, revealing millions of stolen cookies, passwords, and YouTube-based malware distribution.
[ Load more ]