#state-sponsored-hacking

[ follow ]
Film
fromTechCrunch
1 week ago

How the classic anime 'Ghost in the Shell' predicted the future of cybersecurity 30 years ago | TechCrunch

A government-created cyber agent becomes a rogue APT, committing espionage, stock manipulation, terrorism, and invasive cyber-brain hacks, foreshadowing modern state-sponsored cyberthreats.
Information security
fromZDNET
1 week ago

AI's scary new trick: Conducting cyberattacks instead of just helping out

A Chinese state-sponsored group used agentic AI (Claude Code) to conduct a large-scale autonomous cyberespionage campaign, exploiting vulnerabilities and exfiltrating data.
Artificial intelligence
fromAxios
1 week ago

The age of AI-powered cyberattacks is here

AI-driven, fully autonomous cyberattacks by state-backed actors have begun and pose an urgent national-security threat requiring immediate regulation and increased cybersecurity investment.
Information security
fromsfist.com
1 week ago

Anthropic Says Its AI Chatbot Was Used By Chinese Hackers for Large-Scale Cyber Attack

Anthropic's Claude chatbot was used by state-sponsored Chinese hackers to automate large-scale cyberattacks against about 30 American companies.
Artificial intelligence
fromFuturism
1 week ago

Hackers Told Claude They Were Just Conducting a Test to Trick It Into Conducting Real Cybercrimes

Chinese state-sponsored hackers used Anthropic's Claude AI to automate espionage-style cyberattacks against roughly thirty global targets, bypassing guardrails by posing as security firms.
Information security
fromTheregister
2 weeks ago

Chinese spies used Claude to break into critical orgs

Chinese state-backed hackers used Anthropic's Claude Code AI and sub-agents to autonomously conduct multi-stage cyberespionage against about 30 high-value organizations, succeeding in some breaches.
Information security
fromAxios
2 weeks ago

Chinese hackers used Anthropic's AI agent to automate spying

Jailbroken Claude Code autonomously conducted multi-step cyberattacks, creating exploits, harvesting credentials, installing backdoors, and exfiltrating data with minimal human direction.
fromwww.techzine.eu
1 month ago

Hackers were two years inside F5: traces erased

The attackers used a remarkable tactic: lying low for months to allow forensic logs to expire. Waiting to let forensic data expire demonstrates the group's professionalism. The hack at F5 began in late 2023, when attackers exploited a vulnerability in BIG-IP software. According to sources familiar with the incident, F5 staff failed to follow the cybersecurity guidelines that the company provides to customers.
Information security
Information security
fromIT Pro
1 month ago

Hackers stole source code, bug details in disastrous F5 security incident - here's everything we know and how to protect yourself

State-sponsored hackers stole portions of F5 BIG-IP source code and some customer configuration files after maintaining persistent access to development and knowledge-management systems.
Information security
fromSecurityWeek
1 month ago

Chinese Hackers Breached Law Firm Williams & Connolly via Zero-Day

State-sponsored hackers breached Williams & Connolly and accessed a small number of attorneys' email accounts by exploiting an unspecified zero-day vulnerability.
#cybersecurity
Information security
fromIT Pro
5 months ago

'States don't do hacking for fun': NCSC expert urges businesses to follow geopolitics as defensive strategy

Business leaders must monitor geopolitics to adapt cybersecurity strategies and counter state-backed cyber threats effectively.
Information security
fromIT Pro
6 months ago

The UK's science funding agency is being bombarded with cyber attacks

UK Research and Innovation (UKRI) is facing a dramatic increase in cyber attacks, indicating a severe threat to public and private sectors.
fromIT Pro
5 months ago
Information security

'States don't do hacking for fun': NCSC expert urges businesses to follow geopolitics as defensive strategy

fromIT Pro
6 months ago
Information security

The UK's science funding agency is being bombarded with cyber attacks

fromThe Hacker News
2 months ago

China-Linked APT41 Hackers Target U.S. Trade Officials Amid 2025 Negotiations

The committee noted that suspected threat actors from China impersonated Republican Party Congressman John Robert Moolenaar in phishing emails sent to trusted counterparts with an aim to deceive them and trick them into opening files and links that would grant them unauthorized access to their systems and sensitive information without their knowledge. The end goal of the attacks was to steal valuable data by abusing software and cloud services to cover up traces of their activity, a tactic often adopted by state-sponsored hackers to evade detection.
World news
US Elections
fromWIRED
5 months ago

The US Grid Attack Looming on the Horizon

A recent power outage in the Iberian Peninsula highlights vulnerabilities in power grids and the potential threat of cyberattacks.
[ Load more ]