#traitor-recruitment

[ follow ]
#ransomware
Law
fromTheregister
5 hours ago

Third ransomware pro pleads guilty to cybercrime U-turn

Angelo Martino pleaded guilty to aiding the ALPHV/BlackCat ransomware gang in extorting US businesses.
Law
fromTheregister
5 hours ago

Third ransomware pro pleads guilty to cybercrime U-turn

Angelo Martino pleaded guilty to aiding the ALPHV/BlackCat ransomware gang in extorting US businesses.
fromLondon Business News | Londonlovesbusiness.com
1 day ago

SAS soldiers quit amid fears of 'witch hunts' over the 'betrayal' of war crimes probes - London Business News | Londonlovesbusiness.com

Many sources have informed The Telegraph that personnel have submitted applications for premature voluntary release, with departures from the regiment described as significant and even considered a 'threat to national security.'
SF politics
Artificial intelligence
fromTechCrunch
1 day ago

NSA spies are reportedly using Anthropic's Mythos, despite Pentagon feud | TechCrunch

The NSA is reportedly using Anthropic's Mythos model for cybersecurity despite previous tensions over access to AI capabilities.
#cia
US news
fromwww.npr.org
1 day ago

U.K police investigating if attacks in London are the work of Iranian proxies

London police investigate arson attacks on Jewish sites, suspecting Iranian proxies may be involved.
#anthropic
fromAxios
2 days ago
Intellectual property law

Scoop: NSA using Anthropic's Mythos despite Defense Department blacklist

fromAxios
2 days ago
Intellectual property law

Scoop: NSA using Anthropic's Mythos despite Defense Department blacklist

Russo-Ukrainian War
fromwww.theguardian.com
2 days ago

Investigators examine whether Ukraine terrorist attack was directed by Russia

A terrorist attack in Kyiv resulted in six deaths, with investigators examining potential links to Moscow and the perpetrator's background.
fromwww.aljazeera.com
5 days ago

Brazil's fugitive ex-spy chief freed in the US after ICE detention

Alexandre Ramagem was sentenced in September to 16 years in prison for his role in the coup attempt by supporters of Bolsonaro in 2023.
US politics
fromThe Cipher Brief
1 week ago

Why Australia Needs a National Spy Museum

Many of the foundations that have underpinned Australia's security, prosperity and democracy are being tested: social cohesion is eroding, trust in institutions is declining, intolerance is growing, even truth itself is being undermined by conspiracy, mis- and disinformation.
World politics
Privacy professionals
fromWIRED
1 week ago

Men Are Buying Hacking Tools to Use Against Their Wives and Friends

Telegram groups facilitate the sale of hacking and surveillance services, promoting abusive content targeting women and girls.
#north-korea
fromComputerWeekly.com
4 days ago
Information security

North Korean social engineering campaign targets macOS users | Computer Weekly

A North Korean campaign targeting macOS users tricked victims into executing malicious files, leading to credential and data theft.
Information security
fromComputerWeekly.com
4 days ago

North Korean social engineering campaign targets macOS users | Computer Weekly

A North Korean campaign targeting macOS users tricked victims into executing malicious files, leading to credential and data theft.
US news
fromSecuritymagazine
1 week ago

Top Secret Clearance Holder Charged With Leaking Classified National Defense Information

Courtney Williams was arrested for allegedly sharing classified national defense information with unauthorized individuals, including a journalist, from 2022 to 2025.
#russian-intelligence
#fbi
fromTechRepublic
2 weeks ago
Privacy professionals

FBI Declares Surveillance System Breach a 'Major Incident'

A China-linked breach of an FBI surveillance system has been classified as a major incident, posing significant risks to US national security.
Privacy professionals
fromNextgov.com
2 weeks ago

Suspected Chinese breach of FBI system exposed surveillance targets' phone numbers

A breach linked to China exposed phone numbers of FBI surveillance targets, raising concerns about counterintelligence risks.
Privacy professionals
fromTechRepublic
2 weeks ago

FBI Declares Surveillance System Breach a 'Major Incident'

A China-linked breach of an FBI surveillance system has been classified as a major incident, posing significant risks to US national security.
Privacy professionals
fromNextgov.com
2 weeks ago

Suspected Chinese breach of FBI system exposed surveillance targets' phone numbers

A breach linked to China exposed phone numbers of FBI surveillance targets, raising concerns about counterintelligence risks.
World news
fromThe Washington Post
2 weeks ago

Chinese firms market Iran war intelligence 'exposing' U.S. forces

Chinese firms are leveraging AI and open-source data to track U.S. military movements, posing potential security risks amid the Iran conflict.
#ice
fromSilicon Canals
2 weeks ago
US politics

ICE confirms it deployed Paragon spyware inside the United States for drug trafficking cases - Silicon Canals

US politics
fromTechCrunch
2 weeks ago

ICE says it bought Paragon's spyware to use in drug trafficking cases | TechCrunch

ICE has utilized spyware from Paragon Solutions to combat drug trafficking and foreign terrorist organizations' use of encrypted communications.
US politics
fromSilicon Canals
2 weeks ago

ICE confirms it deployed Paragon spyware inside the United States for drug trafficking cases - Silicon Canals

ICE is using commercial spyware domestically, raising constitutional concerns about warrantless surveillance and lack of oversight.
Python
fromAntocuni
3 weeks ago

Inside SPy, part 2: Language semantics

SPy aims to enhance Python's performance while integrating static typing, balancing between an interpreter and a compiler.
#espionage
Germany news
fromenglish.elpais.com
3 weeks ago

Security forces arrest two suspected Russian spies in Germany and Spain

Two individuals were arrested for allegedly spying on a businessman supplying drones to Ukraine, with intentions possibly including his assassination.
Germany news
fromwww.dw.com
4 weeks ago

Germany detains two suspected of spying for Russia

Two suspects have been accused of spying for Russia, targeting a German national supplying drones to Ukraine.
Germany news
fromwww.dw.com
4 weeks ago

Germany detains two of suspected spying for Russia

Two suspects have been accused of spying for Russia, targeting a German national supplying drones to Ukraine.
fromNew York Post
1 month ago
US politics

Love-struck suspected Moscow mole in NYC tells FBI agent, 'Catch me, baby' - only to land behind bars

Germany news
fromenglish.elpais.com
3 weeks ago

Security forces arrest two suspected Russian spies in Germany and Spain

Two individuals were arrested for allegedly spying on a businessman supplying drones to Ukraine, with intentions possibly including his assassination.
Germany news
fromwww.dw.com
4 weeks ago

Germany detains two suspected of spying for Russia

Two suspects have been accused of spying for Russia, targeting a German national supplying drones to Ukraine.
Germany news
fromwww.dw.com
4 weeks ago

Germany detains two of suspected spying for Russia

Two suspects have been accused of spying for Russia, targeting a German national supplying drones to Ukraine.
fromNew York Post
1 month ago
US politics

Love-struck suspected Moscow mole in NYC tells FBI agent, 'Catch me, baby' - only to land behind bars

#cybersecurity
fromSilicon Canals
1 week ago
Information security

How Russia's GRU turned $50 routers into a global intelligence platform spanning 120 countries - Silicon Canals

fromSilicon Canals
1 week ago
Information security

Iranian hackers used Stryker's own security tools against it - and U.S. agencies say it's just the beginning - Silicon Canals

Information security
fromThe Cipher Brief
6 days ago

Copy of Trump's Cyber Strategy Is a Strong Playbook, but It's All in the Execution

The National Cyber Strategy aims to enhance U.S. national security through aggressive defense and collaboration with the private sector.
Information security
fromSecurityWeek
1 week ago

US Disrupts Russian Espionage Operation Involving Hacked Routers and DNS Hijacking

The US disrupted a Russian espionage operation using hacked SOHO routers to capture sensitive data from victims.
Information security
fromThe Hacker News
1 week ago

APT28 Deploys PRISMEX Malware in Campaign Targeting Ukraine and NATO Allies

A Russian threat actor is conducting a spear-phishing campaign targeting Ukraine using a new malware suite called PRISMEX, exploiting zero-day vulnerabilities.
Information security
fromSilicon Canals
1 week ago

How Russia's GRU turned $50 routers into a global intelligence platform spanning 120 countries - Silicon Canals

Russia's GRU hijacked consumer routers to create a global intelligence platform, compromising 18,000 devices for surveillance and credential harvesting.
Information security
fromSilicon Canals
1 week ago

Iranian hackers used Stryker's own security tools against it - and U.S. agencies say it's just the beginning - Silicon Canals

Iran-backed hackers are escalating cyberattacks against U.S. critical infrastructure, targeting water utilities and energy systems to cause operational disruption.
Artificial intelligence
fromNextgov.com
2 weeks ago

Old-school spycraft could make a comeback as AI undermines trust

AI may enhance intelligence gathering but also revive traditional espionage methods due to reliability issues with digital communications.
fromwww.theguardian.com
1 month ago

Iranian among two charged over alleged attempt to enter UK nuclear submarine base

A 34-year-old Iranian man and a 31-year-old Romanian woman have been arrested and charged in connection with the incident at HM Naval Base Clyde, known as Faslane.
UK news
fromSecuritymagazine
1 month ago

Trump's Former Counter-Terrorism Official Investigated Over Alleged Leaks

Joe Kent, President Trump's former top counter-terrorism official, is under investigation by the FBI's Criminal Division for allegedly improperly sharing classified information. The investigation began months before Kent's recent resignation, according to four individuals with direct knowledge of the probe who spoke to Semafor.
US politics
#national-security
UK news
fromwww.independent.co.uk
1 month ago

Police given more time to question three men arrested on suspicion of spying for Iran

Police secured extended detention warrants for three men arrested on suspicion of spying for Iran and targeting Jewish community locations and individuals in London.
US politics
fromwww.mediaite.com
1 month ago

Trump Claims to Know Where Iran's Sleeper Cells Are. Why Isn't He Arresting Them?

President Trump claimed federal authorities have identified and are monitoring Iranian operatives who entered the U.S. during Biden's presidency, but reporters failed to press him on this significant national security assertion.
Information security
fromTechzine Global
2 weeks ago

North Korea behind social engineering attack on Axios project

Attackers compromised the Axios maintainer's account through social engineering, publishing malicious versions that installed a Remote Access Trojan on victims' systems.
Privacy technologies
fromInfoWorld
1 month ago

What I learned as an undercover agent on Moltbook

OpenClaw AI agents on Moltbook social network pose severe cybersecurity risks through unauthorized access to sensitive user data and financial systems.
Information security
fromSecurityWeek
3 weeks ago

Stolen Logins Are Fueling Everything From Ransomware to Nation-State Cyberattacks

Stolen credentials significantly enhance ransomware attacks, enabling illegitimate access and operational disruption within networks.
#russian-military-intelligence
UK news
fromwww.theguardian.com
1 month ago

UK counter-terrorism agents granted more time to question men suspected of spying for Iran

Four men arrested on suspicion of spying for Iran on Jewish community locations and individuals in Britain can be held in custody until 13 March for questioning.
fromThe New Yorker
2 months ago

National Security Begins Behind the Toaster

Dear Secretary Pete Hegseth, I realize that this is a big ask, but would you please invade and take possession of my son and daughter-in-law's apartment? Or maybe you'd like to make them an offer first? Either way, as a concerned mother and patriot who believes that national security begins at home, I feel it's my duty to let you know that Otis and Luna, the co-dictators of Unit 4-C, at 439 Bergen Street, in Park Slope, Brooklyn, must be overthrown.
Humor
fromwww.scientificamerican.com
1 month ago

How to win The Traitors, according to science

We watch people lying, and we know they're lying. And also, you watch people dealing with lying not very well and not enjoying it. The lying, backstabbing and manipulation the game inspires does indeed make for delightful TV viewing.
Television
Privacy professionals
fromenglish.elpais.com
1 month ago

How the CIA used a former Spanish soldier to keep tabs on Julian Assange

A Spanish security company owner conducted illegal surveillance of Julian Assange at Ecuador's London embassy on behalf of the CIA, placing hidden microphones and monitoring his communications.
fromNextgov.com
2 months ago

Now accepting applications - for classified intel

Over the past year, waves of federal layoffs have left thousands of government employees and contractor clients suddenly out of work. For foreign intelligence services, that disruption has opened new opportunities. With more former U.S. officials seeking employment or freelance work - often in specialized national security fields - adversaries, namely China, have stepped in, posing as consulting firms, research groups and recruiters.
US news
fromThe Cipher Brief
2 months ago

The Kremlin Files: Russian Double Agents and Operational Games

A double agent, by contrast, is an intelligence asset who is knowingly and deliberately directed by one service to engage another in espionage. The controlling service uses that agent to feed information (called feed material) -true, false, or mixed-to the adversary. They do so to simultaneously study the adversary's tradecraft, collection priorities, and decision-making. In the Russian system, double agents also serve a bureaucratic function: they generate statistics, "success stories," and operational narratives that demonstrate effectiveness to political overseers and ultimately to Putin himself.
World news
US news
fromwww.theguardian.com
1 month ago

The Russian honeytrap: alleged spy for Moscow faces five years in US prison

Nomma Zarubina, an FSB-recruited Russian intelligence operative, pleaded guilty to lying to the FBI about her contacts with Russian intelligence while posing as a legitimate activist to infiltrate American political and academic circles.
#cyberespionage
Information security
fromSecurityWeek
1 month ago

Iran-Linked Hackers Take Aim at US and Other Targets, Raising Risk of Cyberattacks During War

Pro-Iranian hackers are expanding cyberattacks from the Middle East into the United States, targeting defense contractors, medical device companies, and critical infrastructure like power stations and water plants.
US politics
fromEmptywheel
2 months ago

Massive Obama Administration Leaks on Covert CIA Program Training Syrian Rebels

Numerous anonymous U.S. officials disclosed detailed information about a covert CIA program to train Syrian rebels while the CIA declined to comment.
#cia-recruitment
fromFortune
1 month ago
US politics

CIA's social media guide to evading Iranian internet restrictions racks up millions of views as Trump considers military action | Fortune

fromFortune
1 month ago
US politics

CIA's social media guide to evading Iranian internet restrictions racks up millions of views as Trump considers military action | Fortune

US politics
fromEmptywheel
2 months ago

The Scandal of Lying about "Thwarted" "Plots" Started 4 Years Ago

Only one or two U.S. terrorist plots were actually thwarted by the Section 215 call-detail dragnet; the widely cited figure of 54 is incorrect.
World news
fromwww.aljazeera.com
2 months ago

The discombobulator': Did US use secret weapon' in Maduro abduction?

A sonic "discombobulator" weapon was reportedly used to disable equipment and disorient personnel during the January 3 operation in Venezuela.
Information security
fromThe Hacker News
1 month ago

APT28 Uses BEARDSHELL and COVENANT Malware to Spy on Ukrainian Military

APT28, a Russian state-sponsored hacking group, has deployed BEARDSHELL and COVENANT malware since April 2024 to conduct long-term surveillance of Ukrainian military personnel.
Information security
fromTechCrunch
1 month ago

The mystery of a globetrotting iPhone-hacking toolkit

A sophisticated iPhone hacking toolkit called Coruna, likely developed by U.S. military contractor L3Harris, was stolen and used by Russian and Chinese hackers to target victims in Ukraine and China.
US politics
fromMail Online
1 month ago

CIA memo reveals plot to turn citizens into political assassins

Project Artichoke was a classified CIA mind control program from 1951-1956 that attempted to create unwitting assassins through psychological manipulation and drug administration.
fromwww.theguardian.com
1 month ago

North Korean agents using AI to trick western firms into hiring them, Microsoft says

The scam typically involves state-backed fraudsters applying for remote IT work in the west, using fake identities and the help of facilitators in the country where the company targeted is based. Once hired, they send their wages back to Kim Jong-un's state and have even been known to threaten to release sensitive company data after being fired.
Information security
Information security
fromAxios
2 months ago

Exclusive: Suspected Chinese hackers impersonate U.S. briefings in phishing lure

China-linked Mustang Panda used file-based phishing to infect diplomatic and election officials with data-stealing persistent malware, detected by an AI agent at Dream.
Information security
fromNextgov.com
1 month ago

Potential US-built hacking tools obtained by foreign spies and cybercriminals, research says

A sophisticated iPhone hacking toolkit called Coruna, likely originating from U.S. government development, has proliferated to foreign intelligence agencies and criminal groups, compromising iOS devices through multiple exploit chains.
Information security
fromwww.mercurynews.com
2 months ago

Asian hackers hit sensitive targets in 37 nations in spying plot

State-aligned Asian cyberespionage group infiltrated networks of 70 organizations across 37+ countries to steal emails, financial, military, and diplomatic information.
Information security
fromFortune
1 month ago

Cyber retaliation from Iran is a problem for U.S. companies - 'It's in the hands of a 19-year-old hacker in a Telegram room,' ex-NSA operative says | Fortune

Iranian cyber operatives compromised a popular prayer app to coordinate civil resistance during strikes, prompting regime loyalists to launch aggressive counter-attacks through decentralized hacker networks.
Information security
fromSecurityWeek
1 month ago

In Other News: ATT&CK Advisory Council, Russian Cyberattacks Aid Missile Strikes, Predator Bypasses iOS Indicators

Predator spyware suppresses iOS indicators through kernel-level access, Russian cyberattacks on Ukraine's energy grid gather intelligence for missile targeting, and Treasury launches AI cybersecurity initiative for financial services.
[ Load more ]