cyber espionage
Oppose PRISM-like programs today or lose you privacy tomorrow
I used to work for a telecommunication company. The government had access to call records, although the process for obtaining any information required manual requests and …
Reactions from the security community to the NSA spying scandal
Last week a whistleblower created quite the stir when he leaked documents about PRISM, a surveiilance program by the NSA. Below are comments on this scandal that Help Net …
NSA whistleblower reveals himself, world reacts
This last week has been the most eventful one in infosec history since I can remember. An (at the time unnamed) whistleblower has rocked the world by disclosing documents that …
Video with NSA whistleblower Edward Snowden
This video features an interview with Edward Snowden, the man behind the most significant intelligence leak in U.S. history. Copyright © 2013 Praxis Films / Laura Poitras.
Spyware sold to foreign governments aimed at U.S. woman critical of Turkish movement
A failed phishing attempt aimed at an unnamed woman openly critical of the G??len Movement has revealed that spyware created for lawful intercept purposes is being used for …
Chinese army announces drill to test its digitalized forces
The Chinese People’s Liberation Army (PLA) has announced it will be holding a military exercise in June, aimed at testing “new types of combat forces including …
U.S. weapons systems designs reportedly stolen by hackers
Hackers – more than likely Chinese – have stolen designs for two dozen U.S. weapons systems during a series of raids, a previously undisclosed section of a report …
APT1 is back, attacks many of the initial U.S. corporate targets
The APT1 hacker group is back to its old tricks, targeting a big number of organizations and businesses and, among them, many of those that they have previously breached, …
US DOJ accuses journalist of espionage
Last week’s revelation that the U.S. DOJ has successfully subpoenaed two months’ worth of telephone toll records for phones of AP journalist has created quite an …
Aurora attackers were looking for Google’s surveillance database
When in early 2010 Google shared with the public that they had been breached in what became known as the Aurora attacks, they said that the attackers got their hands on some …
Large cyber espionage emanating from India
Norman Shark uncovered a large and sophisticated cyber-attack infrastructure that appears to have originated from India. The attacks, conducted by private threat actors over a …
Pentagon report accuses China military of cyber espionage
The Pentagon has come out and said it: “China is using its computer network exploitation (CNE) capability to support intelligence collection against the U.S. diplomatic, …
Featured news
Resources
Don't miss
- Five identity-driven shifts reshaping enterprise security in 2026
- What if your face could say “don’t record me”? Researchers think it’s possible
- Conjur: Open-source secrets management and application identity
- Counterfeit defenses built on paper have blind spots
- Budding infosec pros and aspiring cyber crooks targeted with fake PoC exploits