#five-eyes-intelligence

[ follow ]
World news
fromThe Washington Post
11 hours ago

Chinese firms market Iran war intelligence 'exposing' U.S. forces

Chinese firms are leveraging AI and open-source data to track U.S. military movements, posing potential security risks amid the Iran conflict.
#fbi
Privacy professionals
fromNextgov.com
1 day ago

Suspected Chinese breach of FBI system exposed surveillance targets' phone numbers

A breach linked to China exposed phone numbers of FBI surveillance targets, raising concerns about counterintelligence risks.
fromwww.theguardian.com
2 weeks ago
Privacy professionals

How the FBI can conduct mass surveillance even without AI

The FBI can conduct mass surveillance by purchasing data on citizens without AI assistance, despite concerns over privacy and legal protections.
Privacy professionals
fromNextgov.com
1 day ago

Suspected Chinese breach of FBI system exposed surveillance targets' phone numbers

A breach linked to China exposed phone numbers of FBI surveillance targets, raising concerns about counterintelligence risks.
Intellectual property law
fromNextgov.com
1 day ago

Tech bills of the week: Limiting adversaries' access to US tech; and boosting cyber apprenticeships

New legislation aims to strengthen U.S. export controls on sensitive technologies to prevent adversaries from exploiting them for economic gain.
#cybersecurity
Information security
fromThe Hacker News
5 days ago

Weekly Recap: Telecom Sleeper Cells, LLM Jailbreaks, Apple Forces U.K. Age Checks and More

A critical Citrix vulnerability is actively exploited, and the FBI confirms a hack of Director Kash Patel's email account by an Iran-linked group.
fromComputerWeekly.com
2 weeks ago
Information security

UK Cyber Monitoring Centre plans expansion in US amid risk of Category 5 attack | Computer Weekly

A UK initiative to measure the financial impact of cyber attacks will be replicated in the US due to increasing risks.
Information security
fromThe Hacker News
1 day ago

China-Linked TA416 Targets European Governments with PlugX and OAuth-Based Phishing

TA416 has intensified cyberattacks on European government and diplomatic organizations since mid-2025, utilizing advanced malware delivery techniques.
Information security
fromComputerWeekly.com
2 days ago

NCSC warns high-risk individuals of Signal and WhatsApp social engineering attacks | Computer Weekly

High-risk individuals must reduce exposure to social engineering attacks targeting encrypted messaging apps like Signal, WhatsApp, and Facebook Messenger.
Information security
fromThe Hacker News
5 days ago

Three China-Linked Clusters Target Southeast Asian Government in 2025 Cyber Campaign

Three China-aligned threat clusters targeted a Southeast Asian government organization using various malware families in a complex operation.
Information security
fromThe Hacker News
5 days ago

Weekly Recap: Telecom Sleeper Cells, LLM Jailbreaks, Apple Forces U.K. Age Checks and More

A critical Citrix vulnerability is actively exploited, and the FBI confirms a hack of Director Kash Patel's email account by an Iran-linked group.
Information security
fromComputerWeekly.com
2 weeks ago

UK Cyber Monitoring Centre plans expansion in US amid risk of Category 5 attack | Computer Weekly

A UK initiative to measure the financial impact of cyber attacks will be replicated in the US due to increasing risks.
Silicon Valley
fromSilicon Canals
1 day ago

U.S. and China control 90% of AI data centres - the Global South is building a different kind of AI - Silicon Canals

Frugal AI movements in the Global South aim to reclaim sovereignty by developing independent, low-cost AI systems for critical services.
#ice
fromSilicon Canals
2 days ago
US politics

ICE confirms it deployed Paragon spyware inside the United States for drug trafficking cases - Silicon Canals

US politics
fromSilicon Canals
2 days ago

ICE confirms it deployed Paragon spyware inside the United States for drug trafficking cases - Silicon Canals

ICE is using commercial spyware domestically, raising constitutional concerns about warrantless surveillance and lack of oversight.
US politics
fromTechCrunch
2 days ago

ICE says it bought Paragon's spyware to use in drug trafficking cases | TechCrunch

ICE has utilized spyware from Paragon Solutions to combat drug trafficking and foreign terrorist organizations' use of encrypted communications.
Artificial intelligence
fromNextgov.com
3 days ago

Old-school spycraft could make a comeback as AI undermines trust

AI may enhance intelligence gathering but also revive traditional espionage methods due to reliability issues with digital communications.
Europe politics
fromNextgov.com
2 days ago

State official to EU: Work with us on tech policy or fall behind a generation

The EU's regulatory regime hinders innovation and collaboration with the U.S., threatening economic competitiveness and technological advancement.
World politics
fromwww.theguardian.com
2 days ago

New Zealand signs defence pact with Cook Islands after quarrel over China deal

New Zealand and the Cook Islands signed a defence and security declaration, resolving a diplomatic row over the Cook Islands' agreements with China.
fromThe Walrus
4 days ago

The Man Who Put AI at the Centre of America's War Machine | The Walrus

"War is terrible, war is terrible, war is terrible," he intones, holding my gaze and giving voice to a universal chorus.
DC food
fromThe New Yorker
4 days ago

The Spy Who Helped Stop Iran from Getting the Bomb

Chalker claims that during his time at the C.I.A., he was instrumental in persuading Iranian scientists to defect, which provided crucial information that 'prevented Iran from getting a nuke.' His operations involved complex strategies and a deep understanding of the scientists' motivations.
Washington DC
EU data protection
fromwww.dw.com
6 days ago

German public sector tries to reduce reliance on US tech

German authorities' data is at risk due to US access through the CLOUD Act, prompting calls for digital sovereignty alternatives.
Privacy professionals
fromSecurityWeek
3 days ago

FBI Warns of Data Security Risks From China-Made Mobile Apps

Foreign-developed mobile applications pose significant data security risks, particularly those from China, according to an FBI alert.
Information security
fromSecuritymagazine
3 days ago

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Companies are increasingly investing in executive protection due to rising threats, making it a strategic necessity for business continuity and resilience.
#iran
World news
fromTNW | Me
3 days ago

Iran's IRGC names 18 US tech firms including Apple, Microsoft, Nvidia as military targets

The IRGC named 18 US tech firms as targets for retaliation against alleged roles in assassinations in Iran.
Privacy professionals
fromAxios
4 days ago

Cyber warfare starts to get personal in war between U.S., Israel and Iran

Iran-linked hackers are using data leaks and intimidation tactics against individuals to influence public perception during the current conflict.
World news
fromTNW | Me
3 days ago

Iran's IRGC names 18 US tech firms including Apple, Microsoft, Nvidia as military targets

The IRGC named 18 US tech firms as targets for retaliation against alleged roles in assassinations in Iran.
Privacy professionals
fromAxios
4 days ago

Cyber warfare starts to get personal in war between U.S., Israel and Iran

Iran-linked hackers are using data leaks and intimidation tactics against individuals to influence public perception during the current conflict.
fromenglish.elpais.com
1 week ago

Security forces arrest two suspected Russian spies in Germany and Spain

The German Federal Prosecutor's Office ordered the arrest of two individuals accused of spying on a businessman supplying drones to Ukraine for military use.
Germany news
#cybercrime
UK news
fromComputerWeekly.com
2 weeks ago

Technology accelerating crime, boosts case for national police service says NCA chief | Computer Weekly

Technology has fundamentally transformed crime by enabling criminals to operate globally in networks, access money laundering services, and conduct sophisticated attacks with unprecedented scale and speed.
Privacy professionals
fromTheregister
1 week ago

Private sector wants Feds' help to tackle China's Typhoons

Real-time collaboration between public and private sectors on cyber threats was proposed but never implemented, leading to ongoing challenges in combating cybercrime.
Information security
fromSecurityWeek
4 days ago

The Next Cybersecurity Crisis Isn't Breaches-It's Data You Can't Trust

Data integrity now encompasses data trust, emphasizing the importance of reliable data in AI-driven decision-making.
Silicon Valley
fromSecurityWeek
2 weeks ago

3 Men Charged With Conspiring to Smuggle US Artificial Intelligence to China

Three individuals, including a senior VP of Super Micro, were charged with smuggling advanced Nvidia chips to China, violating U.S. export laws.
World news
fromAbc
6 days ago

Australians may be losing faith in US alliance, Hastie says

Andrew Hastie warns that US credibility is damaged, affecting Australia's faith in the alliance amid the Iran conflict.
#military-ai
Artificial intelligence
fromEngadget
2 weeks ago

The Defense Department reportedly plans to train AI models on classified military data

The Pentagon plans to train AI models on classified information in secure facilities for exclusive military use to enhance warfighting capabilities.
Artificial intelligence
fromEngadget
2 weeks ago

The Defense Department reportedly plans to train AI models on classified military data

The Pentagon plans to train AI models on classified information in secure facilities for exclusive military use to enhance warfighting capabilities.
Privacy professionals
fromSilicon Canals
5 days ago

The real US surveillance threat isn't AI - it's the data infrastructure we already built - Silicon Canals

The infrastructure for mass surveillance already exists, relying on pre-existing technology and data rather than new AI advancements.
Law
fromThe Atlantic
3 weeks ago

The Unbearable Lightness of Signalgate

The Uniform Code of Military Justice enforces discipline across all military ranks through 158 articles covering both civilian crimes and military-specific offenses, with recent courts-martial demonstrating consistent enforcement of conduct standards.
fromTheregister
1 week ago

Indian government probes CCTV espionage linked to Pakistan

Indian authorities have reportedly ordered an audit of the nation's CCTV cameras, after police uncovered what they claim was a Pakistan-backed surveillance operation involving cameras aimed at railway stations and other infrastructure.
Privacy professionals
World politics
fromThe Cipher Brief
3 weeks ago

How GEOINT Can Sustain US Advantages in Africa

Geospatial intelligence enables the US Intelligence Community to monitor African security, economic, and humanitarian challenges across dispersed regions with limited physical access.
UK news
fromwww.theguardian.com
4 weeks ago

UK counter-terrorism agents granted more time to question men suspected of spying for Iran

Four men arrested on suspicion of spying for Iran on Jewish community locations and individuals in Britain can be held in custody until 13 March for questioning.
Information security
fromNextgov.com
1 week ago

New NSA director pushes for more intel-sharing with allies in internal meeting

Gen. Josh Rudd emphasizes enhanced intelligence-sharing with allies and a focus on foreign adversaries like Russia and China.
#apple-security-certification
Venture
fromThe Cipher Brief
1 month ago

What the Latest Policy and Tech Shifts Mean for National Security

Counter-Unmanned Aerial Systems require integrated, multi-layered defense architectures combining non-kinetic and kinetic responses rather than isolated legacy technologies, as modern autonomous drones render traditional electronic warfare ineffective.
World news
fromLondon Business News | Londonlovesbusiness.com
3 weeks ago

US and Israel 'consider special forces raid' to seize Iran's enriched uranium - London Business News | Londonlovesbusiness.com

The United States and Israel are discussing a potential special forces operation to seize Iran's highly enriched uranium stockpile to prevent nuclear weapon development.
World politics
fromwww.theguardian.com
1 month ago

Canadian PM Mark Carney offers to team up with Australia as strategic cousins' to push back against dominant superpowers

Canada and Australia should collaborate as strategic partners on critical minerals, defence, and trade rather than compete, leveraging their combined 34% of global lithium and significant uranium and iron ore reserves.
#nato-security-certification
Information security
fromThe Cipher Brief
2 weeks ago

America Is Digitally Fragile - and Our Adversaries Know It

America faces unprecedented vulnerability as critical infrastructure systems are digitally dependent and interconnected, while adversaries possess capabilities to penetrate and pre-position for exploitation before conflict begins.
fromwww.aljazeera.com
4 weeks ago

US downplays reports Russia gave Iran intel to help Tehran strike US assets

Since the war began on February 28, Russia has passed Iran the locations of US military assets, including warships and aircraft, three officials, who spoke on the condition of anonymity, told The Washington Post. It does seem like it's a pretty comprehensive effort, one of the sources told the newspaper.
World news
fromwww.bbc.com
1 month ago

UK agrees drone defence plan with four EU allies

Britain is to develop new air defence weapons alongside the EU's four biggest military powers, deepening ties with the European defence sector. The project will invite manufacturers in the UK, Germany, France, Italy and Poland to submit plans to build low-cost missiles and autonomous drones. The allies are pledging a speedy process to build the weapons together, inspired by Ukraine's development of cheap drones to counter attacks from Russia.
UK politics
Artificial intelligence
fromComputerWeekly.com
1 month ago

US artificial intelligence developers accuse Chinese firms of stealing their data | Computer Weekly

US AI developers report Chinese competitors using distillation attacks to extract model data, while facing accusations of training models on unlicensed data themselves.
Apple
fromThe Verge
1 month ago

NATO says iPhones are secure enough to handle classified data

iPhone and iPad with iOS 26 and iPadOS 26 are approved to store NATO-restricted classified information without special software or settings.
World news
fromwww.bbc.com
1 month ago

UK will allow US to use bases to strike Iranian missile sites, PM says

The UK agreed to allow US use of British military bases for defensive strikes against Iranian missile sites, while maintaining it will not participate in offensive operations.
fromThe New Yorker
2 months ago

National Security Begins Behind the Toaster

Dear Secretary Pete Hegseth, I realize that this is a big ask, but would you please invade and take possession of my son and daughter-in-law's apartment? Or maybe you'd like to make them an offer first? Either way, as a concerned mother and patriot who believes that national security begins at home, I feel it's my duty to let you know that Otis and Luna, the co-dictators of Unit 4-C, at 439 Bergen Street, in Park Slope, Brooklyn, must be overthrown.
Humor
Artificial intelligence
fromEngadget
1 month ago

The US will send Tech Corps members to foreign countries in its latest push for AI dominance

The Peace Corps launched Tech Corps to deploy AI-skilled volunteers abroad to support agriculture, education, health, and economic development while advancing U.S. AI influence.
Information security
fromTechzine Global
4 weeks ago

China and spyware companies dominate zero-day attacks

Zero-day vulnerability exploits reached 90 cases in 2025, with Chinese cyber espionage groups and commercial spyware companies driving attacks increasingly toward enterprise infrastructure and security equipment.
fromNextgov.com
1 month ago

US cyber responses will be 'linked to adversary actions' and involve industry coordination, official says

Future U.S. government responses in cyberspace will be "linked to adversary actions" and will involve coordination between the private sector and smaller governments, a top White House official said Thursday. The dynamic, which will be codified in a forthcoming national cyber strategy, is meant to make clear that foreign adversaries' actions that target U.S. networks have consequences, according to Alexandra Seymour, who serves as the principal deputy assistant national cyber director for policy in the Office of the National Cyber Director.
US politics
fromThe Walrus
2 months ago

Canada Is Building a Surveillance Network in Space | The Walrus

Our iron giant is a deep space radio telescope, with an antenna dish measuring forty-six metres across, the largest instrument of its kind in Canada. Starting in the 1960s, the Algonquin Radio Observatory performed a number of cutting-edge scientific projects, including joining SETI's early efforts, in the 1970s and 1980s, to find signatures of alien life-spectrum emissions from water molecules, artificial transmitter signals. No luck.
Science
Information security
fromNextgov.com
1 month ago

Potential US-built hacking tools obtained by foreign spies and cybercriminals, research says

A sophisticated iPhone hacking toolkit called Coruna, likely originating from U.S. government development, has proliferated to foreign intelligence agencies and criminal groups, compromising iOS devices through multiple exploit chains.
fromTechRepublic
1 month ago

5 Nations Alert: Critical Cisco Bug Used in Global Espionage Campaign

Cisco confirmed that attackers exploited the bug, tracked as CVE-2026-20127, to bypass authentication, gain privileged access, and quietly steal data. The discovery prompted a rare joint warning from authorities in the US, UK, Australia, Canada, and New Zealand.
Information security
Science
fromThe Cipher Brief
2 months ago

America's Intelligence Satellites are Proliferating: Their Protection is Not, With Exceptions

Many sensitive U.S. national-security satellites remain dangerously exposed to hostile action despite rapid launch cadence and plans for proliferated constellations.
Information security
fromTheregister
1 month ago

Five Eyes urge action as Cisco zero-day attacks uncovered

Five Eyes intelligence agencies warn of active exploitation of two critical Cisco Catalyst SD-WAN vulnerabilities enabling persistent unauthorized access and root compromise.
#foreign-interference
fromNextgov.com
1 month ago

Why the convergence of AI and cybersecurity must be a top priority for the administration

AI is directly impacting blue team (defender) and red team (attacker) strategies, operations and tactics. Federal cybersecurity teams are increasingly relying on AI for anomaly detection, predictive threat intelligence and faster incident response. AI can flag suspicious behavior, such as access to sensitive systems from unusual locations, without depending on static rules.
Information security
fromTechzine Global
2 months ago

America puts an end to international cyber cooperation

On the instructions of President Donald Trump, the United States is withdrawing from international organizations that focus on cybersecurity and hybrid threats. There are concerns within the cybersecurity sector that this decision could undermine global resilience to digital threats. As reported by Computing, the US government claims that these partnerships are not sufficiently effective and are not in line with national interests.
US politics
Information security
fromNextgov.com
1 month ago

Hackers are exploiting exposed Cisco products, Five Eyes intelligence agencies say

CISA, NSA, and Five Eyes partners issued an emergency alert about a significant cyber threat exploiting Cisco wide-area networking vulnerabilities, affecting federal and global networks.
fromTheregister
2 months ago

Hackers suspected of spying on UK officials' calls for years

The Telegraph reports that the activity focused on phones used by senior aides around former prime ministers Boris Johnson, Liz Truss, and Rishi Sunak, with the suspected access stretching back to 2021. Intelligence sources described the compromise as extensive, with one saying the activity went "right into the heart of Downing Street," although it remains unclear whether the prime ministers' own devices were accessed directly.
UK news
US politics
fromThe Cipher Brief
1 month ago

From Secrets to Sensors: Why Open Source Data Must Drive Modern Intelligence

The intelligence community must rebuild on open-source data and commercial technology to enable DoD enterprise command-and-control and remain relevant to warfighters.
US politics
fromThe Cipher Brief
1 month ago

Confidence, Interoperability, and the Limits of U.S. Decision Systems

The United States lacks decision-shaping architecture to reliably produce calibrated strategic judgment, causing institutional overconfidence and vulnerability in cognitive and Gray Zone conflicts.
Information security
fromTheregister
1 month ago

Google and friends disrupt suspected Beijing espionage op

Google disrupted UNC2814, a China-linked group conducting widespread cyberattacks on telecommunications and government organizations across multiple continents using Google Sheets API for command-and-control operations.
US politics
fromNextgov.com
2 months ago

Experts see NSA nominee's Pacific experience as a boost to US cyber posture on China

Lieutenant General Joshua Rudd was nominated to lead the NSA and U.S. Cyber Command, bringing Indo-Pacific operational experience and China-focused insight despite limited cyber background.
fromComputerWeekly.com
2 months ago

US punts renewal of threat data sharing law to September | Computer Weekly

The United States' Cybersecurity Information Sharing Act of 2015 - CISA 2015 - which came within a hair's breadth of lapsing for good at the end of 2025, will now likely be extended through to the end of September as part of a Department of Homeland Security (DHS) funding package for 2026. The DHS Appropriations Act narrowly passed the House of Representatives on Thursday 22 January, overcoming Democrat objections to funding the controversial Immigration and Customs Enforcement (ICE) agency, which falls under the department's remit. It will head to the Senate where it is expected to be taken up before the end of the month.
US politics
World news
fromwww.independent.co.uk
2 months ago

Torture, spies and fibre cables: The security concerns over China's new embassy

The UK approved a large Chinese embassy at Royal Mint Court despite intelligence warnings, with MI5 accepting mitigations for various national security risks.
Information security
fromComputerWeekly.com
1 month ago

Western cyber alliances risk fragmenting in new world order | Computer Weekly

Geopolitical fragmentation in 2025 drove cyber shifts toward coercion, disrupted alliances and intelligence sharing, decentralised resilient cybercrime, and intensified US–China AI competition.
fromTheregister
1 month ago

Singapore spent 11 months evicting suspected telco spies

The Cyber Security Agency of Singapore said advanced persistent threat UNC3886 dug itself into the networks of all four major telecom providers, sparking an 11-month digital eviction effort involving more than 100 personnel from across government, military, intelligence, and industry. Branded "Operation Cyber Guardian," the cleanup saw the state and telco engineers teaming up to flush the intruders out while keeping the nation's phone and data pipes flowing.
Information security
fromComputerWeekly.com
2 months ago

UK and China reach out across cyber no-man's land | Computer Weekly

The so-called 'Cyber Dialogue' will supposedly help manage cyber threats to both country's national security, revealed Bloomberg, which was first to reported the move citing anonymous sources with knowledge of the forum, It claimed that the forum will improve communication, enable private discussions, and deescalate tensions. It also establishes a direct line between London and Beijing to enable senior officials to discuss ongoing cyber incidents.
Information security
Information security
fromArs Technica
2 months ago

US cyber defense chief accidentally uploaded secret government info to ChatGPT

CISA acting director Madhu Gottumukkala uploaded sensitive, "for official use only" contracting documents to a public ChatGPT, triggering DHS cybersecurity warnings.
Information security
fromTheregister
2 months ago

Best of British: UK's infosec envoys are mostly US firms

UK government appointed company ambassadors to promote the Software Security Code of Practice, aiming to improve software supply chain security, commercial trust, and cyber defenses.
Information security
fromComputerWeekly.com
1 month ago

UK government must get its hands dirty on security, report says | Computer Weekly

Persistent cyber security weaknesses cost the UK billions, hamper growth, and expose critical national infrastructure, necessitating a more interventionist national cyber strategy.
fromSecurityWeek
1 month ago

Cyber Insights 2026: Cyberwar and Rising Nation State Threats

Entering the cyber world is stepping into a warzone. Cyber is considered a war zone, and what happens there is described as cyberwar. But it's not that simple. War is conducted by nations (political), not undertaken by criminals (financial). Both are increasing in this war zone we call cyber, but the political threat is growing fast. Cyberwar is a complex subject, and a formal definition is difficult.
Information security
fromwww.theguardian.com
1 month ago

State-sponsored hackers targeting defence sector employees, Google says

The report catalogues a relentless barrage of cyber operations, most by state-sponsored groups, against EU and US industrial supply chains. It suggests the range of targets for these hackers has grown to encompass the broader industrial base of the US and Europe from German aerospace firms to UK carmakers. State-linked hackers have long targeted the global defence industry, but Luke McNamara, an analyst for Google's threat intelligence group, said they had seen more personalised and direct to individual targeting of employees.
Information security
[ Load more ]