#gang-nso

[ follow ]
Privacy technologies
fromTNW | Insights
17 hours ago

LinkedIn secretly scans 6,000+ browser extensions and fingerprints your device

LinkedIn's hidden JavaScript routine collects extensive user data without disclosure, raising concerns about covert surveillance practices.
#cybersecurity
fromSilicon Canals
1 day ago
Information security

The man who discovered the ILOVEYOU virus is now fighting Russian drones using the same playbook - Silicon Canals

Information security
fromComputerWeekly.com
3 days ago

NCSC warns high-risk individuals of Signal and WhatsApp social engineering attacks | Computer Weekly

High-risk individuals must reduce exposure to social engineering attacks targeting encrypted messaging apps like Signal, WhatsApp, and Facebook Messenger.
Information security
fromThe Hacker News
5 days ago

Silver Fox Expands Asia Cyber Campaign with AtlasCross RAT and Fake Domains

A campaign targets Chinese-speaking users with typosquatted domains to deliver the AtlasCross RAT, impersonating trusted software brands.
Information security
fromWIRED
20 hours ago

The Hack That Exposed Syria's Sweeping Security Failures

Syrian government accounts on X were hacked, revealing significant vulnerabilities in the state's cybersecurity practices.
Information security
fromSilicon Canals
1 day ago

The man who discovered the ILOVEYOU virus is now fighting Russian drones using the same playbook - Silicon Canals

Mikko Hyppönen has transitioned from cybersecurity to anti-drone defense, focusing on systems for law enforcement and military clients.
Information security
fromThe Hacker News
2 days ago

China-Linked TA416 Targets European Governments with PlugX and OAuth-Based Phishing

TA416 has intensified cyberattacks on European government and diplomatic organizations since mid-2025, utilizing advanced malware delivery techniques.
Information security
fromSecurityWeek
2 days ago

TrueConf Zero-Day Exploited in Asian Government Attacks

Chinese hackers exploited a zero-day vulnerability in TrueConf software to attack government entities in Asia, allowing execution of malicious code.
Information security
fromComputerWeekly.com
3 days ago

NCSC warns high-risk individuals of Signal and WhatsApp social engineering attacks | Computer Weekly

High-risk individuals must reduce exposure to social engineering attacks targeting encrypted messaging apps like Signal, WhatsApp, and Facebook Messenger.
Information security
fromThe Hacker News
5 days ago

Silver Fox Expands Asia Cyber Campaign with AtlasCross RAT and Fake Domains

A campaign targets Chinese-speaking users with typosquatted domains to deliver the AtlasCross RAT, impersonating trusted software brands.
Higher education
fromThe Nation
2 days ago

How Gaza Broke Big Tech's Campus Pipeline

Students are protesting the use of technology in military actions, particularly in relation to Israel's actions in Gaza.
#ai
Digital life
fromFortune
2 days ago

Internet Watch Foundation finds 260-fold increase in AI-generated CSAM in just one year, and 'it's the tip of the iceberg' | Fortune

AI-generated child sexual abuse material is surging, fundamentally changing targeting methods and overwhelming investigators.
Artificial intelligence
fromInfoWorld
6 days ago

Leak reveals Anthropic's 'Mythos,' a powerful AI model aimed at cybersecurity use cases

Anthropic plans to cautiously roll out its advanced LLM, Mythos, starting with enterprise security teams due to cybersecurity concerns.
Artificial intelligence
fromComputerworld
6 days ago

Leak reveals Anthropic's 'Mythos,' a powerful AI model aimed at cybersecurity use cases

Anthropic plans to cautiously roll out its advanced LLM, Mythos, starting with enterprise security teams due to cybersecurity concerns.
Digital life
fromFortune
2 days ago

Internet Watch Foundation finds 260-fold increase in AI-generated CSAM in just one year, and 'it's the tip of the iceberg' | Fortune

AI-generated child sexual abuse material is surging, fundamentally changing targeting methods and overwhelming investigators.
Artificial intelligence
fromInfoWorld
6 days ago

Leak reveals Anthropic's 'Mythos,' a powerful AI model aimed at cybersecurity use cases

Anthropic plans to cautiously roll out its advanced LLM, Mythos, starting with enterprise security teams due to cybersecurity concerns.
Artificial intelligence
fromComputerworld
6 days ago

Leak reveals Anthropic's 'Mythos,' a powerful AI model aimed at cybersecurity use cases

Anthropic plans to cautiously roll out its advanced LLM, Mythos, starting with enterprise security teams due to cybersecurity concerns.
#data-privacy
#fbi
Privacy professionals
fromNextgov.com
2 days ago

Suspected Chinese breach of FBI system exposed surveillance targets' phone numbers

A breach linked to China exposed phone numbers of FBI surveillance targets, raising concerns about counterintelligence risks.
Privacy professionals
fromNextgov.com
2 days ago

Suspected Chinese breach of FBI system exposed surveillance targets' phone numbers

A breach linked to China exposed phone numbers of FBI surveillance targets, raising concerns about counterintelligence risks.
#ai-ethics
fromwww.scientificamerican.com
3 days ago
Artificial intelligence

Anthropic leak reveals Claude Code tracking user frustration and raises new questions about AI privacy

Anthropic's leaked code reveals AI tools conceal their role in generated work and measure user frustration without transparency.
#axios
Node JS
fromAxios
5 days ago

North Korean hackers implicated in major supply chain attack

A compromised maintainer account for the Axios npm package led to the publication of malicious software versions targeting various operating systems.
Node JS
fromSecurityWeek
4 days ago

Axios NPM Package Breached in North Korean Supply Chain Attack

Malicious Axios NPM library versions were distributed in a supply chain attack by North Korean hackers, affecting millions of users.
Information security
fromTechzine Global
4 days ago

North Korea behind social engineering attack on Axios project

Attackers compromised the Axios maintainer's account through social engineering, publishing malicious versions that installed a Remote Access Trojan on victims' systems.
Node JS
fromAxios
5 days ago

North Korean hackers implicated in major supply chain attack

A compromised maintainer account for the Axios npm package led to the publication of malicious software versions targeting various operating systems.
Node JS
fromSecurityWeek
4 days ago

Axios NPM Package Breached in North Korean Supply Chain Attack

Malicious Axios NPM library versions were distributed in a supply chain attack by North Korean hackers, affecting millions of users.
Information security
fromTechzine Global
4 days ago

North Korea behind social engineering attack on Axios project

Attackers compromised the Axios maintainer's account through social engineering, publishing malicious versions that installed a Remote Access Trojan on victims' systems.
Privacy professionals
fromThe Verge
3 days ago

Pinterest said he violated laid-off colleagues' privacy. Now he's going public

A former Pinterest engineer claims he was unjustly fired for sharing a tool that revealed employee layoffs.
Artificial intelligence
fromNextgov.com
4 days ago

Old-school spycraft could make a comeback as AI undermines trust

AI may enhance intelligence gathering but also revive traditional espionage methods due to reliability issues with digital communications.
Information security
fromWIRED
2 days ago

Meta Pauses Work With Mercor After Data Breach Puts AI Industry Secrets at Risk

Meta has paused work with Mercor due to a major security breach affecting data used for AI training.
fromwww.aljazeera.com
2 weeks ago

Blood tech: The UK ambassador, the sex offender, Palantir, and Gaza

Despite its public criticism of both Palantir and Mandelson, the UK government has entered into extensive contracts with the US tech giant, signing a defence contract worth 240 million pounds ($323m) in January. The contract was awarded to Palantir directly, while another, worth 330 million pounds ($444m) and involving the UK's Ministry of Health, was awarded in November 2023 following a bidding process.
UK politics
#whatsapp
Privacy professionals
fromSilicon Canals
3 days ago

Italian surveillance firm SIO built fake WhatsApp app with government spyware, Meta says - Silicon Canals

WhatsApp notified 200 users in Italy about a fake app containing spyware linked to surveillance firm SIO.
Privacy professionals
fromTechCrunch
4 days ago

WhatsApp notifies hundreds of users who installed a fake app that was actually government spyware | TechCrunch

WhatsApp notified 200 users about a malicious fake app containing spyware created by Italian firm SIO.
Privacy professionals
fromSilicon Canals
3 days ago

Italian surveillance firm SIO built fake WhatsApp app with government spyware, Meta says - Silicon Canals

WhatsApp notified 200 users in Italy about a fake app containing spyware linked to surveillance firm SIO.
Privacy professionals
fromTechCrunch
4 days ago

WhatsApp notifies hundreds of users who installed a fake app that was actually government spyware | TechCrunch

WhatsApp notified 200 users about a malicious fake app containing spyware created by Italian firm SIO.
Information security
fromArs Technica
2 days ago

OpenClaw gives users yet another reason to be freaked out about security

OpenClaw's vulnerabilities pose severe security risks, allowing attackers to gain administrative access with minimal permissions.
New York City
fromwww.amny.com
3 weeks ago

Op-Ed | Mamdani must rein in mass surveillance before it's too late | amNewYork

NYC's surveillance infrastructure enables systematic data sharing between agencies, facilitating ICE deportations despite judicial orders for release and creating predictable abuse patterns.
Law
fromThe Atlantic
3 weeks ago

The Unbearable Lightness of Signalgate

The Uniform Code of Military Justice enforces discipline across all military ranks through 158 articles covering both civilian crimes and military-specific offenses, with recent courts-martial demonstrating consistent enforcement of conduct standards.
Privacy technologies
fromSecuritymagazine
2 weeks ago

Fear of Surveillance Leads to Increased VPN Use

36% of U.S. adults use VPNs, primarily to prevent tracking by private companies (65%) and government surveillance (35%), with privacy and security cited as the dominant motivation by 65% of users.
#north-korea
fromFortune
3 days ago
Information security

I knew about North Korean hackers-they still tricked me and got into my computer | Fortune

fromDevOps.com
4 days ago
Information security

North Korean Hackers Suspected in Supply Chain Attack on Popular Axios Project - DevOps.com

fromNextgov.com
5 days ago
Information security

North Korea-linked hackers suspected in Axios open-source hijack, Google analysts say

Information security
fromFortune
3 days ago

I knew about North Korean hackers-they still tricked me and got into my computer | Fortune

North Korean hackers are increasingly targeting individuals in the crypto industry, employing sophisticated deception tactics.
Information security
fromDevOps.com
4 days ago

North Korean Hackers Suspected in Supply Chain Attack on Popular Axios Project - DevOps.com

North Korean hackers hijacked the npm account of an axios maintainer, publishing malicious versions that installed a remote access trojan.
Information security
fromNextgov.com
5 days ago

North Korea-linked hackers suspected in Axios open-source hijack, Google analysts say

North Korea-aligned hackers compromised the Axios JavaScript library, risking many developers' systems through a sophisticated supply chain attack.
Information security
fromTechRepublic
5 days ago

New North Korean AI Hiring Scheme Targets US Companies

A North Korean operative attempted to infiltrate a cybersecurity firm using a stolen identity and AI-generated resume, highlighting vulnerabilities in hiring processes.
Privacy professionals
fromSecurityWeek
4 days ago

FBI Warns of Data Security Risks From China-Made Mobile Apps

Foreign-developed mobile applications pose significant data security risks, particularly those from China, according to an FBI alert.
Privacy professionals
fromAxios
5 days ago

Cyber warfare starts to get personal in war between U.S., Israel and Iran

Iran-linked hackers are using data leaks and intimidation tactics against individuals to influence public perception during the current conflict.
Privacy technologies
fromMedium
3 weeks ago

Your phone isn't eavesdropping. The reality is stranger.

Most people believe phones listen to conversations for targeted ads, but research suggests the actual explanation is more complex and potentially more troubling than simple audio eavesdropping.
Privacy professionals
fromHer Campus
5 days ago

Who's Watching The Watchers? AI, Age Verification, And Online Privacy

Parents are increasingly concerned about children's exposure to harmful online content despite regulations like CIPA and platforms like YouTube Kids.
UK news
fromwww.aljazeera.com
1 month ago

Blood tech: UK's use of Israeli spyware that helps underpin a genocide

The UK government purchases Israeli spyware developed and tested on Palestinians despite publicly criticizing Israeli actions in Gaza and the West Bank.
Privacy professionals
fromWIRED
1 week ago

Using a VPN May Subject You to NSA Spying

Using commercial VPNs may expose Americans to foreign surveillance laws, risking their constitutional protections against warrantless government spying.
fromTechCrunch
1 week ago

Convicted spyware chief hints that Greece's government was behind dozens of phone hacks | TechCrunch

I believe a conviction without evidence is not ⁠justice, it could be part of a cover-up and even a crime. I am willing to share evidence with national and international regulators.
Privacy professionals
fromEntrepreneur
1 month ago

Why Nations Are Now Battling Over Your Digital DNA

Across the world, governments are redefining data. It is no longer a commercial byproduct, but a strategic resource. One that carries economic weight, political influence, and long-term national consequences. At the center of this shift is what most people never consciously see but continuously produce: their digital DNA.
World politics
Information security
fromSecurityWeek
5 days ago

The Next Cybersecurity Crisis Isn't Breaches-It's Data You Can't Trust

Data integrity now encompasses data trust, emphasizing the importance of reliable data in AI-driven decision-making.
Privacy technologies
fromWIRED
1 month ago

A Possible US Government iPhone-Hacking Toolkit Is Now in the Hands of Foreign Spies and Criminals

Apple patched Coruna vulnerabilities in iOS 18, but older versions remain vulnerable; cybercriminals infected approximately 42,000 devices using the toolkit.
World politics
fromSilicon Canals
1 month ago

From Nairobi to Shenzhen to Sao Paulo: the global surveillance stack is being built fastest in the places with the least power to resist it, and almost nobody in Silicon Valley is talking about it - Silicon Canals

Surveillance infrastructure deployment is accelerating in developing nations through fragmented procurement processes, with Chinese vendors gaining market share by avoiding regulatory scrutiny that Western competitors impose.
#pegasus-spyware
Information security
fromSecurityWeek
5 days ago

Stolen Logins Are Fueling Everything From Ransomware to Nation-State Cyberattacks

Stolen credentials significantly enhance ransomware attacks, enabling illegitimate access and operational disruption within networks.
#phishing
Information security
fromTechzine Global
6 days ago

Major phishing campaign on GitHub using fake security alerts

A large-scale phishing campaign targets developers on GitHub, exploiting Discussions to spread fake security alerts about Visual Studio Code and distribute malware.
fromTechCrunch
2 months ago
World news

How a hacking campaign targeted high-profile Gmail and WhatsApp users across the Middle East | TechCrunch

fromDataBreaches.Net
2 months ago
Information security

How a hacking campaign targeted high-profile Gmail and WhatsApp users across the Middle East - DataBreaches.Net

Information security
fromTechzine Global
6 days ago

Major phishing campaign on GitHub using fake security alerts

A large-scale phishing campaign targets developers on GitHub, exploiting Discussions to spread fake security alerts about Visual Studio Code and distribute malware.
fromTechCrunch
2 months ago
World news

How a hacking campaign targeted high-profile Gmail and WhatsApp users across the Middle East | TechCrunch

fromDataBreaches.Net
2 months ago
Information security

How a hacking campaign targeted high-profile Gmail and WhatsApp users across the Middle East - DataBreaches.Net

Miscellaneous
fromwww.theguardian.com
2 months ago

Spanish court points finger at Israel as it drops Pegasus spyware case again

Spanish courts halted their Pegasus spyware probe into senior ministers because Israeli authorities repeatedly failed to cooperate, breaching international cooperation and good faith.
fromwww.theguardian.com
3 weeks ago

Invasive' AI-led mass surveillance in Africa violating freedoms, warn experts

This large-scale and invasive AI-enabled surveillance of public spaces is not legal, necessary or proportionate to the legitimate aim of providing security. History shows us that this is the latest tool used by governments to invade the privacy of citizens and stifle freedom of movement and expression.
Privacy professionals
fromTechzine Global
2 months ago

America puts an end to international cyber cooperation

On the instructions of President Donald Trump, the United States is withdrawing from international organizations that focus on cybersecurity and hybrid threats. There are concerns within the cybersecurity sector that this decision could undermine global resilience to digital threats. As reported by Computing, the US government claims that these partnerships are not sufficiently effective and are not in line with national interests.
US politics
World news
fromwww.theguardian.com
2 months ago

Jordanian authorities used Israeli spyware to surveil pro-Gaza activists, report finds

Jordanian authorities used Israeli Cellebrite forensic tools to extract extensive data from activists' mobile phones, likely breaching international human rights obligations.
UK news
fromwww.bbc.com
1 month ago

'He sent me reams of naked photos': Victims of cyberflasher speak out

A prominent violinist used social media to repeatedly send explicit sexual images and videos to multiple female musicians, causing serious distress and harassment.
Privacy technologies
fromTechCrunch
2 months ago

Critics pan spyware maker NSO's transparency claims amid its push to enter US market | TechCrunch

NSO Group claims a new phase of accountability while omitting concrete evidence of human-rights safeguards and customer sanctions tied to its spyware.
Information security
fromSecurityWeek
3 weeks ago

Iran-Linked Hackers Take Aim at US and Other Targets, Raising Risk of Cyberattacks During War

Pro-Iranian hackers are expanding cyberattacks from the Middle East into the United States, targeting defense contractors, medical device companies, and critical infrastructure like power stations and water plants.
Privacy professionals
fromSilicon Canals
1 month ago

The global south is being surveilled into compliance and Silicon Valley calls it development - Silicon Canals

Technology companies extract valuable personal data from Global South populations through development-framed digital infrastructure projects, concentrating data ownership and control in private corporations while host countries receive limited access.
Information security
fromTheregister
3 weeks ago

Hackers: Democracy's last line of cyber defense

The hacker mindset—analytical curiosity combined with systemic thinking—can defend democracy by creating decentralized communication tools that resist censorship and empower oppressed communities.
Privacy technologies
fromWIRED
1 month ago

How to Organize Safely in the Age of Surveillance

Grassroots organizing requires careful tradeoffs between openness and security to protect participants from extensive government surveillance and corporate data cooperation.
Privacy technologies
fromwww.theguardian.com
1 month ago

Kenyan authorities used Israeli tech to crack activist's phone, report claims

Kenyan authorities used Cellebrite technology to access and extract data from Boniface Mwangi's personal phone while it was in police custody.
Information security
fromTheregister
1 month ago

Spyware disguised as emergency-alert app sent to Israelis

Hamas-linked attackers distributed spyware disguised as an emergency-alert app to Israeli smartphones via SMS phishing messages impersonating the official Oref Alert rocket warning service.
fromwww.mercurynews.com
1 month ago

Grok and other nudification' apps offered by Google and Apple put Silicon Valley at center of global outrage

Grok, a standalone app as well as a feature on Elon Musk's social media platform X, generated 3 million sexualized images in the 11 days after its image-editing feature was released in December, the UK-based Center for Countering Digital Hate reported. Users digitally stripped real women in images and more than 20,000 apparent children manipulating many into sexual poses. Musk responded dismissively, reposting an AI-generated image of a toaster in a bikini, saying he couldn't stop laughing about it.
Artificial intelligence
Information security
fromTechzine Global
1 month ago

China and spyware companies dominate zero-day attacks

Zero-day vulnerability exploits reached 90 cases in 2025, with Chinese cyber espionage groups and commercial spyware companies driving attacks increasingly toward enterprise infrastructure and security equipment.
fromTechCrunch
2 months ago

Governments grapple with the flood of non-consensual nudity on X | TechCrunch

For the past two weeks, X has been flooded with AI-manipulated nude images, created by the Grok AI chatbot. An alarming range of women have been affected by the non-consensual nudes, including prominent models and actresses, as well as news figures, crime victims, and even world leaders. A December 31st research paper from Copyleaks estimated roughly one image was being posted each minute, but later tests found far more.
Artificial intelligence
fromTheregister
2 months ago

How hackers fight back against ICE surveillance tech

The Electronic Frontier Foundation (EFF) has rounded up several of these counter surveillance projects, and perhaps unsurprisingly many of these have to do with Flock, best known for its automated license plate reader (ALPR). Flock operates the largest network of surveillance cameras in America, and, while it has contracts with thousands of police departments and municipalities across the US, sometimes ICE gains access to this footage, according to US Senator Ron Wyden (D-OR) and those who have looked into Flock's misuse.
Privacy technologies
Information security
fromMail Online
1 month ago

Warning to iPhone users over hacking tool tied to government spyware

Coruna spyware targets iPhones running iOS versions from 2019 to late 2023, exploiting over 20 vulnerabilities to steal sensitive data without user awareness.
Information security
fromTechCrunch
1 month ago

A suite of government hacking tools targeting iPhones is now being used by cybercriminals | TechCrunch

Government-designed iPhone exploit kit Coruna leaked from surveillance vendor to cybercriminals, Russian espionage groups, and Chinese hackers, demonstrating how state-sponsored tools proliferate into criminal markets.
Privacy technologies
fromFox News
2 months ago

5 tech terms that shape your online privacy

Limit app permissions, especially location, microphone, and photo access, and regularly adjust device privacy settings to prevent background data collection.
fromElectronic Frontier Foundation
2 months ago

How Hackers Are Fighting Back Against ICE

ICE has been invading U.S. cities, targeting, surveilling , assaulting , and people who are undocumented immigrants. They also have targeted people with work permits , asylum seekers , permanent residents (people holding "green cards"), naturalized citizens , and even citizens by birth. ICE has spent hundreds of millions of dollars on surveillance technology to spy on anyone - and potentially everyone-in the United States.
Privacy technologies
Information security
fromSecurityWeek
1 month ago

Cyberspy Group Hacked Governments and Critical Infrastructure in 37 Countries

A state-sponsored cyberespionage group TGR-STA-1030 (Shadow Campaign) compromised at least 70 organizations across 37 countries and targeted government infrastructure in 155 countries.
Information security
fromTechCrunch
1 month ago

Exclusive: Hacktivist scrapes over 500,000 stalkerware customers' payment records

More than 536,000 customer payment records from Struktura's stalkerware services were scraped, exposing emails, partial card details, and purchased surveillance app subscriptions.
fromTheregister
1 month ago

Singapore spent 11 months evicting suspected telco spies

The Cyber Security Agency of Singapore said advanced persistent threat UNC3886 dug itself into the networks of all four major telecom providers, sparking an 11-month digital eviction effort involving more than 100 personnel from across government, military, intelligence, and industry. Branded "Operation Cyber Guardian," the cleanup saw the state and telco engineers teaming up to flush the intruders out while keeping the nation's phone and data pipes flowing.
Information security
#defense-industrial-base
Information security
fromTechCrunch
1 month ago

China's Salt Typhoon hackers broke into Norwegian companies | TechCrunch

Chinese-backed hacking group Salt Typhoon breached multiple Norwegian organizations, exploiting vulnerable network devices to conduct espionage.
[ Load more ]