#military-intelligence-leaks

[ follow ]
World news
fromThe Washington Post
22 hours ago

Chinese firms market Iran war intelligence 'exposing' U.S. forces

Chinese firms are leveraging AI and open-source data to track U.S. military movements, posing potential security risks amid the Iran conflict.
#fbi
Privacy professionals
fromNextgov.com
1 day ago

Suspected Chinese breach of FBI system exposed surveillance targets' phone numbers

A breach linked to China exposed phone numbers of FBI surveillance targets, raising concerns about counterintelligence risks.
Privacy professionals
fromNextgov.com
1 day ago

Suspected Chinese breach of FBI system exposed surveillance targets' phone numbers

A breach linked to China exposed phone numbers of FBI surveillance targets, raising concerns about counterintelligence risks.
US politics
fromAdvocate.com
1 day ago

Did the FBI just post this propaganda video to save Kash Patel's job?

The FBI released a video celebrating Director Kash Patel's first year, criticized as propaganda for its cinematic portrayal of law enforcement successes.
fromComputerworld
1 day ago

A core infrastructure engineer pleads guilty to federal charges in insider attack

Rhyne's attack involved unauthorized remote desktop sessions, deletion of network administrator accounts, and changing of passwords, showcasing significant security vulnerabilities.
Information security
fromwww.aljazeera.com
6 hours ago

US satellite firm Planet Labs announces blackout on war on Iran images

Planet Labs stated it will withhold imagery dating back to March 9 and expects the policy to remain in effect until the end of the war, which began on February 28.
Science
US Elections
fromAxios
22 hours ago

"We're fighting wars": Trump bets his presidency on the Pentagon

Trump's budget prioritizes military spending, significantly cutting non-defense programs amid declining approval ratings and rising gas prices.
Artificial intelligence
fromNextgov.com
3 days ago

Old-school spycraft could make a comeback as AI undermines trust

AI may enhance intelligence gathering but also revive traditional espionage methods due to reliability issues with digital communications.
US news
fromMail Online
1 day ago

Leaked 911 call reveals Air Force general 'planned not to be found'

A retired Air Force general, William Neil McCasland, disappeared under mysterious circumstances, leaving behind personal items and raising concerns about his mental health.
Intellectual property law
fromNextgov.com
1 day ago

Tech bills of the week: Limiting adversaries' access to US tech; and boosting cyber apprenticeships

New legislation aims to strengthen U.S. export controls on sensitive technologies to prevent adversaries from exploiting them for economic gain.
Media industry
fromAxios
1 day ago

Hegseth's wartime firing of top generals stuns officials: "It's insane"

George's dismissal was due to personality clashes, not strategic disagreements, during a critical time for the Army.
Law
fromABA Journal
2 days ago

Sanctions ramping up in cases involving AI hallucinations

Monetary sanctions against attorneys for AI-generated hallucinations in case documents are increasing as courts take these issues more seriously.
#cybersecurity
fromTechCrunch
1 day ago
EU data protection

Europe's cyber agency blames hacking gangs for massive data breach and leak | TechCrunch

fromTechCrunch
18 hours ago
Information security

After fighting malware for decades, this cybersecurity veteran is now hacking drones | TechCrunch

EU data protection
fromTechCrunch
1 day ago

Europe's cyber agency blames hacking gangs for massive data breach and leak | TechCrunch

A cybercriminal group known as TeamPCP hacked the EU's executive body, stealing 92 gigabytes of data, including personal information.
Information security
fromTechCrunch
18 hours ago

After fighting malware for decades, this cybersecurity veteran is now hacking drones | TechCrunch

Mikko Hyppönen emphasizes the invisible nature of cybersecurity work, comparing it to Tetris where successes vanish and failures accumulate.
Information security
fromThe Hacker News
1 day ago

China-Linked TA416 Targets European Governments with PlugX and OAuth-Based Phishing

TA416 has intensified cyberattacks on European government and diplomatic organizations since mid-2025, utilizing advanced malware delivery techniques.
Information security
fromSecurityWeek
1 day ago

TrueConf Zero-Day Exploited in Asian Government Attacks

Chinese hackers exploited a zero-day vulnerability in TrueConf software to attack government entities in Asia, allowing execution of malicious code.
Privacy professionals
fromTechRepublic
5 days ago

Iran-Linked Hackers Breach FBI Director Kash Patel's Email, Leak Messages Online

An Iran-linked hacking group breached FBI Director Kash Patel's personal email, releasing non-sensitive information as a retaliatory cyber attack.
Information security
fromThe Hacker News
2 days ago

ThreatsDay Bulletin: Pre-Auth Chains, Android Rootkits, CloudTrail Evasion & 10 More Stories

The ThreatsDay Bulletin provides a concise overview of current cybersecurity threats and trends affecting system safety.
#privacy
fromElectronic Frontier Foundation
1 day ago
Privacy technologies

Double Shot of Privacy's Defender in D.C.

Cindy Cohn's new book, Privacy's Defender, chronicles her 30-year fight for digital privacy and civil liberties.
#openclaw
DevOps
fromInfoWorld
1 day ago

Understanding the risks of OpenClaw

OpenClaw is an orchestration layer that requires external services to function effectively, rather than being a standalone cloud platform.
Information security
fromArs Technica
1 day ago

OpenClaw gives users yet another reason to be freaked out about security

OpenClaw's vulnerabilities pose severe security risks, allowing attackers to gain administrative access with minimal permissions.
fromThe Atlantic
2 days ago

Hegseth's War on America's Military

Hegseth's actions reflect a broader agenda to reshape the military's leadership, prioritizing loyalty to his political beliefs over military experience and competence.
Washington DC
#claude-code
Software development
fromArs Technica
3 days ago

Here's what that Claude Code source leak reveals about Anthropic's plans

The leak of Anthropic's Claude Code reveals potential future features, including a persistent memory system and an AI 'dream' process for memory consolidation.
Information security
fromSecurityWeek
2 days ago

Critical Vulnerability in Claude Code Emerges Days After Source Leak

Anthropic's Claude Code source code was leaked, revealing operational details but not compromising sensitive data like model weights or customer information.
Information security
fromTheregister
4 days ago

Claude Code's source reveals extent of system access

Claude Code has significant control over devices, raising concerns about data retention and potential misuse in sensitive environments.
Roam Research
fromThe Cipher Brief
4 days ago

The Chalk Mark Still Matters: Russian Espionage Handling in the Modern Era

Russian intelligence tradecraft has evolved in agent handling, incorporating advanced communication techniques and urban geography for signaling.
UK politics
fromwww.theguardian.com
3 days ago

Royal Navy captain steps back from duties over link to MP whose husband faces China spy claims

A Royal Navy captain stepped back from duties due to a relationship with MP Joani Reid amid concerns of potential blackmail and security risks.
fromThe Walrus
4 days ago

The Man Who Put AI at the Centre of America's War Machine | The Walrus

"War is terrible, war is terrible, war is terrible," he intones, holding my gaze and giving voice to a universal chorus.
DC food
SF politics
fromNextgov.com
5 days ago

New contract for background investigations raises concerns about scale and risk

DCSA is modernizing its Case Processing Operations Center to enhance background investigations and incorporate Continuous Vetting for national security.
Remote teams
fromTheregister
6 days ago

Security contractor blew the whistle on shabby support crew

Brad, a security contractor, faced challenges with antivirus alerts while working in a labor hire company's office without proper IT support.
#iran
World news
fromwww.mediaite.com
1 day ago

Former Trump NatSec Advisor Says President Probably in Panic Mode' After Two U.S. Jets Shot Down

Trump's credibility is undermined after Iran shot down U.S. military planes, contradicting his claims of air supremacy.
Privacy professionals
fromAxios
4 days ago

Cyber warfare starts to get personal in war between U.S., Israel and Iran

Iran-linked hackers are using data leaks and intimidation tactics against individuals to influence public perception during the current conflict.
World news
fromwww.mediaite.com
1 day ago

Former Trump NatSec Advisor Says President Probably in Panic Mode' After Two U.S. Jets Shot Down

Trump's credibility is undermined after Iran shot down U.S. military planes, contradicting his claims of air supremacy.
Privacy professionals
fromAxios
4 days ago

Cyber warfare starts to get personal in war between U.S., Israel and Iran

Iran-linked hackers are using data leaks and intimidation tactics against individuals to influence public perception during the current conflict.
#government-shutdown
US politics
fromwww.aljazeera.com
2 days ago

US Homeland Security shutdown to stretch on, despite Senate passing funding

The House has not voted on the Senate bill, prolonging the partial government shutdown affecting DHS funding and federal workers.
US politics
fromThe New Yorker
1 day ago

What Did the Partial D.H.S. Shutdown Accomplish?

Democrats faced challenges in funding negotiations, leading to multiple government shutdowns and unresolved immigration enforcement issues.
US politics
fromwww.aljazeera.com
2 days ago

US Homeland Security shutdown to stretch on, despite Senate passing funding

The House has not voted on the Senate bill, prolonging the partial government shutdown affecting DHS funding and federal workers.
US politics
fromPOLITICO
4 days ago

The DHS shutdown might never end

The government shutdown has left tens of thousands of workers affected, with low morale and no immediate resolution in sight.
fromWIRED
1 day ago

CBP Facility Codes Sure Seem to Have Leaked Via Online Flashcards

The public Quizlet set contained information about alleged codes for specific facility entrances. 'Checkpoint doors code?' asked one card, with a specific four-digit combination listed in response.
Privacy professionals
Washington DC
fromwww.aljazeera.com
2 days ago

Hegseth fires US Army chief of staff in reported string of dismissals

General Randy A. George has been dismissed by Defence Secretary Pete Hegseth amid ongoing conflicts, marking a significant leadership change in the US Army.
World politics
fromThe Cipher Brief
1 week ago

National Security Starts at Home - Not on the Battlefield

National security relies on enduring internal capacity rather than just accumulated hard power or visible instruments of power.
#ai-regulation
fromSilicon Canals
5 days ago
Intellectual property law

Court blocks Pentagon's Anthropic blacklisting, finds Trump administration's 'kill switch' claim had no evidence - Silicon Canals

Intellectual property law
fromSilicon Canals
5 days ago

Court blocks Pentagon's Anthropic blacklisting, finds Trump administration's 'kill switch' claim had no evidence - Silicon Canals

A federal judge temporarily blocked the Pentagon from designating Anthropic as a supply chain risk, citing violations of legal procedures and First Amendment rights.
Artificial intelligence
fromNextgov.com
2 weeks ago

The Pentagon's 'woke AI' problem

The Trump administration pressured Anthropic to expand Pentagon contract terms to include 'all lawful purposes' or face supply chain risk designation, framing the conflict as opposition to 'woke AI' despite Anthropic's extensive use in defense and intelligence operations.
#anthropic
Software development
fromFortune
4 days ago

Anthropic leaks its own AI coding tool's source code in second major security breach | Fortune

Anthropic leaked the source code for Claude Code, exposing 500,000 lines of code due to a packaging error, raising cybersecurity concerns.
Artificial intelligence
fromAxios
2 weeks ago

Pentagon: Anthropic's foreign workforce poses security risks

Anthropic's employment of foreign nationals raises national security concerns, particularly regarding compliance with China's National Intelligence Law.
Software development
fromFortune
4 days ago

Anthropic leaks its own AI coding tool's source code in second major security breach | Fortune

Anthropic leaked the source code for Claude Code, exposing 500,000 lines of code due to a packaging error, raising cybersecurity concerns.
Artificial intelligence
fromAxios
2 weeks ago

Pentagon: Anthropic's foreign workforce poses security risks

Anthropic's employment of foreign nationals raises national security concerns, particularly regarding compliance with China's National Intelligence Law.
US politics
fromwww.npr.org
1 day ago

As DOJ prepares to share state voter data with DHS, a key privacy officer resigns

The DOJ is acquiring sensitive voter registration data, raising privacy concerns, as a key privacy officer resigns amid ongoing legal challenges.
#data-breach
Privacy professionals
fromSilicon Canals
1 day ago

A fintech app asked users for their passports - then left 360,000 files unprotected for five years - Silicon Canals

A money transfer app exposed over 360,000 sensitive files on a public server for nearly five years, including unencrypted personal documents.
Information security
fromTheregister
2 days ago

The company's biggest security hole lived in the breakroom

An internet-connected coffee machine caused a major data breach by exploiting security vulnerabilities in a corporate network.
Privacy professionals
fromSilicon Canals
1 day ago

A fintech app asked users for their passports - then left 360,000 files unprotected for five years - Silicon Canals

A money transfer app exposed over 360,000 sensitive files on a public server for nearly five years, including unencrypted personal documents.
Information security
fromTheregister
2 days ago

The company's biggest security hole lived in the breakroom

An internet-connected coffee machine caused a major data breach by exploiting security vulnerabilities in a corporate network.
Washington DC
fromArs Technica
3 days ago

Official White House app developer also a UFO conspiracy theorist

The White House launched a new mobile app developed by 45Press, led by a CEO with a hobby in conspiracy theories.
US politics
fromNextgov.com
1 day ago

President's budget proposes folding beleaguered DHS intelligence office into headquarters

The Department of Homeland Security's intelligence office faces consolidation and potential workforce reductions under Trump's proposed budget for 2027.
fromThe New Yorker
5 days ago

The Spy Who Helped Stop Iran from Getting the Bomb

Chalker claims that during his time at the C.I.A., he was instrumental in persuading Iranian scientists to defect, which provided crucial information that 'prevented Iran from getting a nuke.' His operations involved complex strategies and a deep understanding of the scientists' motivations.
Washington DC
#cisa
US politics
fromTheregister
1 day ago

Trump wants to slash $707M from CISA's budget

CISA faces a proposed $707 million budget cut, risking national cybersecurity and critical infrastructure management.
US politics
fromTheregister
1 day ago

Trump wants to slash $707M from CISA's budget

CISA faces a proposed $707 million budget cut, risking national cybersecurity and critical infrastructure management.
Privacy professionals
fromThe Verge
2 days ago

Pinterest said he violated laid-off colleagues' privacy. Now he's going public

A former Pinterest engineer claims he was unjustly fired for sharing a tool that revealed employee layoffs.
Washington DC
fromwww.mediaite.com
5 days ago

Top Trump Spox Asked About Massive Military Complex' Under New White House Ballroom

A massive military complex is being built under the new White House ballroom, with upgrades to facilities ongoing.
Information security
fromWIRED
1 day ago

Meta Pauses Work With Mercor After Data Breach Puts AI Industry Secrets at Risk

Meta has paused work with Mercor due to a major security breach affecting data used for AI training.
#ice
US politics
fromTechCrunch
2 days ago

ICE says it bought Paragon's spyware to use in drug trafficking cases | TechCrunch

ICE has utilized spyware from Paragon Solutions to combat drug trafficking and foreign terrorist organizations' use of encrypted communications.
US politics
fromSilicon Canals
2 days ago

ICE confirms it deployed Paragon spyware inside the United States for drug trafficking cases - Silicon Canals

ICE is using commercial spyware domestically, raising constitutional concerns about warrantless surveillance and lack of oversight.
US politics
fromTechCrunch
2 days ago

ICE says it bought Paragon's spyware to use in drug trafficking cases | TechCrunch

ICE has utilized spyware from Paragon Solutions to combat drug trafficking and foreign terrorist organizations' use of encrypted communications.
US politics
fromSilicon Canals
2 days ago

ICE confirms it deployed Paragon spyware inside the United States for drug trafficking cases - Silicon Canals

ICE is using commercial spyware domestically, raising constitutional concerns about warrantless surveillance and lack of oversight.
Privacy professionals
fromSecurityWeek
3 days ago

FBI Warns of Data Security Risks From China-Made Mobile Apps

Foreign-developed mobile applications pose significant data security risks, particularly those from China, according to an FBI alert.
Information security
fromSecurityWeek
1 day ago

Mobile Attack Surface Expands as Enterprises Lose Control

Mobile device security is inadequate, with many organizations using critically outdated operating systems and exposing sensitive data to potential attacks.
Law
fromThe Atlantic
3 weeks ago

The Unbearable Lightness of Signalgate

The Uniform Code of Military Justice enforces discipline across all military ranks through 158 articles covering both civilian crimes and military-specific offenses, with recent courts-martial demonstrating consistent enforcement of conduct standards.
Information security
fromInfoWorld
2 days ago

Claude Code leak puts enterprise trust at risk as security, governance concerns mount

Leaks threaten Anthropic's market position and raise security concerns about its AI coding tools.
US politics
fromenglish.elpais.com
2 days ago

The partial shutdown of the Department of Homeland Security: What's next, and Trump's deadline

Congress is deadlocked over immigration funding, leading to the longest partial shutdown of the Department of Homeland Security in U.S. history.
US politics
fromMail Online
3 days ago

Deadline issued for UFO videos as Congress warns of 'threat' to US

Lawmakers demand federal agencies release UFO videos by April 14, 2026, citing potential threats to US military forces.
Venture
fromThe Cipher Brief
1 month ago

What the Latest Policy and Tech Shifts Mean for National Security

Counter-Unmanned Aerial Systems require integrated, multi-layered defense architectures combining non-kinetic and kinetic responses rather than isolated legacy technologies, as modern autonomous drones render traditional electronic warfare ineffective.
#north-korea
Information security
fromFortune
2 days ago

I knew about North Korean hackers-they still tricked me and got into my computer | Fortune

North Korean hackers are increasingly targeting individuals in the crypto industry, employing sophisticated deception tactics.
Information security
fromDevOps.com
3 days ago

North Korean Hackers Suspected in Supply Chain Attack on Popular Axios Project - DevOps.com

North Korean hackers hijacked the npm account of an axios maintainer, publishing malicious versions that installed a remote access trojan.
Information security
fromNextgov.com
4 days ago

North Korea-linked hackers suspected in Axios open-source hijack, Google analysts say

North Korea-aligned hackers compromised the Axios JavaScript library, risking many developers' systems through a sophisticated supply chain attack.
Information security
fromFortune
2 days ago

I knew about North Korean hackers-they still tricked me and got into my computer | Fortune

North Korean hackers are increasingly targeting individuals in the crypto industry, employing sophisticated deception tactics.
Information security
fromDevOps.com
3 days ago

North Korean Hackers Suspected in Supply Chain Attack on Popular Axios Project - DevOps.com

North Korean hackers hijacked the npm account of an axios maintainer, publishing malicious versions that installed a remote access trojan.
Information security
fromNextgov.com
4 days ago

North Korea-linked hackers suspected in Axios open-source hijack, Google analysts say

North Korea-aligned hackers compromised the Axios JavaScript library, risking many developers' systems through a sophisticated supply chain attack.
Artificial intelligence
fromEngadget
2 weeks ago

The Defense Department reportedly plans to train AI models on classified military data

The Pentagon plans to train AI models on classified information in secure facilities for exclusive military use to enhance warfighting capabilities.
US politics
fromIntelligencer
4 days ago

Pentagon Demands Retraction Over Insider-Trading Allegations

The Pentagon demands a retraction of a report alleging insider trading by Defense Secretary Pete Hegseth's broker before the Iran war.
Information security
fromTechzine Global
3 days ago

North Korea behind social engineering attack on Axios project

Attackers compromised the Axios maintainer's account through social engineering, publishing malicious versions that installed a Remote Access Trojan on victims' systems.
Information security
fromSecurityWeek
4 days ago

The Next Cybersecurity Crisis Isn't Breaches-It's Data You Can't Trust

Data integrity now encompasses data trust, emphasizing the importance of reliable data in AI-driven decision-making.
fromSecuritymagazine
2 weeks ago

Trump's Former Counter-Terrorism Official Investigated Over Alleged Leaks

Joe Kent, President Trump's former top counter-terrorism official, is under investigation by the FBI's Criminal Division for allegedly improperly sharing classified information. The investigation began months before Kent's recent resignation, according to four individuals with direct knowledge of the probe who spoke to Semafor.
US politics
Information security
fromSecuritymagazine
4 days ago

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Companies are increasingly investing in executive protection due to rising threats, making it a strategic necessity for business continuity and resilience.
fromThe New Yorker
2 months ago

National Security Begins Behind the Toaster

Dear Secretary Pete Hegseth, I realize that this is a big ask, but would you please invade and take possession of my son and daughter-in-law's apartment? Or maybe you'd like to make them an offer first? Either way, as a concerned mother and patriot who believes that national security begins at home, I feel it's my duty to let you know that Otis and Luna, the co-dictators of Unit 4-C, at 439 Bergen Street, in Park Slope, Brooklyn, must be overthrown.
Humor
Information security
fromSecurityWeek
4 days ago

Stolen Logins Are Fueling Everything From Ransomware to Nation-State Cyberattacks

Stolen credentials significantly enhance ransomware attacks, enabling illegitimate access and operational disruption within networks.
fromNextgov.com
1 month ago

Now accepting applications - for classified intel

Over the past year, waves of federal layoffs have left thousands of government employees and contractor clients suddenly out of work. For foreign intelligence services, that disruption has opened new opportunities. With more former U.S. officials seeking employment or freelance work - often in specialized national security fields - adversaries, namely China, have stepped in, posing as consulting firms, research groups and recruiters.
US news
Information security
fromThe Cipher Brief
2 weeks ago

America Is Digitally Fragile - and Our Adversaries Know It

America faces unprecedented vulnerability as critical infrastructure systems are digitally dependent and interconnected, while adversaries possess capabilities to penetrate and pre-position for exploitation before conflict begins.
US politics
fromAxios
1 month ago

Scoop: Pentagon takes first step toward blacklisting Anthropic

The Pentagon is pressuring Anthropic to remove AI safeguards for military use, threatening supply chain risk declarations or Defense Production Act enforcement if the company refuses by Friday's deadline.
Information security
fromTechCrunch
3 weeks ago

The mystery of a globetrotting iPhone-hacking toolkit

A sophisticated iPhone hacking toolkit called Coruna, likely developed by U.S. military contractor L3Harris, was stolen and used by Russian and Chinese hackers to target victims in Ukraine and China.
Information security
fromNextgov.com
1 month ago

Potential US-built hacking tools obtained by foreign spies and cybercriminals, research says

A sophisticated iPhone hacking toolkit called Coruna, likely originating from U.S. government development, has proliferated to foreign intelligence agencies and criminal groups, compromising iOS devices through multiple exploit chains.
fromwww.theguardian.com
2 months ago

Pentagon contractor indicted over alleged leak tied to raided Washington Post reporter

According to the justice department, Aurelio Luis Perez-Lugones illegally provided sensitive and secret information related to national defense to a reporter who it says then wrote and published at least five articles using it. The indictment was not immediately available, and a press release announcing five charges against Perez-Lugones of mishandling classified information did not identify the journalist or their employer.
US politics
fromTechCrunch
1 month ago

Inside the story of the US defense contractor who leaked hacking tools to Russia | TechCrunch

Peter Williams, a former executive at U.S. defense contractor L3Harris, was sentenced on Tuesday to 87 months in prison for leaking his former company's trade secrets in exchange for $1.3 million in crypto between 2022 and 2025. Williams sold the exploits to Operation Zero, which the U.S. government calls 'one of the world's most nefarious exploit brokers.'
Information security
US politics
fromEmptywheel
2 months ago

Quantum Leaps: The So-Called Whistleblower That Got NSA's Top Mathematician Fired

Tulsi Gabbard fired a top NSA mathematician based on a disorganized whistleblower complaint whose claims conflict with other officials' reviews.
US politics
fromEmptywheel
2 months ago

Massive Obama Administration Leaks on Covert CIA Program Training Syrian Rebels

Numerous anonymous U.S. officials disclosed detailed information about a covert CIA program to train Syrian rebels while the CIA declined to comment.
US politics
fromEmptywheel
2 months ago

The Scandal of Lying about "Thwarted" "Plots" Started 4 Years Ago

Only one or two U.S. terrorist plots were actually thwarted by the Section 215 call-detail dragnet; the widely cited figure of 54 is incorrect.
fromwww.theguardian.com
1 month ago

State-sponsored hackers targeting defence sector employees, Google says

The report catalogues a relentless barrage of cyber operations, most by state-sponsored groups, against EU and US industrial supply chains. It suggests the range of targets for these hackers has grown to encompass the broader industrial base of the US and Europe from German aerospace firms to UK carmakers. State-linked hackers have long targeted the global defence industry, but Luke McNamara, an analyst for Google's threat intelligence group, said they had seen more personalised and direct to individual targeting of employees.
Information security
[ Load more ]