#political-warfare

[ follow ]
#china
World news
fromThe Washington Post
1 day ago

Chinese firms market Iran war intelligence 'exposing' U.S. forces

Chinese firms are leveraging AI and open-source data to track U.S. military movements, posing potential security risks amid the Iran conflict.
World politics
fromwww.dw.com
5 days ago

How China's propaganda is spinning the Iran war

A viral AI-generated video by Chinese state media portrays the US-Israel war with Iran, framing the US as an aggressive hegemon and China as a peaceful power.
World news
fromThe Washington Post
1 day ago

Chinese firms market Iran war intelligence 'exposing' U.S. forces

Chinese firms are leveraging AI and open-source data to track U.S. military movements, posing potential security risks amid the Iran conflict.
World politics
fromwww.dw.com
5 days ago

How China's propaganda is spinning the Iran war

A viral AI-generated video by Chinese state media portrays the US-Israel war with Iran, framing the US as an aggressive hegemon and China as a peaceful power.
Artificial intelligence
fromNextgov.com
4 days ago

Old-school spycraft could make a comeback as AI undermines trust

AI may enhance intelligence gathering but also revive traditional espionage methods due to reliability issues with digital communications.
#iran-war
fromTruthout
1 day ago
Right-wing politics

No Kings Must Mean No War: Foreign Policy Is Least Democratic Space in Politics

Right-wing politics
fromTruthout
1 day ago

No Kings Must Mean No War: Foreign Policy Is Least Democratic Space in Politics

The majority of Iranian Americans oppose the war on Iran, despite media portrayal of pro-monarchy sentiments.
Right-wing politics
fromIntelligencer
5 days ago

Trump's Propaganda Machine Is Flailing on Iran

Media coverage of the war in Iran reveals a disastrous outcome, with ongoing chaos and high civilian casualties despite claims of success.
#fbi
Privacy professionals
fromNextgov.com
1 day ago

Suspected Chinese breach of FBI system exposed surveillance targets' phone numbers

A breach linked to China exposed phone numbers of FBI surveillance targets, raising concerns about counterintelligence risks.
fromAdvocate.com
1 day ago
US politics

Did the FBI just post this propaganda video to save Kash Patel's job?

The FBI released a video celebrating Director Kash Patel's first year, criticized as propaganda for its cinematic portrayal of law enforcement successes.
Privacy professionals
fromNextgov.com
1 day ago

Suspected Chinese breach of FBI system exposed surveillance targets' phone numbers

A breach linked to China exposed phone numbers of FBI surveillance targets, raising concerns about counterintelligence risks.
US politics
fromAdvocate.com
1 day ago

Did the FBI just post this propaganda video to save Kash Patel's job?

The FBI released a video celebrating Director Kash Patel's first year, criticized as propaganda for its cinematic portrayal of law enforcement successes.
#cybersecurity
Information security
fromThe Hacker News
1 day ago

China-Linked TA416 Targets European Governments with PlugX and OAuth-Based Phishing

TA416 has intensified cyberattacks on European government and diplomatic organizations since mid-2025, utilizing advanced malware delivery techniques.
Information security
fromArs Technica
5 days ago

Iran's hackers are on the offensive against the US and Israel

Iran has launched coordinated cyber attacks against Israel, but has not targeted critical infrastructure decisively during the current conflict.
Privacy professionals
fromTechRepublic
6 days ago

Iran-Linked Hackers Breach FBI Director Kash Patel's Email, Leak Messages Online

An Iran-linked hacking group breached FBI Director Kash Patel's personal email, releasing non-sensitive information as a retaliatory cyber attack.
Information security
fromTheregister
4 days ago

Iran targets M365 accounts with password-spraying attacks

Iran-linked threat actors are conducting password-spraying attacks against hundreds of organizations, primarily targeting Middle Eastern municipalities.
Information security
fromSecurityWeek
6 days ago

Hacked Hospitals, Hidden Spyware: Iran Conflict Shows How Digital Fight Is Ingrained in Warfare

Iranian cyber operations exploit missile strikes to deploy spyware via fake texts, showcasing a blend of digital and physical warfare tactics.
Information security
fromFortune
6 days ago

'There are a lot more attacks happening that aren't being reported': Iran's cyber response creeps across the globe | Fortune

Iran is using sophisticated cyber tactics to exploit vulnerabilities during missile strikes against Israel.
Information security
fromThe Hacker News
1 day ago

China-Linked TA416 Targets European Governments with PlugX and OAuth-Based Phishing

TA416 has intensified cyberattacks on European government and diplomatic organizations since mid-2025, utilizing advanced malware delivery techniques.
Information security
fromArs Technica
5 days ago

Iran's hackers are on the offensive against the US and Israel

Iran has launched coordinated cyber attacks against Israel, but has not targeted critical infrastructure decisively during the current conflict.
Privacy professionals
fromTechRepublic
6 days ago

Iran-Linked Hackers Breach FBI Director Kash Patel's Email, Leak Messages Online

An Iran-linked hacking group breached FBI Director Kash Patel's personal email, releasing non-sensitive information as a retaliatory cyber attack.
Information security
fromTheregister
4 days ago

Iran targets M365 accounts with password-spraying attacks

Iran-linked threat actors are conducting password-spraying attacks against hundreds of organizations, primarily targeting Middle Eastern municipalities.
Information security
fromSecurityWeek
6 days ago

Hacked Hospitals, Hidden Spyware: Iran Conflict Shows How Digital Fight Is Ingrained in Warfare

Iranian cyber operations exploit missile strikes to deploy spyware via fake texts, showcasing a blend of digital and physical warfare tactics.
Information security
fromFortune
6 days ago

'There are a lot more attacks happening that aren't being reported': Iran's cyber response creeps across the globe | Fortune

Iran is using sophisticated cyber tactics to exploit vulnerabilities during missile strikes against Israel.
Media industry
fromThe Cipher Brief
3 days ago

Iran Is Building the Disinformation Architecture of the Future-Right Now

Iran's disinformation tactics demonstrate the potential of AI in conflict, emphasizing speed, encryption, and narrative manipulation.
#russian-intelligence
#iran
fromAxios
4 days ago
Privacy professionals

Cyber warfare starts to get personal in war between U.S., Israel and Iran

fromTNW | Me
4 days ago
World news

Iran's IRGC names 18 US tech firms including Apple, Microsoft, Nvidia as military targets

fromPoynter
1 week ago
Right-wing politics

Trump says Iran is 'based on disinformation.' Experts say its influence operations go far beyond that. - Poynter

World politics
fromThe Nation
3 days ago

How Washington's Iran Groupthink Led to a Global War

Washington's approach to Iran has led to increased conflict, undermining American safety and prosperity.
Privacy professionals
fromAxios
4 days ago

Cyber warfare starts to get personal in war between U.S., Israel and Iran

Iran-linked hackers are using data leaks and intimidation tactics against individuals to influence public perception during the current conflict.
World news
fromTNW | Me
4 days ago

Iran's IRGC names 18 US tech firms including Apple, Microsoft, Nvidia as military targets

The IRGC named 18 US tech firms as targets for retaliation against alleged roles in assassinations in Iran.
Right-wing politics
fromPoynter
1 week ago

Trump says Iran is 'based on disinformation.' Experts say its influence operations go far beyond that. - Poynter

The Iranian regime is using generative AI to spread disinformation, complicating the misinformation landscape during the Iran war.
World news
fromwww.aljazeera.com
2 weeks ago

War spirals as information control tightens

The war on Iran has escalated with increased leadership assassinations, a blockade of the Strait of Hormuz, and strikes on energy infrastructure.
Right-wing politics
fromwww.theguardian.com
2 weeks ago

Iran social media strategy pivots to information war amid US-Israel attack

Iran has intensified its social media strategy to counter US and Israeli military actions through targeted disinformation campaigns and intimidation tactics.
fromwww.dw.com
3 days ago

Hungary's Watergate: Secret service spied on opposition

Many have described it as a 'return to dictatorship and Communist times.' The intelligence service is said to have tried to recruit technicians in charge of maintaining the party's IT system, in order to access internal party information and use it to rig the election.
Europe politics
#cia
Psychology
fromPsychology Today
5 days ago

New Research: Some People Really Do Fall for Corporate BS

Employees impressed by corporate gibberish perform poorly in decision-making and confuse it with business savvy.
Data science
fromComputerworld
5 days ago

IT lesson from the Iran war: AI makes your data problems so much worse

AI can exacerbate existing data issues in enterprises, as demonstrated by the US military's bombing due to outdated intelligence.
fromThe Walrus
5 days ago

The Man Who Put AI at the Centre of America's War Machine | The Walrus

"War is terrible, war is terrible, war is terrible," he intones, holding my gaze and giving voice to a universal chorus.
DC food
UK news
fromwww.independent.co.uk
6 days ago

Russia expels British diplomat from Moscow over spying claims

The Independent provides critical journalism on various issues, emphasizing the importance of accessible reporting without paywalls.
#ice
fromSilicon Canals
2 days ago
US politics

ICE confirms it deployed Paragon spyware inside the United States for drug trafficking cases - Silicon Canals

US politics
fromSilicon Canals
2 days ago

ICE confirms it deployed Paragon spyware inside the United States for drug trafficking cases - Silicon Canals

ICE is using commercial spyware domestically, raising constitutional concerns about warrantless surveillance and lack of oversight.
US politics
fromTechCrunch
2 days ago

ICE says it bought Paragon's spyware to use in drug trafficking cases | TechCrunch

ICE has utilized spyware from Paragon Solutions to combat drug trafficking and foreign terrorist organizations' use of encrypted communications.
Information security
fromTechzine Global
4 days ago

North Korea behind social engineering attack on Axios project

Attackers compromised the Axios maintainer's account through social engineering, publishing malicious versions that installed a Remote Access Trojan on victims' systems.
Python
fromAntocuni
1 week ago

Inside SPy, part 2: Language semantics

SPy aims to enhance Python's performance while integrating static typing, balancing between an interpreter and a compiler.
#espionage
Germany news
fromenglish.elpais.com
1 week ago

Security forces arrest two suspected Russian spies in Germany and Spain

Two individuals were arrested for allegedly spying on a businessman supplying drones to Ukraine, with intentions possibly including his assassination.
Germany news
fromwww.dw.com
1 week ago

Germany detains two suspected of spying for Russia

Two suspects have been accused of spying for Russia, targeting a German national supplying drones to Ukraine.
Germany news
fromenglish.elpais.com
1 week ago

Security forces arrest two suspected Russian spies in Germany and Spain

Two individuals were arrested for allegedly spying on a businessman supplying drones to Ukraine, with intentions possibly including his assassination.
Germany news
fromwww.dw.com
1 week ago

Germany detains two suspected of spying for Russia

Two suspects have been accused of spying for Russia, targeting a German national supplying drones to Ukraine.
Psychology
fromwww.theguardian.com
1 week ago

They feel true': political deepfakes are growing in influence even if people know they aren't real

Online content creators are fabricating people and images for propaganda and profit, blurring the lines between reality and fiction.
Russo-Ukrainian War
fromwww.theguardian.com
5 days ago

Russia slowly trying to splinter its internet from rest of world, analysts say

Russia is gradually isolating its internet from the world, impacting millions through mobile blackouts and restrictions on essential communication platforms.
World politics
fromIndependent
6 days ago

Con Coughlin: Americans are in proxy war against Russia, whether they like it or not

Vladimir Putin has been providing valuable intelligence to Iran, undermining Donald Trump's relationship with Russia.
#north-korea
fromTechRepublic
4 days ago
Information security

New North Korean AI Hiring Scheme Targets US Companies

A North Korean operative attempted to infiltrate a cybersecurity firm using a stolen identity and AI-generated resume, highlighting vulnerabilities in hiring processes.
fromNextgov.com
4 days ago
Information security

North Korea-linked hackers suspected in Axios open-source hijack, Google analysts say

North Korea-aligned hackers compromised the Axios JavaScript library, risking many developers' systems through a sophisticated supply chain attack.
Information security
fromTechRepublic
4 days ago

New North Korean AI Hiring Scheme Targets US Companies

A North Korean operative attempted to infiltrate a cybersecurity firm using a stolen identity and AI-generated resume, highlighting vulnerabilities in hiring processes.
Information security
fromNextgov.com
4 days ago

North Korea-linked hackers suspected in Axios open-source hijack, Google analysts say

North Korea-aligned hackers compromised the Axios JavaScript library, risking many developers' systems through a sophisticated supply chain attack.
fromThe New Yorker
3 weeks ago

War in the Age of the Online "Information Bomb"

On TikTok, the war against Iran began with a series of videos from influencer types in Dubai, Doha, and elsewhere in the Middle East. They sat on restaurant patios or on hotel-room balconies and pointed their phone cameras skyward to document missiles flying through the air of their respective cities, then disappearing into puffs of smoke as they were shot down.
Social media marketing
Media industry
fromwww.mediaite.com
3 weeks ago

War Propaganda Is Now Made for the Algorithm. Journalism Can't Keep Up.

Foreign and domestic propaganda spreads through social media when users amplify content that aligns with their existing beliefs, regardless of its manipulative intent or source.
#cyber-warfare
World politics
fromTheregister
1 week ago

Only Trump decides when cyberwar turns into real war

The US may respond to cyber warfare with physical attacks, determined by the President's discretion, according to former NSA leaders.
World politics
fromwww.bbc.com
3 weeks ago

What role has cyber warfare played in Iran?

Cyber operations play a significant but largely undisclosed role in US and Israeli military actions against Iran, complementing conventional strikes across multiple domains.
World politics
fromTheregister
1 week ago

Only Trump decides when cyberwar turns into real war

The US may respond to cyber warfare with physical attacks, determined by the President's discretion, according to former NSA leaders.
World politics
fromwww.bbc.com
3 weeks ago

What role has cyber warfare played in Iran?

Cyber operations play a significant but largely undisclosed role in US and Israeli military actions against Iran, complementing conventional strikes across multiple domains.
Privacy technologies
fromInfoWorld
1 month ago

What I learned as an undercover agent on Moltbook

OpenClaw AI agents on Moltbook social network pose severe cybersecurity risks through unauthorized access to sensitive user data and financial systems.
fromwww.nytimes.com
3 weeks ago

Cascade of A.I. Fakes About War With Iran Causes Chaos Online

A torrent of fake videos and images generated by artificial intelligence have overrun social networks during the first weeks of the war in Iran. The videos showing huge explosions that never happened, decimated city streets that were never attacked or troops protesting the war who do not exist have added a chaotic and confusing layer to the conflict online.
Russo-Ukrainian War
US news
fromwww.theguardian.com
1 month ago

The Russian honeytrap: alleged spy for Moscow faces five years in US prison

Nomma Zarubina, an FSB-recruited Russian intelligence operative, pleaded guilty to lying to the FBI about her contacts with Russian intelligence while posing as a legitimate activist to infiltrate American political and academic circles.
fromFuturism
3 weeks ago

Iran Declares Google and Microsoft to Be Military Targets

As the scope of the regional war expands to infrastructure war, the scope of Iran's legitimate targets expands. The Americans should await our countermeasure and our painful response, a spokesperson for the Khatam al-Anbiya Headquarters, the IRGC's unified combatant command declared.
World news
Venture
fromThe Cipher Brief
1 month ago

What the Latest Policy and Tech Shifts Mean for National Security

Counter-Unmanned Aerial Systems require integrated, multi-layered defense architectures combining non-kinetic and kinetic responses rather than isolated legacy technologies, as modern autonomous drones render traditional electronic warfare ineffective.
World politics
fromwww.aljazeera.com
3 weeks ago

The battle on the propaganda front intensifies

Iran employs asymmetric economic tactics against U.S.-Israeli military superiority while misinformation complicates public understanding of the conflict.
fromIntelligencer
3 weeks ago

All Modern Warfare Is Chemical Warfare

On the night of Saturday, March 6, Israeli forces struck three sets of oil depots ringing Tehran - west, east, and south - simultaneously. The explosions were massive. Nearby residential areas were destroyed. Millions of liters of gasoline, diesel, and petroleum derivatives ignited, sending columns of black smoke thousands of feet into the air.
World politics
US politics
fromMail Online
1 month ago

CIA memo reveals plot to turn citizens into political assassins

Project Artichoke was a classified CIA mind control program from 1951-1956 that attempted to create unwitting assassins through psychological manipulation and drug administration.
Information security
fromSecurityWeek
3 weeks ago

Iran-Linked Hackers Take Aim at US and Other Targets, Raising Risk of Cyberattacks During War

Pro-Iranian hackers are expanding cyberattacks from the Middle East into the United States, targeting defense contractors, medical device companies, and critical infrastructure like power stations and water plants.
US politics
fromFortune
1 month ago

CIA's social media guide to evading Iranian internet restrictions racks up millions of views as Trump considers military action | Fortune

The CIA publicly recruited Iranian informants via social media in Farsi during escalating U.S.-Iran tensions and nuclear negotiations.
World news
fromWIRED
1 month ago

X Is Drowning in Disinformation Following US and Israel's Attack on Iran

Disinformation about the US-Israel military operation against Iran spread rapidly on X, with misleading videos, AI-generated images, and misattributed footage accumulating millions of views from verified accounts.
#russian-military-intelligence
World politics
fromThe Atlantic
3 weeks ago

An Air-Campaign Primer

Air campaigns offer unique advantages in concentration, speed, and flexibility, but differ fundamentally from ground operations in their goals, strengths, and inherent limitations.
fromThe New Yorker
2 months ago

National Security Begins Behind the Toaster

Dear Secretary Pete Hegseth, I realize that this is a big ask, but would you please invade and take possession of my son and daughter-in-law's apartment? Or maybe you'd like to make them an offer first? Either way, as a concerned mother and patriot who believes that national security begins at home, I feel it's my duty to let you know that Otis and Luna, the co-dictators of Unit 4-C, at 439 Bergen Street, in Park Slope, Brooklyn, must be overthrown.
Humor
fromwww.theguardian.com
4 weeks ago

North Korean agents using AI to trick western firms into hiring them, Microsoft says

The scam typically involves state-backed fraudsters applying for remote IT work in the west, using fake identities and the help of facilitators in the country where the company targeted is based. Once hired, they send their wages back to Kim Jong-un's state and have even been known to threaten to release sensitive company data after being fired.
Information security
World politics
fromwww.dw.com
1 month ago

The checkered history of US regime change operations

The US has extensive historical experience with regime change operations, having attempted 72 during the Cold War with mixed success rates, raising questions about current military interventions in Iran despite official denials.
Miscellaneous
fromThe Cipher Brief
2 months ago

The Kremlin Files: Russia's Way to the Gray Zone

Russian gray-zone warfare centers on non-contact war and expanded intelligence active measures, using cyber and cognitive tools to influence conflicts without direct kinetic attacks.
Information security
fromNextgov.com
1 month ago

Fake DOD memo about 'compromised' apps shows swift spread of deceptive messaging

A fake U.S. Cyber Command memo falsely claiming apps were compromised and revealing servicemembers' locations circulated during military channels, but DOD confirmed it was not authentic.
US politics
fromThe Atlantic
1 month ago

The Trump Administration's War on Data

The CIA World Factbook website has been shut down, removing a longstanding public global-data resource and reflecting an administration effort to curtail publicly available information.
World news
fromEmptywheel
2 months ago

Hybrid or Ambiguous, Asymmetric Warfare is Here to Stay

Asymmetric and ambiguous warfare doctrines from China and Russia anticipated cyber and hybrid attacks that the U.S. failed to adequately prepare for.
US politics
fromEmptywheel
2 months ago

Massive Obama Administration Leaks on Covert CIA Program Training Syrian Rebels

Numerous anonymous U.S. officials disclosed detailed information about a covert CIA program to train Syrian rebels while the CIA declined to comment.
Information security
fromTheregister
1 month ago

Google and friends disrupt suspected Beijing espionage op

Google disrupted UNC2814, a China-linked group conducting widespread cyberattacks on telecommunications and government organizations across multiple continents using Google Sheets API for command-and-control operations.
fromElectronic Frontier Foundation
2 months ago

Beware: Government Using Image Manipulation for Propaganda

A short while later, the White House posted the same photo - except that version had been digitally altered to darken Armstrong's skin and rearrange her facial features to make it appear she was sobbing or distraught. The Guardian one of many media outlets to report on this image manipulation, created a handy slider graphic to help viewers see clearly how the photo had been changed.
US politics
fromThe Cipher Brief
1 month ago

The Kremlin Files: Russian Double Agents and Operational Games

A double agent, by contrast, is an intelligence asset who is knowingly and deliberately directed by one service to engage another in espionage. The controlling service uses that agent to feed information (called feed material) -true, false, or mixed-to the adversary. They do so to simultaneously study the adversary's tradecraft, collection priorities, and decision-making. In the Russian system, double agents also serve a bureaucratic function: they generate statistics, "success stories," and operational narratives that demonstrate effectiveness to political overseers and ultimately to Putin himself.
World news
US politics
fromEmptywheel
2 months ago

The Scandal of Lying about "Thwarted" "Plots" Started 4 Years Ago

Only one or two U.S. terrorist plots were actually thwarted by the Section 215 call-detail dragnet; the widely cited figure of 54 is incorrect.
World news
fromNextgov.com
2 months ago

Suspected Chinese spies targeted former State official for Venezuela research

A suspected China-linked intelligence network attempted to recruit a former senior U.S. State Department official to draft paid policy assessments on Venezuela.
Information security
fromAxios
2 months ago

Exclusive: Suspected Chinese hackers impersonate U.S. briefings in phishing lure

China-linked Mustang Panda used file-based phishing to infect diplomatic and election officials with data-stealing persistent malware, detected by an AI agent at Dream.
fromSecurityWeek
1 month ago

Cyber Insights 2026: Cyberwar and Rising Nation State Threats

Entering the cyber world is stepping into a warzone. Cyber is considered a war zone, and what happens there is described as cyberwar. But it's not that simple. War is conducted by nations (political), not undertaken by criminals (financial). Both are increasing in this war zone we call cyber, but the political threat is growing fast. Cyberwar is a complex subject, and a formal definition is difficult.
Information security
fromSecuritymagazine
2 months ago

Is Email the Entry Point to a Well-Rounded Disinformation Attack?

Generative models learn an executive's tone and syntax from public posts, press releases and meeting transcripts. Attackers then craft messages indistinguishable from authentic correspondence. But the real innovation isn't the text, it's the choreography. A fraudulent email may serve only as the opening move. Within minutes, the target receives a confirming voice message that sounds like the executive whose name appears in the signature block. A deepfaked video may follow, asking for "final authorization." Email opens the door; other channels walk through it.
Information security
[ Load more ]