#traitor-recruitment

[ follow ]
World news
fromThe Washington Post
23 hours ago

Chinese firms market Iran war intelligence 'exposing' U.S. forces

Chinese firms are leveraging AI and open-source data to track U.S. military movements, posing potential security risks amid the Iran conflict.
#fbi
Privacy professionals
fromNextgov.com
1 day ago

Suspected Chinese breach of FBI system exposed surveillance targets' phone numbers

A breach linked to China exposed phone numbers of FBI surveillance targets, raising concerns about counterintelligence risks.
fromAdvocate.com
1 day ago
US politics

Did the FBI just post this propaganda video to save Kash Patel's job?

The FBI released a video celebrating Director Kash Patel's first year, criticized as propaganda for its cinematic portrayal of law enforcement successes.
Privacy professionals
fromNextgov.com
1 day ago

Suspected Chinese breach of FBI system exposed surveillance targets' phone numbers

A breach linked to China exposed phone numbers of FBI surveillance targets, raising concerns about counterintelligence risks.
US politics
fromAdvocate.com
1 day ago

Did the FBI just post this propaganda video to save Kash Patel's job?

The FBI released a video celebrating Director Kash Patel's first year, criticized as propaganda for its cinematic portrayal of law enforcement successes.
Artificial intelligence
fromNextgov.com
3 days ago

Old-school spycraft could make a comeback as AI undermines trust

AI may enhance intelligence gathering but also revive traditional espionage methods due to reliability issues with digital communications.
#cybersecurity
Privacy professionals
fromTechCrunch
2 weeks ago

FBI seizes pro-Iranian hacking group's websites after destructive Stryker hack | TechCrunch

The FBI seized two websites operated by pro-Iranian hacktivist group Handala, which conducted cyberattacks against U.S. companies and published information about individuals linked to Israeli military and defense contractors.
Information security
fromThe Hacker News
3 days ago

3 Reasons Attackers Are Using Your Trusted Tools Against You (And Why You Don't See It Coming)

Cyber attackers increasingly exploit legitimate tools within environments, making detection difficult and expanding the attack surface organizations must manage.
Information security
fromThe Hacker News
1 day ago

China-Linked TA416 Targets European Governments with PlugX and OAuth-Based Phishing

TA416 has intensified cyberattacks on European government and diplomatic organizations since mid-2025, utilizing advanced malware delivery techniques.
Information security
fromSecurityWeek
1 day ago

TrueConf Zero-Day Exploited in Asian Government Attacks

Chinese hackers exploited a zero-day vulnerability in TrueConf software to attack government entities in Asia, allowing execution of malicious code.
Privacy professionals
fromTechRepublic
5 days ago

Iran-Linked Hackers Breach FBI Director Kash Patel's Email, Leak Messages Online

An Iran-linked hacking group breached FBI Director Kash Patel's personal email, releasing non-sensitive information as a retaliatory cyber attack.
Information security
fromThe Hacker News
2 days ago

ThreatsDay Bulletin: Pre-Auth Chains, Android Rootkits, CloudTrail Evasion & 10 More Stories

The ThreatsDay Bulletin provides a concise overview of current cybersecurity threats and trends affecting system safety.
Privacy professionals
fromTechCrunch
2 weeks ago

FBI seizes pro-Iranian hacking group's websites after destructive Stryker hack | TechCrunch

The FBI seized two websites operated by pro-Iranian hacktivist group Handala, which conducted cyberattacks against U.S. companies and published information about individuals linked to Israeli military and defense contractors.
Information security
fromThe Hacker News
3 days ago

3 Reasons Attackers Are Using Your Trusted Tools Against You (And Why You Don't See It Coming)

Cyber attackers increasingly exploit legitimate tools within environments, making detection difficult and expanding the attack surface organizations must manage.
#ice
US politics
fromTechCrunch
2 days ago

ICE says it bought Paragon's spyware to use in drug trafficking cases | TechCrunch

ICE has utilized spyware from Paragon Solutions to combat drug trafficking and foreign terrorist organizations' use of encrypted communications.
US politics
fromSilicon Canals
2 days ago

ICE confirms it deployed Paragon spyware inside the United States for drug trafficking cases - Silicon Canals

ICE is using commercial spyware domestically, raising constitutional concerns about warrantless surveillance and lack of oversight.
US politics
fromTechCrunch
2 days ago

ICE says it bought Paragon's spyware to use in drug trafficking cases | TechCrunch

ICE has utilized spyware from Paragon Solutions to combat drug trafficking and foreign terrorist organizations' use of encrypted communications.
US politics
fromSilicon Canals
2 days ago

ICE confirms it deployed Paragon spyware inside the United States for drug trafficking cases - Silicon Canals

ICE is using commercial spyware domestically, raising constitutional concerns about warrantless surveillance and lack of oversight.
#russian-intelligence
London politics
fromwww.theguardian.com
3 days ago

Overwhelmed' Prevent at risk of missing threats as referrals rise, UK counter-terror chief says

Prevent scheme faces overwhelming referrals, risking identification of genuine threats due to increased volume and lack of triage system.
#cia
UK politics
fromwww.theguardian.com
3 days ago

Royal Navy captain steps back from duties over link to MP whose husband faces China spy claims

A Royal Navy captain stepped back from duties due to a relationship with MP Joani Reid amid concerns of potential blackmail and security risks.
SF politics
fromNextgov.com
5 days ago

New contract for background investigations raises concerns about scale and risk

DCSA is modernizing its Case Processing Operations Center to enhance background investigations and incorporate Continuous Vetting for national security.
Remote teams
fromTheregister
6 days ago

Security contractor blew the whistle on shabby support crew

Brad, a security contractor, faced challenges with antivirus alerts while working in a labor hire company's office without proper IT support.
fromComputerworld
1 day ago

A core infrastructure engineer pleads guilty to federal charges in insider attack

Rhyne's attack involved unauthorized remote desktop sessions, deletion of network administrator accounts, and changing of passwords, showcasing significant security vulnerabilities.
Information security
Python
fromAntocuni
1 week ago

Inside SPy, part 2: Language semantics

SPy aims to enhance Python's performance while integrating static typing, balancing between an interpreter and a compiler.
#espionage
Germany news
fromenglish.elpais.com
1 week ago

Security forces arrest two suspected Russian spies in Germany and Spain

Two individuals were arrested for allegedly spying on a businessman supplying drones to Ukraine, with intentions possibly including his assassination.
Germany news
fromwww.dw.com
1 week ago

Germany detains two suspected of spying for Russia

Two suspects have been accused of spying for Russia, targeting a German national supplying drones to Ukraine.
Germany news
fromwww.dw.com
1 week ago

Germany detains two of suspected spying for Russia

Two suspects have been accused of spying for Russia, targeting a German national supplying drones to Ukraine.
Germany news
fromenglish.elpais.com
1 week ago

Security forces arrest two suspected Russian spies in Germany and Spain

Two individuals were arrested for allegedly spying on a businessman supplying drones to Ukraine, with intentions possibly including his assassination.
Germany news
fromwww.dw.com
1 week ago

Germany detains two suspected of spying for Russia

Two suspects have been accused of spying for Russia, targeting a German national supplying drones to Ukraine.
Germany news
fromwww.dw.com
1 week ago

Germany detains two of suspected spying for Russia

Two suspects have been accused of spying for Russia, targeting a German national supplying drones to Ukraine.
Privacy professionals
fromAxios
4 days ago

Cyber warfare starts to get personal in war between U.S., Israel and Iran

Iran-linked hackers are using data leaks and intimidation tactics against individuals to influence public perception during the current conflict.
fromwww.theguardian.com
2 weeks ago

Iranian among two charged over alleged attempt to enter UK nuclear submarine base

A 34-year-old Iranian man and a 31-year-old Romanian woman have been arrested and charged in connection with the incident at HM Naval Base Clyde, known as Faslane.
UK news
Information security
fromThe Hacker News
1 day ago

Drift Loses $285 Million in Durable Nonce Social Engineering Attack Linked to DPRK

Drift decentralized exchange lost $285 million due to a sophisticated attack involving unauthorized access and social engineering.
#malware
fromSecurityWeek
2 days ago
Information security

Sophisticated CrystalX RAT Emerges

CrystalX RAT is a new malware-as-a-service combining spyware, stealer, and remote access capabilities, promoted on Telegram and YouTube.
Information security
fromThe Hacker News
2 days ago

Researchers Uncover Mining Operation Using ISO Lures to Spread RATs and Crypto Miners

Operation REF1695 uses fake installers to deploy RATs and cryptocurrency miners, monetizing infections through CPA fraud since November 2023.
Information security
fromThe Hacker News
2 days ago

Researchers Uncover Mining Operation Using ISO Lures to Spread RATs and Crypto Miners

Operation REF1695 uses fake installers to deploy RATs and cryptocurrency miners, monetizing infections through CPA fraud since November 2023.
#national-security
UK news
fromwww.independent.co.uk
3 weeks ago

Police given more time to question three men arrested on suspicion of spying for Iran

Police secured extended detention warrants for three men arrested on suspicion of spying for Iran and targeting Jewish community locations and individuals in London.
US politics
fromwww.mediaite.com
3 weeks ago

Trump Claims to Know Where Iran's Sleeper Cells Are. Why Isn't He Arresting Them?

President Trump claimed federal authorities have identified and are monitoring Iranian operatives who entered the U.S. during Biden's presidency, but reporters failed to press him on this significant national security assertion.
UK news
fromwww.independent.co.uk
3 weeks ago

Police given more time to question three men arrested on suspicion of spying for Iran

Police secured extended detention warrants for three men arrested on suspicion of spying for Iran and targeting Jewish community locations and individuals in London.
US politics
fromwww.mediaite.com
3 weeks ago

Trump Claims to Know Where Iran's Sleeper Cells Are. Why Isn't He Arresting Them?

President Trump claimed federal authorities have identified and are monitoring Iranian operatives who entered the U.S. during Biden's presidency, but reporters failed to press him on this significant national security assertion.
#north-korea
fromFortune
2 days ago
Information security

I knew about North Korean hackers-they still tricked me and got into my computer | Fortune

fromDevOps.com
3 days ago
Information security

North Korean Hackers Suspected in Supply Chain Attack on Popular Axios Project - DevOps.com

fromNextgov.com
4 days ago
Information security

North Korea-linked hackers suspected in Axios open-source hijack, Google analysts say

Information security
fromFortune
2 days ago

I knew about North Korean hackers-they still tricked me and got into my computer | Fortune

North Korean hackers are increasingly targeting individuals in the crypto industry, employing sophisticated deception tactics.
Information security
fromDevOps.com
3 days ago

North Korean Hackers Suspected in Supply Chain Attack on Popular Axios Project - DevOps.com

North Korean hackers hijacked the npm account of an axios maintainer, publishing malicious versions that installed a remote access trojan.
Information security
fromTechRepublic
4 days ago

New North Korean AI Hiring Scheme Targets US Companies

A North Korean operative attempted to infiltrate a cybersecurity firm using a stolen identity and AI-generated resume, highlighting vulnerabilities in hiring processes.
Information security
fromNextgov.com
4 days ago

North Korea-linked hackers suspected in Axios open-source hijack, Google analysts say

North Korea-aligned hackers compromised the Axios JavaScript library, risking many developers' systems through a sophisticated supply chain attack.
fromSecuritymagazine
2 weeks ago

Trump's Former Counter-Terrorism Official Investigated Over Alleged Leaks

Joe Kent, President Trump's former top counter-terrorism official, is under investigation by the FBI's Criminal Division for allegedly improperly sharing classified information. The investigation began months before Kent's recent resignation, according to four individuals with direct knowledge of the probe who spoke to Semafor.
US politics
Privacy technologies
fromInfoWorld
1 month ago

What I learned as an undercover agent on Moltbook

OpenClaw AI agents on Moltbook social network pose severe cybersecurity risks through unauthorized access to sensitive user data and financial systems.
fromBusiness Insider
3 weeks ago

Ex-CIA Chief Officer shares a near-death mission that ended in a rush, followed shortly by his divorce

His first wife wasn't in the CIA, and didn't know he worked for the government agency. He couldn't tell her where he'd actually been that day or why he'd sometimes come home late. Even harmless details he couldn't share with her, he said. He'd come home, and she'd ask how his day was, what he'd done, and who he'd interacted with, and he recalled only giving one-word answers like "great," "nothing," and "nobody."
London politics
Information security
fromTechzine Global
3 days ago

North Korea behind social engineering attack on Axios project

Attackers compromised the Axios maintainer's account through social engineering, publishing malicious versions that installed a Remote Access Trojan on victims' systems.
US news
fromwww.theguardian.com
1 month ago

The Russian honeytrap: alleged spy for Moscow faces five years in US prison

Nomma Zarubina, an FSB-recruited Russian intelligence operative, pleaded guilty to lying to the FBI about her contacts with Russian intelligence while posing as a legitimate activist to infiltrate American political and academic circles.
UK news
fromwww.theguardian.com
4 weeks ago

UK counter-terrorism agents granted more time to question men suspected of spying for Iran

Four men arrested on suspicion of spying for Iran on Jewish community locations and individuals in Britain can be held in custody until 13 March for questioning.
Information security
fromSecurityWeek
4 days ago

Stolen Logins Are Fueling Everything From Ransomware to Nation-State Cyberattacks

Stolen credentials significantly enhance ransomware attacks, enabling illegitimate access and operational disruption within networks.
fromwww.scientificamerican.com
1 month ago

How to win The Traitors, according to science

We watch people lying, and we know they're lying. And also, you watch people dealing with lying not very well and not enjoying it. The lying, backstabbing and manipulation the game inspires does indeed make for delightful TV viewing.
Television
Privacy professionals
fromenglish.elpais.com
3 weeks ago

How the CIA used a former Spanish soldier to keep tabs on Julian Assange

A Spanish security company owner conducted illegal surveillance of Julian Assange at Ecuador's London embassy on behalf of the CIA, placing hidden microphones and monitoring his communications.
Information security
fromSecuritymagazine
4 days ago

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Companies are increasingly investing in executive protection due to rising threats, making it a strategic necessity for business continuity and resilience.
#russian-military-intelligence
#cia-recruitment
fromFortune
1 month ago
US politics

CIA's social media guide to evading Iranian internet restrictions racks up millions of views as Trump considers military action | Fortune

fromFortune
1 month ago
US politics

CIA's social media guide to evading Iranian internet restrictions racks up millions of views as Trump considers military action | Fortune

Business intelligence
fromSecuritymagazine
2 months ago

Private Sector Intelligence Careers

Private-sector intelligence roles require public-sector analytic skills plus explicit training in cognitive tradecraft, decision support, and structured reasoning for business contexts.
fromThe New Yorker
2 months ago

National Security Begins Behind the Toaster

Dear Secretary Pete Hegseth, I realize that this is a big ask, but would you please invade and take possession of my son and daughter-in-law's apartment? Or maybe you'd like to make them an offer first? Either way, as a concerned mother and patriot who believes that national security begins at home, I feel it's my duty to let you know that Otis and Luna, the co-dictators of Unit 4-C, at 439 Bergen Street, in Park Slope, Brooklyn, must be overthrown.
Humor
fromNextgov.com
1 month ago

Now accepting applications - for classified intel

Over the past year, waves of federal layoffs have left thousands of government employees and contractor clients suddenly out of work. For foreign intelligence services, that disruption has opened new opportunities. With more former U.S. officials seeking employment or freelance work - often in specialized national security fields - adversaries, namely China, have stepped in, posing as consulting firms, research groups and recruiters.
US news
fromThe Cipher Brief
1 month ago

The Kremlin Files: Russian Double Agents and Operational Games

A double agent, by contrast, is an intelligence asset who is knowingly and deliberately directed by one service to engage another in espionage. The controlling service uses that agent to feed information (called feed material) -true, false, or mixed-to the adversary. They do so to simultaneously study the adversary's tradecraft, collection priorities, and decision-making. In the Russian system, double agents also serve a bureaucratic function: they generate statistics, "success stories," and operational narratives that demonstrate effectiveness to political overseers and ultimately to Putin himself.
World news
US news
fromThe Cipher Brief
2 months ago

Remembering Aldrich Ames and the Lives He Destroyed

Aldrich Ames's betrayal inflicted deep personal and operational damage on the CIA, exposing agents and highlighting catastrophic internal security failures.
Information security
fromSecurityWeek
3 weeks ago

Iran-Linked Hackers Take Aim at US and Other Targets, Raising Risk of Cyberattacks During War

Pro-Iranian hackers are expanding cyberattacks from the Middle East into the United States, targeting defense contractors, medical device companies, and critical infrastructure like power stations and water plants.
#cyberespionage
Information security
fromThe Hacker News
3 weeks ago

APT28 Uses BEARDSHELL and COVENANT Malware to Spy on Ukrainian Military

APT28, a Russian state-sponsored hacking group, has deployed BEARDSHELL and COVENANT malware since April 2024 to conduct long-term surveillance of Ukrainian military personnel.
Information security
fromTechCrunch
3 weeks ago

The mystery of a globetrotting iPhone-hacking toolkit

A sophisticated iPhone hacking toolkit called Coruna, likely developed by U.S. military contractor L3Harris, was stolen and used by Russian and Chinese hackers to target victims in Ukraine and China.
fromwww.theguardian.com
4 weeks ago

North Korean agents using AI to trick western firms into hiring them, Microsoft says

The scam typically involves state-backed fraudsters applying for remote IT work in the west, using fake identities and the help of facilitators in the country where the company targeted is based. Once hired, they send their wages back to Kim Jong-un's state and have even been known to threaten to release sensitive company data after being fired.
Information security
Information security
fromtechcrunch.com
1 month ago

FBI investigating hack on its wiretap and surveillance systems: report

Hackers breached FBI networks managing wiretaps and foreign intelligence surveillance warrants, marking another major U.S. government cybersecurity incident amid ongoing threats from Chinese and Russian threat actors.
US politics
fromEmptywheel
2 months ago

Massive Obama Administration Leaks on Covert CIA Program Training Syrian Rebels

Numerous anonymous U.S. officials disclosed detailed information about a covert CIA program to train Syrian rebels while the CIA declined to comment.
Information security
fromNextgov.com
1 month ago

Potential US-built hacking tools obtained by foreign spies and cybercriminals, research says

A sophisticated iPhone hacking toolkit called Coruna, likely originating from U.S. government development, has proliferated to foreign intelligence agencies and criminal groups, compromising iOS devices through multiple exploit chains.
US politics
fromEmptywheel
2 months ago

The Scandal of Lying about "Thwarted" "Plots" Started 4 Years Ago

Only one or two U.S. terrorist plots were actually thwarted by the Section 215 call-detail dragnet; the widely cited figure of 54 is incorrect.
Information security
fromFortune
1 month ago

Cyber retaliation from Iran is a problem for U.S. companies - 'It's in the hands of a 19-year-old hacker in a Telegram room,' ex-NSA operative says | Fortune

Iranian cyber operatives compromised a popular prayer app to coordinate civil resistance during strikes, prompting regime loyalists to launch aggressive counter-attacks through decentralized hacker networks.
Information security
fromSecurityWeek
1 month ago

In Other News: ATT&CK Advisory Council, Russian Cyberattacks Aid Missile Strikes, Predator Bypasses iOS Indicators

Predator spyware suppresses iOS indicators through kernel-level access, Russian cyberattacks on Ukraine's energy grid gather intelligence for missile targeting, and Treasury launches AI cybersecurity initiative for financial services.
Information security
fromAxios
1 month ago

Exclusive: Suspected Chinese hackers impersonate U.S. briefings in phishing lure

China-linked Mustang Panda used file-based phishing to infect diplomatic and election officials with data-stealing persistent malware, detected by an AI agent at Dream.
Information security
fromwww.mercurynews.com
1 month ago

Asian hackers hit sensitive targets in 37 nations in spying plot

State-aligned Asian cyberespionage group infiltrated networks of 70 organizations across 37+ countries to steal emails, financial, military, and diplomatic information.
[ Load more ]