The Hacker News Logo
Subscribe to Newsletter

The Hacker News – Most Popular Cyber Security, Hacking News Site: cyber espionage

Shadow Brokers reveals list of Servers Hacked by the NSA

Shadow Brokers reveals list of Servers Hacked by the NSA

October 31, 2016Swati Khandelwal
The hacker group calling itself the Shadow Brokers, who previously claimed to have leaked a portion of the NSA’s hacking tools and explo...
US charges Chinese ex-IBM employee with Espionage

US charges Chinese ex-IBM employee with Espionage

June 15, 2016Wang Wei
The United States federal authorities have boosted charges against a former IBM Corp. software developer in China for allegedly stealing ...
PLATINUM Hackers Hijack Windows Hotpatching to Stay Hidden

PLATINUM Hackers Hijack Windows Hotpatching to Stay Hidden

April 27, 2016Mohit Kumar
In Brief The Microsoft’s Windows Defender Advanced Threat Hunting team detected that a cyber espionage group of hackers, known as PLAT...
China — OPM Hack was not State-Sponsored; Blames Chinese Criminal Gangs

China — OPM Hack was not State-Sponsored; Blames Chinese Criminal Gangs

December 03, 2015Mohit Kumar
In the most surprising manner, the Chinese government said it arrested criminal hackers behind the massive cyber attack on US Office of ...
NSA-linked Spying Malware Infected Top German Official's Computer

NSA-linked Spying Malware Infected Top German Official's Computer

October 26, 2015Swati Khandelwal
The German authorities have initiated a further investigation into espionage by the United States secret service NSA and British intelli...
Researchers to Share Details of Cyber-Terrorists Targeting Indian Government Officials

Researchers to Share Details of Cyber-Terrorists Targeting Indian Government Officials

August 08, 2015Wang Wei
The Potential threat, range from very narrow to very broad, posed by Cyber-Terrorism has provoked considerable alarm. Terrorists in...
Operation Lotus Blossom APT - Elise Malware

Operation Lotus Blossom APT - Elise Malware

August 03, 2015Swati Khandelwal
Advanced Persistent Threat (APT) type attacks continue to emerge on a global scale. What makes these attacks deviate from the norm is o...
Volatile Cedar — Global Cyber Espionage Campaign Discovered

Volatile Cedar — Global Cyber Espionage Campaign Discovered

May 29, 2015Wang Wei
Security firm Check Point has uncovered what seems to be a successful, and long-running, cyber-surveillance campaign called “ Volatile ...
Chinese Hackers Target Air-Gapped Networks in Southeast Asia

Chinese Hackers Target Air-Gapped Networks in Southeast Asia

April 13, 2015Swati Khandelwal
A State-sponsored Cyber Espionage Group -- most likely linked to the Chinese government becomes the first group to target the so-call...
Microsoft patches Stuxnet and FREAK Vulnerabilities

Microsoft patches Stuxnet and FREAK Vulnerabilities

March 11, 2015Swati Khandelwal
Microsoft has come up with its most important Patch Tuesday for this year, addressing the recently disclosed critical the FREAK encrypt...
CASPER Surveillance Malware Linked to French Government

CASPER Surveillance Malware Linked to French Government

March 05, 2015Swati Khandelwal
Last month, cyber security researchers spotted a new strain of french surveillance malware, dubbed " Babar ," which revealed t...
NSA Planted Stuxnet-Type Malware Deep Within Hard Drive Firmware

NSA Planted Stuxnet-Type Malware Deep Within Hard Drive Firmware

February 16, 2015Swati Khandelwal
The U.S. National Security Agency (NSA) may be hiding highly-sophisticated hacking payloads in the firmware of consumer hard drives ove...
Espionage Campaign targets iOS devices with Malware apps

Espionage Campaign targets iOS devices with Malware apps

February 05, 2015Mohit Kumar
A malware campaign has been found targeting iOS devices linked to a wide range of entities, including European defense organizations, go...
Links Found between NSA, Regin Spy tool and QWERTY Keylogger

Links Found between NSA, Regin Spy tool and QWERTY Keylogger

January 27, 2015Swati Khandelwal
​Researchers have uncovered a new evidence that a powerful computer program discovered last year, called " Regin ", is "id...
Chinese Spies Stole Australia’s New F-35 Lightning-II fighter Jet Design, Snowden Reveals

Chinese Spies Stole Australia’s New F-35 Lightning-II fighter Jet Design, Snowden Reveals

January 18, 2015Swati Khandelwal
The latest document release by Edward Snowden revealed the industrial-scale cyber-espionage operation of China to learn the secrets of Aust...
Operation Cleaver — Iranian Hackers Targeting Critical Infrastructure Worldwide

Operation Cleaver — Iranian Hackers Targeting Critical Infrastructure Worldwide

December 04, 2014Swati Khandelwal
For over past two years, Iranian hackers have infiltrated computer networks of some of the world's top organizations including airli...
'Regin' - 'State-Sponsored' Spying Tool Targeted Govts, Infrastructures for Years

'Regin' - 'State-Sponsored' Spying Tool Targeted Govts, Infrastructures for Years

November 23, 2014Swati Khandelwal
Researchers have uncovered a highly advanced, sophisticated piece of malware they believe was used to spy on a wide-range of internation...
OnionDuke APT Malware served through Tor Network

OnionDuke APT Malware served through Tor Network

November 17, 2014Swati Khandelwal
The malicious Russian Tor exit node , which was claimed to be patching binary files, is actually distributing a malware program to launc...
Best Deals

Get Daily News Updates By Email

Join over 500,000 information security professionals — Get the best of our cyber security coverage delivered to your inbox every morning.