mastodon.uno è uno dei tanti server Mastodon indipendenti che puoi usare per partecipare al fediverso.
Mastodon.Uno è la principale comunità mastodon italiana. Con 75.000 iscritti è il più grande nodo Mastodon italiano: anima ambientalista a supporto della privacy e del mondo Open Source.

Statistiche del server:

6,5K
utenti attivi

#espionage

40 post36 partecipanti4 post oggi

How Huawei’s lobbying campaign in Europe went rogue.

Once a high-flyer in Europe, Huawei’s growth stalled due to concerns over its ties with Beijing.

As the Chinese tech giant fought for survival, its EU lobbying campaign took a dark turn.

mediafaro.org/article/20250313

An illustration of someone in a lit room receiving money from someone in a dark space behind a door. | © Eline Schipperen
Follow the Money · How Huawei’s lobbying campaign in Europe went rogue.Di Alexander Fanta, Simon Van Dorpe, Lisanne van Vucht
#Huawei#EU#Lobbying

How Huawei’s lobbying campaign in Europe went rogue.

Once a high-flyer in Europe, Huawei’s growth stalled due to concerns over its ties with Beijing.

As the Chinese tech giant fought for survival, its EU lobbying campaign took a dark turn.

mediafaro.org/article/20250313

An illustration of someone in a lit room receiving money from someone in a dark space behind a door. | © Eline Schipperen
Follow the Money · How Huawei’s lobbying campaign in Europe went rogue.Di Alexander Fanta, Simon Van Dorpe, Lisanne van Vucht
#Huawei#EU#Lobbying

Hundreds of thousands of rubles for your secrets: cyber spies disguise themselves as recruiters

Cybercriminals impersonating a real company are sending fake job descriptions to employees of targeted organizations. The attackers, known as Squid Werewolf, are offering substantial sums of money, potentially hundreds of thousands of rubles, in exchange for sensitive information. This sophisticated phishing campaign aims to exploit the trust associated with legitimate recruitment processes to gather confidential data from unsuspecting employees. The operation demonstrates the evolving tactics of cyber espionage groups, blending social engineering with financial incentives to compromise organizational security.

Pulse ID: 67d1758164fe4b799677296c
Pulse Link: otx.alienvault.com/pulse/67d17
Pulse Author: AlienVault
Created: 2025-03-12 11:52:32

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

LevelBlue Open Threat ExchangeLevelBlue - Open Threat ExchangeLearn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

The nonchalant attitude with which the "P.R." #China runs #illegal "#PoliceStation|s" is just appauling.

But they ain't, and instead they are used for "#ExtraordinaryRendition" aka. forced #Disappearance|s of #Dissidents.

  • #Australia is being targeted just like every other place.

youtube.com/watch?v=7L9ubuwBDkI

German lawmakers float ‘Euro Eyes’ spy network amid uncertainty on US intel.

The Bundestag’s top intelligence experts are calling for a European spy network, warning that Europe can’t rely on intelligence from the United States amid growing uncertainty.

mediafaro.org/article/20250307

Konstantin von Notz, chairman of the German parliament’s intelligence oversight committee. | Adam Berry/Getty Images
Politico.eu · German lawmakers float ‘Euro Eyes’ spy network amid uncertainty on US intel.Di Chris Lunday

Russian State Actors: Development in Group Attributions

This analysis explores the evolution of Russian state-backed cyber actors and their operations. It highlights the activities of several prominent groups, including UNC2589, APT44 (Sandworm), APT29, and APT28. These actors, associated with various Russian intelligence agencies, have been involved in global espionage, sabotage, and influence operations. The report details their targets, which include government organizations, critical infrastructure, and diplomatic entities across multiple countries. It also describes the groups' adaptation to new security measures and their use of advanced techniques such as zero-day exploits, social engineering, and living off the land tactics. The analysis emphasizes the importance of understanding these actors' methods for improving global cybersecurity resilience.

Pulse ID: 67cc2ca27d4672d04ef4eb01
Pulse Link: otx.alienvault.com/pulse/67cc2
Pulse Author: AlienVault
Created: 2025-03-08 11:40:18

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

LevelBlue Open Threat ExchangeLevelBlue - Open Threat ExchangeLearn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.