Belgium probes if Chinese hackers breached its intelligence service

source: bleepingcomputer.com (contributed by Steve Page)  |  image: pexels.com

 

​The Belgian federal prosecutor’s office is investigating whether Chinese hackers were behind a breach of the country’s State Security Service (VSSE).

Chinese state-backed attackers reportedly gained access to VSSE’s external email server between 2021 and May 2023, siphoning around 10% of all emails sent and received by the agency’s staff.

The compromised server was only used for exchanging emails with public prosecutors, government ministries, law enforcement, and other public Belgian administration bodies, as Belgian news outlet Le Soir reported on Wednesday. Continue reading “Belgium probes if Chinese hackers breached its intelligence service”

How Deep Tech Innovations Are Revolutionizing Warehousing, Energy And EV Infrastructure In 2025

source: forbes.com  |  image: pexels.com

 

Agentic AI may be the darling of 2025’s megatrends, dominating headlines with promises of transformative potential.

But beneath the noise, another revolution is brewing, one with quieter but equally profound implications for the future of industry.

In the traditionally conservative worlds of manufacturing, energy and logistics, a new wave of deep tech innovation is taking root.

While political pundits debate the implications of Trump’s proposed tariff policies, a cadre of entrepreneurs is sidestepping speculation, opting instead to tackle inefficiencies baked into the backbone of global commerce.

And the way they are going about it? Continue reading “How Deep Tech Innovations Are Revolutionizing…”

The cyber threats to watch in 2025, and other cybersecurity news to know this month

source: weforum.org  |  image: pexels.com

 

1. Global Cybersecurity Outlook 2025: Navigating complexity

The cyber threat landscape in 2025 will be shaped by increasingly sophisticated attacks, with ransomware, social engineering and AI-powered cybercrime remaining top concerns, according to the World Economic Forum’s latest Global Cybersecurity Outlook.

Data breaches continued at historic levels in 2024, with 3,158 data compromises tracked by the Identity Theft Resource Center – on par with the previous record-breaking year. However, victim notices surged 211% to 1.3 billion, but this was largely due to five mega-breaches, each triggering over 100 million notices.

The US Is Considering a TP-Link Router Ban—Should You Worry?

source: wired.com  |  image: pexels.com

 

Several government departments are investigating TP-Link routers over Chinese cyberattack fears, but the company denies links.

TP-Link is one of the most popular routermanufacturers in the US, but the company is facing a potential ban due to security concerns about its links to China. A December report from The Wall Street Journal revealed that the US Commerce, Defense, and Justice Departments are investigating TP-Link, though no evidence of deliberate wrongdoing has yet emerged.

“We are a US company,” Jeff Barney, president of TP-Link told WIRED, “We have no affiliation with TP-Link Tech, which focuses on mainland China, and we can prove our separateness.” Continue reading “The US Is Considering a TP-Link Router Ban—Should You Worry?”

ChatGPT’s Deep Research just identified 20 jobs it will replace. Is yours on the list?

source: zdnet.com (contributed by Artemus founder, Bob Wallace)  |  image: pexels.com

 

After researching 24 sources in seven minutes, ChatGPT came up with the top jobs that might be on the chopping block.

This week, OpenAI launched its Deep Research feature which can synthesize content from across the web into one detailed report in minutes leveraging a version of the company’s latest model, o3

This feature is a powerful tool for workers, as it can save them hours by completing research autonomously. But can the technology’s underlying model replace workers? Yes, suggests Deep Research. Continue reading “ChatGPT’s Deep Research just identified 20 jobs…”

X is blocking links to Signal

source: theverge.com (contributed by FAN, Steve Page)  |  image: pexels.com

Users attempting to add their Signal.me URL to posts, DMs, and bio descriptions are being met with error messages.

X users are currently unable to post links to Signal.me, which are used to quickly and securely send direct messages to Signal users. A variety of failure notifications are being reported when X users attempt to post Signal links on the platform, some of which identify the blocked message as containing spam, harmful content, or malicious activity. Continue reading “X is blocking links to Signal”

The Spy Who Exposed the Secrets of the Black Chamber, One of America’s First Code-Breaking Organizations

source: smithsonianmag.com (contributed by FAN, Bill Amshey)  |  image: pexels.com

In 1931, Herbert O. Yardley published a tell-all book about his experiences leading a covert government agency called the Cipher Bureau

Herbert O. Yardley was being followed. He knew it, as much as he knew something was off when a beautiful woman struck up a conversation with him at an illegal speakeasy in New York City in 1929. “Her friendliness was a bit forced,” he later recalled. “It did not seem reasonable for one of her beauty and charm to possess such warmth for a bald-headed man.” The drinks flowed liberally as Yardley sipped straight whiskey, only to let it run slowly through his lips into the ginger ale cup used as his chaser. The woman removed a compact mirror from her purse and disappeared into the ladies’ room. Yardley wasted no time in searching the purse but found nothing except $15, a key and two or three handkerchiefs.

At the end of the night, after Yardley helped the stranger home in a taxi, he waited until she fell asleep, then searched her apartment. In a dresser drawer, he found a typewritten note: “Have tried to reach you all day by telephone. See mutual friend at first opportunity. Important you get us information at once.” The cryptologist covered the woman with a blanket and quietly let himself out. Once again, he’d avoided falling into a spy’s trap. Even so, his days as the head of the top-secret Black Chamberagency were numbered.

READ THE FULL STORY AND VIEW THE MANY IMAGES FROM THIS FASCINATING SMITHSONIAN ARTICLE.  CLICK HERE

We’re In for a Rude Awakening on Cybersecurity

source: city-journal.org (contributed by FAN, Steve Page)  |  image: pexels.com

America remains ill-prepared for Chinese hackers targeting critical infrastructure.

It’s a crisis that almost no one is talking about. The Chinese Communist Party is now the world’s preeminent practitioner of cyber warfare. Once notoriously loud and clumsy, the CCP’s hackers have become stealthy and sophisticated. They’re intercepting the calls and texts of our leaders and infiltrating servers at our ports, power plants, and water-treatment facilities. Yet hardly anyone seems to care. When Congress held hearings on cybersecurity late last year, only a handful of journalists bothered to cover them. Continue reading “We’re In for a Rude Awakening on Cybersecurity”

Malicious Ads in Search Results Are Driving New Generations of Scams

source: wired.com (contributed by Artemus founder, Bob Wallace)  |  image: pixabay.com

 

The scourge of “malvertising” is nothing new, but the tactic is still so effective that it’s contributing to the rise of investment scams and the spread of new strains of malware.

MALICIOUS DIGITAL ADVERTISEMENTS and “SEO poisoning” that gets those ads to prime spots in search results have been mainstays of the digital scamming ecosystem for years. But as online crime evolves and malicious trends like “pig butchering” investment scams and infostealing malware proliferate, researchers say that so-called “malvertising” is still a key technique for scammers—and still a growing problem. Continue reading “The scourge of “malvertising” is nothing new…”

FBI Sounds Alarm Over AT&T Hackers Stealing Agent Call Logs That Man Expose Informants

source: ibtimes.com (contributed by Steve Page)  |  image: fbi.gov

 

Hackers who breached AT&T’s systems may have handed criminals a roadmap to FBI informants

 

Hackerswho breached AT&T‘s systems may have handed criminals a roadmap to FBIinformants, stealing call logs that could unravel investigations and jeopardize lives, according to alarming new details revealed Thursday.

FBI officials have warned that last year’s AT&T system breach likely led to the theft of months’ worth of call and text records tied to federal agents, raising concerns about the safety of confidential informants, Bloomberg News reported. Continue reading “FBI Sounds Alarm Over AT&T Hackers…”