Top related persons:
Top related locs:
Top related orgs:

Search resuls for: "NCSC"


20 mentions found


Western-trained pilots can teach Chinese military personnel everything from air combat tactics to how to land on an aircraft carrier, according to a US official. Former western pilots — which number at least in the dozens — are training Chinese military officials who then return to China and, in turn, train more pilots there, this person said. An indictment in 2017 alleged that Duggan trained Chinese pilots while he was still a US citizen, between November 2009 and November 2012. That same month, the UK Ministry of Defense issued a security alert after several of its military pilots were also found to have been training the PLA Air Force. Last August, two US Navy sailors were arrested for allegedly sending sensitive military information to Chinese intelligence officers.
Persons: , , Michael Casey, Sabrina Singh, Adm, John Aquilino, Charles Q, Brown —, , ” Brown, Daniel Duggan, Duggan, Matt Olson Organizations: CNN, Western, Wednesday, Liberation Army, National Counterintelligence and Security Center, PLA, Pentagon, National Intelligence, ” Military, Former, US, Pacific Command, PLA Navy, PLA Air Force, , Air Force, NATO, People’s Liberation Army, Air Chiefs, US Marine, UK Ministry of Defense, Australian, Export Control, US Army, People’s Locations: China, Beijing, Taiwan, Western, Canada, Australia, New Zealand, United States, South Africa, Singapore, Laos, Australian, People’s Republic
New Zealand has accused China of "malicious cyber activity" linked to Chinese state actors, who targeted its parliament in 2021. The government "expressed concerns today about malicious cyber activity, attributed to groups sponsored by the Chinese Government," New Zealand's Foreign Minister Winston Peters said on Tuesday. New Zealand's intelligence service, the National Cyber Security Centre (NCSC), "completed a robust technical assessment following a compromise of the Parliamentary Counsel Office and the Parliamentary Service in 2021," Collins said. The activity has been attributed to a Chinese state-sponsored group, she added. The Chinese embassy in New Zealand did not immediately respond to a request for comment.
Persons: Winston Peters, " Peters, Judith Collins, Collins Organizations: Government, Zealand's, National Cyber Security, Parliamentary, Office, Parliamentary Service Locations: Zealand, China, U.S, New, New Zealand
AI (Artificial Intelligence) letters are placed on computer motherboard in this illustration taken, June 23, 2023. REUTERS/Dado Ruvic/Illustration/File Photo Acquire Licensing RightsAug 30 (Reuters) - British officials are warning organisations about integrating artificial intelligence-driven chatbots into their businesses, saying that research has increasingly shown that they can be tricked into performing harmful tasks. The NCSC said that could carry risks, particularly if such models were plugged into other elements organisation's business processes. "They might not let that product be involved in making transactions on the customer's behalf, and hopefully wouldn't fully trust it. The security implications of AI are also still coming into focus, with authorities in the U.S. and Canada saying they have seen hackers embrace the technology.
Persons: Dado Ruvic, Raphael Satter, Alex Richardson Organizations: REUTERS, Cyber Security, Authorities, Thomson Locations: guardrails, U.S, Canada
US warns space companies about foreign spying
  + stars: | 2023-08-18 | by ( Michael Martina | ) www.reuters.com   time to read: +2 min
"We anticipate growing threats to this burgeoning sector of the U.S. economy," a U.S. counterintelligence official told Reuters, adding that "China and Russia are among the leading foreign intelligence threats to the U.S. space industry." The document warned companies to be on guard for facility visit requests, and attempts to gather confidential information at conferences. U.S. authorities have for years said Chinese hackers are targeting U.S. space know-how, including having accessed computers at the NASA Goddard Space Center and Jet Propulsion Laboratory, as well as numerous companies involved in aviation, space and satellite technology. China says its space program is for peaceful purposes, but U.S. military officials say Beijing sees space as crucial to its military strategy. The U.S. warned this year that China seeks to match or surpass it as a leader in space by 2045.
Persons: Tom Brenner, Tao Li, Michael Martina, Don Durfee, Jamie Freed Organizations: Federal Bureau of, REUTERS, Rights, Reuters, Federal Bureau of Investigation, National Counterintelligence and Security, Air Force Office, Special Investigations, NASA Goddard Space Center, Jet Propulsion Laboratory, Thomson Locations: Washington , U.S, U.S, China, Russia, Washington, Beijing
LONDON, July 13 (Reuters) - Britain's National Cyber Security Centre (NCSC) said on Thursday it was working with Microsoft (MSFT.O) to understand the impact of a wide-reaching Chinese hack which accessed email accounts used by senior U.S. government officials and agencies. On Tuesday, Microsoft revealed that a stealthy Chinese hacking operation had exploited a secret flaw in a piece of its authentication software in order to covertly break into email accounts belonging to 25 unnamed organisations. "We are working with Microsoft to fully understand the incident and UK impact," said a spokesperson for the NCSC, which is part of Britain's GCHQ spy agency. Reporting by James Pearson; editing by Mark HeinrichOur Standards: The Thomson Reuters Trust Principles.
Persons: Britain's, James Pearson, Mark Heinrich Our Organizations: Cyber Security, Microsoft, U.S, Thomson
WASHINGTON, June 30 (Reuters) - The U.S. on Friday warned about a new Chinese counter-espionage law, saying American and other foreign companies in the country could face penalties from Chinese authorities for regular business activities. Chinese lawmakers this year passed a wide-ranging update to Beijing's anti-espionage legislation that goes into effect on July 1, banning the transfer of any information related to national security and broadening the definition of spying. It said the ambiguities of the law meant that "any documents, data, materials or items" could be deemed relevant to Chinese national security, also putting journalists, academics and researchers at risk. Chinese leader Xi Jinping has emphasized national security since taking office in 2012. U.S. officials have told Reuters that since the enactment of the Chinese law in April they have received a flood of questions from businesses and other groups about the risks of traveling to China.
Persons: Xi Jinping, China Nicholas Burns, Michael Martina, Chizu Organizations: U.S . National Counterintelligence and Security, People's, U.S, China, U.S ., Reuters, The U.S . State Department, Thomson Locations: U.S, China, People's Republic of China, Beijing, Washington, The
REUTERS/Dado Ruvic/Illustration/File PhotoJune 28 (Reuters) - Mercenary hackers increasingly are targeting law firms in a bid to steal data that could tip the balance in legal cases, French and British authorities say, echoing a Reuters investigation that uncovered the phenomenon last year. In a pair of reports published over the past week, the cyber watchdog agencies of France and the United Kingdom cataloged an array of digital challenges faced by law firms, including threats posed by ransomware and malicious insiders. Both also highlighted the dangers posed by mercenary hackers hired by litigants to filch sensitive information from courtroom opponents. France’s cyber watchdog, known as ANSSI, said in its report released Tuesday that “mercenaries with offensive cyber capacities” were increasingly targeting the legal sector. ANSSI cited Reuters reporting last year on how mercenary hackers based out of India were being drafted to help sway high-profile cases in the United States, Europe and elsewhere.
Persons: Dado Ruvic, ANSSI, Britain's, ANSSI didn't, Raphael Satter Organizations: REUTERS, Mercenary, Cyber Security, Reuters, Google, Facebook, Meta, Inc, Thomson Locations: France, United Kingdom, London, India, United States, Europe, U.S
GENEVA, June 13 (Reuters) - Swiss authorities said on Tuesday that a pro-Russian hacking group had intensified its cyberattacks against the country, with the hackers claiming to have taken down several key websites including that of Geneva Airport. Switzerland's main government websites, including that of parliament and the federal administration, have been hit in recent days by a distributed denial-of-service (DDoS) attack claimed by the NoName group. The attack comes as the Swiss parliament prepares for a video address by Ukrainian President Volodymyr Zelenskiy scheduled for Thursday. "The parliamentary services are doing everything in their power to ensure that the live broadcast on Thursday can go smoothly," NCSC said. On Tuesday it attacked other websites including that of Geneva Airport, a hub for diplomats and officials travelling to the United Nations.
Persons: Volodymyr Zelenskiy, NCSC, Gabrielle Tétrault, Farber, Alexandra Hudson Organizations: Geneva Airport, Reuters, Cyber Security, Swiss, Moscow, United Nations, Geneva International, Telegram, Alexandra Hudson Our, Thomson Locations: GENEVA, Russian, Switzerland's, Geneva
DUBLIN, April 21 (Reuters) - The state body responsible for advising the Irish government on cyber security recommended on Friday that staff at government departments and state agencies not use Chinese-owned video app TikTok on official devices. A number of Western countries including Britain, the U.S. and other European Union member states have barred TikTok over security concerns. The issue here rather is what we can’t rule out is happening," NCSC director Richard Browne told national broadcaster RTE. TikTok runs a number of its European operations from Dublin, including data privacy and protection. It announced last month that it would open a second data centre in Ireland and reduce the transfer of data outside of the EU.
Britain's National Cybersecurity Centre (NCSC), part of its GCHQ eavesdropping spy agency, said in a report published on Wednesday that the mercenary hacking market was offering products that were on par with government hacking groups. On Tuesday, Canadian internet watchdog group Citizen Lab published a report which said that NSO had been caught using newly-discovered hacking tools to break into iPhones belonging to Mexican human rights defenders in 2022. At least some in the spyware industry see regulation coming down the pipe and are taking steps to try to shape it. NSO has long touted its human rights policy despite repeated allegations that its software has been used abusively, including to spy on victims of human rights violations. NSO did not immediately return an email seeking comment on the Citizen Lab report or its communications with the American Bar Association.
BELFAST, April 19 (Reuters) - China is aiming for "global technological supremacy" in cyberspace and is using its cyber capabilities to conduct intelligence and surveillance campaigns, Britain's cyber chief said on Wednesday. Lindy Cameron, director of the National Cyber Security Centre (NCSC), part of Britain's GCHQ eavesdropping spy agency, said Britain had a "legitimate concern" about the effects Chinese technology may have on cybersecurity. "China is not only pushing for parity with Western countries, it is aiming for global technological supremacy," Cameron told an annual government cybersecurity conference in Belfast. China is also using its cyber capabilities to acquire intellectual property, achieve its strategic geopolitical goals, and conduct global spying campaigns, Cameron added. Last month, Britain banned the use of TikTok on government phones, following other Western countries in barring the Chinese-owned video app over security concerns.
BELFAST, April 19 (Reuters) - The UK government's cyber defence agency warned on Wednesday of an emerging threat to Western critical national infrastructure posed by hackers sympathetic to Russia and its war on Ukraine. Russia-aligned "hacktivists" have carried out largely harmless online campaigns that have defaced prominent public websites or knocked them offline. "Some have stated a desire to achieve a more disruptive and destructive impact against western critical national infrastructure, including in the UK," the NCSC said. Although such groups are ideologically-motivated and align themselves with Russian state interests, they are "not subject to formal state control," the alert said. A successful cyberattack on critical national infrastructure such as an energy grid or water supply could be highly destructive, and do serious real-world damage.
A unit of the British spy agency GCHQ warned AI chatbots like ChatGPT pose a security threat. Companies like Amazon and JPMorgan have advised staff members against using ChatGPT for work. The authors pointed out that queries entered into chatbots are stored by their providers. They added: "Queries stored online may be hacked, leaked, or more likely accidentally made publicly accessible. Major companies including Amazon and JPMorgan have advised employees not to use ChatGPT over concerns that internal information may be leaked.
British lawmaker's email account hacked by Russian group
  + stars: | 2023-02-08 | by ( ) www.reuters.com   time to read: +1 min
LONDON, Feb 8 (Reuters) - A British lawmaker said his private email was hacked by a group, thought to be Russian, and he wanted to speak out publicly to warn others about the attackers' tactics. Later he discovered the member of staff had not sent the email. The NCSC said that Russia-based SEABORGIUM and Iran-based group TA453 were active in 2022 and it deemed it necessary to issue an advisory last month urging individuals in certain sectors to be vigilant. On Wednesday, the NCSC, which is part of GCHQ, Britain's intelligence, security and cyber agency, said it was providing an individual with support. "The NCSC regularly provides security briefings and guidance to parliamentarians to help them defend against the latest cyber threats," it said in an email.
WASHINGTON, Feb 3 (Reuters) - The hackers who claimed responsibility for the disruptive breach at financial data firm ION say a ransom has been paid, although they declined to say how much it was or offer any evidence that the money had been handed over. Britain's National Cyber Security Agency (NCSC), part of Britain's GCHQ eavesdropping intelligence agency, told Reuters it had no comment. ABN told clients on Wednesday that due to "technical disruption" from ION, some applications were unavailable and were expected to remain so for a "number of days." ION was removed from Lockbit's extortion website, where victim companies are named and shamed in a bid to force a payout. As of late Friday, Lockbit's extortion website alone counted 54 victims who were being shaken down, including a television station in California, a school in Brooklyn and a city in Michigan.
ION Group, the financial data firm's parent company, said in a statement on its website that the attack began on Tuesday. "The incident is contained to a specific environment, all the affected servers are disconnected, and remediation of services is ongoing," ION Group said, declining requests for further comment. ABN told clients on Wednesday that due to "technical disruption" from ION, some applications were unavailable and were expected to remain so for a "number of days". It added that its staff had to process trades directly with the exchange. Intesa Sanpaolo told clients that its brokerage and clearing operations on exchange-traded derivatives had been "severely hampered" by IT problems at ION and that it was not able to handle orders.
Britain sounds alarm on Russia-based hacking group
  + stars: | 2023-01-26 | by ( James Pearson | ) www.reuters.com   time to read: +2 min
LONDON, Jan 26 (Reuters) - A Russia-based hacking group named Cold River is behind an expansive and ongoing information-gathering campaign that has struck various targets in government, politics, academia, defence, journalism, and activism, Britain said on Thursday. "There is often some correspondence between attacker and target, sometimes over an extended period, as the attacker builds rapport," the advisory said. A second, Iran-based, group known as Charming Kitten has deployed the same "spear-phishing" techniques to gather information, according to the NCSC. Iran's mission to the United Nations in New York said the Iranian government had no knowledge of the group. Since Russia's invasion of Ukraine, Cold River has escalated its hacking campaign against Kyiv's allies, cybersecurity researchers and western government officials told Reuters.
ZURICH, Dec 2 (Reuters) - The Swiss government proposed on Friday making it mandatory to report cyberattacks on critical infrastructure as a way to help shed light on hackers and sound the alarm more widely. "Successful cyberattacks can have far-reaching consequences for the availability and security of the Swiss economy. The general public, authorities and companies are exposed to the risk of cyberattacks on a daily basis. Swiss stock exchange operator SIX, for example, saw an increase in hacker attacks around the start of Russia's invasion of Ukraine in February. European states have raced to protect energy infrastructure ranging from Norwegian energy installations to German power lines after blaming the Nord Stream pipeline leaks in September on sabotage.
LONDON — The U.K. government extended a deadline for telecom companies to remove equipment from Chinese tech giant Huawei from their 5G mobile networks. They will still need to ban new Huawei 5G installments and completely eliminate it from their networks by the end of 2027. The order was enshrined in law last year with a piece of legislation called the Telecoms Security Act. Previously, telecoms groups like BT and Vodafone had been told to remove Huawei 5G equipment from their "core" by January 2023. Today I'm using these powers and making it a legal requirement for Huawei to be removed from 5G networks by 2027."
Total: 20