Topic: corporate espionage
-
Rippling/Deel Spying Scandal Takes a Wild New Turn
The U.S. Department of Justice has reportedly opened a criminal probe into allegations that HR tech firm Deel planted a corporate spy within its rival Rippling to steal sensitive data, including sales leads and product roadmaps. The legal feud, which includes civil lawsuits from both companies al...
Read More » -
Corporate Espionage Hits Top 401(k) Startups in New Allegations
A federal lawsuit accuses three brothers of corporate espionage, alleging they stole confidential data from Human Interest to benefit competitor Guideline as part of a coordinated scheme called the "Sterri Takeover." The case escalated with claims that Guideline's CFO pressured Human Interest to ...
Read More » -
Scale AI Sues Ex-Employee Over Corporate Espionage
Scale AI has sued a former employee, Eugene Ling, for allegedly stealing confidential documents and engaging in corporate espionage. The lawsuit claims Ling transferred sensitive files to a competitor, Mercor, and attempted to poach a major client while still employed at Scale. This case reflects...
Read More » -
F5 Hack Puts Thousands of Networks at Imminent Risk
A sophisticated nation-state hacking group breached F5's network, exposing proprietary source code and undisclosed vulnerability data, endangering thousands of government and corporate networks that rely on BIG-IP appliances. The attackers maintained persistent access for years, gaining control o...
Read More » -
North Korean Hackers Lead 2025 Crypto Theft Surge
North Korean state-sponsored hackers stole over $2 billion in cryptocurrency in 2025, a 51% increase, by pivoting to fewer, more sophisticated attacks on high-value targets. Their evolved tactics include sophisticated social engineering, posing as recruiters or investors to compromise employees a...
Read More » -
Chrome Extensions Stole ChatGPT & DeepSeek Data from 900K Users
Malicious Chrome extensions, posing as legitimate AI tools, stole private conversations and browsing data from over 900,000 users by secretly sending information to attacker-controlled servers. The stolen data, which can include proprietary business information and personal queries, poses a sever...
Read More » -
How Attackers Weaponize Communication Networks
Communication networks are now the primary target for cyber attackers, offering vast data access for espionage, financial crime, and other malicious intents. Attackers exploit built-in network tools and lawful intercept systems to passively monitor and steal credentials, enabling large-scale surv...
Read More » -
MFA Bypass Leads to Major Infostealer Attack on 50 Firms
A major data breach affecting around 50 global companies was enabled by the lack of multi-factor authentication (MFA), allowing an attacker to use stolen credentials for cloud file-sharing platforms. The attacker, using credentials harvested by infostealer malware, accessed accounts where passwor...
Read More » -
2025's Most Devastating Cyberattacks Exposed
The cyber threat landscape has shifted towards sophisticated supply chain attacks, where breaches of third-party vendors like Gainsight and Salesloft led to widespread data exposure at major corporations including Cloudflare, Verizon, and Cisco. The Clop ransomware group exploited a critical vuln...
Read More » -
State Hackers Infiltrated Telecom Giant Ribbon for Months
Ribbon Communications disclosed that state-sponsored hackers had unauthorized access to its systems for nearly a year, starting in December 2024, and has since removed them with law enforcement involvement. The breach affected a customer base including Fortune 500 companies and government departm...
Read More » -
Hackers Exploit Anthropic's Claude AI in New Attack
State-sponsored hackers used Anthropic's Claude AI to automate 80-90% of approximately thirty cyberattacks against corporations and governments in September, significantly increasing automation levels compared to previous intrusions. The operation required minimal human oversight, with operators ...
Read More » -
ShinyHunters Breach Okta, Microsoft SSO in Major Data Theft
The ShinyHunters gang is conducting a sophisticated voice phishing campaign, using social engineering to steal credentials and MFA codes by impersonating IT support and using real-time, interactive phishing kits. Attackers exploit compromised SSO accounts (e.g., Okta, Microsoft Entra, Google) to ...
Read More » -
Senators: Amazon Used AI Layoffs to Hire Cheaper H1-B Workers
A bipartisan group of US senators is demanding transparency from major tech companies like Amazon, Meta, Apple, Google, and Microsoft over their H-1B visa practices following significant layoffs of American workers. Senators Grassley and Durbin argue that high tech sector unemployment makes the t...
Read More »