Topic: intellectual property theft
-
US Sanctions Russian Broker Over Stolen Zero-Day Exploits
The U.S. Treasury sanctioned Russian broker Sergey Zelenyuk and his network, Operation Zero, under the Protecting American Intellectual Property Act for purchasing stolen hacking tools, marking the law's first use. The sanctions stem from a case where a former U.S. defense contractor employee sto...
Read More » -
Nike Hit by 1.4TB Data Breach, Ransomware Group Claims
Nike is investigating a major cybersecurity incident after the World Leaks ransomware group claimed to have published roughly 1.4 terabytes of internal company data, including sensitive business documents. The leaked files contain core operational information like product designs, supply chain de...
Read More » -
Biotech CISOs: Are You Prepared for Cyber Threats?
Biotech cybersecurity risks go beyond data breaches, threatening research, manufacturing, and biological safety, with potential irreversible consequences like disrupted scientific progress or leaked genetic data. Attacks on biotech systems can manipulate gene-editing tools or synthetic biology pr...
Read More » -
Cyber Threats Target Defense Industrial Base
Cyber threats against the defense industrial base have evolved from intelligence gathering to actively disrupting manufacturing and supply chains, posing a direct risk to national security and future wartime production capacity. Threat actors target the entire defense ecosystem, including smaller...
Read More » -
Chinese Hackers Exploit SharePoint Zero-Day, Warn Google & Microsoft
Google and Microsoft experts discovered a critical SharePoint vulnerability (CVE-2025-53770) exploited by Chinese state-sponsored hackers to steal encryption keys and compromise corporate networks. Three China-linked hacking groups (Linen Typhoon, Violet Typhoon, Storm-2603) have weaponized the f...
Read More » -
Access to Future AI Models in OpenAI’s API May Require a Verified ID
OpenAI may soon require organizations to complete an ID verification process in order to access certain future AI models.
Read More » -
Chinese Hackers Exploit Critical SharePoint 'ToolShell' Flaws
Chinese-linked hacking groups (Linen Typhoon, Violet Typhoon, Storm-2603) are exploiting critical Microsoft SharePoint vulnerabilities (CVE-2025-53770, CVE-2025-53771) to steal data or deploy ransomware. Linen Typhoon targets government and defense sectors, while Violet Typhoon focuses on intelle...
Read More » -
Critical Git RCE Flaw (CVE-2025-48384) Actively Exploited by Attackers
A critical Git vulnerability (CVE-2025-48384) allows arbitrary code execution via maliciously crafted submodules, affecting macOS and Linux systems. CISA has confirmed active exploitation and mandated federal agencies to patch by September 15, 2025, with fixed Git versions released on July 8, 202...
Read More » -
Advantest Hit by Ransomware Attack, Disrupting Chip Testing
Advantest, a key global semiconductor testing equipment manufacturer, confirmed a ransomware attack on its corporate network first detected in February 2026, though core production appears unaffected. The full impact, including whether sensitive customer or employee data was compromised, remains ...
Read More »