Dark
Light

Leaks from Chinese firm spark concern about data security risks

1 min read
44 views

TLDR:

Leaked documents from the Chinese tech company I-Soon reveal the scale of Beijing’s cyber operations, showing collaboration between private sector companies and the military. The company, known as Anxum, has the ability to function like an Advanced Persistent Threat (APT). The leaked data suggests hacking of several governments, universities, and members of NATO, including India. Cybersecurity experts warn of the implications for countries like India, where data breaches are common and the lack of a National Cybersecurity Policy poses challenges for defense. The leaks also highlight concerns about trust in supply chains and the potential for mass surveillance.

Full Article:

Leaked documents from a Chinese technology company, I-Soon, also known as Anxum, have shed light on Beijing’s cyber operations, revealing collaboration between private sector companies and the military. The documents, leaked on GitHub, show the company’s ability to function like an Advanced Persistent Threat (APT), with the capacity to hack into networks and devices of governments, universities, and members of NATO.

Specific examples from the leaked data include breaches of Indian ministries, access to Indian citizen data, and call data records from telecom companies. Cybersecurity experts caution that these revelations have significant implications for countries like India, where data breaches are common, and the lack of a comprehensive National Cybersecurity Policy poses challenges for defense against sophisticated cyber threats.

The leaks also raise concerns about trust in supply chains, with the documents detailing devices that could compromise data security. This underscores the need for vigilance and stringent cybersecurity measures to protect against potential mass surveillance risks. The article emphasizes the importance of addressing data protection standards and creating robust defense mechanisms in the face of evolving cyber threats.

Previous Story

Unleashing AI for SMEs in the face of challenges

Next Story

Attention Android users: check for app stealing texts and photos

Latest from News