BusinessCybersecurity

Former L3Harris Cyber Executive Charged With Stealing Trade Secrets for Russia

Federal prosecutors allege a former L3Harris cyber division manager stole eight trade secrets and sold them to a Russian buyer. The Department of Justice is seeking forfeiture of $1.3 million in allegedly illicit proceeds from the scheme.

Federal Charges Against Defense Contractor Executive

The U.S. Department of Justice has formally accused a former L3Harris cybersecurity executive of stealing trade secrets and selling them to a buyer in Russia, according to court documents obtained by TechCrunch. The criminal information document, filed on October 14, alleges that Peter Williams stole eight trade secrets from two unnamed companies between April 2022 and August 2025.

CybersecuritySoftware

Microsoft’s Smart Card Authentication Change Forces Registry Workaround

Microsoft has intentionally modified smart card authentication in recent Windows updates, creating certificate operation failures across multiple Windows versions. The temporary solution requires users to implement a registry hack that will only function until April 2026 updates. Administrators face increased workload as they must manually apply the workaround to affected devices.

Authentication Changes Break Smart Card Functionality

Microsoft has confirmed that recent authentication issues affecting smart card users were intentionally implemented rather than accidental, according to reports. The changes were made as part of security improvements addressing CVE-2024-30098, with sources indicating the modification requires RSA-based smart card certificates to utilize KSP (Key Storage Provider) instead of CSP (Cryptographic Service Provider).

CybersecuritySecurity

Chinese Cyber Espionage Group Salt Typhoon Targets European Telecom Networks Using Sophisticated Stealth Tactics

Notorious Chinese cyber espionage group Salt Typhoon has been detected targeting European telecommunications networks using sophisticated stealth techniques. According to security analysts, the group employed DLL sideloading through legitimate antivirus software to deploy backdoor malware in what appears to be an ongoing global campaign against communications infrastructure.

European Telecommunications Infrastructure Targeted

Security researchers have identified renewed cyber espionage activity by the notorious Chinese hacking collective known as Salt Typhoon, with the group now targeting European telecommunications networks according to recent reports. The campaign marks the latest in a series of global infrastructure attacks attributed to the state-sponsored threat actor, which previously compromised multiple US telecom networks in a multi-year operation.