Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

F5 breach exposes BIG-IP source code — state hackers behind massive intrusion

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Apple upgrades iPad Pro, MacBook Pro, Vision Pro with new M5 chip

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » The new report links research firms Bieta and CIII to MSS Cyber ​​Operations in China
Identity

The new report links research firms Bieta and CIII to MSS Cyber ​​Operations in China

userBy userOctober 6, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

October 6, 2025Ravi LakshmananNetwork Security/Cyber ​​Spy

A Chinese company named Beijing Electronics and Technology Applications Institute (BIETA) is highly rated as likely to be led by the Ministry of National Security (MSS).

This assessment comes from evidence that at least four BIETA staff members have a clear link to MSS officers and have or have a relationship with the University of International Relations, according to recorded futures. The names of the four individuals include Wu Sizhong, His Deccan, Your Xingang, and Zhou Linna.

“BIETA and its subsidiary, Beijing Sanxin Times Technology Co., Ltd. (CIII), research, development, import and sales technologies almost certainly sell and sell technologies that support intelligence, anti-intellectuality, military, and other missions related to China’s national development and security.

“Their activities include research methods for steganography that may support the deployment of secret communication (COVCOM) and malware. Forensic investigations and development and sales of anti-centric equipment, as well as acquisition of foreign technologies for steganography, network penetration testing, military communications and planning.”

DFIR Retainer Service

According to information shared on its website, Bieta is a “research and development organization” specializing in research into communications technology, multimedia information processing technology, multimedia information security technology, computer and network technology applications, and special circuit development. It is said that it has existed in some form since 1983.

One of Bieta’s core focus areas concerns the use of steganography across several media, with CIII also being copyrighted for software related to secret communication tactics. CIII has also developed a variety of applications for uploading files to Baidu Cloud and OneDrive, and for communicating with friends, network simulation and penetration testing on websites, mobile apps, enterprise systems, servers, databases, cloud platforms, and Internet of Things devices.

In November 2021, the company has worked on a tool called the Intelligent Discussion Android App and a mobile phone positioning system that can identify, monitor, monitor, position and block phones within large venues.

Other solutions advertised by CIII range from communication simulations to network function testing tools and programs called Datacrypt Hummingbird Online Storage Upload Software. That said, there is limited public information about how these programs have augmented MSS.

The Mastercard-owned company said both Bieta and CIII were “almost undoubtedly.”

CIS Build Kit

“Bieta’s research is almost certainly used to create technology that enables the MSS mission. MSS may have the capacity to be made available to local security departments, departments and officers, from Bieta’s achievements.

The disclosure comes just over a month after a cybersecurity company discovers a Chinese agent and VPN service called a Chinese proxy (formerly Gacloud), which has been used in a cyber campaign that is allegedly organized by a North Korean threat actor known as Kimsky.

“It is unclear whether they purchased a subscription or otherwise obtained this particular Trojan deputy,” it said. “This highlights the broader risks of the APT proxy infrastructure that blends with commercial products.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleAMD supplies 6GW of computing capacity in tens of millions of chip transactions
Next Article Fatal Mamba Snakebits stop the movement of the muscles, but sometimes anti-vivenom can send them overdrive
user
  • Website

Related Posts

F5 breach exposes BIG-IP source code — state hackers behind massive intrusion

October 15, 2025

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

October 15, 2025

Over 100 VS Code extensions expose developers to hidden supply chain risks

October 15, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

F5 breach exposes BIG-IP source code — state hackers behind massive intrusion

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Apple upgrades iPad Pro, MacBook Pro, Vision Pro with new M5 chip

Group chats added to Threads as Messaging rolls out to the EU

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Revolutionize Your Workflow: TwinH Automates Tasks Without Your Presence

FySelf’s TwinH Unlocks 6 Vertical Ecosystems: Your Smart Digital Double for Every Aspect of Life

Beyond the Algorithm: How FySelf’s TwinH and Reinforcement Learning are Reshaping Future Education

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.