logo
Vietnam's public security ministry takes stake in internet firm FPT Telecom

Vietnam's public security ministry takes stake in internet firm FPT Telecom

Yahooa day ago
HANOI (Reuters) -A majority stake in Vietnam's FPT Telecom, one of the country's largest internet providers, has been transferred to the Ministry of Public Security from a state-run investment corporation in an effort to boost national cybersecurity, the ministry said on Wednesday.
Vietnam's State Capital Investment Corporation previously held 50.17% of FPT Telecom, while FPT Corp, Vietnam's largest private tech company, had a 45.66% stake but retained control of the unit, according to FPT Telecom's financial statements for last year.
The transfer is aimed at strengthening the ministry's capability to protect national security and ensure network and information security, the ministry said in a statement.
It did not elaborate whether the ministry would take effective control of FPT Telecom.
Wednesday's statement confirmed a Reuters report in April about the possible transfer.
The ministry, which oversees the police, has become increasingly involved in Vietnam's internet and telecoms sector.
It took control of the country's third-largest telecoms operator, MobiFone, last year and also spearheaded a tightening of data protection rules that has raised concerns among foreign tech firms.
Shares in FPT Corp rose by 0.24% on Wednesday morning, while shares in FPT Telecom were also up slightly.
In addition to providing internet services, FPT Telecom is involved in the development of undersea fibre-optic cables, which Communist-run Vietnam considers a national priority as most of its existing cables are ageing and prone to accidents.
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Knightscope Joins Palantir's FedStart Program To Expand Federal AI Security Solutions
Knightscope Joins Palantir's FedStart Program To Expand Federal AI Security Solutions

Yahoo

time41 minutes ago

  • Yahoo

Knightscope Joins Palantir's FedStart Program To Expand Federal AI Security Solutions

Knightscope Inc. (NASDAQ:KSCP) has signed a two-year agreement with Palantir Technologies Inc. (NASDAQ:PLTR) to join Palantir's FedStart program. The agreement aims to expand Knightscope's presence in the U.S. federal market, particularly in national security and public safety. The partnership provides Knightscope access to essential accreditations, including FedRAMP High and DoD Impact Level 5, enabling secure operations in federal environments. Knightscope will also receive support for Authority to Operate (ATO) status and integration into Palantir-managed AWS GovCloud clusters, ensuring compliance with federal standards.'This agreement represents a transformational step forward in our federal strategy,' said William Santana Li, CEO of Knightscope. He emphasized that the collaboration aligns with ongoing efforts in Washington to establish a National Robotics Strategy, aiming to position the U.S. as a leader in autonomous systems. The partnership also aligns with Palantir's broader mission to deploy AI to enhance public institutions. Alex Karp, Palantir's CEO, has highlighted how AI can help protect public institutions, a vision shared by Knightscope. This collaboration mirrors other successful AI initiatives, such as AT&T Inc. (NYSE:T) leveraging Palantir's platform for its internal generative AI system, 'Ask AT&T.' The platform serves 100,000 employees and uses AI to streamline operations and improve service delivery, benefiting from Palantir's technology. Knightscope's partnership with Palantir is poised to scale its autonomous security solutions, targeting public safety and critical infrastructure protection within the federal market. Price Action: On Thursday's last check, KSCP shares were trading higher by 4.24% at $8.55, and PLTR was up by 1.52% at $153.20. Read Next: Photo via Shutterstock UNLOCKED: 5 NEW TRADES EVERY WEEK. Click now to get top trade ideas daily, plus unlimited access to cutting-edge tools and strategies to gain an edge in the markets. Get the latest stock analysis from Benzinga? PALANTIR TECHNOLOGIES (PLTR): Free Stock Analysis Report This article Knightscope Joins Palantir's FedStart Program To Expand Federal AI Security Solutions originally appeared on © 2025 Benzinga does not provide investment advice. All rights reserved. Error in retrieving data Sign in to access your portfolio Error in retrieving data Error in retrieving data Error in retrieving data Error in retrieving data

Hackers are trying to steal passwords and sensitive data from users of Signal clone
Hackers are trying to steal passwords and sensitive data from users of Signal clone

TechCrunch

time42 minutes ago

  • TechCrunch

Hackers are trying to steal passwords and sensitive data from users of Signal clone

Hackers are targeting a previously reported bug in the Signal clone app TeleMessage in an effort to steal users' private data, according to security researchers and a U.S. government agency. TeleMessage, which earlier this year was revealed to be used by high-ranking officials in the Trump administration, already experienced at least one data breach in May. The company markets modified versions of Signal, WhatsApp, and Telegram for corporations and government agencies that need to archive chats for legal and compliance reasons. On Thursday, GreyNoise, a cybersecurity firm with visibility into what hackers are doing on the internet thanks to its network of sensors, published a post warning that it has seen several attempts to exploit the flaw in TeleMessage, which was originally disclosed in May. If hackers are able to exploit the vulnerability against their targets, they could access 'plaintext usernames, passwords, and other sensitive data,' according to the firm. 'I was left in disbelief at the simplicity of this exploit,' GreyNoise researcher Howdy Fisher wrote in a post analyzing the flaw. 'After some digging, I found that many devices are still open and vulnerable to this.' According to the researcher, exploiting this flaw is 'trivial,' and it seems that hackers have taken notice. Contact Us Do you have more information about these attacks? Or about TeleMessage? We'd love to hear from you. From a non-work device and network, you can contact Lorenzo Franceschi-Bicchierai securely on Signal at +1 917 257 1382, or via Telegram and Keybase @lorenzofb, or Do you have more information about these attacks? Or about TeleMessage? We'd love to hear from you. From a non-work device and network, you can contact Lorenzo Franceschi-Bicchierai securely on Signal at +1 917 257 1382, or via Telegram and Keybase @lorenzofb, or email . In early July, U.S. cybersecurity agency CISA listed the flaw — designated officially as CVE-2025-48927 — to its catalog of Known Exploited Vulnerabilities, a database that collects security bugs that are known to have been exploited by hackers. In other words, CISA says hackers are successfully exploiting this bug. At this point, however, no hacks against TeleMessage customers have been publicly reported. In May, TeleMessage, which at that point was a little-known alternative to Signal, became a household name after then-U.S. National Security Advisor Mike Waltz accidentally revealed he was using the app. Waltz had previously added a journalist to a highly sensitive group chat with other Trump administration officials, where the group discussed plans to bomb Yemen, an operational security snafu that caused a scandal leading to Waltz's ousting. After TeleMessage was identified as the app Waltz and others in the administration used to communicate, the company was hacked. Unknown attackers stole the contents of users' private messages and group chats, including from Customs and Border Protection, and the cryptocurrency giant Coinbase, according to 404 Media, which first reported the hack. TeleMessage did not immediately respond to a request for comment.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store