Vietnam's public security ministry takes stake in internet firm FPT Telecom
Vietnam's State Capital Investment Corporation previously held 50.17% of FPT Telecom, while FPT Corp, Vietnam's largest private tech company, had a 45.66% stake but retained control of the unit, according to FPT Telecom's financial statements for last year.
The transfer is aimed at strengthening the ministry's capability to protect national security and ensure network and information security, the ministry said in a statement.
It did not elaborate whether the ministry would take effective control of FPT Telecom.
Wednesday's statement confirmed a Reuters report in April about the possible transfer.
The ministry, which oversees the police, has become increasingly involved in Vietnam's internet and telecoms sector.
It took control of the country's third-largest telecoms operator, MobiFone, last year and also spearheaded a tightening of data protection rules that has raised concerns among foreign tech firms.
Shares in FPT Corp rose by 0.24% on Wednesday morning, while shares in FPT Telecom were also up slightly.
In addition to providing internet services, FPT Telecom is involved in the development of undersea fibre-optic cables, which Communist-run Vietnam considers a national priority as most of its existing cables are ageing and prone to accidents.
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles
Yahoo
41 minutes ago
- Yahoo
Knightscope Joins Palantir's FedStart Program To Expand Federal AI Security Solutions
Knightscope Inc. (NASDAQ:KSCP) has signed a two-year agreement with Palantir Technologies Inc. (NASDAQ:PLTR) to join Palantir's FedStart program. The agreement aims to expand Knightscope's presence in the U.S. federal market, particularly in national security and public safety. The partnership provides Knightscope access to essential accreditations, including FedRAMP High and DoD Impact Level 5, enabling secure operations in federal environments. Knightscope will also receive support for Authority to Operate (ATO) status and integration into Palantir-managed AWS GovCloud clusters, ensuring compliance with federal standards.'This agreement represents a transformational step forward in our federal strategy,' said William Santana Li, CEO of Knightscope. He emphasized that the collaboration aligns with ongoing efforts in Washington to establish a National Robotics Strategy, aiming to position the U.S. as a leader in autonomous systems. The partnership also aligns with Palantir's broader mission to deploy AI to enhance public institutions. Alex Karp, Palantir's CEO, has highlighted how AI can help protect public institutions, a vision shared by Knightscope. This collaboration mirrors other successful AI initiatives, such as AT&T Inc. (NYSE:T) leveraging Palantir's platform for its internal generative AI system, 'Ask AT&T.' The platform serves 100,000 employees and uses AI to streamline operations and improve service delivery, benefiting from Palantir's technology. Knightscope's partnership with Palantir is poised to scale its autonomous security solutions, targeting public safety and critical infrastructure protection within the federal market. Price Action: On Thursday's last check, KSCP shares were trading higher by 4.24% at $8.55, and PLTR was up by 1.52% at $153.20. Read Next: Photo via Shutterstock UNLOCKED: 5 NEW TRADES EVERY WEEK. Click now to get top trade ideas daily, plus unlimited access to cutting-edge tools and strategies to gain an edge in the markets. Get the latest stock analysis from Benzinga? PALANTIR TECHNOLOGIES (PLTR): Free Stock Analysis Report This article Knightscope Joins Palantir's FedStart Program To Expand Federal AI Security Solutions originally appeared on © 2025 Benzinga does not provide investment advice. All rights reserved. Error in retrieving data Sign in to access your portfolio Error in retrieving data Error in retrieving data Error in retrieving data Error in retrieving data


TechCrunch
42 minutes ago
- TechCrunch
Hackers are trying to steal passwords and sensitive data from users of Signal clone
Hackers are targeting a previously reported bug in the Signal clone app TeleMessage in an effort to steal users' private data, according to security researchers and a U.S. government agency. TeleMessage, which earlier this year was revealed to be used by high-ranking officials in the Trump administration, already experienced at least one data breach in May. The company markets modified versions of Signal, WhatsApp, and Telegram for corporations and government agencies that need to archive chats for legal and compliance reasons. On Thursday, GreyNoise, a cybersecurity firm with visibility into what hackers are doing on the internet thanks to its network of sensors, published a post warning that it has seen several attempts to exploit the flaw in TeleMessage, which was originally disclosed in May. If hackers are able to exploit the vulnerability against their targets, they could access 'plaintext usernames, passwords, and other sensitive data,' according to the firm. 'I was left in disbelief at the simplicity of this exploit,' GreyNoise researcher Howdy Fisher wrote in a post analyzing the flaw. 'After some digging, I found that many devices are still open and vulnerable to this.' According to the researcher, exploiting this flaw is 'trivial,' and it seems that hackers have taken notice. Contact Us Do you have more information about these attacks? Or about TeleMessage? We'd love to hear from you. From a non-work device and network, you can contact Lorenzo Franceschi-Bicchierai securely on Signal at +1 917 257 1382, or via Telegram and Keybase @lorenzofb, or Do you have more information about these attacks? Or about TeleMessage? We'd love to hear from you. From a non-work device and network, you can contact Lorenzo Franceschi-Bicchierai securely on Signal at +1 917 257 1382, or via Telegram and Keybase @lorenzofb, or email . In early July, U.S. cybersecurity agency CISA listed the flaw — designated officially as CVE-2025-48927 — to its catalog of Known Exploited Vulnerabilities, a database that collects security bugs that are known to have been exploited by hackers. In other words, CISA says hackers are successfully exploiting this bug. At this point, however, no hacks against TeleMessage customers have been publicly reported. In May, TeleMessage, which at that point was a little-known alternative to Signal, became a household name after then-U.S. National Security Advisor Mike Waltz accidentally revealed he was using the app. Waltz had previously added a journalist to a highly sensitive group chat with other Trump administration officials, where the group discussed plans to bomb Yemen, an operational security snafu that caused a scandal leading to Waltz's ousting. After TeleMessage was identified as the app Waltz and others in the administration used to communicate, the company was hacked. Unknown attackers stole the contents of users' private messages and group chats, including from Customs and Border Protection, and the cryptocurrency giant Coinbase, according to 404 Media, which first reported the hack. TeleMessage did not immediately respond to a request for comment.


Bloomberg
43 minutes ago
- Bloomberg
Empty Shelves on Wall Street as Couche-Tard's 7-Eleven Buy Fails
Hi, it's Manuel Baigorri in Hong Kong, looking at the fallout for M&A advisers of the failed Couche-Tard, Seven & i deal. Elsewhere, it's another day, another senior hire at Citigroup's investment bank. Today's top stories