Tagged articles
6 articles
Page 1 of 1
Efficient Ops
Efficient Ops
Oct 22, 2025 · Information Security

NSA‑Backed Attack on China’s Time‑keeping Center: Weapons, Tactics, Findings

The Chinese National Time Service Center revealed a sophisticated cyber‑attack attributed to the U.S. NSA, detailing the deployment of multiple custom malware families—including Back_eleven, eHome_0cx, and New_Dsz_Implant—used for data theft, persistent footholds, encrypted tunneling, lateral movement, and command‑and‑control via numerous IP addresses.

Cyber EspionageNSAinformation security
0 likes · 8 min read
NSA‑Backed Attack on China’s Time‑keeping Center: Weapons, Tactics, Findings
AIWalker
AIWalker
Feb 19, 2025 · Artificial Intelligence

DeepSeek’s NSA Attention Cuts Inference Time 11× – CEO Liang Co‑author

DeepSeek introduces the NSA sparse attention mechanism, combining dynamic hierarchical sparsity, coarse token compression and fine token selection to achieve up to 11.6× faster inference, lower pre‑training cost, and superior benchmark performance across general, long‑context, and chain‑of‑thought tasks.

BenchmarkDeepSeekLLM optimization
0 likes · 9 min read
DeepSeek’s NSA Attention Cuts Inference Time 11× – CEO Liang Co‑author
Laravel Tech Community
Laravel Tech Community
Sep 20, 2022 · Information Security

NSA TAO Cyber Attack on Northwestern Polytechnical University: Investigation and Technical Analysis

An in‑depth investigation by China’s national computer emergency response center and 360 Company uncovered a sophisticated cyber‑attack on Northwestern Polytechnical University orchestrated by the U.S. NSA’s Tailored Access Operations unit, detailing the attack infrastructure, weaponised tools, data theft and broader implications for Chinese critical sectors.

CyberattackNSANorthwestern Polytechnical University
0 likes · 9 min read
NSA TAO Cyber Attack on Northwestern Polytechnical University: Investigation and Technical Analysis
Open Source Linux
Open Source Linux
Apr 20, 2022 · Information Security

Inside NSA’s Quantum Attack Platform: How Global Internet Traffic Is Hijacked

A 360 Enterprise Security Group report reveals that the NSA’s sophisticated Quantum attack platform hijacks worldwide internet traffic, steals diverse data types, and targets users of major services, demonstrating fully automated, indiscriminate cyber‑war capabilities affecting China and many U.S. allies.

Global SurveillanceNSANetwork Hijacking
0 likes · 3 min read
Inside NSA’s Quantum Attack Platform: How Global Internet Traffic Is Hijacked