The massive market transformation this month that some on Wall Street called a "once in a decade opportunity" might have just been a one-off technical move because of taxes.Marketsread more
The Pentagon will deploy U.S. forces to the Middle East on the heels of the attack on Saudi Arabian oil facilities, United States Secretary of Defense Mark Esper announced...Defenseread more
CNBC did a deep dive through the most recent Wall Street research to find stocks that analysts say are underappreciated.Marketsread more
Shares of MasterCard are up 46% this year, and 1120% since 2011, getting a boost from the strong U.S. consumer.Investingread more
Trade with China is the 'big unknown' for the Federal Reserve as it decides how best to support the U.S. economy, says Council on Foreign Relations Director of International...Futures Nowread more
Lobbying experts said the visit is likely an attempt to be in lawmakers' ears as they consider legislation that would impact Facebook.Technologyread more
Yardeni Research's Edward Yardeni believes the U.S. economy is picking up steam.Trading Nationread more
Iran's audacious drone and cruise missile attack on Saudi Arabia's oil producing facilities has provided a critical test yet for the Trump administration's foreign policy. A...Politicsread more
Chinese trade negotiators suddenly canceled a visit to meet U.S. farmers after they wrapped up trade talks in Washington this week.Marketsread more
Blackstone Executive Vice Chairman Tony James says he's less optimistic now than before that the U.S.-China trade war could be resolved, but even a smaller deal could help...World Economyread more
Hackers have broken into the systems of more than a dozen global telecommunications companies and taken large amounts of personal and corporate data, researchers from a cyber security company said on Tuesday, identifying links to previous Chinese cyber-espionage campaigns.
Investigators at U.S.-Israeli cyber security firm Cybereason said the attackers compromised companies in more than 30 countries and aimed to gather information on individuals in government, law-enforcement and politics.
The hackers also used tools linked to other attacks attributed to Beijing by the United States and its Western allies, said Lior Div, chief executive of Cybereason.
"For this level of sophistication it's not a criminal group. It is a government that has capabilities that can do this kind of attack," he told Reuters.
China has repeatedly denied involvement in any hacking activity.
Cybereason declined to name the companies affected or the countries they operate in, but people familiar with Chinese hacking operations said Beijing was increasingly targeting telcos in Western Europe.
Western countries have moved to call out Beijing for its actions in cyberspace, warning that Chinese hackers have compromised companies and government agencies around the world to steal valuable commercial secrets and personal data for espionage purposes.
Div said this latest campaign, which his team uncovered over the last nine months, compromised the internal IT network of some of those targeted, allowing the attackers to customize the infrastructure and steal vast amounts of data.
In some instances, they managed to compromise a target's entire active directory, giving them access to every username and password in the organisation. They also got hold of personal data, including billing information and call records, Cybereason said in a blog post.
"They built a perfect espionage environment," said Div, a former commander in Israel's military intelligence unit 8200.
"They could grab information as they please on the targets that they are interested in."
Cybereason said multiple tools used by the attackers had previously been used by a Chinese hacking group known as APT10.
The United States indicted two alleged members of APT10 in December and joined other Western countries in denouncing the group's attacks on global technology service providers to steal intellectual property from their clients.
The company said on previous occasions it had identified attacks it suspected had come from China or Iran but it was never certain enough to name these countries.
Cybereason said: "This time as opposed to in the past we are sure enough to say that the attack originated in China."
"We managed to find not just one piece of software, we managed to find more than five different tools that this specific group used," Div said.