Daily Briefing is a curated listicle made available by The Readable. We select a handful of significant stories worth sharing with our readers and present them in an easy-to-read, accessible format. Dain Oh and Minkyung Shin collaborate in monitoring, selecting, and reviewing the news articles, with Arthur Gregory Willers contributing to improve the overall readability of the briefing.
1. Seoul Metro received massive DDoS attack, allegedly originating from Russia – South Korea’s Channel A
Seoul Metro, the operator of subway lines 1 through 8, experienced a severe Distributed Denial of Service (DDoS) attack on its website, recording over 140 million attempts between November 4 and 5. The attack peaked on November 5, an unusual intensity compared to the annual average of 200 million DDoS attempts. City officials suspect the attack originated in Russia.
The attack occurred shortly after a Russian hacking group threatened cyber action in response to comments by South Korea’s defense minister supporting Ukraine. On the same day as the metro incident, South Korea’s Ministry of National Defense also endured a similar DDoS attack.
Although no actual damage was reported due to preemptive security measures, City Councilor Yun Young-hee emphasized potential vulnerabilities, calling for stronger defenses—particularly concerning Chinese hardware components used in infrastructure.
2. Italian beauty firm convicted of stealing Korean cosmetic technology in landmark ruling – South Korea’s Financial News
A South Korean court has upheld a conviction against Italian beauty firm Intercos Korea for illegally acquiring cosmetic manufacturing technology from Kolmar Korea, marking the country’s first confirmed guilty verdict for tech theft in the beauty industry. Intercos Korea was fined 5 million won (about $3,600) under the Unfair Competition Prevention Act after hiring former Kolmar Korea employees who leaked trade secrets, including formulations for sun creams, masks, and lipsticks.
The case highlights the rarity of successful trade secret theft convictions in South Korea’s cosmetics sector, which has long faced challenges with unauthorized technology leaks. Industry experts emphasize the need for stricter penalties to deter these practices, arguing that technology theft undermines fair competition and the efforts of firms that invest heavily in research and development.
3. Pentagon secrets leaker Jack Teixeira sentenced to 15 years in prison by a federal judge – AP
Massachusetts Air National Guard member Jack Teixeira was sentenced to 15 years in prison for leaking classified military documents on the Ukraine war, one of the most serious national security breaches in recent years. Prosecutors argued that Teixeira’s actions endangered U.S. military personnel, strained international relations, and posed a lasting threat to national security. Although Teixeira claimed he shared the information solely to inform friends, his disclosures included sensitive details about troop movements and U.S. military strategies.
Teixeira pleaded guilty to six counts under the Espionage Act and expressed remorse in court. His defense cited his autism and social isolation as factors, but the court imposed a strict sentence, highlighting the seriousness of the breach and the need to deter similar actions by service members. The case also exposed weaknesses in U.S. security protocols, leading the Pentagon to tighten information controls.
Prosecutors underscored the historical significance of Teixeira’s actions, framing the case as a cautionary example for military personnel. The breach also compelled the Biden administration to implement diplomatic and security measures to mitigate the fallout, highlighting the extensive repercussions of Teixeira’s unauthorized disclosures.
4. China’s hacker army outshines America – Newsweek
China’s rapid strides in cybersecurity, driven by state-sponsored hacking competitions and educational initiatives, have intensified U.S. concerns about a growing cyber skills gap. Following President Xi Jinping’s directive for China to become a “cyber powerhouse,” the nation has built a vast Capture-the-Flag (CTF) competition network—a tool for training and identifying cyber talent aligned with national goals. Many of these competitions are embedded in academic curricula and government-supported, directly channeling skilled talent into China’s cybersecurity agencies and creating a strong talent pipeline.
China’s structured approach, combined with its civil-military fusion strategy, has enabled the country to develop an ecosystem focused on offensive cyber skills that outpaces those in democratic nations like the U.S. Experts warn this strategy poses long-term risks to U.S. national security, with Chinese hackers reportedly capable of disrupting critical American infrastructure and stealing intellectual property. U.S. officials have called for more collaborative, long-term strategies, emphasizing international alliances and promoting experiential learning in cybersecurity education.
China’s enhanced cyber capabilities are evident in recent actions by state-linked hacking groups and the country’s focused investment over the past decade, which now outpaces the U.S. in certain areas. As FBI and intelligence officials sound alarms about the PRC’s expansive hacking program, the scale of China’s cyber resources and their potential use in strategic conflicts present an unprecedented challenge to U.S. security.
Editor’s note: The summaries of each article were created by ChatGPT 4o and reviewed by Dain Oh.