Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Taiwan NSB Alerts Public on Data Risks from TikTok, Weibo, and RedNote Over China Ties

Posted on July 5, 2025July 5, 2025 By CWS

Jul 05, 2025Ravie LakshmananNational Safety / Privateness
Taiwan’s Nationwide Safety Bureau (NSB) has warned that China-developed purposes like RedNote (aka Xiaohongshu), Weibo, TikTok, WeChat, and Baidu Cloud pose safety dangers on account of extreme knowledge assortment and knowledge switch to China.
The alert comes following an inspection of those apps carried out in coordination with the Ministry of Justice Investigation Bureau (MJIB) and the Prison Investigation Bureau (CIB) underneath the Nationwide Police Company.
“The outcomes point out the existence of safety points, together with extreme knowledge assortment and privateness infringement,” the NSB mentioned. “The general public is suggested to train warning when selecting cellular apps.”

The company mentioned it evaluated the apps in opposition to 15 indicators spanning 5 broad classes: Private knowledge assortment, extreme permission utilization, knowledge transmission and sharing, system data extraction, and biometric knowledge entry.
Based on the evaluation, RedNote violated all 15 indicators, adopted by Weibo and TikTok that had been discovered to breach 13 indicators. WeChat and Baidu Cloud violated 10 and 9 of the 15 indicators, respectively.
These points encompassed in depth assortment of non-public knowledge, together with facial recognition data, screenshots, clipboard contents, contact lists, and site data. All of the apps have additionally been flagged for harvesting the record of put in apps and gadget parameters.
“With regard to knowledge transmission and sharing, the mentioned 5 apps had been discovered to ship packets again to servers situated in China,” the NSB mentioned. “This sort of transmission has raised severe issues over the potential misuse of non-public knowledge by third-parties.”

NSB additionally identified that corporations working in China are obligated to show over consumer knowledge underneath home legal guidelines for nationwide safety, public safety, and intelligence functions, and that utilizing these apps can breach the privateness of Taiwanese customers.
The event comes as nations like India have enacted bans in opposition to Chinese language-made apps, citing safety issues. In November 2024, Canada ordered TikTok to dissolve its operations within the nation, though its destiny within the U.S. nonetheless stays in limbo, because the ban – which was imagined to take impact in January 2025 – has been prolonged for a 3rd time.

Final week, considered one of Germany’s knowledge safety authorities urged Apple and Google to take away Chinese language synthetic intelligence (AI) chatbot DeepSeek from their respective app shops on account of illegal consumer knowledge transfers to China. Comparable restrictions have additionally been imposed by different nations.
“The NSB strongly advises the general public to stay vigilant concerning cellular gadget safety and keep away from downloading China-made apps that pose cybersecurity dangers, in order to guard private knowledge privateness and company enterprise secrets and techniques,” it added.

Discovered this text fascinating? Comply with us on Twitter  and LinkedIn to learn extra unique content material we publish.

The Hacker News Tags:Alerts, China, Data, NSB, Public, RedNote, Risks, Taiwan, Ties, TikTok, Weibo

Post navigation

Previous Post: Hackers Exploiting Java Debug Wire Protocol Servers in Wild to Deploy Cryptomining Payload
Next Post: Researchers Uncover New Technique to Exploit Azure Arc for Hybrid Escalation in Enterprise Environment and Maintain Persistence

Related Posts

ConnectWise Hit by Cyberattack; Nation-State Actor Suspected in Targeted Breach The Hacker News
U.S. Sanctions Funnull for $200M Romance Baiting Scams Tied to Crypto Fraud The Hacker News
China-Linked Hackers Exploit SAP and SQL Server Flaws in Attacks Across Asia and Brazil The Hacker News
Chaos RAT Malware Targets Windows and Linux via Fake Network Tool Downloads The Hacker News
INTERPOL Dismantles 20,000+ Malicious IPs Linked to 69 Malware Variants in Operation Secure The Hacker News
Horabot Malware Targets 6 Latin American Nations Using Invoice-Themed Phishing Emails The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Russia Jailed Hacker Who Worked for Ukrainian Intelligence to Launch Cyberattacks on Critical Infrastructure
  • Threat Actors Turning Job Offers Into Traps, Over $264 Million Lost in 2024 Alone
  • Scattered Spider Upgraded Their Tactics to Abuse Legitimate Tools to Evade Detection and Maintain Persistence
  • Hackers Exploit Legitimate Inno Setup Installer to Use as a Malware Delivery Vehicle
  • Researchers Uncover New Technique to Exploit Azure Arc for Hybrid Escalation in Enterprise Environment and Maintain Persistence

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Russia Jailed Hacker Who Worked for Ukrainian Intelligence to Launch Cyberattacks on Critical Infrastructure
  • Threat Actors Turning Job Offers Into Traps, Over $264 Million Lost in 2024 Alone
  • Scattered Spider Upgraded Their Tactics to Abuse Legitimate Tools to Evade Detection and Maintain Persistence
  • Hackers Exploit Legitimate Inno Setup Installer to Use as a Malware Delivery Vehicle
  • Researchers Uncover New Technique to Exploit Azure Arc for Hybrid Escalation in Enterprise Environment and Maintain Persistence

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News