Cyberespionage

News

FCC rolls back cybersecurity rules for telcos, despite state-hacking risks

The Federal Communications Commission (FCC) has rolled back a previous ruling that required U.S. telecom carriers to imp...
News

Google exposes BadAudio malware used in APT24 espionage campaigns

China-linked APT24 hackers have been using a previously undocumented malware called BadAudio in a three-year espionage c...
News

Russian hackers abuse Hyper-V to hide malware in Linux VMs

The Russian hacker group Curly COMrades is abusing Microsoft Hyper-V in Windows to bypass endpoint detection and respons...
News

North Korean Lazarus hackers targeted European defense companies

North Korean Lazarus hackers compromised three European companies in the defense sector through a coordinated Operation ...
News

Russian hackers evolve malware pushed in “I am not a robot” captchas

The Russian state-backed Star Blizzard hacker group has ramped up operations with new, constantly evolving malware famil...
News

中国のハッカー、ジオマップ・ツールを悪用し1年間も粘着

中国の国家ハッカーが、ジオマッピングツールArcGISのコンポーネントをウェブシェルに変えることで、ターゲット環境で1年以上発見されずにいた。 ArcGIS地理情報システム(GIS)はEsri(環境システム研究所)によって開発され、基本的な...
News

Mustang Panda hackers hijack network captive portals in diplomat attacks

Update: Story and title updated as it incorrectly attributed the activity to Silk Typhoon, instead of Mustang Panda. Sta...
News

Global Salt Typhoon hacking campaigns linked to Chinese tech firms

The U.S. National Security Agency (NSA), the UK's National Cyber Security Centre (NCSC), and partners from over a dozen ...
News

Silk Typhoon hackers hijack network captive portals in diplomat attacks

State-sponsored hackers linked to the Silk Typhoon activity cluster targeted diplomats by hijacking web traffic to redir...
News

Murky Panda hackers exploit cloud trust to hack downstream customers

A Chinese state-sponsored hacking group known as Murky Panda (Silk Typhoon) exploits trusted relationships in cloud envi...